sentence1
stringlengths
1
133k
sentence2
stringlengths
1
131k
mostly or partly inhabited by ethnic Italians, such as Trentino, Trieste, Gorizia, Istria, Fiume and Dalmatia during the 19th and early 20th centuries. An area liable to be targeted by a claim is sometimes called an "irredenta". A common way to express a claim to adjacent territories on the grounds of historical or ethnic association is by using the adjective "Greater" as a prefix to the country name e.g. Greater Germanic Reich, Greater Hungary, Greater Serbia, Greater Albania etc. This conveys the concept and image of national territory at its maximum conceivable or claimed extent, with the country "proper" at its core. The use of "Greater" does not always equate, however, to irredentism; an example of such situation is Greater Poland, the region containing the historical nucleus of the Polish statehood, which
about underlying claims of expansionism, owing to lack of clarity on the historical bounds of putative nations or peoples. This term also often refers to revanchism but the difference between these two terms is, according to Merriam-Webster, that the word "irredentism" means the reunion of politically or ethnically displaced territory, along with a population having the same national identity. On the other hand, "revanchism" evolved from the French word "revanche" which means revenge. In the political realm, "revanchism" refers to such a theory that intends to seek revenge for a lost territory. Etymology The word (from Italian irredento for "unredeemed") was coined in Italy from the phrase Italia irredenta ("unredeemed Italy"). This originally referred to rule by Austria-Hungary over territories mostly or partly inhabited by ethnic Italians, such as Trentino, Trieste, Gorizia, Istria, Fiume and Dalmatia during the 19th and early 20th centuries. An area liable to
Inuit and has a relatively small number of speakers. It is reputed to be fairly close to the North Baffin dialect, since a group of migratory Inuit from Baffin Island settled in the area during the 19th and early 20th centuries. It counts under 1000 speakers according to Ethnologue. Greenlandic was strongly supported by the Danish Christian mission (conducted by the Danish state church) in Greenland. Several major dictionaries were created, beginning with Poul Egedes's Dictionarium Grönlandico-danico-latinum (1750) and culminating with Samuel Kleinschmidt's (1871) "Den grønlandske ordbog" (Transl. "The Greenlandic Dictionary") that contained a Greenlandic grammatical system that has formed the basis of modern Greenlandic grammar. Together with the fact that until 1925 Danish was not taught in the public schools, these policies had the consequence that Greenlandic has always and continues to enjoy a very strong position in Greenland, both as a spoken as well as written language. Phonology and phonetics Eastern Canadian Inuit language variants have fifteen consonants and three vowels (which can be long or short). Consonants are arranged with five places of articulation: bilabial, alveolar, palatal, velar and uvular; and three manners of articulation: voiceless stops, voiced continuants, and nasals, as well as two additional sounds—voiceless fricatives. The Alaskan dialects have an additional manner of articulation, the retroflex, which was present in proto-Inuit language. Retroflexes have disappeared in all the Canadian and Greenlandic dialects. In Natsilingmiutut, the voiced palatal stop derives from a former retroflex. Almost all Inuit language variants have only three basic vowels and make a phonological distinction between short and long forms of all vowels. The only exceptions are at the extreme edges of the Inuit world: parts of Greenland, and in western Alaska. Morphology and syntax The Inuit language, like other Eskimo–Aleut languages, has a very rich morphological system, in which a succession of different morphemes are added to root words (like verb endings in European languages) to indicate things that, in languages like English, would require several words to express. (See also: Agglutinative language and Polysynthetic language) All Inuit language words begin with a root morpheme to which other morphemes are suffixed. The language has hundreds of distinct suffixes, in some dialects as many as 700. Fortunately for learners, the language has a highly regular morphology. Although the rules are sometimes very complicated, they do not have exceptions in the sense that English and other Indo-European languages do. This system makes words very long, and potentially unique. For example, in central Nunavut Inuktitut: Tusaatsiarunnanngittualuujunga. I cannot hear very well. This long word is composed of a root word tusaa- "to hear" followed by five suffixes: {| !-tsiaq- |"well" |- !-junnaq- |"be able to" |- !-nngit- |"not" |- !-tualuu- |"very much" |- !-junga |1st pers. singular present indicative non-specific |} This sort of word construction is pervasive in the Inuit languages and makes them very unlike English. In one large Canadian corpus – the Nunavut Hansard – 92% of all words appear only once, in contrast to a small percentage in most English corpora of similar size. This makes the application of Zipf's law quite difficult in the Inuit language. Furthermore, the notion of a part of speech can be somewhat complicated in the Inuit languages. Fully inflected verbs can be interpreted as nouns. The word ilisaijuq can be interpreted as a fully inflected verb: "he studies", but can also be interpreted as a noun: "student". That said, the meaning is probably obvious to a fluent speaker, when put in context. The morphology and syntax of the Inuit languages vary to some degree between dialects, and the article Inuit grammar describes primarily central Nunavut dialects, but the basic principles will generally apply to all of them and to some degree to Yupik languages as well. Vocabulary Toponymy and names Both the names of places and people tend to be highly prosaic when translated. Iqaluit, for example, is simply the plural of the noun iqaluk "fish" ("Arctic char", "salmon" or "trout" depending on dialect). Igloolik (Iglulik) means place with houses, a word that could be interpreted as simply town; Inuvik is place of people; Baffin Island, Qikiqtaaluk in Inuktitut, translates approximately to "big island". Although practically all Inuit have legal names based on southern naming traditions, at home and among themselves they still use native naming traditions. There too, names tend to consist of highly prosaic words. The Inuit traditionally believed that by adopting the name of a dead person or a class of things, they could take some of their characteristics or powers, and enjoy a part of their identity. (This is why they were always very willing to accept European names: they believed that this made them equal to the Europeans.) Common native names in Canada include "Ujarak" (rock), "Nuvuk" (headland), "Nasak" (hat, or hood), "Tupiq" or "Tupeq" in Kalaallisut (tent), and "Qajaq" (kayak). Inuit also use animal names, traditionally believing that by using those names, they took on some of the characteristics of that animal: "Nanuq" or "Nanoq" in Kalaallisut (polar-bear), "Uqalik" or "Ukaleq" in Kalaallisut (Arctic hare), and "Tiriaq" or "Teriaq" in Kalaallisut (mouse) are favourites. In other cases, Inuit are named after dead people or people in traditional tales, by naming them after anatomical traits those people are believed to have had. Examples include "Itigaituk" (has no feet), "Anana" or "Anaana" (mother), "Piujuq" (beautiful) and "Tulimak" (rib). Inuit may have any number of names, given by parents and other community members. Disc numbers and Project Surname In the 1920s, changes in lifestyle and serious epidemics like tuberculosis made the government of Canada interested in tracking the Inuit of Canada's Arctic. Traditionally Inuit names reflect what is important in Inuit culture: environment, landscape, seascape, family, animals, birds, spirits. However these traditional names were difficult for non-Inuit to parse. Also, the agglutinative nature of Inuit language meant that names seemed long and were difficult for southern bureaucrats and missionaries to pronounce. Thus, in the 1940s, the Inuit were given disc numbers, recorded on a special leather ID tag, like a dog tag. They were required to keep the tag with them always. (Some tags are now so old and worn that the number is polished out.) The numbers were assigned with a letter prefix that indicated location (E = east), community, and then the order in which the census-taker saw the individual. In some ways this state renaming was abetted by the churches and missionaries, who viewed the traditional names and their calls to power as related to shamanism and paganism. They encouraged people to take Christian names. So a young woman who was known to her relatives as "Lutaaq, Pilitaq, Palluq, or Inusiq" and had been baptised as "Annie" was under this system to become Annie E7-121. People adopted the number-names, their family members' numbers, etc., and learned all the region codes (like knowing a telephone area code). Until Inuit began studying in the south, many did not know that numbers were not normal parts of Christian and English naming systems. Then in 1969, the government started Project Surname, headed by Abe Okpik, to replace number-names with patrilineal "family surnames". But contemporary Inuit carvers and graphic artists still use their disk number as their signature on their works of art. Words for snow A popular belief exists that the Inuit have an unusually large number of words for snow. This is not accurate, and results from a misunderstanding of the nature of polysynthetic languages. In fact, the Inuit have only a few base roots for snow: 'qanniq-' ('qanik-' in some dialects), which is used most often like the verb to snow, and 'aput', which means snow as a substance. Parts of speech work very differently in the Inuit language than in English, so these definitions are somewhat misleading. The Inuit languages can form very long words by adding more and more descriptive affixes to words. Those affixes may modify the syntactic and semantic properties of the base word, or may add qualifiers to it in much the same way that English uses adjectives or prepositional phrases to qualify nouns (e.g. "falling snow", "blowing snow", "snow on the ground", "snow drift", etc.) The "fact" that there are many Inuit words for snow has been put forward so often that it has become a journalistic cliché. Numbers The Inuit use a base-20 counting system. Writing Because the Inuit languages are spread over such a large area, divided between different nations and political units and originally reached by Europeans of different origins at different times, there is no uniform way of writing the Inuit language. Currently there are six "standard" ways to write the languages: ICI Standard Syllabics (Canada) ICI Standard Roman script (Canada) Nunatsiavut Roman script (Canada) Alaskan Inupiaq script (USA) Greenlandic Though all except the syllabics use the Latin alphabet, all of them are a bit different from each other. The Canadian national organization Inuit Tapiriit Kanatami adopted Inuktut Qaliujaaqpait, a unified orthography for all varieties of Inuktitut, in September 2019. It is based on the Latin alphabet without diacritics. Most Inuktitut in Nunavut and Nunavik is written using a script called Inuktitut syllabics, based on Canadian Aboriginal syllabics. The western part of Nunavut and the Northwest Territories use Latin alphabet usually identified as Inuinnaqtun. In Alaska, another Latin alphabet is used, with some characters using diacritics. Nunatsiavut uses an alphabet devised by German-speaking Moravian missionaries, which included the letter kra. Greenland's Latin alphabet was originally much like the one used in Nunatsiavut, but underwent a spelling reform in 1973 to bring the orthography in line with changes in pronunciation and better reflect the phonemic inventory of the language. Canadian
able to speak the Iñupiaq, with most of them over the age of 40. Alaskan Inupiat speak three distinct dialects, which have difficult mutual intelligibilty: Qawiaraq is spoken on the southern side of the Seward Peninsula and the Norton Sound area. In the past it was spoken in Chukotka, particularly Big Diomede island, but appears to have vanished in Russian areas through assimilation into Yupik, Chukchi and Russian-speaking communities. It is radically different in phonology from other Inuit language variants. Inupiatun (North Slope Iñupiaq) is spoken on the Alaska North Slope and in the Kotzebue Sound area. Malimiutun or Malimiut Inupiatun, which are the variants of the Kotzebue Sound area and the northwest of Alaska . Canada The Inuit languages are an official language in the Northwest Territories, and the official and dominant language of Nunavut; it enjoys a high level of official support in Nunavik, a semi-autonomous portion of Quebec; and is still spoken in some parts of Labrador. Generally, Canadians refer to all dialects spoken in Canada as Inuktitut, but the terms Inuvialuktun, Inuinnaqtun, and Inuttut (also called Nunatsiavummiutut or Labradorimiutut) have some currency in referring to the variants of specific areas. Western Canadian Inuit Inuvialuktun (from west to east) Uummarmiutun (Canadian Iñupiaq) Siglitun (Sallirmiutun) Inuinnaqtun Natsilingmiutut Kivallirmiutut (Kivalliq) Aivilingmiutut (Ailivik) Iglulingmiut (Qikiqtaaluk Uannanganii) Eastern Canadian Inuit Inuktitut Qikiqtaaluk Nigiani Nunavimmiututut Inuttitut (Nunatsiavummiut) Greenland Greenland counts approximately 50,000 speakers of the Inuit languages, over 90% of whom speak west Greenlandic dialects at home. Kalaallisut, or in English Greenlandic, is the name given to the standard dialect and official language of Greenland. This standard national language has been taught to all Greenlanders since schools were established, regardless of their native dialect. It reflects almost exclusively the language of western Greenland and has borrowed a great deal of vocabulary from Danish, while Canadian and Alaskan Inuit languages have tended to take vocabulary from English or sometimes French and Russian. It is written using the Latin script. The dialect of the Upernavik area in northwest Greenland is somewhat different in phonology from the standard dialect. Tunumiit oraasiat, the Tunumiit dialect, (or Tunumiisut in Greenlandic, often East Greenlandic in other languages), is the dialect of eastern Greenland. It differs sharply from other Inuit language variants and has roughly 3000 speakers according to Ethnologue. Inuktun (Or Avanersuarmiutut in Greenlandic) is the dialect of the area around Qaanaaq in northern Greenland. It is sometimes called the Thule dialect or North Greenlandic. This area is the northernmost settlement area of the Inuit and has a relatively small number of speakers. It is reputed to be fairly close to the North Baffin dialect, since a group of migratory Inuit from Baffin Island settled in the area during the 19th and early 20th centuries. It counts under 1000 speakers according to Ethnologue. Greenlandic was strongly supported by the Danish Christian mission (conducted by the Danish state church) in Greenland. Several major dictionaries were created, beginning with Poul Egedes's Dictionarium Grönlandico-danico-latinum (1750) and culminating with Samuel Kleinschmidt's (1871) "Den grønlandske ordbog" (Transl. "The Greenlandic Dictionary") that contained a Greenlandic grammatical system that has formed the basis of modern Greenlandic grammar. Together with the fact that until 1925 Danish was not taught in the public schools, these policies had the consequence that Greenlandic has always and continues to enjoy a very strong position in Greenland, both as a spoken as well as written language. Phonology and phonetics Eastern Canadian Inuit language variants have fifteen consonants and three vowels (which can be long or short). Consonants are arranged with five places of articulation: bilabial, alveolar, palatal, velar and uvular; and three manners of articulation: voiceless stops, voiced continuants, and nasals, as well as two additional sounds—voiceless fricatives. The Alaskan dialects have an additional manner of articulation, the retroflex, which was present in proto-Inuit language. Retroflexes have disappeared in all the Canadian and Greenlandic dialects. In Natsilingmiutut, the voiced palatal stop derives from a former retroflex. Almost all Inuit language variants have only three basic vowels and make a phonological distinction between short and long forms of all vowels. The only exceptions are at the extreme edges of the Inuit world: parts of Greenland, and in western Alaska. Morphology and syntax The Inuit language, like other Eskimo–Aleut languages, has a very rich morphological system, in which a succession of different morphemes are added to root words (like verb endings in European languages) to indicate things that, in languages like English, would require several words to express. (See also: Agglutinative language and Polysynthetic language) All Inuit language words begin with a root morpheme to which other morphemes are suffixed. The language has hundreds of distinct suffixes, in some dialects as many as 700. Fortunately for learners, the language has a highly regular morphology. Although the rules are sometimes very complicated, they do not have exceptions in the sense that English and other Indo-European languages do. This system makes words very long, and potentially unique. For example, in central Nunavut Inuktitut: Tusaatsiarunnanngittualuujunga. I cannot hear very well. This long word is composed of a root word tusaa- "to hear" followed by five suffixes: {| !-tsiaq- |"well" |- !-junnaq- |"be able to" |- !-nngit- |"not" |- !-tualuu- |"very much" |- !-junga |1st pers. singular present indicative non-specific |} This sort of word construction is pervasive in the Inuit languages and makes them very unlike English. In one large Canadian corpus – the Nunavut Hansard – 92% of all words appear only once, in contrast to a small percentage in most English corpora of similar size. This makes the application of Zipf's law quite difficult in the Inuit language. Furthermore, the notion of a part of speech can be somewhat complicated in the Inuit languages. Fully inflected verbs can be interpreted as nouns. The word ilisaijuq can be interpreted as a fully inflected verb: "he studies", but can also be interpreted as a noun: "student". That said, the meaning is probably obvious to a fluent speaker, when put in context. The morphology and syntax of the Inuit languages vary to some degree between dialects, and the article Inuit grammar describes primarily central Nunavut dialects, but the basic principles will generally apply to all of them and to some degree to Yupik languages as well. Vocabulary Toponymy and names Both the names of places and people tend to be highly prosaic when translated. Iqaluit, for example, is simply the plural of the noun iqaluk "fish" ("Arctic char", "salmon" or "trout" depending on dialect). Igloolik (Iglulik) means place with houses, a word that could be interpreted as simply town; Inuvik is place of people; Baffin Island, Qikiqtaaluk in Inuktitut, translates approximately to "big island". Although practically all Inuit have legal names based on southern naming traditions, at home and among themselves they still use native naming traditions. There too, names tend to consist of highly prosaic words. The Inuit traditionally believed that by adopting the name of a dead person or a class of things, they could take some of their characteristics or powers, and enjoy a part of their identity. (This is why they were always very willing to accept European names: they believed that this made them equal to the Europeans.) Common native names in Canada include "Ujarak" (rock), "Nuvuk" (headland), "Nasak" (hat, or hood), "Tupiq" or "Tupeq" in Kalaallisut (tent), and "Qajaq" (kayak). Inuit also use animal names, traditionally believing that by using those names, they took on some of the characteristics of that animal: "Nanuq" or "Nanoq" in Kalaallisut (polar-bear), "Uqalik" or "Ukaleq" in Kalaallisut (Arctic hare), and "Tiriaq" or "Teriaq" in Kalaallisut (mouse) are favourites. In other cases, Inuit are named after dead people or people in traditional tales, by naming them after anatomical traits those people are believed to have had. Examples include "Itigaituk" (has no feet), "Anana" or "Anaana" (mother), "Piujuq" (beautiful) and "Tulimak" (rib). Inuit may have any number of names, given by parents and other community members. Disc numbers and Project Surname In the 1920s, changes in lifestyle and serious epidemics like tuberculosis made the government of Canada interested in tracking the Inuit of Canada's Arctic. Traditionally Inuit names reflect what is important in Inuit culture: environment, landscape, seascape, family, animals, birds, spirits. However these traditional names were difficult for non-Inuit to parse. Also, the agglutinative nature of Inuit language meant that names seemed long and were difficult for southern bureaucrats and missionaries to pronounce. Thus, in the 1940s, the Inuit were given disc numbers, recorded on a special leather ID tag, like a dog tag. They were required to keep the tag with them always. (Some tags are now so old and worn that the number is polished out.) The numbers were assigned with a letter prefix that indicated location (E = east), community, and then the order in which the census-taker saw the individual. In some ways this state renaming was abetted by the churches and missionaries, who viewed the traditional names and their calls to power as related to shamanism and paganism. They encouraged people to take Christian names. So a young woman who was known to her relatives as "Lutaaq, Pilitaq, Palluq, or Inusiq" and had been baptised as "Annie" was under this system to become Annie E7-121. People adopted the number-names, their family members' numbers, etc., and learned all the region codes (like knowing a telephone area code). Until Inuit began studying in the south, many did not know that numbers were not normal parts of Christian and English naming systems. Then in 1969, the government started Project Surname, headed by Abe Okpik, to replace number-names with patrilineal "family surnames". But contemporary Inuit carvers and graphic artists still use their disk number as their signature on their works of art. Words for snow A popular belief exists that the Inuit have an unusually large number of words for snow. This is not accurate, and results from a misunderstanding of the nature of polysynthetic languages. In fact, the Inuit have only a few base roots for snow: 'qanniq-' ('qanik-' in some dialects), which is used most often like the verb to snow, and 'aput', which means snow as a substance. Parts of speech work very differently in the Inuit language than in English, so these definitions are somewhat misleading. The Inuit languages can form very long words by adding more and more descriptive affixes to words. Those affixes may modify the syntactic and semantic properties of the base word, or may add qualifiers to it in
unified Ilkhanate, leaving the city and heading north with a large retinue. Ibn Battuta joined the royal caravan for a while, then turned north on the Silk Road to Tabriz, the first major city in the region to open its gates to the Mongols and by then an important trading centre as most of its nearby rivals had been razed by the Mongol invaders. Ibn Battuta left again for Baghdad, probably in July, but first took an excursion northwards along the river Tigris. He visited Mosul, where he was the guest of the Ilkhanate governor, and then the towns of Cizre (Jazirat ibn 'Umar) and Mardin in modern-day Turkey. At a hermitage on a mountain near Sinjar, he met a Kurdish mystic who gave him some silver coins. Once back in Mosul, he joined a "feeder" caravan of pilgrims heading south to Baghdad, where they would meet up with the main caravan that crossed the Arabian Desert to Mecca. Ill with diarrhoea, he arrived in the city weak and exhausted for his second hajj. Arabia Ibn Battuta remained in Mecca for some time (the Rihla suggests about three years, from September 1327 until autumn 1330). Problems with chronology, however, lead commentators to suggest that he may have left after the 1328 hajj. After the hajj in either 1328 or 1330, he made his way to the port of Jeddah on the Red Sea coast. From there he followed the coast in a series of boats (known as a jalbah, these were small craft made of wooden planks sewn together, lacking an established phrase) making slow progress against the prevailing south-easterly winds. Once in Yemen he visited Zabīd and later the highland town of Ta'izz, where he met the Rasulid dynasty king (Malik) Mujahid Nur al-Din Ali. Ibn Battuta also mentions visiting Sana'a, but whether he actually did so is doubtful. In all likelihood, he went directly from Ta'izz to the important trading port of Aden, arriving around the beginning of 1329 or 1331. Somalia From Aden, Ibn Battuta embarked on a ship heading for Zeila on the coast of Somalia. He then moved on to Cape Guardafui further down the Somalia seaboard, spending about a week in each location. Later he would visit Mogadishu, the then pre-eminent city of the "Land of the Berbers" (بلد البربر Balad al-Barbar, the medieval Arabic term for the Horn of Africa). When Ibn Battuta arrived in 1332, Mogadishu stood at the zenith of its prosperity. He described it as "an exceedingly large city" with many rich merchants, noted for its high-quality fabric that was exported to other countries, including Egypt. Ibn Battuta added that the city was ruled by a Somali Sultan, Abu Bakr ibn Sayx 'Umar, who was originally from Berbera in northern Somalia and spoke both Somali (referred to by Battuta as Mogadishan, the Benadir dialect of Somali) and Arabic with equal fluency. The Sultan, had a son and heir apparent, Hamza. Hamza was noted for bravery in battle and being exceedingly cunning as well as being dashingly handsome. Hamza led men into battle at the very ripe age of 9; his prowess on field of battle was so legendary that his enemies would rather negotiate than foolishly meet Hamza on the open field. In addition to being commanding presence on the battlefield, Hamza was a well-travelled man, as he was the first Somali to step foot in mainland China, where Hamza established ties with the Ming Dynasty of the 14th century. Hamza was a man of great generosity and known for supporting the poor and was known locally as Hamza Habibi حمزة حبيب(ي) The Sultan also claimed lineage to the Prophet through Abu Taleb, and his son Aqeel The Sultan also had a retinue of wazirs (ministers), legal experts, commanders, royal eunuchs, and assorted hangers-on at his beck and call. Swahili Coast Ibn Battuta continued by ship south to the Swahili Coast, a region then known in Arabic as the Bilad al-Zanj ("Land of the Zanj"), with an overnight stop at the island town of Mombasa. Although relatively small at the time, Mombasa would become important in the following century. After a journey along the coast, Ibn Battuta next arrived in the island town of Kilwa in present-day Tanzania, which had become an important transit centre of the gold trade. He described the city as "one of the finest and most beautifully built towns; all the buildings are of wood, and the houses are roofed with dīs reeds". Ibn Battuta recorded his visit to the Kilwa Sultanate in 1330, and commented favourably on the humility and religion of its ruler, Sultan al-Hasan ibn Sulaiman, a descendant of the legendary Ali ibn al-Hassan Shirazi. He further wrote that the authority of the Sultan extended from Malindi in the north to Inhambane in the south and was particularly impressed by the planning of the city, believing it to be the reason for Kilwa's success along the coast. During this period, he described the construction of the Palace of Husuni Kubwa and a significant extension to the Great Mosque of Kilwa, which was made of coral stones and was the largest Mosque of its kind. With a change in the monsoon winds, Ibn Battuta sailed back to Arabia, first to Oman and the Strait of Hormuz then on to Mecca for the hajj of 1330 (or 1332). Itinerary 1332–1347 Anatolia After his third pilgrimage to Mecca, Ibn Battuta decided to seek employment with the Sultan of Delhi, Muhammad bin Tughluq. In the autumn of 1330 (or 1332), he set off for the Seljuk controlled territory of Anatolia to take an overland route to India. He crossed the Red Sea and the Eastern Desert to reach the Nile valley and then headed north to Cairo. From there he crossed the Sinai Peninsula to Palestine and then travelled north again through some of the towns that he had visited in 1326. From the Syrian port of Latakia, a Genoese ship took him (and his companions) to Alanya on the southern coast of modern-day Turkey. He then journeyed westwards along the coast to the port of Antalya. In the town he met members of one of the semi-religious fityan associations. These were a feature of most Anatolian towns in the 13th and 14th centuries. The members were young artisans and had at their head a leader with the title of Akhil. The associations specialised in welcoming travellers. Ibn Battuta was very impressed with the hospitality that he received and would later stay in their hospices in more than 25 towns in Anatolia. From Antalya Ibn Battuta headed inland to Eğirdir which was the capital of the Hamidids. He spent Ramadan (June 1331 or May 1333) in the city. From this point his itinerary across Anatolia in the Rihla becomes confused. Ibn Battuta describes travelling westwards from Eğirdir to Milas and then skipping eastward past Eğirdir to Konya. He then continues travelling in an easterly direction, reaching Erzurum from where he skips back to Birgi which lies north of Milas. Historians believe that Ibn Battuta visited a number of towns in central Anatolia, but not in the order in which he describes. When Ibn Battuta arrived in Iznik, which had just been conquered by Orhan, Orhan was away and his wife was in command of the nearby stationed soldiers, Ibn Battuta gave this account of Orhan's wife: “A pious and excellent woman. She treated me honourably, gave me hospitality and sent gifts.” Ibn Battuta's account of Orhan: Ibn Battuta had also visited Bursa which at the time was the capital of the Ottoman Beylik, he described Bursa as “a great and important city with fine bazaars and wide streets, surrounded on all sides with gardens and running springs.” He also visited the Beylik of Aydin. Ibn Battuta stated that the ruler of the Beylik of Aydin had twenty Greek slaves at the entrance of his palace and Ibn Battuta was given a Greek slave as a gift. His visit to Anatolia was the first time in his travels he acquired a servant; the ruler of Aydin gifted him his first slave. Later, he purchased a young Greek girl for 40 dinars in Ephesus, was gifted another slave in Izmir by the Sultan, and purchased a second girl in Balikesir. The conspicuous evidence of his wealth and prestige continued to grow. Central Asia From Sinope he took a sea route to the Crimean Peninsula, arriving in the Golden Horde realm. He went to the port town of Azov, where he met with the emir of the Khan, then to the large and rich city of Majar. He left Majar to meet with Uzbeg Khan's travelling court (Orda), which was at the time near Mount Beshtau. From there he made a journey to Bolghar, which became the northernmost point he reached, and noted its unusually short nights in summer (by the standards of the subtropics). Then he returned to the Khan's court and with it moved to Astrakhan. Ibn Battuta recorded that while in Bolghar he wanted to travel further north into the land of darkness. The land is snow-covered throughout (northern Siberia) and the only means of transport is dog-drawn sled. There lived a mysterious people who were reluctant to show themselves. They traded with southern people in a peculiar way. Southern merchants brought various goods and placed them in an open area on the snow in the night, then returned to their tents. Next morning they came to the place again and found their merchandise taken by the mysterious people, but in exchange they found fur-skins which could be used for making valuable coats, jackets, and other winter garments. The trade was done between merchants and the mysterious people without seeing each other. As Ibn Battuta was not a merchant and saw no benefit of going there he abandoned the travel to this land of darkness. When they reached Astrakhan, Öz Beg Khan had just given permission for one of his pregnant wives, Princess Bayalun, a daughter of Byzantine emperor Andronikos III Palaiologos, to return to her home city of Constantinople to give birth. Ibn Battuta talked his way into this expedition, which would be his first beyond the boundaries of the Islamic world. Arriving in Constantinople towards the end of 1332 (or 1334), he met the Byzantine emperor Andronikos III Palaiologos. He visited the great church of Hagia Sophia and spoke with an Eastern Orthodox priest about his travels in the city of Jerusalem. After a month in the city, Ibn Battuta returned to Astrakhan, then arrived in the capital city Sarai al-Jadid and reported the accounts of his travels to Sultan Öz Beg Khan (r. 1313–1341). Then he continued past the Caspian and Aral Seas to Bukhara and Samarkand, where he visited the court of another Mongolian king, Tarmashirin (r. 1331–1334) of the Chagatai Khanate. From there, he journeyed south to Afghanistan, then crossed into India via the mountain passes of the Hindu Kush. In the Rihla, he mentions these mountains and the history of the range in slave trading. He wrote, Ibn Battuta and his party reached the Indus River on 12 September 1333. From there, he made his way to Delhi and became acquainted with the sultan, Muhammad bin Tughluq. India Muhammad bin Tughluq was renowned as the wealthiest man in the Muslim world at that time. He patronized various scholars, Sufis, qadis, viziers, and other functionaries in order to consolidate his rule. As with Mamluk Egypt, the Tughlaq Dynasty was a rare vestigial example of Muslim rule after a Mongol invasion. On the strength of his years of study in Mecca, Ibn Battuta was appointed a qadi, or judge, by
at the time near Mount Beshtau. From there he made a journey to Bolghar, which became the northernmost point he reached, and noted its unusually short nights in summer (by the standards of the subtropics). Then he returned to the Khan's court and with it moved to Astrakhan. Ibn Battuta recorded that while in Bolghar he wanted to travel further north into the land of darkness. The land is snow-covered throughout (northern Siberia) and the only means of transport is dog-drawn sled. There lived a mysterious people who were reluctant to show themselves. They traded with southern people in a peculiar way. Southern merchants brought various goods and placed them in an open area on the snow in the night, then returned to their tents. Next morning they came to the place again and found their merchandise taken by the mysterious people, but in exchange they found fur-skins which could be used for making valuable coats, jackets, and other winter garments. The trade was done between merchants and the mysterious people without seeing each other. As Ibn Battuta was not a merchant and saw no benefit of going there he abandoned the travel to this land of darkness. When they reached Astrakhan, Öz Beg Khan had just given permission for one of his pregnant wives, Princess Bayalun, a daughter of Byzantine emperor Andronikos III Palaiologos, to return to her home city of Constantinople to give birth. Ibn Battuta talked his way into this expedition, which would be his first beyond the boundaries of the Islamic world. Arriving in Constantinople towards the end of 1332 (or 1334), he met the Byzantine emperor Andronikos III Palaiologos. He visited the great church of Hagia Sophia and spoke with an Eastern Orthodox priest about his travels in the city of Jerusalem. After a month in the city, Ibn Battuta returned to Astrakhan, then arrived in the capital city Sarai al-Jadid and reported the accounts of his travels to Sultan Öz Beg Khan (r. 1313–1341). Then he continued past the Caspian and Aral Seas to Bukhara and Samarkand, where he visited the court of another Mongolian king, Tarmashirin (r. 1331–1334) of the Chagatai Khanate. From there, he journeyed south to Afghanistan, then crossed into India via the mountain passes of the Hindu Kush. In the Rihla, he mentions these mountains and the history of the range in slave trading. He wrote, Ibn Battuta and his party reached the Indus River on 12 September 1333. From there, he made his way to Delhi and became acquainted with the sultan, Muhammad bin Tughluq. India Muhammad bin Tughluq was renowned as the wealthiest man in the Muslim world at that time. He patronized various scholars, Sufis, qadis, viziers, and other functionaries in order to consolidate his rule. As with Mamluk Egypt, the Tughlaq Dynasty was a rare vestigial example of Muslim rule after a Mongol invasion. On the strength of his years of study in Mecca, Ibn Battuta was appointed a qadi, or judge, by the sultan. However, he found it difficult to enforce Islamic law beyond the sultan's court in Delhi, due to lack of Islamic appeal in India. It is uncertain by which route Ibn Battuta entered the Indian subcontinent but it is known that he was kidnapped and robbed by Hindu rebels on his journey to the Indian coast. He may have entered via the Khyber Pass and Peshawar, or further south. He crossed the Sutlej river near the city of Pakpattan, in modern-day Pakistan, where he paid obeisance at the shrine of Baba Farid, before crossing southwest into Rajput country. From the Rajput kingdom of Sarsatti, Battuta visited Hansi in India, describing it as "among the most beautiful cities, the best constructed and the most populated; it is surrounded with a strong wall, and its founder is said to be one of the great non-Muslim kings, called Tara". Upon his arrival in Sindh, Ibn Battuta mentions the Indian rhinoceros that lived on the banks of the Indus. The Sultan was erratic even by the standards of the time and for six years Ibn Battuta veered between living the high life of a trusted subordinate and falling under suspicion of treason for a variety of offences. His plan to leave on the pretext of taking another hajj was stymied by the Sultan. The opportunity for Battuta to leave Delhi finally arose in 1341 when an embassy arrived from Yuan dynasty China asking for permission to rebuild a Himalayan Buddhist temple popular with Chinese pilgrims. Ibn Battuta was given charge of the embassy but en route to the coast at the start of the journey to China, he and his large retinue were attacked by a group of bandits. Separated from his companions, he was robbed, kidnapped, and nearly lost his life. Despite this setback, within ten days he had caught up with his group and continued on to Khambhat in the Indian state of Gujarat. From there, they sailed to Calicut (now known as Kozhikode), where Portuguese explorer Vasco da Gama would land two centuries later. While in Calicut, Battuta was the guest of the ruling Zamorin. While Ibn Battuta visited a mosque on shore, a storm arose and one of the ships of his expedition sank. The other ship then sailed without him only to be seized by a local Sumatran king a few months later. Afraid to return to Delhi and be seen as a failure, he stayed for a time in southern India under the protection of Jamal-ud-Din, ruler of the small but powerful Nawayath sultanate on the banks of the Sharavathi river next to the Arabian Sea. This area is today known as Hosapattana and lies in the Honavar administrative district of Uttara Kannada. Following the overthrow of the sultanate, Ibn Battuta had no choice but to leave India. Although determined to continue his journey to China, he first took a detour to visit the Maldive Islands where he worked as a judge. He spent nine months on the islands, much longer than he had intended. When he arrived at the capital, Malé, Ibn Battuta did not plan to stay. However, the leaders of the formerly Buddhist nation that had recently converted to Islam were looking for a chief judge, someone who knew Arabic and Qur’an. To convince him to stay they gave him pearls, gold jewellery, and slaves, while at the same time making it impossible for him to leave by ship. Compelled into staying, he became a chief judge and married into the royal family of Omar I. Ibn Battuta took on his duties as a judge with keenness and strived to transform local practices to conform to a stricter application of Muslim law. He commanded that men who did not attend Friday prayer be publicly whipped, and that robbers’ right hand be cut off. He forbade women from being topless in public, which had previously been the custom. However, these and other strict judgments began to antagonize the island nation's rulers, and involved him in power struggles and political intrigues. Ibn Battuta resigned from his job as chief qadi, although in all likelihood it was inevitable that he would have been dismissed. Throughout his travels, Ibn Battuta kept close company with women, usually taking a wife whenever he stopped for any length of time at one place, and then divorcing her when he moved on. While in the Maldives, Ibn Battuta took four wives. In his Travels he wrote that in the Maldives the effect of small dowries and female non-mobility combined to, in effect, make a marriage a convenient temporary arrangement for visiting male travellers and sailors. From the Maldives, he carried on to Sri Lanka and visited Sri Pada and Tenavaram temple. Ibn Battuta's ship almost sank on embarking from Sri Lanka, only for the vessel that came to his rescue to suffer an attack by pirates. Stranded onshore, he worked his way back to the Madurai kingdom in India. Here he spent some time in the court of the short-lived Madurai Sultanate under Ghiyas-ud-Din Muhammad Damghani, from where he returned to the Maldives and boarded a Chinese junk, still intending to reach China and take up his ambassadorial post. He reached the port of Chittagong in modern-day Bangladesh intending to travel to Sylhet to meet Shah Jalal, who became so renowned that Ibn Battuta, then in Chittagong, made a one-month journey through the mountains of Kamaru near Sylhet to meet him. On his way to Sylhet, Ibn Battuta was greeted by several of Shah Jalal's disciples who had come to assist him on his journey many days before he had arrived. At the meeting in 1345 CE, Ibn Battuta noted that Shah Jalal was tall and lean, fair in complexion and lived by the mosque in a cave, where his only item of value was a goat he kept for milk, butter, and yogurt. He observed that the companions of the Shah Jalal were foreign and known for their strength and bravery. He also mentions that many people would visit the Shah to seek guidance. Ibn Battuta went further north into Assam, then turned around and continued with his original plan. Southeast Asia In 1345, Ibn Battuta travelled on to Samudra Pasai Sultanate in present-day Aceh, Northern Sumatra, where he notes in his travel log that the ruler of Samudra Pasai was a pious Muslim named Sultan Al-Malik Al-Zahir Jamal-ad-Din, who performed his religious duties with utmost zeal and often waged campaigns against animists in the region. The island of Sumatra, according to Ibn Battuta, was rich in camphor, areca nut, cloves, and tin. The madh'hab he observed was Imam Al-Shafi‘i, whose customs were similar to those he had previously seen in coastal India, especially among the Mappila Muslims, who were also followers of Imam Al-Shafi‘i. At that time Samudra Pasai marked the end of Dar al-Islam, because no territory east of this was ruled by a Muslim. Here he stayed for about two weeks in the wooden walled town as a guest of the sultan, and then the sultan provided him with supplies and sent him on his way on one of his own junks to China. Ibn Battuta first sailed to Malacca on the Malay Peninsula which he called "Mul Jawi". He met the ruler of Malacca and stayed as a guest for three days. Ibn Battuta then sailed to a state called Kaylukari in the land of Tawalisi, where he met Urduja, a local princess. Urduja was a brave warrior, and her people were opponents of the Yuan dynasty. She was described as an "idolater", but could write the phrase Bismillah in Islamic calligraphy. The locations of Kaylukari and Tawalisi are disputed. Kaylukari might referred to Po Klong Garai in Champa (now southern Vietnam), and Urduja might be an aristocrat of Champa or Dai Viet. Filipinos widely believe that Kaylukari was in present-day Pangasinan Province of the Philippines. In modern times, Urduja has been featured in Filipino textbooks and films as a national heroine. Numerous other locations have been proposed, ranging from Java to somewhere in Guangdong Province, China. However, Sir Henry Yule and William Henry Scott consider both Tawalisi and Urduja to be entirely fictitious. (See Tawalisi for details.) From Kaylukari, Ibn Battuta finally reached Quanzhou in Fujian Province, China. China In the year 1345 Ibn Battuta arrived at Quanzhou in China's Fujian province, then under the rule of the Mongols of the Yuan dynasty. One of the first things he noted was that Muslims referred to the city as "Zaitun" (meaning olive), but Ibn Battuta could not find any olives anywhere. He mentioned local artists and their mastery in making portraits of newly arrived foreigners; these were for security purposes. Ibn Battuta praised the craftsmen and their silk and porcelain; as well as fruits such as plums and watermelons and the advantages of paper money. He described the manufacturing process of large ships in the city of Quanzhou. He also mentioned Chinese cuisine and its usage of animals such as frogs, pigs, and even dogs which were sold in the markets, and noted that the chickens in China were larger than those in the west. Scholars however have pointed out numerous errors given in Ibn Battuta's account of China, for example confusing the Yellow River with the Grand Canal and other waterways, as well as believing that porcelain was made from coal. In Quanzhou, Ibn Battuta was welcomed by the head of the local Muslim merchants (possibly a fānzhǎng or "Leader of Foreigners" ) and Sheikh al-Islam (Imam), who came to meet him with flags, drums, trumpets, and musicians. Ibn Battuta noted that the Muslim populace lived within a separate portion in the city where they had their own mosques, bazaars, and hospitals. In Quanzhou, he met two prominent Iranians, Burhan al-Din of Kazerun and Sharif al-Din from Tabriz (both of whom were influential figures noted in the Yuan History as "A-mi-li-ding" and "Sai-fu-ding", respectively). While in Quanzhou he ascended the "Mount of the Hermit" and briefly visited a well-known Taoist monk in a cave. He then travelled south along the Chinese coast to Guangzhou, where he lodged for two weeks with one of the city's wealthy merchants. From Guangzhou he went north to Quanzhou and then proceeded to the city of Fuzhou, where he took up residence with Zahir al-Din and met Kawam al-Din and a fellow countryman named Al-Bushri of Ceuta, who had become a wealthy merchant in China. Al-Bushri accompanied Ibn Battuta northwards to Hangzhou and paid for the gifts that Ibn Battuta would present to the Mongolian Emperor Togon-temür of the Yuan Dynasty. Ibn Battuta said that Hangzhou was one of the largest cities he had ever seen, and he noted its charm, describing that the city sat on a beautiful lake surrounded by gentle green hills. He mentions the city's Muslim quarter and resided as a guest with a family of Egyptian origin. During his stay at Hangzhou he was particularly impressed by the large number of well-crafted and well-painted Chinese wooden ships, with coloured sails and silk awnings, assembling in the canals. Later he attended a banquet of the Yuan Mongol administrator of the city named Qurtai, who according to Ibn Battuta, was very fond of the skills of local Chinese conjurers. Ibn Battuta also mentions locals who worship the Solar deity. He described floating through the Grand Canal on a boat watching crop fields, orchids, merchants in black silk, and women in flowered silk and priests also in silk. In Beijing, Ibn Battuta referred to himself as the long-lost ambassador from the Delhi Sultanate and was invited to the Yuan imperial court of Togon-temür (who according to Ibn Battuta was worshipped by some people in China). Ibn Batutta noted that the palace of Khanbaliq was made of wood and that the ruler's "head wife" (Empress Gi) held processions in her honour. Ibn Battuta also wrote he had heard of "the rampart of Yajuj and Majuj" that was "sixty days' travel" from the city of Zeitun (Quanzhou); Hamilton Alexander Rosskeen Gibb notes that Ibn Battuta believed that the Great Wall of China was built by Dhul-Qarnayn to contain Gog and Magog as mentioned in the Quran. However, Ibn Battuta, who asked about the wall in China, could find no one who had either seen it or knew of anyone who had seen it. Ibn Battuta travelled from Beijing to Hangzhou, and then proceeded to Fuzhou. Upon his return to Quanzhou, he soon boarded a Chinese junk owned by the Sultan of Samudera Pasai Sultanate heading for Southeast Asia, whereupon Ibn Battuta was unfairly charged a hefty sum by the crew and lost much of what he had collected during his stay in China. Battuta claimed that the Mongol Khan (Qan) had interred with him in his grave six slave soldiers and four girl slaves. Silver, gold, weapons, and carpets were put into the grave. Return After returning to Quanzhou in 1346, Ibn Battuta began his journey back to Morocco. In Kozhikode, he once again considered throwing himself at the mercy of Muhammad bin Tughluq in Delhi, but thought better of it and decided to carry on to Mecca. On his way to Basra he passed through the Strait of Hormuz, where he learned that Abu Sa'id, last ruler of the Ilkhanate Dynasty had died in Iran. Abu Sa'id's territories had subsequently collapsed due to a fierce civil war between the Iranians and Mongols. In 1348, Ibn Battuta arrived in Damascus with the intention of retracing the route of his first hajj. He then learned that his father had died 15 years earlier and death became the dominant theme for the next year or so. The Black Death had struck and he stopped in Homs as the plague spread through Syria, Palestine, and Arabia. He heard of terrible death tolls in Gaza, but returned to Damascus that July where the death toll had reached 2,400 victims each day. When he stopped in Gaza he found it was depopulated, and in Egypt he stayed at Abu Sir. Reportedly deaths in Cairo had reached levels of 1,100 each day. He made hajj to Mecca then he decided to return to Morocco, nearly a quarter of a century after leaving home. On the way he made one last detour to Sardinia, then in 1349, returned to Tangier by way of Fez, only to discover that his mother had also died a few months before. Itinerary 1349–1354 Spain and North Africa After a few days in Tangier, Ibn Battuta set out for a trip to the Muslim-controlled territory of al-Andalus on the Iberian Peninsula. King Alfonso XI of Castile and León had threatened to attack Gibraltar, so in 1350, Ibn Battuta joined a group of Muslims leaving Tangier with the intention of defending the port. By the time he arrived, the Black Death had killed Alfonso and the threat of invasion had receded, so he turned the trip into a sight-seeing tour, travelling through Valencia and ending up in Granada. After his departure from al-Andalus he decided to travel through Morocco. On his return home, he stopped for a while in Marrakech, which was almost a ghost town following the recent plague and the transfer of the capital to Fez. Mali and Timbuktu In the autumn of 1351, Ibn Battuta left Fez and made his way to the town of Sijilmasa on the northern edge of the Sahara in present-day Morocco. There he bought a number of camels and stayed for four months. He set out again with a caravan in February 1352 and after 25 days arrived at the dry salt lake bed of Taghaza with its salt mines. All of the local buildings were made from slabs of salt by the slaves of the Masufa tribe, who cut the salt in thick slabs for transport by camel. Taghaza was a commercial centre and awash with Malian gold, though Ibn Battuta did not form a favourable impression of the place, recording that it was plagued by flies and the water was brackish. After a ten-day stay in Taghaza, the caravan set out for the oasis of Tasarahla (probably Bir al-Ksaib) where it stopped for three days in preparation for the last and most difficult leg of the journey across the vast desert. From Tasarahla, a Masufa scout was sent ahead to the oasis town of Oualata, where he arranged for water to be transported a distance of four days travel where it would meet the thirsty caravan. Oualata was the southern terminus of the trans-Saharan trade route and had recently become part of the Mali Empire. Altogether, the caravan took two months to cross the of desert from Sijilmasa. From there, Ibn Battuta travelled southwest along a river he believed to be the Nile (it was actually the river Niger), until he reached the capital of the Mali Empire. There he met Mansa Suleyman, king since 1341. Ibn Battuta disapproved of the fact that female slaves, servants, and even the daughters of the sultan went about exposing parts of their bodies not befitting a Muslim. He left the capital in February accompanied by a local Malian merchant and journeyed overland by camel to Timbuktu. Though in the next two centuries it would become the most important city in the region, at that time it was a small city and relatively unimportant. It was during this journey that Ibn Battuta first encountered a hippopotamus. The animals were feared by the local boatmen and hunted with lances to which strong cords were attached. After a short stay in Timbuktu, Ibn Battuta journeyed down the Niger to Gao in a canoe carved from a single tree. At the time Gao was an important commercial center. After spending a month in Gao, Ibn Battuta set off with a large caravan for the oasis of Takedda. On his journey across the desert, he received a message from the Sultan of Morocco commanding him to return home. He set off for Sijilmasa in September 1353, accompanying a large caravan transporting 600 female slaves, and arrived back in Morocco early in 1354. Ibn Battuta's itinerary gives scholars a glimpse as to when Islam first began to spread into the heart of west Africa. Works After returning home from his travels in 1354, and at the suggestion of the Marinid ruler of Morocco, Abu Inan Faris, Ibn Battuta dictated an account in Arabic of his journeys to Ibn Juzayy, a scholar whom he had previously met in Granada. The account is the only source for Ibn Battuta's adventures. The full title of the manuscript may be translated as A Masterpiece to Those Who Contemplate the Wonders of Cities and the Marvels of Travelling (, Tuḥfat an-Nuẓẓār fī Gharāʾib al-Amṣār wa ʿAjāʾib al-Asfār). However, it is often simply referred to as TheTravels (, Rihla), in reference to a standard form of Arabic literature. There is no indication that Ibn Battuta made any notes or had any journal
installed for telephone use worldwide, with well over a billion individual connections installed by the year 2000. Over the first half of the 20th century, the connection of these lines to form calls was increasingly automated, culminating in the crossbar switches that had largely replaced earlier concepts by the 1950s. As telephone use surged in the post-WWII era, the problem of connecting the massive number of lines became an area of significant study. Bell Labs' seminal work on digital encoding of voice led to the use of 64 kbit/s as a standard for voice lines (or 56 kbit/s in some systems). In 1962, Robert Aaron of Bell introduced the T1 system, which allowed a pair of twisted pair lines to carry 1.544 Mbit/s of data over a distance of about one mile. This was used in the Bell network to carry traffic between local switch offices, with 24 voice lines at 64 kbit/s and a separate 8 kbit/s line for signaling commands like connecting or hanging up a call. This could be extended over long distances using repeaters in the lines. T1 used a very simple encoding scheme, alternate mark inversion (AMI), which reached only a few percent of the theoretical capacity of the line but was appropriate for 1960s electronics. By the late 1970s, T1 lines and their faster counterparts, along with all-digital switching systems, had replaced the earlier analog systems for most of the western world, leaving only the customer's equipment and their local end office using analog systems. Digitizing this "last mile" was increasingly seen as the next problem that needed to be solved. However, these connections now represented over 99% of the total telephony network, as the upstream links had increasingly been aggregated into a smaller number of much higher performance systems, especially after the introduction of fiber optic lines. If the system was to become all-digital, a new standard would be needed that was appropriate for the existing customer lines, which might be miles long and of widely varying quality. ISDN standardization Around 1978, Ralph Wyndrum, Barry Bossick and Joe Lechleider of Bell Labs began one such effort to develop a last-mile solution. They studied a number of derivatives of the T1's AMI concept and concluded that a customer-side line could reliably carry about 160 kbit/s of data over a distance of . That would be enough to carry two voice-quality lines at 64 kbit/s as well as a separate 16 kbit/s line for data. At the time, modems were normally 300 bps and 1200 bit/s would not become common until the early 1980s and the 2400 bit/s standard would not be completed until 1984. In this market, 16 kbit/s represented a significant advance in performance in addition to being a separate channel and thus allowing voice and data at the same time. A key problem was that the customer might only have a single twisted pair line to the location of the handset, so the solution used in T1 with separate upstream and downstream connections was not universally available. With analog connections, the solution was to use echo cancellation, but at the much higher bandwidth of the new concept, this would not be so simple. A debate broke out between teams worldwide about the best solution to this problem; some promoted newer versions of echo cancellation, while others preferred the "ping pong" concept where the direction of data would rapidly switch the line from send to receive at such a high rate it would not be noticeable to the user. John Cioffi had recently demonstrated echo cancellation would work at these speeds, and further suggested that they should consider moving directly to 1.5 Mbit/s performance using this concept. The suggestion was literally laughed off the table, but the echo cancellation concept was taken up by Joe Lechleider eventually came to win the debate. Meanwhile, the debate over the encoding scheme itself was also ongoing. As the new standard was to be international, this was even more contentious as several regional digital standards had emerged in the 1960s and 70s and merging these back together was not going to be easy. To further confuse issues, in 1984 the Bell System was broken up and the US center for development moved to the American National Standards Institute (ANSI) T1D1.3 committee. Thomas Starr of the newly formed Ameritech led this effort and eventually convinced the ANSI group to select the 2B1Q standard proposed by Peter Adams of British Telecom. This standard used an 80 kHz base frequency and encoded two bits per baud to produce the 160 kbit/s base rate. Ultimately Japan selected a different standard, and Germany selected one with three levels instead of four, but all of these could interchange with the ANSI standard. Rollout With ISDN allowing digital-quality voice, two separate lines and all-the-time data, the telephony world was convinced there would be high customer demand for such systems in both the home and office. This proved not to be the case. During the lengthy standardization process, new concepts rendered the system largely superfluous. In the office, multi-line digital switches like the Meridian Norstar took over telephone lines while local area networks like Ethernet provided performance around 10 Mbit/s which had become the baseline for inter-computer connections in offices. ISDN offered no real advantages in the voice role and was far from competitive in data. Additionally, modems had continued improving, introducing 9600 bit/s systems in the late 1980s and 14.4 kbit/s in 1991, which significantly eroded ISDN's value proposition for the home customer. Meanwhile, Lechleider had proposed using ISDN's echo cancellation and 2B1Q encoding on existing T1 connections, allowing the distance between repeaters to be doubled to about . Another standards war broke out, but in 1991 Lechleider's 1.6 Mbit/s "High-Speed Digital Subscriber Line" eventually won this process as well, after Starr drove it through the ANSI T1E1.4 group. A similar standard emerged in Europe to replace their E1 lines, increasing the sampling range from 80 to 100 kHz to allow 2.048 Mbit/s. By the mid-1990s, these Primary Rate Interface (PRI) lines had largely replaced T1 and E1 between telephone company offices. ISDN becomes ADSL Lechleider also believed this higher-speed standard would be much more attractive to customers than ISDN had proven. Unfortunately, at these speeds, the systems suffered from a type of crosstalk known as "NEXT", for "near-end crosstalk". This made longer connections on customer lines difficult. Lechleider noted that NEXT only occurred when similar frequencies were being used, and could be diminished if one of the directions used a different carrier rate, but doing so would reduce the potential bandwidth of that channel. Lechleider suggested that most consumer use would be asymmetric anyway, and that providing a high-speed channel towards the user and a lower speed return would be suitable for many uses. This work in the early 1990s eventually led to the ADSL concept, which emerged in 1995. An early supporter of the concept was Alcatel, who jumped on ADSL while many other companies were still devoted to ISDN. Krish Prabu stated that "Alcatel will have to invest one billion dollars in ADSL before it makes a profit, but it is worth it." They introduced the first DSL Access Multiplexers (DSLAM), the large multi-modem systems used at the telephony offices, and later introduced customer ADSL modems under the Thomson brand. Alcatel remained the primary vendor of ADSL systems for well over a decade. ADSL quickly replaced ISDN as the customer-facing solution for last-mile connectivity. ISDN has largely disappeared on the customer side, remaining in use only in niche roles like dedicated teleconferencing systems and similar legacy systems. ISDN elements Integrated services refers to ISDN's ability to deliver at minimum two simultaneous connections, in any combination of data, voice, video, and fax, over a single line. Multiple devices can be attached to the line, and used as needed. That means an ISDN line can take care of what were expected to be most people's complete communications needs (apart from broadband Internet access and entertainment television) at a much higher transmission rate, without forcing the purchase of multiple analog phone lines. It also refers to integrated switching and transmission in that telephone switching and carrier wave transmission are integrated rather than separate as in earlier technology. Basic Rate Interface The entry level interface to ISDN is the Basic Rate Interface (BRI), a 128 kbit/s service delivered over a pair of standard telephone copper wires. The 144 kbit/s overall payload rate is divided into two 64 kbit/s bearer channels ('B' channels) and one 16 kbit/s signaling channel ('D' channel or data channel). This is sometimes referred to as 2B+D. The interface specifies the following network interfaces: The U interface is a two-wire interface between the exchange and a network terminating unit, which is usually the demarcation point in non-North American networks. The T interface is a serial interface between a computing device and a terminal adapter, which is the digital equivalent of a modem. The S interface is a four-wire bus that ISDN consumer devices plug into; the S & T reference points are commonly implemented as a single interface labeled 'S/T' on a Network termination 1 (NT1). The R interface defines the point between a non-ISDN device and a terminal adapter (TA) which provides translation to and from such a device. BRI-ISDN is very popular in Europe but is much less common in North America. It is also common in Japan — where it is known as INS64. Primary Rate Interface The other ISDN access available is the Primary Rate Interface (PRI), which is carried over T-carrier (T1) with 24 time slots (channels) in North America, and over E-carrier (E1) with 32 channels in most other countries. Each channel provides transmission at a 64 kbit/s data rate. With the E1 carrier, the available channels are divided into 30 bearer (B) channels, one data (D) channel, and one timing and alarm channel. This scheme is often referred to as 30B+2D. In North America, PRI service is delivered via T1 carriers with only one data channel, often referred to as 23B+D, and a total data rate of 1544 kbit/s. Non-Facility Associated Signalling (NFAS) allows two or more PRI circuits to be controlled by a single D channel, which is sometimes called 23B+D + n*24B. D-channel backup allows for a second D channel in case the primary fails. NFAS is commonly used on a Digital Signal 3 (DS3/T3). PRI-ISDN is popular throughout the world, especially for connecting private branch exchanges to the public switched telephone network (PSTN). Even though many network professionals use the term ISDN to refer to the lower-bandwidth BRI circuit, in North America BRI is
be needed that was appropriate for the existing customer lines, which might be miles long and of widely varying quality. ISDN standardization Around 1978, Ralph Wyndrum, Barry Bossick and Joe Lechleider of Bell Labs began one such effort to develop a last-mile solution. They studied a number of derivatives of the T1's AMI concept and concluded that a customer-side line could reliably carry about 160 kbit/s of data over a distance of . That would be enough to carry two voice-quality lines at 64 kbit/s as well as a separate 16 kbit/s line for data. At the time, modems were normally 300 bps and 1200 bit/s would not become common until the early 1980s and the 2400 bit/s standard would not be completed until 1984. In this market, 16 kbit/s represented a significant advance in performance in addition to being a separate channel and thus allowing voice and data at the same time. A key problem was that the customer might only have a single twisted pair line to the location of the handset, so the solution used in T1 with separate upstream and downstream connections was not universally available. With analog connections, the solution was to use echo cancellation, but at the much higher bandwidth of the new concept, this would not be so simple. A debate broke out between teams worldwide about the best solution to this problem; some promoted newer versions of echo cancellation, while others preferred the "ping pong" concept where the direction of data would rapidly switch the line from send to receive at such a high rate it would not be noticeable to the user. John Cioffi had recently demonstrated echo cancellation would work at these speeds, and further suggested that they should consider moving directly to 1.5 Mbit/s performance using this concept. The suggestion was literally laughed off the table, but the echo cancellation concept was taken up by Joe Lechleider eventually came to win the debate. Meanwhile, the debate over the encoding scheme itself was also ongoing. As the new standard was to be international, this was even more contentious as several regional digital standards had emerged in the 1960s and 70s and merging these back together was not going to be easy. To further confuse issues, in 1984 the Bell System was broken up and the US center for development moved to the American National Standards Institute (ANSI) T1D1.3 committee. Thomas Starr of the newly formed Ameritech led this effort and eventually convinced the ANSI group to select the 2B1Q standard proposed by Peter Adams of British Telecom. This standard used an 80 kHz base frequency and encoded two bits per baud to produce the 160 kbit/s base rate. Ultimately Japan selected a different standard, and Germany selected one with three levels instead of four, but all of these could interchange with the ANSI standard. Rollout With ISDN allowing digital-quality voice, two separate lines and all-the-time data, the telephony world was convinced there would be high customer demand for such systems in both the home and office. This proved not to be the case. During the lengthy standardization process, new concepts rendered the system largely superfluous. In the office, multi-line digital switches like the Meridian Norstar took over telephone lines while local area networks like Ethernet provided performance around 10 Mbit/s which had become the baseline for inter-computer connections in offices. ISDN offered no real advantages in the voice role and was far from competitive in data. Additionally, modems had continued improving, introducing 9600 bit/s systems in the late 1980s and 14.4 kbit/s in 1991, which significantly eroded ISDN's value proposition for the home customer. Meanwhile, Lechleider had proposed using ISDN's echo cancellation and 2B1Q encoding on existing T1 connections, allowing the distance between repeaters to be doubled to about . Another standards war broke out, but in 1991 Lechleider's 1.6 Mbit/s "High-Speed Digital Subscriber Line" eventually won this process as well, after Starr drove it through the ANSI T1E1.4 group. A similar standard emerged in Europe to replace their E1 lines, increasing the sampling range from 80 to 100 kHz to allow 2.048 Mbit/s. By the mid-1990s, these Primary Rate Interface (PRI) lines had largely replaced T1 and E1 between telephone company offices. ISDN becomes ADSL Lechleider also believed this higher-speed standard would be much more attractive to customers than ISDN had proven. Unfortunately, at these speeds, the systems suffered from a type of crosstalk known as "NEXT", for "near-end crosstalk". This made longer connections on customer lines difficult. Lechleider noted that NEXT only occurred when similar frequencies were being used, and could be diminished if one of the directions used a different carrier rate, but doing so would reduce the potential bandwidth of that channel. Lechleider suggested that most consumer use would be asymmetric anyway, and that providing a high-speed channel towards the user and a lower speed return would be suitable for many uses. This work in the early 1990s eventually led to the ADSL concept, which emerged in 1995. An early supporter of the concept was Alcatel, who jumped on ADSL while many other companies were still devoted to ISDN. Krish Prabu stated that "Alcatel will have to invest one billion dollars in ADSL before it makes a profit, but it is worth it." They introduced the first DSL Access Multiplexers (DSLAM), the large multi-modem systems used at the telephony offices, and later introduced customer ADSL modems under the Thomson brand. Alcatel remained the primary vendor of ADSL systems for well over a decade. ADSL quickly replaced ISDN as the customer-facing solution for last-mile connectivity. ISDN has largely disappeared on the customer side, remaining in use only in niche roles like dedicated teleconferencing systems and similar legacy systems. ISDN elements Integrated services refers to ISDN's ability to deliver at minimum two simultaneous connections, in any combination of data, voice, video, and fax, over a single line. Multiple devices can be attached to the line, and used as needed. That means an ISDN line can take care of what were expected to be most people's complete communications needs (apart from broadband Internet access and entertainment television) at a much higher transmission rate, without forcing the purchase of multiple analog phone lines. It also refers to integrated switching and transmission in that telephone switching and carrier wave transmission are integrated rather than separate as in earlier technology. Basic Rate Interface The entry level interface to ISDN is the Basic Rate Interface (BRI), a 128 kbit/s service delivered over a pair of standard telephone copper wires. The 144 kbit/s overall payload rate is divided into two 64 kbit/s bearer channels ('B' channels) and one 16 kbit/s signaling channel ('D' channel or data channel). This is sometimes referred to as 2B+D. The interface specifies the following network interfaces: The U interface is a two-wire interface between the exchange and a network terminating unit, which is usually the demarcation point in non-North American networks. The T interface is a serial interface between a computing device and a terminal adapter, which is the digital equivalent of a modem. The S interface is a four-wire bus that ISDN consumer devices plug into; the S & T reference points are commonly implemented as a single interface labeled 'S/T' on a Network termination 1 (NT1). The R interface defines the point between a non-ISDN device and a terminal adapter (TA) which provides translation to and from such a device. BRI-ISDN is very popular in Europe but is much less common in North America. It is also common in Japan — where it is known as INS64. Primary Rate Interface The other ISDN access available is the Primary Rate Interface (PRI), which is carried over T-carrier (T1) with 24 time slots (channels) in North America, and over E-carrier (E1) with 32 channels in most other countries. Each channel provides transmission at a 64 kbit/s data rate. With the E1 carrier, the available channels are divided into 30 bearer (B) channels, one data (D) channel, and one timing and alarm channel. This scheme is often referred to as 30B+2D. In North America, PRI service is delivered via T1 carriers with only one data channel, often referred to as 23B+D, and a total data rate of 1544 kbit/s. Non-Facility Associated Signalling (NFAS) allows two or more PRI circuits to be controlled by a single D channel, which is sometimes called 23B+D + n*24B. D-channel backup allows for a second D channel in case the primary fails. NFAS is commonly used on a Digital Signal 3 (DS3/T3). PRI-ISDN is popular throughout the world, especially for connecting private branch exchanges to the public switched telephone network (PSTN). Even though many network professionals use the term ISDN to refer to the lower-bandwidth BRI circuit, in North America BRI is relatively uncommon whilst PRI circuits serving PBXs are commonplace. Bearer channel The bearer channel (B) is a standard 64 kbit/s voice channel of 8 bits sampled at 8 kHz with G.711 encoding. B-channels can also be used to carry data, since they are nothing more than digital channels. Each one of these channels is known as a DS0. Most B channels can carry a 64kbit/s signal, but some were limited to 56K because they traveled over RBS lines. This was commonplace in the 20th century, but has since become less so. X.25 X.25 can be carried over the B or D channels of a BRI line, and over the B channels of a PRI line. X.25 over the D channel is used at many point-of-sale (credit card) terminals because it eliminates the modem setup, and because it connects to the central system over a B channel, thereby eliminating the need for modems and making much better use of the central system's telephone lines. X.25 was also part of an ISDN protocol called "Always On/Dynamic ISDN", or AO/DI. This allowed a user to have a constant multi-link PPP connection to the internet over X.25 on the D channel, and brought up one or two B channels as needed. Frame Relay In theory, Frame Relay can operate over the D channel of BRIs and PRIs, but it is seldom, if ever, used. Consumer and industry perspectives There is a second viewpoint: that of the telephone industry, where ISDN is a core technology. A telephone network can be thought of as a collection of wires strung between switching systems. The common electrical specification for the signals on these wires is T1 or E1. Between telephone company switches, the signaling is performed via SS7. Normally, a PBX is connected via a T1 with robbed bit signaling to indicate on-hook or off-hook conditions and MF and DTMF tones to encode the destination number. ISDN is much better because messages can be sent much more quickly than by trying to encode numbers as long (100 ms per digit) tone sequences. This results in faster call setup times. Also, a greater number of features are available and fraud is reduced. In common use, ISDN is often limited to usage to Q.931 and related protocols, which are a set of signaling protocols establishing and breaking circuit-switched connections, and for advanced calling features for the user. Another usage was the deployment of videoconference systems, where a direct end-to-end connection is desirable. ISDN uses the H.320 standard for audio coding and video coding, ISDN is also used as a smart-network technology intended to add new services to the public switched telephone network (PSTN) by giving users direct access to end-to-end circuit-switched digital services and as a backup or failsafe circuit solution for critical use data circuits. Video conferencing One of ISDNs successful use-cases was in the videoconference field, where even small improvements in data rates are useful, but more importantly, its direct end-to-end connection offers lower latency and better reliability than packet-switched networks of the 1990s. The H.320 standard for audio coding and video coding was designed with ISDN in mind, and more specifically its 64 kbit/s basic data rate. including audio codecs such as G.711 (PCM) and G.728 (CELP), and discrete cosine transform (DCT) video codecs such as H.261 and H.263. ISDN and broadcast industry ISDN is used heavily by the broadcast industry as a reliable way of switching low-latency, high-quality, long-distance audio circuits. In conjunction with an appropriate codec using MPEG or various manufacturers' proprietary algorithms, an ISDN BRI can be used to send stereo bi-directional audio coded at 128 kbit/s with 20 Hz – 20 kHz audio bandwidth, although commonly the G.722 algorithm is used with a single 64 kbit/s B channel to send much lower latency mono audio at the expense of audio quality. Where very high quality audio is required multiple ISDN BRIs can be used in parallel to provide a higher bandwidth circuit switched connection. BBC Radio 3 commonly makes use of three ISDN BRIs to carry 320 kbit/s audio stream for live outside broadcasts. ISDN BRI services are used to link remote studios, sports grounds and outside broadcasts into the main broadcast studio. ISDN via satellite is used by field reporters around the world. It is also common to use ISDN for the return audio links to remote satellite broadcast vehicles. In many countries, such as the UK and Australia, ISDN has displaced the older technology of equalised analogue landlines, with these circuits being phased out by telecommunications providers. Use of IP-based streaming codecs such as Comrex ACCESS and ipDTL is becoming more widespread in the broadcast sector, using broadband internet to connect remote studios. Global usage United States and Canada ISDN-BRI never gained popularity as a general use telephone access technology in Canada and the US, and remains a niche product. The service was seen as "a solution in search of a problem", and the extensive array of options and features were difficult for customers to understand and use. ISDN has long been known by derogatory backronyms highlighting these issues, such as "It Still Does Nothing", "Innovations Subscribers Don't Need", and "I Still Don't kNow", or, from the supposed standpoint of telephone companies, I Smell Dollars Now. Once the term "broadband Internet access" came to be associated with
translocations. Nucleus transplantation experiments in mouse zygotes in the early 1980s confirmed that normal development requires the contribution of both the maternal and paternal genomes. The vast majority of mouse embryos derived from parthenogenesis (called parthenogenones, with two maternal or egg genomes) and androgenesis (called androgenones, with two paternal or sperm genomes) die at or before the blastocyst/implantation stage. In the rare instances that they develop to postimplantation stages, gynogenetic embryos show better embryonic development relative to placental development, while for androgenones, the reverse is true. Nevertheless, for the latter, only a few have been described (in a 1984 paper). No naturally occurring cases of parthenogenesis exist in mammals because of imprinted genes. However, in 2004, experimental manipulation by Japanese researchers of a paternal methylation imprint controlling the Igf2 gene led to the birth of a mouse (named Kaguya) with two maternal sets of chromosomes, though it is not a true parthenogenone since cells from two different female mice were used. The researchers were able to succeed by using one egg from an immature parent, thus reducing maternal imprinting, and modifying it to express the gene Igf2, which is normally only expressed by the paternal copy of the gene. Parthenogenetic/gynogenetic embryos have twice the normal expression level of maternally derived genes, and lack expression of paternally expressed genes, while the reverse is true for androgenetic embryos. It is now known that there are at least 80 imprinted genes in humans and mice, many of which are involved in embryonic and placental growth and development. Hybrid offspring of two species may exhibit unusual growth due to the novel combination of imprinted genes. Various methods have been used to identify imprinted genes. In swine, Bischoff et al. compared transcriptional profiles using DNA microarrays to survey differentially expressed genes between parthenotes (2 maternal genomes) and control fetuses (1 maternal, 1 paternal genome). An intriguing study surveying the transcriptome of murine brain tissues revealed over 1300 imprinted gene loci (approximately 10-fold more than previously reported) by RNA-sequencing from F1 hybrids resulting from reciprocal crosses. The result however has been challenged by others who claimed that this is an overestimation by an order of magnitude due to flawed statistical analysis. In domesticated livestock, single-nucleotide polymorphisms in imprinted genes influencing foetal growth and development have been shown to be associated with economically important production traits in cattle, sheep and pigs. Genetic mapping of imprinted genes At the same time as the generation of the gynogenetic and androgenetic embryos discussed above, mouse embryos were also being generated that contained only small regions that were derived from either a paternal or maternal source. The generation of a series of such uniparental disomies, which together span the entire genome, allowed the creation of an imprinting map. Those regions which when inherited from a single parent result in a discernible phenotype contain imprinted gene(s). Further research showed that within these regions there were often numerous imprinted genes. Around 80% of imprinted genes are found in clusters such as these, called imprinted domains, suggesting a level of co-ordinated control. More recently, genome-wide screens to identify imprinted genes have used differential expression of mRNAs from control fetuses and parthenogenetic or androgenetic fetuses hybridized to gene expression profiling microarrays, allele-specific gene expression using SNP genotyping microarrays, transcriptome sequencing, and in silico prediction pipelines. Imprinting mechanisms Imprinting is a dynamic process. It must be possible to erase and re-establish imprints through each generation so that genes that are imprinted in an adult may still be expressed in that adult's offspring. (For example, the maternal genes that control insulin production will be imprinted in a male but will be expressed in any of the male's offspring that inherit these genes.) The nature of imprinting must therefore be epigenetic rather than DNA sequence dependent. In germline cells the imprint is erased and then re-established according to the sex of the individual, i.e. in the developing sperm (during spermatogenesis), a paternal imprint is established, whereas in developing oocytes (oogenesis), a maternal imprint is established. This process of erasure and reprogramming is necessary such that the germ cell imprinting status is relevant to the sex of the individual. In both plants and mammals there are two major mechanisms that are involved in establishing the imprint; these are DNA methylation and histone modifications. Recently, a new study has suggested a novel inheritable imprinting mechanism in humans that would be specific of placental tissue and that is independent of DNA methylation (the main and classical mechanism for genomic imprinting). This was observed in humans, but not in mice, suggesting development after the evolutionary divergence of humans and mice, ~80 Mya. Among the hypothetical explanations for this novel phenomenon, two possible mechanisms have been proposed: either a histone modification that confers imprinting at novel placental-specific imprinted loci or, alternatively, a recruitment of DNMTs to these loci by a specific and unknown transcription factor that would be expressed during early trophoblast differentiation. Regulation The grouping of imprinted genes within clusters allows them to share common regulatory elements, such as non-coding RNAs and differentially methylated regions (DMRs). When these regulatory elements control the imprinting of one or more genes, they are known as imprinting control regions (ICR). The expression of non-coding RNAs, such as antisense Igf2r RNA (Air) on mouse chromosome 17 and KCNQ1OT1 on human chromosome 11p15.5, have been shown to be essential for the imprinting of genes in their corresponding regions. Differentially methylated regions are generally segments of DNA rich in cytosine and guanine nucleotides, with the cytosine nucleotides methylated on one copy but not on the other. Contrary to expectation, methylation does not necessarily mean silencing; instead, the effect of methylation depends upon the default state of the region. Functions of imprinted genes The control of expression of specific genes by genomic imprinting is unique to therian mammals (placental mammals and marsupials) and flowering plants. Imprinting of whole chromosomes has been reported in mealybugs (Genus: Pseudococcus) and a fungus gnat (Sciara). It has also been established that X-chromosome inactivation occurs in an imprinted manner in the extra-embryonic tissues of mice and all tissues in marsupials, where it is always the paternal X-chromosome which is silenced. The majority of imprinted genes in mammals have been found to have roles in the control of embryonic growth and development, including development of the placenta. Other imprinted genes are involved in post-natal development, with roles affecting suckling and metabolism. Hypotheses on the origins of imprinting A widely accepted hypothesis for the evolution of genomic imprinting is the "parental conflict hypothesis". Also known as the kinship theory of genomic imprinting, this hypothesis states that the inequality between parental genomes due to imprinting is a result of the differing interests of each parent in terms of the evolutionary fitness of their genes. The father's genes that encode for imprinting gain greater fitness through the success of the offspring, at the expense of the mother. The mother's evolutionary imperative is often to conserve resources for her own survival while providing sufficient nourishment to current and subsequent litters. Accordingly, paternally expressed genes tend to be growth-promoting whereas maternally expressed genes tend to be growth-limiting. In support of this hypothesis, genomic imprinting has been found in all placental mammals, where post-fertilisation offspring resource consumption at the expense of the mother is high; although it has also been found in oviparous birds where there is relatively little post-fertilisation resource transfer and therefore less parental conflict. A small number of imprinted genes are fast evolving under positive Darwinian selection possibly due to antagonistic co-evolution. The majority of imprinted genes display high levels of micro-synteny conservation and have undergone very few duplications in placental mammalian lineages. However, our understanding of the molecular mechanisms behind genomic imprinting show that it is the maternal genome that controls much of the imprinting of both its own and the paternally-derived genes in the zygote, making it difficult to explain why the maternal genes would willingly relinquish their dominance to that of the paternally-derived genes in light of the conflict hypothesis. Another hypothesis proposed is that some imprinted genes act coadaptively to improve both fetal development and maternal provisioning for nutrition and care. In it, a subset of paternally expressed genes are co-expressed in both the placenta and the mother's hypothalamus. This would come about through selective pressure from parent-infant coadaptation to improve infant survival. Paternally expressed 3 (PEG3) is a gene
have been described (in a 1984 paper). No naturally occurring cases of parthenogenesis exist in mammals because of imprinted genes. However, in 2004, experimental manipulation by Japanese researchers of a paternal methylation imprint controlling the Igf2 gene led to the birth of a mouse (named Kaguya) with two maternal sets of chromosomes, though it is not a true parthenogenone since cells from two different female mice were used. The researchers were able to succeed by using one egg from an immature parent, thus reducing maternal imprinting, and modifying it to express the gene Igf2, which is normally only expressed by the paternal copy of the gene. Parthenogenetic/gynogenetic embryos have twice the normal expression level of maternally derived genes, and lack expression of paternally expressed genes, while the reverse is true for androgenetic embryos. It is now known that there are at least 80 imprinted genes in humans and mice, many of which are involved in embryonic and placental growth and development. Hybrid offspring of two species may exhibit unusual growth due to the novel combination of imprinted genes. Various methods have been used to identify imprinted genes. In swine, Bischoff et al. compared transcriptional profiles using DNA microarrays to survey differentially expressed genes between parthenotes (2 maternal genomes) and control fetuses (1 maternal, 1 paternal genome). An intriguing study surveying the transcriptome of murine brain tissues revealed over 1300 imprinted gene loci (approximately 10-fold more than previously reported) by RNA-sequencing from F1 hybrids resulting from reciprocal crosses. The result however has been challenged by others who claimed that this is an overestimation by an order of magnitude due to flawed statistical analysis. In domesticated livestock, single-nucleotide polymorphisms in imprinted genes influencing foetal growth and development have been shown to be associated with economically important production traits in cattle, sheep and pigs. Genetic mapping of imprinted genes At the same time as the generation of the gynogenetic and androgenetic embryos discussed above, mouse embryos were also being generated that contained only small regions that were derived from either a paternal or maternal source. The generation of a series of such uniparental disomies, which together span the entire genome, allowed the creation of an imprinting map. Those regions which when inherited from a single parent result in a discernible phenotype contain imprinted gene(s). Further research showed that within these regions there were often numerous imprinted genes. Around 80% of imprinted genes are found in clusters such as these, called imprinted domains, suggesting a level of co-ordinated control. More recently, genome-wide screens to identify imprinted genes have used differential expression of mRNAs from control fetuses and parthenogenetic or androgenetic fetuses hybridized to gene expression profiling microarrays, allele-specific gene expression using SNP genotyping microarrays, transcriptome sequencing, and in silico prediction pipelines. Imprinting mechanisms Imprinting is a dynamic process. It must be possible to erase and re-establish imprints through each generation so that genes that are imprinted in an adult may still be expressed in that adult's offspring. (For example, the maternal genes that control insulin production will be imprinted in a male but will be expressed in any of the male's offspring that inherit these genes.) The nature of imprinting must therefore be epigenetic rather than DNA sequence dependent. In germline cells the imprint is erased and then re-established according to the sex of the individual, i.e. in the developing sperm (during spermatogenesis), a paternal imprint is established, whereas in developing oocytes (oogenesis), a maternal imprint is established. This process of erasure and reprogramming is necessary such that the germ cell imprinting status is relevant to the sex of the individual. In both plants and mammals there are two major mechanisms that are involved in establishing the imprint; these are DNA methylation and histone modifications. Recently, a new study has suggested a novel inheritable imprinting mechanism in humans that would be specific of placental tissue and that is independent of DNA methylation (the main and classical mechanism for genomic imprinting). This was observed in humans, but not in mice, suggesting development after the evolutionary divergence of humans and mice, ~80 Mya. Among the hypothetical explanations for this novel phenomenon, two possible mechanisms have been proposed: either a histone modification that confers imprinting at novel placental-specific imprinted loci or, alternatively, a recruitment of DNMTs to these loci by a specific and unknown transcription factor that would be expressed during early trophoblast differentiation. Regulation The grouping of imprinted genes within clusters allows them to share common regulatory elements, such as non-coding RNAs and differentially methylated regions (DMRs). When these regulatory elements control the imprinting of one or more genes, they are known as imprinting control regions (ICR). The expression of non-coding RNAs, such as antisense Igf2r RNA (Air) on mouse chromosome 17 and KCNQ1OT1 on human chromosome 11p15.5, have been shown to be essential for the imprinting of genes in their corresponding regions. Differentially methylated regions are generally segments of DNA rich in cytosine and guanine nucleotides, with the cytosine nucleotides methylated on one copy but not on the other. Contrary to expectation,
five regional Internet registries, the organizations that manage IP addresses in different regions. These registries began assigning the final IPv4 addresses within their regions until they ran out completely. On June 20, 2011, the ICANN board voted to end most restrictions on the names of generic top-level domains (gTLD). Companies and organizations became able to choose essentially arbitrary top-level Internet domain names. The use of non-Latin characters (such as Cyrillic, Arabic, Chinese, etc.) is also allowed in gTLDs. ICANN began accepting applications for new gTLDS on January 12, 2012. The initial price to apply for a new gTLD was set at $185,000 and the annual renewal fee is $25,000. Following the 2013 NSA spying scandal, ICANN endorsed the Montevideo Statement, although no direct connection between these could be proven. On October 1, 2016, ICANN ended its contract with the United States Department of Commerce National Telecommunications and Information Administration (NTIA) and entered the private sector. The European Union's General Data Protection Regulation (active since May 25, 2018) impacted on ICANN operations, which the latter tried to fix through last-minute changes. The deadline coincided with French President Macron's hosting of technology businesspeople such as Facebook CEO Mark Zuckerberg, Microsoft CEO Satya Nadella, Uber CEO Dara Khosrowshahi, IBM CEO Ginni Rometty, Intel CEO Brian Krzanich, Samsung President Young Sohn, and SAP CEO Bill McDermott. Structure From its founding to the present, ICANN has been formally organized as a nonprofit corporation "for charitable and public purposes" under the California Nonprofit Public Benefit Corporation Law. It is managed by a 16-member board of directors composed of eight members selected by a nominating committee on which all the constituencies of ICANN are represented; six representatives of its Supporting Organizations, sub-groups that deal with specific sections of the policies under ICANN's purview; an at-large seat filled by an at-large organization; and the President / CEO, appointed by the board. There are currently three supporting organizations: the Generic Names Supporting Organization (GNSO) deals with policy making on generic top-level domains (gTLDs); the Country Code Names Supporting Organization (ccNSO) deals with policy making on country-code top-level domains (ccTLDs); the Address Supporting Organization (ASO) deals with policy making on IP addresses. ICANN also relies on some advisory committees and other advisory mechanisms to receive advice on the interests and needs of stakeholders that do not directly participate in the Supporting Organizations. These include the Governmental Advisory Committee (GAC), which is composed of representatives of a large number of national governments from all over the world; the At-Large Advisory Committee (ALAC), which is composed of individual Internet users from around the world selected by each of the Regional At-Large Organizations (RALO) and Nominating Committee; the Root Server System Advisory Committee, which provides advice on the operation of the DNS root server system; the Security and Stability Advisory Committee (SSAC), which is composed of Internet experts who study security issues pertaining to ICANN's mandate; and the Technical Liaison Group (TLG), which is composed of representatives of other international technical organizations that focus, at least in part, on the Internet. Governmental Advisory Committee Representatives The Governmental Advisory Committee has representatives from 179 states and 38 Observer organizations, including the Holy See, Cook Islands, Niue, Taiwan, Hong Kong, Bermuda, Montserrat, the European Commission and the African Union Commission. Observers In addition the following organizations are GAC Observers: African Telecommunications Union Asia-Pacific Telecommunity Caribbean Telecommunications Union (CTU) Commonwealth Telecommunications Organisation (CTO) Council of Europe Economic Commission for Africa (ECA) European Broadcasting Union European Organization for Nuclear Research (CERN) European Space Agency International Labour Office International Telecommunication Union (ITU) International Criminal Police Organization (INTERPOL) International Red Cross and Red Crescent Movement Latin American Association of Telecom Regulatory Agencies (REGULATEL) League of Arab States New Partnership for Africa's Development (NEPAD) Organisation for Economic Co-operation and Development The Organization for Islamic Cooperation Organization of American States Organisation internationale de la Francophonie (OIF) Pacific Islands Forum Secretariat of the Pacific Community (SPC) Inter-American Telecommunication Commission (CITEL) International Criminal Court United Nations Educational Scientific and Cultural Organization (UNESCO) Universal Postal Union World Bank World Health Organization (WHO) World Intellectual Property Organization (WIPO) World Meteorological Organization World Trade Organization Trusted Community Representatives As the operator of the IANA domain name functions, ICANN is responsible for the DNSSEC management of the root zone. While day to day operations are managed by ICANN and Verisign, the trust is rooted in a group of Trusted Community Representatives. The members of this group must not be affiliated with ICANN, but are instead members of the broader DNS community, volunteering to become a Trusted Community Representative. The role of the representatives are primarily to take part in regular key ceremonies at a physical location, organized by ICANN, and to safeguard the key materials in between. Democratic input In the Memorandum of understanding that set up the relationship between ICANN and the U.S. government, ICANN was given a mandate requiring that it operate "in a bottom up, consensus driven, democratic manner." However, the attempts that ICANN have made to establish an organizational structure that would allow wide input from the global Internet community did not produce results amenable to the current Board. As a result, the At-Large constituency and direct election of board members by the global Internet community were soon abandoned. ICANN holds periodic public meetings rotated between continents for the purpose of encouraging global participation in its processes. Resolutions of the ICANN Board, preliminary reports, and minutes of the meetings, are published on the ICANN website, sometimes in real time. However, there are criticisms from ICANN constituencies including the Noncommercial Users Constituency (NCUC) and the At-Large Advisory Committee (ALAC) that there is not enough public disclosure and that too many discussions and decisions take place out of sight of the public. During the early 2000s, there had been speculation that the United Nations might assume control of ICANN, followed by a negative reaction from the U.S. government and worries about a division of the Internet. The World Summit on the Information Society in Tunisia during November 2005 agreed not to get involved in the day-to-day and technical operations of ICANN. However it also agreed to establish an international Internet Governance Forum, with a consultative role on the future governance of the Internet. ICANN's Government Advisory Committee is currently established to provide advice to ICANN regarding public policy issues and has participation by many of the world's governments. Some have attempted to argue that ICANN was never given the authority to decide policy, e.g., choose new TLDs or exclude other interested parties who refuse to pay ICANN's US$185,000 fee, but was to be a technical caretaker. Critics suggest that ICANN should not be allowed to impose business rules on market participants, and that all TLDs should be added on a first-come, first-served basis and the market should be the arbiter of who succeeds and who does not. Activities Uniform Domain-Name Dispute Resolution Policy (UDRP) One task that ICANN was asked to do was to address the issue of domain name ownership resolution for generic top-level domains (gTLDs). ICANN's attempt at such a policy was drafted in close cooperation with the World Intellectual Property Organization (WIPO), and the result has now become known as the Uniform Dispute Resolution Policy (UDRP). This policy essentially attempts to provide a mechanism for rapid, cheap and reasonable resolution of domain name conflicts, avoiding the traditional court system for disputes by allowing cases to be brought to one of a set of bodies that arbitrate domain name disputes. According to ICANN policy, domain registrants must agree to be bound by the UDRP—they cannot get a domain name without agreeing to this. Examination of the UDRP decision patterns has caused some to conclude that compulsory domain name arbitration is less likely to give a fair hearing to domain name owners asserting defenses under the First Amendment and other laws, compared to the federal courts of appeal in particular. Proposed elimination of public DNS whois In 2013, the initial report of ICANN's Expert Working Group has recommended that the present form of Whois, a utility that allows anyone to know who has registered a domain name on the Internet, should be "abandoned". It recommends it be replaced with a system that keeps most registration information secret (or "gated") from most Internet users, and only discloses information for "permissible purposes". ICANN's list of permissible purposes includes domain name research, domain name sale and purchase, regulatory enforcement, personal data protection, legal actions, and abuse mitigation. Whois has been a key tool of investigative journalists interested in determining who was disseminating information on the Internet. The use of whois by journalists is not included in the list of permissible purposes in the initial report. Criticism Since its creation, ICANN has been the subject of criticism and controversy. In 2000, professor Michael Froomkin of the University of Miami School of Law argued that ICANN's relationship with the U.S. Department of Commerce is illegal, in violation of either the Constitution or federal statutes. In 2009, the new Affirmation of Commitments agreement between ICANN and the U.S. Department of Commerce, that aimed to create international oversight, ran into criticism. The governance of the Internet by the United States government has been suggested by some scholars as being an example of colonialism and imperialism, and proposals have been made to internationalize ICANN's monitoring responsibilities (currently the responsibility of the US), to transform it into an international organization (under international law), and to "establish an intergovernmental mechanism enabling governments, on an equal footing, to carry out their role and responsibilities in international public policy issues pertaining to the Internet". During December 2011, the Federal Trade Commission stated ICANN had long failed to provide safeguards that protect consumers from online swindlers. TLD expansion Also during 2011, seventy-nine companies, including The Coca-Cola Company, Hewlett-Packard, Samsung and others, signed a petition against ICANN's new TLD program (sometimes referred to as a "commercial landgrab"), in a group organized by the Association of National Advertisers. As of September 2014, this group, the Coalition for Responsible Internet Domain Oversight, that opposes the rollout of ICANN's TLD expansion program, has been joined by 102 associations and 79 major companies. Partly as a response to this criticism, ICANN initiated an effort to protect trademarks in domain name registrations, which eventually culminated in the establishment of the Trademark Clearinghouse. IBSA proposal (2011) One controversial proposal, resulting from a September 2011 summit between India, Brazil, and South Africa (IBSA), would seek to move Internet governance into a "UN Committee on Internet-Related Policy" (UN-CIRP). The action was a reaction to a perception that the principles of the 2005 Tunis Agenda for the Information Society have not been met. The statement proposed the creation of a new political organization operating as a component of the United Nations to provide policy recommendations for the consideration of technical organizations such as ICANN and international bodies such as the ITU. Subsequent to public criticisms, the Indian government backed away from the proposal. Montevideo Statement on the Future of Internet Cooperation (2013) On October 7, 2013 the Montevideo Statement on the Future of Internet Cooperation was released by the managers of a number of organizations involved in coordinating the Internet's global technical infrastructure, loosely known as the "I*" (or "I-star") group. Among other things, the statement "expressed strong concern over the undermining of the trust and confidence of Internet users globally due to recent revelations of pervasive monitoring and surveillance" and "called for accelerating the globalization of ICANN and IANA functions, towards an environment in which all stakeholders, including all governments, participate on an equal footing". This desire to reduce United States association with the internet is considered a reaction to the ongoing NSA surveillance scandal. The statement was signed by the managers of the Internet Corporation for Assigned Names and Numbers (ICANN), the Internet Engineering Task Force, the Internet Architecture Board, the World Wide Web Consortium, the Internet Society, and the five regional Internet address registries (African Network Information Center, American Registry for Internet Numbers, Asia-Pacific Network Information Centre, Latin America and Caribbean Internet Addresses Registry, and Réseaux IP Européens Network Coordination Centre). Global Multistakeholder Meeting on the Future of Internet Governance (2013) During October 2013, Fadi Chehadé, former President and CEO of ICANN, met with Brazilian President Dilma Rousseff in Brasilia. Upon Chehadé's invitation, the two announced that Brazil would host an international summit on Internet governance during April 2014. The announcement came after the 2013 disclosures of mass surveillance by the U.S. government, and President Rousseff's speech at the opening session of the 2013 United Nations General Assembly, where
agreement with the DOC (known as the "Affirmation of Commitments") that confirmed ICANN's commitment to a multistakeholder governance model, but did not remove it from DOC oversight and control. On March 10, 2016, ICANN and the DOC signed a historic, culminating agreement to finally remove ICANN and IANA from the control and oversight of the DOC. On October 1, 2016, ICANN was freed from U.S. government oversight. Notable events On March 18, 2002, publicly elected At-Large Representative for North America board member Karl Auerbach sued ICANN in Superior Court in California to gain access to ICANN's accounting records without restriction. Auerbach won. During September and October 2003, ICANN played a crucial role in the conflict over VeriSign's "wild card" DNS service Site Finder. After an open letter from ICANN issuing an ultimatum to VeriSign, later endorsed by the Internet Architecture Board, the company voluntarily ended the service on October 4, 2003. After this action, VeriSign filed a lawsuit against ICANN on February 27, 2004, claiming that ICANN had exceeded its authority. By this lawsuit, VeriSign sought to reduce ambiguity about ICANN's authority. The antitrust component of VeriSign's claim was dismissed during August 2004. VeriSign's challenge that ICANN overstepped its contractual rights is currently outstanding. A proposed settlement already approved by ICANN's board would resolve VeriSign's challenge to ICANN in exchange for the right to increase pricing on .com domains. At the meeting of ICANN in Rome, which took place from March 2 to 6, 2004, ICANN agreed to ask approval of the U.S. Department of Commerce for the Waiting List Service of VeriSign. On May 17, 2004, ICANN published a proposed budget for the year 2004–05. It included proposals to increase the openness and professionalism of its operations, and greatly increased its proposed spending from US$8.27 million to $15.83 million. The increase was to be funded by the introduction of new top-level domains, charges to domain registries, and a fee for some domain name registrations, renewals and transfers (initially USD 0.20 for all domains within a country-code top-level domain, and USD 0.25 for all others). The Council of European National Top Level Domain Registries (CENTR), which represents the Internet registries of 39 countries, rejected the increase, accusing ICANN of a lack of financial prudence and criticizing what it describes as ICANN's "unrealistic political and operational targets". Despite the criticism, the registry agreement for the top-level domains and includes a US$2 fee on every domain the licensed companies sell or renew. After a second round of negotiations during 2004, the TLDs , , , , , and were introduced during 2005. On February 28, 2006, ICANN's board approved a settlement with VeriSign in the lawsuit resulting from SiteFinder that involved allowing VeriSign (the registry) to raise its registration fees by up to 7% a year. This was criticised by a few members of the U.S. House of Representatives' Small Business Committee. During February 2007, ICANN began procedures to end accreditation of one of their registrars, RegisterFly amid charges and lawsuits involving fraud, and criticism of ICANN's management of the situation. ICANN has been the subject of criticism as a result of its handling of RegisterFly, and the harm caused to thousands of clients as a result of what has been termed ICANN's "laissez faire attitude toward customer allegations of fraud". On May 23, 2008, ICANN issued enforcement notices against ten accredited registrars and announced this through a press release entitled "'Worst Spam Offenders' Notified by ICANN, Compliance system working to correct Whois and other issues." This was largely in response to a report issued by KnujOn, called "The 10 Worst Registrars" in terms of spam advertised junk product sites and compliance failure. The mention of the word "spam" in the title of the ICANN memo is somewhat misleading since ICANN does not address issues of spam or email abuse. Website content and usage are not within ICANN's mandate. However, the KnujOn report details how various registrars have not complied with their contractual obligations under the Registrar Accreditation Agreement (RAA). The main point of the KnujOn research was to demonstrate the relationships between compliance failure, illicit product traffic, and spam. The report demonstrated that out of 900 ICANN accredited registrars, fewer than 20 held 90% of the web domains advertised in spam. These same registrars were also most frequently cited by KnujOn as failing to resolve complaints made through the Whois Data Problem Reporting System (WDPRS). On June 26, 2008, the ICANN Board started a new process of TLD naming policy to take a "significant step forward on the introduction of new generic top-level domains." This program envisioned the availability of many new or already proposed domains, as well a new application and implementation process. On October 1, 2008, ICANN issued breach notices against Joker and Beijing Innovative Linkage Technology Ltd. after further researching reports and complaints issued by KnujOn. These notices gave the registrars 15 days to fix their Whois investigation efforts. In 2010, ICANN approved a major review of its policies with respect to accountability, transparency, and public participation by the Berkman Center for Internet and Society at Harvard University. This external review was an assistance of the work of ICANN's Accountability and Transparency Review team. On February 3, 2011, ICANN announced that it had distributed the last batch of its remaining IPv4 addresses to the world's five regional Internet registries, the organizations that manage IP addresses in different regions. These registries began assigning the final IPv4 addresses within their regions until they ran out completely. On June 20, 2011, the ICANN board voted to end most restrictions on the names of generic top-level domains (gTLD). Companies and organizations became able to choose essentially arbitrary top-level Internet domain names. The use of non-Latin characters (such as Cyrillic, Arabic, Chinese, etc.) is also allowed in gTLDs. ICANN began accepting applications for new gTLDS on January 12, 2012. The initial price to apply for a new gTLD was set at $185,000 and the annual renewal fee is $25,000. Following the 2013 NSA spying scandal, ICANN endorsed the Montevideo Statement, although no direct connection between these could be proven. On October 1, 2016, ICANN ended its contract with the United States Department of Commerce National Telecommunications and Information Administration (NTIA) and entered the private sector. The European Union's General Data Protection Regulation (active since May 25, 2018) impacted on ICANN operations, which the latter tried to fix through last-minute changes. The deadline coincided with French President Macron's hosting of technology businesspeople such as Facebook CEO Mark Zuckerberg, Microsoft CEO Satya Nadella, Uber CEO Dara Khosrowshahi, IBM CEO Ginni Rometty, Intel CEO Brian Krzanich, Samsung President Young Sohn, and SAP CEO Bill McDermott. Structure From its founding to the present, ICANN has been formally organized as a nonprofit corporation "for charitable and public purposes" under the California Nonprofit Public Benefit Corporation Law. It is managed by a 16-member board of directors composed of eight members selected by a nominating committee on which all the constituencies of ICANN are represented; six representatives of its Supporting Organizations, sub-groups that deal with specific sections of the policies under ICANN's purview; an at-large seat filled by an at-large organization; and the President / CEO, appointed by the board. There are currently three supporting organizations: the Generic Names Supporting Organization (GNSO) deals with policy making on generic top-level domains (gTLDs); the Country Code Names Supporting Organization (ccNSO) deals with policy making on country-code top-level domains (ccTLDs); the Address Supporting Organization (ASO) deals with policy making on IP addresses. ICANN also relies on some advisory committees and other advisory mechanisms to receive advice on the interests and needs of stakeholders that do not directly participate in the Supporting Organizations. These include the Governmental Advisory Committee (GAC), which is composed of representatives of a large number of national governments from all over the world; the At-Large Advisory Committee (ALAC), which is composed of individual Internet users from around the world selected by each of the Regional At-Large Organizations (RALO) and Nominating Committee; the Root Server System Advisory Committee, which provides advice on the operation of the DNS root server system; the Security and Stability Advisory Committee (SSAC), which is composed of Internet experts who study security issues pertaining to ICANN's mandate; and the Technical Liaison Group (TLG), which is composed of representatives of other international technical organizations that focus, at least in part, on the Internet. Governmental Advisory Committee Representatives The Governmental Advisory Committee has representatives from 179 states and 38 Observer organizations, including the Holy See, Cook Islands, Niue, Taiwan, Hong Kong, Bermuda, Montserrat, the European Commission and the African Union Commission. Observers In addition the following organizations are GAC Observers: African Telecommunications Union Asia-Pacific Telecommunity Caribbean Telecommunications Union (CTU) Commonwealth Telecommunications Organisation (CTO) Council of Europe Economic Commission for Africa (ECA) European Broadcasting Union European Organization for Nuclear Research (CERN) European Space Agency International Labour Office International Telecommunication Union (ITU) International Criminal Police Organization (INTERPOL) International Red Cross and Red Crescent Movement Latin American Association of Telecom Regulatory Agencies (REGULATEL) League of Arab States New Partnership for Africa's Development (NEPAD) Organisation for Economic Co-operation and Development The Organization for Islamic Cooperation Organization of American States Organisation internationale de la Francophonie (OIF) Pacific Islands Forum Secretariat of the Pacific Community (SPC) Inter-American Telecommunication Commission (CITEL) International Criminal Court United Nations Educational Scientific and Cultural Organization (UNESCO) Universal Postal Union World Bank World Health Organization (WHO) World Intellectual Property Organization (WIPO) World Meteorological Organization World Trade Organization Trusted Community Representatives As the operator of the IANA domain name functions, ICANN is responsible for the DNSSEC management of the root zone. While day to day operations are managed by ICANN and Verisign, the trust is rooted in a group of Trusted Community Representatives. The members of this group must not be affiliated with ICANN, but are instead members of the broader DNS community, volunteering to become a Trusted Community Representative. The role of the representatives are primarily to take part in regular key ceremonies at a physical location, organized by ICANN, and to safeguard the key materials in between. Democratic input In the Memorandum of understanding that set up the relationship between ICANN and the U.S. government, ICANN was given a mandate requiring that it operate "in a bottom up, consensus driven, democratic manner." However, the attempts that ICANN have made to establish an organizational structure that would allow wide input from the global Internet community did not produce results amenable to the current Board. As a result, the At-Large constituency and direct election of board members by the global Internet community were soon abandoned. ICANN holds periodic public meetings rotated between continents for the purpose of encouraging global participation in its processes. Resolutions of the ICANN Board, preliminary reports, and minutes of the meetings, are published on the ICANN website, sometimes in real time. However, there are criticisms from ICANN constituencies including the Noncommercial Users Constituency (NCUC) and the At-Large Advisory Committee (ALAC) that there is not enough public disclosure and that too many discussions and decisions take place out of sight of the public. During the early 2000s, there had been speculation that the United Nations might assume control of ICANN, followed by a negative reaction from the U.S. government and worries about a division of the Internet. The World Summit on the Information Society in Tunisia during November 2005 agreed not to get involved in the day-to-day and technical operations of ICANN. However it also agreed to establish an international Internet Governance Forum, with a consultative role on the future governance of the Internet. ICANN's Government Advisory Committee is currently established to provide advice to ICANN regarding public policy issues and has participation by many of the world's governments. Some have attempted to argue that ICANN was never given the authority to decide policy, e.g., choose new TLDs or exclude other interested parties who refuse to pay ICANN's US$185,000 fee, but was to be a technical caretaker. Critics suggest that ICANN should not be allowed to impose business rules on market participants, and that all TLDs should be added on a first-come, first-served basis and the market should be the arbiter of who succeeds and who does not. Activities Uniform Domain-Name Dispute Resolution Policy (UDRP) One task that ICANN was asked to do was to address the issue of domain name ownership resolution for generic top-level domains (gTLDs). ICANN's attempt at such a policy was drafted in close cooperation with the World Intellectual Property Organization (WIPO), and the result has now become known as the Uniform Dispute Resolution Policy (UDRP). This policy essentially attempts to provide a mechanism for rapid, cheap and reasonable resolution of domain name conflicts, avoiding the traditional court system for disputes by allowing cases to be brought to one of a set of bodies that arbitrate domain name disputes. According to ICANN policy, domain registrants must agree to be
the error by An iterative method is called linear if there exists a matrix such that and this matrix is called the iteration matrix. An iterative method with a given iteration matrix is called convergent if the following holds An important theorem states that for a given iterative method and its iteration matrix it is convergent if and only if its spectral radius is smaller than unity, that is, The basic iterative methods work by splitting the matrix into and here the matrix should be easily invertible. The iterative methods are now defined as From this follows that the iteration matrix is given by Examples Basic examples of stationary iterative methods use a splitting of the matrix such as where is only the diagonal part of , and is the strict lower triangular part of . Respectively, is the strict upper triangular part of . Richardson method: Jacobi method: Damped Jacobi method: Gauss–Seidel method: Successive over-relaxation method (SOR): Symmetric successive over-relaxation (SSOR): Linear stationary iterative methods are also called relaxation methods. Krylov subspace methods Krylov subspace methods work by forming a basis of the sequence of successive matrix powers times the initial residual (the Krylov sequence). The approximations to the solution are then formed by minimizing the residual over the subspace formed. The prototypical method in this class is the conjugate gradient method (CG) which assumes that the system matrix is symmetric positive-definite. For symmetric (and possibly indefinite) one works with the minimal residual method (MINRES). In the case of non-symmetric matrices, methods such as the generalized minimal residual method (GMRES) and the biconjugate gradient method (BiCG) have been derived. Convergence of Krylov subspace methods Since these methods form a basis, it is evident that the method converges in N iterations, where N is the system size. However, in the
the order of millions), where direct methods would be prohibitively expensive (and in some cases impossible) even with the best available computing power. Attractive fixed points If an equation can be put into the form f(x) = x, and a solution x is an attractive fixed point of the function f, then one may begin with a point x1 in the basin of attraction of x, and let xn+1 = f(xn) for n ≥ 1, and the sequence {xn}n ≥ 1 will converge to the solution x. Here xn is the nth approximation or iteration of x and xn+1 is the next or n + 1 iteration of x. Alternately, superscripts in parentheses are often used in numerical methods, so as not to interfere with subscripts with other meanings. (For example, x(n+1) = f(x(n)).) If the function f is continuously differentiable, a sufficient condition for convergence is that the spectral radius of the derivative is strictly bounded by one in a neighborhood of the fixed point. If this condition holds at the fixed point, then a sufficiently small neighborhood (basin of attraction) must exist. Linear systems In the case of a system of linear equations, the two main classes of iterative methods are the stationary iterative methods, and the more general Krylov subspace methods. Stationary iterative methods Introduction Stationary iterative methods solve a linear system with an operator approximating the original one; and based on a measurement of the error in the result (the residual), form a "correction equation" for which this process is repeated. While these methods are simple to derive, implement, and analyze, convergence is only guaranteed for a limited class of matrices. Definition An iterative method is defined by and for a given linear system with exact solution the error by An iterative method is called linear if there exists a matrix such that and this matrix is called the iteration matrix. An iterative method with a given iteration matrix is called convergent if the following holds
their constitutive instruments, and institutions which do not yet exist, but for which constitutive instruments have been signed. It does not include mere proposed institutions for which no instrument was ever signed. International courts International Court of Justice International Tribunal for the Law of the Sea International Criminal Tribunal for the Former Yugoslavia International Criminal Tribunal for Rwanda International Criminal Court International Military Tribunal (Defunct) International Military Tribunal for the Far East (Defunct) International Prize Court (Never established) Permanent Court of International Justice (Defunct. Replaced by the International Court of Justice) International arbitral tribunals Permanent Court of Arbitration WTO Appellate Body WTO Dispute Settlement Panels NAFTA Dispute Settlement Panels International Centre for the Settlement of Investment Disputes Court of Arbitration for Sport OSCE Court of Conciliation and Arbitration Quasi-judicial international institutions Human Rights Committee Committee on the Elimination of Racial Discrimination Committee on the Elimination of Discrimination Against Women Committee on Economic, Social and Cultural Rights Committee on the Rights of the Child Committee
human rights treaties. Institutions can also be divided into global and regional institutions. The listing below incorporates both currently existing institutions, defunct institutions that no longer exist, institutions which never came into existence due to non-ratification of their constitutive instruments, and institutions which do not yet exist, but for which constitutive instruments have been signed. It does not include mere proposed institutions for which no instrument was ever signed. International courts International Court of Justice International Tribunal for the Law of the Sea International Criminal Tribunal for the Former Yugoslavia International Criminal Tribunal for Rwanda International Criminal Court International Military Tribunal (Defunct) International Military Tribunal for the Far East (Defunct) International Prize Court (Never established) Permanent Court of International Justice (Defunct. Replaced by the International Court of Justice) International arbitral tribunals Permanent Court of
was an international court proposed at the beginning of the 20th century, to hear prize cases. An international agreement to create it, the Convention Relative to the Creation of an International Prize Court, was made at the Second Hague Conference in 1907 but never came into force. The capturing of prizes (enemy equipment, vehicles, and especially ships) during wartime is a tradition that goes back as far as organized warfare itself. The International Prize Court was to hear appeals from national courts concerning prize cases. Even as a draft, the convention was innovative for the time, in being both the first ever treaty for a truly international court (as opposed to a mere arbitral tribunal),
resolve some concerns expressed by the United States at the court, which felt it to be in violation of its constitutional provision that provides for the U.S. Supreme Court being the final judicial authority. However, neither the convention nor the subsequent protocol ever entered into force, since only Nicaragua ratified the agreements. As a result, the court never came into existence. A number of ideas from the International Prize Court proposal can be seen in present-day international courts, such as its provision for judges ad hoc, later adopted in the Permanent Court of
belief, referring to leaders of the community. Twelver and Ismaili Shi'a believe that these imams are chosen by God to be perfect examples for the faithful and to lead all humanity in all aspects of life. They also believe that all the imams chosen are free from committing any sin, impeccability which is called ismah. These leaders must be followed since they are appointed by God. Twelver Here follows a list of the Twelvers Shia imams: Fatimah, also Fatimah al-Zahraa, daughter of Muhammed (615–632), is also considered infallible but not an Imam. The Shi'a believe that the last Imam, the 12th Imam Mahdi will one day emerge on the Day of Resurrection (Qiyamah). Ismaili See Imamah (Ismaili doctrine) and List of Ismaili imams for Ismaili imams. Zaidi See details under Zaidiyyah, Islamic history of Yemen and Imams of Yemen. Imams as secular rulers At times, imams have held both secular and religious authority. This was the case in Oman among the Kharijite or Ibadi sects. At times, the imams were elected. At other times the position was inherited, as with the Yaruba dynasty from 1624 and 1742. See List of rulers of Oman, the Rustamid dynasty: 776–909, Nabhani dynasty: 1154–1624, the Yaruba dynasty: 1624–1742, the Al Said: 1744–present for further information. The Imamate of Futa Jallon (1727-1896) was a Fulani state in West Africa where secular power alternated between two lines of hereditary Imams, or almami. In the Zaidi Shiite sect, imams were secular as well as spiritual leaders who held power in Yemen for more than a thousand years. In 897, a Zaidi ruler, al-Hadi ila'l-Haqq Yahya, founded a line of such imams, a theocratic form of government which survived until the second half of the 20th century. (See details under Zaidiyyah, History of Yemen, Imams of Yemen.):) Ruhollah Khomeini is officially referred to as Imam in Iran. Several Iranian places and institutions are named "Imam Khomeini", including a city, an international airport, a
In Twelver Shiasm there are 14 infallibles, 12 of which are Imams, the final being Imam Mahdi who will return at the end of times. The title was also used by the Zaidi Shia Imams of Yemen, who eventually founded the Mutawakkilite Kingdom of Yemen (1918–1970). Sunni imams Sunni Islam does not have imams in the same sense as the Shi'a, an important distinction often overlooked by those outside of the Islamic religion. In everyday terms, an imam for Sunni Muslims is the one who leads Islamic formal (Fard) prayers, even in locations besides the mosque, whenever prayers are done in a group of two or more with one person leading (imam) and the others following by copying his ritual actions of worship. Friday sermon is most often given by an appointed imam. All mosques have an imam to lead the (congregational) prayers, even though it may sometimes just be a member from the gathered congregation rather than an officially appointed salaried person. The position of women as imams is controversial. The person that should be chosen, according to Hadith, is one who has most knowledge of the Quran and Sunnah (prophetic tradition) and is of good character. The term is also used for a recognized religious scholar or authority in Islam, often for the founding scholars of the four Sunni madhhabs, or schools of jurisprudence (fiqh). It may also refer to the Islamic scholars who created the analytical sciences related to Hadith or it may refer to the heads of Muhammad's family in their generational times. The position of imams in Turkey Imams are appointed by the state to work at mosques and they are required to be graduates of an İmam Hatip high school or have a university degree in Theology. This is an official position regulated by the Presidency of Religious Affairs in Turkey and only males are appointed to this position; while female officials under the same state organisation work as preachers and Qur'an course tutors, religious services experts, etc.
in conditions technically less than VMC; the pilot asserts they have the necessary visibility to fly despite the weather, must stay in contact with ATC, and cannot leave controlled airspace while still below VMC minimums. During flight under IFR, there are no visibility requirements, so flying through clouds (or other conditions where there is zero visibility outside the aircraft) is legal and safe. However, there are still minimum weather conditions that must be present in order for the aircraft to take off or to land; these vary according to the kind of operation, the type of navigation aids available, the location and height of terrain and obstructions in the vicinity of the airport, equipment on the aircraft, and the qualifications of the crew. For example, Reno-Tahoe International Airport (KRNO) in a mountainous region has significantly different instrument approaches for aircraft landing on the same runway surface, but from opposite directions. Aircraft approaching from the north must make visual contact with the airport at a higher altitude than when approaching from the south because of rapidly rising terrain south of the airport. This higher altitude allows a flight crew to clear the obstacle if a landing is aborted. In general, each specific instrument approach specifies the minimum weather conditions to permit landing. Although large airliners, and increasingly, smaller aircraft, carry their own terrain awareness and warning system (TAWS), these are primarily backup systems providing a last layer of defense if a sequence of errors or omissions causes a dangerous situation. Navigation Because IFR flights often take place without visual reference to the ground, a means of navigation other than looking outside the window is required. A number of navigational aids are available to pilots, including ground-based systems such as DME/VORs and NDBs as well as the satellite-based GPS/GNSS system. Air traffic control may assist in navigation by assigning pilots specific headings ("radar vectors"). The majority of IFR navigation is given by ground- and satellite-based systems, while radar vectors are usually reserved by ATC for sequencing aircraft for a busy approach or transitioning aircraft from takeoff to cruise, among other things. Procedures Specific procedures allow IFR aircraft to transition safely through every stage of flight. These procedures specify how an IFR pilot should respond, even in the event of a complete radio failure, and loss of communications with ATC, including the expected aircraft course and altitude. Departures are described in an IFR clearance issued by ATC prior to takeoff. The departure clearance may contain an assigned heading, one or more waypoints, and an initial altitude to fly. The clearance can also specify a departure procedure (DP) or standard instrument departure (SID) that should be followed unless "NO DP" is specified in the notes section of the filed flight plan. Here is an example of an IFR clearance for a Cessna aircraft traveling from Palo Alto airport (KPAO) to Stockton airport (KSCK). Detailed explanation: "Cessna 21756" Verifies that only this specific aircraft is cleared. "cleared to Stockton Airport" Clearance Limit: the farthest destination the aircraft is allowed to go under IFR (in most cases it is the destination airport). "via turn right heading zero-six-zero within one mile of the airport." The pilot is expected to execute the right turn to 060° magnetic heading without further ATC prompting within one mile of the departure airport. "Radar vectors San Jose" The departure controller will provide directional guidance to the San Jose VOR. "Then as filed." After arriving at the San Jose VOR, the pilot will likely resume navigation without ATC prompts along the airways and intersections that were filed in their flight plan. "Maintain three thousand ..." After takeoff, climb to an indicated altitude of 3000 feet above sea level. "... expect five thousand five minutes after departure." The next altitude assignment is probably going to be 5000 feet above sea level. However, pilots must follow actual ATC altitude assignments throughout the flight. This portion of the clearance provides a backup if communications are lost, allowing the flight to continue and climb to 5000 feet. "Departure frequency is one two one decimal three." After the aircraft is airborne and the tower controller tells the pilot to "contact departure", pilots are to contact the departure controller on this communication frequency. "Squawk four two six three." The pilot should set the aircraft's transponder code to 4263 so that ATC can positively identify the flight on radar. The clearance scheme, used by ATC, can be easily remembered using the acronym "CRAFT"Clearance Limit - Route - Altitudes - Frequencies - Transponder (Squawk) En route flight is described by IFR charts showing navigation aids, fixes, and standard routes called airways. Aircraft with appropriate navigational equipment such as GPS, are also often cleared for a direct-to routing, where only the destination, or a few navigational waypoints are used to describe the route that the flight will follow. ATC will assign altitudes in its initial clearance or amendments thereto, and navigational charts indicate minimum safe altitudes for airways. The approach portion of an IFR flight may begin with a standard terminal arrival route (STAR), describing common routes to fly to
flying through clouds (or other conditions where there is zero visibility outside the aircraft) is legal and safe. However, there are still minimum weather conditions that must be present in order for the aircraft to take off or to land; these vary according to the kind of operation, the type of navigation aids available, the location and height of terrain and obstructions in the vicinity of the airport, equipment on the aircraft, and the qualifications of the crew. For example, Reno-Tahoe International Airport (KRNO) in a mountainous region has significantly different instrument approaches for aircraft landing on the same runway surface, but from opposite directions. Aircraft approaching from the north must make visual contact with the airport at a higher altitude than when approaching from the south because of rapidly rising terrain south of the airport. This higher altitude allows a flight crew to clear the obstacle if a landing is aborted. In general, each specific instrument approach specifies the minimum weather conditions to permit landing. Although large airliners, and increasingly, smaller aircraft, carry their own terrain awareness and warning system (TAWS), these are primarily backup systems providing a last layer of defense if a sequence of errors or omissions causes a dangerous situation. Navigation Because IFR flights often take place without visual reference to the ground, a means of navigation other than looking outside the window is required. A number of navigational aids are available to pilots, including ground-based systems such as DME/VORs and NDBs as well as the satellite-based GPS/GNSS system. Air traffic control may assist in navigation by assigning pilots specific headings ("radar vectors"). The majority of IFR navigation is given by ground- and satellite-based systems, while radar vectors are usually reserved by ATC for sequencing aircraft for a busy approach or transitioning aircraft from takeoff to cruise, among other things. Procedures Specific procedures allow IFR aircraft to transition safely through every stage of flight. These procedures specify how an IFR pilot should respond, even in the event of a complete radio failure, and loss of communications with ATC, including the expected aircraft course and altitude. Departures are described in an IFR clearance issued by ATC prior to takeoff. The departure clearance may contain an assigned heading, one or more waypoints, and an initial altitude to fly. The clearance can also specify a departure procedure (DP) or standard instrument departure (SID) that should be followed unless "NO DP" is specified in the notes section of the filed flight plan. Here is an example of an IFR clearance for a Cessna aircraft traveling from Palo Alto airport (KPAO) to Stockton airport (KSCK). Detailed explanation: "Cessna 21756" Verifies that only this specific aircraft is cleared. "cleared to Stockton Airport" Clearance Limit: the farthest destination the aircraft is allowed to go under IFR (in most cases it is the destination airport). "via turn right heading zero-six-zero within one mile of the airport." The pilot is expected to execute the right turn to 060° magnetic heading without further ATC prompting within one mile of the departure airport. "Radar vectors San Jose" The departure controller will provide directional guidance to the San Jose VOR. "Then as filed." After arriving at the San Jose VOR, the pilot will likely resume navigation without ATC prompts along the airways and intersections that were filed in their flight plan. "Maintain three thousand ..." After takeoff, climb to an indicated altitude of 3000 feet above sea level. "... expect five thousand five minutes after departure." The next altitude assignment is probably going to be 5000 feet above sea level. However, pilots must follow actual ATC altitude assignments throughout the flight. This portion of the clearance provides a backup if communications are lost, allowing the flight to continue and climb to 5000 feet. "Departure frequency is one two one decimal three." After the aircraft is airborne and the tower controller tells the pilot to "contact departure", pilots are to contact the departure controller on this communication frequency. "Squawk four two six three." The pilot should set the aircraft's transponder code to 4263 so that ATC can positively identify the flight on radar. The clearance scheme, used by ATC, can be easily remembered using the acronym "CRAFT"Clearance Limit - Route - Altitudes - Frequencies - Transponder (Squawk) En route flight is described by IFR charts showing navigation aids, fixes, and standard routes called airways. Aircraft with appropriate navigational equipment such as GPS, are also often cleared for a direct-to routing, where only the destination, or a few navigational waypoints are used to describe the route that the flight will follow. ATC will assign altitudes in its initial clearance or amendments thereto, and navigational charts indicate minimum safe altitudes for airways. The approach portion of an IFR flight may begin with a standard terminal arrival route (STAR), describing common routes to fly to arrive at an initial approach fix (IAF) from which an instrument approach commences. An instrument approach terminates either by the pilot acquiring sufficient visual reference to proceed to the runway, or with a missed approach because the required visual reference is not seen in time. Qualifications Pilot To fly under IFR, a pilot must have an instrument rating and must be current (meet recency of experience requirements). In the United States, to file and fly under IFR, a pilot must be instrument-rated and, within the preceding six months, have flown six instrument approaches, as well as holding procedures and course interception and tracking with navaids. Flight under IFR beyond six months after meeting these requirements is not permitted; however, currency may be reestablished within the next six months by completing the requirements above. Beyond the twelfth month, examination ("instrument proficiency check") by an instructor is required. Practicing instrument approaches can be done either in the instrument meteorological conditions or in visual meteorological conditions – in the latter case, a safety pilot is required so that the pilot practicing instrument approaches can wear a view-limiting device which restricts his field of view to the instrument panel. A safety pilot's primary duty is to observe and avoid other traffic. In the UK, an IR (UK restricted) - formerly the "IMC rating" - which permits flight under IFR in airspace classes B to G in instrument meteorological conditions, a non-instrument-rated pilot can also elect to fly under IFR in visual meteorological conditions outside controlled airspace. Compared to the rest of the world, the UK's flight crew licensing regime is somewhat unusual in its licensing for meteorological conditions and airspace, rather than flight rules. Aircraft The aircraft must be equipped and type-certified for instrument flight, and the related navigational equipment must have been inspected or tested within a specific period of time prior to the instrument flight. In the United States, instruments required for IFR flight in addition to those that are required for VFR flight are: heading indicator, sensitive altimeter adjustable for barometric pressure, clock with a sweep-second pointer or digital equivalent, attitude indicator, radios and suitable avionics for the route to be flown, alternator or generator, gyroscopic rate-of-turn indicator that is either a turn coordinator or the turn and bank indicator. From 1999 single-engine helicopters could not be FAA-certified for IFR. Recently, however, Bell and Leonardo have certified the single engine helicopters for instrument flight rules. See also Acronyms and abbreviations in avionics Aeronautical chart Airspace class Approach
Khalq government. The governor's troops opened fire on the demonstrators, who proceeded to storm the palace and hunt down Soviet advisers. The Herat garrison mutinied and joined the revolt in what is called the Herat uprising, with Ismail Khan and other officers distributing all available weapons to the insurgents. The government led by Nur Mohammed Taraki responded, pulverizing the city using Soviet supplied bombers and killing up to 24,000 citizens in less than a week. This event marked the opening salvo of the rebellion which led to the Soviet military intervention in Afghanistan in December 1979. Ismail Khan escaped to the countryside where he began to assemble a local rebel force. During the ensuing war, he became the leader of the western command of Burhanuddin Rabbani's Jamiat-e-Islami, political party. With Ahmad Shah Massoud, he was one of the most respected mujahideen leaders. In 1992, three years after the Soviet withdrawal from Afghanistan, the mujahideen captured Herat and Ismail Khan became governor. In 1995, he successfully defended his province against the Taliban, in cooperation with defense minister Ahmad Shah Massoud. Khan even tried to attack the Taliban stronghold of Kandahar, but was repulsed. Later in September, an ally of the Jamiat, Uzbek General Abdul Rashid Dostum changed sides, and attacked Herat. Ismail Khan was forced to flee to neighboring Iran with 8,000 men and the Taliban took over Herat Province. Two years later, while organizing opposition to the Taliban in Faryab area, he was betrayed and captured by Abdul Majid Rouzi who had defected to the Taliban along with Abdul Malik Pahlawan, then one of Dostum's deputies. Then in March 1999 he escaped from Kandahar prison. During the U.S. intervention in Afghanistan, he fought against the Taliban within the United Islamic Front for the Salvation of Afghanistan (Northern Alliance) and thus regained his position as Governor of Herat after they were victorious in December 2001. Karzai administration and return to Afghanistan After returning to Herat, Ismail Khan quickly consolidated his control over the region. He took over control of the city from the local ulema and quickly established control over the trade route between Herat and Iran, a large source of revenue. As Emir of Herat, Ismail Khan exercised great autonomy, providing social welfare for Heratis, expanding his power into neighbouring provinces, and maintaining direct international contacts. Although hated by the educated in Herat and often accused of human rights abuses, Ismail Khan's regime provided security, paid government employees, and made investments in public services. However, during his tenure as governor, Ismail Khan was accused of ruling his province like a private fiefdom, leading to increasing tensions with the Afghan Transitional Administration. In particular, he refused to pass on to the government the revenues gained from custom taxes
rise to power Khan was born in or about 1946 in the Shindand District of Herat Province in Afghanistan. His family is from the Chahar-Mahal neighbourhood of Shindand. In early 1979 Ismail Khan was a Captain in the Afghan National Army based in the western city of Herat. In early March of that year, there was a protest in front of the Communist governor's palace against the arrests and assassinations being carried out in the countryside by the Khalq government. The governor's troops opened fire on the demonstrators, who proceeded to storm the palace and hunt down Soviet advisers. The Herat garrison mutinied and joined the revolt in what is called the Herat uprising, with Ismail Khan and other officers distributing all available weapons to the insurgents. The government led by Nur Mohammed Taraki responded, pulverizing the city using Soviet supplied bombers and killing up to 24,000 citizens in less than a week. This event marked the opening salvo of the rebellion which led to the Soviet military intervention in Afghanistan in December 1979. Ismail Khan escaped to the countryside where he began to assemble a local rebel force. During the ensuing war, he became the leader of the western command of Burhanuddin Rabbani's Jamiat-e-Islami, political party. With Ahmad Shah Massoud, he was one of the most respected mujahideen leaders. In 1992, three years after the Soviet withdrawal from Afghanistan, the mujahideen captured Herat and Ismail Khan became governor. In 1995, he successfully defended his province against the Taliban, in cooperation with defense minister Ahmad Shah Massoud. Khan even tried to attack the Taliban stronghold of Kandahar, but was repulsed. Later in September, an ally of the Jamiat, Uzbek General Abdul Rashid Dostum changed sides, and attacked Herat. Ismail Khan was forced to flee to neighboring Iran with 8,000 men and the Taliban took over Herat Province. Two years later, while organizing opposition to the Taliban in Faryab area, he was betrayed and captured by Abdul Majid Rouzi who had defected to the Taliban along with Abdul Malik Pahlawan, then one of Dostum's deputies. Then in March 1999 he escaped from Kandahar prison. During the U.S. intervention in Afghanistan, he fought against the Taliban within the United Islamic Front for the Salvation of Afghanistan (Northern Alliance) and thus regained his position as Governor of Herat after they were victorious in December 2001. Karzai administration and return to Afghanistan After returning to Herat, Ismail Khan quickly consolidated his control over the region. He took over control of the city from the local ulema and quickly established control over the trade route between Herat and Iran, a large source of revenue. As Emir of Herat, Ismail Khan exercised great autonomy, providing social welfare for Heratis, expanding his power into neighbouring provinces, and maintaining direct international contacts. Although hated by the educated in Herat and often accused of human rights abuses, Ismail Khan's regime provided security, paid government employees, and made investments in public services. However, during his tenure as governor, Ismail Khan was accused of ruling his province like a private fiefdom, leading to increasing tensions with the
the seven colors of the rainbow: the color between blue and violet; however, sources differ as to its actual position in the electromagnetic spectrum. The first known recorded use of indigo as a color name in English was in 1289. History Indigofera tinctoria and related species were cultivated in East Asia, Egypt, India, and Peru in antiquity. The earliest direct evidence for the use of indigo dates to around 4000 BC and comes from Huaca Prieta, in contemporary Peru. Pliny the Elder mentions India as the source of the dye after which it was named. It was imported from there in small quantities via the Silk Road. The Ancient Greek term for the dye was ("Indian dye"), which, adopted to Latin (second declension case) as indicum or indico and via Portuguese, gave rise to the modern word indigo. Spanish explorers discovered an American species of indigo and began to cultivate the product in Guatemala. The English and French subsequently began to encourage indigo cultivation in their colonies in the West Indies. In North America, indigo was introduced by Eliza Lucas into colonial South Carolina, where it became the colony's second-most important cash crop (after rice). Before the Revolutionary War, indigo accounted for more than one-third of the value of exports from the American colonies. Blue dye can be made from two different types of plants: the indigo plant, which produces the best results, and from the woad plant Isatis tinctoria, also known as pastel. For a long time, woad was the main source of blue dye in Europe. Woad was replaced by true indigo as trade routes opened up, and both plant sources have now been largely replaced by synthetic dyes. Classification as a spectral color The Early Modern English word indigo referred to the dye, not to the color (hue) itself, and indigo is not traditionally part of the basic color-naming system. Modern sources place indigo in the electromagnetic spectrum between 420 and 450 nanometers, which lies on the short-wave side of color wheel (RGB) blue, towards (spectral) violet. The correspondence of this definition with colors of actual indigo dyes, though, is disputed. Optical scientists Hardy and Perrin list indigo as between 445 and 464 nm wavelength, which occupies a spectrum segment from roughly the color wheel (RGB) blue extending to the long-wave side, towards azure. Isaac Newton introduced indigo as one of the seven base colors of his work. In the mid-1660s, when Newton bought a pair of prisms at a fair near Cambridge, the East India Company had begun importing indigo dye into England, supplanting the homegrown woad as source of blue dye. In a pivotal experiment in the history of optics, the young Newton shone a narrow beam of sunlight through a prism to produce a rainbow-like band of colors on the wall. In describing this optical spectrum, Newton acknowledged that the spectrum had a continuum of colors, but named seven: "The originall or primary colours are Red, yellow, Green, Blew, & a violet purple; together with Orang, Indico, & an indefinite varietie of intermediate gradations." He linked the seven prismatic colors to the seven notes of a western major scale, as shown in his color wheel, with orange and indigo as the semitones. Having decided upon seven colors, he asked a friend to repeatedly divide up the spectrum that was projected from the prism onto the wall: I desired a friend to draw with a pencil lines cross the image, or pillar of colours, where every one of the seven aforenamed colours was most full and brisk, and also where he judged the truest confines of them to be, whilst I held the paper so, that the said image might fall within a certain compass marked on it. And this I did, partly because my own eyes are not very critical in distinguishing colours, partly because another, to whom I had not communicated my thoughts about this matter, could have nothing but his eyes to determine his fancy in making those marks. Indigo is therefore counted as one of the traditional colors of the rainbow, the order of which is given by the mnemonics "Richard of York gave battle in vain" and Roy G. Biv. James Clerk Maxwell and Hermann von Helmholtz accepted indigo as an appropriate name for the color flanking violet in the spectrum. Later scientists concluded that Newton named the colors differently from current usage. According to Gary Waldman, "A careful reading of Newton's work indicates that the color he called indigo, we would normally call blue; his blue is then what we would name blue-green, cyan or light blue." If this is true, Newton's seven spectral colors would have been: Red: Orange: Yellow: Green: Blue: Indigo: Violet: The human eye does not readily differentiate hues in the wavelengths between what are now called blue and violet. If this is where Newton meant indigo to lie, most individuals would have difficulty distinguishing indigo from its neighbors. According to Isaac Asimov, "It is customary to list indigo as a color lying between blue and violet, but it has never seemed to me that indigo is worth the dignity of being considered a separate color. To my eyes, it seems merely deep blue." Modern color scientists typically divide the spectrum between violet and blue at about 450 nm, with no indigo. Distinction among the four major tones of indigo Like many other colors (orange, rose, and violet are the best-known), indigo gets its name
the order of which is given by the mnemonics "Richard of York gave battle in vain" and Roy G. Biv. James Clerk Maxwell and Hermann von Helmholtz accepted indigo as an appropriate name for the color flanking violet in the spectrum. Later scientists concluded that Newton named the colors differently from current usage. According to Gary Waldman, "A careful reading of Newton's work indicates that the color he called indigo, we would normally call blue; his blue is then what we would name blue-green, cyan or light blue." If this is true, Newton's seven spectral colors would have been: Red: Orange: Yellow: Green: Blue: Indigo: Violet: The human eye does not readily differentiate hues in the wavelengths between what are now called blue and violet. If this is where Newton meant indigo to lie, most individuals would have difficulty distinguishing indigo from its neighbors. According to Isaac Asimov, "It is customary to list indigo as a color lying between blue and violet, but it has never seemed to me that indigo is worth the dignity of being considered a separate color. To my eyes, it seems merely deep blue." Modern color scientists typically divide the spectrum between violet and blue at about 450 nm, with no indigo. Distinction among the four major tones of indigo Like many other colors (orange, rose, and violet are the best-known), indigo gets its name from an object in the natural world—the plant named indigo once used for dyeing cloth (see also Indigo dye). The color "electric indigo" is a bright and saturated color between the traditional indigo and violet. This is the brightest color indigo that can be approximated on a computer screen; it is a color located between the (primary) blue and the color violet of the RGB color wheel. The web color blue violet or deep indigo is a tone of indigo brighter than pigment indigo, but not as bright as electric indigo. The color pigment indigo is equivalent to the web color indigo and approximates the color indigo that is usually reproduced in pigments and colored pencils. The color of indigo dye is a different color from either spectrum indigo or pigment indigo. This is the actual color of the dye. A vat full of this dye is a darker color, approximating the web color midnight blue. Below are displayed these four major tones of indigo. Electric indigo "Electric indigo" is brighter than the pigment indigo reproduced below. When plotted on the CIE chromaticity diagram, this color is at 435 nanometers, in the middle of the portion of the spectrum traditionally considered indigo, i.e., between 450 and 420 nanometers. This color is only an approximation of spectral indigo, since actual spectral colors are outside the gamut of the sRGB color system. Deep indigo (web color blue-violet) At right is displayed the web color "blue-violet", a color intermediate in brightness between electric indigo and pigment indigo. It is also known as "deep indigo". Web color indigo The color box on the right displays the web color indigo, the color indigo as it would be reproduced by artists' paints as opposed to the brighter indigo above (electric indigo) that is possible to reproduce on a computer screen. Its hue is closer to violet than to indigo dye for which the color is named. Pigment indigo can be obtained by mixing 55% pigment cyan with about 45% pigment magenta. Compare the subtractive colors to the additive colors in the two primary color charts in the article on primary colors to see the distinction between electric colors as reproducible from light on a computer screen (additive colors) and the pigment colors reproducible with pigments (subtractive colors); the additive colors are significantly brighter because they are produced from light instead of pigment. Web color indigo represents the way the color indigo was always reproduced in pigments, paints, or colored pencils in the 1950s. By the 1970s, because of the advent of psychedelic art, artists became accustomed to brighter pigments. Pigments called "bright indigo" or "bright blue-violet" (the pigment equivalent of the electric indigo reproduced in the section above) became available in artists' pigments and colored
is created around governance issues because these two groups, creditors and borrowers, have fundamentally different interests. The criticism is that the system of voting power distribution through a quota system institutionalizes borrower subordination and creditor dominance. The resulting division of the IMF's membership into borrowers and non-borrowers has increased the controversy around conditionality because the borrowers are interested in increasing loan access while creditors want to maintain reassurance that the loans will be repaid. Use A recent source revealed that the average overall use of IMF credit per decade increased, in real terms, by 21% between the 1970s and 1980s, and increased again by just over 22% from the 1980s to the 1991–2005 period. Another study has suggested that since 1950 the continent of Africa alone has received $300 billion from the IMF, the World Bank, and affiliate institutions. A study by Bumba Mukherjee found that developing democratic countries benefit more from IMF programs than developing autocratic countries because policy-making, and the process of deciding where loaned money is used, is more transparent within a democracy. One study done by Randall Stone found that although earlier studies found little impact of IMF programs on balance of payments, more recent studies using more sophisticated methods and larger samples "usually found IMF programs improved the balance of payments". Exceptional Access Framework – sovereign debt The Exceptional Access Framework was created in 2003 when John B. Taylor was Under Secretary of the US Treasury for International Affairs. The new Framework became fully operational in February 2003 and it was applied in the subsequent decisions on Argentina and Brazil. Its purpose was to place some sensible rules and limits on the way the IMF makes loans to support governments with debt problem—especially in emerging markets—and thereby move away from the bailout mentality of the 1990s. Such a reform was essential for ending the crisis atmosphere that then existed in emerging markets. The reform was closely related to and put in place nearly simultaneously with the actions of several emerging market countries to place collective action clauses in their bond contracts. In 2010, the framework was abandoned so the IMF could make loans to Greece in an unsustainable and political situation. The topic of sovereign debt restructuring was taken up by IMF staff in April 2013 for the first time since 2005, in a report entitled "Sovereign Debt Restructuring: Recent Developments and Implications for the Fund's Legal and Policy Framework". The paper, which was discussed by the board on 20 May, summarised the recent experiences in Greece, St Kitts and Nevis, Belize and Jamaica. An explanatory interview with Deputy Director Hugh Bredenkamp was published a few days later, as was a deconstruction by Matina Stevis of the Wall Street Journal. The staff was directed to formulate an updated policy, which was accomplished on 22 May 2014 with a report entitled "The Fund's Lending Framework and Sovereign Debt: Preliminary Considerations", and taken up by the executive board on 13 June. The staff proposed that "in circumstances where a (Sovereign) member has lost market access and debt is considered sustainable ... the IMF would be able to provide Exceptional Access on the basis of a debt operation that involves an extension of maturities", which was labeled a "reprofiling operation". These reprofiling operations would "generally be less costly to the debtor and creditors—and thus to the system overall—relative to either an upfront debt reduction operation or a bail-out that is followed by debt reduction ... (and) would be envisaged only when both (a) a member has lost market access and (b) debt is assessed to be sustainable, but not with high probability ... Creditors will only agree if they understand that such an amendment is necessary to avoid a worse outcome: namely, a default and/or an operation involving debt reduction ... Collective action clauses, which now exist in most—but not all—bonds would be relied upon to address collective action problems." Impact According to a 2002 study by Randall W. Stone, the academic literature on the IMF shows "no consensus on the long-term effects of IMF programs on growth". Some research has found that IMF loans can reduce the chance of a future banking crisis, while other studies have found that they can increase the risk of political crises. IMF programs can reduce the effects of a currency crisis. Some research has found that IMF programs are less effective in countries which possess a developed-country patron (be it by foreign aid, membership of postcolonial institutions or UN voting patterns), seemingly due to this patron allowing countries to flaunt IMF program rules as these rules are not consistently enforced. Some research has found that IMF loans reduce economic growth due to creating an economic moral hazard, reducing public investment, reducing incentives to create a robust domestic policies and reducing private investor confidence. Other research has indicated that IMF loans can have a positive impact on economic growth and that their effects are highly nuanced. Criticisms Overseas Development Institute (ODI) research undertaken in 1980 included criticisms of the IMF which support the analysis that it is a pillar of what activist Titus Alexander calls global apartheid. Developed countries were seen to have a more dominant role and control over less developed countries (LDCs). The Fund worked on the incorrect assumption that all payments disequilibria were caused domestically. The Group of 24 (G-24), on behalf of LDC members, and the United Nations Conference on Trade and Development (UNCTAD) complained that the IMF did not distinguish sufficiently between disequilibria with predominantly external as opposed to internal causes. This criticism was voiced in the aftermath of the 1973 oil crisis. Then LDCs found themselves with payment deficits due to adverse changes in their terms of trade, with the Fund prescribing stabilization programmes similar to those suggested for deficits caused by government over-spending. Faced with long-term, externally generated disequilibria, the G-24 argued for more time for LDCs to adjust their economies. Some IMF policies may be anti-developmental; the report said that deflationary effects of IMF programmes quickly led to losses of output and employment in economies where incomes were low and unemployment was high. Moreover, the burden of the deflation is disproportionately borne by the poor. The IMF's initial policies were based in theory and influenced by differing opinions and departmental rivalries. Critics suggest that its intentions to implement these policies in countries with widely varying economic circumstances were misinformed and lacked economic rationale. ODI conclusions were that the IMF's very nature of promoting market-oriented approaches attracted unavoidable criticism. On the other hand, the IMF could serve as a scapegoat while allowing governments to blame international bankers. The ODI conceded that the IMF was insensitive to political aspirations of LDCs while its policy conditions were inflexible. Argentina, which had been considered by the IMF to be a model country in its compliance to policy proposals by the Bretton Woods institutions, experienced a catastrophic economic crisis in 2001, which some believe to have been caused by IMF-induced budget restrictions—which undercut the government's ability to sustain national infrastructure even in crucial areas such as health, education, and security—and privatisation of strategically vital national resources. Others attribute the crisis to Argentina's misdesigned fiscal federalism, which caused subnational spending to increase rapidly. The crisis added to widespread hatred of this institution in Argentina and other South American countries, with many blaming the IMF for the region's economic problems. The current—as of early 2006—trend toward moderate left-wing governments in the region and a growing concern with the development of a regional economic policy largely independent of big business pressures has been ascribed to this crisis. In 2006, a senior ActionAid policy analyst Akanksha Marphatia stated that IMF policies in Africa undermine any possibility of meeting the Millennium Development Goals (MDGs) due to imposed restrictions that prevent spending on important sectors, such as education and health. In an interview (2008-05-19), the former Romanian Prime Minister Călin Popescu-Tăriceanu claimed that "Since 2005, IMF is constantly making mistakes when it appreciates the country's economic performances". Former Tanzanian President Julius Nyerere, who claimed that debt-ridden African states were ceding sovereignty to the IMF and the World Bank, famously asked, "Who elected the IMF to be the ministry of finance for every country in the world?" Former chief economist of IMF and former Reserve Bank of India (RBI) Governor Raghuram Rajan who predicted the Financial crisis of 2007–08 criticised the IMF for remaining a sideline player to the developed world. He criticised the IMF for praising the monetary policies of the US, which he believed were wreaking havoc in emerging markets. He had been critical of the ultra-loose money policies of the Western nations and IMF. Countries such as Zambia have not received proper aid with long-lasting effects, leading to concern from economists. Since 2005, Zambia (as well as 29 other African countries) did receive debt write-offs, which helped with the country's medical and education funds. However, Zambia returned to a debt of over half its GDP in less than a decade. American economist William Easterly, sceptical of the IMF's methods, had initially warned that "debt relief would simply encourage more reckless borrowing by crooked governments unless it was accompanied by reforms to speed up economic growth and improve governance," according to The Economist. Conditionality The IMF has been criticised for being "out of touch" with local economic conditions, cultures, and environments in the countries they are requiring policy reform. The economic advice the IMF gives might not always take into consideration the difference between what spending means on paper and how it is felt by citizens. Countries charge that with excessive conditionality, they do not "own" the programs and the links are broken between a recipient country's people, its government, and the goals being pursued by the IMF. Jeffrey Sachs argues that the IMF's "usual prescription is 'budgetary belt tightening to countries who are much too poor to own belts. Sachs wrote that the IMF's role as a generalist institution specialising in macroeconomic issues needs reform. Conditionality has also been criticised because a country can pledge collateral of "acceptable assets" to obtain waivers—if one assumes that all countries are able to provide "acceptable collateral". One view is that conditionality undermines domestic political institutions. The recipient governments are sacrificing policy autonomy in exchange for funds, which can lead to public resentment of the local leadership for accepting and enforcing the IMF conditions. Political instability can result from more leadership turnover as political leaders are replaced in electoral backlashes. IMF conditions are often criticised for reducing government services, thus increasing unemployment. Another criticism is that IMF programs are only designed to address poor governance, excessive government spending, excessive government intervention in markets, and too much state ownership. This assumes that this narrow range of issues represents the only possible problems; everything is standardised and differing contexts are ignored. A country may also be compelled to accept conditions it would not normally accept had they not been in a financial crisis in need of assistance. On top of that, regardless of what methodologies and data sets used, it comes to same the conclusion of exacerbating income inequality. With Gini coefficient, it became clear that countries with IMF programs face increased income inequality. It is claimed that conditionalities retard social stability and hence inhibit the stated goals of the IMF, while Structural Adjustment Programs lead to an increase in poverty in recipient countries. The IMF sometimes advocates "austerity programmes", cutting public spending and increasing taxes even when the economy is weak, to bring budgets closer to a balance, thus reducing budget deficits. Countries are often advised to lower their corporate tax rate. In Globalization and Its Discontents, Joseph E. Stiglitz, former chief economist and senior vice-president at the World Bank, criticises these policies. He argues that by converting to a more monetarist approach, the purpose of the fund is no longer valid, as it was designed to provide funds for countries to carry out Keynesian reflations, and that the IMF "was not participating in a conspiracy, but it was reflecting the interests and ideology of the Western financial community." Stiglitz concludes, "Modern high-tech warfare is designed to remove physical contact: dropping bombs from 50,000 feet ensures that one does not 'feel' what one does. Modern economic management is similar: from one's luxury hotel, one can callously impose policies about which one would think twice if one knew the people whose lives one was destroying." The researchers Eric Toussaint and Damien Millet argue that the IMF's policies amount to a new form of colonization that does not need a military presence: International politics play an important role in IMF decision making. The clout of member states is roughly proportional to its contribution to IMF finances. The United States has the greatest number of votes and therefore wields the most influence. Domestic politics often come into play, with politicians in developing countries using conditionality to gain leverage over the opposition to influence policy. Reform Function and policies The IMF is only one of many international organisations, and it is a generalist institution that deals only with macroeconomic issues; its core areas of concern in developing countries are very narrow. One proposed reform is a movement towards close partnership with other specialist agencies such as UNICEF, the Food and Agriculture Organization (FAO), and the United Nations Development Program (UNDP). Jeffrey Sachs argues in The End of Poverty that the IMF and the World Bank have "the brightest economists and the lead in advising poor countries on how to break out of poverty, but the problem is development economics". Development economics needs the reform, not the IMF. He also notes that IMF loan conditions should be paired with other reforms—e.g., trade reform in developed nations, debt cancellation, and increased financial assistance for investments in basic infrastructure. IMF loan conditions cannot stand alone and produce change; they need to be partnered with other reforms or other conditions as applicable. US influence and voting reform The scholarly consensus is that IMF decision-making is not simply technocratic, but also guided by political and economic concerns. The United States is the IMF's most powerful member, and its influence reaches even into decision-making concerning individual loan agreements. The United States has historically been openly opposed to losing what Treasury Secretary Jacob Lew described in 2015 as its "leadership role" at the IMF, and the United States' "ability to shape international norms and practices". Emerging markets were not well-represented for most of the IMF's history: Despite being the most populous country, China's vote share was the sixth largest; Brazil's vote share was smaller than Belgium's. Reforms to give more powers to emerging economies were agreed by the G20 in 2010. The reforms could not pass, however, until they were ratified by the US Congress, since 85% of the Fund's voting power was required for the reforms to take effect, and the Americans held more than 16% of voting power at the time. After repeated criticism, the United States finally ratified the voting reforms at the end of 2015. The OECD countries maintained their overwhelming majority of voting share, and the United States in particular retained its share at over 16%. The criticism of the American-and-European dominated IMF has led to what some consider 'disenfranchising the world' from the governance of the IMF. Raúl Prebisch, the founding secretary-general of the UN Conference on Trade and Development (UNCTAD), wrote that one of "the conspicuous deficiencies of the general economic theory, from the point of view of the periphery, is its false sense of universality." Support of dictatorships The role of the Bretton Woods institutions has been controversial since the late Cold War, because of claims that the IMF policy makers supported military dictatorships friendly to American and European corporations, but also other anti-communist and Communist regimes (such as Mobutu's Zaire and Ceaușescu's Romania, respectively). Critics also claim that the IMF is generally apathetic or hostile to human rights, and labour rights. The controversy has helped spark the anti-globalization movement. An example of IMF's support for a dictatorship was its ongoing support for Mobutu's rule in Zaire, although its own envoy, Erwin Blumenthal, provided a sobering report about the entrenched corruption and embezzlement and the inability of
quota system. Each member has a number of basic votes (each member's number of basic votes equals 5.502% of the total votes), plus one additional vote for each special drawing right (SDR) of 100,000 of a member country's quota. The special drawing right is the unit of account of the IMF and represents a potential claim to currency. It is based on a basket of key international currencies. The basic votes generate a slight bias in favour of small countries, but the additional votes determined by SDR outweigh this bias. Changes in the voting shares require approval by a super-majority of 85% of voting power. In December 2015, the United States Congress adopted a legislation authorising the 2010 Quota and Governance Reforms. As a result, all 190 members' quotas will increase from a total of about XDR 238.5 billion to about XDR 477 billion, while the quota shares and voting power of the IMF's poorest member countries will be protected. more than 6 percent of quota shares will shift to dynamic emerging market and developing countries and also from over-represented to under-represented members. four emerging market countries (Brazil, China, India, and Russia) will be among the ten largest members of the IMF. Other top 10 members are the United States, Japan, Germany, France, the United Kingdom and Italy. Effects of the quota system The IMF's quota system was created to raise funds for loans. Each IMF member country is assigned a quota, or contribution, that reflects the country's relative size in the global economy. Each member's quota also determines its relative voting power. Thus, financial contributions from member governments are linked to voting power in the organization. This system follows the logic of a shareholder-controlled organization: wealthy countries have more say in the making and revision of rules. Since decision making at the IMF reflects each member's relative economic position in the world, wealthier countries that provide more money to the IMF have more influence than poorer members that contribute less; nonetheless, the IMF focuses on redistribution. Inflexibility of voting power Quotas are normally reviewed every five years and can be increased when deemed necessary by the Board of Governors. IMF voting shares are relatively inflexible: countries that grow economically have tended to become under-represented as their voting power lags behind. Currently, reforming the representation of developing countries within the IMF has been suggested. These countries' economies represent a large portion of the global economic system but this is not reflected in the IMF's decision-making process through the nature of the quota system. Joseph Stiglitz argues, "There is a need to provide more effective voice and representation for developing countries, which now represent a much larger portion of world economic activity since 1944, when the IMF was created." In 2008, a number of quota reforms were passed including shifting 6% of quota shares to dynamic emerging markets and developing countries. Overcoming borrower/creditor divide The IMF's membership is divided along income lines: certain countries provide financial resources while others use these resources. Both developed country "creditors" and developing country "borrowers" are members of the IMF. The developed countries provide the financial resources but rarely enter into IMF loan agreements; they are the creditors. Conversely, the developing countries use the lending services but contribute little to the pool of money available to lend because their quotas are smaller; they are the borrowers. Thus, tension is created around governance issues because these two groups, creditors and borrowers, have fundamentally different interests. The criticism is that the system of voting power distribution through a quota system institutionalizes borrower subordination and creditor dominance. The resulting division of the IMF's membership into borrowers and non-borrowers has increased the controversy around conditionality because the borrowers are interested in increasing loan access while creditors want to maintain reassurance that the loans will be repaid. Use A recent source revealed that the average overall use of IMF credit per decade increased, in real terms, by 21% between the 1970s and 1980s, and increased again by just over 22% from the 1980s to the 1991–2005 period. Another study has suggested that since 1950 the continent of Africa alone has received $300 billion from the IMF, the World Bank, and affiliate institutions. A study by Bumba Mukherjee found that developing democratic countries benefit more from IMF programs than developing autocratic countries because policy-making, and the process of deciding where loaned money is used, is more transparent within a democracy. One study done by Randall Stone found that although earlier studies found little impact of IMF programs on balance of payments, more recent studies using more sophisticated methods and larger samples "usually found IMF programs improved the balance of payments". Exceptional Access Framework – sovereign debt The Exceptional Access Framework was created in 2003 when John B. Taylor was Under Secretary of the US Treasury for International Affairs. The new Framework became fully operational in February 2003 and it was applied in the subsequent decisions on Argentina and Brazil. Its purpose was to place some sensible rules and limits on the way the IMF makes loans to support governments with debt problem—especially in emerging markets—and thereby move away from the bailout mentality of the 1990s. Such a reform was essential for ending the crisis atmosphere that then existed in emerging markets. The reform was closely related to and put in place nearly simultaneously with the actions of several emerging market countries to place collective action clauses in their bond contracts. In 2010, the framework was abandoned so the IMF could make loans to Greece in an unsustainable and political situation. The topic of sovereign debt restructuring was taken up by IMF staff in April 2013 for the first time since 2005, in a report entitled "Sovereign Debt Restructuring: Recent Developments and Implications for the Fund's Legal and Policy Framework". The paper, which was discussed by the board on 20 May, summarised the recent experiences in Greece, St Kitts and Nevis, Belize and Jamaica. An explanatory interview with Deputy Director Hugh Bredenkamp was published a few days later, as was a deconstruction by Matina Stevis of the Wall Street Journal. The staff was directed to formulate an updated policy, which was accomplished on 22 May 2014 with a report entitled "The Fund's Lending Framework and Sovereign Debt: Preliminary Considerations", and taken up by the executive board on 13 June. The staff proposed that "in circumstances where a (Sovereign) member has lost market access and debt is considered sustainable ... the IMF would be able to provide Exceptional Access on the basis of a debt operation that involves an extension of maturities", which was labeled a "reprofiling operation". These reprofiling operations would "generally be less costly to the debtor and creditors—and thus to the system overall—relative to either an upfront debt reduction operation or a bail-out that is followed by debt reduction ... (and) would be envisaged only when both (a) a member has lost market access and (b) debt is assessed to be sustainable, but not with high probability ... Creditors will only agree if they understand that such an amendment is necessary to avoid a worse outcome: namely, a default and/or an operation involving debt reduction ... Collective action clauses, which now exist in most—but not all—bonds would be relied upon to address collective action problems." Impact According to a 2002 study by Randall W. Stone, the academic literature on the IMF shows "no consensus on the long-term effects of IMF programs on growth". Some research has found that IMF loans can reduce the chance of a future banking crisis, while other studies have found that they can increase the risk of political crises. IMF programs can reduce the effects of a currency crisis. Some research has found that IMF programs are less effective in countries which possess a developed-country patron (be it by foreign aid, membership of postcolonial institutions or UN voting patterns), seemingly due to this patron allowing countries to flaunt IMF program rules as these rules are not consistently enforced. Some research has found that IMF loans reduce economic growth due to creating an economic moral hazard, reducing public investment, reducing incentives to create a robust domestic policies and reducing private investor confidence. Other research has indicated that IMF loans can have a positive impact on economic growth and that their effects are highly nuanced. Criticisms Overseas Development Institute (ODI) research undertaken in 1980 included criticisms of the IMF which support the analysis that it is a pillar of what activist Titus Alexander calls global apartheid. Developed countries were seen to have a more dominant role and control over less developed countries (LDCs). The Fund worked on the incorrect assumption that all payments disequilibria were caused domestically. The Group of 24 (G-24), on behalf of LDC members, and the United Nations Conference on Trade and Development (UNCTAD) complained that the IMF did not distinguish sufficiently between disequilibria with predominantly external as opposed to internal causes. This criticism was voiced in the aftermath of the 1973 oil crisis. Then LDCs found themselves with payment deficits due to adverse changes in their terms of trade, with the Fund prescribing stabilization programmes similar to those suggested for deficits caused by government over-spending. Faced with long-term, externally generated disequilibria, the G-24 argued for more time for LDCs to adjust their economies. Some IMF policies may be anti-developmental; the report said that deflationary effects of IMF programmes quickly led to losses of output and employment in economies where incomes were low and unemployment was high. Moreover, the burden of the deflation is disproportionately borne by the poor. The IMF's initial policies were based in theory and influenced by differing opinions and departmental rivalries. Critics suggest that its intentions to implement these policies in countries with widely varying economic circumstances were misinformed and lacked economic rationale. ODI conclusions were that the IMF's very nature of promoting market-oriented approaches attracted unavoidable criticism. On the other hand, the IMF could serve as a scapegoat while allowing governments to blame international bankers. The ODI conceded that the IMF was insensitive to political aspirations of LDCs while its policy conditions were inflexible. Argentina, which had been considered by the IMF to be a model country in its compliance to policy proposals by the Bretton Woods institutions, experienced a catastrophic economic crisis in 2001, which some believe to have been caused by IMF-induced budget restrictions—which undercut the government's ability to sustain national infrastructure even in crucial areas such as health, education, and security—and privatisation of strategically vital national resources. Others attribute the crisis to Argentina's misdesigned fiscal federalism, which caused subnational spending to increase rapidly. The crisis added to widespread hatred of this institution in Argentina and other South American countries, with many blaming the IMF for the region's economic problems. The current—as of early 2006—trend toward moderate left-wing governments in the region and a growing concern with the development of a regional economic policy largely independent of big business pressures has been ascribed to this crisis. In 2006, a senior ActionAid policy analyst Akanksha Marphatia stated that IMF policies in Africa undermine any possibility of meeting the Millennium Development Goals (MDGs) due to imposed restrictions that prevent spending on important sectors, such as education and health. In an interview (2008-05-19), the former Romanian Prime Minister Călin Popescu-Tăriceanu claimed that "Since 2005, IMF is constantly making mistakes when it appreciates the country's economic performances". Former Tanzanian President Julius Nyerere, who claimed that debt-ridden African states were ceding sovereignty to the IMF and the World Bank, famously asked, "Who elected the IMF to be the ministry of finance for every country in the world?" Former chief economist of IMF and former Reserve Bank of India (RBI) Governor Raghuram Rajan who predicted the Financial crisis of 2007–08 criticised the IMF for remaining a sideline player to the developed world. He criticised the IMF for praising the monetary policies of the US, which he believed were wreaking havoc in emerging markets. He had been critical of the ultra-loose money policies of the Western nations and IMF. Countries such as Zambia have not received proper aid with long-lasting effects, leading to concern from economists. Since 2005, Zambia (as well as 29 other African countries) did receive debt write-offs, which helped with the country's medical and education funds. However, Zambia returned to a debt of over half its GDP in less than a decade. American economist William Easterly, sceptical of the IMF's methods, had initially warned that "debt relief would simply encourage more reckless borrowing by crooked governments unless it was accompanied by reforms to speed up economic growth and improve governance," according to The Economist. Conditionality The IMF has been criticised for being "out of touch" with local economic conditions, cultures, and environments in the countries they are requiring policy reform. The economic advice the IMF gives might not always take into consideration the difference between what spending means on paper and how it is felt by citizens. Countries charge that with excessive conditionality, they do not "own" the programs and the links are broken between a recipient country's people, its government, and the goals being pursued by the IMF. Jeffrey Sachs argues that the IMF's "usual prescription is 'budgetary belt tightening to countries who are much too poor to own belts. Sachs wrote that the IMF's role as a generalist institution specialising in macroeconomic issues needs reform. Conditionality has also been criticised because a country can pledge collateral of "acceptable assets" to obtain waivers—if one assumes that all countries are able to provide "acceptable collateral". One view is that conditionality undermines domestic political institutions. The recipient governments are sacrificing policy autonomy in exchange for funds, which can lead to public resentment of the local leadership for accepting and enforcing the IMF conditions. Political instability can result from more leadership turnover as political leaders are replaced in electoral backlashes. IMF conditions are often criticised for reducing government services, thus increasing unemployment. Another criticism is that IMF programs are only designed to address poor governance, excessive government spending, excessive government intervention in markets, and too much state ownership. This assumes that this narrow range of issues represents the only possible problems; everything is standardised and differing contexts are ignored. A country may also be compelled to accept conditions it would not normally accept had they not been in a financial crisis in need of assistance. On top of that, regardless of what methodologies and data sets used, it comes to same the conclusion of exacerbating income inequality. With Gini coefficient, it became clear that countries with IMF programs face increased income inequality. It is claimed that conditionalities retard social stability and hence inhibit the stated goals of the IMF, while Structural Adjustment Programs lead to an increase in poverty in recipient countries. The IMF sometimes advocates "austerity programmes", cutting public spending and increasing taxes even when the economy is weak, to bring budgets closer to a balance, thus reducing budget deficits. Countries are often advised to lower their corporate tax rate. In Globalization and Its Discontents, Joseph E. Stiglitz, former chief economist and senior vice-president at the World Bank, criticises these policies. He argues that by converting to a more monetarist approach, the purpose of the fund is no longer valid, as it was designed to provide funds for countries to carry out Keynesian reflations, and that the IMF "was not participating in a conspiracy, but it was reflecting the interests and ideology of the Western financial community." Stiglitz concludes, "Modern high-tech warfare is designed to remove physical contact: dropping bombs from 50,000 feet ensures that one does not 'feel' what one does. Modern economic management is similar: from one's luxury hotel, one can callously impose policies about which one would think twice if one knew the people whose lives one was destroying." The researchers Eric Toussaint and Damien Millet argue that the IMF's policies amount to a new form of colonization that does not need a military presence: International politics play an important role in IMF decision making. The clout of member states is roughly proportional to its contribution to IMF finances. The United States has the greatest number of votes and therefore wields the most influence. Domestic politics often come into play, with politicians in developing countries using conditionality to gain leverage over the opposition to influence policy. Reform Function and policies The IMF is only one of many international organisations, and it is a generalist institution that deals only with macroeconomic issues; its core areas of concern in developing countries are very narrow. One proposed reform is a movement towards close partnership with other specialist agencies such as UNICEF, the Food and Agriculture Organization (FAO), and the United Nations Development Program (UNDP). Jeffrey Sachs argues in The End of Poverty that the IMF and the World Bank have "the brightest economists and the lead in advising poor countries on how to break out of poverty, but the problem is development economics". Development economics needs the reform, not the IMF. He also notes that IMF loan conditions should be paired with other reforms—e.g., trade reform in developed nations, debt cancellation, and increased financial assistance for investments in basic infrastructure. IMF loan conditions cannot stand alone and produce change; they need to be partnered with other reforms or other conditions as applicable. US influence and voting reform The scholarly consensus is that IMF decision-making is not simply technocratic, but also guided by political and economic concerns. The United States is the IMF's most powerful member, and its influence reaches even into decision-making concerning individual loan agreements. The United States has historically been openly opposed to losing what Treasury Secretary Jacob Lew described in 2015 as its "leadership role" at the IMF, and the United States' "ability to shape international norms and practices". Emerging markets were not well-represented for most of the IMF's history: Despite being the most populous country, China's vote share was the sixth largest; Brazil's vote share was smaller than Belgium's. Reforms to give more powers to emerging economies were agreed by the G20 in 2010. The reforms could not pass, however, until they were ratified by the US Congress, since 85% of the Fund's voting power was required for the reforms to take effect, and the Americans held more than 16% of voting power at the time. After repeated criticism, the United States finally ratified the voting reforms at the end of 2015. The OECD countries maintained their overwhelming majority of voting share, and the United States in particular retained its share at over 16%. The criticism of the American-and-European dominated IMF has led to what some consider 'disenfranchising the world' from the governance of the IMF. Raúl Prebisch, the founding secretary-general of the UN Conference on Trade and Development (UNCTAD), wrote that one of "the conspicuous deficiencies of the general economic theory, from the point of view of the periphery, is its false sense of universality." Support of dictatorships The role of the Bretton Woods institutions has been controversial since the late Cold War, because of claims that the IMF policy makers supported military dictatorships friendly to American and European corporations, but also other anti-communist and Communist regimes (such as Mobutu's Zaire and Ceaușescu's Romania, respectively). Critics also claim that the IMF is generally apathetic or hostile to human rights, and labour rights. The controversy has helped spark the anti-globalization movement. An example of IMF's support for a dictatorship was its ongoing support for Mobutu's rule in Zaire, although its own envoy, Erwin Blumenthal, provided a sobering report about the entrenched corruption and embezzlement and the inability of the country to pay back any loans. Arguments in favour of the IMF say that economic stability is a precursor to democracy; however, critics highlight various examples in which democratised countries fell after receiving IMF loans. A 2017 study found no evidence of IMF lending programs undermining democracy in borrowing countries. To the contrary, it found "evidence for modest but definitively positive conditional differences in the democracy scores of participating and non-participating countries." On 28 June 2021 the IMF approved a US$1 billion loan to the Ugandan government despite protests from Ugandans who protested in Washington, London and South-Africa. Impact on access to food A number of civil society organisations have criticised the IMF's policies for their impact on access to food, particularly in developing countries. In October 2008, former United States president Bill Clinton delivered a speech to the United Nations on World Food Day, criticising the World Bank and IMF for their policies on food and agriculture: The FPIF remarked that there is a recurring pattern: "the destabilization of peasant producers by a one-two punch of IMF-World Bank structural adjustment programs that gutted government investment in the countryside followed by the massive influx of subsidized U.S. and European Union agricultural imports after the WTO's Agreement on Agriculture pried open markets." Impact on public health A 2009 study concluded that the strict conditions resulted in thousands of deaths in Eastern Europe by tuberculosis as public health care had to be weakened. In the 21 countries to which the IMF had given loans, tuberculosis deaths rose by 16.6%. A 2017 systematic review on studies conducted on the impact that Structural adjustment programs have on child and maternal health found that these programs have a detrimental effect on maternal and child health among other adverse effects. In 2009, a book by Rick Rowden titled The Deadly Ideas of Neoliberalism: How the IMF has Undermined Public Health and the Fight Against AIDS, claimed that the IMF's monetarist approach towards prioritising price stability (low inflation) and fiscal restraint (low budget deficits) was unnecessarily restrictive and has prevented developing countries from scaling up long-term investment in public health infrastructure. The book claimed the consequences have been chronically underfunded public health systems, leading to demoralising working conditions that have fuelled a "brain drain" of medical personnel, all of which has undermined public health and the fight against HIV/AIDS in developing countries. In 2016, the IMF's research department published a report titled "Neoliberalism: Oversold?" which, while praising some aspects of the "neoliberal agenda," claims that the organisation has been "overselling" fiscal austerity policies and financial deregulation, which they claim has exacerbated both financial crises and economic inequality around the world. Impact on environment IMF policies have been repeatedly criticised for making it difficult for indebted countries to say no to environmentally harmful projects that nevertheless generate revenues such as oil, coal, and forest-destroying lumber and agriculture projects. Ecuador, for example, had to defy IMF advice repeatedly to pursue the protection of its rainforests, though paradoxically this need was cited in the IMF argument to provide support to Ecuador. The IMF acknowledged this paradox in the 2010 report that proposed the IMF Green Fund, a mechanism to issue special drawing rights directly to pay for climate harm prevention and potentially other ecological protection as pursued generally by other environmental finance. While the response to these moves was generally positive possibly because ecological protection and energy and infrastructure transformation are more politically neutral than pressures to change social policy, some experts voiced concern that the IMF was not representative, and that the IMF proposals to generate only US$200 billion a year by 2020 with the SDRs as seed funds, did not go far enough to undo the general incentive to pursue destructive projects inherent in the world commodity trading and banking systems—criticisms often levelled at the World Trade Organization and large global banking institutions. In the context of the European debt crisis, some observers noted that Spain and California, two troubled economies within respectively the European Union and the United States, and also Germany, the primary and politically most fragile supporter of a euro currency bailout would benefit from IMF recognition of their leadership in green technology, and directly from Green Fund-generated demand for their exports, which could also improve their credit ratings. IMF and globalization Globalization encompasses three institutions: global financial markets and transnational companies, national governments linked to each other in economic and military alliances led by the United States, and rising "global governments" such as World Trade Organization (WTO), IMF, and World Bank. Charles Derber argues in his book People Before Profit, "These interacting institutions create a new global power system where sovereignty is globalized, taking power and constitutional authority away from nations and giving it to global markets and international bodies". Titus Alexander argues that this system institutionalises global inequality between western countries and the Majority World in a form of global apartheid, in which the IMF is a key pillar. The establishment of globalised economic institutions has been both a symptom of and a stimulus for globalisation. The development of the World Bank, the IMF, regional development banks such as the European Bank for Reconstruction and Development (EBRD), and multilateral trade institutions such as the WTO signals a move away from the dominance of the state as the primary actor analysed in international affairs. Globalization has thus been transformative in terms of limiting of state sovereignty over the economy. Impact on gender equality The IMF says they support women's
Viking influence Beginning in the 9th century and into the 13th century, the Islands of the Clyde constituted a border zone between the Norse Suðreyjar and Scotland, and many of them were under Norse hegemony. Beginning in the last half of the 12th century, and then into the early 1200s, the islands may well have served as the power base of Somhairle mac Giolla Brighde and his descendants. During this time, the islands seem to have come under the sway of the Steward of Scotland’s authority and to have been taken over by the expanding Stewart lordship. This western extension of Scottish authority appears to have been one of the factors motivating the Norwegian invasion of the region in 1230, during which the invaders seized Rothesay Castle. In 1263, Norwegian troops commanded by Haakon Haakonarson repeated the feat, but the ensuing Battle of Largs between Scots and Norwegian forces, which took place on the shores of the Firth of Clyde, was inconclusive as a military contest. This battle marked an ultimately fatal weakening of Norwegian power in Scotland. Haakon retreated to Orkney, where he died in December 1263, consoled on his death bed by recitations of the old sagas. Following his death, under the 1266 Treaty of Perth, all rights that the Norwegian Crown "had of old therein" in relation to the islands were yielded to the Kingdom of Scotland. Modern Scotland Politically, from the conclusion of the Treaty of Perth in 1266 to the present day, all of the islands of the Clyde have been part of Scotland. Ecclesiastically, beginning in the early medieval period all of these isles were part of the Diocese of Sodor and Man, based at Peel, on the Isle of Man. After 1387, the seat of the Bishopric of the Isles was relocated to the north, first to Snizort on Skye and then to Iona. This arrangement continued until the Scottish Reformation in the 16th century, when Scotland broke with the Catholic Church. The mid-1700s marked the beginning of a century of significant change. New forms of transport, industry, and agriculture brought an end to ways of life that had endured for centuries. The Battle of Culloden in 1746 foreshadowed the end of the clan system. These changes improved living standards for some, but came at a cost for others. In the late 18th and early 19th centuries, Alexander, the 10th Duke of Hamilton (1767–1852), and others implemented a controversial agricultural-reform programme called the Highland Clearances that had a devastating effect on many of Arran's inhabitants. Whole villages were emptied, and the Gaelic culture of the island was dealt a terminal blow. (A memorial to the tenant farmers evicted from the island by this programme was later erected on the shore at Lamlash, funded by a Canadian descendant of some of those evicted.) From the 1850s to the late 20th century, cargo ships known as “Clyde Puffers” (made famous by an early-20th-century story collection called the Vital Spark), were the workhorses of the islands, carrying a great deal of produce and a great variety of products to and from the islands. In May 1889, the Caledonian Steam Packet Company (CSP) was founded and began operating steamer services to and from Gourock for the Caledonian Railway. The company soon expanded by taking over rival steamer operators. David MacBrayne operated the Glasgow-to-Ardrishaig steamer service, as part of the so-called "Royal Route" to Oban. During the 20th century, many of the islands were developed as tourist resorts along the lines of mainland resorts such as Largs and Troon, but catering for Glaswegians who preferred to holiday "Doon the Watter". In 1973, CSP and MacBraynes combined their Clyde and West Highland operations under the new name of Caledonian MacBrayne. A government-owned corporation, they serve Great Cumbrae, Arran, and Bute, and also run mainland-to-mainland ferries across the firth. Private companies operate services from Arran to Holy Isle, and from McInroy's Point (Gourock) to Hunter's Quay on the Cowal peninsula. Politically, from 1890 to 1975, most of the islands comprised the traditional County of Bute, and its inhabitants were represented by the county council. Since the 1975 reorganization, however, the islands have been split more or less equally between two modern council authorities: Argyll and Bute, and North Ayrshire. Only Ailsa Craig and Lady Isle in South Ayrshire are not part of either of these two council areas. Islands Below is a table listing the nine islands of the Firth of Clyde that have an area greater than 40 hectares (approximately 100 acres), showing their population and listing the smaller uninhabited islets adjacent to them (including tidal islets separated only when the tide is higher, and skerries exposed only when the tide is lower). As of 2001, six of the islands were inhabited, but that included one with only two residents (Davaar), and one with only one resident (Sanda). At the 2011 census, there was no one usually resident on either of these islands. Outlying islands The islets that lie remote from the larger islands are described separately below. There are two islets in Gare Loch: Green Island and Perch Rock. Gare Loch is small, but it hosts the Faslane Naval Base, where the UK's Trident nuclear submarines are located. At its southern end, the loch opens into the Firth of Clyde via the Rhu narrows. There are also several islets in the Kilbrannan Sound, which lies between Arran and the Kintyre peninsula. They are: An Struthlag, Cour Island, Eilean Carrach (Carradale), Eilean Carrach (Skipness), Eilean Grianain, Eilean Sunadale, Gull Isle, Island Ross and Thorn Isle. (The Norse sagas tell a story about the Kintyre peninsula. In the late 11th century, a king of Norway (Magnus Barefoot) devised a plan to increase his territorial possessions. He persuaded a king of Scotland (Malcolm III or Edgar) to agree that he could take possession of an area of land on the west coast of Scotland if a ship could sail around it. Magnus then arranged for one of his longships to be dragged across the -long isthmus at the northern tip of the Kintyre peninsula, which connects Kintyre to the mainland. (The isthmus lies between East Loch Tarbert and West Loch Tarbert). He took command of the ship's tiller himself. Then, declaring that Kintyre had "better land than the best of the Hebrides", he claimed that dragging his ship across the isthmus had been equivalent to “sailing around” the peninsula, and thus that the peninsula counted as “land around which a ship could sail.” As a result of this maneuver, he was able to claim possession of the peninsula, which remained under Norse rule for more than a dozen years.) There are also several islets and skerries in Loch Fyne, which extends inland from the Sound of Bute, and is the longest of Scotland's sea lochs. They are: Duncuan Island, Eilean Ardgaddan, Eilean a' Bhuic, Eilean Aoghainn, Eilean a' Chomhraig, Eilean an Dúnain, Eilean Buidhe (Ardmarnock), Eilean Buidhe (Portavadie), Eilean Fraoch, Eilean Math-ghamhna, Eilean Mór, Glas Eilean, Heather Island, Inverneil Island, Kilbride Island, and Liath Eilean. There are several islets surrounding Horse Isle in North Ayrshire: Broad Rock, East Islet, Halftide Rock, High Rock and North Islet. Lady Isle lies off the South Ayrshire coast near Troon. At one time it housed "ane old chapell with an excellent spring of water". However, in June 1821, someone set fire to the "turf and pasture". Once the pasture had burned away, gales blew much of the island's soil into the sea. This permanently destroyed the island's ability to support grazing. There are no islands in Loch Goil or Loch Long, which are fjord-like arms in the northern part of the firth. Non-island areas with “island” in their name Here is a list of places along that shores of the Firth of Clyde that are not islands, but have names that misleadingly suggest they are islands (eilean being Gaelic for "island"): Eilean na Beithe, Portavadie; Eilean Beag, Cove; Eilean Dubh, Dalchenna, Loch Fyne; Eilean nan Gabhar, Melldalloch, Kyles of Bute; Barmore Island, just north of Tarbert, Kintyre; Eilean Aoidh, south of Portavadie; Eilean Leathan, Kilbrannan Sound just south of Torrisdale Bay; Island Muller, Kilbrannan Sound north of Campbeltown. Natural history Around the Firth of Clyde, there are populations of red deer, red squirrel, badger, otter, adder, and common lizard. In the Firth itself, there are harbour porpoises, basking sharks and various species of dolphin. Davaar is home to a population of wild goats. Over 200 bird species have been recorded as sighted in the area, including the black guillemot, the eider, the peregrine falcon, and the golden eagle. In 1981, there were 28 ptarmigans sighted on Arran, but in 2009 it was reported that extensive surveys had been unable to find any recorded ptarmigans sightings. Similarly, the red-billed chough no longer breeds on the island. Arran has three species of the rare endemic trees known as Arran Whitebeams: the Scottish or Arran whitebeam; the cut-leaved whitebeam; and the Catacol whitebeam. All of them are found only in Gleann Diomhan, and they are amongst the most endangered tree species in the world. (Gleann Diomhan was formerly part of a designated national nature reserve—the designation was removed in 2011)- and it continues to be part of an area designated as a Site of Special Scientific Interest.) Only 283 Arran whitebeam and 236 cut-leaved whitebeam were recorded as mature trees in 1980, and it is thought that grazing pressures and insect damage are preventing regeneration of the woodland. The Catacol whitebeam was discovered in 2007, but only two specimens have been found, so steps have been taken to protect them. Etymology The Roman historian Tacitus refers to the Clota, meaning the Clyde. The derivation is not certain but is probably from the
weakly metamorphosed rocks that form the Highland Border Complex lie discontinuously along the Highland Boundary Fault. One of the most prominent exposures is along Loch Fad on Bute. Ailsa Craig, which lies some south of Arran, has been quarried for a rare type of micro-granite containing riebeckite, known as "Ailsite". It is used by Kays of Scotland to make curling stones. (As of 2004, 60 to 70% of all curling stones in use globally were made from granite quarried on the island.) Like the rest of Scotland, the Firth of Clyde was covered by ice sheets during the Pleistocene ice ages, and the landscape has been much affected by glaciation. Back then, Arran's highest peaks may have been nunataks. Sea-level changes and the isostatic rise of land after the last retreat of the ice created clifflines behind raised beaches, which are a prominent feature of the entire coastline. The action of these forces has made charting the post glacial coastlines a complex task. The various soil types on the islands reflect their diverse geology. Bute has the most productive land, and it has a pattern of deposits that is typical of the southwest of Scotland. In the eroded valleys, there is a mixture of boulder clay and other glacial deposits. Elsewhere, especially to the south and west, there are raised beach- and marine deposits, which in some places, such as Stravanan, result in a machair landscape inland from the sandy bays. The Firth of Clyde, in which these islands lie, is north of the Irish Sea and has numerous branching inlets. Some of those inlets, including Loch Goil, Loch Long, Gare Loch, Loch Fyne, and the estuary of the River Clyde, have their own substantial features. In places, the effect of glaciation on the seabed is pronounced. For example, the Firth is deep between Arran and Bute, even though they are only apart. The islands all stand exposed to wind and tide. Various lighthouses, such as those on Ailsa Craig, Pladda, and Davaar, act as an aid to navigation. Climate The Firth of Clyde lies between 55 and 56 degrees north latitude. This is the same latitude as Labrador in Canada and north of the Aleutian Islands. However, the influence of the North Atlantic Drift—the northern extension of the Gulf Stream—moderates the winter weather. As a result, the area enjoys a mild, damp oceanic climate. Temperatures are generally cool, averaging about in January and in July at sea level. Snow seldom lies at sea level, and frosts are generally less frequent than they are on the mainland. In common with most islands off the west coast of Scotland, the average annual rainfall is generally high: between on Bute, in the Cumbraes, and in the south of Arran, and in the north of Arran. The Arran mountains are even wetter: Their summits receive over of rain annually. May, June and July are the sunniest months: on average, there is a total of 200 hours of bright sunshine during that 3-month period each year. Southern Bute benefits from a particularly large number of sunny days. History Prehistory Mesolithic humans arrived in the area of the Firth of Clyde during the 4th millennium BC, probably from Ireland. This initial arrival was followed by another wave of Neolithic peoples using the same route. In fact, there is some evidence that the Firth of Clyde was a significant route through which mainland Scotland was colonised during the Neolithic period. The inhabitants of Argyll, the Clyde estuary, and elsewhere in western Scotland at that time developed a distinctive style of megalithic structure that is known today as the Clyde cairns. About 100 of these structures have been found. They were used for interment of the dead. They are rectangular or trapezoidal, with a small enclosing chamber into which the person's body was placed. They are faced with large slabs of stone set on end (sometimes subdivided into smaller compartments). They also feature a forecourt area, which may have been used for displays or rituals associated with interment. They are mostly found in Arran, Bute, and Kintyre. It is thought likely that the Clyde cairns were the earliest forms of Neolithic monument constructed by incoming settlers. However, only a few of the cairns have been radiocarbon dated. A cairn at Monamore on Arran has been dated to 3160 BC, although other evidence suggests that it was almost certainly built earlier than that, possibly around 4000 BC. The area also features numerous standing stones dating from prehistoric times, including six stone circles on Machrie Moor in Arran, and other examples on Great Cumbrae and Bute. Later, Bronze Age settlers also constructed megaliths at various sites. Many of them date from the 2nd millennium BC. However, instead of chambered cairns, these peoples constructed burial cists, which can be found, for example, on Inchmarnock. Evidence of settlement during this period, especially the early part of it, is scant. However, one notable artifact has been found on Bute that dates
alphanumeric characters that are country-specific. The check digits represent the checksum of the bank account number which is used by banking systems to confirm that the number contains no simple errors. IBAN is traditionally expressed in groups of four characters separated by spaces, the last group being of variable length as shown in the example below; when transmitted electronically, spaces are omitted. Permitted IBAN characters are the digits 0 to 9 and the 26 Latin alphabetic characters A to Z. This applies even in countries where these characters are not used in the national language (e.g., Thailand). Basic Bank Account Number The Basic Bank Account Number (BBAN) format is decided by the national central bank or designated payment authority of each country. There is no consistency between the formats adopted. The national authority may register its BBAN format with SWIFT but is not obliged to do so. It may adopt IBAN without registration. SWIFT also acts as the registration authority for the SWIFT system, which is used by most countries that have not adopted IBAN. A major difference between the two systems is that under SWIFT there is no requirement that BBANs used within a country be of a pre-defined length. The BBAN must be of a fixed length for the country and comprise case-insensitive alphanumeric characters. It includes the domestic bank account number, branch identifier, and potential routing information. Each country can have a different national routing/account numbering system, up to a maximum of 30 alphanumeric characters. Check digits The check digits enable the sending bank (or its customer) to perform a sanity check of the routing destination and account number from a single string of data at the time of data entry. This check is guaranteed to detect any instances where a single character has been omitted, duplicated, mistyped or where two characters have been transposed. Thus routing and account number errors are virtually eliminated. Processing One of the design aims of the IBAN was to enable as much validation as possible to be done at the point of data entry. In particular, the computer program that accepts an IBAN will be able to validate: Country code Number of characters in the IBAN correspond to the number specified for the country code BBAN format specified for the country code Account number, bank code and country code combination is compatible with the check digits The check digits are calculated using MOD-97-10 as per ISO/IEC 7064:2003 (abbreviated to mod-97 in this article), which specifies a set of check character systems capable of protecting strings against errors which occur when people copy or key data. In particular, the standard states that the following can be detected: All single substitution errors (the substitution of a single character for another, for example 4234 for 1234) All or nearly all single (local) transposition errors (the transposition of two single characters, either adjacent or with one character between them, for example 12354 or 12543 for 12345) All or nearly all shift errors (shifts of the whole string to the left or right) High proportion of double substitution errors (two separate single substitution errors in the same string, for example 7234587 for 1234567) High proportion of all other errors The underlying rules for IBANs is that the account-servicing financial institution should issue an IBAN, as there are a number of areas where different IBANs could be generated from the same account and branch numbers that would satisfy the generic IBAN validation rules. In particular cases where 00 is a valid check digit, 97 will not be a valid check digit, likewise, if 01 is a valid check digit, 98 will not be a valid check digit, similarly with 02 and 99. The UN CEFACT TBG5 has published a free IBAN validation service in 32 languages for all 57 countries that have adopted the IBAN standard. They have also published the Javascript source code of the verification algorithm. An English language IBAN checker for ECBS member country bank accounts is available on its website. Algorithms Validating the IBAN An IBAN is validated by converting it into an integer and performing a basic mod-97 operation (as described in ISO 7064) on it. If the IBAN is valid, the remainder equals 1. The algorithm of IBAN validation is as follows: Check that the total IBAN length is correct as per the country. If not, the IBAN is invalid Move the four initial characters to the end of the string Replace each letter in the string with two digits, thereby expanding the string, where A = 10, B = 11, ..., Z = 35 Interpret the string as a decimal integer and compute the remainder of that number on division by 97 If the remainder is 1, the check digit test is passed and the IBAN might be valid. Example (fictitious United Kingdom bank, sort code 12-34-56, account number 98765432): {| |• IBAN: ||||align="right"| 1234 5698 7654 32|| |- |• Rearrange: ||||align="right"|12345698765432|| |- |• Convert to integer: ||||align="right"|12345698765432|| |- |• Compute remainder: ||||align="right"|12345698765432|| mod 97 = 1 |} Generating IBAN check digits According to the ECBS "generation of the IBAN shall be the exclusive responsibility of the bank/branch servicing the account". The ECBS document replicates part of the ISO/IEC 7064:2003 standard as a method for generating check digits in the range 02 to 98. Check digits in the ranges 00 to 96, 01 to 97, and 03 to 99 will also provide validation of an IBAN, but the standard is silent as to whether or not these ranges may be used. The preferred algorithm is: Check that the total IBAN length is correct as per the country. If not, the IBAN is invalid. Replace the two check digits by 00 (e.g., GB00 for the UK). Move the four initial characters to the end of the string. Replace the letters in the string with digits, expanding the string as necessary, such that A or a = 10, B or b = 11, and Z or z = 35. Each alphabetic character is therefore replaced by 2 digits Convert the string to an integer (i.e. ignore leading zeroes). Calculate mod-97 of the new number, which results in the remainder. Subtract the remainder from 98 and use the result for the two check digits. If the result is a single-digit number, pad it with a leading 0 to make a two-digit number. Modulo operation on IBAN Any computer programming language or software package that is used to compute D mod 97 directly must have the ability to handle integers of more than 30 digits. In practice, this can only be done by software that either supports arbitrary-precision arithmetic or that can handle 219-bit (unsigned) integers, features that are often not standard. If the application software in use does not provide the ability to handle integers of this size, the modulo operation can be performed in a piece-wise manner (as is the case with the UN CEFACT TBG5 JavaScript program). Piece-wise calculation can be done in many ways. One such way is as follows: Starting from the leftmost digit of D, construct a number using the first 9 digits and call it N. Calculate N mod 97. Construct a new 9-digit N by concatenating the above result (step 2) with the next 7 digits of D. If there are fewer than 7 digits remaining in D but at least one, then construct a new N, which will have less than 9 digits, from the above result (step 2) followed by the remaining digits of D Repeat steps 2–3 until all the digits of D have been processed The result of the final calculation in step 2 will be D mod 97 = N mod 97. Example In this example, the above algorithm for D mod 97 will be applied to D = . (The digits are colour-coded to aid the description below.) If the result is one, the IBAN corresponding to D passes the check digit test. Construct N from the first 9 digits of D N = Calculate N mod 97 = 70 Construct a new 9-digit N from the above result (step 2) followed by the next 7 digits of D. N = 70 Calculate N mod 97 = 29 Construct a new 9-digit N from the above result (step 4) followed by the next 7 digits of D. N = 29 Calculate N mod 97 = 24 Construct a new N from the above result (step 6) followed by the remaining 5 digits of D. N = 24 Calculate N mod 97 = 1 From step 8, the final result is D mod 97 = 1 and the IBAN has passed this check digit test. National check digits In addition to the IBAN check digits, many countries have their own national check digits used within the BBAN, as part of their national account number formats. Each country determines its own algorithm used for assigning and validating the national check digits - some relying on international standards, some inventing their own national standard, and some allowing each bank to decide if or how to implement them. Some algorithms apply to the entire BBAN, and others to one or more of the fields within it. The check digits may be considered an integral part of the account number, or an external field separate from the account number, depending on the country's rules. Most of the variations used are based on two categories of algorithms: - ISO 7064 MOD-97-10: Treat the account number as a large integer, divide it by 97 and use the remainder or its complement as the check digit(s). - Weighted Sum: Treat the account number as a series of individual numbers, multiply each number by a weight value according to its position in the string, sum the products, divide the sum by a modulus (usually 10 or 11) and use the remainder or its complement as the check digit. In both cases, there may first be a translation from alphanumeric characters to numbers using conversion tables. The complement, if used, means the remainder is subtracted from a fixed value, usually the modulus or the modulus plus one (with the common exception that a remainder of 0 results in 0). Note that some of the national specifications define the weights order from right to left, but since the BBAN length in the IBAN is fixed, they can be used from left to right as well. Adoption International bank transactions use either an IBAN or the ISO 9362 Business Identifier Code system (BIC or SWIFT code) in conjunction
of the string. Replace the letters in the string with digits, expanding the string as necessary, such that A or a = 10, B or b = 11, and Z or z = 35. Each alphabetic character is therefore replaced by 2 digits Convert the string to an integer (i.e. ignore leading zeroes). Calculate mod-97 of the new number, which results in the remainder. Subtract the remainder from 98 and use the result for the two check digits. If the result is a single-digit number, pad it with a leading 0 to make a two-digit number. Modulo operation on IBAN Any computer programming language or software package that is used to compute D mod 97 directly must have the ability to handle integers of more than 30 digits. In practice, this can only be done by software that either supports arbitrary-precision arithmetic or that can handle 219-bit (unsigned) integers, features that are often not standard. If the application software in use does not provide the ability to handle integers of this size, the modulo operation can be performed in a piece-wise manner (as is the case with the UN CEFACT TBG5 JavaScript program). Piece-wise calculation can be done in many ways. One such way is as follows: Starting from the leftmost digit of D, construct a number using the first 9 digits and call it N. Calculate N mod 97. Construct a new 9-digit N by concatenating the above result (step 2) with the next 7 digits of D. If there are fewer than 7 digits remaining in D but at least one, then construct a new N, which will have less than 9 digits, from the above result (step 2) followed by the remaining digits of D Repeat steps 2–3 until all the digits of D have been processed The result of the final calculation in step 2 will be D mod 97 = N mod 97. Example In this example, the above algorithm for D mod 97 will be applied to D = . (The digits are colour-coded to aid the description below.) If the result is one, the IBAN corresponding to D passes the check digit test. Construct N from the first 9 digits of D N = Calculate N mod 97 = 70 Construct a new 9-digit N from the above result (step 2) followed by the next 7 digits of D. N = 70 Calculate N mod 97 = 29 Construct a new 9-digit N from the above result (step 4) followed by the next 7 digits of D. N = 29 Calculate N mod 97 = 24 Construct a new N from the above result (step 6) followed by the remaining 5 digits of D. N = 24 Calculate N mod 97 = 1 From step 8, the final result is D mod 97 = 1 and the IBAN has passed this check digit test. National check digits In addition to the IBAN check digits, many countries have their own national check digits used within the BBAN, as part of their national account number formats. Each country determines its own algorithm used for assigning and validating the national check digits - some relying on international standards, some inventing their own national standard, and some allowing each bank to decide if or how to implement them. Some algorithms apply to the entire BBAN, and others to one or more of the fields within it. The check digits may be considered an integral part of the account number, or an external field separate from the account number, depending on the country's rules. Most of the variations used are based on two categories of algorithms: - ISO 7064 MOD-97-10: Treat the account number as a large integer, divide it by 97 and use the remainder or its complement as the check digit(s). - Weighted Sum: Treat the account number as a series of individual numbers, multiply each number by a weight value according to its position in the string, sum the products, divide the sum by a modulus (usually 10 or 11) and use the remainder or its complement as the check digit. In both cases, there may first be a translation from alphanumeric characters to numbers using conversion tables. The complement, if used, means the remainder is subtracted from a fixed value, usually the modulus or the modulus plus one (with the common exception that a remainder of 0 results in 0). Note that some of the national specifications define the weights order from right to left, but since the BBAN length in the IBAN is fixed, they can be used from left to right as well. Adoption International bank transactions use either an IBAN or the ISO 9362 Business Identifier Code system (BIC or SWIFT code) in conjunction with the BBAN (Basic Bank Account Number). EEA and territories The banks of most countries in Europe publish account numbers using both the IBAN format and the nationally recognised identifiers, this being mandatory within the European Economic Area. Day-to-day administration of banking in British Overseas Territories varies from territory to territory; some, such as South Georgia and the South Sandwich Islands, have too small a population to warrant a banking system while others, such as Bermuda, have a thriving financial sector. The use of the IBAN is up to the local government—Gibraltar, being part of the European Union is required to use the IBAN, as are the Crown dependencies, which use the British clearing system, and the British Virgin Islands have chosen to do so. , no other British Overseas Territories have chosen to use the IBAN. Banks in the Caribbean Netherlands also do not use the IBAN. Single Euro Payments Area The IBAN designation scheme was chosen as the foundation for electronic straight-through processing in the European Economic Area. The European Parliament mandated that a bank charge needs to be the same amount for domestic credit transfers as for cross-border credit transfers regulated in decision 2560/2001 (updated in 924/2009). This regulation took effect in 2003. Only payments in euro up to €12,500 to a bank account designated by its IBAN were covered by the regulation, not payments in other currencies. The Euro Payments regulation was the foundation for the decision to create a Single Euro Payments Area (SEPA). The European Central Bank has created the TARGET2 interbank network that unifies the technical infrastructure of the 26 central banks of the European Union (although Sweden has opted out). SEPA is a self-regulatory initiative by the banking sector of Europe as represented in the European Payments Council (EPC). The European Union made the scheme mandatory through the Payment Services Directive published in 2007. Since January 2008, all countries were required to support SEPA credit transfer, and SEPA direct debit was required to be supported since November 2009. The regulation on SEPA payments increased the charge cap (same price for domestic payments as for cross-border payments) to €50,000. With a further decision of the European Parliament, the IBAN scheme for bank accounts fully replaced the domestic numbering schemes from 31 December 2012. On 16 December 2010, the European Commission published regulations that made IBAN support mandatory for domestic credit transfer by 2013 and for domestic direct debit by 2014 (with a 12 and 24 months transition period respectively). Some countries had already replaced their traditional bank account scheme by IBAN. This included Switzerland where IBAN was introduced for national credit transfer on 1 January 2006 and the support for the old bank account numbers was not required from 1 January 2010. Based on a 20 December 2011 memorandum, the EU parliament resolved the mandatory dates for the adoption of the IBAN on 14 February 2012. On 1 February 2014, all national systems for credit transfer and direct debit were abolished and replaced by an IBAN-based system. This was then extended to all cross-border SEPA transactions on 1 February 2016 (Article 5 Section 7). After these dates the IBAN is sufficient to identify an account for home and foreign financial transactions in SEPA countries and banks are no longer permitted to require that the customer supply the BIC for the beneficiary's bank. In the run-up to the 1 February 2014 deadline, it became apparent that many old bank account numbers had not been allocated IBANs—an issue that was addressed on a country-by-country basis. In Germany, for example, Deutsche Bundesbank and the German Banking Industry Committee required that all holders of German bank codes ("Bankleitzahl") published the specifics of their IBAN generation format taking into account not only the generation of check digits but also the handling of legacy bank codes, thereby enabling third parties to generate IBANs independently of the bank. The first such catalogue was published in June 2013 as a variant of the old bank code catalog ("Bankleitzahlendatei"). Non-EEA Banks in numerous non-European countries including most states of the Middle East, North Africa and the Caribbean have implemented the IBAN format for account identification. In some countries the IBAN is used on an ad hoc basis, an example was Ukraine where account numbers
complex ways, like in the sentence: I want to tell you that John Welborn is going to get married to Blair. Here the infinitival clause to get married is contained within the finite dependent clause that John Welborn is going to get married to Blair; this in turn is contained within another infinitival clause, which is contained in the finite independent clause (the whole sentence). The grammatical structure of an infinitival clause may differ from that of a corresponding finite clause. For example, in German, the infinitive form of the verb usually goes to the end of its clause, whereas a finite verb (in an independent clause) typically comes in second position. Clauses with implicit subject in the objective case Following certain verbs or prepositions, infinitives commonly do have an implicit subject, e.g., I want them to eat their dinner. For him to fail now would be a disappointment. As these examples illustrate, the implicit subject of the infinitive occurs in the objective case (them, him) in contrast to the nominative case that occurs with a finite verb, e.g., "They ate their dinner." Such accusative and infinitive constructions are present in Latin and Ancient Greek, as well as many modern languages. The atypical case regarding the implicit subject of an infinitive is an example of exceptional case-marking. As shown in the above examples, the object of the transitive verb "want" and the preposition "for" allude to their respective pronouns' subjective role within the clauses. Marking for tense, aspect and voice In some languages, infinitives may be marked for grammatical categories like voice, aspect, and to some extent tense. This may be done by inflection, as with the Latin perfect and passive infinitives, or by periphrasis (with the use of auxiliary verbs), as with the Latin future infinitives or the English perfect and progressive infinitives. Latin has present, perfect and future infinitives, with active and passive forms of each. For details see . English has infinitive constructions that are marked (periphrastically) for aspect: perfect, progressive (continuous), or a combination of the two (perfect progressive). These can also be marked for passive voice (as can the plain infinitive): (to) eat (plain infinitive, active) (to) be eaten (passive) (to) have eaten (perfect active) (to) have been eaten (perfect passive) (to) be eating (progressive active) (to) be being eaten (progressive passive) (to) have been eating (perfect progressive active) (to) have been being eaten (perfect progressive passive, not often used) Further constructions can be made with other auxiliary-like expressions, like (to) be going to eat or (to) be about to eat, which have future meaning. For more examples of the above types of construction, see . Perfect infinitives are also found in other European languages that have perfect forms with auxiliaries similarly to English. For example, avoir mangé means "(to) have eaten" in French. English Regarding English, the term "infinitive" is traditionally applied to the unmarked form of the verb (the "plain form") when it forms a non-finite verb, whether or not introduced by the particle to. Hence sit and to sit, as used in the following sentences, would each be considered an infinitive: I can sit here all day. I want to sit on the other chair. The form without to is called the bare infinitive; the form introduced by to is called the full infinitive or to-infinitive. The other non-finite verb forms in English are the gerund or present participle (the -ing form), and the past participle – these are not considered infinitives. Moreover, the unmarked form of the verb is not considered an infinitive when it forms a finite verb: like a present indicative ("I sit every day"), subjunctive ("I suggest that he sit"), or imperative ("Sit down!"). (For some irregular verbs the form of the infinitive coincides additionally with that of the past tense and/or past participle, like in the case of put.) Certain auxiliary verbs are defective in that they do not have infinitives (or any other non-finite forms). This applies to the modal verbs (can, must, etc.), as well as certain related auxiliaries like the had of had better and the used of used to. (Periphrases can be employed instead in some cases, like (to) be able to for can, and (to) have to for must.) It also applies to the auxiliary do, like used in questions, negatives and emphasis like described under do-support. (Infinitives are negated by simply preceding them with not. Of course the verb do when forming a main verb can appear in the infinitive.) However, the auxiliary verbs have (used to form the perfect) and be (used to form the passive voice and continuous aspect) both commonly appear in the infinitive: "I should have finished by now"; "It's thought to have been a burial site"; "Let him be released"; "I hope to be working tomorrow." Huddleston and Pullum's Cambridge Grammar of the English Language (2002) does not use the notion of the "infinitive" ("there is no form in the English verb paradigm called 'the infinitive'"), only that of the infinitival clause, noting that English uses the same form of the verb, the plain form, in infinitival clauses that it uses in imperative and present-subjunctive clauses. A matter of controversy among prescriptive grammarians and style writers has been the appropriateness of separating the two words of the to-infinitive (as in "I expect to happily sit here"). For details of this, see split infinitive. Opposing linguistic theories typically do not consider the to-infinitive a distinct constituent, instead regarding the scope of the particle to as an entire verb phrase; thus, to buy a car is parsed like to [buy [a car]], not like [to buy] [a car]. Uses of the infinitive The bare infinitive and the to-infinitive have a variety of uses in English. The two forms are mostly in complementary distribution – certain contexts call for one, and certain contexts for the other; they are not normally interchangeable, except in occasional instances like after the verb help, where either can be used. The main uses of infinitives (or infinitive phrases) are as follows: As complements of other verbs. The bare infinitive form is a complement of the dummy auxiliary do, most modal auxiliary verbs, verbs of perception like see, watch and hear (after a direct object), and the verbs of permission or causation make, bid, let, and have (also after a direct object). The to-infinitive is used after many transitive verbs like want, aim, like, fail, etc., and as an object complement of a direct object regarding verbs like want, convince, aim, etc. In various particular expressions, like had better and would rather (with bare infinitive), in order to, as if to, am to/is to/are to. As a noun phrase, expressing its action or state in an abstract, general way, forming the subject of a clause or a predicative expression: "To err is human"; "To know me is to love me". The bare infinitive can be used in such sentences like "What
direct object), and the verbs of permission or causation make, bid, let, and have (also after a direct object). The to-infinitive is used after many transitive verbs like want, aim, like, fail, etc., and as an object complement of a direct object regarding verbs like want, convince, aim, etc. In various particular expressions, like had better and would rather (with bare infinitive), in order to, as if to, am to/is to/are to. As a noun phrase, expressing its action or state in an abstract, general way, forming the subject of a clause or a predicative expression: "To err is human"; "To know me is to love me". The bare infinitive can be used in such sentences like "What you should do is make a list." A common construction with the to-infinitive involves a dummy pronoun subject (it), with the infinitive phrase placed after the predicate: "It was nice to meet you." Adverbially, to express purpose, intent or result, as the to-infinitive can have the meaning of in order to, e.g. "I closed the door in order to block out any noise." As a modifier of a noun or adjective. This may relate to the meaning of the noun or adjective ("a request to see someone"; "keen to get on"), or it may form a type of non-finite relative clause, like in "the man to save us"; "the method to use"; "nice to listen to". In elliptical questions (direct or indirect): "I don't know where to go." After why the bare infinitive is used: "Why reveal it?" The infinitive is also the usual dictionary form or citation form of a verb. The form listed in dictionaries is the bare infinitive, although the to-infinitive is often used in referring to verbs or in defining other verbs: "The word 'amble' means 'to walk slowly'"; "How do we conjugate the verb to go?" For further detail and examples of the uses of infinitives in English, see Bare infinitive and To-infinitive in the article on uses of English verb forms. Other Germanic languages The original Proto-Germanic ending of the infinitive was -an, with verbs derived from other words ending in -jan or -janan. In German it is -en ("sagen"), with -eln or -ern endings on a few words based on -l or -r roots ("segeln", "ändern"). The use of zu with infinitives is similar to English to, but is less frequent than in English. German infinitives can form nouns, often expressing abstractions of the action, in which case they are of neuter gender: das Essen means the eating, but also the food. In Dutch infinitives also end in -en (zeggen — to say), sometimes used with te similar to English to, e.g., "Het is niet moeilijk te begrijpen" → "It is not hard to understand." The few verbs with stems ending in -a have infinitives in -n (gaan — to go, slaan — to hit). Afrikaans has lost the distinction between the infinitive and present forms of verbs, with the exception of the verbs "wees" (to be), which admits the present form "is", and the verb "hê" (to have), whose present form is "het". In North Germanic languages the final -n was lost from the infinitive as early as 500–540 AD, reducing the suffix to -a. Later it has been further reduced to -e in Danish and some Norwegian dialects (including the written majority language bokmål). In the majority of Eastern Norwegian dialects and a few bordering Western Swedish dialects the reduction to -e was only partial, leaving some infinitives in -a and others in -e (å laga vs. å kaste). In northern parts of Norway the infinitive suffix is completely lost (å lag’ vs. å kast’) or only the -a is kept (å laga vs. å kast’). The infinitives of these languages are inflected for passive voice through the addition of -s or -st to the active form. This suffix appearance in Old Norse was a contraction of mik (“me”, forming -mk) or sik (reflexive pronoun, forming -sk) and was originally expressing reflexive actions: (hann) kallar (“[he] calls”) + -sik (“himself”) > (hann) kallask (“[he] calls himself”). The suffixes -mk and -sk later merged to -s, which evolved to -st in the western dialects. The loss or reduction of -a in active voice in Norwegian did not occur in the passive forms (-ast, -as), except for some dialects that have -es. The other North Germanic languages have the same vowel in both forms. Latin and Romance languages The formation of the infinitive in the Romance languages reflects that in their ancestor, Latin, almost all verbs had an infinitive ending with -re (preceded by one of various thematic vowels). For example, in Italian infinitives end in -are, -ere, -rre (rare), or -ire (which is still identical to the Latin forms), and in -arsi, -ersi, -rsi, -irsi for the reflexive forms. In Spanish and Portuguese, infinitives end in -ar, -er, or -ir (Spanish also has reflexive forms in -arse, -erse, -irse), while similarly in French they typically end in -re, -er, oir, and -ir. In Romanian, both short and long-form infinitives exist; the so-called "long infinitives" end in -are, -ere, -ire and in modern speech are used exclusively as verbal nouns, while there are a few verbs that cannot be converted into the nominal long infinitive. The "short infinitives" used in verbal contexts (e.g., after an auxiliary verb) have the endings -a,-ea, -e, and -i (basically removing the ending in "-re"). In Romanian, the infinitive is usually replaced by a clause containing the conjunction să plus the subjunctive mood. The only verb that is modal in common modern Romanian is the verb a putea, to be able to. However, in popular speech the infinitive after a putea is also increasingly replaced by the subjunctive. In all Romance languages, infinitives can also form nouns. Latin infinitives challenged several of the generalizations about infinitives. They did inflect for voice (amare, "to love", amari, to be loved) and for tense (amare, "to love", amavisse, "to have loved"), and allowed for an overt expression of the subject (video Socratem currere, "I see Socrates running"). See . Romance languages inherited from Latin the possibility of an overt expression of the subject (as in Italian vedo Socrate correre). Moreover, the "inflected infinitive'''" (or "personal infinitive") found in Portuguese and Galician inflects for person and number. These, alongside Sardinian, are the only Indo-European languages that allow infinitives to take person and number endings. This helps to make infinitive clauses very common in these languages; for example, the English finite clause in order that you/she/we have... would be translated to Portuguese like para teres/ela ter/termos... (Portuguese is a null-subject language). The Portuguese personal infinitive has no proper tenses, only aspects (imperfect and perfect), but tenses can be expressed using periphrastic structures. For instance, "even though you sing/have sung/are going to sing" could be translated to "apesar de cantares/teres cantado/ires cantar". Other Romance languages (including Spanish, Romanian, Catalan, and some Italian dialects) allow uninflected infinitives to combine with overt nominative subjects. For example, Spanish al abrir yo los ojos ("when I opened my eyes") or sin yo saberlo ("without my knowing about it"). Hellenic languages Ancient Greek In Ancient Greek the infinitive has four tenses (present, future, aorist, perfect) and three voices (active, middle, passive). Present and perfect have the same infinitive for both middle and passive, while future and aorist have separate middle and passive forms. Thematic verbs form present active infinitives by adding to the stem the thematic vowel and the infinitive ending , and contracts to , e.g., . Athematic verbs, and perfect actives and aorist passives, add the suffix instead, e.g., . In the middle and passive, the present middle infinitive ending is , e.g., and most tenses of thematic verbs add an additional between the ending and the stem, e.g., . Modern Greek The infinitive per se does not exist in Modern Greek. To see this, consider the ancient Greek ἐθέλω γράφειν “I want to write”. In modern Greek this becomes θέλω να γράψω “I want that I write”. In modern Greek, the infinitive has thus changed form and function and is used mainly in the formation of periphrastic tense forms and not with an article or alone. Instead of the Ancient Greek infinitive system γράφειν, γράψειν, γράψαι, γεγραφέναι, Modern Greek uses only the form γράψει, a development of the ancient Greek aorist infinitive γράψαι. This form is also invariable. The modern Greek infinitive has only two forms according to voice: for example, γράψει for the active voice and γραφ(τ)εί for the passive voice (coming from the ancient passive aorist infinitive γραφῆναι). Balto-Slavic languages The infinitive in Russian usually ends in -t’ (ть) preceded by a thematic vowel, or -ti (ти), if not preceded by one; some verbs have a stem ending in a consonant and change the t to č’, like *mogt’ → moč’ (*могть → мочь) "can". Some other Balto-Slavic languages have the infinitive typically ending in, for example, -ć (sometimes -c) in Polish, -t’ in Slovak, -t (formerly -ti) in Czech and Latvian (with a handful ending in -s on the latter), -ty (-ти) in Ukrainian, -ць (-ts') in Belarusian. Lithuanian infinitives end in -ti, Croatian in -ti or -ći, and Slovenian in -ti or -či.Serbian officially retains infinitives -ti or -ći, but is more flexible than the other slavic languages in breaking the infinitive through a clause. The infinitive nevertheless remains the dictionary form. Bulgarian and Macedonian have lost the infinitive altogether except in a handful of frozen expressions where it is the same as the 3rd person singular aorist form. Almost all expressions where an infinitive may be used in Bulgarian are listed here; neverthess in all cases a subordinate clause is the more usual form. For that reason, the present first-person singular conjugation is the dictionary form in Bulgarian, while Macedonian uses the third person singular form of the verb in present tense. Hebrew Hebrew has two infinitives, the infinitive absolute and the infinitive construct. The infinitive construct is used after prepositions and is inflected with pronominal endings to indicate its subject or object: bikhtōbh hassōphēr "when the scribe wrote", ahare lekhtō "after his going". When the infinitive construct is preceded by (lə-, li-, lā-, lo-) "to", it has a similar meaning to the English to-infinitive, and this is its most frequent use in Modern Hebrew. The infinitive absolute is used for verb focus and emphasis, like in
Popular devotion and Ineffabilis Deus The eventual creation of the dogma was due more to popular devotion than scholarship. The Immaculate Conception became a popular subject in literature and art, and some devotees went so far as to hold that Anne had conceived Mary by kissing her husband Joachim, and that Anne's father and grandmother had likewise been conceived without sexual intercourse, although St Bridget of Sweden (c.1303–1373) told how Mary herself had revealed to her that Anne and Joachim conceived their daughter through a sexual union which was sinless because it was pure and free of sexual lust. In the 16th and especially the 17th centuries there was a proliferation of Immaculatist devotion in Spain, leading the Habsburg monarchs to demand that the papacy elevate the belief to the status of dogma. In France in 1830 Catherine Labouré (May 2, 1806 – December 31, 1876) saw a vision of Mary as the Immaculate Conception standing on a globe while a voice commanded her to have a medal made in imitation of what she saw, and her vision marked the beginning of a great 19th-century Marian revival. In 1849 Pope Pius IX asked the Bishops of the Church for their views on whether the doctrine should be defined as dogma; ninety percent of those who responded were supportive, and in 1854 the Immaculate Conception dogma was proclaimed with the bull Ineffabilis Deus. Although the Archbishop of Paris, Marie-Dominique-Auguste Sibour, warned that the Immaculate Conception "could be proved neither from the Scriptures nor from tradition" he was present at the promulgation of the decree and shortly afterwards solemnly published it in his own diocese. Ineffabilis Deus found the Immaculate Conception in the Ark of Salvation (Noah's Ark), Jacob's Ladder, the Burning Bush at Sinai, the Enclosed Garden from the Song of Songs, and many more passages. From this wealth of support the pope's advisors singled out Genesis 3:15: "The most glorious Virgin ... was foretold by God when he said to the serpent: 'I will put enmity between you and the woman, a prophecy which reached fulfilment in the figure of the Woman in the Revelation of John, crowned with stars and trampling the Dragon underfoot. Luke 1:28, and specifically the phrase "full of grace" by which Gabriel greeted Mary, was another reference to her Immaculate Conception: "she was never subject to the curse and was, together with her Son, the only partaker of perpetual benediction." Ineffabilis Deus was one of the pivotal events of the papacy of Pius, pope from 16 June 1846 to his death on 7 February 1878. Up until this point it had been understood that dogma had to be based in Scripture and accepted by tradition, but Mary's immaculate conception is not stated in the New Testament and cannot be deduced from it; Ineffabilis Deus therefore was a novelty, being based instead on the declaration of a special commission to the effect that neither Scripture nor tradition were necessary to define dogma, but only the authority of the Church expressed in the Pope. The commission Pius IX had called together declared that neither scriptural proof nor a broad and ancient stream of tradition was required to promulgate Mary's Immaculate Conception. It insisted, further, that the authority of the church today is quite sufficient to define this dogma. Four years after the proclamation of the dogma, in 1858, Mary appeared to the young Bernadette Soubirous at Lourdes in southern France, to announce that she was the Immaculate Conception. Feast, patronages and disputes The feast day of the Immaculate Conception is December 8. Its celebration seems to have begun in the Eastern church in the 7th century and may have spread to Ireland by the 8th, although the earliest well-attested record in the Western church is from England early in the 11th. It was suppressed there after the Norman Conquest (1066), and the first thorough exposition of the doctrine was a response to this suppression. It continued to spread through the 15th century despite accusations of heresy from the Thomists and strong objections from several prominent theologians. Beginning around 1140 St Bernard of Clairvaux, a Cistercian monk, wrote to Lyons Cathedral to express his surprise and dissatisfaction that it had recently begun to be observed there, but in 1477 Pope Sixtus IV, a Franciscan Scotist and devoted Immaculist, placed it on the Roman calendar (i.e., list of Church festivals and observances) via the bull Cum praexcelsa. Thereafter in 1481 and 1483, in response to the polemic writings of the prominent Thomist, Vincenzo Bandello, Pope Sixtus IV published two more bulls which forbade anybody to preach or teach against the Immaculate Conception, or for either side to accuse the other of heresy, on pains of excommunication. Pope Pius V kept the feast on the tridentine calendar but suppressed the word "immaculate". Gregory XV in 1622 prohibited any public or private assertion that Mary was conceived in sin. Urban VIII in 1624 allowed the Franciscans to establish a military order dedicated to the Virgin of the Immaculate Conception. Following the promulgation of Ineffabilis Deus the typically Franciscan phrase "immaculate conception" reasserted itself in the title and euchology (prayer formulae) of the feast. Pius IX solemnly promulgated a mass formulary drawn chiefly from one composed 400 years by a papal chamberlain at the behest of Sixtus IV, beginning "O God who by the Immaculate Conception of the Virgin...". By pontifical decree a number of countries are considered to be under the patronage of the
the pivotal events of the papacy of Pius, pope from 16 June 1846 to his death on 7 February 1878. Up until this point it had been understood that dogma had to be based in Scripture and accepted by tradition, but Mary's immaculate conception is not stated in the New Testament and cannot be deduced from it; Ineffabilis Deus therefore was a novelty, being based instead on the declaration of a special commission to the effect that neither Scripture nor tradition were necessary to define dogma, but only the authority of the Church expressed in the Pope. The commission Pius IX had called together declared that neither scriptural proof nor a broad and ancient stream of tradition was required to promulgate Mary's Immaculate Conception. It insisted, further, that the authority of the church today is quite sufficient to define this dogma. Four years after the proclamation of the dogma, in 1858, Mary appeared to the young Bernadette Soubirous at Lourdes in southern France, to announce that she was the Immaculate Conception. Feast, patronages and disputes The feast day of the Immaculate Conception is December 8. Its celebration seems to have begun in the Eastern church in the 7th century and may have spread to Ireland by the 8th, although the earliest well-attested record in the Western church is from England early in the 11th. It was suppressed there after the Norman Conquest (1066), and the first thorough exposition of the doctrine was a response to this suppression. It continued to spread through the 15th century despite accusations of heresy from the Thomists and strong objections from several prominent theologians. Beginning around 1140 St Bernard of Clairvaux, a Cistercian monk, wrote to Lyons Cathedral to express his surprise and dissatisfaction that it had recently begun to be observed there, but in 1477 Pope Sixtus IV, a Franciscan Scotist and devoted Immaculist, placed it on the Roman calendar (i.e., list of Church festivals and observances) via the bull Cum praexcelsa. Thereafter in 1481 and 1483, in response to the polemic writings of the prominent Thomist, Vincenzo Bandello, Pope Sixtus IV published two more bulls which forbade anybody to preach or teach against the Immaculate Conception, or for either side to accuse the other of heresy, on pains of excommunication. Pope Pius V kept the feast on the tridentine calendar but suppressed the word "immaculate". Gregory XV in 1622 prohibited any public or private assertion that Mary was conceived in sin. Urban VIII in 1624 allowed the Franciscans to establish a military order dedicated to the Virgin of the Immaculate Conception. Following the promulgation of Ineffabilis Deus the typically Franciscan phrase "immaculate conception" reasserted itself in the title and euchology (prayer formulae) of the feast. Pius IX solemnly promulgated a mass formulary drawn chiefly from one composed 400 years by a papal chamberlain at the behest of Sixtus IV, beginning "O God who by the Immaculate Conception of the Virgin...". By pontifical decree a number of countries are considered to be under the patronage of the Immaculate Conception. These include Argentina, Brazil, Korea, Nicaragua, Paraguay, the Philippines, Spain (including the old kingdoms and the present state), the United States and Uruguay. By royal decree under the House of Bragança, she is the principal Patroness of Portugal. Prayers and hymns The Roman Missal and the Roman Rite Liturgy of the Hours naturally includes references to Mary's immaculate conception in the feast of the Immaculate Conception. An example is the antiphon that begins: "Tota pulchra es, Maria, et macula originalis non est in te" ("You are all beautiful, Mary, and the original stain [of sin] is not in you." It continues: "Your clothing is white as snow, and your face is like the sun. You are all beautiful, Mary, and the original stain [of sin] is not in you. You are the glory of Jerusalem, you are the joy of Israel, you give honour to our people. You are all beautiful, Mary.") On the basis of the original Gregorian chant music, polyphonic settings have been composed by Anton Bruckner, Pablo Casals, Maurice Duruflé, Grzegorz Gerwazy Gorczycki, Ola Gjeilo, José Maurício Nunes Garcia, and . Other prayers honouring Mary's immaculate conception are in use outside the formal liturgy. The Immaculata prayer, composed by Saint Maximillian Kolbe, is a prayer of entrustment to Mary as the Immaculata. A novena of prayers, with a specific prayer for each of the nine days has been composed under the title of the Immaculate Conception Novena. Ave Maris Stella is the vesper hymn of the feast of the Immaculate Conception. The hymn Immaculate Mary, addressed to Mary as the Immaculately Conceived One, is closely associated with Lourdes. Artistic representation The Immaculate Conception became a popular subject in literature, but its abstract nature meant it was late in appearing as a subject in art. During the Medieval period it was depicted as "Joachim and Anne Meeting at the Golden Gate", meaning Mary's conception through the chaste kiss of her parents at the Golden Gate in Jerusalem; the 14th and 15th centuries were the heyday for this scene, after which it was gradually replaced by more allegorical depictions featuring an adult Mary. The 1476 extension of the feast of the Immaculate Conception to the entire Latin Church reduced the likelihood of controversy for the artist or patron in depicting an image, so that emblems depicting The Immaculate Conception began to appear. Many artists in the 15th century faced the problem of how to depict an abstract idea such as the Immaculate Conception, and the problem was not fully solved for 150 years. The Italian Renaissance artist Piero di Cosimo was among those artists who tried new solutions, but none of these became generally adopted so that the subject matter would be immediately recognisable to the faithful. The definitive iconography for the depiction of "Our Lady" seems to have been finally established by the painter and theorist Francisco Pacheco in his "El arte de la pintura" of 1649: a beautiful young girl of 12 or 13, wearing a white tunic and blue mantle, rays of light emanating from her head ringed by twelve stars and crowned by an imperial crown, the sun behind her and the moon beneath her feet. Pacheco's iconography influenced other Spanish artists or artists active in Spain such as El Greco, Bartolomé Murillo, Diego Velázquez, and Francisco Zurbarán, who each produced a number of artistic masterpieces based on the use of these same symbols. The popularity of this particular representation of The Immaculate Conception spread across the rest of Europe, and has since remained the best known artistic depiction of the concept: in a heavenly realm, moments after her creation, the spirit of
has been criticised on the grounds that it excludes most of the islands in the North Atlantic, and also that the only island referred to by the term that is actually in the North Atlantic Ocean is Ireland. Great Britain is in fact in between the Irish Sea and The North Sea. It has been used particularly in the context of the Northern Irish peace process during the negotiation of the Good Friday Agreement, as a neutral name for the proposed council. One feature of this name is that IONA has the same spelling as the island of Iona which is off the coast of Scotland but with which Irish people have strong cultural associations. It is therefore a name with which people of both main islands might identify. Taoiseach Bertie Ahern noted the symbolism in a 2006 address in Edinburgh:[The Island of] Iona is a powerful symbol of relationships between these islands, with its ethos of service not dominion. Iona also radiated out towards the Europe of the Dark Ages, not to mention Pagan England at Lindisfarne. The British-Irish Council is the expression of a relationship that at the origin of the Anglo-Irish process in 1981 was sometimes given the name Iona, islands of the North Atlantic, and sometimes Council of the Isles, with its evocation of the Lords of the Isles of the 14th and 15th centuries who spanned the North Channel. In
the North Atlantic, and sometimes Council of the Isles, with its evocation of the Lords of the Isles of the 14th and 15th centuries who spanned the North Channel. In the 17th century, Highland warriors and persecuted Presbyterian Ministers criss-crossed the North Channel. In a Dáil Éireann debate, Proinsias De Rossa was less enthusiastic: The acronym IONA is a useful way of addressing the coming together of these two islands. However, the island of Iona is probably a green heaven in that nobody lives on it and therefore it cannot be polluted in any way. Outside the Northern Ireland peace process the term IONA is used by the World Universities Debating Championship and in inter-varsity debating competitions throughout Britain and Ireland. In this context IONA is one of the regions
75-MHz version (3× 25 MHz multiplier), and a 100-MHz version (3× 33.3 MHz). Both chips were released in March 1994. A version of IntelDX4 featuring write-back cache was released in October 1994. The original write-through versions of the chip are marked with a laser-embossed “&E,” while the write-back-enabled versions are marked “&EW.” i486 OverDrive editions of IntelDX4 had locked multipliers, and therefore can only run at 3× the external clock speed. The 100-MHz model of the processor had an iCOMP rating of 435, while the 75-MHz processor had
in March 1994. A version of IntelDX4 featuring write-back cache was released in October 1994. The original write-through versions of the chip are marked with a laser-embossed “&E,” while the write-back-enabled versions are marked “&EW.” i486 OverDrive editions of IntelDX4 had locked multipliers, and therefore can only run at 3× the external clock speed. The 100-MHz model of the processor had an iCOMP rating of 435, while the 75-MHz processor had a rating of 319. IntelDX4 was an OEM-only product, but the DX4 Overdrive could be purchased at a retail store. The IntelDX4 microprocessor is mostly pin-compatible
Iapetus (moon), one of the planet Saturn's moons, named for the mythological Titan Iapetus Ocean,
Iapetus (moon), one of the planet Saturn's moons, named for the mythological Titan Iapetus Ocean, an ancient ocean between the paleocontinents Laurentia
Banana of Discord' side contest; the distinction is given to the entry with scores with the highest standard deviation. In 2016, operation of the competition was taken over by the Interactive Fiction Technology Foundation. The competition differs from the XYZZY Awards, as authors must specifically submit games to the Interactive Fiction Competition, but all games released in the past year are eligible for the XYZZY Awards. Many games win awards in both competitions. Winners The following is a list of first place winners to date: 2021: And Then You Come to a House Not Unlike the Previous One by B.J. Best 2020: The Impossible Bottle by Linus Åkesson and Tavern Crawler by Josh Labelle (tie) 2019: Zozzled by Steph Cherrywell 2018: Alias "The Magpie" by J. J. Guest 2017: The Wizard Sniffer by Buster Hudson 2016: Detectiveland by Robin Johnson 2015: Brain Guzzlers from Beyond! by Steph Cherrywell 2014: Hunger Daemon by Sean M. Shore 2013: Coloratura by Lynnea Glasser 2012: Andromeda Apocalypse by Marco Innocenti 2011: Taco Fiction by Ryan Veeder 2010: Aotearoa by Matt Wigdahl 2009: Rover's Day Out by Jack Welch and Ben Collins-Sussman 2008: Violet by Jeremy Freese 2007: Lost Pig by Admiral Jota (writing as Grunk) 2006: Floatpoint by Emily Short 2005: Vespers by Jason Devlin 2004: Luminous Horizon by Paul O'Brian 2003: Slouching Towards Bedlam by Star Foster and Daniel Ravipinto 2002: Another Earth, Another Sky by Paul O'Brian 2001: All Roads by Jon Ingold 2000: Kaged by Ian Finley 1999: Winter Wonderland by Laura A. Knauth 1998: Photopia
by Josh Labelle (tie) 2019: Zozzled by Steph Cherrywell 2018: Alias "The Magpie" by J. J. Guest 2017: The Wizard Sniffer by Buster Hudson 2016: Detectiveland by Robin Johnson 2015: Brain Guzzlers from Beyond! by Steph Cherrywell 2014: Hunger Daemon by Sean M. Shore 2013: Coloratura by Lynnea Glasser 2012: Andromeda Apocalypse by Marco Innocenti 2011: Taco Fiction by Ryan Veeder 2010: Aotearoa by Matt Wigdahl 2009: Rover's Day Out by Jack Welch and Ben Collins-Sussman 2008: Violet by Jeremy Freese 2007: Lost Pig by Admiral Jota (writing as Grunk) 2006: Floatpoint by Emily Short 2005: Vespers by Jason Devlin 2004: Luminous Horizon by Paul O'Brian 2003: Slouching Towards Bedlam by Star Foster and Daniel Ravipinto 2002: Another Earth, Another Sky by Paul O'Brian 2001: All Roads by Jon Ingold 2000: Kaged by Ian Finley 1999: Winter Wonderland by Laura A. Knauth 1998: Photopia by Adam Cadre 1997: The Edifice by Lucian P. Smith 1996: The Meteor, the Stone and a Long Glass of Sherbet by Graham Nelson 1995: Tie: A Change in the Weather by Andrew Plotkin, Uncle Zebulon's Will by Magnus Olsson Reception A reviewer for The A.V. Club said of the 2008 competition, "Once again, the IF Competition delivers some of the best writing in games." The 2008 competition was described as containing "some real standouts both in quality of puzzles and a willingness to stretch the definition of
immunity in the United States, the legal privilege by which the American federal, state, and tribal governments cannot be sued Spousal privilege, also called spousal immunity, protects a spouse from testifying against the defendant State immunity, principle of international law that the government of a state is not amenable before the courts of another state Witness immunity, immunity granted to a witness in exchange for testimony Other Immunity (Rupert Hine album) Immunity (Jon Hopkins album) Immunity (Clairo album) Immunity (reality television), a condition which protects a contestant on a reality
diplomats from local laws Immunity from prosecution (international law), exclusion of governments or their officials from prosecution under international law Judicial immunity, immunity of a judge or magistrate in the course of their official duties Parliamentary immunity, immunity granted to elected officials during their tenure and in the course of their duties Qualified immunity, in the United States, immunity of individuals performing tasks as part of the government's actions Sovereign immunity, the prevention of lawsuits or prosecution against rulers or governments without their given consent Sovereign immunity in the United States, the legal privilege by which the American federal, state, and tribal governments cannot be sued Spousal privilege, also called spousal immunity, protects a spouse from testifying against the defendant State immunity, principle of international
of a notifiable accident, poisoning or disease. The senior coroner can also call a jury at his or her own discretion. This discretion has been heavily litigated in light of the Human Rights Act 1998, which means that juries are required now in a broader range of situations than expressly required by statute. Scope of inquest The purpose of the inquest is to answer four questions: Identity of the deceased Place of death Time of death How the deceased came by their death Evidence must be solely for the purpose of answering these questions and no other evidence is admitted. It is not for the inquest to ascertain "how the deceased died" or "in what broad circumstances", but "how the deceased came by his death", a more limited question. Moreover, it is not the purpose of the inquest to determine, or appear to determine, criminal or civil liability, to apportion guilt or attribute blame. For example, where a prisoner hanged himself in a cell, he came by his death by hanging and it was not the role of the inquest to enquire into the broader circumstances such as the alleged neglect of the prison authorities that might have contributed to his state of mind or given him the opportunity. However, the inquest should set out as many of the facts as the public interest requires. Under the terms of article 2 of the European Convention of Human Rights, governments are required to "establish a framework of laws, precautions, procedures and means of enforcement which will, to the greatest extent reasonably practicable, protect life". The European Court of Human Rights has interpreted this as mandating independent official investigation of any death where public servants may be implicated. Since the Human Rights Act 1998 came into force, in those cases alone, the inquest is now to consider the broader question "by what means and in what circumstances". In disasters, such as the 1987 King's Cross fire, a single inquest may be held into several deaths. Procedure Inquests are governed by the Rules. The coroner gives notice to near relatives, those entitled to examine witnesses and those whose conduct is likely to be scrutinised. Inquests are held in public except where there are real issues and substantial of national security but only the portions which relate to national security will be held behind closed doors. Individuals with an interest in the proceedings, such as relatives of the deceased, individuals appearing as witnesses, and organisations or individuals who may face some responsibility in the death of the individual, may be represented by a legal professional be that a solicitor or barrister at the discretion of the coroner. Witnesses may be compelled to testify subject to the privilege against self-incrimination. If there are matters of National Security or matters which relate to sensitive matters then under Schedule 1 of the Coroners and Justice Act 2009 an inquest may be suspended
was or was suspected to be an industrial disease The death relates to public health or the general health or welfare of the public-at-large The coroner must hold an inquest where the death is: Violent or unnatural Sudden and of unknown cause In prison or police custody Suspected to be suicide Where the cause of death is unknown, the coroner may order a post mortem examination in order to determine whether the death was violent. If the death is found to be non-violent, an inquest is unnecessary. In 2004 in England and Wales, there were 514,000 deaths of which 225,500 were referred to the coroner. Of those, 115,800 resulted in post-mortem examinations and there were 28,300 inquests, 570 with a jury. In 2014 the Royal College of Pathologists claimed that up to 10,000 deaths a year recorded as being from natural causes should have been investigated by inquests. They were particularly concerned about people whose death occurred as a result of medical errors. "We believe a medical examiner would have been alerted to what was going on in Mid-Staffordshire long before this long list of avoidable deaths reached the total it did," said Archie Prentice, the pathologists' president. Juries A coroner must summon a jury for an inquest if the death was not a result of natural causes and occurred when the deceased was in state custody (for example in prison, police custody, or whilst detained under the Mental Health Act 1983); or if it was the result of an act or omission of a police officer; or if it was a result of a notifiable accident, poisoning or disease. The senior coroner can also call a jury at his or her own discretion. This discretion has been heavily litigated in light of the Human Rights Act 1998, which means that juries are required now in a broader range of situations than expressly required by statute. Scope of inquest The purpose of the inquest is to answer four questions: Identity of the deceased Place of death Time of death How the deceased came by their death Evidence must be solely for the purpose of answering these questions and no other evidence is admitted. It is not for the inquest to ascertain "how the deceased
in the Halo series of video games Periodicals and news portals Index Magazine, a publication for art and culture Index.hr, a Croatian online newspaper index.hu, a Hungarian-language news and community portal The Index (Kalamazoo College), a student newspaper The Index, an 1860s European propaganda journal created by Henry Hotze to support the Confederate States of America Truman State University Index, a student newspaper Other arts, entertainment and media The Index (band) Indexed, a Web cartoon by Jessica Hagy Index, album by Ana Mena Business enterprises and events Index (retailer), a former UK catalogue retailer INDEX, a market research fair in Lucknow, India Index Corporation, a Japanese video game developer Finance Index fund, a collective investment scheme Stock market index, a statistical average of prices of selected securities Places in the United States Index, Arkansas, an unincorporated community Index, Kentucky, an unincorporated community Index, Missouri, a ghost town Index, New York, a hamlet in Hartwick and Otsego, New York Index, Virginia, an unincorporated community Index, Washington, a town Index, West Virginia, an unincorporated community Publishing and library studies Bibliographic index, a regularly updated publication that lists articles, books, or other information items Citation index The Index,
single number calculated from an array of prices and quantities Price index, a typical price for some good or service Mathematics and statistics Index, a number or other symbol that specifies an element of an indexed family or set Index, an element of an index set Index, the label of a summand in Σ-notation of a summation Algebra Index of a subgroup, the number of a subgroup's left cosets Index, the degree of an nth root Index of a linear map, the dimension of the map's kernel minus the dimension of its cokernel Index of a matrix Index of a real quadratic form Analysis Index, the winding number of an oriented closed curve on a surface relative to a point on that surface Diversity index, a measure of distribution or variety in fields such as ecology or information science Index of a vector field, an integer that helps to describe the behaviour of a vector field around an isolated zero Number theory Index, or the discrete logarithm of a number Statistics Index (statistics), a type of aggregate measure Scale (social sciences), a method of reporting data in social sciences, sometimes called an index Other uses in science and technology Dental indices, standardized scoring systems for tooth problems Indexicality, in linguistics,
stored on film. The first description of a computer searching for information was described by Holmstrom in 1948, detailing an early mention of the Univac computer. Automated information retrieval systems were introduced in the 1950s: one even featured in the 1957 romantic comedy, Desk Set. In the 1960s, the first large information retrieval research group was formed by Gerard Salton at Cornell. By the 1970s several different retrieval techniques had been shown to perform well on small text corpora such as the Cranfield collection (several thousand documents). Large-scale retrieval systems, such as the Lockheed Dialog system, came into use early in the 1970s. In 1992, the US Department of Defense along with the National Institute of Standards and Technology (NIST), cosponsored the Text Retrieval Conference (TREC) as part of the TIPSTER text program. The aim of this was to look into the information retrieval community by supplying the infrastructure that was needed for evaluation of text retrieval methodologies on a very large text collection. This catalyzed research on methods that scale to huge corpora. The introduction of web search engines has boosted the need for very large scale retrieval systems even further. Applications Areas where information retrieval techniques are employed include (the entries are in alphabetical order within each category): General applications Digital libraries Information filtering Recommender systems Media search Blog search Image retrieval 3D retrieval Music retrieval News search Speech retrieval Video retrieval Search engines Site search Desktop search Enterprise search Federated search Mobile search Social search Web search Domain-specific applications Expert search finding Genomic information retrieval Geographic information retrieval Information retrieval for chemical structures Information retrieval in software engineering Legal information retrieval Vertical search Other retrieval methods Methods/Techniques in which information retrieval techniques are employed include: Adversarial information retrieval Automatic summarization Multi-document summarization Compound term processing Cross-lingual retrieval Document classification Spam filtering Question answering Model types For effectively retrieving relevant documents by IR strategies, the documents are typically transformed into a suitable representation. Each retrieval strategy incorporates a specific model for its document representation purposes. The picture on the right illustrates the relationship of some common models. In the picture, the models are categorized according to two dimensions: the mathematical basis and the properties of the model. First dimension: mathematical basis Set-theoretic models represent documents as sets of words or phrases. Similarities are usually derived from set-theoretic operations on those sets. Common models are: Standard Boolean model Extended Boolean model Fuzzy retrieval Algebraic models represent documents and queries usually as vectors, matrices, or tuples. The similarity of the query vector and document vector is represented as a scalar value. Vector space model Generalized vector space model (Enhanced) Topic-based Vector Space Model Extended Boolean model Latent semantic indexing a.k.a. latent semantic analysis Probabilistic models treat the process of document retrieval as a probabilistic inference. Similarities are computed as probabilities that a document is relevant for a given query. Probabilistic theorems like the Bayes' theorem are often used in these models. Binary Independence Model Probabilistic relevance model on which is based the okapi (BM25) relevance function Uncertain inference Language models Divergence-from-randomness model Latent Dirichlet allocation Feature-based retrieval models view documents as vectors of values of feature functions (or just features) and seek the best way to combine these features into a single relevance score, typically by learning to rank methods. Feature functions are arbitrary functions of document and query, and as such can easily incorporate almost any other retrieval model as just another feature. Second dimension: properties of the model Models without term-interdependencies treat different terms/words as independent. This fact is usually represented in vector space models by the orthogonality assumption of term vectors or in probabilistic models by an independency assumption for term variables. Models with immanent term interdependencies allow a representation of interdependencies between terms. However the degree of the interdependency between two terms is defined by the model itself. It is usually directly or indirectly derived (e.g. by dimensional reduction) from the co-occurrence of those terms in the whole set of documents. Models with transcendent term interdependencies allow a representation of interdependencies between terms, but they do not allege how the interdependency between two terms is defined. They rely an external source for the degree of interdependency between two terms. (For example, a human or sophisticated algorithms.) Performance and correctness measures The evaluation of an information retrieval system' is the process of assessing how well a system meets the information needs of its users. In general, measurement considers a collection of documents to be searched and a search query. Traditional evaluation metrics, designed for Boolean retrieval or top-k retrieval, include precision and recall. All measures assume a ground truth notion of relevancy: every document is known to be either relevant or non-relevant to a particular query. In practice, queries may be ill-posed and there may be different shades of relevancy. Timeline Before the 1900s 1801: Joseph Marie Jacquard invents the Jacquard loom, the first machine to use punched cards to control a sequence of operations. 1880s: Herman Hollerith invents an electro-mechanical data tabulator using punch cards as a machine readable medium. 1890 Hollerith cards, keypunches and tabulators used to process the 1890 US Census data. 1920s-1930s Emanuel Goldberg submits patents for his "Statistical Machine” a document search engine that used photoelectric cells and pattern recognition to search the metadata on rolls of microfilmed documents. 1940s–1950s late 1940s: The US military confronted problems of indexing and retrieval of wartime scientific research documents captured from Germans. 1945: Vannevar Bush's As We May Think appeared in Atlantic Monthly. 1947: Hans Peter Luhn (research engineer at IBM since 1941) began work on a mechanized punch card-based system for searching chemical compounds. 1950s: Growing concern in the US for a "science gap" with the USSR motivated, encouraged funding and provided a backdrop for mechanized literature searching systems (Allen Kent et al.) and the invention of the citation index by Eugene Garfield. 1950: The term "information retrieval" was coined by Calvin Mooers. 1951: Philip Bagley conducted the earliest experiment in computerized
"crisis of scientific information." The report was named after Dr. Alvin Weinberg. Joseph Becker and Robert M. Hayes published text on information retrieval. Becker, Joseph; Hayes, Robert Mayo. Information storage and retrieval: tools, elements, theories. New York, Wiley (1963). 1964: Karen Spärck Jones finished her thesis at Cambridge, Synonymy and Semantic Classification, and continued work on computational linguistics as it applies to IR. The National Bureau of Standards sponsored a symposium titled "Statistical Association Methods for Mechanized Documentation." Several highly significant papers, including G. Salton's first published reference (we believe) to the SMART system. mid-1960s: National Library of Medicine developed MEDLARS Medical Literature Analysis and Retrieval System, the first major machine-readable database and batch-retrieval system. Project Intrex at MIT. 1965: J. C. R. Licklider published Libraries of the Future. 1966: Don Swanson was involved in studies at University of Chicago on Requirements for Future Catalogs. late 1960s: F. Wilfrid Lancaster completed evaluation studies of the MEDLARS system and published the first edition of his text on information retrieval. 1968: Gerard Salton published Automatic Information Organization and Retrieval. John W. Sammon, Jr.'s RADC Tech report "Some Mathematics of Information Storage and Retrieval..." outlined the vector model. 1969: Sammon's "A nonlinear mapping for data structure analysis" (IEEE Transactions on Computers) was the first proposal for visualization interface to an IR system. 1970s early 1970s: First online systems—NLM's AIM-TWX, MEDLINE; Lockheed's Dialog; SDC's ORBIT. Theodor Nelson promoting concept of hypertext, published Computer Lib/Dream Machines. 1971: Nicholas Jardine and Cornelis J. van Rijsbergen published "The use of hierarchic clustering in information retrieval", which articulated the "cluster hypothesis." 1975: Three highly influential publications by Salton fully articulated his vector processing framework and term discrimination model: A Theory of Indexing (Society for Industrial and Applied Mathematics) A Theory of Term Importance in Automatic Text Analysis (JASIS v. 26) A Vector Space Model for Automatic Indexing (CACM 18:11) 1978: The First ACM SIGIR conference. 1979: C. J. van Rijsbergen published Information Retrieval (Butterworths). Heavy emphasis on probabilistic models. 1979: Tamas Doszkocs implemented the CITE natural language user interface for MEDLINE at the National Library of Medicine. The CITE system supported free form query input, ranked output and relevance feedback. 1980s 1980: First international ACM SIGIR conference, joint with British Computer Society IR group in Cambridge. 1982: Nicholas J. Belkin, Robert N. Oddy, and Helen M. Brooks proposed the ASK (Anomalous State of Knowledge) viewpoint for information retrieval. This was an important concept, though their automated analysis tool proved ultimately disappointing. 1983: Salton (and Michael J. McGill) published Introduction to Modern Information Retrieval (McGraw-Hill), with heavy emphasis on vector models. 1985: David Blair and Bill Maron publish: An Evaluation of Retrieval Effectiveness for a Full-Text Document-Retrieval System mid-1980s: Efforts to develop end-user versions of commercial IR systems. 1985–1993: Key papers on and experimental systems for visualization interfaces. Work by Donald B. Crouch, Robert R. Korfhage, Matthew Chalmers, Anselm Spoerri and others. 1989: First World Wide Web proposals by Tim Berners-Lee at CERN. 1990s 1992: First TREC conference. 1997: Publication of Korfhage's Information Storage and Retrieval with emphasis on visualization and multi-reference point systems. 1999: Publication of Ricardo Baeza-Yates and Berthier Ribeiro-Neto's Modern Information Retrieval by Addison Wesley, the first book that attempts to cover all IR. late 1990s: Web search engines implementation of many features formerly found only in experimental IR systems. Search engines become the most common and maybe best instantiation of IR models. Major conferences SIGIR: Conference on Research and Development in Information Retrieval ECIR: European Conference on Information Retrieval CIKM: Conference on Information and Knowledge Management WWW: International World Wide Web Conference WSDM: Conference on Web Search and Data Mining ICTIR: International Conference on Theory of Information Retrieval Awards in the field Tony
Margherita Guidacci Guido Guinizzelli I Gianni Ianuale L Giacomo da Lentini Jacopo da Leona Giacomo Leopardi Mario Luzi M Lorenzo il Magnifico (sovereign of Florence) Alessandro Manzoni Filippo Tommaso Marinetti Giambattista Marino Alda Merini Metastasio (Pietro Trapassi) Grazyna Miller Eugenio Montale (Nobel Prize in literature, 1975) Vincenzo Monti Marino Moretti Maurizio Moro P Elio Pagliarani Aldo Palazzeschi Giuseppe Parini Giovanni Pascoli Pier Paolo Pasolini Nicoletta Pasquale Cesare Pavese Francesco Petrarca (Petrarch) Assunta Pieralli Poliziano (Angelo
Cavalcanti Roberto Carifi Gabriello Chiabrera Compagnetto da Prato D Antonio De Santis (Italian and Larinese dialect) Milo de Angelis Fabrizio De André Eugenio De Signoribus E Muzi Epifani F Franco Fortini Ugo Foscolo G Alfonso Gatto Giuseppe Giusti Guido Gozzano Lionello Grifo Giovanni Battista Guarini Amalia Guglielminetti Margherita Guidacci Guido Guinizzelli I Gianni Ianuale L Giacomo da Lentini Jacopo da Leona Giacomo Leopardi Mario Luzi M Lorenzo il Magnifico (sovereign of Florence) Alessandro Manzoni Filippo Tommaso Marinetti Giambattista Marino Alda Merini Metastasio (Pietro Trapassi) Grazyna Miller Eugenio Montale (Nobel Prize in literature, 1975) Vincenzo Monti Marino Moretti Maurizio Moro P Elio Pagliarani Aldo Palazzeschi Giuseppe Parini Giovanni Pascoli Pier Paolo Pasolini Nicoletta Pasquale Cesare Pavese Francesco Petrarca (Petrarch) Assunta Pieralli Poliziano (Angelo Ambrogini) Lorenzo Da Ponte Antonio Porta (author) Carlo Porta
prosecutor of the tribunal, said in 2021 that the US did not want the ICTY to scrutinise war crimes committed by the Kosovo Liberation Army. According to her, Madeleine Albright, the United States secretary of state at the time, told her to slow down the investigation of Ramush Haradinaj. Michael Mandel, William Blum and others accused the court of having a pro-NATO bias due to its refusal to prosecute NATO officials and politicians for war crimes. On 6 December 2006, the Tribunal at The Hague approved the use of force-feeding of Serbian politician Vojislav Šešelj. They decided it was not "torture, inhuman or degrading treatment if there is a medical necessity to do so... and if the manner in which the detainee is force-fed is not inhuman or degrading". Reducing the indictment charges after the arrest of Ratko Mladić, Croatian officials publicly condemned chief prosecutor Serge Brammertz for his announcement that the former Bosnian Serb General, will be tried solely for crimes allegedly committed in Bosnia, not in Croatia. Critics have questioned whether the Tribunal exacerbates tensions rather than promotes reconciliation, as is claimed by Tribunal supporters. Polls show a generally negative reaction to the Tribunal among both Serbs and Croats. A majority of Serbs and Croats have expressed doubts regarding the ICTY's integrity and question the tenability of its legal procedures. 68% of indictees have been Serbs (or Montenegrins), to the extent that a sizeable portion of the Bosnian Serb and Croatian Serb political and military leaderships have been indicted. Many have seen this as reflecting bias, while the Tribunal's defenders have seen this as indicative of the actual proportion of crimes committed. However, Marko Hoare claimed that, aside from Milošević, only Momčilo Perišić (Chief of the General Staff of the Yugoslav Army), who was acquitted, has been indicted from the Serbian military or political top when it comes to wars in Croatia and Bosnia. According to Hoare, a former employee at the ICTY, an investigative team worked on indictments of senior members of the "joint criminal enterprise", including not only Milošević but also Veljko Kadijević, Blagoje Adžić, Borisav Jović, Branko Kostić, Momir Bulatović and others. However, Hoare claims that, due to Carla del Ponte's intervention, these drafts were rejected, and the indictment limited to Milošević alone. There have been allegations of censorship: in July 2011, the Appeals Chamber of ICTY confirmed the judgment of the Trial Chamber which found journalist and former Tribunal's OTP spokesperson Florence Hartmann guilty of contempt of court and fined her €7,000. She disclosed documents of FR Yugoslavia's Supreme Defense Council meetings and criticized the Tribunal for granting confidentiality of some information in them to protect Serbia's 'vital national interests' during Bosnia's lawsuit against the country for genocide in front of the International Court of Justice. Hartmann argued that Serbia was freed of the charge of genocide because ICTY redacted certain information in the Council meetings. Since these documents have in the meantime been made public by the ICTY itself, a group of organizations and individuals, who supported her, said that the Tribunal in this appellate proceedings "imposed a form of censorship aimed to protect the international judges from any form of criticism". (France refused to extradite Hartmann to serve the prison sentence issued against her by the ICTY after she refused to pay the €7,000 fine.) Klaus-Peter Willsch compared the Ante Gotovina verdict, in which the late Croatian president Franjo Tuđman was posthumously found to have been participating in a Joint Criminal Enterprise, with the 897 Cadaver Synod trial in Rome, when Pope Stephen VI had the corpse of Pope Formosus exhumed, put on trial and posthumously convicted. Some sentences have been considered too mild, even within the Tribunal, complained at small sentences of convicted war criminals in comparison with their crimes. In 2010, Veselin Šljivančanin's sentence for his involvement in the Vukovar massacre was cut from 17 to 10 years, which caused outrage in Croatia. Upon hearing that news, Vesna Bosanac, who had been in charge of the Vukovar hospital during the fall of the city, said that the "ICTY is dead" for her: "For crimes that he [Šljivančanin], had committed in Vukovar, notably at Ovčara, he should have been jailed for life. I'm outraged.... The Hague(-based) tribunal has showed again that it is not a just tribunal." Danijel Rehak, the head of Croatian Association of Prisoners in Serbian Concentration Camps, said, "The shock of families whose beloved ones were killed at Ovčara is unimaginable. The court made a crucial mistake by accepting a statement of a JNA officer to whom Šljivančanin was a commander. I cannot understand that". Pavle Strugar's 8-year sentence for shelling of Dubrovnik, a UNESCO World Heritage Site, also caused outrage in Croatia. Judge Kevin Parker (of Australia) was named in a Croatian journal (Nacional) as a main cause of the system's failure for having dismissed the testimonies of numerous witnesses. Some of the defendants, such as Slobodan Milošević, claimed that the Court has no legal authority because it was established by the UN Security Council instead of the UN General Assembly and so had not been created on a broad international basis. The Tribunal was established on the basis of Chapter VII of the United Nations Charter; the relevant portion of which reads "the Security Council can take measures to maintain or restore international peace and security". The legal criticism has been succinctly stated in a memorandum issued by Austrian Professor Hans Köchler, which was submitted to the President of the Security Council in 1999. British Conservative Party MEP Daniel Hannan has called for the court to be abolished, claiming it is anti-democratic and a violation of national sovereignty. The interactive thematic debate on the role of international criminal justice in reconciliation was convened on 10 April 2013 by the President of the General Assembly during the resumed part of the GA's 67th Session. The debate was scheduled after the convictions of Ante Gotovina and Mladen Markač for inciting war crimes against Serbs in Croatia were overturned by an ICTY Appeals Panel in November 2012. The ICTY president Theodor Meron announced that all three Hague war-crimes courts turned down the invitation of UNGA president to participate in the debate about their work. The President of the General Assembly described Meron's refusal to participate in this debate as scandalous. He emphasized that he does not shy away from criticizing the ICTY, which has "convicted nobody for inciting crimes committed against Serbs in Croatia." Tomislav Nikolić, the president of Serbia criticized the ICTY, claiming it did not contribute but hindered reconciliation in the former Yugoslavia. He added that although there is no significant ethnic disproportion among the number of casualties in the Yugoslav wars, the ICTY sentenced Serbs and ethnic Serbs to a combined total of 1150 years in prison while claiming that members of other ethnic groups have been sentenced to a total of 55 years for crimes against Serbs. Vitaly Churkin, the ambassador of Russia to the UN, criticized the work of the ICTY, especially the overturned convictions of Gotovina and Ramush Haradinaj. Regarding the final case on 29 November 2017 proceeding encompassing six Bosnian-Croat individuals, one of whom, Slobodan Praljak, in protest in court drank a poison and subsequently died, the Prime Minister of Croatia Andrej Plenković claimed the verdict was "unjust" and Praljak's suicide "speaks of deep moral injustice to the six Croats, from Bosnia and Herzegovina and the Croat people". He criticized the verdict because it did not recognize the assistance and support provided by Croatia to Bosnia and Herzegovina and collaboration of both armies at a time when the neighboring state was faced with the "Greater-Serbian aggression" and when its territorial integrity was compromised, as well it alludes to the link between the then leadership of the Republic of Croatia, while in the previous verdict to Bosnian-Serb Ratko Mladić does not recognize the connection with Serbia's state officials at that time. Dutch filmmaker Jos de Putter made a trilogy, The Milosevic Case - Glosses at Trial, for Tegenlicht investigative slot at the VPRO. The main hypothesis of the film is that ICTY prosecution has been struggling and failing to prove any link between Milosevic and the media version of the truth of the bloody break-up of Yugoslavia. The legitimacy of the prosecution methodology in securing the witness accounts and evidence, in general, has been examined by the filmmaker. See also List of people indicted in the International Criminal Tribunal for the former Yugoslavia Command responsibility International Criminal Court Trial of Gotovina et al Notes References Further reading Ackerman, J.E. and O'Sullivan, E.: Practice and procedure of the International Criminal Tribunal for the Former Yugoslavia: with selected materials for the International Criminal Tribunal for Rwanda, The Hague, KLI, 2000. Aldrich, G.H.: Jurisdiction of the International Criminal Tribunal for the Former Yugoslavia, American Journal of International Law, 1996, pp. 64–68h Bachmann, Klaus; Sparrow-Botero, Thomas and Lambertz, Peter: When justice meets politics. Independence and autonomy of ad hoc international criminal tribunals. Peter Lang International 2013. Bassiouni, M.C.: The Law of the International Criminal Tribunal of the Former Yugoslavia, New York, Transnational Publications, 1996. Boelaert-Suominen, S.: The International Criminal Tribunal for the Former Yugoslavia (ICTY) anno 1999: its place in the international legal system, mandate and most notable jurisprudence, Polish Yearbook of International Law, 2001, pp. 95–155. Boelaert-Suominen, S.: The International Criminal Tribunal for the Former Yugoslavia and the Kosovo Conflict, International Review of the Red Cross, 2000, pp. 217–251. Cassese, Antonio: The ICTY: A Living and Vital Reality", Journal of International Criminal Justice Vol.2, 2004, No.2, pp. 585–597 Cisse, C.: The International Tribunals for the Former Yugoslavia and Rwanda: some elements of comparison, Transnational Law and Contemporary Problems, 1997, pp. 103–118. Clark, R.S. and SANN, M.: A critical study of the International Criminal Tribunal for the Former Yugoslavia, European Journal of International Law, 1997, pp. 198–200. Goldstone, R.J.: Assessing the work of the United Nations war crimes tribunals, Stanford Journal of International Law, 1997, pp. 1–8. Ivković, S.K.: Justice by the International Criminal Tribunal for the Former Yugoslavia, Stanford Journal of International Law, 2001, pp. 255–346. Jones, J.W.R.D.: The practice of the international criminal tribunals for the Former Yugoslavia and Rwanda, New York, Transnational, 2000. Kaszubinski, M.: The International Criminal Tribunal for the Former Yugoslavia, in: Bassiouni, M.C. (ed.), Post-conflict justice, New York, Transnational, 2002, pp. 459–585. Kerr, R.: International judicial intervention: the International Criminal Tribunal for the Former Yugoslavia, International Relations, 2000, pp. 17–26. Kerr, R.: The International Criminal Tribunal for the Former Yugoslavia: an exercise in law, politics and diplomacy, Oxford, OUP, 2004. King, F. and La Rosa, A.: Current Developments. International Criminal Tribunal for the Former Yugoslavia, B.T.I.R., 1997, pp. 533–555. Klip, A. and Sluiter, G.: Annotated leading cases of international criminal tribunals; (Vol. III) The International Criminal Tribunal for the Former Yugoslavia 2000–2001, Schoten, Intersentia, 2003. Köchler, Hans: Global Justice or Global Revenge? International Criminal Justice at the Crossroads, Vienna/New York, Springer, 2003, pp. 166–184. Kolb, R.: The jurisprudence of the Yugoslav and Rwandan Criminal Tribunals on their jurisdiction and on international crimes, British Yearbook of International Law, 2001, pp. 259–315. Lamb, S.: The powers of arrest of the International Criminal Tribunal for the Former Yugoslavia, British Yearbook of International Law, 2000, pp. 165–244. Laughland, J.: Travesty: The Trial of Slobodan Milošević and the Corruption of International Justice, London, Pluto Press, 2007. Lescure, K.: International justice for former Yugoslavia: the working of the International Criminal Tribunal of the Hague, The Hague, KLI, 1996. Mak, T.: The Case Against an International War Crimes Tribunal for the former Yugoslavia, (1995) International Peacekeeping, 2:4, 536-563. McAllister, Jacqueline R. 2020. "Deterring Wartime Atrocities: Hard Lessons from the Yugoslav Tribunal." International Security 44(3). Available at: https://doi.org/10.1162/isec_a_00370. McDonald, G.K.: Reflections on the contributions of the International Criminal Tribunal for the Former Yugoslavia, Hastings International and Comparative Law Review, 2001, pp. 155–172. Mettraux, G.: Crimes against humanity in the jurisprudence of the International Criminal Tribunal for the Former Yugoslavia and for Rwanda, Harvard International Law Journal, 2002, pp. 237–316. Morris, V. and Scharf, M.P.: An insider's guide to the International Criminal Tribunal for the Former Yugoslavia, African Yearbook of International Law, 1995, pp. 441–446. Murphy, S.D.: Progress and jurisprudence of the International Criminal Tribunal for the Former Yugoslavia, American Journal of International Law, 1999, pp. 57–96. Panovsky, D.: Some war crimes are not better than others: the failure of the International Criminal Tribunal for the Former Yugoslavia to prosecute war crimes in Macedonia, Northwestern University Law Review, 2004, pp. 623–655. Pilouras, S.: International Criminal Tribunal for the Former Yugoslavia and Milosevic's trial, New York Law School Journal of Human Rights, 2002, pp. 515–525. Pronk, E.: "The ICTY and the people from the former Yugoslavia. A reserved relationship." (thesis) Roberts, K.: The law of persecution before the International Criminal Tribunal for the Former Yugoslavia, Leiden Journal of International Law, 2002, pp. 623–663. Robinson, P.L.: Ensuring fair and expeditious trials at the International Criminal Tribunal for the Former Yugoslavia, European Journal of International Law, 2000, pp. 569–589. Shenk, M.D.: International Criminal Tribunal for the Former Yugoslavia and for Rwanda, The International Lawyer, 1999, pp. 549–554. Shraga, D. and Zackalin, R.: The International Criminal Tribunal for the Former Yugoslavia, European Journal of International Law, 1994, pp. 360–380. Sjocrona, J.M.: The International Criminal Tribunal for the Former Yugoslavia: some introductory remarks from a defence point of view, Leiden Journal of International Law, 1995, pp. 463–474. Tolbert, David: The ICTY:
Judges At the time of the court's dissolution, there were seven permanent judges and one ad hoc judge who served on the Tribunal. A total of 86 judges have been appointed to the Tribunal from 52 United Nations member states. Of those judges, 51 were permanent judges, 36 were ad litem judges, and one was an ad hoc judge. Note that one judge served as both a permanent and ad litem judge, and another served as both a permanent and ad hoc judge. UN member and observer states could each submit up to two nominees of different nationalities to the UN Secretary-General. The UN Secretary-General submitted this list to the UN Security Council which selected from 28 to 42 nominees and submitted these nominees to the UN General Assembly. The UN General Assembly then elected 14 judges from that list. Judges served for four years and were eligible for re-election. The UN Secretary-General appointed replacements in case of vacancy for the remainder of the term of office concerned. On 21 October 2015, Judge Carmel Agius of Malta was elected President of the ICTY and Liu Daqun of China was elected Vice-President; they have assumed their positions on 17 November 2015. His predecessors were Antonio Cassese of Italy (1993–1997), Gabrielle Kirk McDonald of the United States (1997–1999), Claude Jorda of France (1999–2002), Theodor Meron of the United States (2002–2005), Fausto Pocar of Italy (2005–2008), Patrick Robinson of Jamaica (2008–2011), and Theodor Meron (2011–2015). Registry The Registry was responsible for handling the administration of the Tribunal; activities included keeping court records, translating court documents, transporting and accommodating those who appear to testify, operating the Public Information Section, and such general duties as payroll administration, personnel management and procurement. It was also responsible for the Detention Unit for indictees being held during their trial and the Legal Aid program for indictees who cannot pay for their own defence. It was headed by the Registrar, a position occupied over the years by Theo van Boven of the Netherlands (February 1994 to December 1994), Dorothée de Sampayo Garrido-Nijgh of the Netherlands (1995–2000), Hans Holthuis of the Netherlands (2001–2009), and John Hocking of Australia (May 2009 to December 2017). Detention facilities Those defendants on trial and those who were denied a provisional release were detained at the United Nations Detention Unit on the premises of the Penitentiary Institution Haaglanden, location Scheveningen in Belgisch Park, a suburb of The Hague, located some 3 km by road from the courthouse. The indicted were housed in private cells which had a toilet, shower, radio, satellite TV, personal computer (without internet access) and other luxuries. They were allowed to phone family and friends daily and could have conjugal visits. There was also a library, a gym and various rooms used for religious observances. The inmates were allowed to cook for themselves. All of the inmates mixed freely and were not segregated on the basis of nationality. As the cells were more akin to a university residence instead of a jail, some had derisively referred to the ICT as the "Hague Hilton". The reason for this luxury relative to other prisons is that the first president of the court wanted to emphasise that the indictees were innocent until proven guilty. Indictees The Tribunal indicted 161 individuals between 1997 and 2004 and completed proceedings with them as follows: 111 had trials completed by the ICTY: 21 were acquitted by the ICTY: 18 acquittals have stood; 1 was originally acquitted by the ICTY, but convicted on appeal by the IRMCT of one count (and sentenced to time served) 2 were originally acquitted by the ICTY, but following successful appeal by the prosecution the acquittals were overturned and a retrial is being conducted by the IRMCT; and 90 were convicted and sentenced by the ICTY: 87 were transferred to 14 different states where they served their prison sentences, had sentences that amounted to time spent in detention during trial, or died after conviction: 20 remain imprisoned; 58 completed their sentences; 9 died while completing their sentences or after conviction awaiting transfer 2 were convicted and sentenced, and remain in IRMCT detention awaiting transfer; and 1 was convicted and sentenced, but has filed an appeal to the IRMCT that is being considered 13 had their cases transferred to courts in: Bosnia and Herzegovina (10); Croatia (2); and Serbia (1) 37 had their cases terminated prior to trial completion, because the indictments were withdrawn (20); or the indictees died before or after transfer to the Tribunal (17). The indictees ranged from common soldiers to generals and police commanders all the way to prime ministers. Slobodan Milošević was the first sitting head of state indicted for war crimes. Other "high level" indictees included Milan Babić, former President of the Republika Srpska Krajina; Ramush Haradinaj, former Prime Minister of Kosovo; Radovan Karadžić, former President of the Republika Srpska; Ratko Mladić, former Commander of the Bosnian Serb Army; and Ante Gotovina, former General of the Croatian Army. The very first hearing at the ICTY was referral request in the Tadić case on 8 November 1994. Croat Serb General and former President of the Republic of Serbian Krajina Goran Hadžić was the last fugitive wanted by the Tribunal to be arrested on 20 July 2011. An additional 23 individuals have been the subject of contempt proceedings. Controversies Skeptics argued that an international court could not function while the war in the former Yugoslavia was still going on. This would be a huge undertaking for any court, but for the ICTY it would be an even greater one, as the new tribunal still needed judges, a prosecutor, a registrar, investigative and support staff, an extensive interpretation and translation system, a legal aid structure, premises, equipment, courtrooms, detention facilities, guards and all the related funding. Criticisms of the court include: Carla Del Ponte, the chief prosecutor of the tribunal, said in 2021 that the US did not want the ICTY to scrutinise war crimes committed by the Kosovo Liberation Army. According to her, Madeleine Albright, the United States secretary of state at the time, told her to slow down the investigation of Ramush Haradinaj. Michael Mandel, William Blum and others accused the court of having a pro-NATO bias due to its refusal to prosecute NATO officials and politicians for war crimes. On 6 December 2006, the Tribunal at The Hague approved the use of force-feeding of Serbian politician Vojislav Šešelj. They decided it was not "torture, inhuman or degrading treatment if there is a medical necessity to do so... and if the manner in which the detainee is force-fed is not inhuman or degrading". Reducing the indictment charges after the arrest of Ratko Mladić, Croatian officials publicly condemned chief prosecutor Serge Brammertz for his announcement that the former Bosnian Serb General, will be tried solely for crimes allegedly committed in Bosnia, not in Croatia. Critics have questioned whether the Tribunal exacerbates tensions rather than promotes reconciliation, as is claimed by Tribunal supporters. Polls show a generally negative reaction to the Tribunal among both Serbs and Croats. A majority of Serbs and Croats have expressed doubts regarding the ICTY's integrity and question the tenability of its legal procedures. 68% of indictees have been Serbs (or Montenegrins), to the extent that a sizeable portion of the Bosnian Serb and Croatian Serb political and military leaderships have been indicted. Many have seen this as reflecting bias, while the Tribunal's defenders have seen this as indicative of the actual proportion of crimes committed. However, Marko Hoare claimed that, aside from Milošević, only Momčilo Perišić (Chief of the General Staff of the Yugoslav Army), who was acquitted, has been indicted from the Serbian military or political top when it comes to wars in Croatia and Bosnia. According to Hoare, a former employee at the ICTY, an investigative team worked on indictments of senior members of the "joint criminal enterprise", including not only Milošević but also Veljko Kadijević, Blagoje Adžić, Borisav Jović, Branko Kostić, Momir Bulatović and others. However, Hoare claims that, due to Carla del Ponte's intervention, these drafts were rejected, and the indictment limited to Milošević alone. There have been allegations of censorship: in July 2011, the Appeals Chamber of ICTY confirmed the judgment of the Trial Chamber which found journalist and former Tribunal's OTP spokesperson Florence Hartmann guilty of contempt of court and fined her €7,000. She disclosed documents of FR Yugoslavia's Supreme Defense Council meetings and criticized the Tribunal for granting confidentiality of some information in them to protect Serbia's 'vital national interests' during Bosnia's lawsuit against the country for genocide in front of the International Court of Justice. Hartmann argued that Serbia was freed of the charge of genocide because ICTY redacted certain information in the Council meetings. Since these documents have in the meantime been made public by the ICTY itself, a group of organizations and individuals, who supported her, said that the Tribunal in this appellate proceedings "imposed a form of censorship aimed to protect the international judges from any form of criticism". (France refused to extradite Hartmann to serve the prison sentence issued against her by the ICTY after she refused to pay the €7,000 fine.) Klaus-Peter Willsch compared the Ante Gotovina verdict, in which the late Croatian president Franjo Tuđman was posthumously found to have been participating in a Joint Criminal Enterprise, with the 897 Cadaver Synod trial in Rome, when Pope Stephen VI had the corpse of Pope Formosus exhumed, put on trial and posthumously convicted. Some sentences have been considered too mild, even within the Tribunal, complained at small sentences of convicted war criminals in comparison with their crimes. In 2010, Veselin Šljivančanin's sentence for his involvement in the Vukovar massacre was cut from 17 to 10 years, which caused outrage in Croatia. Upon hearing that news, Vesna Bosanac, who had been in charge of the Vukovar hospital during the fall of the city, said that the "ICTY is dead" for her: "For crimes that he [Šljivančanin], had committed in Vukovar, notably at Ovčara, he should have been jailed for life. I'm outraged.... The Hague(-based) tribunal has showed again that it is not a just tribunal." Danijel Rehak, the head of Croatian Association of Prisoners in Serbian Concentration Camps, said, "The shock of families whose beloved ones were killed at Ovčara is unimaginable.
1 metre. There is also an incompatible Japanese B series which the JIS defines to have 1.5 times the area of the corresponding JIS A series (which is identical to the ISO A series). Thus, the lengths of JIS B series paper are ≈ 1.22 times those of A-series paper. By comparison, the lengths of ISO B series paper are ≈ 1.19 times those of A-series paper. C series The C series formats are geometric means between the B series and A series formats with the same number (e.g., C2 is the geometric mean between B2 and A2). The width to height ratio is as in the A and B series. The C series formats are used mainly for envelopes. An unfolded A4 page will fit into a C4 envelope. C series envelopes follow the same ratio principle as the A series pages. For example, if an A4 page is folded in half so that it is A5 in size, it will fit into a C5 envelope (which will be the same size as a C4 envelope folded in half). The lengths of ISO C series paper are therefore ≈ 1.09 times those of A-series paper. A, B, and C paper fit together as part of a geometric progression, with ratio of successive side lengths of , though there is no size half-way between Bn and : A4, C4, B4, "D4", A3, ...; there is such a D-series in the Swedish extensions to the system. Tolerances The tolerances specified in the standard are: ±1.5 mm for dimensions up to 150 mm, ±2.0 mm for dimensions in the range 150 to 600 mm, and ±3.0 mm for dimensions above 600 mm. These are related to comparison between series A, B and C. Application The ISO 216 formats are organized around the ratio 1:; two sheets next to each other together have the same ratio, sideways. In scaled photocopying, for example, two A4 sheets reduced to A5 size fit exactly onto one A4 sheet, and an A4 sheet in magnified size onto an A3 sheet; in each case, there is neither waste nor want. The principal countries not generally using the ISO paper sizes are the United States and Canada, which use North American paper sizes. Although they have also officially adopted the ISO 216 paper format, Mexico, Panama, Peru, Colombia, the Philippines, and Chile also use mostly U.S. paper sizes. Rectangular sheets of paper with the ratio 1: are popular in paper folding, such as origami, where they are sometimes called "A4 rectangles" or "silver rectangles". In other contexts, the term "silver rectangle" can also refer to a rectangle in the proportion 1:(1 + ), known as the silver ratio. Matching technical pen widths An important adjunct to the ISO paper sizes, particularly the A series, are the technical drawing line widths specified in ISO 128. For example, line type A ("Continuous - thick", used for "visible outlines") has a standard thickness of 0.7 mm on an A0-sized sheet, 0.5 mm on an A1 sheet, and 0.35 mm on A2, A3, or A4. The matching technical pen widths are 0.13, 0.18, 0.25, 0.35, 0.5, 0.7, 1.0, 1.40, and 2.0 mm, as specified in ISO 9175-1. Colour codes are assigned to each size to facilitate easy recognition by the drafter. These sizes again increase by a factor of , so that particular pens can be used on particular sizes of paper, and then the next smaller or larger size can be used to continue the drawing after it has been reduced or enlarged, respectively. {| class="wikitable" |- !style="text-align:left"| Linewidth (mm) |width="9%" colspan=2| 0.10 |width="9%" colspan=2| 0.13 |width="9%" colspan=2| 0.18 |width="9%" colspan=2| 0.25 |width="9%" colspan=2| 0.35 |width="9%" colspan=2| 0.50 |width="9%" colspan=2| 0.70 |width="9%" colspan=2| 1.0 |width="9%" colspan=2| 1.4 |width="9%" colspan=2| 2.0 |- !style="text-align:left"| Colour |width="2%" style="background:maroon"| ||Maroon |width="2%" style="background:orchid"| ||Violet |width="2%" style="background:red"| ||Red |width="2%" style="background:white"| ||White |width="2%" style="background:yellow"| ||Yellow |width="2%" style="background:chocolate"| ||Brown |width="2%" style="background:deepskyblue"| ||Blue |width="2%" style="background:darkorange"| ||Orange |width="2%" style="background:seagreen"| ||Green |width="2%" style="background:silver"| ||Gray |} The earlier DIN 6775 standard upon which ISO 9175-1 is based
(for example, series A), the largest size is numbered 0 (for example, A0), and each successive size (for example, A1, A2, etc.) has half the area of the preceding sheet and can be cut by halving the length of the preceding size sheet. The new measurement is rounded down to the nearest millimetre. A folded brochure can be made by using a sheet of the next larger size (for example, an A4 sheet is folded in half to make a brochure with size A5 pages. An office photocopier or printer can be designed to reduce a page from A4 to A5 or to enlarge a page from A4 to A3. Similarly, two sheets of A4 can be scaled down to fit one A4 sheet without excess empty paper. This system also simplifies calculating the weight of paper. Under ISO 536, paper's grammage is defined as a sheet's mass in grams (g) per area in square metres (unit symbol g/m2; the nonstandard abbreviation "gsm" is also used). One can derive the grammage of other sizes by arithmetic division in . A standard A4 sheet made from paper weighs , as it is (four halvings, ignoring rounding) of an A0 page. Thus the weight, and the associated postage rate, can be easily approximated by counting the number of sheets used. ISO 216 and its related standards were first published between 1975 and 1995: ISO 216:2007, defining the A and B series of paper sizes ISO 269:1985, defining the C series for envelopes ISO 217:2013, defining the RA and SRA series of raw ("untrimmed") paper sizes Properties A series Paper in the A series format has an aspect ratio of (≈ 1.414, when rounded). A0 is defined so that it has an area of 1 m before rounding to the nearest millimetre. Successive paper sizes in the series (A1, A2, A3, etc.) are defined by halving the area of the preceding paper size and rounding down, so that the long side of is the same length as the short side of An. Hence, each next size is nearly exactly half of the prior size. So, an A1 page can fit two A2 pages inside the same area. The most used of this series is the size A4, which is and thus almost exactly in area. For comparison, the letter paper size commonly used in North America () is about () wider and () shorter than A4. Then, the size of A5 paper is half of A4, as × ( × ). The geometric rationale for using the square root of 2 is to maintain the aspect ratio of each subsequent rectangle after cutting or folding an A-series sheet in half, perpendicular to the larger side. Given a rectangle with a longer side, x, and a shorter side, y, ensuring that its aspect ratio, , will be the same as that of a rectangle half its size, , which means that = , which reduces to = ; in other words, an aspect ratio of 1:. B series The B series is defined in the standard as follows: "A subsidiary series of sizes is obtained by placing the geometrical means between adjacent sizes of the A series in sequence." The use of the geometric mean makes each step in size: B0, A0, B1, A1, B2 ... smaller than the previous one by the same factor. As with the A series, the lengths of the B series have the ratio , and folding one in half (and rounding down to the nearest millimetre) gives the next in the series. The shorter side of B0 is exactly 1 metre. There is also an incompatible Japanese B series which the JIS defines to have 1.5 times the area of the corresponding JIS A series (which is identical to the ISO A series). Thus, the lengths of JIS B series paper are ≈ 1.22 times those of A-series paper. By comparison, the lengths of ISO B series paper are ≈ 1.19 times those of A-series paper. C series The C series formats are geometric means between the B series and A series formats with the same number (e.g., C2 is the geometric mean between B2 and A2). The width to height ratio is as in the A and B series. The C series formats are used mainly for envelopes. An unfolded A4 page will fit into a C4 envelope. C series envelopes follow the same ratio principle as the A series pages. For example, if an A4 page is folded in half so that it is A5 in size, it will fit into a C5 envelope (which will be the same size as a C4 envelope folded in half). The lengths of ISO C series paper are therefore ≈ 1.09 times those of A-series paper. A, B, and C paper fit together as part of a geometric progression, with ratio of successive side lengths of , though there is no size half-way between Bn and : A4, C4, B4, "D4", A3, ...; there is such a D-series in the Swedish extensions to the system. Tolerances The tolerances specified in the standard are: ±1.5 mm for dimensions up to 150 mm, ±2.0 mm for dimensions in the range 150 to 600 mm, and ±3.0 mm for dimensions above 600 mm. These are related to comparison between series A, B and C. Application The ISO 216 formats are
barriers. The standard is split into four parts: ISO 3864-1:2011 Part 1: Design principles for safety signs and safety ISO 3864-2:2016 Part 2: Design principles for product safety labels ISO 3864-3:2012 Part 3: Design principles for graphical symbols for use in safety signs ISO 3864-4:2011 Part 4: Colorimetric and photometric properties of safety sign materials Colours These are the colours specified in ISO Standard 3864-4 in RAL colour standard. In addition, ISO standard 3864-2:2016 lays out the following colours that correspond to levels of risk. This standard adds "Orange" as an incremental colour to the pallette above. Related standards The corresponding American standard is ANSI Z535. ANSI Z535.1 also explicitly uses multiple
3864-1:2011 Part 1: Design principles for safety signs and safety ISO 3864-2:2016 Part 2: Design principles for product safety labels ISO 3864-3:2012 Part 3: Design principles for graphical symbols for use in safety signs ISO 3864-4:2011 Part 4: Colorimetric and photometric properties of safety sign materials Colours These are the colours specified in ISO Standard 3864-4 in RAL colour standard. In addition, ISO standard 3864-2:2016 lays out the following colours that correspond to levels of risk. This standard adds "Orange" as an incremental colour to the pallette above. Related standards The corresponding American standard
he later collected and compiled as the Discourses on the Ecclesiastical and Civil Polity of the Jews (1706). Like his brother, he maintained an extensive correspondence with leading Christian scholars of his time, most notably with the philosopher Ralph Cudworth, master of Christ's College, Cambridge. References 1640s births 1699 deaths Spanish Jews Spanish emigrants to the United Kingdom People associated with Magdalen College, Oxford Academics of the
Library of Oxford, and in 1689 he took a teaching position in Magdalen College. In Oxford, he wrote a series of Jewish almanacs for Christians, which he later collected and compiled as the Discourses on the Ecclesiastical and Civil Polity of the Jews (1706). Like his brother, he maintained an extensive correspondence with leading Christian scholars of his time, most notably with the philosopher
Security and Intelligence Directorate Azerbaijan State Security Service (Dövlət Təhlükəsizliyi Xidməti) Foreign Intelligence Service (Xarici Kəşfiyyat Xidməti) Bahamas Security and Intelligence Branch (SIB) Defence Force Intelligence Branch (DFIB) Financial Intelligence Unit (FIU) National Intelligence Agency (NIA) Bahrain NSA – National Security Agency Bangladesh National Committee for Intelligence Coordination National Security Affairs Cell External Intelligence Directorate General of Forces Intelligence (DGFI) National Security Intelligence (NSI) Internal Intelligence National Security Intelligence (NSI) National Telecommunication Monitoring Centre (NTMC) Special Branch (SB) Counter Terrorism and Transnational Crime (CTTC) Police Bureau of Investigation (PBI) Criminal Investigation Department (CID) Economic Intelligence & Securities Central Intelligence Unit (CIU) Bangladesh Financial Intelligence Unit (BFIU) Bangladesh Securities and Exchange Commission (BSEC) Other Intelligence Special Security Force – Intelligence Bureau (SSF-IB) Rapid Action Battalion – Intelligence Wing (RAB-IW) Military Intelligence Directorate General of Forces Intelligence (DGFI) Barbados Royal Barbados Police Force Special Branch (SB) Financial Intelligence Unit (FIU) Criminal Investigations Department (CID) Military Intelligence Unit (MIU) Belarus Камітэт дзяржаўнай бяспекі / Комитет государственной безопасности (KDB/KGB) (State Security Committee) Belgium VSSE (State Security Service) ADIV / SGRS (ADIV/SGRS) (General Intelligence and Security Service, military intelligence) OCAD / OCAM (Coordination Unit for the Threat Assessment) Bosnia and Herzegovina Intelligence-Security Agency of Bosnia and Herzegovina (OSA) Državna Agencija za Istrage i Zaštitu (State Investigation and Protection Agency, SIPA) Botswana Directorate on Intelligence and Security Services (DISS – Ministry of State President Espionage & Counter Intelligence unit) Crime Intelligence Branch (CRIB – Botswana Police Service Criminal Investigations Department unit) Military Intelligence (MI – Botswana Defence Force unit) Financial Intelligence Agency (FIA – Ministry of Finance department) Brazil Brazilian Intelligence Agency (ABIN) Federal Police Department (DPF) (counterintelligence agency) Army Intelligence Center (CIE) Navy Intelligence Center (CIM) Aeronautics Intelligence Center (CIA) (Air Force Intelligence) Gabinete de Seguranca Institucional (GSI) Responds directly to the president's office and the armed forces. Coordinates some intelligence operations. Secretaria da Receita Federal do Brasil (Federal Revenue Secretariat) (RFB) (General Coordination for Research and Investigations - Coordenação-Geral de Pesquisa e Investigação - Copei) Brunei Internal Security Department (Brunei) (internal) Research Department (external) Bulgaria Държавна агенция „Разузнаване“ (DAR) (State Intelligence Agency) – overseas intelligence gathering service under the supervision of the Council of Ministers of Bulgaria Държавна агенция за национална сигурност State Agency for National Security (DANS) – national security service under the supervision of the Council of Ministers of Bulgaria Служба "Военна информация" (CVI) (Military Intelligence Service) – under Ministry of Defence supervision Burundi Service national de renseignement (SNR) Cambodia Ministry of National Defense General Directorate of Intelligence Canada Canadian Security Intelligence Service (CSIS) Communications Security Establishment (CSE) Canadian Forces Intelligence Command (DND) Criminal Intelligence Service Canada (CISC) Financial Transactions and Reports Analysis Centre of Canada (FINTRAC) Global Affairs Canada (GAC) Bureau of Intelligence Analysis and Security and Bureau of Economic Intelligence Royal Canadian Mounted Police (RCMP) intelligence division Canada Border Services Agency (CBSA) Immigrations Intelligence Canadian Coast Guard (CCG) Intelligence Branch Public Safety Canada Canadian Centre for Cyber Security Cyber intelligence Integrated National Security Enforcement Teams Chile Ministry of Interior National Intelligence Agency (ANI) – Agencia Nacional de Inteligencia Carabineros Intelligence Departament (DIPOLCAR) – Dirección de Inteligencia de Carabineros Police Intelligence Department – Jefatura de Inteligencia Policial Ministry of National Defence Defense Intelligence Departament (DID) – Dirección de Inteligencia de la Defensa Army Intelligence Departament (DINE) – Dirección de Inteligencia del Ejército Air Force Intelligence Departament (DIFA) – Dirección de Inteligencia de la Fuerza Aérea Navy Intelligence Departament – Direccion de Inteligencia de la Armada China (PRC) Central Committee of the Chinese Communist Party (CCCPC) 610 Office International Department (ID) United Front Work Department (UFWD) People's Liberation Army (PLA) Central Security Regiment aka 8341 Unit Joint Staff Department of the Central Military Commission (JSDCMC) Intelligence Bureau of the General Staff aka 2nd Bureau People's Liberation Army Air Force (PLAAF) Sixth Research Institute (SRI) People's Liberation Army General Political Department (GND) China Association for International Friendly Contacts (CAIFC) People's Liberation Army General Staff Department (GSD) Second Intelligence Department Third Department Fourth Department People's Liberation Army Navy (PLAN) Navy Intelligence (์NI) People's Liberation Army Strategic Support Force, particularly the 3rd department ("3PLA"). PLA Unit 61398 aka APT 1 State Council of the People's Republic of China Ministry of Human Resources and Social Security (MOHRSS) State Administration of Foreign Experts Affairs (SAFEA) Ministry of State Security (MSS) Office for Safeguarding National Security of the CPG in the HKSAR (CPGNSO) Hong Kong SAR Criminal Intelligence Bureau (CIB) of the Hong Kong Police Force Joint Financial Intelligence Unit (JFIU) of the Hong Kong Police Force and the Customs and Excise Department Macau SAR Counter-intelligence Section – Research and Information Division of Public Security Police Force of Macau Information Division of Macau Security Force Colombia Dirección Nacional de Inteligencia (DNI) Jefatura de Inteligencia Militar Conjunta Jefatura de Inteligencia Militar (JEIMI) Jefatura de Inteligencia Aérea (JIA) Jefatura de Inteligencia Naval (JINA) Dirección de Inteligencia de la Policía Nacional (DIPOL) Congo (DRC) National Intelligence Agency (ANR) General Staff of Military intelligence (ex-DEMIAP) Directorate of General Information ( Congolese National Police PNC) CENAREF (National Financial Intelligence Unit) Congo (Republic of) Direction Générale de la Sécurité d'État (DGSE) Costa Rica Intelligence and National Security Department (DIS) – Direccion de Inteligencia y Seguridad Nacional Croatia Sigurnosno-obavještajna agencija (SOA) (Security and Intelligence Agency) Vojna sigurnosno-obavještajna agencija (VSOA) (Military Security and Intelligence Agency) Cuba Communist Party of Cuba (PCC) Departmento America (DA) Ministry of the FAR (MINFAR) Military Counterintelligence Directorate Military Intelligence Directorate Ministry of the Interior Dirección General de Inteligencia (DGI) Cyprus Cyprus Intelligence Service (CIS) (Κυπριακή Υπηρεσία Πληροφοριών)(ΚΥΠ), (former Central Intelligence Service-KYP) Czech Republic Security Information Service (Bezpečnostní informační služba, BIS) Office for Foreign Relations and Information (Úřad pro zahraniční styky a informace, ÚZSI) Ministry of Defence Military Intelligence (Vojenské zpravodajství, VZ) Denmark Danish Security and Intelligence Service (Politiets Efterretningstjeneste (PET)). Danish Defence Intelligence Service (Forsvarets Efterretningstjeneste (FE)). Army Intelligence Center (Efterretningsregimentet (EFR)). Djibouti Brigade Spéciale de Recherche de la Gendarmerie (BSRG) Service de Documentation et de Sédimentation (SDS) Dominican Republic (DNI) (National Department of Investigations) Ecuador National Intelligence Secretariat (SENAIN) (Inactive) Egypt Gihaz al-Mukhabarat al-Amma (GIS) (General Intelligence Service) Idarat al-Mukhabarat al-Harbyya wa al-Istitla (OMIR) (Office of Military Intelligence and Reconnaissance) Al-amn al-Watani (GHS) (General Homeland Security) Eritrea National Intelligence Agency (Hagerawi Dhnet) (ሃገራዊ ድሕነት) Eritrea Intelligence Research Centre (EiRC - ሻዕቢያ) (Powered by NationalEr Interest) National Security Office (or National Security Agency) Estonia Estonian Internal Security Service (KaPo) (Kaitsepolitseiamet) Foreign Intelligence Service (Välisluureamet) Military Intelligence Centre of Estonian Defence Forces (Kaitseväe Luurekeskus) Ethiopia Information Network Security Agency (INSA) National Intelligence and Security Service (NISS) Finland Ministry of Defence Finnish Defence Intelligence Agency – Puolustusvoimien tiedustelulaitos (PVTIEDL) / Försvarsmaktens underrättelsetjänst Intelligence Division (Finland) – Pääesikunnan tiedusteluosasto (PE TIEDOS) / Huvudstabens underrättelseavdelning) Ministry of Interior Finnish Security Intelligence Service (SUPO) – Suojelupoliisi / Skyddspolisen France Ministry of Interior General Directorate for Internal Security (DGSI; Direction générale de la sécurité intérieure) – Domestic counter-terrorism and counter-espionage intelligence. Central Directorate of the Judicial Police (DCPJ; Direction centrale de la Police judiciaire) – Organised crime intelligence. Ministry of Defence Directorate-General for External Security (DGSE; Direction générale de la sécurité extérieure) – Foreign intelligence relating to national security. Direction du Renseignement et de la Sécurité de la Défense (DRSD; Direction du Renseignement et de la Sécurité de la Défense) – Foreign intelligence relating to national security. Directorate of Military Intelligence (DRM; Direction du renseignement militaire) – Military intelligence. Gambia State Intelligence Services (the Gambia) (SIS) Georgia State Security Service (SSSG) − სახელმწიფო უშიშროების სამსახური Georgian Intelligence Service (GIS) − საქართველოს დაზვერვის სამსახური Georgian Armed Forces Military Intelligence Department Germany Federal Bundeskanzleramt: Federal Chancellery Bundesnachrichtendienst (BND): Federal Intelligence Service Bundesministerium des Innern (BMI): Federal Ministry of Interior Bundesamt für Verfassungsschutz (BfV): Federal Office for the Protection of the Constitution Bundesamt für Sicherheit in der Informationstechnik (BSI): Federal Office for Information Security Bundespolizei: Federal Police Zentrum für Informations- und Kommunikationstechnik (IKTZ): Center for information and communication technology Bundeswehr: Federal Defense Force Militärischer Abschirmdienst (MAD): Military Counterintelligence Service Kommando Strategische Aufklärung (KSA): Strategic Surveillance Command State Landesministerium des Innern: State Ministry of the Interior (different denominations from state to state) Landesamt für Verfassungsschutz (LfV): (semi-independent) State Authority for the Protection of the Constitution for every single state Ghana National Security Council (Ghana) (Centre of National Security) National Signals Bureau (NSB) – (Cyber Intelligence) Bureau of National Investigations (BNI) – (Internal Intelligence Agency) Research Department Unit – Research Department, Ministry of Foreign Affairs (External Intelligence Agency) Criminal Investigative Department (CID) – (Ghana Police) Military Intelligence Unit (MIU) – (Ghana Armed Forces) Greece Prime Minister of the Hellenic Republic National Intelligence Service (ΕΥΠ) – Εθνική Υπηρεσία Πληροφοριών Hellenic National Defence General Staff E Division – Intelligence Division Haiti Service d'Intelligence National (SIN) (National Intelligence Service) Hungary Információs Hivatal (IH) (Information Office) Alkotmányvédelmi Hivatal (AH) (Constitution Protection Office) Katonai Nemzetbiztonsági Szolgálat (KNBSZ) (Military National Security Service) Nemzetbiztonsági Szakszolgálat (NBSZ) (Special Service for National Security) Terrorelhárítási Központ (TEK) (Counter Terrorism Centre) Iceland National Security Agency – Greiningardeild Ríkislögreglustjóra (GRLS) Military Intelligence Service – Greiningardeild Varnarmálastofnunar Íslands (GVMSÍ) India Joint Intelligence Committee External Intelligence Research and Analysis Wing (RAW) Defence Intelligence Defence Intelligence Agency Directorate of Military Intelligence Directorate of Air Intelligence Directorate of Naval Intelligence Image Processing and Analysis Centre Directorate of Signals Intelligence Joint Cipher Bureau Internal intelligence Intelligence Bureau (IB) Economic Intelligence Directorate of Revenue Intelligence Economic Intelligence Council Enforcement Directorate Directorate General of GST Intelligence (DGGI) Central Economic Intelligence Bureau Directorate of Economic Enforcement Financial Intelligence Unit (FIU-Ind) Other Intelligence Wildlife Crime Control Bureau Narcotics Control Bureau Indonesia Foreign/Domestic Intelligence Badan Intelijen Negara (BIN) (State Intelligence Agency) Military Intelligence Indonesian Strategic Intelligence Agency (BAIS) Badan Intelijen Pertahanan/Badan Instalasi Strategis Nasional (BAINTEL KEMHAN/BAINSTRANAS) (Defence Intelligence Agency/Strategic National Installations Agency) Indonesian Army Intelligence Centre (PUSINTELAD) Signals Intelligence Badan Siber dan Sandi Negara (BSSN) (National Crypto and Cyber Security Agency) Badan Informasi Geospasial (BIG) Criminal Intelligence Badan Intelijen dan Keamanan Polri (BAINTELKAM) (Indonesian National Police Security and Intelligence Agency) Jaksa Agung Muda Bidang Intelijen Kejagung (JAM Intelijen) (Office of the Solicitor General for Intelligence) Direktorat Intelijen Imigrasi (Directorate of Immigration Intelligence) Seksi Intelijen BNN (National Narcotics Agency Intelligence Section) Financial Intelligence Inspektorat Bidang Investigasi Kemkeu (Ministry of Finance Inspectorate of Investigation) Sub Direktorat Intelijen Dirjen Bea Cukai (Customs & Excise Sub-Directorate of Intelligence) Pusat Pelaporan dan Analisis Transaksi Keuangan (PPATK) Iran Ministry of Intelligence (VAJA) Oghab 2 – Nuclear facilities security Iranian Intelligence Community General Staff of the Armed Forces of the Islamic Republic of Iran: Intelligence Protection Organization of General Staff of the Armed Forces Islamic Republic of Iran Army: Intelligence Protection Organization of Iranian Army (SAHEFAJA) Islamic Revolutionary Guard Corps: Intelligence Organization of IRGC Intelligence Protection Organization of IRGC (SAHEFASA) Law Enforcement Force of the Islamic Republic of Iran: Iranian Security Police (PAVA) Intelligence Protection Organization of Iranian Police (SAHEFANAJA) Ministry of Defence and Armed Forces Logistics: Intelligence Protection Organization of Ministry of Defence (SAHEFAVEDJA) Iraq General Security Directorate - (GSD) - (Internal security agency) Iraqi National Intelligence Service - (INIS) - (Foreign intelligence and Special operations) Falcons Intelligence Cell - (FIC) - (Military intelligence) Kurdistan Region Security Council (KRSC) - (Regional security agency) Ireland Foreign & Domestic Military Intelligence (Defence Forces) Directorate of Military Intelligence (G2) Communications and Information Services Corps (CIS) SIGINT Section Domestic Police Intelligence (Garda Síochána) Crime & Security Branch (CSB) Special Detective Unit (SDU) National Surveillance Unit (NSU) Financial Intelligence Unit (FIU) Israel Mossad (Foreign Intelligence and Special Operations) Shin Bet (Internal Security Service) Aman (Military intelligence) Lahav 433 (Police intelligence) Italy Dipartimento delle Informazioni per la Sicurezza (DIS): "Department of Information for Security" Internal Intelligence Agenzia Informazioni e Sicurezza Interna (AISI): "Agency for Internal Information and Security" External Intelligence Agenzia Informazioni e Sicurezza Esterna (AISE): "Agency for External Information and Security" Military Intelligence 2nd Information and Security Unit (II RIS) : "II Reparto Informazioni e Sicurezza" (military intelligence and security command of the Joint General Staff) Reparto per le Informazioni Operative (RIO): "Operational Informations Unit" (information gathering branch). Centro Intelligence Interforze (CII): "Joint Intelligence Center" Centro Interforze di Formazione Intelligence e Guerra Elettronica (CIFI/GE): "Joint Intelligenge and Electronic Warfare Training Center" Reparto per la Sicurezza e le Addettanze Militari: "Security and Military Attaches Unit" (information security and counterintelligence branch). Ufficio Addettanze Militari all'Estero: Military Attaches Abroad Office (military diplomatic intelligence). Ufficio Sicurezza Difesa: "Defense Security Office" (military counterintelligence). Ufficio di Polizia Militare: "Military Police Office" (military information structures security). Centro di Valutazione della Difesa (Ce.Va.Difesa): "Defense Evaluation Center" (military software and systems security evaluation). Reparto per la Politica informativa ed il Telerilevamento Satellitare: "Information Policies and Satellite Remote Sensing Unit" (technical intelligence branch). Centro Interforze Telerilevamento Satellitare (CITS): "Joint Satellite Remote
(Defence Intelligence Service) Maldives Police Service (Directorate of Intelligence) Mexico Federal government of Mexico Civilian agencies Attorney General of Mexico (FGR) Attorney General's Crime-Combat Planning, Analysis and Information Center ( CENAPI / PGR – Centro de Planeación, Análisis e Información para el Combate a la Delincuencia ) Attorney General's Office for Special Investigations on Organized Crime (SEIDO / PGR ) Financial Intelligence Unit (Mexico) Unidad de Inteligencia Financiera (UIF) Interior Ministry (SEGOB) National Commission for Security (CNS) Federal Police Intelligence Division of the Federal Police (Division de Inteligencia – CNS / Policia Federal) National Intelligence Centre (CNI) Military agencies SEDENA 2nd Section of the National Defense Intelligence Staff (SEDENA S-2 – Seccion 2da: Inteligencia del Estado Mayor) Military Intelligence – National Defense Ministry (Inteligencia Militar – SEDENA / Ejercito y Fuerza Aerea) SEMAR Naval Intelligence – Navy Ministry (Inteligencia Naval – SEMAR / Marina Armada ) Moldova Information of and Security Service (SIS) – Serviciul de Informații și Securitate"https://sis.md/en Mongolia General Intelligence Agency of Mongolia (GIA) Montenegro National Security Agency (ANB) Ministry of Defence Intelligence-security Service Morocco Direction de la Surveillance du Territoire (DST) (Directorate of Territorial Surveillance) Direction Generale pour l'Etude et la Documentation (DGED) (Directorate of Research and Documentation) Bureau Central d'Investigations Judiciaires (BCIJ) (Central Bureau of Judicial Investigations) Mozambique Servico de Informaçãos e Segurança do Estado (SISE) Myanmar Bureau Of Special Investigation (BSI) Military Intelligence of Myanmar (MI) Special Intelligence Department (Special Branch) Criminal Investigation Department (CID) Nepal National Investigation Department (NID) Formerly known as Nepal Guptachar vibhag Directorate of Military Intelligence Netherlands Algemene Inlichtingen- en Veiligheidsdienst (AIVD) (General Intelligence and Security Service) Militaire Inlichtingen- en Veiligheidsdienst (MIVD) (Military Intelligence and Security Service) Joint Sigint Cyber Unit (JSCU) Nationale Coördinator Terrorismebestrijding en Veiligheid (NCTV) (National Coordinator for Counterterrorism and Security), used for the analysis of threats and coordination of counterterrorism measures Koninklijke Marechaussee (Royal Marechaussee) Team Criminal Intelligence (KMar-TCI) Fiscale Inlichtingen- en Opsporingsdienst (Fiscal Information and Investigation Service) Team Criminal Intelligence (FIOD-TCI) Korps Nationale Politie (National Police Corps) Team Criminal Intelligence (TCI) Team Special Witnesses (TSG) (Team Speciale Getuigen) Regional Intelligence Service (Regionale Inlichtingendienst), National Police teams which collect national security intelligence for the AIVD Team Public Order Intelligence (Team Openbare Order Inlichtingen), intelligence unit focused on collecting intelligence to maintain public order and security New Zealand Government Communications Security Bureau New Zealand Security Intelligence Service National Assessments Bureau Nicaragua Dirección de Información para la Defensa (DID) (Directorate of Information for Defense) Nigeria State Security Service (Internal Security) National Intelligence Agency (Foreign Intelligence and Counterintelligence) Defence Intelligence Agency (Military Intelligence) Department Directorate Of Secret Service (Nigeria) Force Intelligence Bureau(FIB) (Intelligence Arm of The Nigerian Police Force) North Macedonia Administration for Security and Counterintelligence (Uprava za bezbednost i kontrarazuznavanje) (Police Agency) Intelligence Agency (Agencija za Razuznavanje) (Civilian Agency) IA Military Service for Security and Intelligence (Voena služba za razuznuvanje i bezbednost) (Military Agency) Norway Nasjonal sikkerhetsmyndighet (NSM) (National Security Authority) Politiets sikkerhetstjeneste (PST) (Police Security Service) Etterretningstjenesten (NIS) (Norwegian Intelligence Service) Forsvarets sikkerhetstjeneste (FOST) – Norwegian Defence Security Service (NORDSS) Oman The Palace Office Internal Security Service Liaison and Coordination Service Pakistan National Intelligence Coordination Committee (NICC) External Intelligence Inter-Services Intelligence (ISI) Defence Intelligence Air Intelligence (AI) Military Intelligence (MI) Naval Intelligence (NI) Internal Intelligence Intelligence Bureau (IB) Federal Investigation Agency (FIA) National Intelligence Directorate (NID) Economic Intelligence & Securities Federal Board of Revenue (FBR) Directorate-General of Intelligence and Investigation (DGII) Financial Monitoring Unit (FMU) National Accountability Bureau (NAB) Security and Exchange Commission Pakistan (SECP) Other Intelligence National Counter Terrorism Authority (NACTA) Counter Terrorism Department (CTD) Anti-Narcotics Force (ANF) National Crises Management Cell (NCMC) Anti-Crime & Anti-Terrorism (ACAT) Panama Consejo de Seguridad Pública y Defensa Nacional (CSPDN) (security, defense and intelligence main government entity) National Police Intelligence Directorate (DNIP) – Dirección Nacional de Inteligencia Policial Direccion de Investigacion Judicial (DIJ) Direccion General de Analisis e Inteligencia Estrategica (DGAIE) Servicio Nacional de Inteligencia y Seguridad (SENIS) Papua New Guinea National Intelligence Organization (NIO) Royal PNG Constabulary – National Criminal Intelligence Unit (NCIU), Financial Intelligence Unit (FIU) PNG Customs Service – Customs Intelligence Department of Prime Minister – Office of Security Coordination & Assessment (OSCA) PNG Defense Force – Defense Intelligence Bureau (DIB) Bank of PNG – Financial Analysis & Supervision Unit (FASU) Paraguay Secretaría Nacional de Inteligencia (SNI) (National Intelligence Secretariat) Peru Dirección Nacional de Inteligencia (DINI) (National Directorate of Intelligence) Philippines Office of the President – Tanggapan ng Pangulo ng PilipinasNational Intelligence Coordinating Agency (NICA) – Pambansang Ahensiya sa Ugnayang IntelihensiyaPhilippine Drug Enforcement Agency (PDEA) – Ahensiya ng Pilipinas sa Pagpapatupad ng Batas Laban sa Bawal na GamotNational Counter-Terrorism Action Group (NACTAG) – Pambansang Lupon ng Pagsasagawa Laban sa TerorismoDepartment of Justice – Kagawaran ng KatarunganNational Bureau of Investigation (NBI) – Pambansang Kawanihan ng PagsisiyasatDepartment of National Defense – Kagawaran ng Tanggulang PambansaIntelligence Service, Armed Forces of the Philippines (ISAFP) Philippine Army – Hukbong Katihan ng PilipinasArmy Intelligence Regiment (AIR) Philippine Air Force – Hukbong Himpapawid ng Pilipinas300th Air Intelligence and Security Wing (AISW) Philippine Navy – Hukbong Dagat ng PilipinasNaval Intelligence and Security Force (NISF) Department of Transportation – Kagawaran ng TransportasyonPhilippine Coast Guard – Tanod Baybayin ng PilipinasCoast Guard Staff for Intelligence Department of the Interior and Local Government – Kagawaran ng Interyor at Pamahalaang LokalPhilippine National Police – Pambansang Pulisya ng PilipinasDirectorate for Intelligence (DI) Philippine National Police – Intelligence Group (PNP-IG) Philippine National Police – Criminal Investigation and Detection Group (PNP-CIDG) Department of Finance – Kagawaran ng PananalapiBureau of Customs (BuCor) – Kawanihan ng AdwanaCustoms Intelligence and Investigation Service (CIIS) Department of Foreign Affairs – Kagawaran ng Ugnayang PanlabasIntelligence and Security Unit (ISU) Poland Agencja Wywiadu (AW) (Foreign Intelligence Agency, also principal SIGINT and IMINT agency) Agencja Bezpieczeństwa Wewnętrznego (ABW) (Internal Security Agency - domestic and counter-intelligence, counter-terrorisn, counter-extremism, domestic SIGINT) Służba Wywiadu Wojskowego (SWW) (Military Intelligence Service including SIGINT and IMINT) Służba Kontrwywiadu Wojskowego (SKW) (Military Counter-intelligence Service including SIGINT) Zarząd Kryminalny Komendy Głównej Żandarmerii Wojskowej (ZK KGŻW) (Criminal Directorate of the Military Gendarmerie Headquarters) - criminal intelligence in Armed Forces Centralne Biuro Antykorupcyjne (CBA) (Central Anticorruption Bureau) Komenda Główna Policji (KGP) (criminal intelligence) Bureau of Criminal Intelligence and Information (each of the Voivodeship Police Commands has also a corresponding department) Centralne Biuro Śledcze Policji (CBŚP) (Central Investigations Bureau of the Police) Zarząd Operacyjno-Śledczy Komendy GłówneJ Straży Granicznej (KGSG) (Operations and Investigations Directorate of the Border Guard Headquarters) (ZOŚ KGSG) - border, immigration, air traffic and related criminal intelligence Służba Ochrony Państwa (SOP) - intelligence concerning personal security of principal state officials Straż Marszałkowska (SM) - intelligence concerning security of the houses of Parliament Tax and Customs Service (SCS) (tax intelligence, as well as other concerning customs, excise, gambling, controlled drugs, controlled hazardous materials, looted cultural property, CITES) General Inspector of Financial Information (GIIF) (financial intelligence) Other military units involved in: IMINT Polish IMINT Centre (ORO) 12th Unmanned Aerial Vehicles Base (12.BBSP) Military Unit NIL "Brigadier General August Emil Fieldorf «Nil»" (JW NIL) SIGINT Reconnaissance Group of 3rd Ship Flotilla (gOR 3.FO) Centre for Radioelectronic Combat Reconnaissance and Support ″Lieutenant Colonel Jan Kowalewski″ (CRiWWRE) 2th Przasnysz Radioelectronic Reconnaissance Regiment (2.ORel) 6th Oliwa Radioelectronic Reconnaissance Regiment ″Admiral Arendt Dickman″ (6.ORel) Military Unit NIL "Brigadier General August Emil Fieldorf «Nil»" (JW NIL) Narodowe Centrum Bezpieczeństwa Cyberprzestrzeni (NCBC - National Centre for Cyberspace Security) (SIGINT, cyberwarfare and cryptology) Portugal Sistema de Informações da República Portuguesa (SIRP) (Intelligence System of the Portuguese Republic) Serviço de Informações de Segurança (SIS) (Security Intelligence Service) Serviço de Informações Estratégicas de Defesa (SIED) (Defense Strategic Intelligence Service) Centro de Informações e Segurança Militares (CISMIL) (Military Intelligence and Security Service) Qatar Qatar State Security Romania Romanian Intelligence Service (SRI) – Serviciul Român de Informații Foreign Intelligence Service (SIE) – Serviciul de Informații ExterneSpecial Telecommunication Service (STS) – Serviciul de Telecomunicații SpecialeProtection and Guard Service (SPP) – Serviciul de Protecţie şi PazăMinistry of National Defence General Directorate for Defense Intelligence (DGIA) – Direcția Generală de Informații a ApărăriiMinistry of Internal Affairs General Directorate for Internal Security (DGPI) – Direcția Generală de Protecție Internă Russia Federal Security Service (FSB) – Федеральная служба безопасности Main Directorate of Special Programs of the President of the Russian Federation (GUSP) – Главное управление специальных программ Президента Российской Федерации Foreign Intelligence Service (Russia) (SVR) – Служба Внешней Разведки Main Intelligence Directorate (GRU) – Главное Разведывательное Управление Federal Protective Service (FSO) – Федеральная служба охраныSpecial Communications Service of Russia – Служба специальной связи и информации Saudi Arabia Council of Political and Security Affairs (CPSA) – مجلس الشؤون السياسية والأمنية General Intelligence Presidency (GIP) – رئاسة الاستخبارات العامة Presidency of State Security (PSS) – رئاسة أمن الدولة Mabahith (GDI) – المباحث العامة Saudi Arabia Ministry of Defense (MOD) – وزارة الدفاع The Armed Forces Intelligence and Security Commission – هيئة استخبارات وأمن القوات المسلحة The Land Forces Intelligence and Security Commission – هيئة استخبارات وأمن القوات البرية The Naval Forces Intelligence and Security Commission – هيئة استخبارات وأمن القوات البحرية The Air Forces Intelligence and Security Commission – هيئة استخبارات وأمن القوات الجوية The Air Defense Forces Intelligence and Security Commission – هيئة استخبارات وأمن قوات الدفاع الجوي The Strategic Missile Force Intelligence and Security Commission – هيئة استخبارات وأمن قوة الصواريخ الاستراتيجية Saudi Arabia Ministry of Interior (MOI) – وزارة الداخلية Saudi Arabia Border Guards Intelligence Directorate – استخبارات حرس الحدود General Directorate of Public Security (GPS) – مديرية الأمن العام General Administration of Financial Investigations (GAFI) – الادارة العامة للتحريات المالية Saudi Arabia National Guard (SANG) – الحرس الوطني السعودي National Guard Intelligence Commission – هيئة الاستخبارات بالحرس الوطني Saudi Royal Guard (SRG) – رئاسة الحرس الملكي Saudi Royal Guard Intelligence Commission – هيئة استخبارات الحرس الملكي السعودي The National Cyber Security Commission (NCSC) – الهيئة الوطنية للأمن السيبراني Saudi Arabian Monetary Authority (SAMA) – مؤسسة النقد العربي السعودي Anti-Money Laundering Committee (AMLC) – اللجنة الدائمة لمكافحة غسل الاموال Serbia National National Security Council and Classified Information Protection Office – Канцеларија Савета за националну безбедност и заштиту тајних податакаMinistry of the Interior Security Intelligence Agency (BIA) – Безбедносно-информативна агенцијаMinistry of Defence Military Intelligence Agency (VOA) – Војнообавештајна агенцијаMilitary Security Agency (VBA) – Војнобезбедносна агенцијаIntelligence and Reconnaissance Directorate (J-2) – Управа за обавештајно-извиђачке послове Ministry of Finance Money Laundering Prevention Administration – Управа за спречавање прања новца Singapore Internal Security Department (ISD) Security and Intelligence Division (SID) Slovakia Slovenská informačná služba (SIS) (Slovak Information Service) Vojenské spravodajstvo (Military Intelligence) Národný bezpečnostný úrad (NBÚ) (National Security Bureau) Slovenia Slovenska Obveščevalno-Varnostna Agencija (SOVA) (Slovenian Intelligence and Security Agency) Obveščevalno Varnostna Služba (OVS) ( Intelligence and Security Service of Slovenian Ministry of Defence) General štab SV – Sektor za obveščevalne zadeve – J2 (GŠSV-J2) ( (General Staff SAF – Section for intelligence matters – J2) Nacionalni Preiskovalni urad (NPU) Somalia National Intelligence and Security Agency (NISA) South Africa State Security Agency (SSA) Domestic Branch Foreign Branch South African National Defence Force Intelligence Division (SANDF-ID) Crime Intelligence Division, South African Police Service Spain Ministry of the Presidency National Security Department (DSN) Ministry of Defence National Intelligence Centre (CNI) Centro Criptológico Nacional (CCN) Spanish Armed Forces Armed Forces Intelligence Center (CIFAS) Joint Cyberspace Command (MCCE) Ministry of the Interior Intelligence Center for Counter-Terrorism and Organized Crime (CITCO) Cuerpo Nacional de Policia Brigada
Internet Society, an international membership-based non-profit organization. Because the IETF itself does not have members, nor is it an organization per se, the Internet Society provides the financial and legal framework for the activities of the IETF and its sister bodies (IAB, IRTF). IETF activities are funded by meeting fees, meeting sponsors and by the Internet Society via its organizational membership and the proceeds of the Public Interest Registry. In December 2005 the IETF Trust was established to manage the copyrighted materials produced by the IETF. Steering group The Internet Engineering Steering Group (IESG) is a body composed of the Internet Engineering Task Force (IETF) chair and area directors. It provides the final technical review of Internet standards and is responsible for day-to-day management of the IETF. It receives appeals of the decisions of the working groups, and the IESG makes the decision to progress documents in the standards track. The chair of the IESG is the director of the General Area, who also serves as the overall IETF Chair. Members of the IESG include the two directors of each of the following areas: Applications Area (app) Internet Area (int) Operations & Network Management Area (ops) Routing Area (rtg) Real-time Applications and Infrastructure Area (rai) Security Area (sec) Transport and Services Area (tsv) – frequently also referred to as the "Transport Area" Liaison and ex officio members include: IETF Executive Director IAB Chair Appointed Liaison from the IAB Liaison from the Internet Assigned Numbers Authority (IANA) Liaison from the Request for Comments (RFC) Editor Early leadership and administrative history The Gateway Algorithms and Data Structures (GADS) Task Force was the precursor to the IETF. Its chairman was David L. Mills of the University of Delaware. In January of 1986, the Internet Activities Board (IAB; now called the Internet Architecture Board) decided to divide GADS into two entities: an Internet Architecture (INARC) Task Force chaired by Mills to pursue research goals, and the IETF to handle nearer-term engineering and technology transfer issues. The first IETF chair was Mike Corrigan, who was then the technical program manager for the Defense Data Network (DDN). Also in 1986, after leaving DARPA, Robert E. Kahn founded the Corporation for National Research Initiatives (CNRI), which began providing administrative support to the IETF. In 1987, Corrigan was succeeded as IETF chair by Phill Gross. Effective March 1, 1989, but providing support dating back to late 1988, CNRI and NSF entered into a Cooperative Agreement No. NCR-8820945, wherein CNRI agreed to create and provide a "secretariat" for the "overall coordination, management and support of the work of the IAB, its various task forces and, particularly, the IETF." In 1992, CNRI supported the formation and early funding of the Internet Society, which took on the IETF as a fiscally sponsored project, along with the IAB, the IRTF, and the organization of annual INET meetings. Phill Gross continued to serve as IETF chair throughout this transition. Cerf, Kahn, and Lyman Chapin announced the formation of ISOC as "a professional society to facilitate, support, and promote the evolution and growth of the Internet as a global research communications infrastructure". At the first board meeting of the Internet Society, Vint Cerf, representing CNRI, offered, "In the event a deficit occurs, CNRI has agreed to contribute up to USD102000 to offset it." In 1993, Cerf continued to support the formation of ISOC while working for CNRI, and the role of ISOC in "the official procedures for creating and documenting Internet Standards" was codified in the IETF's . In 1995, IETF's describes ISOC's role in the IETF as being purely administrative, and ISOC as having "no influence whatsoever on the Internet Standards process, the Internet Standards or their technical content". In 1998, CNRI established Foretec Seminars, Inc. (Foretec), a for-profit subsidiary to take over providing Secretariat services to the IETF. Foretec provided these services until at least 2004. By 2013, Foretec was dissolved. In 2003, IETF's described IETFs role in appointing 3 board members to the ISOC's Board of Directors. In 2018, ISOC established The IETF Administration LLC, a separate LLC to handle the administration of the
the majority of the IETF's work is done via mailing lists, meeting attendance is not required for contributors. Each working group is intended to complete work on its topic and then disband. In some cases, the working group will instead have its charter updated to take on new tasks as appropriate. The working groups are organized into areas by subject matter. Current areas are Applications, General, Internet, Operations and Management, Real-time Applications and Infrastructure, Routing, Security, and Transport. Each area is overseen by an area director (AD), with most areas having two co-ADs. The ADs are responsible for appointing working group chairs. The area directors, together with the IETF Chair, form the Internet Engineering Steering Group (IESG), which is responsible for the overall operation of the IETF. The Internet Architecture Board (IAB) oversees the IETF's external relationships and relations with the RFC Editor. The IAB provides long-range technical direction for Internet development. The IAB is also jointly responsible for the IETF Administrative Oversight Committee (IAOC), which oversees the IETF Administrative Support Activity (IASA), which provides logistical, etc. support for the IETF. The IAB also manages the Internet Research Task Force (IRTF), with which the IETF has a number of cross-group relations. A Nominating Committee (NomCom) of ten randomly chosen volunteers who participate regularly at meetings is vested with the power to appoint, reappoint, and remove members of the IESG, IAB, IASA, and the IAOC. To date, no one has been removed by a NomCom, although several people have resigned their positions, requiring replacements. In 1993 the IETF changed from an activity supported by the US Federal Government to an independent, international activity associated with the Internet Society, an international membership-based non-profit organization. Because the IETF itself does not have members, nor is it an organization per se, the Internet Society provides the financial and legal framework for the activities of the IETF and its sister bodies (IAB, IRTF). IETF activities are funded by meeting fees, meeting sponsors and by the Internet Society via its organizational membership and the proceeds of the Public Interest Registry. In December 2005 the IETF Trust was established to manage the copyrighted materials produced by the IETF. Steering group The Internet Engineering Steering Group (IESG) is a body composed of the Internet Engineering Task Force (IETF) chair and area directors. It provides the final technical review of Internet standards and is responsible for day-to-day management of the IETF. It receives appeals of the decisions of the working groups, and the IESG makes the decision to progress documents in the standards track. The chair of the IESG is the director of the General Area, who also serves as the overall IETF Chair. Members of the IESG include the two directors of each of the following areas: Applications Area (app) Internet Area (int) Operations & Network Management Area (ops) Routing Area (rtg) Real-time Applications and Infrastructure Area (rai) Security Area (sec) Transport and Services Area (tsv) – frequently also referred to as the "Transport Area" Liaison and ex officio members include: IETF Executive Director IAB Chair Appointed Liaison from the IAB Liaison from the Internet Assigned Numbers Authority (IANA) Liaison from the Request for Comments (RFC) Editor Early leadership and administrative history The Gateway Algorithms and Data Structures (GADS) Task Force was the precursor to the IETF. Its chairman was David L. Mills of the University of Delaware. In January of 1986, the Internet Activities Board (IAB; now called the Internet
are often chosen for this purpose as they already must tolerate interference issues. Cordless phones, Bluetooth devices, near field communication (NFC) devices, garage door openers, baby monitors and wireless computer networks (Wi-Fi) may all use the ISM frequencies, although these low power transmitters are not considered to be ISM devices. Definition The ISM bands are defined by the ITU Radio Regulations (article 5) in footnotes 5.138, 5.150, and 5.280 of the Radio Regulations. Individual countries' use of the bands designated in these sections may differ due to variations in national radio regulations. Because communication devices using the ISM bands must tolerate any interference from ISM equipment, unlicensed operations are typically permitted to use these bands, since unlicensed operation typically needs to be tolerant of interference from other devices anyway. The ISM bands share allocations with unlicensed and licensed operations; however, due to the high likelihood of harmful interference, licensed use of the bands is typically low. In the United States, uses of the ISM bands are governed by Part 18 of the Federal Communications Commission (FCC) rules, while Part 15 contains the rules for unlicensed communication devices, even those that share ISM frequencies. In Europe, the ETSI is responsible for regulating the use of Short Range Devices, some of which operate in ISM bands. Frequency allocations The allocation of radio frequencies is provided according to Article 5 of the ITU Radio Regulations (edition 2012). In order to improve harmonisation in spectrum utilisation, the majority of service-allocations stipulated in this document were incorporated in national Tables of Frequency Allocations and Utilisations which is within the responsibility of the appropriate national administration. The allocation might be primary, secondary, exclusive, and shared. primary allocation: is indicated by writing in capital letters (see example below) secondary allocation: is indicated by small letters exclusive or shared utilization: is within the responsibility of administrations ITU frequency allocations Type A (footnote 5.138) = frequency bands are designated for ISM applications. The use of these frequency bands for ISM applications shall be subject to special authorization by the administration concerned, in agreement with other administrations whose radiocommunication services might be affected. In applying this provision, administrations shall have due regard to the latest relevant ITU-R Recommendations. Type B (footnote 5.150) = frequency bands are also designated for ISM applications. Radiocommunication services operating within these bands must accept harmful interference which may be caused by these applications. ITU RR, (Footnote 5.280) = In Germany, Austria, Bosnia and Herzegovina, Croatia, Macedonia, Liechtenstein, Montenegro, Portugal, Serbia, Slovenia and Switzerland, the band 433.05-434.79 MHz (center frequency 433.92 MHz) is designated for ISM applications. Radio communication services of these countries operating within this band must accept harmful interference which may be caused by these applications. Footnote AU = Australia is part of ITU Region 3. The band 433.05 to 434.79 MHz is not a designated ISM band in Australia, however the operation of low powered devices in the radio frequency band 433.05 to 434.79 MHz is supported through Radio communications class licence for low interference potential devices (LIPDs). History The ISM bands were first established at the International Telecommunications Conference of the ITU in Atlantic City, 1947. The American delegation specifically proposed several bands, including the now commonplace 2.4 GHz band, to accommodate the
monitors, garage door openers, wireless doorbells, keyless entry systems for vehicles, radio control channels for UAVs (drones), wireless surveillance systems, RFID systems for merchandise, and wild animal tracking systems. Some electrodeless lamp designs are ISM devices, which use RF emissions to excite fluorescent tubes. Sulfur lamps are commercially available plasma lamps, which use a 2.45 GHz magnetron to heat sulfur into a brightly glowing plasma. Long-distance wireless power systems have been proposed and experimented with which would use high-power transmitters and rectennas, in lieu of overhead transmission lines and underground cables, to send power to remote locations. NASA has studied using microwave power transmission on 2.45 GHz to send energy collected by solar power satellites back to the ground. Also in space applications, a Helicon Double Layer ion thruster is a prototype spacecraft propulsion engine which uses a 13.56 MHz transmission to break down and heat gas into plasma. Common non-ISM uses In recent years ISM bands have also been shared with (non-ISM) license-free error-tolerant communications applications such as wireless sensor networks in the 915 MHz and 2.450 GHz bands, as well as wireless LANs and cordless phones in the 915 MHz, 2.450 GHz, and 5.800 GHz bands. Because unlicensed devices are required to be tolerant of ISM emissions in these bands, unlicensed low power users are generally able to operate in these bands without causing problems for ISM users. ISM equipment does not necessarily include a radio receiver in the ISM band (e.g. a microwave oven does not have a receiver). In the United States, according to 47 CFR Part 15.5, low power communication devices must accept interference from licensed users of that frequency band, and the Part 15 device must not cause interference to licensed users. Note that the 915 MHz band should not be used in countries outside Region 2, except those that specifically allow it, such as Australia and Israel, especially those that use the GSM-900 band for cellphones. The ISM bands are also widely used for Radio-frequency identification (RFID) applications with the most commonly used band being the 13.56 MHz band used by systems compliant with ISO/IEC 14443 including those used by biometric passports and contactless smart cards. In Europe, the use of the ISM band is covered by Short Range Device regulations issued by European Commission, based on technical recommendations by CEPT and standards by ETSI. In most of Europe, LPD433 band is allowed for license-free voice communication in addition to PMR446. Wireless network devices use wavebands as follows: IEEE 802.11/Wi-Fi 2450 MHz and 5800 MHz bands Bluetooth 2450 MHz band falls under WPAN IEEE 802.15.4, ZigBee and other personal area networks may use the and ISM bands because of frequency sharing between different allocations. Wireless LANs and cordless phones can also use bands other than those shared with ISM, but such uses require approval on a country by country basis. DECT phones use allocated spectrum outside the ISM bands that differs in Europe and North America. Ultra-wideband LANs require more spectrum than the ISM bands can provide, so the relevant standards such as IEEE 802.15.4a are designed to make use of spectrum outside the ISM bands. Despite the fact that these additional bands are outside the official ITU-R ISM bands, because they are used for the same types of low power personal communications, they are sometimes incorrectly referred to as ISM bands as well. Several brands of radio control equipment use the band range for low power remote control of toys, from gas powered cars to miniature aircraft. Worldwide Digital Cordless Telecommunications or WDCT is a technology that uses the radio spectrum. Google's Project Loon
all , then converges if and only if the integral is finite. Cauchy's condensation test: If is non-negative and non-increasing, then the two series and are of the same nature: both convergent, or both divergent. Alternating series test: A series of the form (with ) is called alternating. Such a series converges if the sequence is monotone decreasing and converges to . The converse is in general not true. For some specific types of series there are more specialized convergence tests, for instance for Fourier series there is the Dini test. Series of functions A series of real- or complex-valued functions converges pointwise on a set E, if the series converges for each x in E as an ordinary series of real or complex numbers. Equivalently, the partial sums converge to ƒ(x) as N → ∞ for each x ∈ E. A stronger notion of convergence of a series of functions is the uniform convergence. A series converges uniformly if it converges pointwise to the function ƒ(x), and the error in approximating the limit by the Nth partial sum, can be made minimal independently of x by choosing a sufficiently large N. Uniform convergence is desirable for a series because many properties of the terms of the series are then retained by the limit. For example, if a series of continuous functions converges uniformly, then the limit function is also continuous. Similarly, if the ƒn are integrable on a closed and bounded interval I and converge uniformly, then the series is also integrable on I and can be integrated term-by-term. Tests for uniform convergence include the Weierstrass' M-test, Abel's uniform convergence test, Dini's test, and the Cauchy criterion. More sophisticated types of convergence of a series of functions can also be defined. In measure theory, for instance, a series of functions converges almost everywhere if it converges pointwise except on a certain set of measure zero. Other modes of convergence depend on a different metric space structure on the space of functions under consideration. For instance, a series of functions converges in mean on a set E to a limit function ƒ provided as N → ∞. Power series A power series is a series of the form The Taylor series at a point c of a function is a power series that, in many cases, converges to the function in a neighborhood of c. For example, the series is the Taylor series of at the origin and converges to it for every x. Unless it converges only at x=c, such a series converges on a certain open disc of convergence centered at the point c in the complex plane, and may also converge at some of the points of the boundary of the disc. The radius of this disc is known as the radius of convergence, and can in principle be determined from the asymptotics of the coefficients an. The convergence is uniform on closed and bounded (that is, compact) subsets of the interior of the disc of convergence: to wit, it is uniformly convergent on compact sets. Historically, mathematicians such as Leonhard Euler operated liberally with infinite series, even if they were not convergent. When calculus was put on a sound and correct foundation in the nineteenth century, rigorous proofs of the convergence of series were always required. Formal power series While many uses of power series refer to their sums, it is also possible to treat power series as formal sums, meaning that no addition operations are actually performed, and the symbol "+" is an abstract symbol of conjunction which is not necessarily interpreted as corresponding to addition. In this setting, the sequence of coefficients itself is of interest, rather than the convergence of the series. Formal power series are used in combinatorics to describe and study sequences that are otherwise difficult to handle, for example, using the method of generating functions. The Hilbert–Poincaré series is a formal power series used to study graded algebras. Even if the limit of the power series is not considered, if the terms support appropriate structure then it is possible to define operations such as addition, multiplication, derivative, antiderivative for power series "formally", treating the symbol "+" as if it corresponded to addition. In the most common setting, the terms come from a commutative ring, so that the formal power series can be added term-by-term and multiplied via the Cauchy product. In this case the algebra of formal power series is the total algebra of the monoid of natural numbers over the underlying term ring. If the underlying term ring is a differential algebra, then the algebra of formal power series is also a differential algebra, with differentiation performed term-by-term. Laurent series Laurent series generalize power series by admitting terms into the series with negative as well as positive exponents. A Laurent series is thus any series of the form If such a series converges, then in general it does so in an annulus rather than a disc, and possibly some boundary points. The series converges uniformly on compact subsets of the interior of the annulus of convergence. Dirichlet series A Dirichlet series is one of the form where s is a complex number. For example, if all an are equal to 1, then the Dirichlet series is the Riemann zeta function Like the zeta function, Dirichlet series in general play an important role in analytic number theory. Generally a Dirichlet series converges if the real part of s is greater than a number called the abscissa of convergence. In many cases, a Dirichlet series can be extended to an analytic function outside the domain of convergence by analytic continuation. For example, the Dirichlet series for the zeta function converges absolutely when Re(s) > 1, but the zeta function can be extended to a holomorphic function defined on with a simple pole at 1. This series can be directly generalized to general Dirichlet series. Trigonometric series A series of functions in which the terms are trigonometric functions is called a trigonometric series: The most important example of a trigonometric series is the Fourier series of a function. History of the theory of infinite series Development of infinite series Greek mathematician Archimedes produced the first known summation of an infinite series with a method that is still used in the area of calculus today. He used the method of exhaustion to calculate the area under the arc of a parabola with the summation of an infinite series, and gave a remarkably accurate approximation of π. Mathematicians from Kerala, India studied infinite series around 1350 CE. In the 17th century, James Gregory worked in the new decimal system on infinite series and published several Maclaurin series. In 1715, a general method for constructing the Taylor series for all functions for which they exist was provided by Brook Taylor. Leonhard Euler in the 18th century, developed the theory of hypergeometric series and q-series. Convergence criteria The investigation of the validity of infinite series is considered to begin with Gauss in the 19th century. Euler had already considered the hypergeometric series on which Gauss published a memoir in 1812. It established simpler criteria of convergence, and the questions of remainders and the range of convergence. Cauchy (1821) insisted on strict tests of convergence; he showed that if two series are convergent their product is not necessarily so, and with him begins the discovery of effective criteria. The terms convergence and divergence had been introduced long before by Gregory (1668). Leonhard Euler and Gauss had given various criteria, and Colin Maclaurin had anticipated some of Cauchy's discoveries. Cauchy advanced the theory of power series by his expansion of a complex function in such a form. Abel (1826) in his memoir on the binomial series corrected certain of Cauchy's conclusions, and gave a completely scientific summation of the series for complex values of and . He showed the necessity of considering the subject of continuity in questions of convergence. Cauchy's methods led to special rather than general criteria, and the same may be said of Raabe (1832), who made the first elaborate investigation of the subject, of De Morgan (from 1842), whose logarithmic test DuBois-Reymond (1873) and Pringsheim (1889) have shown to fail within a certain region; of Bertrand (1842), Bonnet (1843), Malmsten (1846, 1847, the latter without integration); Stokes (1847), Paucker (1852), Chebyshev (1852), and Arndt (1853). General criteria began with Kummer (1835), and have been studied by Eisenstein (1847), Weierstrass in his various contributions to the theory of functions, Dini (1867), DuBois-Reymond (1873), and many others. Pringsheim's memoirs (1889) present the most complete general theory. Uniform convergence The theory of uniform convergence was treated by Cauchy (1821), his limitations being pointed out by Abel, but the first to attack it successfully were Seidel and Stokes (1847–48). Cauchy took up the problem again (1853), acknowledging Abel's criticism, and reaching the same conclusions which Stokes had already found. Thomae used the doctrine (1866), but there was great delay in recognizing the importance of distinguishing between uniform and non-uniform convergence, in spite of the demands of the theory of functions. Semi-convergence A series is said to be semi-convergent (or conditionally convergent) if it is convergent but not absolutely convergent. Semi-convergent series were studied by Poisson (1823), who also gave a general form for the remainder of the Maclaurin formula. The most important solution of the problem is due, however, to Jacobi (1834), who attacked the question of the remainder from a different standpoint and reached a different formula. This expression was also worked out, and another one given, by Malmsten (1847). Schlömilch (Zeitschrift, Vol.I, p. 192, 1856) also improved Jacobi's remainder, and showed the relation between the remainder and Bernoulli's function Genocchi (1852) has further contributed to the theory. Among the early writers was Wronski, whose "loi suprême" (1815) was hardly recognized until Cayley (1873) brought it into prominence. Fourier series Fourier series were being investigated as the result of physical considerations at the same time that Gauss, Abel, and Cauchy were working out the theory of infinite series. Series for the expansion of sines and cosines, of multiple arcs in powers of the sine and cosine of the arc had been treated by Jacob Bernoulli (1702) and his brother Johann Bernoulli (1701) and still earlier by Vieta. Euler and Lagrange simplified the subject, as did Poinsot, Schröter, Glaisher, and Kummer. Fourier (1807) set for himself a different problem, to expand a given function of x in terms of the sines or cosines of multiples of x, a problem which he embodied in his Théorie analytique de la chaleur (1822). Euler had already given the formulas for determining the coefficients in the series; Fourier was the first to assert and attempt to prove the general theorem. Poisson (1820–23) also attacked the problem from a different standpoint. Fourier did not, however, settle the question of convergence of his series, a matter left for Cauchy (1826) to attempt and for Dirichlet (1829) to handle in a thoroughly scientific manner (see convergence of Fourier series). Dirichlet's treatment (Crelle, 1829), of trigonometric series was the subject of criticism and improvement by Riemann (1854), Heine, Lipschitz, Schläfli, and du Bois-Reymond. Among other prominent contributors to the theory of trigonometric and Fourier series were Dini, Hermite, Halphen, Krause, Byerly and Appell. Generalizations Asymptotic series Asymptotic series, otherwise asymptotic expansions, are infinite series whose partial sums become good approximations in the limit of some point of the domain. In general they do not converge, but they are
of numerical series A geometric series is one where each successive term is produced by multiplying the previous term by a constant number (called the common ratio in this context). For example: In general, the geometric series converges if and only if , in which case it converges to . The harmonic series is the series The harmonic series is divergent. An alternating series is a series where terms alternate signs. Examples: (alternating harmonic series) and A telescoping series converges if the sequence bn converges to a limit L—as n goes to infinity. The value of the series is then b1 − L. An arithmetico-geometric series is a generalization of the geometric series, which has coefficients of the common ratio equal to the terms in an arithmetic sequence. Example: The p-series converges if p > 1 and diverges for p ≤ 1, which can be shown with the integral criterion described below in convergence tests. As a function of p, the sum of this series is Riemann's zeta function. Hypergeometric series: and their generalizations (such as basic hypergeometric series and elliptic hypergeometric series) frequently appear in integrable systems and mathematical physics. There are some elementary series whose convergence is not yet known/proven. For example, it is unknown whether the Flint Hills series converges or not. The convergence depends on how well can be approximated with rational numbers (which is unknown as of yet). More specifically, the values of n with large numerical contributions to the sum are the numerators of the continued fraction convergents of , a sequence beginning with 1, 3, 22, 333, 355, 103993, ... . These are integers that are close to for some integer n, so that is close to 0 and its reciprocal is large. Alekseyev (2011) proved that if the series converges, then the irrationality measure of is smaller than 2.5, which is much smaller than the current known bound of 7.10320533.... π Natural logarithm of 2 Natural logarithm base e Calculus and partial summation as an operation on sequences Partial summation takes as input a sequence, (an), and gives as output another sequence, (SN). It is thus a unary operation on sequences. Further, this function is linear, and thus is a linear operator on the vector space of sequences, denoted Σ. The inverse operator is the finite difference operator, denoted Δ. These behave as discrete analogues of integration and differentiation, only for series (functions of a natural number) instead of functions of a real variable. For example, the sequence (1, 1, 1, ...) has series (1, 2, 3, 4, ...) as its partial summation, which is analogous to the fact that In computer science, it is known as prefix sum. Properties of series Series are classified not only by whether they converge or diverge, but also by the properties of the terms an (absolute or conditional convergence); type of convergence of the series (pointwise, uniform); the class of the term an (whether it is a real number, arithmetic progression, trigonometric function); etc. Non-negative terms When an is a non-negative real number for every n, the sequence SN of partial sums is non-decreasing. It follows that a series Σan with non-negative terms converges if and only if the sequence SN of partial sums is bounded. For example, the series is convergent, because the inequality and a telescopic sum argument implies that the partial sums are bounded by 2. The exact value of the original series is the Basel problem. Absolute convergence A series converges absolutely if the series of absolute values converges. This is sufficient to guarantee not only that the original series converges to a limit, but also that any reordering of it converges to the same limit. Conditional convergence A series of real or complex numbers is said to be conditionally convergent (or semi-convergent) if it is convergent but not absolutely convergent. A famous example is the alternating series which is convergent (and its sum is equal to ), but the series formed by taking the absolute value of each term is the divergent harmonic series. The Riemann series theorem says that any conditionally convergent series can be reordered to make a divergent series, and moreover, if the are real and is any real number, that one can find a reordering so that the reordered series converges with sum equal to . Abel's test is an important tool for handling semi-convergent series. If a series has the form where the partial sums are bounded, has bounded variation, and exists: then the series is convergent. This applies to the point-wise convergence of many trigonometric series, as in with . Abel's method consists in writing , and in performing a transformation similar to integration by parts (called summation by parts), that relates the given series to the absolutely convergent series Evaluation of truncation errors The evaluation of truncation errors is an important procedure in numerical analysis (especially validated numerics and computer-assisted proof). Alternating series When conditions of the alternating series test are satisfied by , there is an exact error evaluation. Set to be the partial sum of the given alternating series . Then the next inequality holds: Taylor series Taylor's theorem is a statement that includes the evaluation of the error term when the Taylor series is truncated. Hypergeometric series By using the ratio, we can obtain the evaluation of the error term when the hypergeometric series is truncated. Matrix exponential For the matrix exponential: the following error evaluation holds (scaling and squaring method): Convergence tests There exist many tests that can be used to determine whether particular series converge or diverge. n-th term test: If , then the series diverges; if , then the test is inconclusive. Comparison test 1 (see Direct comparison test): If is an absolutely convergent series such that for some number and for sufficiently large , then converges absolutely as well. If diverges, and for all sufficiently large , then also fails to converge absolutely (though it could still be conditionally convergent, for example, if the alternate in sign). Comparison test 2 (see Limit comparison test): If is an absolutely convergent series such that for sufficiently large , then converges absolutely as well. If diverges, and for all sufficiently large , then also fails to converge absolutely (though it could still be conditionally convergent, for example, if the alternate in sign). Ratio test: If there exists a constant such that for all sufficiently large , then converges absolutely. When the ratio is less than , but not less than a constant less than , convergence is possible but this test does not establish it. Root test: If there exists a constant such that for all sufficiently large , then converges absolutely. Integral test: if is a positive monotone decreasing function defined on the interval with for all , then converges if and only if the integral is finite. Cauchy's condensation test: If is non-negative and non-increasing, then the two series and are of the same nature: both convergent, or both divergent. Alternating series test: A series of the form (with ) is called alternating. Such a series converges if the sequence is monotone decreasing and converges to . The converse is in general not true. For some specific types of series there are more specialized convergence tests, for instance for Fourier series there is the Dini test. Series of functions A series of real- or complex-valued functions converges pointwise on a set E, if the series converges for each x in E as an ordinary series of real or complex numbers. Equivalently, the partial sums converge to ƒ(x) as N → ∞ for each x ∈ E. A stronger notion of convergence of a series of functions is the uniform convergence. A series converges uniformly if it converges pointwise to the function ƒ(x), and the error in approximating the limit by the Nth partial sum, can be made minimal independently of x by choosing a sufficiently large N. Uniform convergence is desirable for a series because many properties of the terms of the series are then retained by the limit. For example, if a series of continuous functions converges uniformly, then the limit function is also continuous. Similarly, if the ƒn are integrable on a closed and bounded interval I and converge uniformly, then the series is also integrable on I and can be integrated term-by-term. Tests for uniform convergence include the Weierstrass' M-test, Abel's uniform convergence test, Dini's test, and the Cauchy criterion. More sophisticated types of convergence of a series of functions can also be defined. In measure theory, for instance, a series of functions converges almost everywhere if it converges pointwise except on a certain set of measure zero. Other modes of convergence depend on a different metric space structure on the space of functions under consideration. For instance, a series of functions converges in mean on a set E to a limit function ƒ provided as N → ∞. Power series A power series is a series of the form The Taylor series at a point c of a function is a power series that, in many cases, converges to the function in a neighborhood of c. For example, the series is the Taylor series of at the origin and converges to it for every x. Unless it converges only at x=c, such a series converges on a certain open disc of convergence centered at the point c in the complex plane, and may also converge at some of the points of the boundary of the disc. The radius of this disc is known as the radius of convergence, and can in principle be determined from the asymptotics of the coefficients an. The convergence is uniform on closed and bounded (that is, compact) subsets of the interior of the disc of convergence: to wit, it is uniformly convergent on compact sets. Historically, mathematicians such as Leonhard Euler operated liberally with infinite series, even if they were not convergent. When calculus was put on a sound and correct foundation in the nineteenth century, rigorous proofs of the convergence of series were always required. Formal power series While many uses of power series refer to their sums, it is also possible to treat power series as formal sums, meaning that no addition operations are actually performed, and the symbol "+" is an abstract symbol of conjunction which is not necessarily interpreted as corresponding to addition. In this setting, the sequence of coefficients itself is of interest, rather than the convergence of the series. Formal power series are used in combinatorics to describe and study sequences that are otherwise difficult to handle, for example, using the method of generating functions. The Hilbert–Poincaré series is a formal power series used to study graded algebras. Even if the limit of the power series is not considered, if the terms support appropriate structure then it is possible to define operations such as addition, multiplication, derivative, antiderivative for power series "formally", treating the symbol "+" as if it corresponded to addition. In the most common setting, the terms come from a commutative ring, so that the formal power series can be added term-by-term and multiplied via the Cauchy product. In this case the algebra of formal power series is the total algebra of the monoid of natural numbers over the underlying term ring. If the underlying term ring is a differential algebra, then the algebra of formal power series is also a differential algebra, with differentiation performed term-by-term. Laurent series Laurent series generalize power series by admitting terms into the series with negative as well as positive exponents. A Laurent series is thus any series of the form If such a series converges, then in general it does so in an annulus rather than a disc, and possibly some boundary points. The series converges uniformly on compact subsets of the interior of the annulus of convergence. Dirichlet series A Dirichlet series is one of the form where s is a complex number. For example, if all an are equal to 1, then the Dirichlet series is the Riemann zeta function Like the zeta function, Dirichlet series in general play an important role in analytic number theory. Generally a Dirichlet series converges if the real part of s is greater than a number called the abscissa of convergence. In many cases, a Dirichlet series can be extended to an analytic function outside the domain of convergence by analytic continuation. For example, the Dirichlet series for the zeta function converges absolutely when Re(s) > 1, but the zeta function can be extended to a holomorphic function defined on with a simple pole at 1. This series can be directly generalized to general Dirichlet series. Trigonometric series A series of functions in which the terms are trigonometric functions is called a trigonometric series: The most important example of a trigonometric series is the Fourier series of a function. History of the theory of infinite series Development of infinite series Greek mathematician Archimedes produced the first known summation of an infinite series with a method that is still used in the area of calculus today. He used the method of exhaustion to calculate the area under the arc of a parabola with the summation of an infinite series, and gave a remarkably accurate approximation of π. Mathematicians from Kerala, India studied infinite series around 1350 CE. In the 17th century, James Gregory worked in the new decimal system on infinite series and published several Maclaurin series. In 1715, a general method for constructing the Taylor series for all functions for which they exist was provided by Brook Taylor. Leonhard Euler in the 18th century, developed the theory of hypergeometric series and q-series. Convergence criteria The investigation of the validity of infinite series is considered to begin with Gauss in the 19th century. Euler had already considered the hypergeometric series on which Gauss published a memoir in 1812. It established simpler criteria of convergence, and the questions of remainders and the range of convergence. Cauchy (1821) insisted on strict tests of convergence; he showed that if two series are convergent their product is not necessarily so, and with him begins the discovery of effective criteria. The terms convergence and divergence had been introduced long before by Gregory (1668). Leonhard Euler and Gauss had given various criteria, and Colin Maclaurin had anticipated some of Cauchy's discoveries. Cauchy advanced the theory of power series by his expansion of a complex function in such a form. Abel (1826) in his memoir on the binomial series corrected certain of Cauchy's conclusions, and gave a completely scientific summation of the series for complex values of and . He showed the necessity of considering the subject of continuity in questions of convergence. Cauchy's methods led to special rather than general criteria, and the same may be said of Raabe (1832), who made the first elaborate investigation of the subject, of De Morgan (from 1842), whose logarithmic test DuBois-Reymond (1873) and Pringsheim (1889) have shown to fail within a certain region; of Bertrand (1842), Bonnet (1843), Malmsten (1846, 1847, the latter without integration); Stokes (1847), Paucker (1852), Chebyshev (1852), and Arndt (1853). General criteria began with Kummer (1835), and have been studied by Eisenstein (1847), Weierstrass in his various contributions to the theory of functions, Dini (1867), DuBois-Reymond (1873), and many others. Pringsheim's memoirs (1889) present the most complete general theory. Uniform convergence The theory of uniform convergence was treated by Cauchy (1821), his limitations being pointed out by Abel, but the first to attack it successfully were Seidel and Stokes (1847–48). Cauchy took up the problem again (1853), acknowledging Abel's criticism, and reaching the same conclusions which Stokes had already found. Thomae used the doctrine (1866), but there was great delay in recognizing the importance of distinguishing between uniform and non-uniform convergence, in spite of the demands of the theory of functions. Semi-convergence A series
has been executed, or any such instructions are undone before handling the interrupt. The execution state of the instruction pointed to by the PC is known. System implementation Interrupts may be implemented in hardware as a distinct component with control lines, or they may be integrated into the . If implemented in hardware as a distinct component, an interrupt controller circuit such as the IBM PC's Programmable Interrupt Controller (PIC) may be connected between the interrupting device and the processor's interrupt pin to multiplex several sources of interrupt onto the one or two CPU lines typically available. If implemented as part of the memory controller, interrupts are mapped into the system's memory address space. Shared IRQs Multiple devices may share an edge-triggered interrupt line if they are designed to. The interrupt line must have a pull-down or pull-up resistor so that when not actively driven it settles to its inactive state, which is the default state of it. Devices signal an interrupt by briefly driving the line to its non-default state, and let the line float (do not actively drive it) when not signaling an interrupt. This type of connection is also referred to as open collector. The line then carries all the pulses generated by all the devices. (This is analogous to the pull cord on some buses and trolleys that any passenger can pull to signal the driver that they are requesting a stop.) However, interrupt pulses from different devices may merge if they occur close in time. To avoid losing interrupts the CPU must trigger on the trailing edge of the pulse (e.g. the rising edge if the line is pulled up and driven low). After detecting an interrupt the CPU must check all the devices for service requirements. Edge-triggered interrupts do not suffer the problems that level-triggered interrupts have with sharing. Service of a low-priority device can be postponed arbitrarily, while interrupts from high-priority devices continue to be received and get serviced. If there is a device that the CPU does not know how to service, which may raise spurious interrupts, it won't interfere with interrupt signaling of other devices. However, it is easy for an edge-triggered interrupt to be missed - for example, when interrupts are masked for a period - and unless there is some type of hardware latch that records the event it is impossible to recover. This problem caused many "lockups" in early computer hardware because the processor did not know it was expected to do something. More modern hardware often has one or more interrupt status registers that latch interrupts requests; well-written edge-driven interrupt handling code can check these registers to ensure no events are missed. The elderly Industry Standard Architecture (ISA) bus uses edge-triggered interrupts, without mandating that devices be able to share IRQ lines, but all mainstream ISA motherboards include pull-up resistors on their IRQ lines, so well-behaved ISA devices sharing IRQ lines should just work fine. The parallel port also uses edge-triggered interrupts. Many older devices assume that they have exclusive use of IRQ lines, making it electrically unsafe to share them. There are 3 ways multiple devices "sharing the same line" can be raised. First is by exclusive conduction (switching) or exclusive connection (to pins). Next is by bus (all connected to the same line listening): cards on a bus must know when they are to talk and not talk (i.e., the ISA bus). Talking can be triggered in two ways: by accumulation latch or by logic gates. Logic gates expect a continual data flow that is monitored for key signals. Accumulators only trigger when the remote side excites the gate beyond a threshold, thus no negotiated speed is required. Each has its speed versus distance advantages. A trigger, generally, is the method in which excitation is detected: rising edge, falling edge, threshold (oscilloscope can trigger a wide variety of shapes and conditions). Triggering for software interrupts must be built into the software (both in OS and app). A 'C' app has a trigger table (a table of functions) in its header, which both the app and OS know of and use appropriately that is not related to hardware. However do not confuse this with hardware interrupts which signal the CPU (the CPU enacts software from a table of functions, similarly to software interrupts). Difficulty with sharing interrupt lines Multiple devices sharing an interrupt line (of any triggering style) all act as spurious interrupt sources with respect to each other. With many devices on one line, the workload in servicing interrupts grows in proportion to the square of the number of devices. It is therefore preferred to spread devices evenly across the available interrupt lines. Shortage of interrupt lines is a problem in older system designs where the interrupt lines are distinct physical conductors. Message-signaled interrupts, where the interrupt line is virtual, are favored in new system architectures (such as PCI Express) and relieve this problem to a considerable extent. Some devices with a poorly designed programming interface provide no way to determine whether they have requested service. They may lock up or otherwise misbehave if serviced when they do not want it. Such devices cannot tolerate spurious interrupts, and so also cannot tolerate sharing an interrupt line. ISA cards, due to often cheap design and construction, are notorious for this problem. Such devices are becoming much rarer, as hardware logic becomes cheaper and new system architectures mandate shareable interrupts. Hybrid Some systems use a hybrid of level-triggered and edge-triggered signaling. The hardware not only looks for an edge, but it also verifies that the interrupt signal stays active for a certain period of time. A common use of a hybrid interrupt is for the NMI (non-maskable interrupt) input. Because NMIs generally signal major – or even catastrophic – system events, a good implementation of this signal tries to ensure that the interrupt is valid by verifying that it remains active for a period of time. This 2-step approach helps to eliminate false interrupts from affecting the system. Message-signaled A message-signaled interrupt does not use a physical interrupt line. Instead, a device signals its request for service by sending a short message over some communications medium, typically a computer bus. The message might be of a type reserved for interrupts, or it might be of some pre-existing type such as a memory write. Message-signalled interrupts behave very much like edge-triggered interrupts, in that the interrupt is a momentary signal rather than a continuous condition. Interrupt-handling software treats the two in much the same manner. Typically, multiple pending message-signaled interrupts with the same message (the same virtual interrupt line) are allowed to merge, just as closely spaced edge-triggered interrupts can merge. Message-signalled interrupt vectors can be shared, to the extent that the underlying communication medium can be shared. No additional effort is required. Because the identity of the interrupt is indicated by a pattern of data bits, not requiring a separate physical conductor, many more distinct interrupts can be efficiently handled. This reduces the need for sharing. Interrupt messages can also be passed over a serial bus, not requiring any additional lines. PCI Express, a serial computer bus, uses message-signaled interrupts exclusively. Doorbell In a push button analogy applied to computer systems, the term doorbell or doorbell interrupt is often used to describe a mechanism whereby a software system can signal or notify a computer hardware device that there is some work to be done. Typically, the software system will place data in some well-known and mutually agreed upon memory locations, and "ring the doorbell" by writing to a different memory location. This different memory location
has one or more interrupt status registers that latch interrupts requests; well-written edge-driven interrupt handling code can check these registers to ensure no events are missed. The elderly Industry Standard Architecture (ISA) bus uses edge-triggered interrupts, without mandating that devices be able to share IRQ lines, but all mainstream ISA motherboards include pull-up resistors on their IRQ lines, so well-behaved ISA devices sharing IRQ lines should just work fine. The parallel port also uses edge-triggered interrupts. Many older devices assume that they have exclusive use of IRQ lines, making it electrically unsafe to share them. There are 3 ways multiple devices "sharing the same line" can be raised. First is by exclusive conduction (switching) or exclusive connection (to pins). Next is by bus (all connected to the same line listening): cards on a bus must know when they are to talk and not talk (i.e., the ISA bus). Talking can be triggered in two ways: by accumulation latch or by logic gates. Logic gates expect a continual data flow that is monitored for key signals. Accumulators only trigger when the remote side excites the gate beyond a threshold, thus no negotiated speed is required. Each has its speed versus distance advantages. A trigger, generally, is the method in which excitation is detected: rising edge, falling edge, threshold (oscilloscope can trigger a wide variety of shapes and conditions). Triggering for software interrupts must be built into the software (both in OS and app). A 'C' app has a trigger table (a table of functions) in its header, which both the app and OS know of and use appropriately that is not related to hardware. However do not confuse this with hardware interrupts which signal the CPU (the CPU enacts software from a table of functions, similarly to software interrupts). Difficulty with sharing interrupt lines Multiple devices sharing an interrupt line (of any triggering style) all act as spurious interrupt sources with respect to each other. With many devices on one line, the workload in servicing interrupts grows in proportion to the square of the number of devices. It is therefore preferred to spread devices evenly across the available interrupt lines. Shortage of interrupt lines is a problem in older system designs where the interrupt lines are distinct physical conductors. Message-signaled interrupts, where the interrupt line is virtual, are favored in new system architectures (such as PCI Express) and relieve this problem to a considerable extent. Some devices with a poorly designed programming interface provide no way to determine whether they have requested service. They may lock up or otherwise misbehave if serviced when they do not want it. Such devices cannot tolerate spurious interrupts, and so also cannot tolerate sharing an interrupt line. ISA cards, due to often cheap design and construction, are notorious for this problem. Such devices are becoming much rarer, as hardware logic becomes cheaper and new system architectures mandate shareable interrupts. Hybrid Some systems use a hybrid of level-triggered and edge-triggered signaling. The hardware not only looks for an edge, but it also verifies that the interrupt signal stays active for a certain period of time. A common use of a hybrid interrupt is for the NMI (non-maskable interrupt) input. Because NMIs generally signal major – or even catastrophic – system events, a good implementation of this signal tries to ensure that the interrupt is valid by verifying that it remains active for a period of time. This 2-step approach helps to eliminate false interrupts from affecting the system. Message-signaled A message-signaled interrupt does not use a physical interrupt line. Instead, a device signals its request for service by sending a short message over some communications medium, typically a computer bus. The message might be of a type reserved for interrupts, or it might be of some pre-existing type such as a memory write. Message-signalled interrupts behave very much like edge-triggered interrupts, in that the interrupt is a momentary signal rather than a continuous condition. Interrupt-handling software treats the two in much the same manner. Typically, multiple pending message-signaled interrupts with the same message (the same virtual interrupt line) are allowed to merge, just as closely spaced edge-triggered interrupts can merge. Message-signalled interrupt vectors can be shared, to the extent that the underlying communication medium can be shared. No additional effort is required. Because the identity of the interrupt is indicated by a pattern of data bits, not requiring a separate physical conductor, many more distinct interrupts can be efficiently handled. This reduces the need for sharing. Interrupt messages can also be passed over a serial bus, not requiring any additional lines. PCI Express, a serial computer bus, uses message-signaled interrupts exclusively. Doorbell In a push button analogy applied to computer systems, the term doorbell or doorbell interrupt is often used to describe a mechanism whereby a software system can signal or notify a computer hardware device that there is some work to be done. Typically, the software system will place data in some well-known and mutually agreed upon memory locations, and "ring the doorbell" by writing to a different memory location. This different memory location is often called the doorbell region, and there may even be multiple doorbells serving different purposes in this region. It is this act of writing to the doorbell region of memory that "rings the bell" and notifies the hardware device that the data are ready and waiting. The hardware device would now know that the data are valid and can be acted upon. It would typically write the data to a hard disk drive, or send them over a network, or encrypt them, etc. The term doorbell interrupt is usually a misnomer. It is similar to an interrupt, because it causes some work to be done by the device; however, the doorbell region is sometimes implemented as a polled region, sometimes the doorbell region writes through to physical device registers, and sometimes the doorbell region is hardwired directly to physical device registers. When either writing through or directly to physical device registers, this may cause a real interrupt to occur at the device's central processor unit (CPU), if it has one. Doorbell interrupts can be compared to Message Signaled Interrupts, as they have some similarities. Multiprocessor IPI In multiprocessor systems, a processor may send an interrupt request to another processor via inter-processor interrupts (IPI). Performance Interrupts provide low overhead and good latency at low load, but degrade significantly at high interrupt rate unless care is taken to prevent several pathologies. The phenomenon where the overall system performance is severely hindered by excessive amounts of processing time spent handling interrupts is called an interrupt storm. There are various forms of livelocks, when the system spends all of its time processing interrupts to the exclusion of other required tasks. Under extreme conditions, a large number of interrupts (like very high network traffic) may completely stall the system. To avoid such problems, an operating system must schedule network interrupt handling as carefully as it schedules process execution. With multi-core processors, additional performance improvements in interrupt handling can be achieved through receive-side scaling (RSS) when multiqueue NICs are used. Such NICs provide multiple receive queues associated to separate interrupts; by routing each of those interrupts to different cores, processing of the interrupt requests triggered by the network traffic received by a single NIC can be distributed among multiple cores. Distribution of the interrupts among cores can be performed automatically by the operating system, or the routing of interrupts (usually referred to as IRQ affinity) can be manually configured. A purely software-based implementation of the receiving traffic distribution, known as receive packet steering (RPS), distributes received traffic among cores later in the data path, as part of the interrupt handler functionality. Advantages of RPS over RSS include no requirements for specific hardware, more advanced traffic distribution filters, and reduced rate of interrupts produced by a NIC. As a downside, RPS increases the rate of inter-processor interrupts (IPIs). Receive flow steering'' (RFS) takes the software-based approach further by accounting for application locality; further performance improvements are achieved by processing interrupt requests by the same cores on which particular network packets will be consumed by the targeted application. Typical uses Interrupts are commonly used to service hardware timers, transfer data to and from storage (e.g., disk I/O) and communication interfaces (e.g., UART, Ethernet), handle keyboard and mouse events, and to respond to any other time-sensitive events as required by the application system. Non-maskable interrupts are typically used to respond to high-priority requests such as watchdog timer timeouts, power-down signals and traps. Hardware timers are often used to generate periodic interrupts. In some applications, such interrupts
day") about every four years, causing a leap year to have 366 days (Julian, Gregorian and Indian national calendars). The Decree of Canopus, which was issued by the pharaoh Ptolemy III Euergetes of Ancient Egypt in 239 BCE, decreed a solar leap day system; an Egyptian leap year was not adopted until 25 BC, when the Roman Emperor Augustus successfully instituted a reformed Alexandrian calendar. In the Julian calendar, as well as in the Gregorian calendar, which improved upon it, intercalation is done by adding an extra day to February in each leap year. In the Julian calendar this was done every four years. In the Gregorian, years divisible by 100 but not 400 were exempted in order to improve accuracy. Thus, 2000 was a leap year; 1700, 1800, and 1900 were not. Epagomenal days are days within a solar calendar that are outside any regular month. Usually five epagomenal days are included within every year (Egyptian, Coptic, Ethiopian, Mayan Haab' and French
of a leap day, week, or month into some calendar years to make the calendar follow the seasons or moon phases. Lunisolar calendars may require intercalations of both days and months. Solar calendars The solar or tropical year does not have a whole number of days (it is about 365.24 days), but a calendar year must have a whole number of days. The most common way to reconcile the two is to vary the number of days in the calendar year. In solar calendars, this is done by adding to a common year of 365 days, an extra day ("leap day" or "intercalary day") about every four years, causing a leap year to have 366 days (Julian, Gregorian and Indian national calendars). The Decree of Canopus, which was issued by the pharaoh Ptolemy III Euergetes of Ancient Egypt in 239 BCE, decreed a solar leap day system; an Egyptian leap year was not adopted until 25 BC, when the Roman Emperor Augustus successfully instituted a reformed Alexandrian calendar. In the Julian calendar, as well as in the Gregorian calendar, which improved upon it, intercalation is done by adding an extra day to February in each leap year. In the Julian calendar this was done every four years. In the Gregorian, years divisible by 100 but not 400 were exempted in order to improve accuracy. Thus, 2000 was a leap year; 1700, 1800, and 1900 were not. Epagomenal days are days within a solar calendar that are outside any regular month. Usually five epagomenal days are included within every year (Egyptian, Coptic,
and/or interaction Places Intercourse, Alabama, US Intercourse, Pennsylvania, US Intercourse Island, in Western Australia Arts and media Books Intercourse (book), the title of a 1987 book by author Andrea Dworkin InterCourses: An Aphrodisiac Cookbook, a 1997 book by Martha Hopkins and Randall Lockridge with photography by Ben Fink Music Intercourse (The Tokens album), a 1971 album by American vocal group the Tokens Intercourse (S'Express album), a 1991
(S'Express album), a 1991 studio album by English dance music act S'Express "Intercourse", a 2020 song by Megan Thee Stallion featuring Popcaan and Mustard from Good News Other arts and media The Intercourse (arts center), an arts center in Red Hook, Brooklyn, New York Intercourse (magazine), a literary magazine published in Montreal from 1966 to 1971 See also Non-Intercourse Act (1809), regarding trade Nonintercourse Act, a collective name given to six statutes to set Amerindian boundaries of reservations, instituted between 1790 and
dates back to 953, when Ma'ād al-Mu'izz, the caliph of Egypt, demanded a pen that would not stain his hands or clothes, and was provided with a pen that held ink in a reservoir. In the 15th century, a new type of ink had to be developed in Europe for the printing press by Johannes Gutenberg. According to Martyn Lyons in his book Books: A Living History, Gutenberg's dye was indelible, oil-based, and made from the soot of lamps (lamp-black) mixed with varnish and egg white. Two types of ink were prevalent at the time: the Greek and Roman writing ink (soot, glue, and water) and the 12th century variety composed of ferrous sulfate, gall, gum, and water. Neither of these handwriting inks could adhere to printing surfaces without creating blurs. Eventually an oily, varnish-like ink made of soot, turpentine, and walnut oil was created specifically for the printing press. Types Ink formulas vary, but commonly involve two components: Colorants Vehicles (binders) Inks generally fall into four classes: Aqueous Liquid Paste Powder Colorants Pigments Pigment inks are used more frequently than dyes because they are more color-fast, but they are also more expensive, less consistent in color, and have less of a color range than dyes. Pigments are solid, opaque particles suspended in ink to provide color. Pigment molecules typically link together in crystalline structures that are 0.1–2 µm in size and comprise 5–30 percent of the ink volume. Qualities such as hue, saturation, and lightness vary depending on the source and type of pigment. Dyes Dye-based inks are generally much stronger than pigment-based inks and can produce much more color of a given density per unit of mass. However, because dyes are dissolved in the liquid phase, they have a tendency to soak into paper, potentially allowing the ink to bleed at the edges of an image. To circumvent this problem, dye-based inks are made with solvents that dry rapidly or are used with quick-drying methods of printing, such as blowing hot air on the fresh print. Other methods include harder paper sizing and more specialized paper coatings. The latter is particularly suited to inks used in non-industrial settings (which must conform to tighter toxicity and emission controls), such as inkjet printer inks. Another technique involves coating the paper with a charged coating. If the dye has the opposite charge, it is attracted to and retained by this coating, while the solvent soaks into the paper. Cellulose, the wood-derived material most paper is made of, is naturally charged, and so a compound that complexes with both the dye and the paper's surface aids retention at the surface. Such a compound is commonly used in ink-jet printing inks. An additional advantage of dye-based ink systems is that the dye molecules can interact with other ink ingredients, potentially allowing greater benefit as compared to pigmented inks from optical brighteners and color-enhancing agents designed to increase the intensity and appearance of dyes. Dye-based inks can be used for anti-counterfeit purposes and can be found in some gel inks, fountain pen inks, and inks used for paper currency. These inks react with cellulose to bring about a permanent color change. Health and environmental aspects There is a misconception that ink is non-toxic even if swallowed. Once ingested, ink can be hazardous to one's health. Certain inks, such as those used in digital printers, and even those found in a common pen can be harmful. Though ink does not easily cause death, repeated skin contact or ingestion can cause effects such as severe headaches, skin irritation, or nervous system damage. These effects can be caused by solvents, or by pigment ingredients such as p-Anisidine, which helps create some inks' color and shine. Three main environmental issues with ink are: Heavy metals Non-renewable oils Volatile organic compounds Some regulatory bodies have set standards for the amount of heavy metals in ink. There is a trend toward vegetable oils rather than petroleum oils in recent years in response to a demand for better environmental sustainability performance. Ink uses up non-renewable oils and metals, which has a negative impact on the environment. Carbon Carbon inks were commonly made from lampblack or soot and a binding agent such as gum arabic or animal glue. The binding agent keeps carbon particles in suspension and adhered to paper. Carbon particles do not fade over time even when bleached or when in sunlight. One benefit is that carbon ink does not harm paper. Over time, the ink is chemically stable and therefore does not threaten the paper's strength. Despite these benefits, carbon ink is not ideal for permanence and ease of preservation. Carbon ink tends to smudge in humid environments and can be washed off surfaces. The best method of preserving a document written in carbon ink is to store it in a dry environment (Barrow 1972). Recently, carbon inks made from carbon nanotubes have been successfully created. They are similar in composition to traditional inks in that they use a polymer to suspend the carbon nanotubes. These inks can be used in inkjet printers and produce electrically conductive patterns. Iron gall (common ink) Iron gall inks became prominent in the early 12th century; they were used for centuries and were widely thought to be the best type of ink. However, iron gall ink is corrosive and damages paper over time (Waters 1940). Items containing this ink can become brittle and the writing fades to brown. The original scores of Johann Sebastian Bach are threatened by the destructive properties of iron gall ink. The majority of his works are held by the German
been unearthed in Chinese Turkestan. The practice of writing with ink and a sharp pointed needle was common in early South India. Several Buddhist and Jain sutras in India were compiled in ink. In ancient Rome, atramentum was used; in an article for the Christian Science Monitor, Sharon J. Huntington describes these other historical inks: About 1,600 years ago, a popular ink recipe was created. The recipe was used for centuries. Iron salts, such as ferrous sulfate (made by treating iron with sulfuric acid), were mixed with tannin from gallnuts (they grow on trees) and a thickener. When first put to paper, this ink is bluish-black. Over time it fades to a dull brown. Scribes in medieval Europe (about AD 800 to 1500) wrote principally on parchment or vellum. One 12th century ink recipe called for hawthorn branches to be cut in the spring and left to dry. Then the bark was pounded from the branches and soaked in water for eight days. The water was boiled until it thickened and turned black. Wine was added during boiling. The ink was poured into special bags and hung in the sun. Once dried, the mixture was mixed with wine and iron salt over a fire to make the final ink. The reservoir pen, which may have been the first fountain pen, dates back to 953, when Ma'ād al-Mu'izz, the caliph of Egypt, demanded a pen that would not stain his hands or clothes, and was provided with a pen that held ink in a reservoir. In the 15th century, a new type of ink had to be developed in Europe for the printing press by Johannes Gutenberg. According to Martyn Lyons in his book Books: A Living History, Gutenberg's dye was indelible, oil-based, and made from the soot of lamps (lamp-black) mixed with varnish and egg white. Two types of ink were prevalent at the time: the Greek and Roman writing ink (soot, glue, and water) and the 12th century variety composed of ferrous sulfate, gall, gum, and water. Neither of these handwriting inks could adhere to printing surfaces without creating blurs. Eventually an oily, varnish-like ink made of soot, turpentine, and walnut oil was created specifically for the printing press. Types Ink formulas vary, but commonly involve two components: Colorants Vehicles (binders) Inks generally fall into four classes: Aqueous Liquid Paste Powder Colorants Pigments Pigment inks are used more frequently than dyes because they are more color-fast, but they are also more expensive, less consistent in color, and have less of a color range than dyes. Pigments are solid, opaque particles suspended in ink to provide color. Pigment molecules typically link together in crystalline structures that are 0.1–2 µm in size and comprise 5–30 percent of the ink volume. Qualities such as hue, saturation, and lightness vary depending on the source and type of pigment. Dyes Dye-based inks are generally much stronger than pigment-based inks and can produce much more color of a given density per unit of mass. However, because dyes are dissolved in the liquid phase, they have a tendency to soak into paper, potentially allowing the ink to bleed at the edges of an image. To circumvent this problem, dye-based inks are made with solvents that dry rapidly or are used with quick-drying methods of printing, such as blowing hot air on the fresh print. Other methods include harder paper sizing and more specialized paper coatings. The latter is particularly suited to inks used in non-industrial settings (which must conform to tighter toxicity and emission controls), such as inkjet printer inks. Another technique involves coating the paper with a charged coating. If the dye has the opposite charge, it is attracted to and retained by this coating, while the solvent soaks into the paper. Cellulose, the wood-derived material most paper is made of, is naturally charged, and so a compound that complexes with both the dye and the paper's surface aids retention at the surface. Such a compound is commonly used in ink-jet printing inks. An additional advantage of dye-based ink systems is that the dye molecules can interact with other ink ingredients, potentially allowing greater benefit as compared to pigmented inks from optical brighteners and
the Red Mosque in G-6, and the Pakistan Institute of Medical Sciences, the largest medical complex in the capital, located in G-8. The H sectors are numbered H-8 through H-17. The H sectors are mostly dedicated to educational and health institutions. National University of Sciences and Technology covers a major portion of sector H-12. The I sectors are numbered from I-8 to I-18. With the exception of I-8, which is a well-developed residential area, these sectors are primarily part of the industrial zone. Currently two sub-sectors of I-9 and one sub-sector of I-10 are used as industrial areas. CDA is planning to set up Islamabad Railway Station in Sector I-18 and Industrial City in sector I-17. Zone III consists primarily of the Margalla Hills and Margalla Hills National Park. Rawal Lake is in this zone. Zone IV and V consist of Islamabad Park, and rural areas of the city. The Soan River flows into the city through Zone V. Demographics Language While urban Islamabad is home to people from all over Pakistan as well as expatriates, in the rural areas a number of Pothohari speaking tribal communities can still be recognised. Religion Islamabad-Rawalpindi metropolitan area When the master plan for Islamabad was drawn up in 1960, Islamabad and Rawalpindi, along with the adjoining areas, was to be integrated to form a large metropolitan area called Islamabad/Rawalpindi Metropolitan Area. The area would consist of the developing Islamabad, the old colonial cantonment city of Rawalpindi, and Margalla Hills National Park, including surrounding rural areas. However, Islamabad city is part of the Islamabad Capital Territory, while Rawalpindi is part of Rawalpindi District, which is part of province of Punjab. Initially, it was proposed that the three areas would be connected by four major highways: Murree Highway, Islamabad Highway, Soan Highway, and Capital Highway. However, to date only two highways have been constructed: Kashmir Highway (the former Murree Highway) and Islamabad Highway. Plans of constructing Margalla Avenue are also underway. Islamabad is the hub all the governmental activities while Rawalpindi is the centre of all industrial, commercial, and military activities. The two cities are considered sister cities and are highly interdependent. Economy Islamabad is a net contributor to the Pakistani economy, as whilst having only 0.8% of the country's population, it contributes 1% to the country's GDP. Islamabad Stock Exchange, founded in 1989, is Pakistan's third largest stock exchange after Karachi Stock Exchange and Lahore Stock Exchange. The exchange has 118 members with 104 corporate bodies and 18 individual members. The average daily turnover of the stock exchange is over 1 million shares. As of 2012, Islamabad LTU (Large Tax Unit) was responsible for Rs 371 billion in tax revenue, which amounts to 20% of all the revenue collected by Federal Board of Revenue. Islamabad has seen an expansion in information and communications technology with the addition two Software Technology Parks, which house numerous national and foreign technological and information technology companies. The tech parks are located in Evacuee Trust Complex and Awami Markaz. Awami Markaz houses 36 IT companies while Evacuee Trust house 29 companies. Call centres for foreign companies have been targeted as another significant area of growth, with the government making efforts to reduce taxes by as much as 10% to encourage foreign investments in the information technology sector. Most of Pakistan's state-owned companies like PIA, PTV, PTCL, OGDCL, and Zarai Taraqiati Bank Ltd. are based in Islamabad. Headquarters of all major telecommunication operators such as PTCL, Mobilink, Telenor, Ufone, and China Mobile are located in Islamabad. Being an expensive city, the prices of most of fruits, vegetable and poultry items increased in Islamabad during the year 2015-2020 Tourism Transport Airport Islamabad is connected to major destinations around the world through Islamabad International Airport. The airport is the largest in Pakistan, handling 9 million passengers per annum. The airport was built at a cost of $400 million and opened on 3 May 2018, replacing the former Benazir Bhutto International Airport. It is the first greenfield airport in Pakistan with an area of . Metrobus The Rawalpindi-Islamabad Metrobus is a bus rapid transit system that serves the twin cities of Rawalpindi and Islamabad in Pakistan. It uses dedicated bus lanes for all of its route covering 24 bus stations. Islamabad is well connected with other parts of the country through car rental services such as Alvi Transport Network and Pakistan Car Rentals. Motorways All major cities and towns are accessible through regular trains and bus services running mostly from the neighbouring city of Rawalpindi. Lahore and Peshawar are linked to Islamabad through a network of motorways, which has significantly reduced travelling times between these cities. M-2 Motorway is long and connect Islamabad and Lahore. M-1 Motorway connects Islamabad with Peshawar and is long. Islamabad is linked to Rawalpindi through the Faizabad Interchange, which has a daily traffic volume of about 48,000 vehicles. Education Islamabad has the highest literacy rate of Pakistan at 95%. Islamabad also has some of Pakistan's major universities, including Quaid-i-Azam University, the International Islamic University, and the National University of Sciences and Technology and Pakistan Institute of Engineering and Applied Sciences Private School Network Islamabad is working for private educational institutions. The president of PSN is Dr. Muhammad Afzal Babur from Bhara Kahu. PSN is divided into eight zones in Islamabad. In Tarlai Zone Chaudhary Faisal Ali from Faisal Academy Tarlai Kalan is Zonal General Sectary of PSN. Quaid-e-Azam University has several faculties. The institute is located in a semi-hilly area, east of the
and Zone V. Out of these, Zone IV is the largest in area. All sectors of Ghouri town (1, 2, 3, VIP, 5, 4-A, 4-B, 4-C, 5-A, 5-B and sector 7) are located in this zone. Zone I consists mainly of all the developed residential sectors, while Zone II consists of the under-developed residential sectors. Each residential sector is identified by a letter of the alphabet and a number, and covers an area of approximately 4 square kilometres. The sectors are lettered from A to I, and each sector is divided into four numbered sub-sectors. Series A, B, and C are still underdeveloped. The D series has seven sectors (D-11 to D-17), of which only sector D-12 is completely developed. This series is located at the foot of Margalla Hills. The E Sectors are named from E-7 to E-17. Many foreigners and diplomatic personnel are housed in these sectors. In the revised Master Plan of the city, CDA has decided to develop a park on the pattern of Fatima Jinnah Park in sector E-14. Sectors E-8 and E-9 contain the campuses of Bahria University, Air University, and the National Defence University. The F and G series contains the most developed sectors. F series contains sectors F-5 to F-17; some sectors are still under-developed. F-5 is an important sector for the software industry in Islamabad, as the two software technology parks are located here. The entire F-9 sector is covered with Fatima Jinnah Park. The Centaurus complex will be one of the major landmarks of the F-8 sector. G sectors are numbered G-5 through G-17. Some important places include the Jinnah Convention Center and Serena Hotel in G-5, the Red Mosque in G-6, and the Pakistan Institute of Medical Sciences, the largest medical complex in the capital, located in G-8. The H sectors are numbered H-8 through H-17. The H sectors are mostly dedicated to educational and health institutions. National University of Sciences and Technology covers a major portion of sector H-12. The I sectors are numbered from I-8 to I-18. With the exception of I-8, which is a well-developed residential area, these sectors are primarily part of the industrial zone. Currently two sub-sectors of I-9 and one sub-sector of I-10 are used as industrial areas. CDA is planning to set up Islamabad Railway Station in Sector I-18 and Industrial City in sector I-17. Zone III consists primarily of the Margalla Hills and Margalla Hills National Park. Rawal Lake is in this zone. Zone IV and V consist of Islamabad Park, and rural areas of the city. The Soan River flows into the city through Zone V. Demographics Language While urban Islamabad is home to people from all over Pakistan as well as expatriates, in the rural areas a number of Pothohari speaking tribal communities can still be recognised. Religion Islamabad-Rawalpindi metropolitan area When the master plan for Islamabad was drawn up in 1960, Islamabad and Rawalpindi, along with the adjoining areas, was to be integrated to form a large metropolitan area called Islamabad/Rawalpindi Metropolitan Area. The area would consist of the developing Islamabad, the old colonial cantonment city of Rawalpindi, and Margalla Hills National Park, including surrounding rural areas. However, Islamabad city is part of the Islamabad Capital Territory, while Rawalpindi is part of Rawalpindi
and therefore could not have been added sequentially. They argue that something that is at first merely advantageous can later become necessary as other components change. Furthermore, they argue, evolution often proceeds by altering preexisting parts or by removing them from a system, rather than by adding them. This is sometimes called the "scaffolding objection" by an analogy with scaffolding, which can support an "irreducibly complex" building until it is complete and able to stand on its own. Behe has acknowledged using "sloppy prose", and that his "argument against Darwinism does not add up to a logical proof." Irreducible complexity has remained a popular argument among advocates of intelligent design; in the Dover trial, the court held that "Professor Behe's claim for irreducible complexity has been refuted in peer-reviewed research papers and has been rejected by the scientific community at large." Specified complexity In 1986, Charles B. Thaxton, a physical chemist and creationist, used the term "specified complexity" from information theory when claiming that messages transmitted by DNA in the cell were specified by intelligence, and must have originated with an intelligent agent. The intelligent design concept of "specified complexity" was developed in the 1990s by mathematician, philosopher, and theologian William A. Dembski. Dembski states that when something exhibits specified complexity (i.e., is both complex and "specified", simultaneously), one can infer that it was produced by an intelligent cause (i.e., that it was designed) rather than being the result of natural processes. He provides the following examples: "A single letter of the alphabet is specified without being complex. A long sentence of random letters is complex without being specified. A Shakespearean sonnet is both complex and specified." He states that details of living things can be similarly characterized, especially the "patterns" of molecular sequences in functional biological molecules such as DNA. Dembski defines complex specified information (CSI) as anything with a less than 1 in 10150 chance of occurring by (natural) chance. Critics say that this renders the argument a tautology: complex specified information cannot occur naturally because Dembski has defined it thus, so the real question becomes whether or not CSI actually exists in nature. The conceptual soundness of Dembski's specified complexity/CSI argument has been discredited in the scientific and mathematical communities. Specified complexity has yet to be shown to have wide applications in other fields, as Dembski asserts. John Wilkins and Wesley R. Elsberry characterize Dembski's "explanatory filter" as eliminative because it eliminates explanations sequentially: first regularity, then chance, finally defaulting to design. They argue that this procedure is flawed as a model for scientific inference because the asymmetric way it treats the different possible explanations renders it prone to making false conclusions. Richard Dawkins, another critic of intelligent design, argues in The God Delusion (2006) that allowing for an intelligent designer to account for unlikely complexity only postpones the problem, as such a designer would need to be at least as complex. Other scientists have argued that evolution through selection is better able to explain the observed complexity, as is evident from the use of selective evolution to design certain electronic, aeronautic and automotive systems that are considered problems too complex for human "intelligent designers". Fine-tuned universe Intelligent design proponents have also occasionally appealed to broader teleological arguments outside of biology, most notably an argument based on the fine-tuning of universal constants that make matter and life possible and which are argued not to be solely attributable to chance. These include the values of fundamental physical constants, the relative strength of nuclear forces, electromagnetism, and gravity between fundamental particles, as well as the ratios of masses of such particles. Intelligent design proponent and Center for Science and Culture fellow Guillermo Gonzalez argues that if any of these values were even slightly different, the universe would be dramatically different, making it impossible for many chemical elements and features of the Universe, such as galaxies, to form. Thus, proponents argue, an intelligent designer of life was needed to ensure that the requisite features were present to achieve that particular outcome. Scientists have generally responded that these arguments are poorly supported by existing evidence. Victor J. Stenger and other critics say both intelligent design and the weak form of the anthropic principle are essentially a tautology; in his view, these arguments amount to the claim that life is able to exist because the Universe is able to support life. The claim of the improbability of a life-supporting universe has also been criticized as an argument by lack of imagination for assuming no other forms of life are possible. Life as we know it might not exist if things were different, but a different sort of life might exist in its place. A number of critics also suggest that many of the stated variables appear to be interconnected and that calculations made by mathematicians and physicists suggest that the emergence of a universe similar to ours is quite probable. Intelligent designer The contemporary intelligent design movement formulates its arguments in secular terms and intentionally avoids identifying the intelligent agent (or agents) they posit. Although they do not state that God is the designer, the designer is often implicitly hypothesized to have intervened in a way that only a god could intervene. Dembski, in The Design Inference (1998), speculates that an alien culture could fulfill these requirements. Of Pandas and People proposes that SETI illustrates an appeal to intelligent design in science. In 2000, philosopher of science Robert T. Pennock suggested the Raëlian UFO religion as a real-life example of an extraterrestrial intelligent designer view that "make[s] many of the same bad arguments against evolutionary theory as creationists". The authoritative description of intelligent design, however, explicitly states that the Universe displays features of having been designed. Acknowledging the paradox, Dembski concludes that "no intelligent agent who is strictly physical could have presided over the origin of the universe or the origin of life." The leading proponents have made statements to their supporters that they believe the designer to be the Christian God, to the exclusion of all other religions. Beyond the debate over whether intelligent design is scientific, a number of critics argue that existing evidence makes the design hypothesis appear unlikely, irrespective of its status in the world of science. For example, Jerry Coyne asks why a designer would "give us a pathway for making vitamin C, but then destroy it by disabling one of its enzymes" (see pseudogene) and why a designer would not "stock oceanic islands with reptiles, mammals, amphibians, and freshwater fish, despite the suitability of such islands for these species". Coyne also points to the fact that "the flora and fauna on those islands resemble that of the nearest mainland, even when the environments are very different" as evidence that species were not placed there by a designer. Previously, in Darwin's Black Box, Behe had argued that we are simply incapable of understanding the designer's motives, so such questions cannot be answered definitively. Odd designs could, for example, "...have been placed there by the designer for a reason—for artistic reasons, for variety, to show off, for some as-yet-undetected practical purpose, or for some unguessable reason—or they might not." Coyne responds that in light of the evidence, "either life resulted not from intelligent design, but from evolution; or the intelligent designer is a cosmic prankster who designed everything to make it look as though it had evolved." Intelligent design proponents such as Paul Nelson avoid the problem of poor design in nature by insisting that we have simply failed to understand the perfection of the design. Behe cites Paley as his inspiration, but he differs from Paley's expectation of a perfect Creation and proposes that designers do not necessarily produce the best design they can. Behe suggests that, like a parent not wanting to spoil a child with extravagant toys, the designer can have multiple motives for not giving priority to excellence in engineering. He says that "Another problem with the argument from imperfection is that it critically depends on a psychoanalysis of the unidentified designer. Yet the reasons that a designer would or would not do anything are virtually impossible to know unless the designer tells you specifically what those reasons are." This reliance on inexplicable motives of the designer makes intelligent design scientifically untestable. Retired UC Berkeley law professor, author and intelligent design advocate Phillip E. Johnson puts forward a core definition that the designer creates for a purpose, giving the example that in his view AIDS was created to punish immorality and is not caused by HIV, but such motives cannot be tested by scientific methods. Asserting the need for a designer of complexity also raises the question "What designed the designer?" Intelligent design proponents say that the question is irrelevant to or outside the scope of intelligent design. Richard Wein counters that "...scientific explanations often create new unanswered questions. But, in assessing the value of an explanation, these questions are not irrelevant. They must be balanced against the improvements in our understanding which the explanation provides. Invoking an unexplained being to explain the origin of other beings (ourselves) is little more than question-begging. The new question raised by the explanation is as problematic as the question which the explanation purports to answer." Richard Dawkins sees the assertion that the designer does not need to be explained as a thought-terminating cliché. In the absence of observable, measurable evidence, the very question "What designed the designer?" leads to an infinite regression from which intelligent design proponents can only escape by resorting to religious creationism or logical contradiction. Movement The intelligent design movement is a direct outgrowth of the creationism of the 1980s. The scientific and academic communities, along with a U.S. federal court, view intelligent design as either a form of creationism or as a direct descendant that is closely intertwined with traditional creationism; and several authors explicitly refer to it as "intelligent design creationism". The movement is headquartered in the Center for Science and Culture, established in 1996 as the creationist wing of the Discovery Institute to promote a religious agenda calling for broad social, academic and political changes. The Discovery Institute's intelligent design campaigns have been staged primarily in the United States, although efforts have been made in other countries to promote intelligent design. Leaders of the movement say intelligent design exposes the limitations of scientific orthodoxy and of the secular philosophy of naturalism. Intelligent design proponents allege that science should not be limited to naturalism and should not demand the adoption of a naturalistic philosophy that dismisses out-of-hand any explanation that includes a supernatural cause. The overall goal of the movement is to "reverse the stifling dominance of the materialist worldview" represented by the theory of evolution in favor of "a science consonant with Christian and theistic convictions". Phillip E. Johnson stated that the goal of intelligent design is to cast creationism as a scientific concept. All leading intelligent design proponents are fellows or staff of the Discovery Institute and its Center for Science and Culture. Nearly all intelligent design concepts and the associated movement are the products of the Discovery Institute, which guides the movement and follows its wedge strategy while conducting its "Teach the Controversy" campaign and their other related programs. Leading intelligent design proponents have made conflicting statements regarding intelligent design. In statements directed at the general public, they say intelligent design is not religious; when addressing conservative Christian supporters, they state that intelligent design has its foundation in the Bible. Recognizing the need for support, the Institute affirms its Christian, evangelistic orientation: Barbara Forrest, an expert who has written extensively on the movement, describes this as being due to the Discovery Institute's obfuscating its agenda as a matter of policy. She has written that the movement's "activities betray an aggressive, systematic agenda for promoting not only intelligent design creationism, but the religious worldview that undergirds it." Religion and leading proponents Although arguments for intelligent design by the intelligent design movement are formulated in secular terms and intentionally avoid positing the identity of the designer, the majority of principal intelligent design advocates are publicly religious Christians who have stated that, in their view, the designer proposed in intelligent design is the Christian conception of God. Stuart Burgess, Phillip E. Johnson, William A. Dembski, and Stephen C. Meyer are evangelical Protestants; Michael Behe is a Roman Catholic; Paul Nelson supports young Earth creationism; and Jonathan Wells is a member of the Unification Church. Non-Christian proponents include David Klinghoffer, who is Jewish, Michael Denton and David Berlinski, who are agnostic, and Muzaffar Iqbal, a Pakistani-Canadian Muslim. Phillip E. Johnson has stated that cultivating ambiguity by employing secular language in arguments that are carefully crafted to avoid overtones of theistic creationism is a necessary first step for ultimately reintroducing the Christian concept of God as the designer. Johnson explicitly calls for intelligent design proponents to obfuscate their religious motivations so as to avoid having intelligent design identified "as just another way of packaging the Christian evangelical message." Johnson emphasizes that "...the first thing that has to be done is to get the Bible out of the discussion. ...This is not to say that the biblical issues are unimportant; the point is rather that the time to address them will be after we have separated materialist prejudice from scientific fact." The strategy of deliberately disguising the religious intent of intelligent design has been described by William A. Dembski in The Design Inference. In this work, Dembski lists a god or an "alien life force" as two possible options for the identity of the designer; however, in his book Intelligent Design: The Bridge Between Science and Theology (1999), Dembski states: Dembski also stated, "ID is part of God's general revelation [...] Not only does intelligent design rid us of this ideology materialism , which suffocates the human spirit, but, in my personal experience, I've found that it opens the path for people to come to Christ." Both Johnson and Dembski cite the Bible's Gospel of John as the foundation of intelligent design. Barbara Forrest contends such statements reveal that leading proponents see intelligent design as essentially religious in nature, not merely a scientific concept that has implications with which their personal religious beliefs happen to coincide. She writes that the leading proponents of intelligent design are closely allied with the ultra-conservative Christian Reconstructionism movement. She lists connections of (current and former) Discovery Institute Fellows Phillip E. Johnson, Charles B. Thaxton, Michael Behe, Richard Weikart, Jonathan Wells and Francis J. Beckwith to leading Christian Reconstructionist organizations, and the extent of the funding provided the Institute by Howard Ahmanson, Jr., a leading figure in the Reconstructionist movement. Reaction from other creationist groups Not all creationist organizations have embraced the intelligent design movement. According to Thomas Dixon, "Religious leaders have come out against ID too. An open letter affirming the compatibility of Christian faith and the teaching of evolution, first produced in response to controversies in Wisconsin in 2004, has now been signed by over ten thousand clergy from different Christian denominations across America." Hugh Ross of Reasons to Believe, a proponent of Old Earth creationism, believes that the efforts of intelligent design proponents to divorce the concept from Biblical Christianity make its hypothesis too vague. In 2002, he wrote: "Winning the argument for design without identifying the designer yields, at best, a sketchy origins model. Such a model makes little if any positive impact on the community of scientists and other scholars. [...] ...the time is right for a direct approach, a single leap into the origins fray. Introducing a biblically based, scientifically verifiable creation model represents such a leap." Likewise, two of the most prominent YEC organizations in the world have attempted to distinguish their views from those of the intelligent design movement. Henry M. Morris of the Institute for Creation Research (ICR) wrote, in 1999, that ID, "even if well-meaning and effectively articulated, will not work! It has often been tried in the past and has failed, and it will fail today. The reason it won't work is because it is not the Biblical method." According to Morris: "The evidence of intelligent design ... must be either followed by or accompanied by a sound presentation of true Biblical creationism if it is to be meaningful and lasting." In 2002, Carl Wieland, then of Answers in Genesis (AiG), criticized design advocates who, though well-intentioned, "'left the Bible out of it'" and thereby unwittingly aided and abetted the modern rejection of the Bible. Wieland explained that "AiG's major 'strategy' is to boldly, but humbly, call the church back to its Biblical foundations ... [so] we neither count ourselves a part of this movement nor campaign against it." Reaction from the scientific community The unequivocal consensus in the scientific community is that intelligent design is not science and has no place in a science curriculum. The U.S. National Academy of Sciences has stated that "creationism, intelligent design, and other claims of supernatural intervention in the origin of life or of species are not science because they are not testable by the methods of science." The U.S. National Science Teachers Association and the American Association for the Advancement of Science have termed it pseudoscience. Others in the scientific community have denounced its tactics, accusing the ID movement of manufacturing false attacks against evolution, of engaging in misinformation and misrepresentation about science, and marginalizing those who teach it. More recently, in September 2012, Bill Nye warned that creationist views threaten science education and innovations in the United States. In 2001, the Discovery Institute published advertisements under the heading "A Scientific Dissent From Darwinism", with the claim that listed scientists had signed this statement expressing skepticism: The ambiguous statement did not exclude other known evolutionary mechanisms, and most signatories were not scientists in relevant fields, but starting in 2004 the Institute claimed the increasing number of signatures indicated mounting doubts about evolution among scientists. The statement formed a key component of Discovery Institute campaigns to present intelligent design as scientifically valid by claiming that evolution lacks broad scientific support, with Institute members continued to cite the list through at least 2011. As part of a strategy to counter these claims, scientists organised Project Steve, which gained more signatories named Steve (or variants) than the Institute's petition, and a counter-petition, "A Scientific Support for Darwinism", which quickly gained similar numbers of signatories. Polls Several surveys were conducted prior to the December 2005 decision in Kitzmiller v. Dover School District, which sought to determine the level of support for intelligent design among certain groups. According to a 2005 Harris poll, 10% of adults in the United States viewed human beings as "so complex that they required a powerful force or intelligent being to help create them." Although Zogby polls commissioned by the Discovery Institute show more support, these polls suffer from considerable flaws, such as having a very low response rate (248 out of 16,000), being conducted on behalf of an organization with an expressed interest in the outcome of the poll, and containing leading questions. The 2017 Gallup creationism survey found that 38% of adults in the United States hold the view that "God created humans in their present form at one time within the last 10,000 years" when asked for their views on the origin and development of human beings, which was noted as being at the lowest level in 35 years. Previously, a series of Gallup polls in the United States from 1982 through 2014 on "Evolution, Creationism, Intelligent Design" found support for "human beings have developed over millions of years from less advanced formed of life, but God guided the process" of between 31% and 40%, support for "God created human beings in pretty much their present form at one time within the last 10,000 years or so" varied from 40% to 47%, and support for "human beings have developed over millions of years from less advanced forms of life, but God had no part in the process" varied from 9% to 19%. The polls also noted answers to a series of more detailed questions. Allegations of discrimination against ID proponents There have been allegations that ID proponents have met discrimination, such as being refused tenure or being harshly criticized on the Internet. In the documentary film Expelled: No Intelligence Allowed, released in 2008, host Ben Stein presents five such cases. The film contends that the mainstream science establishment, in a "scientific conspiracy to keep God out of the nation's laboratories and classrooms", suppresses academics who believe they see evidence of intelligent design in nature or criticize evidence of evolution. Investigation into these allegations turned up alternative explanations for perceived persecution. The film portrays intelligent design as motivated by science, rather than religion, though it does not give a detailed definition of the phrase or attempt to explain it on a scientific level. Other than briefly addressing issues of irreducible complexity, Expelled examines it as a political issue. The scientific theory of evolution is portrayed by the film as contributing to fascism, the Holocaust, communism, atheism, and eugenics. Expelled has been used in private screenings to legislators as part of the Discovery Institute intelligent design campaign for Academic Freedom bills. Review screenings were restricted to churches and Christian groups, and at a special pre-release showing, one of the interviewees, PZ Myers, was refused admission. The American Association for the Advancement of Science describes the film as dishonest and divisive propaganda aimed at introducing religious ideas into public school science classrooms, and the Anti-Defamation League has denounced the film's allegation that evolutionary theory influenced the Holocaust. The film includes interviews with scientists and academics who were misled into taking part by misrepresentation of the topic and title of the film. Skeptic Michael Shermer describes his experience of being repeatedly asked the same question without context as "surreal". Criticism Scientific criticism Advocates of intelligent design seek to keep God and the Bible out of the discussion, and present intelligent design in the language of science as though it were a scientific hypothesis. For a theory to qualify as scientific, it is expected to be: Consistent Parsimonious (sparing in its proposed entities or explanations; see Occam's razor) Useful (describes and explains observed phenomena, and can be used in a predictive manner) Empirically testable and falsifiable (potentially confirmable or disprovable by experiment or observation) Based on multiple observations (often in the form of controlled, repeated experiments) Correctable and dynamic (modified in the light of observations that do not support it) Progressive (refines previous theories) Provisional or tentative (is open to experimental checking, and does not assert certainty) For any theory, hypothesis, or conjecture to be considered scientific, it must meet most, and ideally all, of these criteria. The fewer criteria are met, the less scientific it is; if it meets only a few or none at all, then it cannot be treated as scientific in any meaningful sense of the word. Typical objections to defining intelligent design as science are that it lacks consistency, violates the principle of parsimony, is not scientifically useful, is not falsifiable, is not empirically testable, and is not correctable, dynamic, progressive, or provisional. Intelligent design proponents seek to change this fundamental basis of science by eliminating "methodological naturalism" from science and replacing it with what the leader of the intelligent design movement, Phillip E. Johnson, calls "theistic realism". Intelligent design proponents argue that naturalistic explanations fail to explain certain phenomena and that supernatural explanations provide a very simple and intuitive explanation for the origins of life and the universe. Many intelligent design followers believe that "scientism" is itself a religion that promotes secularism and materialism in an attempt to erase theism from public life, and they view their work in the promotion of intelligent design as a way to return religion to a central role in education and other public spheres. It has been argued that methodological naturalism is not an assumption of science, but a result of science well done: the God explanation is the least parsimonious, so according to Occam's razor, it cannot be a scientific explanation. The failure to follow the procedures of scientific discourse and the failure to submit work to the scientific community that withstands scrutiny have weighed against intelligent design being accepted as valid science. The intelligent design movement has not published a properly peer-reviewed article supporting ID in a scientific journal, and has failed to publish supporting peer-reviewed research or data. The only article published in a peer-reviewed scientific journal that made a case for intelligent design was quickly withdrawn by the publisher for having circumvented the journal's peer-review standards. The Discovery Institute says that a number of intelligent design articles have been published in peer-reviewed journals, but critics, largely members of the scientific community, reject this claim and state intelligent design proponents have set up their own journals with peer review that lack impartiality and rigor, consisting entirely of intelligent design supporters. Further criticism stems from the fact that the phrase intelligent design
supporters and critics of intelligent design. The Kitzmiller v. Dover Area School District court ruling held the latter to be the case. Origin of the term Since the Middle Ages, discussion of the religious "argument from design" or "teleological argument" in theology, with its concept of "intelligent design", has persistently referred to the theistic Creator God. Although ID proponents chose this provocative label for their proposed alternative to evolutionary explanations, they have de-emphasized their religious antecedents and denied that ID is natural theology, while still presenting ID as supporting the argument for the existence of God. While intelligent design proponents have pointed out past examples of the phrase intelligent design that they said were not creationist and faith-based, they have failed to show that these usages had any influence on those who introduced the label in the intelligent design movement. Variations on the phrase appeared in Young Earth creationist publications: a 1967 book co-written by Percival Davis referred to "design according to which basic organisms were created". In 1970, A. E. Wilder-Smith published The Creation of Life: A Cybernetic Approach to Evolution which defended Paley's design argument with computer calculations of the improbability of genetic sequences, which he said could not be explained by evolution but required "the abhorred necessity of divine intelligent activity behind nature", and that "the same problem would be expected to beset the relationship between the designer behind nature and the intelligently designed part of nature known as man." In a 1984 article as well as in his affidavit to Edwards v. Aguillard, Dean H. Kenyon defended creation science by stating that "biomolecular systems require intelligent design and engineering know-how", citing Wilder-Smith. Creationist Richard B. Bliss used the phrase "creative design" in Origins: Two Models: Evolution, Creation (1976), and in Origins: Creation or Evolution (1988) wrote that "while evolutionists are trying to find non-intelligent ways for life to occur, the creationist insists that an intelligent design must have been there in the first place." The first systematic use of the term, defined in a glossary and claimed to be other than creationism, was in Of Pandas and People, co-authored by Davis and Kenyon. Of Pandas and People The most common modern use of the words "intelligent design" as a term intended to describe a field of inquiry began after the United States Supreme Court ruled in June 1987 in the case of Edwards v. Aguillard that it is unconstitutional for a state to require the teaching of creationism in public school science curricula. A Discovery Institute report says that Charles B. Thaxton, editor of Pandas, had picked the phrase up from a NASA scientist, and thought, "That's just what I need, it's a good engineering term." In two successive 1987 drafts of the book, over one hundred uses of the root word "creation", such as "creationism" and "Creation Science", were changed, almost without exception, to "intelligent design", while "creationists" was changed to "design proponents" or, in one instance, "cdesign proponentsists". In June 1988, Thaxton held a conference titled "Sources of Information Content in DNA" in Tacoma, Washington. Stephen C. Meyer was at the conference, and later recalled that "The term intelligent design came up..." In December 1988 Thaxton decided to use the label "intelligent design" for his new creationist movement. Of Pandas and People was published in 1989, and in addition to including all the current arguments for ID, was the first book to make systematic use of the terms "intelligent design" and "design proponents" as well as the phrase "design theory", defining the term intelligent design in a glossary and representing it as not being creationism. It thus represents the start of the modern intelligent design movement. "Intelligent design" was the most prominent of around fifteen new terms it introduced as a new lexicon of creationist terminology to oppose evolution without using religious language. It was the first place where the phrase "intelligent design" appeared in its primary present use, as stated both by its publisher Jon A. Buell, and by William A. Dembski in his expert witness report for Kitzmiller v. Dover Area School District. The National Center for Science Education (NCSE) has criticized the book for presenting all of the basic arguments of intelligent design proponents and being actively promoted for use in public schools before any research had been done to support these arguments. Although presented as a scientific textbook, philosopher of science Michael Ruse considers the contents "worthless and dishonest". An American Civil Liberties Union lawyer described it as a political tool aimed at students who did not "know science or understand the controversy over evolution and creationism". One of the authors of the science framework used by California schools, Kevin Padian, condemned it for its "sub-text", "intolerance for honest science" and "incompetence". Concepts Irreducible complexity The term "irreducible complexity" was introduced by biochemist Michael Behe in his 1996 book Darwin's Black Box, though he had already described the concept in his contributions to the 1993 revised edition of Of Pandas and People. Behe defines it as "a single system which is composed of several well-matched interacting parts that contribute to the basic function, wherein the removal of any one of the parts causes the system to effectively cease functioning". Behe uses the analogy of a mousetrap to illustrate this concept. A mousetrap consists of several interacting pieces—the base, the catch, the spring and the hammer—all of which must be in place for the mousetrap to work. Removal of any one piece destroys the function of the mousetrap. Intelligent design advocates assert that natural selection could not create irreducibly complex systems, because the selectable function is present only when all parts are assembled. Behe argued that irreducibly complex biological mechanisms include the bacterial flagellum of E. coli, the blood clotting cascade, cilia, and the adaptive immune system. Critics point out that the irreducible complexity argument assumes that the necessary parts of a system have always been necessary and therefore could not have been added sequentially. They argue that something that is at first merely advantageous can later become necessary as other components change. Furthermore, they argue, evolution often proceeds by altering preexisting parts or by removing them from a system, rather than by adding them. This is sometimes called the "scaffolding objection" by an analogy with scaffolding, which can support an "irreducibly complex" building until it is complete and able to stand on its own. Behe has acknowledged using "sloppy prose", and that his "argument against Darwinism does not add up to a logical proof." Irreducible complexity has remained a popular argument among advocates of intelligent design; in the Dover trial, the court held that "Professor Behe's claim for irreducible complexity has been refuted in peer-reviewed research papers and has been rejected by the scientific community at large." Specified complexity In 1986, Charles B. Thaxton, a physical chemist and creationist, used the term "specified complexity" from information theory when claiming that messages transmitted by DNA in the cell were specified by intelligence, and must have originated with an intelligent agent. The intelligent design concept of "specified complexity" was developed in the 1990s by mathematician, philosopher, and theologian William A. Dembski. Dembski states that when something exhibits specified complexity (i.e., is both complex and "specified", simultaneously), one can infer that it was produced by an intelligent cause (i.e., that it was designed) rather than being the result of natural processes. He provides the following examples: "A single letter of the alphabet is specified without being complex. A long sentence of random letters is complex without being specified. A Shakespearean sonnet is both complex and specified." He states that details of living things can be similarly characterized, especially the "patterns" of molecular sequences in functional biological molecules such as DNA. Dembski defines complex specified information (CSI) as anything with a less than 1 in 10150 chance of occurring by (natural) chance. Critics say that this renders the argument a tautology: complex specified information cannot occur naturally because Dembski has defined it thus, so the real question becomes whether or not CSI actually exists in nature. The conceptual soundness of Dembski's specified complexity/CSI argument has been discredited in the scientific and mathematical communities. Specified complexity has yet to be shown to have wide applications in other fields, as Dembski asserts. John Wilkins and Wesley R. Elsberry characterize Dembski's "explanatory filter" as eliminative because it eliminates explanations sequentially: first regularity, then chance, finally defaulting to design. They argue that this procedure is flawed as a model for scientific inference because the asymmetric way it treats the different possible explanations renders it prone to making false conclusions. Richard Dawkins, another critic of intelligent design, argues in The God Delusion (2006) that allowing for an intelligent designer to account for unlikely complexity only postpones the problem, as such a designer would need to be at least as complex. Other scientists have argued that evolution through selection is better able to explain the observed complexity, as is evident from the use of selective evolution to design certain electronic, aeronautic and automotive systems that are considered problems too complex for human "intelligent designers". Fine-tuned universe Intelligent design proponents have also occasionally appealed to broader teleological arguments outside of biology, most notably an argument based on the fine-tuning of universal constants that make matter and life possible and which are argued not to be solely attributable to chance. These include the values of fundamental physical constants, the relative strength of nuclear forces, electromagnetism, and gravity between fundamental particles, as well as the ratios of masses of such particles. Intelligent design proponent and Center for Science and Culture fellow Guillermo Gonzalez argues that if any of these values were even slightly different, the universe would be dramatically different, making it impossible for many chemical elements and features of the Universe, such as galaxies, to form. Thus, proponents argue, an intelligent designer of life was needed to ensure that the requisite features were present to achieve that particular outcome. Scientists have generally responded that these arguments are poorly supported by existing evidence. Victor J. Stenger and other critics say both intelligent design and the weak form of the anthropic principle are essentially a tautology; in his view, these arguments amount to the claim that life is able to exist because the Universe is able to support life. The claim of the improbability of a life-supporting universe has also been criticized as an argument by lack of imagination for assuming no other forms of life are possible. Life as we know it might not exist if things were different, but a different sort of life might exist in its place. A number of critics also suggest that many of the stated variables appear to be interconnected and that calculations made by mathematicians and physicists suggest that the emergence of a universe similar to ours is quite probable. Intelligent designer The contemporary intelligent design movement formulates its arguments in secular terms and intentionally avoids identifying the intelligent agent (or agents) they posit. Although they do not state that God is the designer, the designer is often implicitly hypothesized to have intervened in a way that only a god could intervene. Dembski, in The Design Inference (1998), speculates that an alien culture could fulfill these requirements. Of Pandas and People proposes that SETI illustrates an appeal to intelligent design in science. In 2000, philosopher of science Robert T. Pennock suggested the Raëlian UFO religion as a real-life example of an extraterrestrial intelligent designer view that "make[s] many of the same bad arguments against evolutionary theory as creationists". The authoritative description of intelligent design, however, explicitly states that the Universe displays features of having been designed. Acknowledging the paradox, Dembski concludes that "no intelligent agent who is strictly physical could have presided over the origin of the universe or the origin of life." The leading proponents have made statements to their supporters that they believe the designer to be the Christian God, to the exclusion of all other religions. Beyond the debate over whether intelligent design is scientific, a number of critics argue that existing evidence makes the design hypothesis appear unlikely, irrespective of its status in the world of science. For example, Jerry Coyne asks why a designer would "give us a pathway for making vitamin C, but then destroy it by disabling one of its enzymes" (see pseudogene) and why a designer would not "stock oceanic islands with reptiles, mammals, amphibians, and freshwater fish, despite the suitability of such islands for these species". Coyne also points to the fact that "the flora and fauna on those islands resemble that of the nearest mainland, even when the environments are very different" as evidence that species were not placed there by a designer. Previously, in Darwin's Black Box, Behe had argued that we are simply incapable of understanding the designer's motives, so such questions cannot be answered definitively. Odd designs could, for example, "...have been placed there by the designer for a reason—for artistic reasons, for variety, to show off, for some as-yet-undetected practical purpose, or for some unguessable reason—or they might not." Coyne responds that in light of the evidence, "either life resulted not from intelligent design, but from evolution; or the intelligent designer is a cosmic prankster who designed everything to make it look as though it had evolved." Intelligent design proponents such as Paul Nelson avoid the problem of poor design in nature by insisting that we have simply failed to understand the perfection of the design. Behe cites Paley as his inspiration, but he differs from Paley's expectation of a perfect Creation and proposes that designers do not necessarily produce the best design they can. Behe suggests that, like a parent not wanting to spoil a child with extravagant toys, the designer can have multiple motives for not giving priority to excellence in engineering. He says that "Another problem with the argument from imperfection is that it critically depends on a psychoanalysis of the unidentified designer. Yet the reasons that a designer would or would not do anything are virtually impossible to know unless the designer tells you specifically what those reasons are." This reliance on inexplicable motives of the designer makes intelligent design scientifically untestable. Retired UC Berkeley law professor, author and intelligent design advocate Phillip E. Johnson puts forward a core definition that the designer creates for a purpose, giving the example that in his view AIDS was created to punish immorality and is not caused by HIV, but such motives cannot be tested by scientific methods. Asserting the need for a designer of complexity also raises the question "What designed the designer?" Intelligent design proponents say that the question is irrelevant to or outside the scope of intelligent design. Richard Wein counters that "...scientific explanations often create new unanswered questions. But, in assessing the value of an explanation, these questions are not irrelevant. They must be balanced against the improvements in our understanding which the explanation provides. Invoking an unexplained being to explain the origin of other beings (ourselves) is little more than question-begging. The new question raised by the explanation is as problematic as the question which the explanation purports to answer." Richard Dawkins sees the assertion that the designer does not need to be explained as a thought-terminating cliché. In the absence of observable, measurable evidence, the very question "What designed
alpha-helices. Unfortunately, the helices are too long, and recent studies suggest that, for integrin gpIIbIIIa, they are tilted with respect both to one another and to the plane of the membrane. Talin binding alters the angle of tilt of the β3 chain transmembrane helix in model systems and this may reflect a stage in the process of inside-out signalling which primes integrins. Moreover, talin proteins are able to dimerize and thus are thought to intervene in the clustering of integrin dimers which leads to the formation of a focal adhesion. Recently, the Kindlin-1 and Kindlin-2 proteins have also been found to interact with integrin and activate it. Function Integrins have two main functions, attachment of the cells to the ECM and signal transduction from the ECM to the cells. They are also involved in a wide range of other biological activities, including extravasation, cell-to-cell adhesion, cell migration, and as receptors for certain viruses, such as adenovirus, echovirus, hantavirus, and foot-and-mouth disease, polio virus and other viruses. A prominent function of the integrins is seen in the molecule GpIIb/IIIa, an integrin on the surface of blood platelets (thrombocytes) responsible for attachment to fibrin within a developing blood clot. This molecule dramatically increases its binding affinity for fibrin/fibrinogen through association of platelets with exposed collagens in the wound site. Upon association of platelets with collagen, GPIIb/IIIa changes shape, allowing it to bind to fibrin and other blood components to form the clot matrix and stop blood loss. Attachment of cell to the ECM Integrins couple the ECM outside a cell to the cytoskeleton (in particular, the microfilaments) inside the cell. Which ligand in the ECM the integrin can bind to is defined by which α and β subunits the integrin is made of. Among the ligands of integrins are fibronectin, vitronectin, collagen, and laminin. The connection between the cell and the ECM may help the cell to endure pulling forces without being ripped out of the ECM. The ability of a cell to create this kind of bond is also of vital importance in ontogeny. Cell attachment to the ECM is a basic requirement to build a multicellular organism. Integrins are not simply hooks, but give the cell critical signals about the nature of its surroundings. Together with signals arising from receptors for soluble growth factors like VEGF, EGF, and many others, they enforce a cellular decision on what biological action to take, be it attachment, movement, death, or differentiation. Thus integrins lie at the heart of many cellular biological processes. The attachment of the cell takes place through formation of cell adhesion complexes, which consist of integrins and many cytoplasmic proteins, such as talin, vinculin, paxillin, and alpha-actinin. These act by regulating kinases such as FAK (focal adhesion kinase) and Src kinase family members to phosphorylate substrates such as p130CAS thereby recruiting signaling adaptors such as CRK. These adhesion complexes attach to the actin cytoskeleton. The integrins thus serve to link two networks across the plasma membrane: the extracellular ECM and the intracellular actin filamentous system. Integrin α6β4 is an exception: it links to the keratin intermediate filament system in epithelial cells. Focal adhesions are large molecular complexes, which are generated following interaction of integrins with ECM, then their clustering. The clusters likely provide sufficient intracellular binding sites to permit the formation of stable signaling complexes on the cytoplasmic side of the cell membrane. So the focal adhesions contain integrin ligand, integrin molecule, and associate plaque proteins. Binding is propelled by changes in free energy. As previously stated, these complexes connect the extracellular matrix to actin bundles. Cryo-electron tomography reveals that the adhesion contains particles on the cell membrane with diameter of 25 +/- 5 nm and spaced at approximately 45 nm. Treatment with Rho-kinase inhibitor Y-27632 reduces the size of the particle, and it is extremely mechanosensitive. One important function of integrins on cells in tissue culture is their role in cell migration. Cells adhere to a substrate through their integrins. During movement, the cell makes new attachments to the substrate at its front and concurrently releases those at its rear. When released from the substrate, integrin molecules are taken back into the cell by endocytosis; they are transported through the cell to its front by the endocytic cycle, where they are added back to the surface. In this way they are cycled for reuse, enabling the cell to make fresh attachments at its leading front. The cycle of integrin endocytosis and recycling back to the cell surface is important also for not migrating cells and during animal development. Signal transduction Integrins play an important role in cell signaling by modulating the cell signaling pathways of transmembrane protein kinases such as receptor tyrosine kinases (RTK). While the interaction between integrin and receptor tyrosine kinases originally was thought of as uni-directional and supportive, recent studies indicate that integrins have additional, multi-faceted roles in cell signaling. Integrins can regulate the receptor tyrosine kinase signaling by recruiting specific adaptors to the plasma membrane. For example, β1c integrin recruits Gab1/Shp2 and presents Shp2 to IGF1R, resulting in dephosphorylation of the receptor. In a reverse direction, when a receptor tyrosine kinase is activated, integrins co-localise at focal adhesion with the receptor tyrosine kinases and their associated signaling molecules. The repertoire of integrins expressed on a particular cell can specify the signaling pathway due to the differential binding affinity of ECM ligands for the integrins. The tissue stiffness and matrix composition can initiate specific signaling pathways regulating cell behavior. Clustering and activation of the integrins/actin complexes strengthen the focal adhesion interaction and initiate the framework for cell signaling through assembly of adhesomes. Depending on the integrin's regulatory impact on specific receptor tyrosine kinases, the cell can experience: cell growth cell division cell survival cellular differentiation apoptosis (programmed cell death) Knowledge of the relationship between integrins and receptor tyrosine kinase has laid a foundation for new approaches to cancer therapy. Specifically, targeting integrins associated with RTKs is an emerging approach for inhibiting angiogenesis. Integrins and nerve repair Integrins have an important function in neuroregeneration after injury of the peripheral nervous system (PNS). Integrins are present at the growth cone of damaged PNS
is noticeable by its absence. The integrin structure has drawn attention to this problem, which may have general implications for how membrane proteins work. It appears that the integrin transmembrane helices are tilted (see "Activation" below), which hints that the extracellular chains may also not be orthogonal with respect to the membrane surface. Although the crystal structure changed surprisingly little after binding to cilengitide, the current hypothesis is that integrin function involves changes in shape to move the ligand-binding site into a more accessible position, away from the cell surface, and this shape change also triggers intracellular signaling. There is a wide body of cell-biological and biochemical literature that supports this view. Perhaps the most convincing evidence involves the use of antibodies that only recognize integrins when they have bound to their ligands, or are activated. As the "footprint" that an antibody makes on its binding target is roughly a circle about 3 nm in diameter, the resolution of this technique is low. Nevertheless, these so-called LIBS (Ligand-Induced-Binding-Sites) antibodies unequivocally show that dramatic changes in integrin shape routinely occur. However, how the changes detected with antibodies look on the structure is still unknown. Activation When released into the cell membrane, newly synthesized integrin dimers are speculated to be found in the same "bent" conformation revealed by the structural studies described above. One school of thought claims that this bent form prevents them from interacting with their ligands, although bent forms can predominate in high-resolution EM structures of integrin bound to an ECM ligand. Therefore, at least in biochemical experiments, integrin dimers must apparently not be 'unbent' in order to prime them and allow their binding to the ECM. In cells, the priming is accomplished by a protein talin, which binds to the β tail of the integrin dimer and changes its conformation. The α and β integrin chains are both class-I transmembrane proteins: they pass the plasma membrane as single transmembrane alpha-helices. Unfortunately, the helices are too long, and recent studies suggest that, for integrin gpIIbIIIa, they are tilted with respect both to one another and to the plane of the membrane. Talin binding alters the angle of tilt of the β3 chain transmembrane helix in model systems and this may reflect a stage in the process of inside-out signalling which primes integrins. Moreover, talin proteins are able to dimerize and thus are thought to intervene in the clustering of integrin dimers which leads to the formation of a focal adhesion. Recently, the Kindlin-1 and Kindlin-2 proteins have also been found to interact with integrin and activate it. Function Integrins have two main functions, attachment of the cells to the ECM and signal transduction from the ECM to the cells. They are also involved in a wide range of other biological activities, including extravasation, cell-to-cell adhesion, cell migration, and as receptors for certain viruses, such as adenovirus, echovirus, hantavirus, and foot-and-mouth disease, polio virus and other viruses. A prominent function of the integrins is seen in the molecule GpIIb/IIIa, an integrin on the surface of blood platelets (thrombocytes) responsible for attachment to fibrin within a developing blood clot. This molecule dramatically increases its binding affinity for fibrin/fibrinogen through association of platelets with exposed collagens in the wound site. Upon association of platelets with collagen, GPIIb/IIIa changes shape, allowing it to bind to fibrin and other blood components to form the clot matrix and stop blood loss. Attachment of cell to the ECM Integrins couple the ECM outside a cell to the cytoskeleton (in particular, the microfilaments) inside the cell. Which ligand in the ECM the integrin can bind to is defined by which α and β subunits the integrin is made of. Among the ligands of integrins are fibronectin, vitronectin, collagen, and laminin. The connection between the cell and the ECM may help the cell to endure pulling forces without being ripped out of the ECM. The ability of a cell to create this kind of bond is also of vital importance in ontogeny. Cell attachment to the ECM is a basic requirement to build a multicellular organism. Integrins are not simply hooks, but give the cell critical signals about the nature of its surroundings. Together with signals arising from receptors for soluble growth factors like VEGF, EGF, and many others, they enforce a cellular decision on what biological action to take, be it attachment, movement, death, or differentiation. Thus integrins lie at the heart of many cellular biological processes. The attachment of the cell takes place through formation of cell adhesion complexes, which consist of integrins and many cytoplasmic proteins, such as talin, vinculin, paxillin, and alpha-actinin. These act by regulating kinases such as FAK (focal adhesion kinase) and Src kinase family members to phosphorylate substrates such as p130CAS thereby recruiting signaling adaptors such as CRK. These adhesion complexes attach to the actin cytoskeleton. The integrins thus serve to link two networks across the plasma membrane: the extracellular ECM and the intracellular actin filamentous system. Integrin α6β4 is an exception: it links to the keratin intermediate filament system in epithelial cells. Focal adhesions are large molecular complexes, which are generated following interaction of integrins with ECM, then their clustering. The clusters likely provide sufficient intracellular binding sites to permit the formation of stable signaling complexes on the cytoplasmic side of the cell membrane. So the focal adhesions contain integrin ligand, integrin molecule, and associate plaque proteins. Binding is propelled by changes in free energy. As previously stated, these complexes connect the extracellular matrix to actin bundles. Cryo-electron tomography reveals that the adhesion contains particles on the cell membrane with diameter of 25 +/- 5 nm and spaced at approximately 45 nm. Treatment with Rho-kinase inhibitor Y-27632 reduces the size of the particle, and it is extremely mechanosensitive. One important function of integrins on cells in tissue culture is their role in cell migration. Cells adhere to a substrate through their integrins. During movement, the cell makes new attachments to the substrate at its front and concurrently releases those at its rear. When released from the substrate, integrin molecules are taken back into the cell by endocytosis; they are transported through the cell to its front by the endocytic cycle, where they are added back to the surface. In this way they are cycled for reuse, enabling the cell to make fresh attachments at its leading front. The cycle of integrin endocytosis and recycling back to the cell surface is important also for not migrating cells and during animal development. Signal transduction Integrins play an important role in cell signaling by modulating the cell signaling pathways of transmembrane protein kinases such as receptor tyrosine kinases (RTK). While the interaction between integrin and receptor tyrosine kinases originally was thought of as uni-directional and supportive, recent studies indicate that integrins have additional, multi-faceted roles in cell signaling. Integrins can regulate the receptor tyrosine kinase signaling by recruiting specific adaptors to the plasma membrane. For example, β1c integrin recruits Gab1/Shp2 and presents Shp2 to IGF1R, resulting in dephosphorylation of the receptor. In a reverse direction, when a receptor tyrosine kinase is activated, integrins co-localise at focal adhesion with the receptor tyrosine kinases and their associated signaling molecules. The repertoire of integrins expressed on a particular cell can specify the signaling pathway due to the differential binding affinity of ECM ligands for the integrins. The tissue stiffness and matrix composition can initiate specific signaling pathways regulating cell behavior. Clustering and activation of the integrins/actin complexes strengthen the focal adhesion interaction and initiate the framework for
the input (or help) of metabolic energy (e.g. ATP, co-transport mechanisms, or active transport mechanisms). Ion channels are located within the membrane of all excitable cells, and of many intracellular organelles. They are often described as narrow, water-filled tunnels that allow only ions of a certain size and/or charge to pass through. This characteristic is called selective permeability. The archetypal channel pore is just one or two atoms wide at its narrowest point and is selective for specific species of ion, such as sodium or potassium. However, some channels may be permeable to the passage of more than one type of ion, typically sharing a common charge: positive (cations) or negative (anions). Ions often move through the segments of the channel pore in single file nearly as quickly as the ions move through free solution. In many ion channels, passage through the pore is governed by a "gate", which may be opened or closed in response to chemical or electrical signals, temperature, or mechanical force. Ion channels are integral membrane proteins, typically formed as assemblies of several individual proteins. Such "multi-subunit" assemblies usually involve a circular arrangement of identical or homologous proteins closely packed around a water-filled pore through the plane of the membrane or lipid bilayer. For most voltage-gated ion channels, the pore-forming subunit(s) are called the α subunit, while the auxiliary subunits are denoted β, γ, and so on. Biological role Because channels underlie the nerve impulse and because "transmitter-activated" channels mediate conduction across the synapses, channels are especially prominent components of the nervous system. Indeed, numerous toxins that organisms have evolved for shutting down the nervous systems of predators and prey (e.g., the venoms produced by spiders, scorpions, snakes, fish, bees, sea snails, and others) work by modulating ion channel conductance and/or kinetics. In addition, ion channels are key components in a wide variety of biological processes that involve rapid changes in cells, such as cardiac, skeletal, and smooth muscle contraction, epithelial transport of nutrients and ions, T-cell activation and pancreatic beta-cell insulin release. In the search for new drugs, ion channels are a frequent target. Diversity There are over 300 types of ion channels just in the cells of the inner ear. Ion channels may be classified by the nature of their gating, the species of ions passing through those gates, the number of gates (pores) and localization of proteins. Further heterogeneity of ion channels arises when channels with different constitutive subunits give rise to a specific kind of current. Absence or mutation of one or more of the contributing types of channel subunits can result in loss of function and, potentially, underlie neurologic diseases. Classification by gating Ion channels may be classified by gating, i.e. what opens and closes the channels. For example, voltage-gated ion channels open or close depending on the voltage gradient across the plasma membrane, while ligand-gated ion channels open or close depending on binding of ligands to the channel. Voltage-gated Voltage-gated ion channels open and close in response to membrane potential. Voltage-gated sodium channels: This family contains at least 9 members and is largely responsible for action potential creation and propagation. The pore-forming α subunits are very large (up to 4,000 amino acids) and consist of four homologous repeat domains (I-IV) each comprising six transmembrane segments (S1-S6) for a total of 24 transmembrane segments. The members of this family also coassemble with auxiliary β subunits, each spanning the membrane once. Both α and β subunits are extensively glycosylated. Voltage-gated calcium channels: This family contains 10 members, though these are known to coassemble with α2δ, β, and γ subunits. These channels play an important role in both linking muscle excitation with contraction as well as neuronal excitation with transmitter release. The α subunits have an overall structural resemblance to those of the sodium channels and are equally large. Cation channels of sperm: This small family of channels, normally referred to as Catsper channels, is related to the two-pore channels and distantly related to TRP channels. Voltage-gated potassium channels (KV): This family contains almost 40 members, which are further divided into 12 subfamilies. These channels are known mainly for their role in repolarizing the cell membrane following action potentials. The α subunits have six transmembrane segments, homologous to a single domain of the sodium channels. Correspondingly, they assemble as tetramers to produce a functioning channel. Some transient receptor potential channels: This group of channels, normally referred to simply as TRP channels, is named after their role in Drosophila phototransduction. This family, containing at least 28 members, is incredibly diverse in its method of activation. Some TRP channels seem to be constitutively open, while others are gated by voltage, intracellular Ca2+, pH, redox state, osmolarity, and mechanical stretch. These channels also vary according to the ion(s) they pass, some being selective for Ca2+ while others are less selective, acting as cation channels. This family is subdivided into 6 subfamilies based on homology: classical (TRPC), vanilloid receptors (TRPV), melastatin (TRPM), polycystins (TRPP), mucolipins (TRPML), and ankyrin transmembrane protein 1 (TRPA). Hyperpolarization-activated cyclic nucleotide-gated channels: The opening of these channels is due to hyperpolarization rather than the depolarization required for other cyclic nucleotide-gated channels. These channels are also sensitive to the cyclic nucleotides cAMP and cGMP, which alter the voltage sensitivity of the channel's opening. These channels are permeable to the monovalent cations K+ and Na+. There are 4 members of this family, all of which form tetramers of six-transmembrane α subunits. As these channels open under hyperpolarizing conditions, they function as pacemaking channels in the heart, particularly the SA node. Voltage-gated proton channels: Voltage-gated proton channels open with depolarization, but in a strongly pH-sensitive manner. The result is that these channels open only when the electrochemical gradient is outward, such that their opening will only allow protons to leave cells. Their function thus appears to be acid extrusion from cells. Another important function occurs in phagocytes (e.g. eosinophils, neutrophils, macrophages) during the "respiratory burst." When bacteria or other microbes are engulfed by phagocytes, the enzyme NADPH oxidase assembles in the membrane and begins to produce reactive oxygen species (ROS) that help kill bacteria. NADPH oxidase is electrogenic, moving electrons across the membrane, and proton channels open to allow proton flux to balance the electron movement electrically. Ligand-gated (neurotransmitter) Also known as ionotropic receptors, this group of channels open in response to specific ligand molecules binding to the extracellular domain of the receptor protein. Ligand binding causes a conformational change in the structure of the channel protein that ultimately leads to the opening of the channel gate and subsequent ion flux across the plasma membrane. Examples of such channels include the cation-permeable "nicotinic" Acetylcholine receptor, ionotropic glutamate-gated receptors, acid sensing ion channels (ASICs), ATP-gated P2X receptors, and the anion-permeable γ-aminobutyric acid-gated
channels may be classified by the nature of their gating, the species of ions passing through those gates, the number of gates (pores) and localization of proteins. Further heterogeneity of ion channels arises when channels with different constitutive subunits give rise to a specific kind of current. Absence or mutation of one or more of the contributing types of channel subunits can result in loss of function and, potentially, underlie neurologic diseases. Classification by gating Ion channels may be classified by gating, i.e. what opens and closes the channels. For example, voltage-gated ion channels open or close depending on the voltage gradient across the plasma membrane, while ligand-gated ion channels open or close depending on binding of ligands to the channel. Voltage-gated Voltage-gated ion channels open and close in response to membrane potential. Voltage-gated sodium channels: This family contains at least 9 members and is largely responsible for action potential creation and propagation. The pore-forming α subunits are very large (up to 4,000 amino acids) and consist of four homologous repeat domains (I-IV) each comprising six transmembrane segments (S1-S6) for a total of 24 transmembrane segments. The members of this family also coassemble with auxiliary β subunits, each spanning the membrane once. Both α and β subunits are extensively glycosylated. Voltage-gated calcium channels: This family contains 10 members, though these are known to coassemble with α2δ, β, and γ subunits. These channels play an important role in both linking muscle excitation with contraction as well as neuronal excitation with transmitter release. The α subunits have an overall structural resemblance to those of the sodium channels and are equally large. Cation channels of sperm: This small family of channels, normally referred to as Catsper channels, is related to the two-pore channels and distantly related to TRP channels. Voltage-gated potassium channels (KV): This family contains almost 40 members, which are further divided into 12 subfamilies. These channels are known mainly for their role in repolarizing the cell membrane following action potentials. The α subunits have six transmembrane segments, homologous to a single domain of the sodium channels. Correspondingly, they assemble as tetramers to produce a functioning channel. Some transient receptor potential channels: This group of channels, normally referred to simply as TRP channels, is named after their role in Drosophila phototransduction. This family, containing at least 28 members, is incredibly diverse in its method of activation. Some TRP channels seem to be constitutively open, while others are gated by voltage, intracellular Ca2+, pH, redox state, osmolarity, and mechanical stretch. These channels also vary according to the ion(s) they pass, some being selective for Ca2+ while others are less selective, acting as cation channels. This family is subdivided into 6 subfamilies based on homology: classical (TRPC), vanilloid receptors (TRPV), melastatin (TRPM), polycystins (TRPP), mucolipins (TRPML), and ankyrin transmembrane protein 1 (TRPA). Hyperpolarization-activated cyclic nucleotide-gated channels: The opening of these channels is due to hyperpolarization rather than the depolarization required for other cyclic nucleotide-gated channels. These channels are also sensitive to the cyclic nucleotides cAMP and cGMP, which alter the voltage sensitivity of the channel's opening. These channels are permeable to the monovalent cations K+ and Na+. There are 4 members of this family, all of which form tetramers of six-transmembrane α subunits. As these channels open under hyperpolarizing conditions, they function as pacemaking channels in the heart, particularly the SA node. Voltage-gated proton channels: Voltage-gated proton channels open with depolarization, but in a strongly pH-sensitive manner. The result is that these channels open only when the electrochemical gradient is outward, such that their opening will only allow protons to leave cells. Their function thus appears to be acid extrusion from cells. Another important function occurs in phagocytes (e.g. eosinophils, neutrophils, macrophages) during the "respiratory burst." When bacteria or other microbes are engulfed by phagocytes, the enzyme NADPH oxidase assembles in the membrane and begins to produce reactive oxygen species (ROS) that help kill bacteria. NADPH oxidase is electrogenic, moving electrons across the membrane, and proton channels open to allow proton flux to balance the electron movement electrically. Ligand-gated (neurotransmitter) Also known as ionotropic receptors, this group of channels open in response to specific ligand molecules binding to the extracellular domain of the receptor protein. Ligand binding causes a conformational change in the structure of the channel protein that ultimately leads to the opening of the channel gate and subsequent ion flux across the plasma membrane. Examples of such channels include the cation-permeable "nicotinic" Acetylcholine receptor, ionotropic glutamate-gated receptors, acid sensing ion channels (ASICs), ATP-gated P2X receptors, and the anion-permeable γ-aminobutyric acid-gated GABAA receptor. Ion channels activated by second messengers may also be categorized in this group, although ligands and second messengers are otherwise distinguished from each other. Lipid-gated This group of channels opens in response to specific lipid molecules binding to the channel's transmembrane domain typically near the inner leaflet of the plasma membrane. Phosphatidylinositol 4,5-bisphosphate (PIP2) and phosphatidic acid (PA) are the best-characterized lipids to gate these channels. Many of the leak potassium channels are gated by lipids including the inward-rectifier potassium channels and two pore domain potassium channels TREK-1 and TRAAK. KCNQ potassium channel family are gated by PIP2. The voltage activated potassium channel (Kv) is regulated by PA. Its midpoint of activation shifts +50 mV upon PA hydrolysis, near resting membrane potentials. This suggests Kv could be opened by lipid hydrolysis independent of voltage and may qualify this channel as dual lipid and voltage gated channel. Other gating Gating also includes activation and inactivation by second messengers from the inside of the cell membrane – rather than from outside the cell, as in the case for ligands. Some potassium channels: Inward-rectifier potassium channels: These channels allow potassium ions to flow into the cell in an "inwardly rectifying" manner: potassium flows more efficiently into than out of the cell. This family is composed of 15 official and 1 unofficial member and is further subdivided into 7 subfamilies based on homology. These channels are affected by intracellular ATP, PIP2, and G-protein βγ subunits. They are involved in important physiological processes such as pacemaker activity in the heart, insulin release, and potassium uptake in glial cells. They contain only two transmembrane segments, corresponding to the core pore-forming segments of the KV and KCa channels. Their α subunits form tetramers. Calcium-activated potassium channels: This family of channels is activated by intracellular Ca2+ and contains 8 members. Tandem pore domain potassium channel: This family of 15 members form what are known as leak channels, and they display Goldman-Hodgkin-Katz (open) rectification. Contrary to their common name of 'Two-pore-domain potassium channels', these channels have only one pore but two pore domains per subunit. Two-pore channels include ligand-gated and voltage-gated cation channels, so-named because they contain two pore-forming subunits. As their name suggests, they have two pores. Light-gated channels like channelrhodopsin are directly opened by photons. Mechanosensitive ion channels open under the influence of stretch, pressure, shear, and displacement. Cyclic nucleotide-gated channels: This superfamily of channels contains two families: the cyclic nucleotide-gated (CNG) channels and the hyperpolarization-activated, cyclic nucleotide-gated (HCN) channels. This grouping is functional rather than evolutionary. Cyclic nucleotide-gated channels: This family of channels is characterized by activation by either intracellular cAMP or cGMP. These channels are primarily permeable to monovalent cations such as K+ and Na+. They are also permeable to Ca2+, though it acts to close them. There are 6 members of this family, which is divided into 2 subfamilies. Hyperpolarization-activated cyclic nucleotide-gated channels Temperature-gated channels: Members of the transient receptor potential ion channel superfamily, such as TRPV1 or TRPM8, are opened either by hot or cold temperatures. Classification by type of ions Chloride channels: This superfamily of channels consists of approximately 13 members. They include ClCs, CLICs, Bestrophins and CFTRs. These channels are non-selective for small anions; however chloride is the most abundant anion, and hence they are known as chloride channels. Potassium channels Voltage-gated potassium channels e.g., Kvs, Kirs etc. Calcium-activated potassium channels e.g., BKCa or MaxiK, SK, etc. Inward-rectifier potassium channels Two-pore-domain potassium channels: This family of 15 members form what is known as leak channels, and they display Goldman-Hodgkin-Katz (open) rectification. Sodium channels Voltage-gated sodium channels (NaVs) Epithelial sodium channels (ENaCs) Calcium channels (CaVs) Proton channels Voltage-gated proton channels Non-selective cation channels: These non-selectively allow many types of cations, mainly Na+, K+ and Ca2+, through the channel. Most transient receptor potential channels Classification by cellular localization Ion channels are also classified according to their subcellular localization. The plasma membrane accounts for around 2% of the total membrane in the cell, whereas intracellular organelles contain 98% of the cell's membrane. The major intracellular compartments are endoplasmic reticulum, Golgi apparatus, and mitochondria. On the basis of localization, ion channels are classified as: Plasma membrane channels Examples: Voltage-gated potassium channels (Kv), Sodium channels (Nav), Calcium channels (Cav) and Chloride channels (ClC) Intracellular channels, which are further classified into different organelles Endoplasmic reticulum channels: RyR, SERCA, ORAi Mitochondrial channels: mPTP, KATP, BK, IK, CLIC5, Kv7.4 at the inner membrane and VDAC and CLIC4 as outer membrane channels. Other classifications Some ion channels are classified by the duration of their response to stimuli: Transient receptor potential channels: This group of channels, normally referred to simply as TRP channels, is named after their role in Drosophila visual phototransduction. This family, containing at least 28 members, is diverse in its mechanisms of activation. Some TRP channels remain constitutively open, while others are gated by voltage, intracellular Ca2+, pH, redox state, osmolarity, and mechanical stretch. These channels also vary according to the ion(s) they pass, some being selective for Ca2+ while others are less selective cation channels. This family is subdivided into 6 subfamilies based on homology: canonical TRP (TRPC), vanilloid receptors (TRPV), melastatin (TRPM), polycystins (TRPP), mucolipins (TRPML), and ankyrin transmembrane protein 1 (TRPA). Detailed structure Channels differ with respect to the ion they let pass (for example, Na+, K+, Cl−), the ways in which they may be regulated, the number of
abortion Insulin-degrading enzyme, Insulysin, an enzyme Infectious disease epidemiology, the study of the patterns of communicable diseases at the population level Investigational Device Exemption, a US Food and Drug Administration regulatory status Chemistry Suffix -ide for some molecules in the IUPAC nomenclature of inorganic chemistry Computing Integrated development environment, a software application for software development Integrated Drive Electronics, a computer hardware bus for disk drives, retroactively termed Parallel ATA Places Ide, Devon, a village in England Ide, Kyoto, a town in Japan Greek mythology Ida (mother of Minos), daughter of Corybas, the wife of Lycastus king of Crete, and the mother of the "second" king Minos of Crete Ida (nurse of Zeus), who along with her sister Adrasteia, nursed Zeus on Crete People Samuel Krafsur (1913–1983), (KGB codename) Ide Schelling (born 1998), Dutch cyclist Given name Íde, a feminine name of Gaelic origin Surname Charlie Ide (born 1988), English
of the patterns of communicable diseases at the population level Investigational Device Exemption, a US Food and Drug Administration regulatory status Chemistry Suffix -ide for some molecules in the IUPAC nomenclature of inorganic chemistry Computing Integrated development environment, a software application for software development Integrated Drive Electronics, a computer hardware bus for disk drives, retroactively termed Parallel ATA Places Ide, Devon, a village in England Ide, Kyoto, a town in Japan Greek mythology Ida (mother of Minos), daughter of Corybas, the wife of Lycastus king of Crete, and the mother of the "second" king
microcontrollers. Visual programming is also responsible for the power of distributed programming (cf. LabVIEW and EICASLAB software). An early visual programming system, Max, was modeled after analog synthesizer design and has been used to develop real-time music performance software since the 1980s. Another early example was Prograph, a dataflow-based system originally developed for the Macintosh. The graphical programming environment "Grape" is used to program qfix robot kits. This approach is also used in specialist software such as Openlab, where the end-users want the flexibility of a full programming language, without the traditional learning curve associated with one. Language support Some IDEs support multiple languages, such as GNU Emacs based on C and Emacs Lisp; IntelliJ IDEA, Eclipse, MyEclipse or NetBeans, based on Java; MonoDevelop, based on C#; or PlayCode. Support for alternative languages is often provided by plugins, allowing them to be installed on the same IDE at the same time. For example, Flycheck is a modern on-the-fly syntax checking extension for GNU Emacs 24 with support for 39 languages. Eclipse, and Netbeans have plugins for C/C++, Ada, GNAT (for example AdaGIDE), Perl, Python, Ruby, and PHP, which are selected between automatically based on file extension, environment or project settings. Attitudes across different computing platforms Unix programmers can combine command-line POSIX tools into a complete development environment, capable of developing large programs such as the Linux kernel and its environment. In this sense, the entire Unix system functions as an IDE. The free software GNU tools (GNU Compiler Collection (GCC), GNU Debugger (GDB), and GNU make) are available on many platforms, including Windows. The pervasive Unix philosophy of "everything is a text stream" enables developers who favor command-line oriented tools to use editors with support for many of the standard Unix and GNU build tools, building an IDE with programs like Emacs or Vim. Data Display Debugger is intended to be an advanced graphical front-end for many text-based debugger standard tools. Some programmers prefer managing makefiles and their derivatives to the similar code building tools included in a full IDE. For example, most contributors to the PostgreSQL database use make and GDB directly to develop new features. Even when building PostgreSQL for Microsoft Windows using Visual C++, Perl scripts are used as a replacement for make rather than relying on any IDE features. Some Linux IDEs such as Geany attempt to provide a graphical front end to traditional build operations. On the various Microsoft Windows platforms, command-line tools for development are seldom used. Accordingly, there are many commercial and non-commercial products. However, each has a different design commonly creating incompatibilities. Most major compiler vendors for Windows still provide free copies of their command-line tools, including Microsoft (Visual C++, Platform SDK, .NET Framework SDK, nmake utility). IDEs have always been popular on the Apple Macintosh's classic Mac OS and macOS, dating back to Macintosh Programmer's Workshop, Turbo Pascal, THINK Pascal and THINK C environments of the mid-1980s. Currently macOS programmers can choose between native IDEs like Xcode and open-source tools such as Eclipse and Netbeans. ActiveState Komodo is a proprietary multilanguage IDE supported on macOS. Artificial intelligence Some features of IDEs can benefit from advances in AI. In particular, one can collect information from IDE actions across developers in order to augment IDE features. For instance, a data-driven approach to code completion results in intelligent code completion. Web integrated development environment An web
graphical programming environment "Grape" is used to program qfix robot kits. This approach is also used in specialist software such as Openlab, where the end-users want the flexibility of a full programming language, without the traditional learning curve associated with one. Language support Some IDEs support multiple languages, such as GNU Emacs based on C and Emacs Lisp; IntelliJ IDEA, Eclipse, MyEclipse or NetBeans, based on Java; MonoDevelop, based on C#; or PlayCode. Support for alternative languages is often provided by plugins, allowing them to be installed on the same IDE at the same time. For example, Flycheck is a modern on-the-fly syntax checking extension for GNU Emacs 24 with support for 39 languages. Eclipse, and Netbeans have plugins for C/C++, Ada, GNAT (for example AdaGIDE), Perl, Python, Ruby, and PHP, which are selected between automatically based on file extension, environment or project settings. Attitudes across different computing platforms Unix programmers can combine command-line POSIX tools into a complete development environment, capable of developing large programs such as the Linux kernel and its environment. In this sense, the entire Unix system functions as an IDE. The free software GNU tools (GNU Compiler Collection (GCC), GNU Debugger (GDB), and GNU make) are available on many platforms, including Windows. The pervasive Unix philosophy of "everything is a text stream" enables developers who favor command-line oriented tools to use editors with support for many of the standard Unix and GNU build tools, building an IDE with programs like Emacs or Vim. Data Display Debugger is intended to be an advanced graphical front-end for many text-based debugger standard tools. Some programmers prefer managing makefiles and their derivatives to the similar code building tools included in a full IDE. For example, most contributors to the PostgreSQL database use make and GDB directly to develop new features. Even when building PostgreSQL for Microsoft Windows using Visual C++, Perl scripts are used as a replacement for make rather than relying on any IDE features. Some Linux IDEs such as Geany attempt to provide a graphical front end to traditional build operations. On the various Microsoft Windows platforms, command-line tools for development are seldom used. Accordingly, there are many commercial and non-commercial products. However, each has a different design commonly creating incompatibilities. Most major compiler vendors for Windows still provide free copies of their command-line tools, including Microsoft (Visual C++, Platform SDK,
on 1930s Britain, with Richard depicted as a fascist plotting to usurp the throne. McKellen stars in the title role alongside an ensemble cast including Annette Bening, Robert Downey Jr., Jim Broadbent, Kristen Scott Thomas, Nigel Hawthorne and Dame Maggie Smith. As executive producer he returned his £50,000 fee to complete the filming of the final battle. In his review of the film, The Washington Post film critic Hal Hinson called McKellen's performance a "lethally flamboyant incarnation" and said his "florid mastery ... dominates everything". Film critic Roger Ebert of the Chicago Sun-Times praised McKellen's adaptation and his performance in his four star review writing, "McKellen has a deep sympathy for the playwright...Here he brings to Shakespeare's most tortured villain a malevolence we are moved to pity. No man should be so evil, and know it. Hitler and others were more evil, but denied out to themselves. There is no escape for Richard. He is one of the first self-aware characters in the theater, and for that distinction he must pay the price." His performance in the title role garnered BAFTA and Golden Globe nominations for Best Actor and won the European Film Award for Best Actor. His screenplay was nominated for the BAFTA Award for Best Adapted Screenplay. That same year, he appeared in the historical drama Restoration (1995) also starring Downey Jr., as well as Meg Ryan, Hugh Grant, and David Thewlis. He also appeared in the British romantic comedy Jack and Sarah (1995) starring Richard E. Grant, Samantha Mathis, and Dame Judi Dench. In 1998, he appeared in the modestly acclaimed psychological thriller Apt Pupil, which was directed by Bryan Singer and based on a story by Stephen King. McKellen portrayed a fugitive Nazi officer living under a false name in the US who is befriended by a curious teenager (Brad Renfro) who threatens to expose him unless he tells his story in detail. That same year, he played James Whale, the director of Frankenstein in the Bill Condon directed period drama Gods and Monsters, a role for which he was subsequently nominated for the Academy Award for Best Actor, losing it to Roberto Benigni in Life is Beautiful (1998). 2000–2007: The Lord of the Rings and X-Men In 1999, McKellen was cast, again under the direction of Bryan Singer, to play the comic book supervillain Magneto in the 2000 film X-Men and its sequels X2: X-Men United (2003) and X-Men: The Last Stand (2006). He later reprised his role of Magneto in 2014's X-Men: Days of Future Past, sharing the role with Michael Fassbender, who played a younger version of the character in 2011's X-Men: First Class. While filming the first X-Men film in 1999, McKellen was cast as the wizard Gandalf in Peter Jackson's film trilogy adaptation of The Lord of the Rings (consisting of The Fellowship of the Ring, The Two Towers, and The Return of the King), released between 2001 and 2003. He received honours from the Screen Actors Guild for Best Supporting Actor in a Motion Picture for his work in The Fellowship of the Ring and was nominated for the Academy Award for Best Supporting Actor for the same role. He provided the voice of Gandalf for several video game adaptations of the Lord of the Rings films. McKellen has appeared in limited release films, such as Emile (which was shot in three weeks following the X2 shoot), Neverwas and Asylum. In 2006, He appeared as Sir Leigh Teabing in The Da Vinci Code opposite Tom Hanks as Robert Langdon. During a 17 May 2006 interview on The Today Show with the Da Vinci Code cast and director Ron Howard, Matt Lauer posed a question to the group about how they would have felt if the film had borne a prominent disclaimer that it is a work of fiction, as some religious groups wanted. McKellen responded, "I've often thought the Bible should have a disclaimer in the front saying 'This is fiction.' I mean, walking on water? It takes... an act of faith. And I have faith in this movie—not that it's true, not that it's factual, but that it's a jolly good story." He continued, "And I think audiences are clever enough and bright enough to separate out fact and fiction, and discuss the thing when they've seen it". In 2007, McKellen narrated the romantic fantasy adventure film Stardust starring Charlie Cox and Claire Danes, which was a critical and financial success. That same year, he lent his voice to the armored bear Iorek Byrnison in the Chris Weitz-directed fantasy film The Golden Compass based on the acclaimed Philip Pullman novel Northern Lights and starred Nicole Kidman and Daniel Craig. The film received mixed reviews but was a financial success. 2012–2019: The Hobbit, X-Men and other roles McKellen reprised the role of Gandalf on screen in Peter Jackson's three-part film adaptation of The Hobbit starting with The Hobbit: An Unexpected Journey (2012), followed by The Hobbit: The Desolation of Smaug (2013), and finally The Hobbit: The Battle of the Five Armies (2014). Despite the series receiving mixed reviews, it emerged as a financial success. McKellen also reprised his dual role as Erik Lehnsherr and Magneto in James Mangold's The Wolverine (2013), and Singer's X-Men: Days of Future Past (2014). In 2015, McKellen reunited with director Bill Condon playing an elderly Sherlock Holmes in the mystery film Mr. Holmes alongside Laura Linney. In the film based on the novel A Slight Trick of the Mind (2005), Holmes now 93, struggles to recall the details of his final case because his mind is slowly deteriorating. The film premiered at the 65th Berlin International Film Festival with McKellen receiving acclaim for his performance. Rolling Stone film critic Peter Travers praised his performance writing, "Don't think you can take another Hollywood version of Sherlock Holmes? Snap out of it. Apologies to Robert Downey Jr. and Benedict Cumberbatch, but what Ian McKellen does with Arthur Conan Doyle's fictional detective in Mr. Holmes is nothing short of magnificent...Director Bill Condon, who teamed superbly with McKellen on the Oscar-winning Gods and Monsters, brings us a riveting character study of a lion not going gentle into winter." In 2017, McKellen portrayed in a supporting role as Cogsworth (originally voiced by David Ogden Stiers in the 1991 animated film) in the live-action adaptation of Disney's Beauty and the Beast, directed by Bill Condon (which marked the third collaboration between Condon and McKellen, after Gods and Monsters and Mr. Holmes) and co-starred alongside Emma Watson and Dan Stevens. The film was released to positive reviews and grossed $1.2billion worldwide, making it the highest-grossing live-action musical film, the second highest-grossing film of 2017, and the 17th highest-grossing film of all time. The following year, he appeared in Kenneth Branagh's historical drama All is True (2018) portraying Henry Wriothesley, 3rd Earl of Southampton, opposite Branagh and Judi Dench. In 2019, he reunited with Condon for a fourth time in the mystery thriller The Good Liar opposite Helen Mirren, who received praise for their onscreen chemistry. That same year, he appeared as Gus the Theatre Cat in the ill fated movie musical adaptation of Cats directed by Tom Hooper. The film featured performances from Jennifer Hudson, James Corden, Rebel Wilson, Idris Elba, and Judi Dench. The film was widely panned for its poor visual effects, editing, performances, screenplay, and was a box office disaster. Television 1966–1981: Television debut and early roles One of McKellen's first major roles on television was as the title character in the BBC's 1966 adaptation of David Copperfield, which achieved 12 million viewers on its initial airings. After some rebroadcasting in the late 60s, the master videotapes for the serial were wiped, and only four scattered episodes (3, 8, 9 and 11) survive as telerecordings, three of which feature McKellen as adult David. McKellen had taken film roles throughout his career—beginning in 1969 with his role of George Matthews in A Touch of Love, and his first leading role was in 1980 as D. H. Lawrence in Priest of Love, but it was not until the 1990s that he became more widely recognised in this medium after several roles in blockbuster Hollywood films. 1990–1999: HBO Projects and awards success In 1993, he appeared in minor roles in the television miniseries Tales of the City, based on the novel by his friend Armistead Maupin. Later that year, McKellen appeared in the HBO television film And the Band Played On based on the acclaimed novel of the same name about the discovery of HIV. For his performance as gay rights activist Bill Kraus, McKellen received the CableACE Award for Supporting Actor in a Movie or Miniseries and was nominated for the Primetime Emmy Award for Outstanding Supporting Actor in a Miniseries or a Movie. In 1995, he appeared in the BBC television comedy film Cold Comfort Farm starring Kate Beckinsale, Rufus Sewell, and Stephen Fry. The following year he starred as Tsar Nicholas II in the HBO made for television movie Rasputin: Dark Servant of Destiny (1996) starring Alan Rickman as Rasputin. For his performance McKellen earned a Primetime Emmy Award for Outstanding Supporting Actor in a Limited Series or Movie nomination and received a Golden Globe Award for Best Supporting Actor – Series, Miniseries or Television Film win. McKellen appeared as Mr Creakle in the BBC series David Copperfield based on the Charles Dickens classic novel. The miniseries starred a pre-Harry Potter Daniel Radcliffe, Bob Hoskins, and Dame Maggie Smith. 2003–2017: Dramas, Guest roles and Sitcom On 16 March 2002, he hosted Saturday Night Live. In 2003, McKellen made a guest appearance as himself on the American cartoon show The Simpsons in a special British-themed episode entitled "The Regina Monologues", along with the then UK Prime Minister Tony Blair and author J. K. Rowling. In April and May 2005, he played the role of Mel Hutchwright in Granada Television's long running British soap opera, Coronation Street, fulfilling a lifelong ambition. He narrated Richard Bell's film Eighteen as a grandfather who leaves his World War II memoirs on audio-cassette for his teenage grandson. McKellen appeared in the 2006 BBC series of Ricky Gervais' comedy series Extras, where he played himself directing Gervais' character Andy Millman in a play about gay lovers. McKellen received a 2007 Primetime Emmy Award for Outstanding Guest Actor – Comedy Series nomination for his performance. In 2009 he portrayed Number Two in The Prisoner, a remake of the 1967 cult series The Prisoner. In November 2013, McKellen appeared in the Doctor Who 50th anniversary comedy homage The Five(ish) Doctors Reboot. From 2013 to 2016 McKellen co-starred in the ITV sitcom Vicious as Freddie Thornhill, alongside Derek Jacobi. The series revolves around an elderly gay couple who have been together for 50 years. The show’s original title was “Vicious Old Queens.” There are ongoing jokes about McKellen’s career as a relatively unsuccessful character actor who owns a tux because he stole it after doing a guest spot on “Downton Abbey” and that he holds the title of “10th Most Popular ‘Doctor Who’ Villain.” Liz Shannon Miller of IndieWire noted while the concept seemed, "weird as hell", that "Once you come to accept McKellen and Jacobi in a multi-camera format, there is a lot to respect about their performances; specifically, the way that those decades of classical training adapt themselves to the sitcom world. Much has been written before about how the tradition of the multi-cam, filmed in front of a studio audience, relates to theater, and McKellen and Jacobi know how to play to a live crowd." In October 2015, McKellen appeared as Norman to Anthony Hopkins' Sir in a BBC Two production of Ronald Harwood's The Dresser, alongside Edward Fox, Vanessa Kirby, and Emily Watson. Television critic Tim Goodman of The Hollywood Reporter praised the film and the central performances writing, "there’s no escaping that Hopkins and McKellen are the central figures here, giving wonderfully nuanced performances, onscreen together for their first time in their acclaimed careers." For his performance McKellen received a British Academy Television Award nomination for his performance. In 2017, McKellen appeared in the documentary McKellen: Playing the Part, directed by director Joe Stephenson. The documentary explores McKellen's life and career as an actor. Personal life McKellen and his first partner, Brian Taylor, a history teacher from Bolton, began their relationship in 1964. Their relationship lasted for eight years, ending in 1972. They lived in London, where McKellen continued to pursue his career as an actor. In 1978 he met his second partner, Sean Mathias, at the Edinburgh Festival. This relationship lasted until 1988, and according to Mathias it was tempestuous, with conflicts over McKellen's success in acting versus Mathias's somewhat less-successful career. The two remained friends, with Mathias later directing McKellen in Waiting for Godot at the Theatre Royal Haymarket in 2009. The pair entered into a business partnership with Evgeny Lebedev, purchasing the lease of The Grapes public house in Narrow Street. As of 2005, McKellen had been living in Narrow Street, Limehouse for more than 25 years, more than a decade of which had been spent in a five-story Victorian conversion. McKellen is an atheist. In the late 1980s, he lost his appetite for every kind of meat but fish, and has since followed a mainly pescetarian diet. In 2001, Ian McKellen received the Artist Citizen of the World Award (France). McKellen has a tattoo of the Elvish
figures here, giving wonderfully nuanced performances, onscreen together for their first time in their acclaimed careers." For his performance McKellen received a British Academy Television Award nomination for his performance. In 2017, McKellen appeared in the documentary McKellen: Playing the Part, directed by director Joe Stephenson. The documentary explores McKellen's life and career as an actor. Personal life McKellen and his first partner, Brian Taylor, a history teacher from Bolton, began their relationship in 1964. Their relationship lasted for eight years, ending in 1972. They lived in London, where McKellen continued to pursue his career as an actor. In 1978 he met his second partner, Sean Mathias, at the Edinburgh Festival. This relationship lasted until 1988, and according to Mathias it was tempestuous, with conflicts over McKellen's success in acting versus Mathias's somewhat less-successful career. The two remained friends, with Mathias later directing McKellen in Waiting for Godot at the Theatre Royal Haymarket in 2009. The pair entered into a business partnership with Evgeny Lebedev, purchasing the lease of The Grapes public house in Narrow Street. As of 2005, McKellen had been living in Narrow Street, Limehouse for more than 25 years, more than a decade of which had been spent in a five-story Victorian conversion. McKellen is an atheist. In the late 1980s, he lost his appetite for every kind of meat but fish, and has since followed a mainly pescetarian diet. In 2001, Ian McKellen received the Artist Citizen of the World Award (France). McKellen has a tattoo of the Elvish number nine, written using J. R. R. Tolkien's constructed script of Tengwar, on his shoulder in reference to his involvement in the Lord of the Rings and the fact that his character was one of the original nine companions of the Fellowship of the Ring. The other actors of "The Fellowship" (Elijah Wood, Sean Astin, Orlando Bloom, Billy Boyd, Sean Bean, Dominic Monaghan and Viggo Mortensen) have the same tattoo. John Rhys-Davies, whose character was also one of the original nine companions, did not get the tattoo, his stunt double was offered it instead. McKellen was diagnosed with prostate cancer in 2006. In 2012, he stated on his blog that "There is no cause for alarm. I am examined regularly and the cancer is contained. I've not needed any treatment." McKellen became an ordained minister of the Universal Life Church in early 2013 in order to preside over the marriage of his friend and X-Men co-star Patrick Stewart to the singer Sunny Ozell. McKellen was awarded an honorary Doctorate of Letters by Cambridge University on 18 June 2014. He was made a Freeman of the City of London on Thursday 30 October 2014. The ceremony took place at Guildhall in London. He was nominated by London's Lord Mayor Fiona Woolf, who said he was an "exceptional actor" and "tireless campaigner for equality". He is also an Emeritus Fellow of St Catherine's College, Oxford. Activism LGBT rights While McKellen had made his sexual orientation known to fellow actors early on in his stage career, it was not until 1988 that he came out to the general public, in a programme on BBC Radio. The context that prompted McKellen's decision, overriding any concerns about a possible negative effect on his career, was that the controversial Section 28 of the Local Government Bill, known simply as Section 28, was then under consideration in the British Parliament. Section 28 proposed prohibiting local authorities from promoting homosexuality "... as a kind of pretended family relationship". McKellen became active in fighting the proposed law, and, during a BBC Radio 3 programme where he debated Section 28 with the conservative journalist Peregrine Worsthorne, came out as gay. McKellen has stated that he was influenced in his decision by the advice and support of his friends, among them noted gay author Armistead Maupin. In a 1998 interview that discusses the 29th anniversary of the Stonewall riots, McKellen commented, I have many regrets about not having come out earlier, but one of them might be that I didn't engage myself in the politicking. He has said of this period: My own participating in that campaign was a focus for people [to] take comfort that if Ian McKellen was on board for this, perhaps it would be all right for other people to be as well, gay and straight. Section 28 was, however, enacted and remained on the statute books until 2000 in Scotland and 2003 in England and Wales. Section 28 never applied in Northern Ireland. In 2003, during an appearance on Have I Got News For You, McKellen claimed when he visited Michael Howard, then Environment Secretary (responsible for local government), in 1988 to lobby against Section 28, Howard refused to change his position but did ask him to leave an autograph for his children. McKellen agreed, but wrote, "Fuck off, I'm gay." McKellen described Howard's junior ministers, Conservatives David Wilshire and Jill Knight, who were the architects of Section 28, as the 'ugly sisters' of a political pantomime. McKellen has continued to be very active in LGBT rights efforts. In a statement on his website regarding his activism, the actor commented: McKellen is a co-founder of Stonewall, an LGBT rights lobby group in the United Kingdom, named after the Stonewall riots. McKellen is also patron of LGBT History Month, Pride London, Oxford Pride, GAY-GLOS, LGBT Foundation and FFLAG where he appears in their video "Parents Talking". In 1994, at the closing ceremony of the Gay Games, he briefly took the stage to address the crowd, saying, "I'm Sir Ian McKellen, but you can call me Serena": This nickname, given to him by Stephen Fry, had been circulating within the gay community since McKellen's knighthood was conferred. In 2002, he was the Celebrity Grand Marshal of the San Francisco Pride Parade and he attended the Academy Awards with his then-boyfriend, New Zealander Nick Cuthell. In 2006, McKellen spoke at the pre-launch of the 2007 LGBT History Month in the UK, lending his support to the organisation and its founder, Sue Sanders. In 2007, he became a patron of The Albert Kennedy Trust, an organisation that provides support to young, homeless and troubled LGBT people. In 2006, he became a patron of Oxford Pride, stating:I send my love to all members of Oxford Pride, their sponsors and supporters, of which I am proud to be one... Onlookers can be impressed by our confidence and determination to be ourselves and gay people, of whatever age, can be comforted by the occasion to take the first steps towards coming out and leaving the closet forever behind. McKellen has taken his activism internationally, and caused a major stir in Singapore, where he was invited to do an interview on a morning show and shocked the interviewer by asking if they could recommend him a gay bar; the programme immediately ended. In December 2008, he was named in [[Out (magazine)|Out]] annual Out 100 list. In 2010, McKellen extended his support for Liverpool's Homotopia festival in which a group of gay and lesbian Merseyside teenagers helped to produce an anti-homophobia campaign pack for schools and youth centres across the city. In May 2011, he called Sergey Sobyanin, Moscow's mayor, a "coward" for refusing to allow gay parades in the city. In 2014, he was named in the top 10 on the World Pride Power list. Charity work In April 2010, along with actors Brian Cox and Eleanor Bron, McKellen appeared in a series of TV advertisements to support Age UK, the charity recently formed from the merger of Age Concern and Help the Aged. All three actors gave their time free of charge. A cricket fan since childhood, McKellen umpired in March 2011 for a charity cricket match in New Zealand to support earthquake victims of the February 2011 Christchurch earthquake. McKellen is an honorary board member for the New York- and Washington, D.C.-based organization Only Make Believe. Only Make Believe creates and performs interactive plays in children's hospitals and care facilities. He was honoured by the organisation in 2012 and hosted their annual Make Believe on Broadway Gala in November 2013. He garnered publicity for the organisation by stripping down to his Lord of the Rings underwear on stage. McKellen also has a history of supporting individual theatres. While in New Zealand filming The Hobbit in 2012, he announced a special New Zealand tour "Shakespeare, Tolkien and You!", with proceeds going to help save the Isaac Theatre Royal, which suffered extensive damage during the 2011 Christchurch earthquake. McKellen said he opted to help save the building as it was the last theatre he played in New Zealand (Waiting for Godot in 2010) and the locals' love for it made it a place worth supporting. In July 2017, he performed a new one-man show for a week at Park Theatre (London), donating the proceeds to the theatre. Together with a number of his Lord of the Rings co-stars (plus writer Philippa Boyens and director Peter Jackson), on 1 June 2020 McKellen joined Josh Gad's YouTube series Reunited Apart which reunites the cast of popular movies through video-conferencing, and promotes donations to non-profit charities. Other work A friend of Ian Charleson and an admirer of his work, McKellen contributed an entire chapter to For Ian Charleson: A Tribute. A recording of McKellen's voice is heard before performances at the Royal Festival Hall, reminding patrons to ensure their mobile phones and watch alarms are switched off and to keep coughing to a minimum. He also took part in the 2012 Summer Paralympics opening ceremony in London as Prospero from Shakespeare's The Tempest. Acting credits Accolades and honours McKellen has received two Academy Award nominations for his performances in Gods and Monsters (1999), and The Lord of the Rings: The Fellowship of the Ring (2001). He has also received 5 Primetime Emmy Award nominations. McKellen has received two Tony Award nominations winning for Best Actor in a Play for his performance in Amadeus in 1981. He has also received 12 Laurence Olivier Awards nominations winning 6 awards for his performances in Pillars of the Community (1977), The Alchemist (1978), Bent (1979), Wild Honey (1984), Richard III (1991), and Ian McKellen on Stage: With Tolkien, Shakespeare, Others and YOU (2020). He has also received various honorary awards including Pride International Film Festival's Lifetime Achievement & Distinction Award in 2004, Olivier Awards's Society's Special Award in 2006. He also received Evening Standard Awards The Lebedev Special Award in 2009. The following year he received an Empire Award's Empire Icon Award In 2017 he received the Honorary Award from the Istanbul International Film Festival. See also List of British Academy Award nominees and winners List of actors with Academy Award nominations List of actors with two or more Academy Award nominations in acting categories List of LGBTQ Academy Award winners and nominees References Sources External links The papers of Sir Ian McKellen, actor are held by the Victoria and Albert Museum Theatre and Performance Department. Biography of Sir Ian McKellen, CH, CBE, Debrett's 1939 births Living people 20th-century English male actors 21st-century English male actors 2012 Summer Olympics cultural ambassadors Actors awarded knighthoods Alumni of St Catharine's College, Cambridge Annie Award winners Audiobook narrators Back Stage West Garland Award recipients Best Supporting Actor Golden Globe (television) winners Commanders of the Order of the British Empire Critics' Circle Theatre Award winners Drama Desk Award winners Honorary Golden Bear recipients English atheists English male film actors English male radio actors English male Shakespearean actors English male stage actors English male television actors English male video game actors English male voice actors English people of Scottish descent English people of Ulster-Scottish descent European Film Award for Best Actor winners Fellows of St Catherine's College, Oxford Former Protestants English gay actors Independent Spirit Award for Best Male Lead winners Knights Bachelor Laurence Olivier Award winners
software framework for new programmers to develop games more easily and quickly. It also allows other programmers to more easily review and continue another's project. Under the supervision of David Rolfe at APh, and with graphics from Mattel artist Dave James, APh was able to quickly create the Intellivision launch game library using mostly summer students. The drawback is that to be flexible and handle many different types of games, the Exec runs less efficiently than a dedicated program. Intellivision games that leverage the Exec run at a 20 Hz frame rate instead of the 60 Hz frame rate for which the Intellivision was designed. Using the Exec framework is optional, but almost all Intellivision games released by Mattel Electronics use it, and thus run at 20 Hz. The limited ROM space in the early years of Intellivision game releases also means there is no space for a computer player, so many early multiplayer games require two human players. Initially, all Intellivision games were programmed by an outside firm, APh Technological Consulting, with 19 cartridges produced before Christmas 1980. Once the Intellivision project became successful, software development was brought in-house. Mattel formed its own software development group and began hiring programmers. The original five members of that Intellivision team were Mike Minkoff, Rick Levine, John Sohl, Don Daglow, and manager Gabriel Baum. Levine and Minkoff, a long-time Mattel Toys veteran, both transferred from the hand-held Mattel game engineering team. During 1981, Mattel hired programmers as fast as possible. Early in 1982 Mattel Electronics relocated from Mattel headquarters to an unused industrial building. Offices were renovated as new staff moved in. To keep these programmers from being hired away by rival Atari, their identities and work location was kept a closely guarded secret. In public, the programmers were referred to collectively as the Blue Sky Rangers. Most of the early games are based on traditional real-world concepts such as sports, with an emphasis on realism and depth of play within the technology of the time. The Intellivision was not marketed as a toy; as such, games such as Sea Battle and B-17 Bomber are not made in the pick-up-and-play format like arcade games. Reading the instructions is often a prerequisite. Every cartridge produced by Mattel Electronics includes two plastic controller overlays to help navigate the 12-button keypad, although not every game uses it. Game series, or networks, are Major League Sports, Action, Strategy, Gaming, Children's Learning, and later Space Action and Arcade. The network concept was dropped in 1983, as was the convenient gate-fold style box for storing the cartridge, instructions, and overlays. Starting in 1981 programmers looking for credit and royalties on sales began leaving both APh and Mattel Electronics to create Intellivision cartridges for third-party publishers. They helped form Imagic in 1981, and in 1982 others joined Activision and Atari. Cheshire Engineering was formed by a few senior APh programmers including David Rolfe, author of the Exec, and Tom Loughry, creator of one of the most popular Intellivision games Advanced Dungeons and Dragons. Cheshire created Intellivision games for Activision. Third-party developers Activision, Imagic, and Coleco started producing Intellivision cartridges in 1982, and Atari, Parker Brothers, Sega, and Interphase followed in 1983. The third-party developers, not having legal access to Exec knowledge, often bypassed the Exec framework to create smooth 30 Hz and 60 Hz Intellivision games such as The Dreadnaught Factor. Cheaper ROM prices also allowed for progressively larger games as 8K, 12K, and 16K cartridges became common. The first Mattel Electronics Intellivision game to run at 60 Hz is Masters of the Universe in 1983. Marketing dubbed the term "Super Graphics" on the game's packaging and marketing. Mattel Electronics had a competitive advantage in its team of experienced and talented programmers. As competitors often depended on licensing well known trademarks to sell video games, Mattel focused on original ideas. Don Daglow was a key early programmer at Mattel and became director of Intellivision game development. Daglow created Utopia, a precursor to the sim genre and, with Eddie Dombrower, the ground breaking sports simulation World Series Major League Baseball. Daglow was also involved with the popular Intellivision games Tron Deadly Discs and Shark! Shark!. After Mattel Electronics closed in 1984, its programmers continued to make significant contributions to the videogame industry. Don Daglow and Eddie Dombrower went on to Electronic Arts to create Earl Weaver Baseball, and Don Daglow founded Stormfront Studios. Bill Fisher, Steve Roney, and Mike Breen founded Quicksilver Software, and David Warhol founded Realtime Associates. Keyboard Component The Intellivision was designed as a modular home computer, so from the beginning, its packaging, promotional materials, and television commercials, promised the addition of a forthcoming accessory called the Keyboard Component. The Master Component was packaged as a stand-alone video game system to which the Keyboard Component could be added, providing the computer keyboard and tape drive. Not meant to be a hobbyist or business computer, the Intellivision home computer was meant to run pre-programmed software and bring "data flow" (Videotex) into the home. The Keyboard Component adds an 8-bit 6502 processor, making the Intellivision a dual-processor computer. It has 16K 10-bit shared RAM that can load and execute both Intellivision CP1610 and 6502 program code from tape, which is a large amount as typical contemporary cartridges are 4K. The cassettes have two tracks of digital data and two tracks of analog audio, completely controlled by the computer. Two tracks are read-only for the software, and two tracks are for user data. The tape drive is block addressed with high speed indexing. A high resolution 40x24 monochrome text display can overlay regular Intellivision graphics. There is a microphone port and two expansion ports for peripherals and RAM. The Microsoft BASIC programming cartridge uses one of these ports. Expanded memory cartridges support 1000 pages of 8KB each. A third pass-through cartridge port is for regular Intellivision cartridges. It uses the Intellivision's power supply. A 40-column thermal printer was available, and a telephone modem was planned along with voice synthesis and voice recognition. David Rolfe of APh wrote a control program for the Keyboard Component called PicSe (Picture Sequencer) specifically for the development of multimedia applications. PicSe synchronizes the graphics and analog audio while concurrently saving or loading tape data. Productivity software for home finances, personal improvement, and self education were planned. Subject experts were consulted and their voices recorded and used in the software. Three applications using the PicSe system were released on cassette tape: Conversational French, Jack Lalanne's Physical Conditioning, and Spelling Challenge. Programs written in BASIC do not have access to Intellivision graphics and were sold at a lower price. Five BASIC applications were released on tape: Family Budgeting, Geography Challenge, and Crosswords I, II, and III. The Keyboard Component is an ambitious piece of engineering for its time, and it was repeatedly delayed as the engineers tried to reduce manufacturing costs. In August 1979 the Intellivision Keyboard Component, in breadboard form, was successfully entered into the Sears Market Research Program. In December 1979, Mattel had production design working units but decided on a significant internal design change to consolidate circuit boards. In September 1980, it was test marketed in Fresno, California but without software, except for the BASIC programming cartridge. In the late 1981, design changes were finally implemented and the Keyboard Component was released at in Seattle and New Orleans only. Customers who complained in writing could buy a Keyboard Component directly from Mattel. The printer, a rebadged Alphacom Sprinter 40, was only available by mail order. The keyboard component's repeated delays became so notorious around Mattel headquarters that comedian Jay Leno, when performing at Mattel's 1981 Christmas party, got his biggest response of the evening with the line: "You know what the three big lies are, don't you? 'The check is in the mail', 'I'll still respect you in the morning', and 'The keyboard will be out in spring.'" Complaints from consumers who had chosen to buy the Intellivision specifically on the promise of a "coming soon" personal-computer upgrade, eventually caught the attention of the Federal Trade Commission (FTC), who started investigating Mattel Electronics for fraud and false advertising. In mid-1982, the FTC ordered Mattel to pay a monthly fine (said to be $10,000) until the promised computer upgrade was in full retail distribution. To end the ongoing fines, the Keyboard Component was officially canceled in August 1982 and the Entertainment Computer System (ECS) module offered in its place. Part of Mattel's settlement with the FTC involved offering to buy back all of the existing Keyboard Components from customers. Mattel provided a full refund, but customers without a receipt received $550 for the Keyboard Component, $60 for the BASIC cartridge, and $30 for each cassette software. Any customer who opted to keep the products was required to sign a waiver with the understanding that no more software would be written for the system and absolving Mattel of any future responsibility for technical support. They were also compensated with $1000 worth of Mattel Electronics products. Though approximately 4,000 Keyboard Components were manufactured, it is not clear how many of them were sold and they are rare. Many of the units were dismantled for parts. Others were used by Mattel Electronics programmers as part of their development system. A Keyboard Component could be interfaced with an Intellivision development system in place of the hand-built Magus board RAM cartridge. Data transfer to the Keyboard Component RAM is done serially and is slower than the Magus board parallel interface. The keyboard component debacle was ranked as No. 11 on GameSpys "25 dumbest moments in gaming". Entertainment Computer System (ECS) In mid-1981, Mattel's upper management was becoming concerned that the keyboard component division would never be able to produce a sellable product. As a result, Mattel Electronics set up a competing internal engineering team whose stated mission was to produce an inexpensive add-on called the "Basic Development System", or BDS, to be sold as an educational device to introduce kids to the concepts of computer programming. The rival BDS engineering group, who had to keep the project's real purpose a secret among themselves, fearing that if David Chandler, the head of the keyboard component team, found out about it he would use his influence to end the project, eventually came up with a much less expensive alternative. Originally dubbed the "Lucky", from LUCKI: Low User-Cost Keyboard Interface, it lacked many of the sophisticated features envisioned for the original keyboard component. Gone, for example, was the 16K (8MB max) of RAM, the secondary CPU, and high resolution text; instead, the ECS offered a mere 2KB RAM expansion, a built-in BASIC that was marginally functional, plus a much-simplified cassette and printer interface. Ultimately, this fulfilled the original promises of turning the Intellivision into a computer, making it possible to write programs and store them to tape, and interfacing with a printer well enough to allow Mattel to claim that they had delivered the promised computer upgrade and stop the FTC's mounting fines. It even offered, via an additional sound chip (AY-3-8917) inside the ECS module and an optional 49-key music synthesizer keyboard, the possibility of turning the Intellivision into a multi-voice synthesizer which could be used to play or learn music. In the fall of 1982, the LUCKI, now renamed the Entertainment Computer System (ECS), was presented at the annual sales meeting, officially ending the ill-fated keyboard component project. A new advertising campaign was aired in time for the 1982 Christmas season, and the ECS itself was shown to the public at the January 1983
software, and the ECS received very little in terms of furthering the marketing push. Further hardware developments, including a planned Program Expander that would have added another 16K of RAM and a more intricate, fully featured Extended-BASIC to the system, were halted. In the end, six games were released for the ECS; a few more were completed but not released. The ECS also offered four player game-play with the optional addition of two extra hand controllers. Four player games were in development when Mattel Electronics closed in 1984. World Cup Soccer was later completed and released in 1985 by Dextel in Europe and then INTV Corporation in North America. The documentation does not mention it but when the ECS Computer Adapter is used, World Cup Soccer can be played with one to four players, or two players cooperatively against the computer. Intellivoice In 1982 Mattel introduced the Intellivoice Voice Synthesis Module, a speech synthesizer for compatible cartridges. The Intellivoice is novel in two respects: human sounding male and female voices with distinct accents, and the speech-supporting games were designed with speech being an integral part of the game-play. Like the Intellivision chipset, the Intellivoice chipset was developed by General Instrument. The SP0256-012 orator chip has 2KB ROM inside, and is used to store the speech for numerical digits, some common words, and the phrase "Mattel Electronics presents". Speech can also be processed from the Intellivoice's SP650 buffer chip, stored and loaded from cartridge memory. That buffer chip has its own I/O and the Intellivoice has a 30-pin expansion port under a removable top plate. Mattel Electronics planned to use that connector for wireless hand controllers. Mattel Electronics built a state of the art voice processing lab to produce the phrases used in Intellivoice games. However, the amount of speech that could be compressed into an 8K or 12K cartridge and still leave room for a game was limited. Intellivoice cartridges Space Spartans and B-17 Bomber did sell about 300,000 copies each, priced a few dollars more than regular Intellivision cartridges. However, at $79 the Intellivoice did not sell as well as Mattel expected, and Intellivoices were later offered free with the purchase of a Master Component. In August 1983 the Intellivoice system was quietly phased out. A children's title called Magic Carousel, and foreign language versions of Space Spartans were completed but shelved. Additional games Woody Woodpecker and Space Shuttle went unfinished with the voice recordings unused. Four Intellivoice games were released: Space Spartans, B-17 Bomber, Bomb Squad, and Tron: Solar Sailer. A fifth game, Intellivision World Series Major League Baseball, developed as part of the Entertainment Computer System series, also supports the Intellivoice if both the ECS and Intellivoice are connected concurrently. Unlike the Intellivoice-specific games, however, World Series Major League Baseball is also playable without the Intellivoice module (but not without the ECS). Intellivision II In the spring of 1983, Mattel introduced the Intellivision II, a cheaper, more compact redesign of the original, that was designed to be less expensive to manufacture and service, with updated styling. It also had longer controller cords. The Intellivision II was initially released without a pack-in game but was later packaged with BurgerTime in the United States and Lock'N'Chase in Canada. In 1984 the Digiplay Intellivision II was introduced in Brazil. Brazil was the only country outside North America to have the redesigned Intellivision II. Using an external AC Adapter (16.2VAC), consolidating some ICs, and taking advantage of relaxed FCC emission standards, the Intellivision II has a significantly smaller footprint than the original. The controllers, now detachable, have a different feel, with plastic rather than rubber side buttons and a flat membrane keypad. Users of the original Intellivision missed the ability to find keypad buttons by the tactile feel of the original controller bubble keypad. One functional difference was the addition of a video input to the cartridge port, added specifically to support the System Changer, an accessory also released in 1983 by Mattel that played Atari 2600 cartridges through the Intellivision. The Intellivision hand controllers could be used to play Atari 2600 games. The System Changer also had two controller ports compatible with Atari joysticks. The original Intellivision required a hardware modification, a service provided by Mattel, to work with the System Changer. Otherwise the Intellivision II was promoted to be compatible with the original. It was discovered that a few Coleco Intellivision games did not work on the Intellivision II. Mattel secretly changed the Exec internal ROM program in an attempt to lock out third party games. A few of Coleco's early games were affected but the 3rd party developers quickly figured out how to get around it. Mattel's own Electric Company Word Fun, however, will not run on the Intellivision II due to this change. In an unrelated issue but also due to Exec changes, Super Pro Football experiences a minor glitch where the quarterback does not appear until after the ball is hiked. There were also some minor changes to the sound chip (AY-3-8914A/AY-3-8916) affecting sound effects in some games. Programmers at Mattel discovered the audio differences and avoided the problem in future games. Decade As early as 1981 Dave Chandler's group began designing what would have been Mattel's next generation console, codenamed Decade and now referred to as the Intellivision IV. It would have been based on the 32-bit MC68000 processor and a 16-bit custom designed advanced graphic interface chip. Specifications called for dual display support, 240x192 bitmap resolution, 16 programmable 12-bit colors (4096 colors), antialiasing, 40x24 tiled graphics modes, four colors per tile (16 with shading), text layer and independent scrolling, 16 multicolored 16x16 sprites per scan-line, 32 level hardware sprite scaling. Line interrupts for reprogramming sprite and color registers would allow for many more sprites and colors on screen at the same time. It was intended as a machine that could lead Mattel Electronics into the 1990s, however on August 4, 1983, most hardware people at Mattel Electronics were laid off. Intellivision III In 1982, with new machines introduced by competitors, Mattel marketing wanted to bring an upgraded system to market sooner. The Intellivision III was to be an upgraded but backward-compatible system, based on a similar CP1610 processor and with an improved graphics STIC chip producing double the resolution with more sprites and colors. The Intellivision III never proceeded past the prototype stage; a new EXEC was written for it, but no games. It was cancelled in mid-1983. A Mattel document titled Target Specification Intellivision III has the following. CPU: CP1610-2 at 3.56 MHz (2x original CPU speed) separate 16-bit data bus and address bus multiplexed data/address mode for backward compatibility with existing cartridges Graphics: STIC 1B tiled graphics, 20 cards by 24 rows 2-color 16x8 pixel cards for a resolution of 320x192 4-color 8x8 pixel cards for a resolution of 160x192 40 x 24 alphanumerics 16 programmable colors color palette selectable per card 12-bit RGB definition for 4096 possible colors 8 sprites per scanline reusable on different scanlines 16 pixels wide in 1 color, 8 pixels wide in 3 colors up-to 255 lines high overlap detect of individual colors fine pixel horizontal and vertical scrolling (backward compatible) single data bus allows graphics rom/ram storage on cartridges STIC 1 backwards compatible mode RAM: 4K words, 16-bit, DRAM (upgradable to 65K words) five channel sound with improved frequency range (backward compatible) integrated Intellivoice Competition and market crash According to the company's 1982 Form 10-K, Mattel had almost 20% of the domestic video-game market. Mattel Electronics provided 25% of revenue and 50% of operating income in fiscal 1982. Although the Atari 2600 had more third-party development, Creative Computing Video & Arcade Games reported after visiting the summer 1982 Consumer Electronics Show that "the momentum is tremendous". Activision and Imagic began releasing games for the Intellivision, as did hardware rival Coleco. Mattel created "M Network" branded games for Atari's system. The company's advertisement budget increased to over $20 million for the year. In its October 1982 stockholders' report Mattel announced that Electronics had, so far that year, posted a nearly $100 million profit on nearly $500 million sales; a threefold increase over October 1981. However, the same report predicted a loss for the upcoming quarter. Hiring still continued, as did the company's optimism that the investment in software and hardware development would pay off. The M Network brand expanded to personal computers. An office in Taiwan was opened to handle Apple II programming. The original five-person Mattel game development team had grown to 110 people under new vice president Baum, while Daglow led Intellivision development and top engineer Minkoff directed all work on all other platforms. In February 1983, Mattel Electronics opened an office in the south of France to provide European input to Intellivision games and develop games for the ColecoVision. At its peak Mattel Electronics employed 1800 people. Amid the flurry of new hardware and software development, there was trouble for the Intellivision. New game systems (ColecoVision and Atari 5200) introduced in 1982 took advantage of falling RAM prices to offer graphics closer to arcade quality. In 1983, the price of home computers, particularly the Commodore 64, came down drastically to compete with video game system sales. The market became flooded with hardware and software, and retailers were ill-equipped to cope. In spring 1983, hiring at Mattel Electronics came to a halt. At the June 1983 Consumer Electronics Show in Chicago, Mattel Electronics had the opportunity to show off all their new products. The response was underwhelming. Several people in top management positions were replaced due to massive losses. On July 12, 1983, Mattel Electronics President Josh Denham was replaced with outsider Mack Morris. Morris brought in former Mattel Electronics president and marketing director Jeff Rochlis as a consultant and all projects were under review. The Intellivision III was cancelled and then all new hardware development was stopped when 660 jobs were cut on August 4. The price of the Intellivision II (which launched at $150 earlier that year) was lowered to $69, and Mattel Electronics was to be a software company. However, by October 1983, Electronics' losses were over $280 million for the year and one third of the programming staff were laid off. Another third were gone by November, and on January 20, 1984 the remaining programming staff were laid-off. The Taiwan and French offices continued a little while longer due to contract and legal obligations. On February 4, 1984, Mattel sold the Intellivision business for $20 million. In 1983, 750,000 Intellivision Master Components were sold, more than three million units from 1980 to 1983. INTV Corporation (1984–1990) Former Mattel Electronics Senior Vice President of Marketing, Terrence Valeski, understood that although losses were huge, the demand for video games increased in 1983. Valeski found investors and purchased the rights to Intellivision, the games, and inventory from Mattel. A new company, Intellivision Inc, was formed and by the end of 1984 Valeski bought out the other investors and changed the name to INTV Corporation. They continued to supply the large toy stores and sold games through direct mail order. At first they sold the existing inventory of games and Intellivision II systems. When the inventory of games sold out they produced more, but without the Mattel name or unnecessary licenses on the printed materials. To lower costs, the boxes, instructions, and overlays were produced at lower quality compared to Mattel. In France, the Mattel Electronics office found investors and became Nice Ideas in April 1984. They continued to work on Intellivision, Colecovision, and other computer games. They produced Intellivision World Cup Soccer and Championship Tennis, both released in 1985 by European publisher Dextel. In 1985, INTV Corporation introduced the INTV System III, also branded as the Intellivision Super Pro System, using the same design as the original Intellivision model but in black and silver. That same year INTV Corp introduced two new games that were completed at Mattel but not released: Thunder Castle and World Championship Baseball. With their early success INTV Corp decided to produce new games and in 1986 introduced Super Pro Football, an update of Mattel NFL Football. INTV Corp continued a relationship that Mattel had with Data East and produced all new cartridges such as Commando in 1987 and Body Slam Wrestling in 1988. Also in 1987, INTV Corp released Dig Dug, purchased from Atari where the game was completed but not released in 1984. They also got into producing next generation games with the production of Monster Truck Rally for Nintendo Entertainment System (NES) in 1991, also released as Stadium Mud Buggies for Intellivision in 1989. Licensing agreements with Nintendo and Sega required INTV Corporation to discontinue the Intellivision in 1990. INTV Corporation did publish 21 new Intellivision cartridges bringing the Intellivision library to a total of 124 cartridges plus one compilation cartridge. Tutorvision In 1989, INTV Corp and World Book Encyclopedia entered into an agreement to manufacture an educational video game system called Tutorvision. It is a modified Intellivision, the case molded in light beige with gold and blue trim. The Exec ROM expanded, system RAM increased to 1.75K, and graphics RAM increased to 2KB. That is enough graphics RAM to define unique graphic tiles for the entire screen. Games were designed by World Book, J. Hakansson Associates, and programmed by Realtime Associates. Sixteen games were in production, plus one Canadian variation. However, the cartridges and the Tutorvision were never released; instead World Book and INTV Corporation sued each other. In 1990, INTV Corporation filed for bankruptcy protection and closed in 1991. An unknown number of later Intellivision SuperPro systems have Tutorvision hardware inside. A subset of these units contain the full Tutorvision EXEC and can play Tutorvision games. Intellivision Productions (1997 to 2018) Intellivision Lives! Intellivision games became readily available again when Keith Robinson and Stephen Roney, both former Intellivision programmers at Mattel Electronics, obtained exclusive rights to the Intellivision and games in 1997. That year they formed a new company, Intellivision Productions, and made Intellivision for PC Volume 1 available as a free download. Intellivision games could be played on a modern computer for the first time. That download includes three Intellivision games and an MS-DOS Intellivision emulator that plays original game code. It was followed by Volume 2 and another three games including Deep Pockets Super Pro Pool & Billiards; a game completed in 1990 but never released until this download in 1997. In 2000 the Intellipack 3 download was available with another four Intellivision games and emulators for Windows or Macintosh. Intellivision Productions released Intellivision Lives! and Intellivision Rocks on compact disc in 1998 and 2001. These compilation CDs play the original game code through emulators for MS-DOS, Windows, and Macintosh computers. Together they have over 100 Intellivision games including never before released King of the Mountain, Takeover, Robot Rubble, League of Light, and others. Intellivision Rocks includes Intellivision games made by Activision and Imagic. Some games could not be included due to licensing, others simply used different titles to avoid trademarked names. The CDs are also a resource for development history, box art, hidden features, programmer biographies, video interviews, and original commercials. Also in 1997 Intellivision Productions announced they would sell development tools allowing customers to program their own Intellivision games. They were to provide documentation, PC compatible cross-assemblers, and the Magus II PC Intellivision cartridge interface. Unfortunately, the project was cancelled but they did provide copies of "Your Friend the EXEC", the programmers guide to the Intellivision Executive control software. By 2000 Intellivision hobbyists ultimately created their own development tools, including Intellivision memory cartridges. In 2005 Intellivision Productions announced that new Intellivision cartridges were to be produced. "Deep Pockets and Illusions will be the first two releases in a series of new cartridges for the Intellivision. The printed circuit boards, the cartridge casings, the boxes are all being custom manufactured for this special series." Illusions was completed at Mattel Electronics' French office in 1983 but never released. Deep Pockets Super Pro Pool & Billiards was programmed for INTV Corporation in 1990 and only released as a ROM file in 1998. However, no cartridges were produced. Previously, in 2000, Intellivision Productions did release new cartridges for the Atari 2600 and Colecovision. Sea Battle and Swordfight were Atari 2600 games created by Mattel Electronics in the early 1980s but not previously released. Steamroller (Colecovision) was developed for Activision in 1984 and not previously released. Licensing Intellivision Games Also in 1999, Activision released A Collection of Intellivision Classic Games for PlayStation. Also known as Intellivision Classics, it has 30 emulated Intellivision games as well as video interviews of some of the original programmers. All of the games were licensed from Intellivision Productions and none of the Activision or Imagic Intellivision games were included. In 2003, Crave Entertainment released a PlayStation 2 version of Intellivision Lives! and then Xbox and GameCube version in 2004. In 2010, Virtual Play Games released Intellivision Lives! for the Nintendo DS including one never before released game, Blow Out. In 2008 Microsoft made Intellivision Lives! an available download on the Xbox Live Marketplace as an Xbox Original and playable on the Xbox 360. In 2003, the Intellivision 25 and Intellivision 15 direct-to-TV systems were released by Techno Source Ltd. These are an all-in-one single controller design that plugs directly into a television. One includes 25 games the other ten. These Intellivision games were not emulated but rewritten for the native processor (Nintendo Entertainment System compatible) and adapted to a contemporary controller. As such they look and play differently than Intellivision. In 2005 they were updated for two-player play as the Intellivision X2 with 15 games. They were commercially very successful altogether selling about 4 million units by end of 2006. Several licensed Intellivision games became available to Windows computers through the GameTap subscription gaming service in 2005 including Astrosmash, Buzz Bombers, Hover Force, Night Stalker, Pinball, Shark! Shark!, Skiing and Snafu. Installation of the GameTap Player software was required to access the emulator and games. The VH1 Online Arcade made nine Intellivision games available in 2007. Using a Shockwave emulator these Intellivision games could be played directly through a web browser with Shockwave Player. In 2010, VH1 Classic and MTV Networks released 6 Intellivision games to iOS. Intellivision games were first adapted to mobile phones and published by THQ Wireless in 2001. On March 24, 2010, Microsoft launched the Game Room service for Xbox Live and Games for Windows Live. This service includes support for Intellivision games and allows players to compete for high scores via online leaderboards. At the 2011 Consumer Electronics Show, Microsoft announced a version of Game Room for Windows Phone, promising a catalog of 44 Intellivision games. AtGames and its Direct2Drive digital store has Windows compatible Intellivision compilations available for download purchase. Intellivision Flashback The number of Intellivision games that can be played effectively with contemporary game controllers is limited. On October 1, 2014, AtGames Digital Media, Inc., under license from Intellivision Productions, Inc., released the Intellivision Flashback classic game console. It is a miniature sized Intellivision console with two original sized Intellivision controllers. While adapters have been available to interface original Intellivision controllers to personal computers, the Intellivision Flashback includes two new Intellivision controllers identical in layout and function to the originals. It comes with 60 (61 at Dollar General) emulated Intellivision games built into ROM and a sample set of plastic overlays for 10 games. The Advanced Dungeons & Dragons games were included as Crown of Kings and Minotaur. As with many of the other Intellivision compilations, no games requiring
of colonialism, though this is beginning to change, since it is accepted that they also sent populations into the territories they ruled. Imperialism and colonialism both dictate the political and economic advantage over a land and the indigenous populations they control, yet scholars sometimes find it difficult to illustrate the difference between the two. Although imperialism and colonialism focus on the suppression of another, if colonialism refers to the process of a country taking physical control of another, imperialism refers to the political and monetary dominance, either formally or informally. Colonialism is seen to be the architect deciding how to start dominating areas and then imperialism can be seen as creating the idea behind conquest cooperating with colonialism. Colonialism is when the imperial nation begins a conquest over an area and then eventually is able to rule over the areas the previous nation had controlled. Colonialism's core meaning is the exploitation of the valuable assets and supplies of the nation that was conquered and the conquering nation then gaining the benefits from the spoils of the war. The meaning of imperialism is to create an empire, by conquering the other state's lands and therefore increasing its own dominance. Colonialism is the builder and preserver of the colonial possessions in an area by a population coming from a foreign region. Colonialism can completely change the existing social structure, physical structure, and economics of an area; it is not unusual that the characteristics of the conquering peoples are inherited by the conquered indigenous populations. Few colonies remain remote from their mother country. Thus, most will eventually establish a separate nationality or remain under complete control of their mother colony. The Soviet leader Vladimir Lenin suggested that "imperialism was the highest form of capitalism, claiming that imperialism developed after colonialism, and was distinguished from colonialism by monopoly capitalism". This idea from Lenin stresses how important new political world order has become in the modern era. Geopolitics now focuses on states becoming major economic players in the market; some states today are viewed as empires due to their political and economic authority over other nations. European expansion caused the world to be divided by how developed and developing nations are portrayed through the world systems theory. The two main regions are the core and the periphery. The core consists of areas of high income and profit; the periphery is on the opposing side of the spectrum consisting of areas of low income and profit. These critical theories of geo-politics have led to increased discussion of the meaning and impact of imperialism on the modern post-colonial world. Age of Imperialism The Age of Imperialism, a time period beginning around 1760, saw European industrializing nations, engaging in the process of colonizing, influencing, and annexing other parts of the world. 19th century episodes included the "Scramble for Africa." In the 1970s British historians John Gallagher (1919–1980) and Ronald Robinson (1920–1999) argued that European leaders rejected the notion that "imperialism" required formal, legal control by one government over a colonial region. Much more important was informal control of independent areas. According to Wm. Roger Louis, "In their view, historians have been mesmerized by formal empire and maps of the world with regions colored red. The bulk of British emigration, trade, and capital went to areas outside the formal British Empire. Key to their thinking is the idea of empire 'informally if possible and formally if necessary.'" Oron Hale says that Gallagher and Robinson looked at the British involvement in Africa where they "found few capitalists, less capital, and not much pressure from the alleged traditional promoters of colonial expansion. Cabinet decisions to annex or not to annex were made, usually on the basis of political or geopolitical considerations." Looking at the main empires from 1875 to 1914, there was a mixed record in terms of profitability. At first, planners expected that colonies would provide an excellent captive market for manufactured items. Apart from the Indian subcontinent, this was seldom true. By the 1890s, imperialists saw the economic benefit primarily in the production of inexpensive raw materials to feed the domestic manufacturing sector. Overall, Great Britain did very well in terms of profits from India, especially Mughal Bengal, but not from most of the rest of its empire. To understand the scale of the wealth transfer from India from 1765 to 1938 an estimated $45 Trillion was taken. This is 15-times the $3 Trillion (2019) annual GNI of the UK. The Netherlands did very well in the East Indies. Germany and Italy got very little trade or raw materials from their empires. France did slightly better. The Belgian Congo was notoriously profitable when it was a capitalistic rubber plantation owned and operated by King Leopold II as a private enterprise. However, scandal after scandal regarding very badly mistreated labour led the international community to force the government of Belgium to take it over in 1908, and it became much less profitable. The Philippines cost the United States much more than expected because of military action against rebels. Because of the resources made available by imperialism, the world's economy grew significantly and became much more interconnected in the decades before World War I, making the many imperial powers rich and prosperous. Europe's expansion into territorial imperialism was largely focused on economic growth by collecting resources from colonies, in combination with assuming political control by military and political means. The colonization of India in the mid-18th century offers an example of this focus: there, the "British exploited the political weakness of the Mughal state, and, while military activity was important at various times, the economic and administrative incorporation of local elites was also of crucial significance" for the establishment of control over the subcontinent's resources, markets, and manpower. Although a substantial number of colonies had been designed to provide economic profit and to ship resources to home ports in the 17th and 18th centuries, D. K. Fieldhouse suggests that in the 19th and 20th centuries in places such as Africa and Asia, this idea is not necessarily valid: During this time, European merchants had the ability to "roam the high seas and appropriate surpluses from around the world (sometimes peaceably, sometimes violently) and to concentrate them in Europe". European expansion greatly accelerated in the 19th century. To obtain raw materials, Europe expanded imports from other countries and from the colonies. European industrialists sought raw materials such as dyes, cotton, vegetable oils, and metal ores from overseas. Concurrently, industrialization was quickly making Europe the centre of manufacturing and economic growth, driving resource needs. Communication became much more advanced during European expansion. With the invention of railroads and telegraphs, it became easier to communicate with other countries and to extend the administrative control of a home nation over its colonies. Steam railroads and steam-driven ocean shipping made possible the fast, cheap transport of massive amounts of goods to and from colonies. Along with advancements in communication, Europe also continued to advance in military technology. European chemists made new explosives that made artillery much more deadly. By the 1880s, the machine gun had become a reliable battlefield weapon. This technology gave European armies an advantage over their opponents, as armies in less-developed countries were still fighting with arrows, swords, and leather shields (e.g. the Zulus in Southern Africa during the Anglo-Zulu War of 1879). Some exceptions of armies that managed to get nearly on par with the European expeditions and standards include the Ethiopian armies at the Battle of Adwa, and the Japanese Imperial Army of Japan, but these still relied heavily on weapons imported from Europe and often on European military advisors. Theories of imperialism Anglophone academic studies often base their theories regarding imperialism on the British experience of Empire. The term imperialism was originally introduced into English in its present sense in the late 1870s by opponents of the allegedly aggressive and ostentatious imperial policies of British Prime Minister Benjamin Disraeli. Supporters of "imperialism" such as Joseph Chamberlain quickly appropriated the concept. For some, imperialism designated a policy of idealism and philanthropy; others alleged that it was characterized by political self-interest, and a growing number associated it with capitalist greed. In Imperialism: A Study (1902), John A. Hobson developed a highly influential interpretation of imperialism that expanded on his belief that free enterprise capitalism had a negative impact on the majority of the population. In Imperialism he argued that the financing of overseas empires drained money that was needed at home. It was invested abroad because of lower wages paid to the workers overseas made for higher profits and higher rates of return, compared to domestic wages. So although domestic wages remained higher, they did not grow nearly as fast as they might have otherwise. Exporting capital, he concluded, put a lid on the growth of domestic wages in the domestic standard of living. By the 1970s, historians such as David K. Fieldhouse and Oron Hale could argue that "the Hobsonian foundation has been almost completely demolished." The British experience failed to support it. However, European Socialists picked up Hobson's ideas and made it into their own theory of imperialism, most notably in Lenin's Imperialism, the Highest Stage of Capitalism (1916). Lenin portrayed Imperialism as the closure of the world market and the end of capitalist free-competition that arose from the need for capitalist economies to constantly expand investment, material resources and manpower in such a way that necessitated colonial expansion. Later Marxist theoreticians echo this conception of imperialism as a structural feature of capitalism, which explained the World War as the battle between imperialists for control of external markets. Lenin's treatise became a standard textbook that flourished until the collapse of communism in 1989–91. Some theoreticians on the non-Communist left have emphasized the structural or systemic character of "imperialism". Such writers have expanded the period associated with the term so that it now designates neither a policy, nor a short space of decades in the late 19th century, but a world system extending over a period of centuries, often going back to Christopher Columbus and, in some accounts, to the Crusades. As the application of the term has expanded, its meaning has shifted along five distinct but often parallel axes: the moral, the economic, the systemic, the cultural, and the temporal. Those changes reflect—among other shifts in sensibility—a growing unease, even great distaste, with the pervasiveness of such power, specifically, Western power. Historians and political theorists have long debated the correlation between capitalism, class and imperialism. Much of the debate was pioneered by such theorists as J. A. Hobson (1858–1940), Joseph Schumpeter (1883–1950), Thorstein Veblen (1857–1929), and Norman Angell (1872–1967). While these non-Marxist writers were at their most prolific before World War I, they remained active in the interwar years. Their combined work informed the study of imperialism and its impact on Europe, as well as contributing to reflections on the rise of the military-political complex in the United States from the 1950s. Hobson argued that domestic social reforms could cure the international disease of imperialism by removing its economic foundation. Hobson theorized that state intervention through taxation could boost broader consumption, create wealth, and encourage a peaceful, tolerant, multipolar world order. Walter Rodney, in his 1972 classic How Europe Underdeveloped Africa, proposes the idea that imperialism is a phase of capitalism "in which Western European capitalist countries, the US, and Japan established political, economic, military and cultural hegemony over other parts of the world which were initially at a lower level and therefore could not resist domination." As a result, Imperialism "for many years embraced the whole world – one part being the exploiters and the other the exploited, one part being dominated and the other acting as overlords, one part making policy and the other being dependent." Imperialism has also been identified in newer phenomena like space development and its governing context. Issues Orientalism and imaginative geography Imperial control, territorial and cultural, is justified through discourses about the imperialists' understanding of different spaces. Conceptually, imagined geographies explain the limitations of the imperialist understanding of the societies (human reality) of the different spaces inhabited by the non–European Other. In Orientalism (1978), Edward Said said that the West developed the concept of The Orient—an imagined geography of the Eastern world—which functions as an essentializing discourse that represents neither the ethnic diversity nor the social reality of the Eastern world. That by reducing the East into cultural essences, the imperial discourse uses place-based identities to create cultural difference and psychologic distance between "We, the West" and "They, the East" and between "Here, in the West" and "There, in the East". That cultural differentiation was especially noticeable in the books and paintings of early Oriental studies, the European examinations of the Orient, which misrepresented the East as irrational and backward, the opposite of the rational and progressive West. Defining the East as a negative vision of the Western world, as its inferior, not only increased the sense-of-self of the West, but also was a way of ordering the East, and making it known to the West, so that it could be dominated and controlled. Therefore, Orientalism was the ideological justification of early Western imperialism—a body of knowledge and ideas that rationalized social, cultural, political, and economic control of other, non-white peoples. Cartography One of the main tools used by imperialists was cartography. Cartography is "the art, science and technology of making maps" but this definition is problematic. It implies that maps are objective representations of the world when in reality they serve very political means. For Harley, maps serve as an example of Foucault's power and knowledge concept. To better illustrate this idea, Bassett focuses his analysis of the role of 19th-century maps during the "scramble for Africa". He states that maps "contributed to empire by promoting, assisting, and legitimizing the extension of French and British power into West Africa". During his analysis of 19th-century cartographic techniques, he highlights the use of blank space to denote unknown or unexplored territory. This provided incentives for imperial and colonial powers to obtain "information to fill in blank spaces on contemporary maps". Although cartographic processes advanced through imperialism, further analysis of their progress reveals many biases linked to eurocentrism. According to Bassett, "[n]ineteenth-century explorers commonly requested Africans to sketch maps of unknown areas on the ground. Many of those maps were highly regarded for their accuracy" but were not printed in Europe unless Europeans verified them. Expansionism Imperialism in pre-modern times was common in the form of expansionism through vassalage and conquest. Cultural imperialism The concept of cultural imperialism refers to the cultural influence of one dominant culture over others, i.e. a form of soft power, which changes the moral, cultural, and societal worldview of the subordinate country. This means more than just "foreign" music, television or film becoming popular with young people; rather that a populace changes its own expectations of life, desiring for their own country to become more like the foreign country depicted. For example, depictions of opulent American lifestyles in the soap opera Dallas during the Cold War changed the expectations of Romanians; a more recent example is the influence of smuggled South Korean drama series in North Korea. The importance of soft power is not lost on authoritarian regimes, fighting such influence with bans on foreign popular culture, control of the internet and unauthorised satellite dishes etc. Nor is such a usage of culture recent, as part of Roman imperialism local elites would be exposed to the benefits and luxuries of Roman culture and lifestyle, with the aim that they would then become willing participants. Imperialism has been subject to moral or immoral censure by its critics, and thus the term is frequently used in international propaganda as a pejorative for expansionist and aggressive foreign policy. Social imperialism The political concept social imperialism is a Marxist expression first used in the early 20th century by Lenin as "socialist in words, imperialist in deeds" describing the Fabian Society and other socialist organizations. Later, in a split with the Soviet Union, Mao Zedong criticized its leaders as social imperialists. Justification Stephen Howe has summarized his view on the beneficial effects of the colonial empires: A controversial aspect of imperialism is the defense and justification of empire-building based on seemingly rational grounds. In ancient China, Tianxia denoted the lands, space, and area divinely appointed to the Emperor by universal and well-defined principles of order. The center of this land was directly apportioned to the Imperial court, forming the center of a world view that centered on the Imperial court and went concentrically outward to major and minor officials and then the common citizens, tributary states, and finally ending with the fringe "barbarians". Tianxia's idea of hierarchy gave Chinese a privileged position and was justified through the promise of order and peace. J. A. Hobson identifies this justification on general grounds as: "It is desirable that the earth should be peopled, governed, and developed, as far as possible, by the races which can do this work best, i.e. by the races of highest 'social efficiency'". Many others argued that imperialism is justified for several different reasons. Friedrich Ratzel believed that in order for a state to survive, imperialism was needed. Halford Mackinder felt that Great Britain needed to be one of the greatest imperialists and therefore justified imperialism. The purportedly scientific nature of "Social Darwinism" and a theory of races formed a supposedly rational justification for imperialism. Under this doctrine, the French politician Jules Ferry could declare in 1883 that "Superior races have a right, because they have a duty. They have the duty to civilize the inferior races." The rhetoric of colonizers being racially superior appears to have achieved its purpose, for example throughout Latin America "whiteness" is still prized today and various forms of blanqueamiento (whitening) are common. The Royal Geographical Society of London and other geographical societies in Europe had great influence and were able to fund travelers who would come back with tales of their discoveries. These societies also served as a space for travellers to share these stories. Political geographers such as Friedrich Ratzel of Germany and Halford Mackinder of Britain also supported imperialism. Ratzel believed expansion was necessary for a state's survival while Mackinder supported Britain's imperial expansion; these two arguments dominated the discipline for decades. Geographical theories such as environmental determinism also suggested that tropical environments created uncivilized people in need of European guidance. For instance, American geographer Ellen Churchill Semple argued that even though human beings originated in the tropics they were only able to become fully human in the temperate zone. Tropicality can be paralleled with Edward Said's Orientalism as the west's construction of the east as the "other". According to Said, orientalism allowed Europe to establish itself as the superior and the norm, which justified its dominance over the essentialized Orient. Technology and economic efficiency were often improved in territories subjected to imperialism through the building of roads, other infrastructure and introduction of new technologies. The principles of imperialism are often generalizable to the policies and practices of the British Empire "during the last generation, and proceeds rather by diagnosis than by historical description". British imperialism in some sparsely-inhabited regions appears to have applied a principle now termed Terra nullius (Latin expression which stems from Roman law meaning 'no man's land'). The country of Australia serves as a case study in relation to British settlement and colonial rule of the continent in the 18th century, that was arguably premised on terra nullius, as its settlers considered it unused by its original inhabitants. Environmental determinism The concept of environmental determinism served as a moral justification for the domination of certain territories and peoples. The environmental determinist school of thought held that the environment in which certain people lived determined those persons' behaviours; and thus validated their domination. For example, the Western world saw people living in tropical environments as "less civilized", therefore justifying colonial control as a civilizing mission. Across the three major waves of European colonialism (the first in the Americas, the second in Asia and the last in Africa), environmental determinism served to place categorically indigenous people in a racial hierarchy. This takes two forms, orientalism and tropicality. Some geographic scholars under colonizing empires divided the world into climatic zones. These scholars believed that Northern Europe and the Mid-Atlantic temperate climate produced a hard-working, moral, and upstanding human being. In contrast, tropical climates allegedly yielded lazy attitudes, sexual promiscuity, exotic culture, and moral degeneracy. The people of these climates were believed to be in need of guidance and intervention from a European empire to aid in the governing of a more evolved social structure; they were seen as incapable of such a feat. Similarly, orientalism could promote a view of a people based on their geographical location. Anti-imperialism Anti-imperialism gained a wide currency after the Second World War and at the onset of the Cold War as political movements in colonies of European powers promoted national sovereignty. Some anti-imperialist groups who opposed the United States supported the power of the Soviet Union, such as in Guevarism, while in Maoism this was criticized as social imperialism. Imperialism by country Roman Ming Mongolian Mali Austria-Hungary Belgium Brazil Britain England England's imperialist ambitions can be seen as early as the 16th century as the Tudor conquest of Ireland began in the 1530s. In 1599 the British East India Company was established and was chartered by Queen Elizabeth in the following year. With the establishment of trading posts in India, the British were able to maintain strength relative to other empires such as the Portuguese who already had set up trading posts in India. Scotland Between 1621 and 1699, the Kingdom of Scotland authorised several colonies in the Americas. Most of these colonies were either aborted or collapsed quickly for various reasons. Great Britain Under the Acts of Union 1707, the English and Scottish kingdoms were merged, and their colonies collectively became subject to Great Britain (also known as the United Kingdom). In 1767, the Anglo-Mysore Wars and other political activity caused exploitation of the East India Company causing the plundering of the local economy, almost bringing the company into bankruptcy. By the year 1670 Britain's imperialist ambitions were well off as she had colonies in Virginia, Massachusetts, Bermuda, Honduras, Antigua, Barbados, Jamaica and Nova Scotia. Due to the vast imperialist ambitions of European countries, Britain had several clashes with France. This competition was evident in the colonization of what is now known as Canada. John Cabot claimed Newfoundland for the British while the French established colonies along the St. Lawrence River and claiming it as "New France". Britain continued to expand by colonizing countries such as New Zealand and Australia, both of which were not empty land as they had their own locals and cultures. Britain's nationalistic movements were evident with the creation of the commonwealth countries where there was a shared nature of national identity. Following the proto-industrialization, the "First" British Empire was based on mercantilism, and involved colonies and holdings primarily in North America, the Caribbean, and India. Its growth was reversed by the loss of the American colonies in 1776. Britain made compensating gains in India, Australia, and in constructing an informal economic empire through control of trade and finance in Latin America after the independence of Spanish and Portuguese colonies in about 1820. By the 1840s, Britain had adopted a highly successful policy of free trade that gave it dominance in the trade of much of the world. After losing its first Empire to the Americans, Britain then turned its attention towards Asia, Africa, and the Pacific. Following the defeat of Napoleonic France in 1815, Britain enjoyed a century of almost unchallenged dominance and expanded its imperial holdings around the globe. Unchallenged at sea, British dominance was later described as Pax Britannica ("British Peace"), a period of relative peace in Europe and the world (1815–1914) during which the British Empire became the global hegemon and adopted the role of global policeman. However, this peace was mostly a perceived one from Europe, and the period was still an almost uninterrupted series of colonial wars and disputes. The British Conquest of India, its intervention against Mehemet Ali, the Anglo-Burmese Wars, the Crimean War, the Opium Wars and the Scramble for Africa to name the most notable conflicts mobilised ample military means to press Britain's lead in the global conquest Europe led across the century. In the early 19th century, the Industrial Revolution began to transform Britain; by the time of the Great Exhibition in 1851 the country was described as the "workshop of the world". The British Empire expanded to include India, large parts of Africa and many other territories throughout the world. Alongside the formal control it exerted over its own colonies, British dominance of much of world trade meant that it effectively controlled the economies of many regions, such as Asia and Latin America. Domestically, political attitudes favoured free trade and laissez-faire policies and a gradual widening of the voting franchise. During this century, the population increased at a dramatic rate, accompanied by rapid urbanisation, causing significant social and economic stresses. To seek new markets and sources of raw materials, the Conservative Party under Disraeli launched a period of imperialist expansion in Egypt, South Africa, and elsewhere. Canada, Australia, and New Zealand became self-governing dominions. A resurgence came in the late 19th century with the Scramble for Africa and major additions in Asia and the Middle East. The British spirit of imperialism was expressed by Joseph Chamberlain and Lord Rosebury, and implemented in Africa by Cecil Rhodes. The pseudo-sciences of Social Darwinism and theories of race formed an ideological underpinning and legitimation during this time. Other influential spokesmen included Lord Cromer, Lord Curzon, General Kitchener, Lord Milner, and the writer Rudyard Kipling. The British Empire was the largest Empire that the world has ever seen both in terms of landmass and population. Its power, both military and economic, remained unmatched for a few decades. After the First Boer War, the South African Republic and Orange Free State were recognised by Britain but eventually re-annexed after the Second Boer War. But British power was fading, as the reunited German state founded by the Kingdom of Prussia posed a growing threat to Britain's dominance. As of 1913, Britain was the world's fourth economy, behind the U.S, Russia and Germany. Irish War of Independence in 1919-1921 led to the сreation of the Irish Free State. But Britain gained control of former German and Ottoman colonies with the League of Nations mandate. Britain now had a practically continuous line of controlled territories from Egypt to Burma and another one from Cairo to Cape Town. However, this period was also the one of the emergence of independence movements based on nationalism and new experiences the colonists had gained in the war. World War II decisively weakened Britain's position in the world, especially financially. Decolonization movements arose nearly everywhere in the Empire, resulting in Indian independence and partition in 1947 and the establishment of independent states in the 1950s. British imperialism showed its frailty in Egypt during the Suez Crisis in 1956. However, with the United States and Soviet Union emerging from World War II as the sole superpowers, Britain's role as a worldwide power declined significantly and rapidly. China China was one of the world's oldest empires. Due to its long history of imperialist expansion, China has been seen by its neighboring countries as a threat due to its large population, giant economy, large military force as well as its territorial evolution throughout history. Starting with the unification of China under the Qin dynasty, later Chinese dynasties continued to follow its form of expansions. The most successful Chinese imperial dynasties in terms of territorial expansion were the Han, Tang, Yuan, and Qing dynasties. Denmark Danish overseas colonies that Denmark–Norway (Denmark after 1814) possessed from 1536 until 1953. At its apex there were colonies on four continents: Europe, North America, Africa and Asia. In the 17th century, following territorial losses on the Scandinavian Peninsula, Denmark-Norway began to develop colonies, forts, and trading posts in West Africa, the Caribbean, and the Indian subcontinent. Christian IV first initiated the policy of expanding Denmark-Norway's overseas trade, as part of the mercantilist wave that was sweeping Europe. Denmark-Norway's first colony was established at Tranquebar on India's southern coast in 1620. Admiral Ove Gjedde led the expedition that established the colony. After 1814, when Norway was ceded to Sweden, Denmark retained what remained of Norway's great medieval colonial holdings. One by one the smaller colonies were lost or sold. Tranquebar was sold to the British in 1845. The United States purchased the Danish West Indies in 1917. Iceland became independent in 1944. Today, the only remaining vestiges are two originally Norwegian colonies that are currently within the Danish Realm, the Faroe Islands and Greenland; the Faroes were a Danish county until 1948, while Greenland's colonial status ceased in 1953. They are now autonomous territories. France From the 16th to the 17th centuries, the First French colonial empire stretched from a total area at its peak in 1680 to over 10,000,000 square kilometres (3,900,000 sq. miles), the second largest empire in the world at the time behind only the Spanish Empire. It was followed by French East India Company's trading posts in Africa and Asia in the 17th century. France had its "First colonial empire" from 1534 until 1814, including New France (Canada, Acadia, Newfoundland and Louisiana), French West Indies (Saint-Domingue, Guadeloupe, Martinique), French Guiana, Senegal (Gorée), Mascarene Islands (Mauritius Island, Réunion) and French India. Its "Second colonial empire" began with the seizure of Algiers in 1830 and came for the most part to an end with the granting of independence to Algeria in 1962. The French imperial history was marked by numerous wars, large and small, and also by significant help to France itself from the colonials in the world wars. France took control of Algeria in 1830 but began in earnest to rebuild its worldwide empire after 1850, concentrating chiefly in North and West Africa (French North Africa, French West Africa, French Equatorial Africa), as well as South-East Asia (French Indochina), with other conquests in the South Pacific (New Caledonia, French Polynesia). France also twice attempted to make Mexico a colony in 1838–39 and in 1861-67 (see Pastry War and Second French intervention in Mexico). French Republicans, at first hostile to empire, only became supportive when Germany started to build her own colonial empire. As it developed, the new empire took on roles of trade with France, supplying raw materials and purchasing manufactured items, as well as lending prestige to the motherland and spreading French civilization and language as well as Catholicism. It also provided crucial manpower in both World Wars. It became a moral justification to lift the world up to French standards by bringing Christianity and French culture. In 1884 the leading exponent of colonialism, Jules Ferry declared France had a civilising mission: "The higher races have a right over the lower races, they have a duty to civilize the inferior". Full citizenship rights – assimilation – were offered, although in reality assimilation was always on the distant horizon. Contrasting from Britain, France sent small numbers of settlers to its colonies, with the only notable exception of Algeria, where French settlers nevertheless always remained a small minority. In the 19th and 20th centuries, the French colonial empire was the second-largest colonial empire in the world behind the British Empire, extending over 13,500,000 km2 (5,212,000 sq. miles) at its height in the 1920s and 1930s. France controlled 1/10th of the Earth's land area, with a population of 150 million people on the eve of World War II (8% of the world's population at the time). In World War II, Charles de Gaulle and the Free French used the overseas colonies as bases from which they fought to liberate France. However, after 1945 anti-colonial movements began to challenge the Empire. France fought and lost a bitter war in Vietnam in the 1950s. Whereas they won the war in Algeria, de Gaulle decided to grant Algeria independence anyway in 1962. French settlers and many local supporters relocated to France. Nearly all of France's colonies gained independence by 1960, but France retained great financial and diplomatic influence. It has repeatedly sent troops to assist its former colonies in Africa in suppressing insurrections and coups d'état. Education policy French colonial officials, influenced by the revolutionary ideal of equality, standardized schools, curricula, and teaching methods as much as possible. They did not establish colonial school systems with the idea of furthering the ambitions of the local people, but rather simply exported the systems and methods in vogue
1599 the British East India Company was established and was chartered by Queen Elizabeth in the following year. With the establishment of trading posts in India, the British were able to maintain strength relative to other empires such as the Portuguese who already had set up trading posts in India. Scotland Between 1621 and 1699, the Kingdom of Scotland authorised several colonies in the Americas. Most of these colonies were either aborted or collapsed quickly for various reasons. Great Britain Under the Acts of Union 1707, the English and Scottish kingdoms were merged, and their colonies collectively became subject to Great Britain (also known as the United Kingdom). In 1767, the Anglo-Mysore Wars and other political activity caused exploitation of the East India Company causing the plundering of the local economy, almost bringing the company into bankruptcy. By the year 1670 Britain's imperialist ambitions were well off as she had colonies in Virginia, Massachusetts, Bermuda, Honduras, Antigua, Barbados, Jamaica and Nova Scotia. Due to the vast imperialist ambitions of European countries, Britain had several clashes with France. This competition was evident in the colonization of what is now known as Canada. John Cabot claimed Newfoundland for the British while the French established colonies along the St. Lawrence River and claiming it as "New France". Britain continued to expand by colonizing countries such as New Zealand and Australia, both of which were not empty land as they had their own locals and cultures. Britain's nationalistic movements were evident with the creation of the commonwealth countries where there was a shared nature of national identity. Following the proto-industrialization, the "First" British Empire was based on mercantilism, and involved colonies and holdings primarily in North America, the Caribbean, and India. Its growth was reversed by the loss of the American colonies in 1776. Britain made compensating gains in India, Australia, and in constructing an informal economic empire through control of trade and finance in Latin America after the independence of Spanish and Portuguese colonies in about 1820. By the 1840s, Britain had adopted a highly successful policy of free trade that gave it dominance in the trade of much of the world. After losing its first Empire to the Americans, Britain then turned its attention towards Asia, Africa, and the Pacific. Following the defeat of Napoleonic France in 1815, Britain enjoyed a century of almost unchallenged dominance and expanded its imperial holdings around the globe. Unchallenged at sea, British dominance was later described as Pax Britannica ("British Peace"), a period of relative peace in Europe and the world (1815–1914) during which the British Empire became the global hegemon and adopted the role of global policeman. However, this peace was mostly a perceived one from Europe, and the period was still an almost uninterrupted series of colonial wars and disputes. The British Conquest of India, its intervention against Mehemet Ali, the Anglo-Burmese Wars, the Crimean War, the Opium Wars and the Scramble for Africa to name the most notable conflicts mobilised ample military means to press Britain's lead in the global conquest Europe led across the century. In the early 19th century, the Industrial Revolution began to transform Britain; by the time of the Great Exhibition in 1851 the country was described as the "workshop of the world". The British Empire expanded to include India, large parts of Africa and many other territories throughout the world. Alongside the formal control it exerted over its own colonies, British dominance of much of world trade meant that it effectively controlled the economies of many regions, such as Asia and Latin America. Domestically, political attitudes favoured free trade and laissez-faire policies and a gradual widening of the voting franchise. During this century, the population increased at a dramatic rate, accompanied by rapid urbanisation, causing significant social and economic stresses. To seek new markets and sources of raw materials, the Conservative Party under Disraeli launched a period of imperialist expansion in Egypt, South Africa, and elsewhere. Canada, Australia, and New Zealand became self-governing dominions. A resurgence came in the late 19th century with the Scramble for Africa and major additions in Asia and the Middle East. The British spirit of imperialism was expressed by Joseph Chamberlain and Lord Rosebury, and implemented in Africa by Cecil Rhodes. The pseudo-sciences of Social Darwinism and theories of race formed an ideological underpinning and legitimation during this time. Other influential spokesmen included Lord Cromer, Lord Curzon, General Kitchener, Lord Milner, and the writer Rudyard Kipling. The British Empire was the largest Empire that the world has ever seen both in terms of landmass and population. Its power, both military and economic, remained unmatched for a few decades. After the First Boer War, the South African Republic and Orange Free State were recognised by Britain but eventually re-annexed after the Second Boer War. But British power was fading, as the reunited German state founded by the Kingdom of Prussia posed a growing threat to Britain's dominance. As of 1913, Britain was the world's fourth economy, behind the U.S, Russia and Germany. Irish War of Independence in 1919-1921 led to the сreation of the Irish Free State. But Britain gained control of former German and Ottoman colonies with the League of Nations mandate. Britain now had a practically continuous line of controlled territories from Egypt to Burma and another one from Cairo to Cape Town. However, this period was also the one of the emergence of independence movements based on nationalism and new experiences the colonists had gained in the war. World War II decisively weakened Britain's position in the world, especially financially. Decolonization movements arose nearly everywhere in the Empire, resulting in Indian independence and partition in 1947 and the establishment of independent states in the 1950s. British imperialism showed its frailty in Egypt during the Suez Crisis in 1956. However, with the United States and Soviet Union emerging from World War II as the sole superpowers, Britain's role as a worldwide power declined significantly and rapidly. China China was one of the world's oldest empires. Due to its long history of imperialist expansion, China has been seen by its neighboring countries as a threat due to its large population, giant economy, large military force as well as its territorial evolution throughout history. Starting with the unification of China under the Qin dynasty, later Chinese dynasties continued to follow its form of expansions. The most successful Chinese imperial dynasties in terms of territorial expansion were the Han, Tang, Yuan, and Qing dynasties. Denmark Danish overseas colonies that Denmark–Norway (Denmark after 1814) possessed from 1536 until 1953. At its apex there were colonies on four continents: Europe, North America, Africa and Asia. In the 17th century, following territorial losses on the Scandinavian Peninsula, Denmark-Norway began to develop colonies, forts, and trading posts in West Africa, the Caribbean, and the Indian subcontinent. Christian IV first initiated the policy of expanding Denmark-Norway's overseas trade, as part of the mercantilist wave that was sweeping Europe. Denmark-Norway's first colony was established at Tranquebar on India's southern coast in 1620. Admiral Ove Gjedde led the expedition that established the colony. After 1814, when Norway was ceded to Sweden, Denmark retained what remained of Norway's great medieval colonial holdings. One by one the smaller colonies were lost or sold. Tranquebar was sold to the British in 1845. The United States purchased the Danish West Indies in 1917. Iceland became independent in 1944. Today, the only remaining vestiges are two originally Norwegian colonies that are currently within the Danish Realm, the Faroe Islands and Greenland; the Faroes were a Danish county until 1948, while Greenland's colonial status ceased in 1953. They are now autonomous territories. France From the 16th to the 17th centuries, the First French colonial empire stretched from a total area at its peak in 1680 to over 10,000,000 square kilometres (3,900,000 sq. miles), the second largest empire in the world at the time behind only the Spanish Empire. It was followed by French East India Company's trading posts in Africa and Asia in the 17th century. France had its "First colonial empire" from 1534 until 1814, including New France (Canada, Acadia, Newfoundland and Louisiana), French West Indies (Saint-Domingue, Guadeloupe, Martinique), French Guiana, Senegal (Gorée), Mascarene Islands (Mauritius Island, Réunion) and French India. Its "Second colonial empire" began with the seizure of Algiers in 1830 and came for the most part to an end with the granting of independence to Algeria in 1962. The French imperial history was marked by numerous wars, large and small, and also by significant help to France itself from the colonials in the world wars. France took control of Algeria in 1830 but began in earnest to rebuild its worldwide empire after 1850, concentrating chiefly in North and West Africa (French North Africa, French West Africa, French Equatorial Africa), as well as South-East Asia (French Indochina), with other conquests in the South Pacific (New Caledonia, French Polynesia). France also twice attempted to make Mexico a colony in 1838–39 and in 1861-67 (see Pastry War and Second French intervention in Mexico). French Republicans, at first hostile to empire, only became supportive when Germany started to build her own colonial empire. As it developed, the new empire took on roles of trade with France, supplying raw materials and purchasing manufactured items, as well as lending prestige to the motherland and spreading French civilization and language as well as Catholicism. It also provided crucial manpower in both World Wars. It became a moral justification to lift the world up to French standards by bringing Christianity and French culture. In 1884 the leading exponent of colonialism, Jules Ferry declared France had a civilising mission: "The higher races have a right over the lower races, they have a duty to civilize the inferior". Full citizenship rights – assimilation – were offered, although in reality assimilation was always on the distant horizon. Contrasting from Britain, France sent small numbers of settlers to its colonies, with the only notable exception of Algeria, where French settlers nevertheless always remained a small minority. In the 19th and 20th centuries, the French colonial empire was the second-largest colonial empire in the world behind the British Empire, extending over 13,500,000 km2 (5,212,000 sq. miles) at its height in the 1920s and 1930s. France controlled 1/10th of the Earth's land area, with a population of 150 million people on the eve of World War II (8% of the world's population at the time). In World War II, Charles de Gaulle and the Free French used the overseas colonies as bases from which they fought to liberate France. However, after 1945 anti-colonial movements began to challenge the Empire. France fought and lost a bitter war in Vietnam in the 1950s. Whereas they won the war in Algeria, de Gaulle decided to grant Algeria independence anyway in 1962. French settlers and many local supporters relocated to France. Nearly all of France's colonies gained independence by 1960, but France retained great financial and diplomatic influence. It has repeatedly sent troops to assist its former colonies in Africa in suppressing insurrections and coups d'état. Education policy French colonial officials, influenced by the revolutionary ideal of equality, standardized schools, curricula, and teaching methods as much as possible. They did not establish colonial school systems with the idea of furthering the ambitions of the local people, but rather simply exported the systems and methods in vogue in the mother nation. Having a moderately trained lower bureaucracy was of great use to colonial officials. The emerging French-educated indigenous elite saw little value in educating rural peoples. After 1946 the policy was to bring the best students to Paris for advanced training. The result was to immerse the next generation of leaders in the growing anti-colonial diaspora centered in Paris. Impressionistic colonials could mingle with studious scholars or radical revolutionaries or so everything in between. Ho Chi Minh and other young radicals in Paris formed the French Communist party in 1920. Tunisia was exceptional. The colony was administered by Paul Cambon, who built an educational system for colonists and indigenous people alike that was closely modeled on mainland France. He emphasized female and vocational education. By independence, the quality of Tunisian education nearly equalled that in France. African nationalists rejected such a public education system, which they perceived as an attempt to retard African development and maintain colonial superiority. One of the first demands of the emerging nationalist movement after World War II was the introduction of full metropolitan-style education in French West Africa with its promise of equality with Europeans. In Algeria, the debate was polarized. The French set up schools based on the scientific method and French culture. The Pied-Noir (Catholic migrants from Europe) welcomed this. Those goals were rejected by the Moslem Arabs, who prized mental agility and their distinctive religious tradition. The Arabs refused to become patriotic and cultured Frenchmen and a unified educational system was impossible until the Pied-Noir and their Arab allies went into exile after 1962. In South Vietnam from 1955 to 1975 there were two competing colonial powers in education, as the French continued their work and the Americans moved in. They sharply disagreed on goals. The French educators sought to preserving French culture among the Vietnamese elites and relied on the Mission Culturelle – the heir of the colonial Direction of Education – and its prestigious high schools. The Americans looked at the great mass of people and sought to make South Vietnam a nation strong enough to stop communism. The Americans had far more money, as USAID coordinated and funded the activities of expert teams, and particularly of academic missions. The French deeply resented the American invasion of their historical zone of cultural imperialism. Germany German expansion into Slavic lands begins in the 12th-13th-century (see Drang Nach Osten). The concept of Drang Nach Osten was a core element of German nationalism and a major element of Nazi ideology. However, the German involvement in the seizure of overseas territories was negligible until the end of the 19th century. Prussia unified the other states into the second German Empire in 1871. Its Chancellor, Otto von Bismarck (1862–90), long opposed colonial acquisitions, arguing that the burden of obtaining, maintaining, and defending such possessions would outweigh any potential benefits. He felt that colonies did not pay for themselves, that the German bureaucratic system would not work well in the tropics and the diplomatic disputes over colonies would distract Germany from its central interest, Europe itself. However, public opinion and elite opinion in Germany demanded colonies for reasons of international prestige, so Bismarck was forced to oblige. In 1883–84 Germany began to build a colonial empire in Africa and the South Pacific. The establishment of the German colonial empire started with German New Guinea in 1884. German colonies included the present territories of in Africa: Tanzania, Rwanda, Burundi, Namibia, Cameroon, Ghana and Togo; in Oceania: New Guinea, Solomon islands, Nauru, Marshall Islands, Mariana Islands, Caroline Islands and Samoa; and in Asia: Tsingtao, Chefoo and the Jiaozhou Bay. The Treaty of Versailles made them mandates temporarily operated by the Allied victors. Germany also lost part of the Eastern territories that became part of independent Poland as a result of the Treaty of Versailles in 1919. Finally, the Eastern territories captured in the Middle Ages were torn from Germany and became part of Poland and the USSR as a result of the territorial reorganization established by the Potsdam conference of the great powers in 1945. Italy The Italian Empire (Impero italiano) comprised the overseas possessions of the Kingdom of Italy primarily in northeast Africa. It began with the purchase in 1869 of Assab Bay on the Red Sea by an Italian navigation company which intended to establish a coaling station at the time the Suez Canal was being opened to navigation. This was taken over by the Italian government in 1882, becoming modern Italy's first overseas territory. By the start of the First World War in 1914, Italy had acquired in Africa the colony of Eritrea on the Red Sea coast, a large protectorate and later colony in Somalia, and authority in formerly Ottoman Tripolitania and Cyrenaica (gained after the Italo-Turkish War) which were later unified in the colony of Libya. Outside Africa, Italy possessed the Dodecanese Islands off the coast of Turkey (following the Italo-Turkish War) and a small concession in Tianjin in China following the Boxer War of 1900. During the First World War, Italy occupied southern Albania to prevent it from falling to Austria-Hungary. In 1917, it established a protectorate over Albania, which remained in place until 1920. The Fascist government that came to power with Benito Mussolini in 1922 sought to increase the size of the Italian empire and to satisfy the claims of Italian irredentists. In its second invasion of Ethiopia in 1935–36, Italy was successful and it merged its new conquest with its older east African colonies to create Italian East Africa. In 1939, Italy invaded Albania and incorporated it into the Fascist state. During the Second World War (1939–1945), Italy occupied British Somaliland, parts of south-eastern France, western Egypt and most of Greece, but then lost those conquests and its African colonies, including Ethiopia, to the invading allied forces by 1943. It was forced in the peace treaty of 1947 to relinquish sovereignty over all its colonies. It was granted a trust to administer former Italian Somaliland under United Nations supervision in 1950. When Somalia became independent in 1960, Italy's eight-decade experiment with colonialism ended. Islamic Japan For over 200 years, Japan maintained a feudal society during a period of relative isolation from the rest of the world. However, in the 1850s, military pressure from the United States and other world powers coerced Japan to open itself to the global market, resulting in an end to the country's isolation. A period of conflicts and political revolutions followed due to socioeconomic uncertainty, ending in 1868 with the reunification of political power under the Japanese Emperor during the Meiji Restoration. This sparked a period of rapid industrialization driven in part by a Japanese desire for self-sufficiency. By the early 1900s, Japan was a naval power that could hold its own against an established European power as it defeated Russia. Despite its rising population and increasingly industrialized economy, Japan lacked significant natural resources. As a result, the country turned to imperialism and expansionism in part as a means of compensating for these shortcomings, adopting the national motto "Fukoku kyōhei" (富国強兵, "Enrich the state, strengthen the military"). And Japan was eager to take every opportunity. In 1869 they took advantage of the defeat of the rebels of the Republic of Ezo to incorporate definitely the island of Hokkaido to Japan. For centuries, Japan viewed the Ryukyu Islands as one of its provinces. In 1871 the Mudan incident happened: Taiwanese aborigines murdered 54 Ryūkyūan sailors that became shipwrecked. At that time the Ryukyu Islands were claimed by both Qing China and Japan, and the Japanese interpreted the incident as an attack on their citizens. They took steps to bring the islands in their jurisdiction: in 1872 the Japanese Ryukyu Domain was declared, and in 1874 a retaliatory incursion to Taiwan was sent, which was a success. The success of this expedition emboldened the Japanese: not even the Americans could defeat the Taiwanese in the Formosa Expedition of 1867. Very few gave it much thought at the time, but this was the first move in the Japanese expansionism series. Japan occupied Taiwan for the rest of 1874 and then left owing to Chinese pressures, but in 1879 it finally annexed the Ryukyu Islands. In 1875 Qing China sent a 300-men force to subdue the Taiwanese, but unlike the Japanese the Chinese were routed, ambushed and 250 of their men were killed; the failure of this expedition exposed once more the failure of Qing China to exert effective control in Taiwan, and acted as another incentive for the Japanese to annex Taiwan. Eventually, the spoils for winning the First Sino-Japanese War in 1894 included Taiwan. In 1875 Japan took its first operation against Joseon Korea, another territory that for centuries it coveted; the Ganghwa Island incident made Korea open to international trade. Korea was annexed in 1910. As a result of winning the Russo-Japanese War in 1905, Japan took part of Sakhalin Island from Russia. Precisely, the victory against the Russian Empire shook the world: never before had an Asian nation defeated a European power, and in Japan it was seen as a feat. Japan's victory against Russia would act as an antecedent for Asian countries in the fight against the Western powers for Decolonization. During World War I, Japan took German-leased territories in China's Shandong Province, as well as the Mariana, Caroline, and Marshall Islands, and kept the islands as League of nations mandates. At first, Japan was in good standing with the victorious Allied powers of World War I, but different discrepancies and dissatisfaction with the rewards of the treaties cooled the relations with them, for example American pressure forced it to return the Shandong area. By the '30s, economic depression, urgency of resources and a growing distrust in the Allied powers made Japan lean to a hardened militaristic stance. Through the decade, it would grow closer to Germany and Italy, forming together the Axis alliance. In 1931 Japan took Manchuria from China. International reactions condemned this move, but Japan's already strong skepticism against Allied nations meant that it nevertheless carried on. During the Second Sino-Japanese War in 1937, Japan's military invaded central China. Also, in 1938-1939 Japan made an attempt to seize the territory of Soviet Russia and Mongolia, but suffered a serious defeats (see Battle of Lake Khasan, Battles of Khalkhin Gol). By now, relations with the Allied powers were at the bottom, and an international boycott against Japan to deprive it of natural resources was enforced. Thus a military move to gain access to them was needed, and so Japan attacked Pearl Harbor, bringing the United States to World War II. Using its superior technological advances in naval aviation and its modern doctrines of amphibious and naval warfare, Japan achieved one of the fastest maritime expansions in history. By 1942 Japan had conquered much of East Asia and the Pacific, including the east of China, Hong Kong, Thailand, Vietnam, Cambodia, Burma (Myanmar), Malaysia, the Philippines, Indonesia, part of New Guinea and many islands of the Pacific Ocean. Just as Japan's late industrialization success and victory against the Russian Empire was seen as an example among underdeveloped Asia-Pacific nations, the Japanese took advantage of this and promoted among its conquered the goal to jointly create an anti-European "Greater East Asia Co-Prosperity Sphere". This plan helped the Japanese gain support from native populations during its conquests especially in Indonesia. However, the United States had a vastly stronger military and industrial base and defeated Japan, stripping it of conquests and returning its settlers back to Japan. Netherlands The most notable example of Dutch imperialism is regarding Indonesia. Ottoman Empire The Ottoman Empire was an imperial state that lasted from 1299 to 1922. In 1453, Mehmed the Conqueror captured Constantinople and made it his capital. During the 16th and 17th centuries, in particular at the height of its power under the reign of Suleiman the Magnificent, the Ottoman Empire was a powerful multinational, multilingual empire, which invaded and colonized much of Southeast Europe, Western Asia, the Caucasus, North Africa, and the Horn of Africa. Its repeated invasions, and brutal treatment of Slavs led to the Great Migrations of the Serbs to escape persecution. At the beginning of the 17th century the empire contained 32 provinces and numerous vassal states. Some of these were later absorbed into the empire, while others were granted various types of autonomy during the course of centuries. Following a long period of military setbacks against European powers, the Ottoman Empire gradually declined, losing control of much of its territory in Europe and Africa. By 1810 Egypt was effectively independent. In 1821-1829 the Greeks in the Greek War of Independence were assisted by Russia, Britain and France. In 1815 to 1914 the Ottoman Empire could exist only in the conditions of acute rivalry of the great powers, with Britain its main supporter, especially in the Crimean war 1853–1856, against Russia. After Ottoman defeat in the Russo-Turkish War (1877–1878), Bulgaria, Serbia and Montenegro gained independence and Britain took colonial control of Cyprus, while Bosnia and Herzegovina were occupied and annexed by Austro-Hungarian Empire in 1908. The empire allied with Germany in World War I with the imperial ambition of recovering its lost territories, but it dissolved in the aftermath of its decisive defeat. The Kemalist national movement, supported by Soviet Russia, achieved victory in the course of the Turkish War of Independence, and the parties signed and ratified the Treaty of Lausanne in 1923 and 1924. The Republic of Turkey was established. Portugal The Russian Empire & the Soviet Union By the 18th century, the Russian Empire extended its control to the Pacific, peacefully forming a common border with the Qing Empire and Empire of Japan. This took place in a large number of military invasions of the lands east, west, and south of it. The Polish–Russian War of 1792 took place after Polish nobility from the Polish–Lithuanian Commonwealth wrote the Constitution of 3 May 1791. The war resulted in eastern Poland being conquered by Imperial Russia as a colony until 1918. The southern campaigns involved a series of Russo-Persian Wars, which began with the Persian Expedition of 1796, resulting in the acquisition of Georgia (country) as a protectorate. Between 1800 and 1864, Imperial armies invaded south in the Russian conquest of the Caucasus, the Murid War, and the Russo-Circassian War. This last conflict led to the ethnic cleansing of Circassians from their lands. The Russian conquest of Siberia over the Khanate of Sibir took place in the 16th and 17th centuries, and resulted in the slaughter of various indigenous tribes by Russians, including the Daur, the Koryaks, the Itelmens, Mansi people and the Chukchi. The Russian colonization of Central and Eastern Europe and Siberia and treatment of the resident indigenous peoples has been compared to European colonization of the Americas, with similar negative impacts on the indigenous Siberians as upon the indigenous peoples of the Americas. The extermination of indigenous Siberian tribes was so complete that a relatively small population of only 180,000 are said to exist today. The Russian Empire exploited and suppressed Cossacks hosts during this period, before turning them into the special military estate Sosloviye in the late 18th century. Cossacks were then used in Imperial Russian campaigns against other tribes. But it would be a strong simplification to reduce expansion of Russia only to military conquests. The acquisition of Ukraine by Russia commenced in 1654, when Polish rule brought the population of Ukraine to revolts (see Pereyaslav Council). Another example is Georgia's accession to Russia in 1783. Given Georgia's history of invasions from the south, an alliance with Russia may have been seen as the only way to discourage or resist Persian and Ottoman aggression, while also establishing a link to Western Europe (see Treaty of Georgievsk). Russia's support helped establish independent Mongolia (independent from China) (see Mongolian Revolution of 1911). Bolshevik leaders had effectively reestablished a polity with roughly the same extent as that empire by 1921, however with an internationalist ideology: Lenin in particular asserted the right to limited self-determination for national minorities within the new territory. Beginning in 1923, the policy of "Indigenization" [korenizatsiya] was intended to support non-Russians develop their national cultures within a socialist framework. Never formally revoked, it stopped being implemented after 1932. After World War II, the Soviet Union installed socialist regimes modeled on those it had installed in 1919–20 in the old Russian Empire, in areas its forces occupied in Eastern Europe. The Soviet Union and later the People's Republic of China supported revolutionary and communist movements in foreign nations and colonies to advance their own interests, but were not always successful. The USSR provided great
a 32-bit address space which provides 4,294,967,296 (232) unique addresses, but large blocks are reserved for special networking purposes. History Internet Protocol version 4 is described in IETF publication RFC 791 (September 1981), replacing an earlier definition of January 1980 (RFC 760). In March 1982, the US Department of Defense decided on the Internet Protocol Suite (TCP/IP) as the standard for all military computer networking. Purpose The Internet Protocol is the protocol that defines and enables internetworking at the internet layer of the Internet Protocol Suite. In essence it forms the Internet. It uses a logical addressing system and performs routing, which is the forwarding of packets from a source host to the next router that is one hop closer to the intended destination host on another network. IPv4 is a connectionless protocol, and operates on a best-effort delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission Control Protocol (TCP). Addressing IPv4 uses 32-bit addresses which limits the address space to (232) addresses. IPv4 reserves special address blocks for private networks (~18 million addresses) and multicast addresses (~270 million addresses). Address representations IPv4 addresses may be represented in any notation expressing a 32-bit integer value. They are most often written in dot-decimal notation, which consists of four octets of the address expressed individually in decimal numbers and separated by periods. For example, the quad-dotted IP address 192.0.2.235 represents the 32-bit decimal number 3221226219, which in hexadecimal format is 0xC00002EB. CIDR notation combines the address with its routing prefix in a compact format, in which the address is followed by a slash character (/) and the count of leading consecutive 1 bits in the routing prefix (subnet mask). Other address representations were in common use when classful networking was practiced. For example, the loopback address 127.0.0.1 is commonly written as 127.1, given that it belongs to a class-A network with eight bits for the network mask and 24 bits for the host number. When fewer than four numbers are specified in the address in dotted notation, the last value is treated as an integer of as many bytes as are required to fill out the address to four octets. Thus, the address 127.65530 is equivalent to 127.0.255.250. Allocation In the original design of IPv4, an IP address was divided into two parts: the network identifier was the most significant octet of the address, and the host identifier was the rest of the address. The latter was also called the rest field. This structure permitted a maximum of 256 network identifiers, which was quickly found to be inadequate. To overcome this limit, the most-significant address octet was redefined in 1981 to create network classes, in a system which later became known as classful networking. The revised system defined five classes. Classes A, B, and C had different bit lengths for network identification. The rest of the address was used as previously to identify a host within a network. Because of the different sizes of fields in different classes, each network class had a different capacity for addressing hosts. In addition to the three classes for addressing hosts, Class D was defined for multicast addressing and Class E was reserved for future applications. Dividing existing classful networks into subnets began in 1985 with the publication of . This division was made more flexible with the introduction of variable-length subnet masks (VLSM) in in 1987. In 1993, based on this work, introduced Classless Inter-Domain Routing (CIDR), which expressed the number of bits (from the most significant) as, for instance, /24, and the class-based scheme was dubbed classful, by contrast. CIDR was designed to permit repartitioning of any address space so that smaller or larger blocks of addresses could be allocated to users. The hierarchical structure created by CIDR is managed by the Internet Assigned Numbers Authority (IANA) and the regional Internet registries (RIRs). Each RIR maintains a publicly searchable WHOIS database that provides information about IP address assignments. Special-use addresses The Internet Engineering Task Force (IETF) and IANA have restricted from general use various reserved IP addresses for special purposes. Notably these addresses are used for multicast traffic and to provide addressing space for unrestricted uses on private networks. {| class="wikitable sortable" |+ Special address blocks !Address block !Address range !Number of addresses !Scope !Description |- |0.0.0.0/8 |0.0.0.0–0.255.255.255 |align="right"| |Software |Current network |- |10.0.0.0/8 |10.0.0.0–10.255.255.255 |align="right"| |Private network |Used for local communications within a private network. |- |100.64.0.0/10 |100.64.0.0–100.127.255.255 |align="right"| |Private network |Shared address space for communications between a service provider and its subscribers when using a carrier-grade NAT. |- |127.0.0.0/8 |127.0.0.0–127.255.255.255 |align="right"| |Host |Used for loopback addresses to the local host. |- |169.254.0.0/16 |169.254.0.0–169.254.255.255 |align="right"| |Subnet |Used for link-local addresses between two hosts on a single link when no IP address is otherwise specified, such as would have normally been retrieved from a DHCP server. |- |172.16.0.0/12 |172.16.0.0–172.31.255.255 |align="right"| |Private network |Used for local communications within a private network. |- |- |192.0.0.0/24 |192.0.0.0–192.0.0.255 |align="right"| |Private network |IETF Protocol Assignments. |- |192.0.2.0/24 |192.0.2.0–192.0.2.255 |align="right"| |Documentation |Assigned as TEST-NET-1, documentation and examples. |- |192.88.99.0/24 |192.88.99.0–192.88.99.255 |align="right"| |Internet |Reserved. Formerly used for IPv6 to IPv4 relay (included IPv6 address block 2002::/16). |- |192.168.0.0/16 |192.168.0.0–192.168.255.255 |align="right"| |Private network |Used for local communications within a private network. |- |198.18.0.0/15 |198.18.0.0–198.19.255.255 |align="right"| |Private network |Used for benchmark testing of inter-network communications between two separate subnets. |- |198.51.100.0/24 |198.51.100.0–198.51.100.255 |align="right"| |Documentation |Assigned as TEST-NET-2, documentation and examples. |- |203.0.113.0/24 |203.0.113.0–203.0.113.255 |align="right"| |Documentation |Assigned as TEST-NET-3, documentation and examples. |- |224.0.0.0/4 |224.0.0.0–239.255.255.255 |align="right"| |Internet |In use for IP multicast. (Former Class D network.) |- |233.252.0.0/24 |233.252.0.0-233.252.0.255 |align="right"| |Documentation |Assigned as MCAST-TEST-NET, documentation and examples. |- |240.0.0.0/4 |240.0.0.0–255.255.255.254 |align="right"| |Internet |Reserved for future use. (Former Class E network.) |- |255.255.255.255/32 |255.255.255.255 |align="right"| |Subnet |Reserved for the "limited broadcast" destination address. |} Private networks Of the approximately four billion addresses defined in IPv4, about 18 million addresses in three ranges are reserved for use in private networks. Packets addresses in these ranges are not routable in the public Internet; they are ignored by all public routers. Therefore, private hosts cannot directly communicate with public networks, but require network address translation at a routing gateway for this purpose. {| class="wikitable" |+ Reserved private IPv4 network ranges |- !Name!!CIDR block!!Address range!!Number of addresses!!Classful description |- |24-bit block||10.0.0.0/8||10.0.0.0 – 10.255.255.255||align="right"|||Single Class A. |- |20-bit block|||172.16.0.0/12||172.16.0.0 – 172.31.255.255||align="right"|||Contiguous range of 16 Class B blocks. |- |16-bit block||192.168.0.0/16||192.168.0.0 – 192.168.255.255||align="right"|||Contiguous range of 256 Class C blocks. |} Since two private networks, e.g., two branch offices, cannot directly interoperate via the public Internet, the two networks must be bridged across the Internet via a virtual private network (VPN) or an IP tunnel, which encapsulates packets, including their headers containing the private addresses, in a protocol layer during transmission across the public network. Additionally, encapsulated packets may be encrypted for transmission across public networks to secure the data. Link-local addressing RFC 3927 defines the special address block 169.254.0.0/16 for link-local addressing. These addresses are only valid on the link (such as a local network segment or point-to-point connection) directly connected to a host that uses them. These addresses are not routable. Like private addresses, these addresses cannot be the source or destination of packets traversing the internet. These addresses are primarily used for address autoconfiguration (Zeroconf) when a host cannot obtain an IP address from a DHCP server or other internal configuration methods. When the address block was reserved, no standards existed for address autoconfiguration. Microsoft created an implementation called Automatic Private IP Addressing (APIPA), which was deployed on millions of machines and became a de facto standard. Many years later, in May 2005, the IETF defined a formal standard in RFC 3927, entitled Dynamic Configuration of IPv4 Link-Local Addresses. Loopback The class A network 127.0.0.0 (classless network 127.0.0.0/8) is reserved for loopback. IP packets whose source addresses belong to this network should never appear outside a host. Packets received on a non-loopback interface with a loopback source or destination address must be dropped. First and last subnet addresses The first address in a subnet is used to identify the subnet itself. In this address all host bits are 0. To avoid ambiguity in representation, this address is reserved. The last address has all host bits set to 1. It is used as a local broadcast address for sending messages to all devices on the subnet simultaneously. For networks of size /24 or larger, the broadcast address always ends in 255. For example, in the subnet 192.168.5.0/24 (subnet mask 255.255.255.0) the identifier 192.168.5.0 is used to refer to the entire subnet. The broadcast address of the network is 192.168.5.255. However, this does not mean that every address ending in 0 or 255 cannot be used as a host address. For example, in the /16 subnet 192.168.0.0/255.255.0.0, which is equivalent to the address range 192.168.0.0–192.168.255.255, the broadcast address is 192.168.255.255. One can use the following addresses for hosts, even though they end with 255: 192.168.1.255, 192.168.2.255, etc. Also, 192.168.0.0 is the network identifier and must not be assigned to an interface. The addresses 192.168.1.0, 192.168.2.0, etc., may be assigned, despite ending with 0. In the past, conflict between network addresses and broadcast addresses arose because some software used non-standard broadcast addresses with zeros instead of ones. In networks smaller than /24, broadcast addresses do not necessarily end with 255. For example, a CIDR subnet 203.0.113.16/28 has the broadcast address 203.0.113.31. As a special case, a /31 network has capacity for just two hosts. These networks are typically used for point-to-point connections. There is no network identifier or broadcast address for these networks. Address resolution Hosts on the Internet are usually known by names, e.g., www.example.com, not primarily by their IP address, which is used for routing and network interface identification. The use of domain names requires translating, called resolving, them to addresses and vice versa. This is analogous to looking up a phone number in a phone book using the recipient's name. The translation between addresses and domain names is performed by the Domain Name System (DNS), a hierarchical, distributed naming system that allows for the subdelegation of namespaces to other DNS servers. Unnumbered interface A unnumbered point-to-point (PtP) link, also called a transit link, is a link that doesn't have any IP network or subnet number associated with it, but still have a IP address. First introduced in 1993. The only purposes of a transit link is to route datagrams. Unnumbered link is used to free IP addresses, when having a scarce IP address space, or reduce the management of assigning IP and configuration of interfaces. Previous every link needs to dedicated /30 or /31 subnet using 2-4 IP addresses per point to point link. When a link is unnumbered a router-id is used, router-id is IP address /32 borrowed from a defined (normally a loopback) interface. The same router-id can be used on multiple interfaces. One of the disadvantage to unnumbered interface, is that is harder to do remote testing and management. Phil Karn from Qualcomm is credit as original designer. Address space exhaustion Since the 1980s, it was apparent that the pool of available IPv4
changed in transit by a network address translation device. The options field is not often used. Packets containing some options may be considered as dangerous by some routers and be blocked. Note that the value in the IHL field must include enough extra 32-bit words to hold all the options plus any padding needed to ensure that the header contains an integer number of 32-bit words. If IHL is greater than 5 (i.e., it is from 6 to 15) it means that the options field is present and must be considered. The list of options may be terminated with an EOOL (End of Options List, 0x00) option; this is only necessary if the end of the options would not otherwise coincide with the end of the header. The possible options that can be put in the header are as follows: {| class=wikitable ! Field !! Size (bits) !! Description |- | Copied || 1 || Set to 1 if the options need to be copied into all fragments of a fragmented packet. |- | Option Class || 2 || A general options category. 0 is for control options, and 2 is for debugging and measurement. 1 and 3 are reserved. |- | Option Number || 5 || Specifies an option. |- | Option Length || 8 || Indicates the size of the entire option (including this field). This field may not exist for simple options. |- | Option Data || Variable || Option-specific data. This field may not exist for simple options. |} The table below shows the defined options for IPv4. The Option Type column is derived from the Copied, Option Class, and Option Number bits as defined above. {| class=wikitable style="text-align: center;" ! Option Type (decimal / hexadecimal) !! Option Name !! Description |- | 0 / 0x00 || EOOL || End of Option List |- | 1 / 0x01 || NOP || No Operation |- | 2 / 0x02 || SEC || Security (defunct) |- | 7 / 0x07 || RR || Record Route |- | 10 / 0x0A || ZSU || Experimental Measurement |- | 11 / 0x0B || MTUP || MTU Probe |- | 12 / 0x0C || MTUR || MTU Reply |- | 15 / 0x0F || ENCODE || ENCODE |- | 25 / 0x19 || QS || Quick-Start |- | 30 / 0x1E || EXP || RFC3692-style Experiment |- | 68 / 0x44 || TS || Time Stamp |- | 82 / 0x52 || TR || Traceroute |- | 94 / 0x5E || EXP || RFC3692-style Experiment |- | 130 / 0x82 || SEC || Security (RIPSO) |- | 131 / 0x83 || LSR || Loose Source Route |- | 133 / 0x85 || E-SEC || Extended Security (RIPSO) |- | 134 / 0x86 || CIPSO || Commercial IP Security Option |- | 136 / 0x88 || SID || Stream ID |- | 137 / 0x89 || SSR || Strict Source Route |- | 142 / 0x8E || VISA || Experimental Access Control |- | 144 / 0x90 || IMITD || IMI Traffic Descriptor |- | 145 / 0x91 || EIP || Extended Internet Protocol |- | 147 / 0x93 || ADDEXT || Address Extension |- | 148 / 0x94 || RTRALT || Router Alert |- | 149 / 0x95 || SDB || Selective Directed Broadcast |- | 151 / 0x97 || DPS || Dynamic Packet State |- | 152 / 0x98 || UMP || Upstream Multicast Pkt. |- | 158 / 0x9E || EXP || RFC3692-style Experiment |- | 205 / 0xCD || FINN || Experimental Flow Control |- | 222 / 0xDE || EXP || RFC3692-style Experiment |} Data The packet payload is not included in the checksum. Its contents are interpreted based on the value of the Protocol header field. List of IP protocol numbers contains a complete list of payload protocol types. Some of the common payload protocols include: Fragmentation and reassembly The Internet Protocol enables traffic between networks. The design accommodates networks of diverse physical nature; it is independent of the underlying transmission technology used in the link layer. Networks with different hardware usually vary not only in transmission speed, but also in the maximum transmission unit (MTU). When one network wants to transmit datagrams to a network with a smaller MTU, it may fragment its datagrams. In IPv4, this function was placed at the Internet Layer and is performed in IPv4 routers limiting exposure to these issues by hosts. In contrast, IPv6, the next generation of the Internet Protocol, does not allow routers to perform fragmentation; hosts must perform Path MTU Discovery before sending datagrams. Fragmentation When a router receives a packet, it examines the destination address and determines the outgoing interface to use and that interface's MTU. If the packet size is bigger than the MTU, and the Do not Fragment (DF) bit in the packet's header is set to 0, then the router may fragment the packet. The router divides the packet into fragments. The maximum size of each fragment is the outgoing MTU minus the IP header size (20 bytes minimum; 60 bytes maximum). The router puts each fragment into its own packet, each fragment packet having the following changes: The total length field is the fragment size. The more fragments (MF) flag is set for all fragments except the last one, which is set to 0. The fragment offset field is set, based on the offset of the fragment in the original data payload. This is measured in units of 8-byte blocks. The header checksum field is recomputed. For example, for an MTU of 1,500 bytes and a header size of 20 bytes, the fragment offsets would be multiples of (0, 185, 370, 555, 740, etc.). It is possible that a packet is fragmented at one router, and that the fragments are further fragmented at another router. For example, a packet of 4,520 bytes, including a 20 bytes IP header is fragmented to two packets on a link with an MTU of 2,500 bytes: The total data size is preserved: 2,480 bytes + 2,020 bytes = 4,500 bytes. The offsets are and . When forwarded to a link with an MTU of 1,500 bytes, each fragment is fragmented into two fragments: Again, the data size is preserved: 1,480 + 1,000 = 2,480, and 1,480 + 540 = 2,020. Also in this case, the More Fragments bit remains 1 for all the fragments that came with 1 in them and for the last fragment that arrives, it works as usual, that is the MF bit is set to 0 only in the last one. And of course, the Identification field continues to have the same value in all re-fragmented fragments. This way, even if fragments are re-fragmented, the receiver knows they have initially all started from the same packet. The last offset and last data size are used to calculate the total data size: . Reassembly A receiver knows that a packet is a fragment, if at least one of the following conditions is true: The flag more fragments is set, which is true for all fragments except the last. The field fragment offset is nonzero, which is true for all fragments except the first. The
usable addresses. Rather, the longer addresses simplify allocation of addresses, enable efficient route aggregation, and allow implementation of special addressing features. In IPv4, complex Classless Inter-Domain Routing (CIDR) methods were developed to make the best use of the small address space. The standard size of a subnet in IPv6 is 264 addresses, about four billion times the size of the entire IPv4 address space. Thus, actual address space utilization will be small in IPv6, but network management and routing efficiency are improved by the large subnet space and hierarchical route aggregation. Multicasting Multicasting, the transmission of a packet to multiple destinations in a single send operation, is part of the base specification in IPv6. In IPv4 this is an optional (although commonly implemented) feature. IPv6 multicast addressing has features and protocols in common with IPv4 multicast, but also provides changes and improvements by eliminating the need for certain protocols. IPv6 does not implement traditional IP broadcast, i.e. the transmission of a packet to all hosts on the attached link using a special broadcast address, and therefore does not define broadcast addresses. In IPv6, the same result is achieved by sending a packet to the link-local all nodes multicast group at address ff02::1, which is analogous to IPv4 multicasting to address 224.0.0.1. IPv6 also provides for new multicast implementations, including embedding rendezvous point addresses in an IPv6 multicast group address, which simplifies the deployment of inter-domain solutions. In IPv4 it is very difficult for an organization to get even one globally routable multicast group assignment, and the implementation of inter-domain solutions is arcane. Unicast address assignments by a local Internet registry for IPv6 have at least a 64-bit routing prefix, yielding the smallest subnet size available in IPv6 (also 64 bits). With such an assignment it is possible to embed the unicast address prefix into the IPv6 multicast address format, while still providing a 32-bit block, the least significant bits of the address, or approximately 4.2 billion multicast group identifiers. Thus each user of an IPv6 subnet automatically has available a set of globally routable source-specific multicast groups for multicast applications. Stateless address autoconfiguration (SLAAC) IPv6 hosts configure themselves automatically. Every interface has a self-generated link-local address and, when connected to a network, conflict resolution is performed and routers provide network prefixes via router advertisements. Stateless configuration of routers can be achieved with a special router renumbering protocol. When necessary, hosts may configure additional stateful addresses via Dynamic Host Configuration Protocol version 6 (DHCPv6) or static addresses manually. Like IPv4, IPv6 supports globally unique IP addresses. The design of IPv6 intended to re-emphasize the end-to-end principle of network design that was originally conceived during the establishment of the early Internet by rendering network address translation obsolete. Therefore, every device on the network is globally addressable directly from any other device. A stable, unique, globally addressable IP address would facilitate tracking a device across networks. Therefore, such addresses are a particular privacy concern for mobile devices, such as laptops and cell phones. To address these privacy concerns, the SLAAC protocol includes what are typically called "privacy addresses" or, more correctly, "temporary addresses", codified in RFC 4941, "Privacy Extensions for Stateless Address Autoconfiguration in IPv6". Temporary addresses are random and unstable. A typical consumer device generates a new temporary address daily and will ignore traffic addressed to an old address after one week. Temporary addresses are used by default by Windows since XP SP1, macOS since (Mac OS X) 10.7, Android since 4.0, and iOS since version 4.3. Use of temporary addresses by Linux distributions varies. Renumbering an existing network for a new connectivity provider with different routing prefixes is a major effort with IPv4. With IPv6, however, changing the prefix announced by a few routers can in principle renumber an entire network, since the host identifiers (the least-significant 64 bits of an address) can be independently self-configured by a host. The SLAAC address generation method is implementation-dependent. IETF recommends that addresses be deterministic but semantically opaque. IPsec Internet Protocol Security (IPsec) was originally developed for IPv6, but found widespread deployment first in IPv4, for which it was re-engineered. IPsec was a mandatory part of all IPv6 protocol implementations, and Internet Key Exchange (IKE) was recommended, but with RFC 6434 the inclusion of IPsec in IPv6 implementations was downgraded to a recommendation because it was considered impractical to require full IPsec implementation for all types of devices that may use IPv6. However, as of RFC 4301 IPv6 protocol implementations that do implement IPsec need to implement IKEv2 and need to support a minimum set of cryptographic algorithms. This requirement will help to make IPsec implementations more interoperable between devices from different vendors. The IPsec Authentication Header (AH) and the Encapsulating Security Payload header (ESP) are implemented as IPv6 extension headers. Simplified processing by routers The packet header in IPv6 is simpler than the IPv4 header. Many rarely used fields have been moved to optional header extensions. With the simplified IPv6 packet header the process of packet forwarding by routers has been simplified. Although IPv6 packet headers are at least twice the size of IPv4 packet headers, processing of packets that only contain the base IPv6 header by routers may, in some cases, be more efficient, because less processing is required in routers due to the headers being aligned to match common word sizes. However, many devices implement IPv6 support in software (as opposed to hardware), thus resulting in very bad packet processing performance. Additionally, for many implementations, the use of Extension Headers causes packets to be processed by a router's CPU, leading to poor performance or even security issues. Moreover, an IPv6 header does not include a checksum. The IPv4 header checksum is calculated for the IPv4 header, and has to be recalculated by routers every time the time to live (called hop limit in the IPv6 protocol) is reduced by one. The absence of a checksum in the IPv6 header furthers the end-to-end principle of Internet design, which envisioned that most processing in the network occurs in the leaf nodes. Integrity protection for the data that is encapsulated in the IPv6 packet is assumed to be assured by both the link layer or error detection in higher-layer protocols, namely the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) on the transport layer. Thus, while IPv4 allowed UDP datagram headers to have no checksum (indicated by 0 in the header field), IPv6 requires a checksum in UDP headers. IPv6 routers do not perform IP fragmentation. IPv6 hosts are required either to perform path MTU discovery, perform end-to-end fragmentation, or send packets no larger than the default maximum transmission unit (MTU), which is 1280 octets. Mobility Unlike mobile IPv4, mobile IPv6 avoids triangular routing and is therefore as efficient as native IPv6. IPv6 routers may also allow entire subnets to move to a new router connection point without renumbering. Extension headers The IPv6 packet header has a minimum size of 40 octets (320 bits). Options are implemented as extensions. This provides the opportunity to extend the protocol in the future without affecting the core packet structure. However, RFC 7872 notes that some network operators drop IPv6 packets with extension headers when they traverse transit autonomous systems. Jumbograms IPv4 limits packets to 65,535 (216−1) octets of payload. An IPv6 node can optionally handle packets over this limit, referred to as jumbograms, which can be as large as 4,294,967,295 (232−1) octets. The use of jumbograms may improve performance over high-MTU links. The use of jumbograms is indicated by the Jumbo Payload Option extension header. IPv6 packets An IPv6 packet has two parts: a header and payload. The header consists of a fixed portion with minimal functionality required for all packets and may be followed by optional extensions to implement special features. The fixed header occupies the first 40 octets (320 bits) of the IPv6 packet. It contains the source and destination addresses, traffic class, hop count, and the type of the optional extension or payload which follows the header. This Next Header field tells the receiver how to interpret the data which follows the header. If the packet contains options, this field contains the option type of the next option. The "Next Header" field of the last option points to the upper-layer protocol that is carried in the packet's payload. The current use of the IPv6 Traffic Class field divides this between a 6 bit Differentiated Services Code Point and a 2-bit Explicit Congestion Notification field. Extension headers carry options that are used for special treatment of a packet in the network, e.g., for routing, fragmentation, and for security using the IPsec framework. Without special options, a payload must be less than . With a Jumbo Payload option (in a Hop-By-Hop Options extension header), the payload must be less than 4 GB. Unlike with IPv4, routers never fragment a packet. Hosts are expected to use Path MTU Discovery to make their packets small enough to reach the destination without needing to be fragmented. See IPv6 packet fragmentation. Addressing IPv6 addresses have 128 bits. The design of the IPv6 address space implements a different design philosophy than in IPv4, in which subnetting was used to improve the efficiency of utilization of the small address space. In IPv6, the address space is deemed large enough for the foreseeable future, and a local area subnet always uses 64 bits for the host portion of the address, designated as the interface identifier, while the most-significant 64 bits are used as the routing prefix. While the myth has existed regarding IPv6 subnets being impossible to scan, RFC 7707 notes that patterns resulting from some IPv6 address configuration techniques and algorithms allow address scanning in many real-world scenarios. Address representation The 128 bits of an IPv6 address are represented in 8 groups of 16 bits each. Each group is written as four hexadecimal digits (sometimes called hextets or more formally hexadectets and informally a quibble or quad-nibble) and the groups are separated by colons (:). An example of this representation is . For convenience and clarity, the representation of an IPv6 address may be shortened with the following rules. One or more leading zeros from any group of hexadecimal digits are removed, which is usually done to all of the leading zeros. For example, the group is converted to . Consecutive sections of zeros are replaced with two colons (::). This may only be used once in an address, as multiple use would render the address indeterminate. requires that a double colon not be used to denote an omitted single section of zeros. An example of application of these rules: Initial address: . After removing all leading zeros in each group: . After omitting consecutive sections of zeros: . The loopback address is defined in and is abbreviated to by using both rules. As an IPv6 address may have more than one representation, the IETF has issued a proposed standard for representing them in text. Because IPv6 addresses contain colons, and URLs use colons to separate the host from the port number, RFC2732 specifies that an IPv6 address used as the host-part of a URL should be enclosed in square brackets, e.g. http://[2001:db8:4006:812::200e] or http://[2001:db8:4006:812::200e]:8080/path/page.html. Link-local address All interfaces of IPv6 hosts require a link-local address, which have the prefix . This prefix is combined with a 64-bit suffix, which the host can compute and assign by itself without the presence or cooperation of an external network component like a DHCP server, in a process called link-local address autoconfiguration. The lower 64 bits of the link-local address (the suffix) were originally derived from the MAC address of the underlying network interface card. As this method of assigning addresses would cause undesirable address changes when faulty network cards were replaced, and as it also suffered from a number of security and privacy issues, RFC 8064 has replaced the original MAC-based method with the hash-based method specified in RFC 7217. Address uniqueness and router solicitation IPv6 uses a new mechanism for mapping IP addresses to link-layer addresses (MAC addresses), because it does not support the broadcast addressing method, on which the functionality of the Address Resolution Protocol (ARP) in IPv4 is based. IPv6 implements the Neighbor Discovery Protocol (NDP, ND) in the link layer, which relies on ICMPv6 and multicast transmission. IPv6 hosts verify the uniqueness of their IPv6 addresses in a local area network (LAN) by sending a neighbor solicitation message asking for the link-layer address of the IP address. If any other host in the LAN is using that address, it responds. A host bringing up a new IPv6 interface first generates a unique link-local address using one of several mechanisms designed to generate a unique address. Should a non-unique address be detected, the host can try again with a newly generated address. Once a unique link-local address is established, the IPv6 host determines whether the LAN is connected on this link to any router interface that supports IPv6. It does so by sending out an ICMPv6 router solicitation message to the all-routers multicast group with its link-local address as source. If there is no answer after a predetermined number of attempts, the host concludes that no routers are connected. If it does get a response, known as a router advertisement, from a router, the response includes the network configuration information to allow establishment of a globally unique address with an appropriate unicast network prefix. There are also two flag bits that tell the host whether it should use DHCP to get further information and addresses: The Manage bit, which indicates whether or not the host should use DHCP to obtain additional addresses rather than rely on an auto-configured address from the router advertisement. The Other bit, which indicates whether or not the host should obtain other information through DHCP. The other information consists of one or more prefix information options for the subnets that the host is attached to, a lifetime for the prefix, and two flags: On-link: If this flag is set, the host will treat all addresses on the specific subnet as being on-link and send packets directly to them instead of sending them to a router for the duration of the given lifetime. Address: This flag tells the host to actually create a global address. Global addressing The assignment procedure for global addresses is similar to local-address construction. The prefix is supplied from router advertisements on the network. Multiple prefix announcements cause multiple addresses to be configured. Stateless address autoconfiguration (SLAAC) requires a address block, as defined in . Local Internet registries are assigned at least blocks, which they divide among subordinate networks. The initial recommendation stated assignment of a subnet to end-consumer sites (). This was replaced by , which "recommends giving home sites significantly more than a single , but does not recommend that every home site be given a either". s are specifically considered. It remains to be seen whether ISPs will honor this recommendation. For example, during initial trials, Comcast customers were given a single network. IPv6 in the Domain Name System In the Domain Name System (DNS), hostnames are mapped to IPv6 addresses by AAAA ("quad-A") resource records. For reverse resolution, the IETF reserved the domain ip6.arpa, where the name space is hierarchically divided by the 1-digit hexadecimal representation of nibble units (4 bits) of the IPv6 address. This scheme is defined in . When a dual-stack host queries a DNS server to resolve a fully qualified domain name (FQDN), the DNS client of the host sends two DNS requests, one querying A records and the other querying AAAA records. The host operating system may be configured with a preference for address selection rules . An alternate record type was used in early DNS implementations for IPv6, designed to facilitate network renumbering, the A6 records for the forward lookup and a number of other innovations such as bit-string labels and DNAME records. It is defined in and its references (with further discussion of the pros and cons of both schemes in ), but has been deprecated to experimental status (). Transition mechanisms IPv6 is not foreseen to supplant IPv4 instantaneously. Both protocols will continue to operate simultaneously for some time. Therefore, IPv6 transition mechanisms are needed to enable IPv6 hosts to reach IPv4 services and to allow isolated IPv6 hosts and networks to reach each other over IPv4 infrastructure. According to Silvia Hagen, a dual-stack implementation of the IPv4 and IPv6 on devices is the easiest way to migrate to IPv6. Many other transition mechanisms use tunneling to encapsulate IPv6 traffic within IPv4 networks and vice versa. This is an imperfect solution, which reduces the maximum transmission unit (MTU) of a link and therefore complicates Path MTU Discovery, and may increase latency. Dual-stack IP implementation Dual-stack IP implementations provide complete
replaced with two colons (::). This may only be used once in an address, as multiple use would render the address indeterminate. requires that a double colon not be used to denote an omitted single section of zeros. An example of application of these rules: Initial address: . After removing all leading zeros in each group: . After omitting consecutive sections of zeros: . The loopback address is defined in and is abbreviated to by using both rules. As an IPv6 address may have more than one representation, the IETF has issued a proposed standard for representing them in text. Because IPv6 addresses contain colons, and URLs use colons to separate the host from the port number, RFC2732 specifies that an IPv6 address used as the host-part of a URL should be enclosed in square brackets, e.g. http://[2001:db8:4006:812::200e] or http://[2001:db8:4006:812::200e]:8080/path/page.html. Link-local address All interfaces of IPv6 hosts require a link-local address, which have the prefix . This prefix is combined with a 64-bit suffix, which the host can compute and assign by itself without the presence or cooperation of an external network component like a DHCP server, in a process called link-local address autoconfiguration. The lower 64 bits of the link-local address (the suffix) were originally derived from the MAC address of the underlying network interface card. As this method of assigning addresses would cause undesirable address changes when faulty network cards were replaced, and as it also suffered from a number of security and privacy issues, RFC 8064 has replaced the original MAC-based method with the hash-based method specified in RFC 7217. Address uniqueness and router solicitation IPv6 uses a new mechanism for mapping IP addresses to link-layer addresses (MAC addresses), because it does not support the broadcast addressing method, on which the functionality of the Address Resolution Protocol (ARP) in IPv4 is based. IPv6 implements the Neighbor Discovery Protocol (NDP, ND) in the link layer, which relies on ICMPv6 and multicast transmission. IPv6 hosts verify the uniqueness of their IPv6 addresses in a local area network (LAN) by sending a neighbor solicitation message asking for the link-layer address of the IP address. If any other host in the LAN is using that address, it responds. A host bringing up a new IPv6 interface first generates a unique link-local address using one of several mechanisms designed to generate a unique address. Should a non-unique address be detected, the host can try again with a newly generated address. Once a unique link-local address is established, the IPv6 host determines whether the LAN is connected on this link to any router interface that supports IPv6. It does so by sending out an ICMPv6 router solicitation message to the all-routers multicast group with its link-local address as source. If there is no answer after a predetermined number of attempts, the host concludes that no routers are connected. If it does get a response, known as a router advertisement, from a router, the response includes the network configuration information to allow establishment of a globally unique address with an appropriate unicast network prefix. There are also two flag bits that tell the host whether it should use DHCP to get further information and addresses: The Manage bit, which indicates whether or not the host should use DHCP to obtain additional addresses rather than rely on an auto-configured address from the router advertisement. The Other bit, which indicates whether or not the host should obtain other information through DHCP. The other information consists of one or more prefix information options for the subnets that the host is attached to, a lifetime for the prefix, and two flags: On-link: If this flag is set, the host will treat all addresses on the specific subnet as being on-link and send packets directly to them instead of sending them to a router for the duration of the given lifetime. Address: This flag tells the host to actually create a global address. Global addressing The assignment procedure for global addresses is similar to local-address construction. The prefix is supplied from router advertisements on the network. Multiple prefix announcements cause multiple addresses to be configured. Stateless address autoconfiguration (SLAAC) requires a address block, as defined in . Local Internet registries are assigned at least blocks, which they divide among subordinate networks. The initial recommendation stated assignment of a subnet to end-consumer sites (). This was replaced by , which "recommends giving home sites significantly more than a single , but does not recommend that every home site be given a either". s are specifically considered. It remains to be seen whether ISPs will honor this recommendation. For example, during initial trials, Comcast customers were given a single network. IPv6 in the Domain Name System In the Domain Name System (DNS), hostnames are mapped to IPv6 addresses by AAAA ("quad-A") resource records. For reverse resolution, the IETF reserved the domain ip6.arpa, where the name space is hierarchically divided by the 1-digit hexadecimal representation of nibble units (4 bits) of the IPv6 address. This scheme is defined in . When a dual-stack host queries a DNS server to resolve a fully qualified domain name (FQDN), the DNS client of the host sends two DNS requests, one querying A records and the other querying AAAA records. The host operating system may be configured with a preference for address selection rules . An alternate record type was used in early DNS implementations for IPv6, designed to facilitate network renumbering, the A6 records for the forward lookup and a number of other innovations such as bit-string labels and DNAME records. It is defined in and its references (with further discussion of the pros and cons of both schemes in ), but has been deprecated to experimental status (). Transition mechanisms IPv6 is not foreseen to supplant IPv4 instantaneously. Both protocols will continue to operate simultaneously for some time. Therefore, IPv6 transition mechanisms are needed to enable IPv6 hosts to reach IPv4 services and to allow isolated IPv6 hosts and networks to reach each other over IPv4 infrastructure. According to Silvia Hagen, a dual-stack implementation of the IPv4 and IPv6 on devices is the easiest way to migrate to IPv6. Many other transition mechanisms use tunneling to encapsulate IPv6 traffic within IPv4 networks and vice versa. This is an imperfect solution, which reduces the maximum transmission unit (MTU) of a link and therefore complicates Path MTU Discovery, and may increase latency. Dual-stack IP implementation Dual-stack IP implementations provide complete IPv4 and IPv6 protocol stacks in the operating system of a computer or network device on top of the common physical layer implementation, such as Ethernet. This permits dual-stack hosts to participate in IPv6 and IPv4 networks simultaneously. The method is defined in . A device with dual-stack implementation in the operating system has an IPv4 and IPv6 address, and can communicate with other nodes in the LAN or the Internet using either IPv4 or IPv6. The Domain Name System (DNS) protocol is used by both IP protocols to resolve fully qualified domain names (FQDN) and IP addresses, but dual stack requires that the resolving DNS server can resolve both types of addresses. Such a dual stack DNS server would hold IPv4 addresses in the A records, and IPv6 addresses in the AAAA records. Depending on the destination that is to be resolved, a DNS name server may return an IPv4 or IPv6 IP address, or both. A default address selection mechanism, or preferred protocol, needs to be configured either on hosts or the DNS server. The IETF has published Happy Eyeballs to assist dual stack applications, so that they can connect using both IPv4 and IPv6, but prefer an IPv6 connection if it is available. However, dual-stack also needs to be implemented on all routers between the host and the service for which the DNS server has returned an IPv6 address. Dual-stack clients should only be configured to prefer IPv6, if the network is able to forward IPv6 packets using the IPv6 versions of routing protocols. When dual stack networks protocols are in place the application layer can be migrated to IPv6. While dual-stack is supported by major operating system and network device vendors, legacy networking hardware and servers don't support IPv6. ISP customers with public-facing IPv6 Internet service providers (ISPs) are increasingly providing their business and private customers with public-facing IPv6 global unicast addresses. If IPv4 is still used in the local area network (LAN), however, and the ISP can only provide one public-facing IPv6 address, the IPv4 LAN addresses are translated into the public facing IPv6 address using NAT64, a network address translation (NAT) mechanism. Some ISPs cannot provide their customers with public-facing IPv4 and IPv6 addresses, thus supporting dual-stack networking, because some ISPs have exhausted their globally routable IPv4 address pool. Meanwhile, ISP customers are still trying to reach IPv4 web servers and other destinations. A significant percentage of ISPs in all regional Internet registry (RIR) zones have obtained IPv6 address space. This includes many of the world's major ISPs and mobile network operators, such as Verizon Wireless, StarHub Cable, Chubu Telecommunications, Kabel Deutschland, Swisscom, T-Mobile, Internode and Telefonica. While some ISPs still allocate customers only IPv4 addresses, many ISPs allocate their customers only an IPv6 or dual-stack IPv4 and IPv6. ISPs report the share of IPv6 traffic from customers over their network to be anything between 20% and 40%, but by mid-2017 IPv6 traffic still only accounted for a fraction of total traffic at several large Internet exchange points (IXPs). AMS-IX reported it to be 2% and SeattleIX reported 7%. A 2017 survey found that many DSL customers that were served by a dual stack ISP did not request DNS servers to resolve fully qualified domain names into IPv6 addresses. The survey also found that the majority of traffic from IPv6-ready web-server resources were still requested and served over IPv4, mostly due to ISP customers that did not use the dual stack facility provided by their ISP and to a lesser extent due to customers of IPv4-only ISPs. Tunneling The technical basis for tunneling, or encapsulating IPv6 packets in IPv4 packets, is outlined in RFC 4213. When the Internet backbone was IPv4-only, one of the frequently used tunneling protocols was 6to4. Teredo tunneling was also frequently used for integrating IPv6 LANs with the IPv4 Internet backbone. Teredo is outlined in RFC 4380 and allows IPv6 local area networks to tunnel over IPv4 networks, by encapsulating IPv6 packets within UDP. The Teredo relay is an IPv6 router that mediates between a Teredo server and the native IPv6 network. It was expected that 6to4 and Teredo would be widely deployed until ISP networks would switch to native IPv6, but by 2014 Google Statistics showed that the use of both mechanisms had dropped to almost 0. IPv4-mapped IPv6 addresses Hybrid dual-stack IPv6/IPv4 implementations recognize a special class of addresses, the IPv4-mapped IPv6 addresses. These addresses are typically written with a 96-bit prefix in the standard IPv6 format, and the remaining 32 bits are written in the customary dot-decimal notation of IPv4. Addresses in this group consist of an 80-bit prefix of zeros, the next 16 bits are ones, and the remaining, least-significant 32 bits contain the IPv4 address. For example, represents the IPv4 address . A previous format, called "IPv4-compatible IPv6 address", was ; however, this method is deprecated. Because of the significant internal differences between IPv4 and IPv6 protocol stacks, some of the lower-level functionality available to programmers in the IPv6 stack does not work the same when used with IPv4-mapped addresses. Some common IPv6 stacks do not implement the IPv4-mapped address feature, either because the IPv6 and IPv4 stacks are separate implementations (e.g., Microsoft Windows 2000, XP, and Server 2003), or because of security concerns (OpenBSD). On these operating systems, a program must open a separate socket for each IP protocol it uses. On some systems, e.g., the Linux kernel, NetBSD, and FreeBSD, this feature is controlled by the socket option IPV6_V6ONLY. The address prefix is a class of IPv4-embedded IPv6 addresses for use in NAT64 transition methods. For example, represents the IPv4 address . Security A number of security implications may arise from the use of IPv6. Some of them may be related with the IPv6 protocols themselves, while others may be related with implementation flaws. Shadow networks The addition of nodes having IPv6 enabled by default by the software manufacturer, may result in the inadvertent creation of shadow networks, causing IPv6 traffic flowing into networks having only IPv4 security management in place. This may also occur with operating system upgrades, when the newer operating system enables IPv6 by default, while the older one did not. Failing to update the security infrastructure to accommodate IPv6 can lead to IPv6 traffic bypassing it. Shadow networks have occurred on business networks in which enterprises are replacing Windows XP systems that do not have an IPv6 stack enabled by default, with Windows 7 systems, that do. Some IPv6 stack implementors have therefore recommended disabling IPv4 mapped addresses and instead using a dual-stack network where supporting
deformation. They wrapped tight cloth straps around the heads of newborns to shape their soft skulls into a more conical form, thus distinguishing the nobility from other social classes. The Incas made human sacrifices. As many as 4,000 servants, court officials, favorites and concubines were killed upon the death of the Inca Huayna Capac in 1527. The Incas performed child sacrifices around important events, such as the death of the Sapa Inca or during a famine. These sacrifices were known as qhapaq hucha. Deities The Incas were polytheists who worshipped many gods. These included: Viracocha (also Pachacamac) – Created all living things Apu Illapu – Rain God, prayed to when they need rain Ayar Cachi – Hot-tempered God, causes earthquakes Illapa – Goddess of lightning and thunder (also Yakumama water goddess) Inti – sun god and patron deity of the holy city of Cusco (home of the sun) Kuychi – Rainbow God, connected with fertility Mama Killa – Wife of Inti, called Moon Mother Mama Occlo – Wisdom to civilize the people, taught women to weave cloth and build houses Manco Cápac – known for his courage and sent to earth to become first king of the Incas. Taught people how to grow plants, make weapons, work together, share resources and worship the Gods Pachamama – The Goddess of earth and wife of Viracocha. People give her offerings of coca leaves and beer and pray to her for major agricultural occasions Quchamama – Goddess of the sea Sachamama – Means Mother Tree, goddess in the shape of a snake with two heads Yakumama – Means mother Water. Represented as a snake. When she came to earth she transformed into a great river (also Illapa). Economy The Inca Empire employed central planning. The Inca Empire traded with outside regions, although they did not operate a substantial internal market economy. While axe-monies were used along the northern coast, presumably by the provincial mindaláe trading class, most households in the empire lived in a traditional economy in which households were required to pay taxes, usually in the form of the mit'a corvée labor, and military obligations, though barter (or trueque) was present in some areas. In return, the state provided security, food in times of hardship through the supply of emergency resources, agricultural projects (e.g. aqueducts and terraces) to increase productivity, and occasional feasts hosted by Inca officials for their subjects. While mit'a was used by the state to obtain labor, individual villages had a pre-inca system of communal work, known as mink'a. This system survives to the modern day, known as mink'a or faena. The economy rested on the material foundations of the vertical archipelago, a system of ecological complementarity in accessing resources and the cultural foundation of ayni, or reciprocal exchange. Government Beliefs The Sapa Inca was conceptualized as divine and was effectively head of the state religion. The Willaq Umu (or Chief Priest) was second to the emperor. Local religious traditions continued and in some cases such as the Oracle at Pachacamac on the Peruvian coast, were officially venerated. Following Pachacuti, the Sapa Inca claimed descent from Inti, who placed a high value on imperial blood; by the end of the empire, it was common to incestuously wed brother and sister. He was "son of the sun," and his people the intip churin, or "children of the sun," and both his right to rule and mission to conquer derived from his holy ancestor. The Sapa Inca also presided over ideologically important festivals, notably during the Inti Raymi, or "Sunfest" attended by soldiers, mummified rulers, nobles, clerics and the general population of Cusco beginning on the June solstice and culminating nine days later with the ritual breaking of the earth using a foot plow by the Inca. Moreover, Cusco was considered cosmologically central, loaded as it was with huacas and radiating ceque lines as the geographic center of the Four-Quarters; Inca Garcilaso de la Vega called it "the navel of the universe". Organization of the empire The Inca Empire was a federalist system consisting of a central government with the Inca at its head and four-quarters, or suyu: Chinchay Suyu (NW), Anti Suyu (NE), Kunti Suyu (SW) and Qulla Suyu (SE). The four corners of these quarters met at the center, Cusco. These suyu were likely created around 1460 during the reign of Pachacuti before the empire reached its largest territorial extent. At the time the suyu were established they were roughly of equal size and only later changed their proportions as the empire expanded north and south along the Andes. Cusco was likely not organized as a wamani, or province. Rather, it was probably somewhat akin to a modern federal district, like Washington, DC or Mexico City. The city sat at the center of the four suyu and served as the preeminent center of politics and religion. While Cusco was essentially governed by the Sapa Inca, his relatives and the royal panaqa lineages, each suyu was governed by an Apu, a term of esteem used for men of high status and for venerated mountains. Both Cusco as a district and the four suyu as administrative regions were grouped into upper hanan and lower hurin divisions. As the Inca did not have written records, it is impossible to exhaustively list the constituent wamani. However, colonial records allow us to reconstruct a partial list. There were likely more than 86 wamani, with more than 48 in the highlands and more than 38 on the coast. Suyu The most populous suyu was Chinchaysuyu, which encompassed the former Chimu empire and much of the northern Andes. At its largest extent, it extended through much of modern Ecuador and into modern Colombia. The largest suyu by area was Qullasuyu, named after the Aymara-speaking Qulla people. It encompassed the Bolivian Altiplano and much of the southern Andes, reaching Argentina and as far south as the Maipo or Maule river in Central Chile. Historian José Bengoa singled out Quillota as likely being the foremost Inca settlement in Chile. The second smallest suyu, Antisuyu, was northwest of Cusco in the high Andes. Its name is the root of the word "Andes." Kuntisuyu was the smallest suyu, located along the southern coast of modern Peru, extending into the highlands towards Cusco. Laws The Inca state had no separate judiciary or codified laws. Customs, expectations and traditional local power holders governed behavior. The state had legal force, such as through tokoyrikoq (lit. "he who sees all"), or inspectors. The highest such inspector, typically a blood relative to the Sapa Inca, acted independently of the conventional hierarchy, providing a point of view for the Sapa Inca free of bureaucratic influence. The Inca had three moral precepts that governed their behavior: Ama sua: Do not steal Ama llulla: Do not lie Ama quella: Do not be lazy Administration Colonial sources are not entirely clear or in agreement about Inca government structure, such as exact duties and functions of government positions. But the basic structure can be broadly described. The top was the Sapa Inca. Below that may have been the Willaq Umu, literally the "priest who recounts", the High Priest of the Sun. However, beneath the Sapa Inca also sat the Inkap rantin, who was a confidant and assistant to the Sapa Inca, perhaps similar to a Prime Minister. Starting with Topa Inca Yupanqui, a "Council of the Realm" was composed of 16 nobles: 2 from hanan Cusco; 2 from hurin Cusco; 4 from Chinchaysuyu; 2 from Cuntisuyu; 4 from Collasuyu; and 2 from Antisuyu. This weighting of representation balanced the hanan and hurin divisions of the empire, both within Cusco and within the Quarters (hanan suyukuna and hurin suyukuna). While provincial bureaucracy and government varied greatly, the basic organization was decimal. Taxpayers – male heads of household of a certain age range – were organized into corvée labor units (often doubling as military units) that formed the state's muscle as part of mit'a service. Each unit of more than 100 tax-payers were headed by a kuraka, while smaller units were headed by a kamayuq, a lower, non-hereditary status. However, while kuraka status was hereditary and typically served for life, the position of a kuraka in the hierarchy was subject to change based on the privileges of superiors in the hierarchy; a pachaka kuraka could be appointed to the position by a waranqa kuraka. Furthermore, one kuraka in each decimal level could serve as the head of one of the nine groups at a lower level, so that a pachaka kuraka might also be a waranqa kuraka, in effect directly responsible for one unit of 100 tax-payers and less directly responsible for nine other such units. Arts and technology Monumental architecture Architecture was the most important of the Incan arts, with textiles reflecting architectural motifs. The most notable example is Machu Picchu, which was constructed by Inca engineers. The prime Inca structures were made of stone blocks that fit together so well that a knife could not be fitted through the stonework. These constructs have survived for centuries, with no use of mortar to sustain them. This process was first used on a large scale by the Pucara (c. 300 BC–AD 300) peoples to the south in Lake Titicaca and later in the city of Tiwanaku (c. AD 400–1100) in present-day Bolivia. The rocks were sculpted to fit together exactly by repeatedly lowering a rock onto another and carving away any sections on the lower rock where the dust was compressed. The tight fit and the concavity on the lower rocks made them extraordinarily stable, despite the ongoing challenge of earthquakes and volcanic activity. Measures, calendrics and mathematics Physical measures used by the Inca were based on human body parts. Units included fingers, the distance from thumb to forefinger, palms, cubits and wingspans. The most basic distance unit was thatkiy or thatki, or one pace. The next largest unit was reported by Cobo to be the topo or tupu, measuring 6,000 thatkiys, or about ; careful study has shown that a range of is likely. Next was the wamani, composed of 30 topos (roughly ). To measure area, 25 by 50 wingspans were used, reckoned in topos (roughly ). It seems likely that distance was often interpreted as one day's walk; the distance between tambo way-stations varies widely in terms of distance, but far less in terms of time to walk that distance. Inca calendars were strongly tied to astronomy. Inca astronomers understood equinoxes, solstices and zenith passages, along with the Venus cycle. They could not, however, predict eclipses. The Inca calendar was essentially lunisolar, as two calendars were maintained in parallel, one solar and one lunar. As 12 lunar months fall 11 days short of a full 365-day solar year, those in charge of the calendar had to adjust every winter solstice. Each lunar month was marked with festivals and rituals. Apparently, the days of the week were not named and days were not grouped into weeks. Similarly, months were not grouped into seasons. Time during a day was not measured in hours or minutes, but in terms of how far the sun had travelled or in how long it had taken to perform a task. The sophistication of Inca administration, calendrics and engineering required facility with numbers. Numerical information was stored in the knots of quipu strings, allowing for compact storage of large numbers. These numbers were stored in base-10 digits, the same base used by the Quechua language and in administrative and military units. These numbers, stored in quipu, could be calculated on yupanas, grids with squares of positionally varying mathematical values, perhaps functioning as an abacus. Calculation was facilitated by moving piles of tokens, seeds or pebbles between compartments of the yupana. It is likely that Inca mathematics at least allowed division of integers into integers or fractions and multiplication of integers and fractions. According to mid-17th-century Jesuit chronicler Bernabé Cobo, the Inca designated officials to perform accounting-related tasks. These officials were called quipo camayos. Study of khipu sample VA 42527 (Museum für Völkerkunde, Berlin) revealed that the numbers arranged in calendrically significant patterns were used for agricultural purposes in the "farm account books" kept by the khipukamayuq (accountant or warehouse keeper) to facilitate the closing of accounting books. Tunics Tunics were created by skilled Incan textile-makers as a piece of warm clothing, but they also symbolized cultural and political status and power. Cumbi was the fine, tapestry-woven woolen cloth that was produced and necessary for the creation of tunics. Cumbi was produced by specially-appointed women and men. Generally, textile-making was practiced by both men and women. As emphasized by certain historians, only with European conquest was it deemed that women would become the primary weavers in society, as opposed to Incan society where specialty textiles were produced by men and women equally. Complex patterns and designs were meant to convey information about order in Andean society as well as the Universe. Tunics could also symbolize one's relationship to ancient rulers or important ancestors. These textiles were frequently designed to represent the physical order of a society, for example, the flow of tribute within an empire. Many tunics have a "checkerboard effect" which is known as the collcapata. According to historians Kenneth Mills, William B. Taylor, and Sandra Lauderdale Graham, the collcapata patterns "seem to have expressed concepts of commonality, and, ultimately, unity of all ranks of people, representing a careful kind of foundation upon which the structure of Inkaic universalism was built." Rulers wore various tunics throughout the year, switching them out for different occasions and feasts. The symbols present within the tunics suggest the importance of "pictographic expression" within Inkan and other Andean societies far before the iconographies of the Spanish Christians. Uncu Uncu was a men's garment similar to a tunic. It was an upper-body garment of knee-length; Royals wore it with a mantle cloth called ''yacolla.'' Ceramics, precious metals and textiles Ceramics were painted using the polychrome technique portraying numerous motifs including animals, birds, waves, felines (popular in the Chavin culture) and geometric patterns found in the Nazca style of ceramics. In a culture without a written language, ceramics portrayed the basic scenes of everyday life, including the smelting of metals, relationships and scenes of tribal warfare. The most distinctive Inca ceramic objects are the Cusco bottles or "aryballos". Many of these pieces are on display in Lima in the Larco Archaeological Museum and the National Museum of Archaeology, Anthropology and History. Almost all of the gold and silver work of the Incan empire was melted down by the conquistadors, and shipped back to Spain. Communication and medicine The Inca recorded information on assemblages of knotted strings, known as Quipu, although they can no longer be decoded. Originally it was thought that Quipu were used only as mnemonic devices or to record numerical data. Quipus are also believed to record history and literature. The Inca made many discoveries in medicine. They performed successful skull surgery, by cutting holes in the skull to alleviate fluid buildup and inflammation caused by head wounds. Many skull surgeries performed by Inca surgeons were successful. Survival rates were 80–90%, compared to about 30% before Inca times. Coca The Incas revered the coca plant as sacred/magical. Its leaves were used in moderate amounts to lessen hunger and pain during work, but were mostly used for religious and health purposes. The Spaniards took advantage of the effects of chewing coca leaves. The Chasqui, messengers who ran throughout the empire to deliver messages, chewed coca leaves for extra energy. Coca leaves were also used as an anaesthetic during surgeries. Weapons, armor and warfare The Inca army was the most powerful at that time, because any ordinary villager or farmer could be recruited as a soldier as part of the mit'a system of mandatory public service. Every able bodied male Inca of fighting age had to take part in war in some capacity at least once and to prepare for warfare again when needed. By the time the empire reached its largest size, every section of the empire contributed in setting up an army for war. The Incas had no iron or steel and their weapons were not much more effective than those of their opponents so they often defeated opponents by sheer force of numbers, or else by persuading them to surrender beforehand by offering generous terms. Inca weaponry included "hardwood spears launched using throwers, arrows, javelins, slings, the bolas, clubs, and maces with star-shaped heads made of copper or bronze." Rolling rocks downhill onto the enemy was a common strategy, taking advantage of the hilly terrain. Fighting was sometimes accompanied by drums and trumpets made of wood, shell or bone. Armor included: Helmets made of wood, cane, or animal skin, often lined with copper or bronze; some were adorned with feathers Round or square shields made from wood or hide Cloth tunics padded with cotton and small wooden planks to protect the spine Ceremonial metal breastplates, of copper, silver, and gold, have been found in burial sites, some of which may have also been used in battle. Roads allowed quick movement (on foot) for the Inca army and shelters called tambo and storage silos called qullqas were built one day's travelling distance from each other, so that an army on campaign could always be fed and rested. This can be seen in names of ruins such as Ollantay Tambo, or My Lord's Storehouse. These were set up so the Inca and his entourage would always have supplies (and possibly shelter) ready as they traveled. Banner of the Inca Chronicles and references from the 16th and 17th centuries support the idea of a banner. However, it represented the Inca (emperor), not the empire. Francisco López de Jerez wrote in 1534: () Chronicler Bernabé Cobo wrote: ()-Bernabé Cobo, Historia del Nuevo Mundo (1653) Guaman Poma's 1615 book, El primer nueva corónica
consisted of a central government with the Inca at its head and four provincial governments with strong leaders: Chinchasuyu (NW), Antisuyu (NE), Kuntisuyu (SW) and Qullasuyu (SE). Pachacuti is thought to have built Machu Picchu, either as a family home or summer retreat, although it may have been an agricultural station. Pachacuti sent spies to regions he wanted in his empire and they brought to him reports on political organization, military strength and wealth. He then sent messages to their leaders extolling the benefits of joining his empire, offering them presents of luxury goods such as high quality textiles and promising that they would be materially richer as his subjects. Most accepted the rule of the Inca as a fait accompli and acquiesced peacefully. Refusal to accept Inca rule resulted in military conquest. Following conquest the local rulers were executed. The ruler's children were brought to Cusco to learn about Inca administration systems, then return to rule their native lands. This allowed the Inca to indoctrinate them into the Inca nobility and, with luck, marry their daughters into families at various corners of the empire. Expansion and consolidation Traditionally the son of the Inca ruler led the army. Pachacuti's son Túpac Inca Yupanqui began conquests to the north in 1463 and continued them as Inca ruler after Pachacuti's death in 1471. Túpac Inca's most important conquest was the Kingdom of Chimor, the Inca's only serious rival for the Peruvian coast. Túpac Inca's empire then stretched north into modern-day Ecuador and Colombia. Túpac Inca's son Huayna Cápac added a small portion of land to the north in modern-day Ecuador. At its height, the Inca Empire included Peru, western and south central Bolivia, southwest Ecuador and a large portion of what is today Chile, north of the Maule River. Traditional historiography claims the advance south halted after the Battle of the Maule where they met determined resistance from the Mapuche. This view is challenged by historian Osvaldo Silva who argues instead that it was the social and political framework of the Mapuche that posed the main difficulty in imposing imperial rule. Silva does accept that the battle of the Maule was a stalemate, but argues the Incas lacked incentives for conquest they had had when fighting more complex societies such as the Chimú Empire. Silva also disputes the date given by traditional historiography for the battle: the late 15th century during the reign of Topa Inca Yupanqui (1471–93). Instead, he places it in 1532 during the Inca Civil War. Nevertheless, Silva agrees on the claim that the bulk of the Incan conquests were made during the late 15th century. At the time of the Incan Civil War an Inca army was, according to Diego de Rosales, subduing a revolt among the Diaguitas of Copiapó and Coquimbo. The empire's push into the Amazon Basin near the Chinchipe River was stopped by the Shuar in 1527. The empire extended into corners of Argentina and Colombia. However, most of the southern portion of the Inca empire, the portion denominated as Qullasuyu, was located in the Altiplano. The Inca Empire was an amalgamation of languages, cultures and peoples. The components of the empire were not all uniformly loyal, nor were the local cultures all fully integrated. The Inca empire as a whole had an economy based on exchange and taxation of luxury goods and labour. The following quote describes a method of taxation: For as is well known to all, not a single village of the highlands or the plains failed to pay the tribute levied on it by those who were in charge of these matters. There were even provinces where, when the natives alleged that they were unable to pay their tribute, the Inca ordered that each inhabitant should be obliged to turn in every four months a large quill full of live lice, which was the Inca's way of teaching and accustoming them to pay tribute. Inca Civil War and Spanish conquest Spanish conquistadors led by Francisco Pizarro and his brothers explored south from what is today Panama, reaching Inca territory by 1526. It was clear that they had reached a wealthy land with prospects of great treasure, and after another expedition in 1529 Pizarro traveled to Spain and received royal approval to conquer the region and be its viceroy. This approval was received as detailed in the following quote: "In July 1529 the Queen of Spain signed a charter allowing Pizarro to conquer the Incas. Pizarro was named governor and captain of all conquests in Peru, or New Castile, as the Spanish now called the land." When the conquistadors returned to Peru in 1532, a war of succession between the sons of Sapa Inca Huayna Capac, Huáscar and Atahualpa, and unrest among newly conquered territories weakened the empire. Perhaps more importantly, smallpox, influenza, typhus and measles had spread from Central America. The first epidemic of European disease in the Inca Empire was probably in the 1520s, killing Huayna Capac, his designated heir, and an unknown, probably large, number of other Incan subjects. The forces led by Pizarro consisted of 168 men, one cannon, and 27 horses. Conquistadors ported lances, arquebuses, steel armor and long swords. In contrast, the Inca used weapons made out of wood, stone, copper and bronze, while using an Alpaca fiber based armor, putting them at significant technological disadvantage—none of their weapons could pierce the Spanish steel armor. In addition, due to the absence of horses in Peru, the Inca did not develop tactics to fight cavalry. However, the Inca were still effective warriors, being able to successfully fight the Mapuche, which later would strategically defeat the Spanish as they expanded further south. The first engagement between the Inca and the Spanish was the Battle of Puná, near present-day Guayaquil, Ecuador, on the Pacific Coast; Pizarro then founded the city of Piura in July 1532. Hernando de Soto was sent inland to explore the interior and returned with an invitation to meet the Inca, Atahualpa, who had defeated his brother in the civil war and was resting at Cajamarca with his army of 80,000 troops, that were at the moment armed only with hunting tools (knives and lassos for hunting llamas). Pizarro and some of his men, most notably a friar named Vincente de Valverde, met with the Inca, who had brought only a small retinue. The Inca offered them ceremonial chicha in a golden cup, which the Spanish rejected. The Spanish interpreter, Friar Vincente, read the "Requerimiento" that demanded that he and his empire accept the rule of King Charles I of Spain and convert to Christianity. Atahualpa dismissed the message and asked them to leave. After this, the Spanish began their attack against the mostly unarmed Inca, captured Atahualpa as hostage, and forced the Inca to collaborate. Atahualpa offered the Spaniards enough gold to fill the room he was imprisoned in and twice that amount of silver. The Inca fulfilled this ransom, but Pizarro deceived them, refusing to release the Inca afterwards. During Atahualpa's imprisonment Huáscar was assassinated elsewhere. The Spaniards maintained that this was at Atahualpa's orders; this was used as one of the charges against Atahualpa when the Spaniards finally executed him, in August 1533. Although "defeat" often implies an unwanted loss in battle, many of the diverse ethnic groups ruled by the Inca "welcomed the Spanish invaders as liberators and willingly settled down with them to share rule of Andean farmers and miners." Many regional leaders, called Kurakas, continued to serve the Spanish overlords, called encomenderos, as they had served the Inca overlords. Other than efforts to spread the religion of Christianity, the Spanish benefited from and made little effort to change the society and culture of the former Inca Empire until the rule of Francisco de Toledo as viceroy from 1569 to 1581. Last Incas The Spanish installed Atahualpa's brother Manco Inca Yupanqui in power; for some time Manco cooperated with the Spanish while they fought to put down resistance in the north. Meanwhile, an associate of Pizarro, Diego de Almagro, attempted to claim Cusco. Manco tried to use this intra-Spanish feud to his advantage, recapturing Cusco in 1536, but the Spanish retook the city afterwards. Manco Inca then retreated to the mountains of Vilcabamba and established the small Neo-Inca State, where he and his successors ruled for another 36 years, sometimes raiding the Spanish or inciting revolts against them. In 1572 the last Inca stronghold was conquered and the last ruler, Túpac Amaru, Manco's son, was captured and executed. This ended resistance to the Spanish conquest under the political authority of the Inca state. After the fall of the Inca Empire many aspects of Inca culture were systematically destroyed, including their sophisticated farming system, known as the vertical archipelago model of agriculture. Spanish colonial officials used the Inca mita corvée labor system for colonial aims, sometimes brutally. One member of each family was forced to work in the gold and silver mines, the foremost of which was the titanic silver mine at Potosí. When a family member died, which would usually happen within a year or two, the family was required to send a replacement. The effects of smallpox on the Inca empire were even more devastating. Beginning in Colombia, smallpox spread rapidly before the Spanish invaders first arrived in the empire. The spread was probably aided by the efficient Inca road system. Smallpox was only the first epidemic. Other diseases, including a probable Typhus outbreak in 1546, influenza and smallpox together in 1558, smallpox again in 1589, diphtheria in 1614, and measles in 1618, all ravaged the Inca people. There would be periodic attempts by indigenous leaders to expel the Spanish colonists and re-create the Inca Empire until the late 18th century. See Juan Santos Atahualpa and Túpac Amaru II. Society Population The number of people inhabiting Tawantinsuyu at its peak is uncertain, with estimates ranging from 4–37 million. Most population estimates are in the range of 6 to 14 million. In spite of the fact that the Inca kept excellent census records using their quipus, knowledge of how to read them was lost as almost all fell into disuse and disintegrated over time or were destroyed by the Spaniards. Languages The empire was extremely linguistically diverse. Some of the most important languages were Quechua, Aymara, Puquina and Mochica, respectively mainly spoken in the Central Andes, the Altiplano or (Qullasuyu), the south Peruvian coast (Kuntisuyu), and the area of the north Peruvian coast (Chinchaysuyu) around Chan Chan, today Trujillo. Other languages included Quignam, Jaqaru, Leco, Uru-Chipaya languages, Kunza, Humahuaca, Cacán, Mapudungun, Culle, Chachapoya, Catacao languages, Manta, and Barbacoan languages, as well as numerous Amazonian languages on the frontier regions. The exact linguistic topography of the pre-Columbian and early colonial Andes remains incompletely understood, owing to the extinction of several languages and the loss of historical records. In order to manage this diversity, the Inca lords promoted the usage of Quechua, especially the variety of what is now Lima as the Qhapaq Runasimi ("great language of the people"), or the official language/lingua franca. Defined by mutual intelligibility, Quechua is actually a family of languages rather than one single language, parallel to the Romance or Slavic languages in Europe. Most communities within the empire, even those resistant to Inca rule, learned to speak a variety of Quechua (forming new regional varieties with distinct phonetics) in order to communicate with the Inca lords and mitma colonists, as well as the wider integrating society, but largely retained their native languages as well. The Incas also had their own ethnic language, referred to as Qhapaq simi ("royal language"), which is thought to have been closely related to or a dialect of Puquina. The split between Qhapaq simi and Qhapaq Runasimi exemplifies the larger split between hatun and hunin (high and low) society in general. There are several common misconceptions about the history of Quechua, as it is frequently identified as the "Inca language". Quechua did not originate with the Incas, had been a lingua franca in multiple areas before the Inca expansions, was diverse before the rise of the Incas, and it was not the native or original language of the Incas. However, the Incas left an impressive linguistic legacy, in that they introduced Quechua to many areas where it is still widely spoken today, including Ecuador, southern Bolivia, southern Colombia, and parts of the Amazon basin. The Spanish conquerors continued the official usage of Quechua during the early colonial period, and transformed it into a literary language. The Incas were not known to develop a written form of language; however, they visually recorded narratives through paintings on vases and cups (qirus). These paintings are usually accompanied by geometric patterns known as toqapu, which are also found in textiles. Researchers have speculated that toqapu patterns could have served as a form of written communication (e.g.: heraldry, or glyphs), however this remains unclear. The Incas also kept records by using quipus. Age and defining gender The high infant mortality rates that plagued the Inca Empire caused all newborn infants to be given the term 'wawa' when they were born. Most families did not invest very much into their child until they reached the age of two or three years old. Once the child reached the age of three, a "coming of age" ceremony occurred, called the rutuchikuy. For the Incas, this ceremony indicated that the child had entered the stage of "ignorance". During this ceremony, the family would invite all relatives to their house for food and dance, and then each member of the family would receive a lock of hair from the child. After each family member had received a lock, the father would shave the child's head. This stage of life was categorized by a stage of "ignorance, inexperience, and lack of reason, a condition that the child would overcome with time." For Incan society, in order to advance from the stage of ignorance to development the child must learn the roles associated with their gender. The next important ritual was to celebrate the maturity of a child. Unlike the coming of age ceremony, the celebration of maturity signified the child's sexual potency. This celebration of puberty was called warachikuy for boys and qikuchikuy for girls. The warachikuy ceremony included dancing, fasting, tasks to display strength, and family ceremonies. The boy would also be given new clothes and taught how to act as an unmarried man. The qikuchikuy signified the onset of menstruation, upon which the girl would go into the forest alone and return only once the bleeding had ended. In the forest she would fast, and, once returned, the girl would be given a new name, adult clothing, and advice. This "folly" stage of life was the time young adults were allowed to have sex without being a parent. Between the ages of 20 and 30, people were considered young adults, "ripe for serious thought and labor." Young adults were able to retain their youthful status by living at home and assisting in their home community. Young adults only reached full maturity and independence once they had married. At the end of life, the terms for men and women denote loss of sexual vitality and humanity. Specifically, the "decrepitude" stage signifies the loss of mental well-being and further physical decline. Marriage In the Incan Empire, the age of marriage differed for men and women: men typically married at the age of 20, while women usually got married about four years earlier at the age of 16. Men who were highly ranked in society could have multiple wives, but those lower in the ranks could only take a single wife. Marriages were typically within classes and resembled a more business-like agreement. Once married, the women were expected to cook, collect food and watch over the children and livestock. Girls and mothers would also work around the house to keep it orderly to please the public inspectors. These duties remained the same even after wives became pregnant and with the added responsibility of praying and making offerings to Kanopa, who was the god of pregnancy. It was typical for marriages to begin on a trial basis with both men and women having a say in the longevity of the marriage. If the man felt that it wouldn't work out or if the woman wanted to return to her parents' home the marriage would end. Once the marriage was final, the only way the two could be divorced was if they did not have a child together. Marriage within the Empire was crucial for survival. A family was considered disadvantaged if there was not a married couple at the center because everyday life centered around the balance of male and female tasks. Gender roles According to some historians, such as Terence N. D'Altroy, male and female roles were considered equal in Inca society. The "indigenous cultures saw the two genders as complementary parts of a whole." In other words, there was not a hierarchical structure in the domestic sphere for the Incas. Within the domestic sphere, women came to be known as weavers, although there is significant evidence to suggest that this gender role did not appear until colonizing Spaniards realized women's productive talents in this sphere and used it to their economic advantage. There is evidence to suggest that both men and women contributed equally to the weaving tasks in pre-Hispanic Andean culture. Women's everyday tasks included: spinning, watching the children, weaving cloth, cooking, brewing chichi, preparing fields for cultivation, planting seeds, bearing children, harvesting, weeding, hoeing, herding, and carrying water. Men on the other hand, "weeded, plowed, participated in combat, helped in the harvest, carried firewood, built houses, herded llama and alpaca, and spun and wove when necessary". This relationship between the genders may have been complementary. Unsurprisingly, onlooking Spaniards believed women were treated like slaves, because women did not work in Spanish society to the same extent, and certainly did not work in fields. Women were sometimes allowed to own land and herds because inheritance was passed down from both the mother's and father's side of the family. Kinship within the Inca society followed a parallel line of descent. In other words, women ascended from women and men ascended from men. Due to the parallel descent, a woman had access to land and other necessities through her mother. Religion Inca myths were transmitted orally until early Spanish colonists recorded them; however, some scholars claim that they were recorded on quipus, Andean knotted string records. The Inca believed in reincarnation. After death, the passage to the next world was fraught with difficulties. The spirit of the dead, camaquen, would need to follow a long road and during the trip the assistance of a black dog that could see in the dark was required. Most Incas imagined the after world to be like an earthly paradise with flower-covered fields and snow-capped mountains. It was important to the Inca that they not die as a result of burning or that the body of the deceased not be incinerated. Burning would cause their vital force to disappear and threaten their passage to the after world. The Inca nobility practiced cranial deformation. They wrapped tight cloth straps around the heads of newborns to shape their soft skulls into a more conical form, thus distinguishing the nobility from other social classes. The Incas made human
Spanish Peruvian writer INCA (singer) (born 1985), French singer Inka, nom de guerre of Danuta Siedzikówna (1928–1946), Polish national heroine, medical orderly in the Home Army Inka Bause (born 1968), German singer, TV presenter and actress Inka Essenhigh (born 1969), American painter Inka Friedrich (born 1965), German actress Inka Grings (born 1978), German footballer Inka Parei (born 1967), German writer Inka Wesely (born 1991), German footballer Places Inka (La Paz), a mountain in the La Paz Department, Bolivia İncə, Goychay, Azerbaijan İncə, Shaki, Azerbaijan Inca, Spain, a town on the island of Majorca in the Mediterranean Sea Transportation Los Incas - Parque Chas (Buenos Aires Underground), metro subway station SEAT Inca, a panel van Industri Kereta Api (INKA), a rolling stock manufacturer in Indonesia Ships Inca (schooner), the first five-masted schooner built on the
People Glacinei Martins or Inca (born 1973), Brazilian footballer Edwin Valero or El Inca (1981-2010), Venezuela boxer Garcilaso de la Vega (chronicler) or El Inca (1539–1616), Spanish Peruvian writer INCA (singer) (born 1985), French singer Inka, nom de guerre of Danuta Siedzikówna (1928–1946), Polish national heroine, medical orderly in the Home Army Inka Bause (born 1968), German singer, TV presenter and actress Inka Essenhigh (born 1969), American painter Inka Friedrich (born 1965), German actress Inka Grings (born 1978), German footballer Inka Parei (born 1967), German writer Inka Wesely (born 1991), German footballer Places Inka (La Paz), a mountain in the La Paz Department, Bolivia İncə, Goychay, Azerbaijan İncə, Shaki, Azerbaijan Inca, Spain, a town on the island of Majorca in the Mediterranean Sea Transportation Los Incas - Parque Chas (Buenos Aires Underground), metro subway station SEAT Inca, a panel van Industri Kereta Api (INKA), a rolling stock manufacturer in Indonesia Ships Inca (schooner), the
in use is IPv4; the number 4 identifies the protocol version, carried in every IP datagram. IPv4 is described in (1981). Version number 5 was used by the Internet Stream Protocol, an experimental streaming protocol that was not adopted. The successor to IPv4 is IPv6. IPv6 was a result of several years of experimentation and dialog during which various protocol models were proposed, such as TP/IX (), PIP () and TUBA (TCP and UDP with Bigger Addresses, ). Its most prominent difference from version 4 is the size of the addresses. While IPv4 uses 32 bits for addressing, yielding c. 4.3 billion () addresses, IPv6 uses 128-bit addresses providing ca. addresses. Although adoption of IPv6 has been slow, , most countries in the world show significant adoption of IPv6, with over 35% of Google's traffic being carried over IPv6 connections. The assignment of the new protocol as IPv6 was uncertain until due diligence assured that IPv6 had not been used previously. Other Internet Layer protocols have been assigned version numbers, such as 7 (IP/TX), 8 and 9 (historic). Notably, on April 1, 1994, the IETF published an April Fools' Day joke about IPv9. IPv9 was also used in an alternate proposed address space expansion called TUBA. A 2004 Chinese proposal for an "IPv9" protocol appears to be unrelated to all of these, and is not endorsed by the IETF. Reliability The design of the Internet protocol suite adheres to the end-to-end principle, a concept adapted from the CYCLADES project. Under the end-to-end principle, the network infrastructure is considered inherently unreliable at any single network element or transmission medium and is dynamic in terms of the availability of links and nodes. No central monitoring or performance measurement facility exists that tracks or maintains the state of the network. For the benefit of reducing network complexity, the intelligence in the network is purposely located in the end nodes. As a consequence of this design, the Internet Protocol only provides best-effort delivery and its service is characterized as unreliable. In network architectural parlance, it is a connectionless protocol, in contrast to connection-oriented communication. Various fault conditions may occur, such as data corruption, packet loss and duplication. Because routing is dynamic, meaning every packet is treated independently, and because the network maintains no state based on the path of prior packets, different packets may be routed to the same destination via different paths, resulting in out-of-order delivery to the receiver. All fault conditions in the network must be detected and compensated by the participating end nodes. The upper layer protocols of the Internet protocol suite are responsible for resolving reliability issues. For example, a host may buffer network data to ensure correct
of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers. For this purpose, IP defines packet structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram with source and destination information. IP was the connectionless datagram service in the original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974, which was complemented by a connection-oriented service that became the basis for the Transmission Control Protocol (TCP). The Internet protocol suite is therefore often referred to as TCP/IP. The first major version of IP, Internet Protocol Version 4 (IPv4), is the dominant protocol of the Internet. Its successor is Internet Protocol Version 6 (IPv6), which has been in increasing deployment on the public Internet since c. 2006. Function The Internet Protocol is responsible for addressing host interfaces, encapsulating data into datagrams (including fragmentation and reassembly) and routing datagrams from a source host interface to a destination host interface across one or more IP networks. For these purposes, the Internet Protocol defines the format of packets and provides an addressing system. Each datagram has two components: a header and a payload. The IP header includes source IP address, destination IP address, and other metadata needed to route and deliver the datagram. The payload is the data that is transported. This method of nesting the data payload in a packet with a header is called encapsulation. IP addressing entails the assignment of IP addresses and associated parameters to host interfaces. The address space is divided into subnetworks, involving the designation of network prefixes. IP routing is performed by all hosts, as well as routers, whose main function is to transport packets across network boundaries. Routers communicate with one another via specially designed routing protocols, either interior gateway protocols or exterior gateway protocols, as needed for the topology of the network. Version history In May 1974, the Institute of Electrical and Electronics Engineers (IEEE) published a paper entitled "A Protocol for Packet Network Intercommunication". The paper's authors, Vint Cerf and Bob Kahn, described an internetworking protocol for sharing resources using packet switching among network nodes. A central control component of this model was the "Transmission Control Program" that incorporated both connection-oriented links and datagram services between hosts. The monolithic Transmission
merits within ten days. The entire package is published for each senator before a single plenary session issues a call-out vote, which shall proceed to trial on a simple majority and close the case otherwise. Senate trial: A hearing for the complainant and the accused convenes within 48 hours of notification from deliberation, from which a trial is scheduled by the president of the Supreme Court no less than ten days after the hearing. The senators sit as judges, while witnesses are interrogated and cross-examined; all questions must be presented to the president of the Supreme Court, who, as prescribed in the Constitution, presides over the trial. The president of the Supreme Court allots time for debate and rebuttal, after which time the parties leave the chamber and the senators deliberate on the indictment. The President of the Supreme Court reads the summary of the grounds, the charges, the defense and the evidence to the Senate. The senators in turn issue their judgement. On conviction by a supermajority of two thirds, the president of the Supreme Court pronounces the sentence and the accused is immediately notified. If there is no supermajority for conviction, the accused is acquitted. Upon conviction, the officeholder has his or her political rights revoked for eight years, which bars them from running for any office during that time. Fernando Collor de Mello, the 32nd President of Brazil, resigned in 1992 amidst impeachment proceedings. Despite his resignation, the Senate nonetheless voted to convict him and bar him from holding any office for eight years, due to evidence of bribery and misappropriation. In 2016, the Chamber of Deputies initiated an impeachment case against President Dilma Rousseff on allegations of budgetary mismanagement, a crime of responsibility under the Constitution. On 12 May 2016, after 20 hours of deliberation, the admissibility of the accusation was approved by the Senate with 55 votes in favor and 22 against (an absolute majority would have been sufficient for this step) and Vice President Michel Temer was notified to assume the duties of the President pending trial. On August 31, 61 senators voted in favor of impeachment and 20 voted against it, thus achieving the 2/3 majority needed for Rousseff's definitive removal. A vote to disqualify her for five years was taken and failed (in spite of the Constitution not separating disqualification from removal) having less than two thirds in favor. Croatia The process of impeaching the president of Croatia can be initiated by a two-thirds majority vote in favor in the Sabor and is thereafter referred to the Constitutional Court, which must accept such a proposal with a two-thirds majority vote in favor in order for the president to be removed from office. This has never occurred in the history of the Republic of Croatia. In case of a successful impeachment motion a president's constitutional term of five years would be terminated and an election called within 60 days of the vacancy occurring. During the period of vacancy the presidential powers and duties would be carried out by the speaker of the Croatian Parliament in his/her capacity as Acting President of the Republic. Czech Republic In 2013, the constitution was changed. Since 2013, the process can be started by at least three-fifths of present senators, and must be approved by at least three-fifths of all members of the Chamber of Deputies. Also, the President can be impeached for high treason (newly defined in the Constitution) or any serious infringement of the Constitution. The process starts in the Senate of the Czech Republic which has the right to only impeach the president, and the Senate passes the case to the Constitutional Court of the Czech Republic, which has to decide the verdict against the president. If the Court finds the President guilty, then the President is removed from office and is permanently barred from being elected President of the Czech Republic again. No Czech president has ever been impeached, though members of the Senate sought to impeach President Václav Klaus in 2013. This case was dismissed by the court, which reasoned that his mandate had expired. Denmark In Denmark the possibility for current and former ministers being impeached was established with the Danish Constitution of 1849. Unlike many other countries Denmark does not have a Constitutional Court who would normally handle these types of cases. Instead Denmark has a special Court of Impeachment (In Danish: Rigsretten) which is called upon every time a current and former minister have been impeached. The role of the Impeachment Court is to process and deliver judgments against current and former ministers who are accused of unlawful conduct in office. The legal content of ministerial responsibility is laid down in the Ministerial Accountability Act which has its background in section 13 of the Danish Constitution, according to which the ministers' accountability is determined in more detail by law. In Denmark the normal practice in terms of impeachment cases is that it needs to be brought up in the Danish Parliament (Folketing) first for debate between the different members and parties in the parliament. After the debate the members of the Danish Parliament vote on whether a current or former minister needs to be impeached. If there is a majority in the Danish Parliament for an impeachment case against a current or former minister, an Impeachment Court is called into session. In Denmark the Impeachment Court consists of up to 15 Supreme Court judges and 15 parliament members appointed by the Danish Parliament. The members of the Impeachment Court in Denmark serve a six-year term in this position. In 1995 the former Minister of Justice Erik Ninn-Hansen from the Conservative People's Party was impeached in connection with the Tamil Case. The case was centered around the illegal processing of family reunification applications. From September 1987 to January 1989 applications for family reunification of Tamil refugees from civil war-torn Sri Lanka were put on hold in violation of Danish and International law. On 22 June 1995, Ninn-Hansen was found guilty of violating paragraph five subsection one of the Danish Ministerial Responsibility Act which says: A minister is punished if he intentionally or through gross negligence neglects the duties incumbent on him under the constitution or legislation in general or according to the nature of his post. A majority of the judges in that impeachment case voted for former Minister of Justice Erik Ninn-Hansen to receive a suspended sentence of four months with one year of probation. The reason why the sentence was made suspended was especially in relation to Ninn-Hansen's personal circumstances, in particular, his health and age - Ninn-Hansen was 73 years old when the sentence was handed down. After the verdict, Ninn-Hansen complained to the European Court of Human Rights and complained, among other things, that the Court of Impeachment was not impartial. The European Court of Human Rights dismissed the complaint on 18 May 1999. As a direct result and consequence of this case, the Conservative-led government and Prime Minister at that time Poul Schlüter was forced to step down from power. In February 2021 the former Minister for Immigration and Integration Inger Støjberg at that time member of the Danish Liberal Party Venstre was impeached when it was discovered that she had possibly against both Danish and International law tried to separate couples in refugee centres in Denmark, as the wives of the couples were under legal age. According to a commission report Inger Støjberg had also lied in the Danish Parliament and failed to report relevant details to the Parliamentary Ombudsman The decision to initiate an impeachment case was adopted by the Danish Parliament with a 141-30 vote and decision (In Denmark 90 members of the parliament need to vote for impeachment before it can be implemented). On 13 December 2021 former Minister for Immigration and Integration Inger Støjberg was convicted by the special Court of Impeachment of separating asylum seeker families illegally according to Danish and international law and sentenced to 60 days in prison. The majority of the judges in the special Court of Impeachment (25 out of 26 judges) found that it had been proven that Inger Støjberg on 10 February 2016 decided that an accommodation scheme should apply without the possibility of exceptions, so that all asylum-seeking spouses and cohabiting couples where one was a minor aged 15-17, had to be separated and accommodated separately in separate asylum centers. On 21 December, a majority in the Folketing voted that the sentence means that she is no longer worthy of sitting in the Folketing and she therefore immediately lost her seat. France In France the comparable procedure is called destitution. The president of France can be impeached by the French Parliament for willfully violating the Constitution or the national laws. The process of impeachment is written in the 68th article of the French Constitution. A group of senators or a group of members of the National Assembly can begin the process. Then, both the National Assembly and the Senate must acknowledge the impeachment. After the upper and lower houses' agreement, they unite to form the High Court. Finally, the High Court must decide to declare the impeachment of the president of France—or not. Germany The federal president of Germany can be impeached both by the Bundestag and by the Bundesrat for willfully violating federal law. Once the Bundestag or the Bundesrat impeaches the president, the Federal Constitutional Court decides whether the President is guilty as charged and, if this is the case, whether to remove him or her from office. The Federal Constitutional Court also has the power to remove federal judges from office for willfully violating core principles of the federal constitution or a state constitution. The impeachment procedure is regulated in Article 61 of the Basic Law for the Federal Republic of Germany. There is no formal impeachment process for the chancellor of Germany, however the Bundestag can replace the chancellor at any time by voting for a new chancellor (constructive vote of no confidence, Article 67 of the Basic Law). There has never been an impeachment against the President so far. Constructive votes of no confidence against the chancellor occurred in 1972 and 1982, with only the second one being successful. Hong Kong The chief executive of Hong Kong can be impeached by the Legislative Council. A motion for investigation, initiated jointly by at least one-fourth of all the legislators charging the Chief Executive with "serious breach of law or dereliction of duty" and refusing to resign, shall first be passed by the council. An independent investigation committee, chaired by the chief justice of the Court of Final Appeal, will then carry out the investigation and report back to the council. If the Council find the evidence sufficient to substantiate the charges, it may pass a motion of impeachment by a two-thirds majority. However, the Legislative Council does not have the power to actually remove the chief executive from office, as the chief executive is appointed by the Central People's Government (State Council of China). The council can only report the result to the Central People's Government for its decision. Hungary Article 13 of Hungary's Fundamental Law (constitution) provides for the process of impeaching and removing the president. The president enjoys immunity from criminal prosecution while in office, but may be charged with crimes committed during his term afterwards. Should the president violate the constitution while discharging his duties or commit a willful criminal offense, he may be removed from office. Removal proceedings may be proposed by the concurring recommendation of one-fifth of the 199 members of the country's unicameral Parliament. Parliament votes on the proposal by secret ballot, and if two thirds of all representatives agree, the president is impeached. Once impeached, the president's powers are suspended, and the Constitutional Court decides whether or not the President should be removed from office. India The president and judges, including the chief justice of the supreme court and high courts, can be impeached by the parliament before the expiry of the term for violation of the Constitution. Other than impeachment, no other penalty can be given to a president in position for the violation of the Constitution under Article 361 of the constitution. However a president after his/her term/removal can be punished for his already proven unlawful activity under disrespecting the constitution, etc. No president has faced impeachment proceedings. Hence, the provisions for impeachment have never been tested. The sitting president cannot be charged and needs to step down in order for that to happen. Ireland In the Republic of Ireland formal impeachment applies only to the Irish president. Article 12 of the Irish Constitution provides that, unless judged to be "permanently incapacitated" by the Supreme Court, the president can be removed from office only by the houses of the Oireachtas (parliament) and only for the commission of "stated misbehaviour". Either house of the Oireachtas may impeach the president, but only by a resolution approved by a majority of at least two thirds of its total number of members; and a house may not consider a proposal for impeachment unless requested to do so by at least thirty of its number. Where one house impeaches the president, the remaining house either investigates the charge or commissions another body or committee to do so. The investigating house can remove the president if it decides, by at least a two-thirds majority of its members, both that the president is guilty of the charge and that the charge is sufficiently serious as to warrant the president's removal. To date no impeachment of an Irish president has ever taken place. The president holds a largely ceremonial office, the dignity of which is considered important, so it is likely that a president would resign from office long before undergoing formal conviction or impeachment. Italy In Italy, according to Article 90 of the Constitution, the President of Italy can be impeached through a majority vote of the Parliament in joint session for high treason and for attempting to overthrow the Constitution. If impeached, the president of the Republic is then tried by the Constitutional Court integrated with sixteen citizens older than forty chosen by lot from a list compiled by the Parliament every nine years. Italian press and political forces made use of the term "impeachment" for the attempt by some members of parliamentary opposition to initiate the procedure provided for in Article 90 against Presidents Francesco Cossiga (1991), Giorgio Napolitano (2014) and Sergio Mattarella (2018). Japan By Article 78 of the Constitution of Japan, judges can be impeached. The voting method is specified by laws. The National Diet has two organs and they are 裁判官訴追委員会(Saibankan sotsui iinkai) and 裁判官弾劾裁判所(Saibankan dangai saibansho), which is established by Article 64 of the Constitution. The former has a role similar to prosecutor and the latter is analogous to Court. Seven judges were removed by them. Liechtenstein Members of the Liechtenstein Government can be impeached before the State Court for breaches of the Constitution or of other laws. As a hereditary monarchy the Sovereign Prince can not be impeached as he "is not subject to the jurisdiction of the courts and does not have legal responsibility". The same is true of any member of the Princely House who exercises the function of head of state should the Prince be temporarily prevented or in preparation for the Succession. Lithuania In the Republic of Lithuania, the president may be impeached by a three-fifths majority in the Seimas. President Rolandas Paksas was removed from office by impeachment on 6 April 2004 after the Constitutional Court of Lithuania found him guilty of having violated his oath and the constitution. He was the first European head of state to have been impeached. Norway Members of government, representatives of the national assembly (Stortinget) and Supreme Court judges can be impeached for criminal offenses tied to their duties and committed in office, according to the Constitution of 1814, §§ 86 and 87. The procedural rules were modeled after the U.S. rules and are quite similar to them. Impeachment has been used eight times since 1814, last in 1927. Many argue that impeachment has fallen into desuetude. In cases of impeachment, an appointed court (Riksrett) takes effect. Philippines Impeachment in the Philippines follows procedures similar to the United States. Under Sections2 and 3, Article XI, Constitution of the Philippines, the House of Representatives of the Philippines has the exclusive power to initiate all cases of impeachment against the president, vice president, members of the Supreme Court, members of the Constitutional Commissions (Commission on Elections, Civil Service Commission and the Commission on Audit), and the ombudsman. When a third of its membership has endorsed the impeachment articles, it is then transmitted to the Senate of the Philippines which tries and decide, as impeachment tribunal, the impeachment case. A main difference from U.S. proceedings however is that only one third of House members are required to approve the motion to impeach the president (as opposed to a simple majority of those present and voting in their U.S. counterpart). In the Senate, selected members of the House of Representatives act as the prosecutors and the senators act as judges with the Senate president presiding over the proceedings (the
(1780) and other states thereafter adopted the impeachment mechanism, but they restricted the punishment to removal of the official from office. In West Africa, Kings of the Ashanti Empire who violated any of the oaths taken during his or her enstoolment, were destooled by Kingmakers. For instance, if a king punished citizens arbitrarily or was exposed to be corrupt, he would be destooled. Destoolment entailed Kingmakers removing the sandals of the king and bumping his buttocks on the ground three times. Once destooled from office, his sanctity and thus reverence are lost as he cannot exercise any powers he had as king; this includes Chief administrator, Judge, and Military Commander. The now previous king is disposed of the Stool, swords and other regalia which symbolize his office and authority. He also loses the position as custodian of the land. However, despite being destooled from office, the king remains a member of the Royal Family from which he was elected. In various jurisdictions Brazil In Brazil, as in most other Latin American countries, "impeachment" refers to the definitive removal from office. The president of Brazil may be provisionally removed from office by the Chamber of Deputies and then tried and definitely removed from office by the Federal Senate. The Brazilian Constitution requires that two-thirds of the Deputies vote in favor of the opening of the impeachment process of the President and that two-thirds of the Senators vote for impeachment. State governors and municipal mayors can also be impeached by the respective legislative bodies. Article 2 of Law nº 1.079, from 10 April 1950, or “The Law of Impeachment,” states that “The crimes defined in this law, even when simply attempted, are subject to the penalty of loss of office, with disqualification for up to five years for the exercise of any public function, to be imposed by the Federal Senate in proceedings against the President of the Republic, Ministers of State, Ministers of the Supreme Federal Tribunal, or the Attorney General.” Initiation: An accusation of a responsibility crime against the President may be brought by any Brazilian citizen however the President of the Chamber of Deputies holds prerogative to accept the charge, which if accepted will be read at the next session and reported to the President of the Republic. Extraordinary Committee: An extraordinary committee is elected with member representation from each political party proportional to that party's membership. The President is then allowed ten parliamentary sessions for defense, which lead to two legislative sessions to form a rapporteur's legal opinion as to if impeachment proceedings will or will not be sent for a trial in the Senate. The rapporteur's opinion is voted on in the Committee; and on a simple majority it may be accepted. Failing that, the Committee adopts an opinion produced by the majority. For example, if the rapporteur's opinion is that no impeachment is warranted, and the Committee vote fails to accept it, then the Committee adopts the opinion to proceed with impeachment. Likewise, if the rapporteur's opinion is to proceed with impeachment, but it fails to achieve majority in the Committee, then the Committee adopts the opinion not to impeach. If the vote succeeds, then the rapporteur's opinion is adopted. Chamber of Deputies: The Chamber issues a call-out vote to accept the opinion of the Committee, requiring either a supermajority of two thirds in favor of an impeachment opinion (or a supermajority of two thirds against a dismissal opinion) of the Committee, in order to authorize the Senate impeachment proceedings. The President is suspended (provisionally removed) from office as soon as the Senate receives and accepts from the Chamber of Deputies the impeachment charges and decides to proceed with a trial. The Senate: The process in the Senate had been historically lacking in procedural guidance until 1992, when the Senate published in the Official Diary of the Union the step-by-step procedure of the Senate's impeachment process, which involves the formation of another special committee and closely resembles the lower house process, with time constraints imposed on the steps taken. The committee's opinion must be presented within 10 days, after which it is put to a call-out vote at the next session. The vote must proceed within a single session; the vote on President Rousseff took over 20 hours. A simple majority vote in the Senate begins formal deliberation on the complaint, immediately suspends the President from office, installs the Vice President as acting president, and begins a 20-day period for written defense as well as up to 180-days for the trial. In the event the trial proceeds slowly and exceeds 180 days, the Brazilian Constitution determines that the President is entitled to return and stay provisionally in office until the trial comes to its decision. Senate plenary deliberation: The committee interrogates the accused or their counsel, from which they have a right to abstain, and also a probative session which guarantees the accused rights to contradiction, or audiatur et altera pars, allowing access to the courts and due process of law under Article 5 of the constitution. The accused has 15 days to present written arguments in defense and answer to the evidence gathered, and then the committee shall issue an opinion on the merits within ten days. The entire package is published for each senator before a single plenary session issues a call-out vote, which shall proceed to trial on a simple majority and close the case otherwise. Senate trial: A hearing for the complainant and the accused convenes within 48 hours of notification from deliberation, from which a trial is scheduled by the president of the Supreme Court no less than ten days after the hearing. The senators sit as judges, while witnesses are interrogated and cross-examined; all questions must be presented to the president of the Supreme Court, who, as prescribed in the Constitution, presides over the trial. The president of the Supreme Court allots time for debate and rebuttal, after which time the parties leave the chamber and the senators deliberate on the indictment. The President of the Supreme Court reads the summary of the grounds, the charges, the defense and the evidence to the Senate. The senators in turn issue their judgement. On conviction by a supermajority of two thirds, the president of the Supreme Court pronounces the sentence and the accused is immediately notified. If there is no supermajority for conviction, the accused is acquitted. Upon conviction, the officeholder has his or her political rights revoked for eight years, which bars them from running for any office during that time. Fernando Collor de Mello, the 32nd President of Brazil, resigned in 1992 amidst impeachment proceedings. Despite his resignation, the Senate nonetheless voted to convict him and bar him from holding any office for eight years, due to evidence of bribery and misappropriation. In 2016, the Chamber of Deputies initiated an impeachment case against President Dilma Rousseff on allegations of budgetary mismanagement, a crime of responsibility under the Constitution. On 12 May 2016, after 20 hours of deliberation, the admissibility of the accusation was approved by the Senate with 55 votes in favor and 22 against (an absolute majority would have been sufficient for this step) and Vice President Michel Temer was notified to assume the duties of the President pending trial. On August 31, 61 senators voted in favor of impeachment and 20 voted against it, thus achieving the 2/3 majority needed for Rousseff's definitive removal. A vote to disqualify her for five years was taken and failed (in spite of the Constitution not separating disqualification from removal) having less than two thirds in favor. Croatia The process of impeaching the president of Croatia can be initiated by a two-thirds majority vote in favor in the Sabor and is thereafter referred to the Constitutional Court, which must accept such a proposal with a two-thirds majority vote in favor in order for the president to be removed from office. This has never occurred in the history of the Republic of Croatia. In case of a successful impeachment motion a president's constitutional term of five years would be terminated and an election called within 60 days of the vacancy occurring. During the period of vacancy the presidential powers and duties would be carried out by the speaker of the Croatian Parliament in his/her capacity as Acting President of the Republic. Czech Republic In 2013, the constitution was changed. Since 2013, the process can be started by at least three-fifths of present senators, and must be approved by at least three-fifths of all members of the Chamber of Deputies. Also, the President can be impeached for high treason (newly defined in the Constitution) or any serious infringement of the Constitution. The process starts in the Senate of the Czech Republic which has the right to only impeach the president, and the Senate passes the case to the Constitutional Court of the Czech Republic, which has to decide the verdict against the president. If the Court finds the President guilty, then the President is removed from office and is permanently barred from being elected President of the Czech Republic again. No Czech president has ever been impeached, though members of the Senate sought to impeach President Václav Klaus in 2013. This case was dismissed by the court, which reasoned that his mandate had expired. Denmark In Denmark the possibility for current and former ministers being impeached was established with the Danish Constitution of 1849. Unlike many other countries Denmark does not have a Constitutional Court who would normally handle these types of cases. Instead Denmark has a special Court of Impeachment (In Danish: Rigsretten) which is called upon every time a current and former minister have been impeached. The role of the Impeachment Court is to process and deliver judgments against current and former ministers who are accused of unlawful conduct in office. The legal content of ministerial responsibility is laid down in the Ministerial Accountability Act which has its background in section 13 of the Danish Constitution, according to which the ministers' accountability is determined in more detail by law. In Denmark the normal practice in terms of impeachment cases is that it needs to be brought up in the Danish Parliament (Folketing) first for debate between the different members and parties in the parliament. After the debate the members of the
is a lean, agile dog of the hound family. There are two hair types of the breed: smooth and wire. The more commonly seen type is the smooth. Some consider there to be a third type, long, but the longhair is most likely a variation of the wire. Description Looks The Ibizan Hound is an elegant and agile breed, with an athletic and attractive outline and a ground-covering springy trot. Though graceful in appearance, it has good bone girth and is a rugged/hardy breed. Its large upright ears — a hallmark of the breed — are broad at the base and frame a long and elegant headpiece. The neck is long and lean. It has a unique front assembly with well laid-back shoulders and relatively straight upper arm. Coming in both smooth and wire-coated varieties, their coat is a combination of red and white with the nose, ears, eye rims, and pads of feet being a light tan color. Its eyes are a striking amber color and have an alert and intelligent expression. The Ibizan may range in height, depending on which Standard you follow, from and weigh from , males being larger than females. Temperament Ibizan Hounds are intelligent, active, and engaging by nature. They rank 53rd in Stanley Coren's book The Intelligence of Dogs, considered average working/obedience intelligence, but many Ibizan owners enjoy recounting a multitude of examples of their problem-solving abilities. They are true "clowns" of the dog world, delighting in entertaining their people with their antics. Though somewhat independent and stubborn at times, they do take well to training if positive methods are used, but they will balk at punitive training methods. They are generally quiet but will alarm bark if necessary, so they make good watch dogs. They are sensitive hounds, and very good around children and other dogs alike. They generally make good house dogs but are active and athletic, therefore need a lot of daily exercise. They do not make good kennel dogs. Ibizan hounds are sweet, but they are very stubborn and independent. Ibizan Hounds are "escapologists": they are able to jump incredible heights from a standstill, so they need very tall fences. They also have been known to climb, and many can escape from crates and can open baby gates and even locks. They have a strong prey drive, therefore they cannot be trusted off leash unless in a safely enclosed area. Once off the leash, they might not come back for a long time. A hound that knows where its home is and the surrounding area will usually return unscathed. Health The Ibizan Hound is typical of the hound group in that it rarely suffers from hereditary illness. Minor health concerns for the breed include seizures and allergies; very rarely, one will see axonal dystrophy, cataract, retinal dysplasia and deafness in the breed. Ibizan Hound owners should have their dogs' eyes tested by a veterinarian before breeding. CERF and BAER testing is recommended for the breed. Ibizan Hounds are
recounting a multitude of examples of their problem-solving abilities. They are true "clowns" of the dog world, delighting in entertaining their people with their antics. Though somewhat independent and stubborn at times, they do take well to training if positive methods are used, but they will balk at punitive training methods. They are generally quiet but will alarm bark if necessary, so they make good watch dogs. They are sensitive hounds, and very good around children and other dogs alike. They generally make good house dogs but are active and athletic, therefore need a lot of daily exercise. They do not make good kennel dogs. Ibizan hounds are sweet, but they are very stubborn and independent. Ibizan Hounds are "escapologists": they are able to jump incredible heights from a standstill, so they need very tall fences. They also have been known to climb, and many can escape from crates and can open baby gates and even locks. They have a strong prey drive, therefore they cannot be trusted off leash unless in a safely enclosed area. Once off the leash, they might not come back for a long time. A hound that knows where its home is and the surrounding area will usually return unscathed. Health The Ibizan Hound is typical of the hound group in that it rarely suffers from hereditary illness. Minor health concerns for the breed include seizures and allergies; very rarely, one will see axonal dystrophy, cataract, retinal dysplasia and deafness in the breed. Ibizan Hound owners should have their dogs' eyes tested by a veterinarian before breeding. CERF and BAER testing is recommended for the breed. Ibizan Hounds are sensitive to barbiturate anesthesia, and typically live between 12 and 14 years. History DNA analysis indicates that the breed was formed recently from other breeds. The Ibizan Hound is similar in function and type to several breeds, such as the Pharaoh Hound, the Cirneco dell'Etna, the Portuguese Podengo, and the Podenco Canario. The Ibizan Hound is the largest of these breeds, classified by the Fédération Cynologique Internationale as primitive types. Use This breed originates in the island of Ibiza
perception alone. The neck is muscular and fairly long, and the head is carried high. It should appear to be longer than it is tall, and to be capable of catching and killing a wolf. Temperament An Irish wolfhound is most easily described by its historical motto, "gentle when stroked, fierce when provoked". They have a varied range of personalities and are most often noted for their personal quirks and individualism. An Irish Wolfhound, however, is rarely mindless, and, despite its large size, is usually not found to be too destructive. This is because the breed is generally introverted, intelligent, and reserved in character. An easygoing animal, the Irish Wolfhound is quiet and thoughtful by nature. Wolfhounds often create a strong bond with their family and can become quite destructive or morose if left alone for long periods of time. An Irish Wolfhound is an effective and imposing watch dog, able to ward off would-be wrongdoers, and can also be a good guard or protection dog. This is due to the Irish wolfhound’s profound loyalty and willingness to protect its family from any threat, however they are not ideal for guarding houses or the owner's possessions as wolfhounds are typically not territorial, because they were bred primarily for hunting and therefore more independent. The breed becomes attached to both owners and other dogs they are raised with and is therefore not the most adaptable of breeds. They should not be territorially aggressive to other domestic dogs but are born with specialized skills and, it is common for hounds at play to course another dog. This is a specific hunting behavior, not a fighting or territorial domination behavior. However, male dogs can be aloof and aggressive towards other males. Most Wolfhounds are very gentle with children. The Irish Wolfhound is relatively easy to train. They respond well to firm, but gentle, consistent leadership. However, historically these dogs were required to work at great distances from their masters and think independently when hunting rather than waiting for detailed commands and this can still be seen in the breed. Irish Wolfhounds are often favored for their loyalty, affection, patience, and devotion. Although at some points in history they have been used as protection dogs, unlike other guard dog breeds, the Irish Wolfhound can be unreliable in this role as they are often indifferent toward strangers, although their size can be a natural deterrent. However, when protection is required this dog is never found wanting. When they or their family are in any perceived danger they will act decisively in fearless nature. There have been several cases of Irish Wolfhound attacks, which are deadly, however they are atypical of the breed. Author and Irish Wolfhound breeder Linda Glover believes the dogs' close affinity with humans makes them acutely aware and sensitive to ill will or malicious intentions leading to their excelling as a guardian rather than guard dog. Health Like many large dog breeds, Irish Wolfhounds have a relatively short lifespan. Published lifespan estimations vary between 6 and 10 years with 7 years being the average. Dilated cardiomyopathy and bone cancer are the leading cause of death and like all deep-chested dogs, gastric torsion (bloat) is common; the breed is affected by hereditary intrahepatic portosystemic shunt. In a privately
disappeared from Ireland", with the wolfdog mentioned. Modern wolfhound Captain George Augustus Graham (1833–1909) of Rednock House, Dursley, Gloucestershire was responsible for creating the modern Irish wolfhound breed. He stated that he could not find the breed "in its original integrity" to work with: Based on the writings of others, Graham had formed the opinion that a dog resembling the original wolfhound could be recreated through using the biggest and best examples of the Scottish Deerhound and the Great Dane, two breeds which he believed had been derived earlier from the wolfhound. Into the mix went the Scottish Deerhound, the Great Dane, and Kathleen Pelham-Clinton, Duchess of Newcastle's Borzoi "Korotai", who had proved his wolf hunting abilities earlier in his native Russia. For an outbreed a "huge shaggy dog" was added, which may have possibly been a Tibetan Mastiff. The famous English Mastiff "Garnier's Lion" was bred to the Deerhound "Lufra", and their offspring "Marquis" entered wolfhound pedigrees through his granddaughter "Young Donagh". Graham included "a single outcross of Tibetan Wolf Dog". This was long assumed to have been a Tibetan Mastiff. However, a photograph of "Wolf" shows a bearded, long-coated dog—what would now be called a Tibetan kyi apso. In 1885 Captain Graham with other breeders founded the Irish Wolfhound Club, and the Breed Standard of Points to establish and agree the ideal to which breeders should aspire. The Wolfhound has been adopted as a symbol by both rugby codes. The national rugby league team is nicknamed the Wolfhounds, and the Irish Rugby Football Union, which governs rugby union, changed the name of the country's A (second-level) national team in that code to the Ireland Wolfhounds in 2010. One of the symbols that the tax authorities in both Ireland and Northern Ireland on their revenue stamps, have been the Irish wolfhound. In the video game Skyrim, the Irish Wolfhound is the breed of dog for all dogs in the base game. DNA analysis Genomic analysis indicates that although there has been some DNA sharing between the Irish wolfhound with the Deerhound, Whippet, and Greyhound, there has been significant sharing of DNA between the Irish Wolfhound with the Great Dane. One writer has stated that for the Irish Wolfhound, "the Great Dane appearance is strongly marked too prominently before the 20th Century". George Augustus Graham created the modern Irish wolfhound breed that retained the appearance of the original form but not its genetic ancestry. Description Appearance The Irish Wolfhound is characterised by its large size; it is often described as the tallest dog breed in the world. According to the FCI standard, the expected range of heights at the withers is ; minimum heights and weights are / and / for dogs and bitches respectively. It is more massively built than the Scottish Deerhound, but less so than the Great Dane. The coat is hard and rough on the head, body and legs, with the beard and the hair over the eyes particularly wiry. It may be black, brindle, fawn, grey, red, pure white, or any colour seen in the Deerhound. The Irish Wolfhound is a sighthound, and hunts by visual perception alone. The neck is muscular and fairly long, and the head is carried high. It should appear to be longer than it is
century to the United Kingdom, where they were known as Italian Greyhounds. The first volume of The Kennel Club Calendar and Stud Book, published in 1874, lists forty of them. The first breed association was the Italian Greyhound Club, founded in Britain in 1900. In the nine years from 2011 to 2019, the Ente Nazionale della Cinofilia Italiana recorded a total of 2557 new registrations of the Piccolo Levriero, with a minimum of 213 and a maximum of 333 per year. Characteristics The Italian Greyhound is the smallest of the sighthounds. It weighs no more than and stands at the withers. It is deep in the chest, with a tucked-up abdomen, long slender legs and a long neck that tapers down to a small head. The head is long and pointed. The gait should be high-stepping and well-sprung, with good forward extension in the trot, and a fast gallop. The coat may be solid black, grey or isabelline; white markings are accepted on the chest and feet only. Life expectancy is about 14
trot, and a fast gallop. The coat may be solid black, grey or isabelline; white markings are accepted on the chest and feet only. Life expectancy is about 14 years. The Ortheopedic Foundation for Animals has found the Italian Greyhound to be the least affected by hip dysplasia of 157 breeds studied, with an incidence of 0. Use The original function of the Piccolo Levriero was to hunt hare and rabbit; it is capable of bursts of speed up to . Although assigned to the sighthound or hare-coursing groups by the Fédération Cynologique Internationale and the Ente Nazionale della Cinofilia Italiana, the Italian Sighthound is – as it was in the
changing certain story elements. The 10-month tour played cities around the country, such as Fort Lauderdale, Florida, Los Angeles, and Atlanta. The tour ran at the John F. Kennedy Center for the Performing Arts from June 1989 to July 16, 1989, with the reviewer for The Washington Post writing: "his lovely score – poised between melody and dissonance – is the perfect measure of our tenuous condition. The songs invariably follow the characters' thinking patterns, as they weigh their options and digest their experience. Needless to say, that doesn't make for traditional show-stoppers. But it does make for vivacity of another kind. And Sondheim's lyrics...are brilliant.... I think you'll find these cast members alert and engaging." Original London production The original West End production opened on September 25, 1990 at the Phoenix Theatre and closed on February 23, 1991 after 197 performances. It was directed by Richard Jones, and produced by David Mirvish, with set design by Richard Hudson, choreography by Anthony Van Laast, costumes by Sue Blane and orchestrations by Jonathan Tunick. The cast featured Julia McKenzie as the Witch, Ian Bartholomew as the Baker, Imelda Staunton as the Baker's Wife and Clive Carter as the Wolf/Cinderella's Prince. The show received seven Olivier Award nominations in 1991, winning for Best Actress in a Musical (Staunton) and Best Director of a Musical (Jones). The song "Our Little World" was added. This song was a duet sung between the Witch and Rapunzel giving further insight into the care the Witch has for her self-proclaimed daughter and the desire Rapunzel has to see the world outside of her tower. The overall feel of the show was a lot darker than that of the original Broadway production. Critic Michael Billington wrote, "But the evening's triumph belongs also to director Richard Jones, set designer Richard Hudson and costume designer Sue Blane who evoke exactly the right mood of haunted theatricality. Old-fashioned footlights give the faces a sinister glow. The woods themselves are a semi-circular, black-and-silver screen punctuated with nine doors and a crazy clock: they achieve exactly the 'agreeable terror' of Gustave Dore's children's illustrations. And the effects are terrific: doors open to reveal the rotating magnified eyeball or the admonitory finger of the predatory giant." 1998 London revival production A new intimate production of the show opened (billed as the first London revival) at the Donmar Warehouse on 16 November 1998, closing on 13 February 1999. This revival was directed by John Crowley and designed by his brother, Bob Crowley. The cast included Clare Burt as the Witch, Nick Holder as the Baker, Sophie Thompson as the Baker's Wife, Jenna Russell as Cinderella, Sheridan Smith as Little Red Ridinghood and Frank Middlemass as the Narrator/Mysterious Man. Russell later appeared as the Baker's Wife in the 2010 Regent's Park production. Thompson won the 1999 Olivier Award for Best Actress in a Musical for her performance, while the production itself was nominated for Outstanding Musical Production. 2002 Broadway revival production A revival opened at the Ahmanson Theatre in Los Angeles, running from February 1, 2002 to March 24, 2002. This production was directed and choreographed with the same principal cast that later ran on Broadway. The 2002 Broadway revival, directed by James Lapine and choreographed by John Carrafa, began previews on April 13, 2002 and opened April 30, 2002 at the Broadhurst Theatre, closing on December 29 after a run of 18 previews and 279 regular performances. It starred Vanessa Williams as the Witch, John McMartin as the Narrator, Stephen DeRosa as the Baker, Kerry O'Malley as the Baker's Wife, Gregg Edelman as Cinderella's Prince/Wolf, Christopher Sieber as Rapunzel's Prince/Wolf, Molly Ephraim as Little Red Ridinghood, Adam Wylie as Jack, and Laura Benanti as Cinderella. Judi Dench provided the pre-recorded voice of the Giant. Lapine revised the script slightly for this production, with a cameo appearance of the Three Little Pigs restored from the earlier San Diego production. Other changes, apart from numerous small dialogue changes, included the addition of the song "Our Little World," a duet for the Witch and Rapunzel written for the first London production, the addition of a second wolf in the song "Hello Little Girl" who competes for Little Red's attention with the first Wolf, the portrayal of Jack's cow by a live performer (Chad Kimball) in an intricate costume and new lyrics were written for "Last Midnight," now a menacing lullaby sung by the Witch to the Baker's baby. This production featured scenic design by Douglas W. Schmidt, costume design by Susan Hilferty, lighting design by Brian MacDevitt, sound design by Dan Moses Schreier and projection design by Elaine J. McCarthy. The revival won the Tony Awards for the Best Revival of a Musical and Best Lighting Design. This Broadway revival wardrobe is on display at the Costume World in South Florida. London Royal Opera House, 2007 A revival at the Royal Opera House's Linbury Studio in Covent Garden had a limited run from June 14 through June 30, 2007 followed by a short stint at The Lowry theatre, Salford Quays, Manchester between 4–7 July. The production mixed Opera singers, Musical Theatre actors as well as Film and television actors; including Anne Reid as Jack's Mother and Gary Waldhorn as the Narrator. The production itself, directed by Will Tuckett, was met with mixed reviews; although there were clear stand out performances. The production completely sold out three weeks before opening. As this was an 'opera' production, the show and its performers were overlooked for the 'musical' nominations in the 2008 Olivier Awards. This production featured Suzie Toase (Little Red), Peter Caulfield (Jack), Beverley Klein (Witch), Anna Francolini (Baker's Wife), Clive Rowe (Baker), Nicholas Garrett (Wolf), and Lara Pulver (Lucinda). This was the second Sondheim musical to be staged by the Opera House, following 2003's Sweeney Todd. Regent's Park Open Air Theatre production, 2010 The Olivier Award-winning Regent's Park Open Air Theatre production, directed by Timothy Sheader and choreographed by Liam Steel, ran for a six-week limited season from 6 August to 11 September 2010. The cast included Hannah Waddingham as the Witch, Mark Hadfield as the Baker, Jenna Russell as the Baker's wife, Helen Dallimore as Cinderella, and Judi Dench as the recorded voice of the Giant. Gareth Valentine was the Musical Director. The musical was performed outdoors in a wooded area. Whilst the book remained mostly unchanged, the subtext of the plot was dramatically altered by casting the role of the Narrator as a young school boy lost in the woods following a family argument – a device used to further illustrate the musical's themes of parenting and adolescence. The production opened to wide critical acclaim, much of the press commenting on the effectiveness of the open air setting. The Telegraph reviewer, for example, wrote: "It is an inspired idea to stage this show in the magical, sylvan surroundings of Regent's Park, and designer Soutra Gilmour has come up with a marvellously rickety, adventure playground of a set, all ladders, stairs and elevated walkways, with Rapunzel discovered high up in a tree." The New York Times reviewer commented: "The natural environment makes for something genuinely haunting and mysterious as night falls on the audience..." Stephen Sondheim attended twice, reportedly extremely pleased with the production. The production also won the Laurence Olivier Award for Best Musical Revival and Michael Xavier, who played Cinderella's Prince and the Wolf, was nominated for the Laurence Olivier Award for Best Performance in a Supporting Role in a Musical. The production was recorded in its entirety, available to download and watch from Digital Theatre. Central Park Delacorte Theater production, 2012 The Regent's Park Open Air Theatre production transferred to the Public Theater's 2012 summer series of free performances Shakespeare in the Park at the Delacorte Theater in Central Park, New York, with an American cast as well as new designers. Sheader again was the director and Steel served as co-director and choreographer. Performances were originally to run from July 24 (delayed from July 23 due to the weather) to August 25, 2012, but the show was extended till September 1, 2012. The cast included Amy Adams as the Baker's Wife, Donna Murphy as the Witch, Denis O'Hare as the Baker, Chip Zien as the Mysterious Man/Cinderella's Father, Jack Broderick as the young Narrator, Gideon Glick as Jack, Cooper Grodin as Rapunzel's Prince, Ivan Hernandez as Cinderella's Prince/Wolf, Tina Johnson as Granny, Josh Lamon as the Steward, Jessie Mueller as Cinderella, Laura Shoop as Cinderella's Mother, Tess Soltau as Rapunzel, and Glenn Close as the Voice of the Giant. The set was a "collaboration between original Open Air Theatre designer Soutra Gilmour and...John Lee Beatty, [and] rises over 50 feet in the air, with a series of tree-covered catwalks and pathways." The production was dedicated to Nora Ephron, who died earlier in 2012. In February 2012 and in May 2012, reports of a possible Broadway transfer surfaced with the production's principal actors in negotiations to reprise their roles. In January 2013, it was announced that the production will not transfer to Broadway due to scheduling conflicts. Hollywood Bowl production, 2019 For its annual fully staged musical event, the Hollywood Bowl produced a limited run of Into the Woods from July 26–28, 2019, directed and choreographed by Robert Longbottom. The cast included Skylar Astin as the Baker, Sierra Boggess as Cinderella, Chris Carmack as Rapunzel's Prince, Anthony Crivello as the Mysterious Man, Sutton Foster as the Baker's Wife, Edward Hibbert as the Narrator, Cheyenne Jackson as Cinderella's Prince and the Wolf, Hailey Kilgore as Rapunzel, Gaten Matarazzo as Jack, Patina Miller as the Witch, Rebecca Spencer as Jack's Mother, Shanice Williams as Little Red Ridinghood, and Whoopi Goldberg as the voice of the Giant. Other productions A production played in Sydney from 19 March 1993 to 5 June 1993 at the Drama Theatre, Sydney Opera House. It starred Judi Connelli, Geraldine Turner, Tony Sheldon, Philip Quast, Pippa Grandison, and D. J. Foster. A Melbourne Theatre Company played from 17 January 1998 to 21 February 1998 at the Playhouse, Victorian Arts Centre. It starred Rhonda Burchmore, John McTernan, Gina Riley, Lisa McCune, Peter Carroll, Tamsin Carroll and Robert Grubb. The first professional Spanish language production, Dentro del Bosque, was produced by University of Puerto Rico Repertory Theatre and premiered in San Juan at Teatro de la Universidad (University Theatre) on March 14, 2013. The cast included Víctor Santiago as Baker, Ana Isabelle as Baker's Wife and Lourdes Robles as the Witch A 25th anniversary co-production between Baltimore's Center Stage and Westport Country Playhouse directed by Mark Lamos was notable for casting original Little Red Ridinghood, Danielle Ferland, as the Baker's Wife. The cast included Erik Liberman, Lauren Kennedy, Jeffry Denman, Cheryl Stern, Dana Steingold, Justin Scott Brown, Jenny Latimer, Alma Cuervo, Nikka Lanzarone, Eleni Delopoulos, Nik Walker, Robert Lenzi, Britney Coleman, and Jeremy Lawrence. The production received 2011-2012 Connecticut Critics Circle Awards for Best Production, Best Ensemble, and Steingold's Little Red Ridinghood. The Roundabout Theatre production, directed by Noah Brody and Ben Steinfeld, began performances Off-Broadway at the Laura Pels Theatre on December 19, 2014 in previews, officially on January 22, 2015, and closed on April 12, 2015. Like the original Broadway production 28 years prior, this production had a try-out run at the Old Globe Theatre in San Diego, California from July 12, 2014 – August 17, 2014 with the opening night taking place on July 17. This new version is completely minimalistically reimagined by the Fiasco Theater Company, featuring only ten actors playing multiple parts, and one piano accompanist. The DreamCatcher Theatre production opened in January 2015 and played a sold-out run at the Adrienne Arsht Center in Miami, Florida. Tituss Burgess starred as the Witch, the first male actor to do so. The cast also included Arielle Jacobs as the Baker's Wife. The musical had a production at The Muny in Forest Park, St. Louis, Missouri running from July 21 through 28 2015. The cast included Heather Headley (Witch), Erin Dilly (Baker's Wife), Rob McClure (Baker), Ken Page (Narrator), Elena Shaddow (Cinderella). The Hart House Theatre production in Toronto, Ontario from January 15, 2016 to January 30, 2016. A production ran at the West Yorkshire Playhouse in Leeds in a collaboration with Opera North from 2 June 2016 to 25 June 2016. 2016 Tel Aviv production The Israeli premiere, אל תוך היער (El Toch Ha-ya-ar), opened in Tel Aviv in August 2016 for a limited run produced by The Tramp Productions and Stuff Like That, starring Roi Dolev as the Witch, the second male actor to do so. Characters The main and supporting characters of Into the Woods. The Witch: Mezzo-Soprano The Baker: Baritone The Baker's Wife: Mezzo-Soprano Cinderella: Soprano Little Red Riding Hood: Mezzo-Soprano Jack: Tenor Rapunzel: Soprano Cinderella's Prince / The Wolf: Baritone Rapunzel's Prince: Bass-Baritone The Narrator / The Mysterious Man: Bass Casting history The principal original casts of notable stage productions of Into the Woods. Notable Broadway replacements The Witch: Phylicia Rashad, Betsy Joslyn, Nancy Dussault, Ellen Foley The Baker's Wife: Cynthia Sikes Yorkin The Narrator/Mysterious Man: Dick Cavett Cinderella: Patricia Ben Peterson Jack: Jeff Blumenkrantz Rapunzel: Marin Mazzie Rapunzel's Prince: Dean Butler Notable Broadway revival replacements Cinderella: Erin Dilly Additional The Witch: Tituss Burgess, Heather Headley, Lauren Kennedy, Lourdes Robles, Lea Salonga The Baker: Rob McClure The Baker's Wife: Erin Dilly, Ana Isabelle Cinderella: Elena Shaddow Cinderella's Prince/The Wolf: Philip Quast, Hayden Tee Adaptations Junior version The musical has been adapted into a child-friendly version for use by schools and young companies, with the second act completely removed, as well as almost half the material from the first. The show is shortened from the original 2 and a half hours to fit in a 50-minute range, and the music transposed into keys that more easily fit young voices. It is licensed through Music Theatre International Broadway Junior musicals. Film A theatrical film adaptation of the musical was produced by Walt Disney Pictures, directed by Rob Marshall, and starring Meryl Streep, Emily Blunt, James Corden, Anna Kendrick, Chris Pine, Tracey Ullman, Christine Baranski, Lilla Crawford, Daniel Huttlestone, MacKenzie Mauzy, Billy Magnussen, and Johnny Depp. The film was released on December 25, 2014. It was a critical and commercial hit, grossing over $213 million worldwide. For her performance as the Witch, Streep was nominated for the Academy Award for Best Supporting Actress. The film also received Academy Award nominations for Best Production Design and Best Costume Design. Analysis of book and music In most productions of Into the Woods, including the original Broadway production, several parts are doubled. Cinderella's Prince and the Wolf, who share the characteristic of being unable to control their appetites, are usually played by the same actor. Similarly, so are the Narrator and the Mysterious Man, who share the characteristic of commenting on the story while avoiding any personal involvement or responsibility. Granny and Cinderella's Mother, who are both matriarchal characters in the story, are also typically played by the same person, who also gives voice to the nurturing but later murderous Giant's Wife. The show covers multiple themes: growing up, parents and children, accepting responsibility, morality, and finally, wish fulfillment and its consequences. The Time Magazine reviewers wrote that the play's "basic insight... is at heart, most fairy tales are about the loving yet embattled relationship between parents and children. Almost everything that goes wrong—which is to say, almost everything that can—arises from a failure of parental or filial duty, despite the best intentions." Stephen Holden wrote that the themes of the show include parent-child relationships and the individual's responsibility to the community. The witch isn't just a scowling old hag, but a key symbol of moral ambivalence. James Lapine said that the most unpleasant person (the Witch) would have the truest things to say and the "nicer" people would be less honest. In the Witch's words: "I'm not good; I'm not nice; I'm just right." Given the show's debut during the 1980s, the height of the US AIDS crisis, the work has been interpreted to be a parable about AIDS. In this interpretation, the Giant's Wife serves as a metaphor for HIV/AIDS, killing good and bad characters indiscriminately and forcing the survivors to band together to stop the threat and move on from the devastation, reflecting the devastation to many communities during the AIDS crisis. When asked about the thematic connection, Sondheim acknowledged that initial audiences interpreted it as an AIDS metaphor, but stated that the work was not intended to be specific. The score is also notable in Sondheim's output, because of its intricate reworking and development of small musical motifs. In particular, the opening words, "I wish", are set to the interval of a rising major second and this small unit is both repeated and developed throughout the show, just as Lapine's book explores the consequences of self-interest and "wishing". The dialogue in the show is characterized by the heavy use of syncopated speech. In many instances, the characters' lines are delivered with a fixed beat that follows natural speech rhythms, but is also purposely composed in eighth, sixteenth, and quarter note rhythms as part of a spoken song. Like many Sondheim/Lapine productions, the songs contain thought-process narrative, where characters converse or think aloud. Sondheim drew on parts of his troubled childhood when writing the show. In 1987, he told Time Magazine that the "father uncomfortable with babies [was] his father, and [the] mother who regrets having had children [was] his mother." Awards and nominations Original Broadway production Original London production 1999 London revival 2002 Broadway revival 2010 London revival 2012 New York revival 2014 Australian production 2015 Off-Broadway production References External links Into the Woods 2012 lortel.org Into the Woods 2015 lortel.org Libretto for Into the Woods Into the Woods on The Stephen Sondheim Reference Guide Illustrated Book of Into the Woods article, Sondheim.com (2004) Into the Woods at the Music Theatre International website Into the Woods JR. at the Music Theatre International website "Profile: Into the Woods", Ovrtur: International Database of Musicals 1987 musicals Broadway musicals Drama Desk Award-winning musicals Musicals based on secular traditions Laurence Olivier Award-winning musicals Musicals by James Lapine Musicals by Stephen Sondheim West End musicals Plays based on fairy tales Works based on European myths and legends Musicals based on works by Charles Perrault Fantasy
Westenberg and Philip Hoffmann, while Jonathan Dokuchitz (who joined the Broadway production as an understudy in 1989) played Rapunzel's Prince in place of Wagner. This concert featured the duet "Our Little World," written for the first London production of the show. On November 9, 2014, most of the original cast reunited for two reunion concerts and discussion in Costa Mesa, California. Mo Rocca hosted the reunion and interviewed Stephen Sondheim and James Lapine as well as each cast member. Appearing were Bernadette Peters, Joanna Gleason, Chip Zien, Danielle Ferland, Ben Wright and real life husband and wife, Robert Westenberg and Kim Crosby. The same group presented this discussion/concert on June 21, 2015, at the Brooklyn Academy of Music, New York City. 1988 US tour production A United States tour began on November 22, 1988, with Cleo Laine playing the Witch, replaced by Betsy Joslyn in May 1989. Rex Robbins played the Narrator and Mysterious Man, Charlotte Rae played Jack's Mother, and the Princes were played by Chuck Wagner and Douglas Sills. The set was almost completely reconstructed, and there were certain changes to the script, changing certain story elements. The 10-month tour played cities around the country, such as Fort Lauderdale, Florida, Los Angeles, and Atlanta. The tour ran at the John F. Kennedy Center for the Performing Arts from June 1989 to July 16, 1989, with the reviewer for The Washington Post writing: "his lovely score – poised between melody and dissonance – is the perfect measure of our tenuous condition. The songs invariably follow the characters' thinking patterns, as they weigh their options and digest their experience. Needless to say, that doesn't make for traditional show-stoppers. But it does make for vivacity of another kind. And Sondheim's lyrics...are brilliant.... I think you'll find these cast members alert and engaging." Original London production The original West End production opened on September 25, 1990 at the Phoenix Theatre and closed on February 23, 1991 after 197 performances. It was directed by Richard Jones, and produced by David Mirvish, with set design by Richard Hudson, choreography by Anthony Van Laast, costumes by Sue Blane and orchestrations by Jonathan Tunick. The cast featured Julia McKenzie as the Witch, Ian Bartholomew as the Baker, Imelda Staunton as the Baker's Wife and Clive Carter as the Wolf/Cinderella's Prince. The show received seven Olivier Award nominations in 1991, winning for Best Actress in a Musical (Staunton) and Best Director of a Musical (Jones). The song "Our Little World" was added. This song was a duet sung between the Witch and Rapunzel giving further insight into the care the Witch has for her self-proclaimed daughter and the desire Rapunzel has to see the world outside of her tower. The overall feel of the show was a lot darker than that of the original Broadway production. Critic Michael Billington wrote, "But the evening's triumph belongs also to director Richard Jones, set designer Richard Hudson and costume designer Sue Blane who evoke exactly the right mood of haunted theatricality. Old-fashioned footlights give the faces a sinister glow. The woods themselves are a semi-circular, black-and-silver screen punctuated with nine doors and a crazy clock: they achieve exactly the 'agreeable terror' of Gustave Dore's children's illustrations. And the effects are terrific: doors open to reveal the rotating magnified eyeball or the admonitory finger of the predatory giant." 1998 London revival production A new intimate production of the show opened (billed as the first London revival) at the Donmar Warehouse on 16 November 1998, closing on 13 February 1999. This revival was directed by John Crowley and designed by his brother, Bob Crowley. The cast included Clare Burt as the Witch, Nick Holder as the Baker, Sophie Thompson as the Baker's Wife, Jenna Russell as Cinderella, Sheridan Smith as Little Red Ridinghood and Frank Middlemass as the Narrator/Mysterious Man. Russell later appeared as the Baker's Wife in the 2010 Regent's Park production. Thompson won the 1999 Olivier Award for Best Actress in a Musical for her performance, while the production itself was nominated for Outstanding Musical Production. 2002 Broadway revival production A revival opened at the Ahmanson Theatre in Los Angeles, running from February 1, 2002 to March 24, 2002. This production was directed and choreographed with the same principal cast that later ran on Broadway. The 2002 Broadway revival, directed by James Lapine and choreographed by John Carrafa, began previews on April 13, 2002 and opened April 30, 2002 at the Broadhurst Theatre, closing on December 29 after a run of 18 previews and 279 regular performances. It starred Vanessa Williams as the Witch, John McMartin as the Narrator, Stephen DeRosa as the Baker, Kerry O'Malley as the Baker's Wife, Gregg Edelman as Cinderella's Prince/Wolf, Christopher Sieber as Rapunzel's Prince/Wolf, Molly Ephraim as Little Red Ridinghood, Adam Wylie as Jack, and Laura Benanti as Cinderella. Judi Dench provided the pre-recorded voice of the Giant. Lapine revised the script slightly for this production, with a cameo appearance of the Three Little Pigs restored from the earlier San Diego production. Other changes, apart from numerous small dialogue changes, included the addition of the song "Our Little World," a duet for the Witch and Rapunzel written for the first London production, the addition of a second wolf in the song "Hello Little Girl" who competes for Little Red's attention with the first Wolf, the portrayal of Jack's cow by a live performer (Chad Kimball) in an intricate costume and new lyrics were written for "Last Midnight," now a menacing lullaby sung by the Witch to the Baker's baby. This production featured scenic design by Douglas W. Schmidt, costume design by Susan Hilferty, lighting design by Brian MacDevitt, sound design by Dan Moses Schreier and projection design by Elaine J. McCarthy. The revival won the Tony Awards for the Best Revival of a Musical and Best Lighting Design. This Broadway revival wardrobe is on display at the Costume World in South Florida. London Royal Opera House, 2007 A revival at the Royal Opera House's Linbury Studio in Covent Garden had a limited run from June 14 through June 30, 2007 followed by a short stint at The Lowry theatre, Salford Quays, Manchester between 4–7 July. The production mixed Opera singers, Musical Theatre actors as well as Film and television actors; including Anne Reid as Jack's Mother and Gary Waldhorn as the Narrator. The production itself, directed by Will Tuckett, was met with mixed reviews; although there were clear stand out performances. The production completely sold out three weeks before opening. As this was an 'opera' production, the show and its performers were overlooked for the 'musical' nominations in the 2008 Olivier Awards. This production featured Suzie Toase (Little Red), Peter Caulfield (Jack), Beverley Klein (Witch), Anna Francolini (Baker's Wife), Clive Rowe (Baker), Nicholas Garrett (Wolf), and Lara Pulver (Lucinda). This was the second Sondheim musical to be staged by the Opera House, following 2003's Sweeney Todd. Regent's Park Open Air Theatre production, 2010 The Olivier Award-winning Regent's Park Open Air Theatre production, directed by Timothy Sheader and choreographed by Liam Steel, ran for a six-week limited season from 6 August to 11 September 2010. The cast included Hannah Waddingham as the Witch, Mark Hadfield as the Baker, Jenna Russell as the Baker's wife, Helen Dallimore as Cinderella, and Judi Dench as the recorded voice of the Giant. Gareth Valentine was the Musical Director. The musical was performed outdoors in a wooded area. Whilst the book remained mostly unchanged, the subtext of the plot was dramatically altered by casting the role of the Narrator as a young school boy lost in the woods following a family argument – a device used to further illustrate the musical's themes of parenting and adolescence. The production opened to wide critical acclaim, much of the press commenting on the effectiveness of the open air setting. The Telegraph reviewer, for example, wrote: "It is an inspired idea to stage this show in the magical, sylvan surroundings of Regent's Park, and designer Soutra Gilmour has come up with a marvellously rickety, adventure playground of a set, all ladders, stairs and elevated walkways, with Rapunzel discovered high up in a tree." The New York Times reviewer commented: "The natural environment makes for something genuinely haunting and mysterious as night falls on the audience..." Stephen Sondheim attended twice, reportedly extremely pleased with the production. The production also won the Laurence Olivier Award for Best Musical Revival and Michael Xavier, who played Cinderella's Prince and the Wolf, was nominated for the Laurence Olivier Award for Best Performance in a Supporting Role in a Musical. The production was recorded in its entirety, available to download and watch from Digital Theatre. Central Park Delacorte Theater production, 2012 The Regent's Park Open Air Theatre production transferred to the Public Theater's 2012 summer series of free performances Shakespeare in the Park at the Delacorte Theater in Central Park, New York, with an American cast as well as new designers. Sheader again was the director and Steel served as co-director and choreographer. Performances were originally to run from July 24 (delayed from July 23 due to the weather) to August 25, 2012, but the show was extended till September 1, 2012. The cast included Amy Adams as the Baker's Wife, Donna Murphy as the Witch, Denis O'Hare as the Baker, Chip Zien as the Mysterious Man/Cinderella's Father, Jack Broderick as the young Narrator, Gideon Glick as Jack, Cooper Grodin as Rapunzel's Prince, Ivan Hernandez as Cinderella's Prince/Wolf, Tina Johnson as Granny, Josh Lamon as the Steward, Jessie Mueller as Cinderella, Laura Shoop as Cinderella's Mother, Tess Soltau as Rapunzel, and Glenn Close as the Voice of the Giant. The set was a "collaboration between original Open Air Theatre designer Soutra Gilmour and...John Lee Beatty, [and] rises over 50 feet in the air, with a series of tree-covered catwalks and pathways." The production was dedicated to Nora Ephron, who died earlier in 2012. In February 2012 and in May 2012, reports of a possible Broadway transfer surfaced with the production's principal actors in negotiations to reprise their roles. In January 2013, it was announced that the production will not transfer to Broadway due to scheduling conflicts. Hollywood Bowl production, 2019 For its annual fully staged musical event, the Hollywood Bowl produced a limited run of Into the Woods from July 26–28, 2019, directed and choreographed by Robert Longbottom. The cast included Skylar Astin as the Baker, Sierra Boggess as Cinderella, Chris Carmack as Rapunzel's Prince, Anthony Crivello as the Mysterious Man, Sutton Foster as the Baker's Wife, Edward Hibbert as the Narrator, Cheyenne Jackson as Cinderella's Prince and the Wolf, Hailey Kilgore as Rapunzel, Gaten Matarazzo as Jack, Patina Miller as the Witch, Rebecca Spencer as Jack's Mother, Shanice Williams as Little Red Ridinghood, and Whoopi Goldberg as the voice of the Giant. Other productions A production played in Sydney from 19 March 1993 to 5 June 1993 at the Drama Theatre, Sydney Opera House. It starred Judi Connelli, Geraldine Turner, Tony Sheldon, Philip Quast, Pippa Grandison, and D. J. Foster. A Melbourne Theatre Company played from 17 January 1998 to 21 February 1998 at the Playhouse, Victorian Arts Centre. It starred Rhonda Burchmore, John McTernan, Gina Riley, Lisa McCune, Peter Carroll, Tamsin Carroll and Robert Grubb. The first professional Spanish language production, Dentro del Bosque, was produced by University of Puerto Rico Repertory Theatre and premiered in San Juan at Teatro de la Universidad (University Theatre) on March 14, 2013. The cast included Víctor Santiago as Baker, Ana Isabelle as Baker's Wife and Lourdes Robles as the Witch A 25th anniversary co-production between Baltimore's Center Stage and Westport Country Playhouse directed by Mark Lamos was notable for casting original Little Red Ridinghood, Danielle Ferland, as the Baker's Wife. The cast included Erik Liberman, Lauren Kennedy, Jeffry Denman, Cheryl Stern, Dana Steingold, Justin Scott Brown, Jenny Latimer, Alma Cuervo, Nikka Lanzarone, Eleni Delopoulos, Nik Walker, Robert Lenzi, Britney Coleman, and Jeremy Lawrence. The production received 2011-2012 Connecticut Critics Circle Awards for Best Production, Best Ensemble, and Steingold's Little Red Ridinghood. The Roundabout Theatre production, directed by Noah Brody and Ben Steinfeld, began performances Off-Broadway at the Laura Pels Theatre on December 19, 2014 in previews, officially on January 22, 2015, and closed on April 12, 2015. Like the original Broadway production 28 years prior, this production had a try-out run at the Old Globe Theatre in San Diego, California from July 12, 2014 – August 17, 2014 with the opening night taking place on July 17. This new version is completely minimalistically reimagined by the Fiasco Theater Company, featuring only ten actors playing multiple parts, and one piano accompanist. The DreamCatcher Theatre production opened in January 2015 and played a sold-out run at the Adrienne Arsht Center in Miami, Florida. Tituss Burgess starred as the Witch, the first male actor to do so. The cast also included Arielle Jacobs as the Baker's Wife. The musical had a production at The Muny in Forest Park, St. Louis, Missouri running from July 21 through 28 2015. The cast included Heather Headley (Witch), Erin Dilly (Baker's Wife), Rob McClure (Baker), Ken Page (Narrator), Elena Shaddow (Cinderella). The Hart House Theatre production in Toronto, Ontario from January 15, 2016 to January 30, 2016. A production ran at the West Yorkshire Playhouse in Leeds in a collaboration with Opera North from 2 June 2016 to 25 June 2016. 2016 Tel Aviv production The Israeli premiere, אל תוך היער (El Toch Ha-ya-ar), opened in Tel Aviv in August 2016 for a limited run produced by The Tramp Productions and Stuff Like That, starring Roi Dolev as the Witch, the second male actor to do so. Characters The main and supporting characters of Into the Woods. The Witch: Mezzo-Soprano The Baker: Baritone The Baker's Wife: Mezzo-Soprano Cinderella: Soprano Little Red Riding Hood: Mezzo-Soprano Jack: Tenor Rapunzel: Soprano Cinderella's Prince / The Wolf: Baritone Rapunzel's Prince: Bass-Baritone The Narrator / The Mysterious Man: Bass Casting history The principal original casts of notable stage productions of Into the Woods. Notable Broadway replacements The Witch: Phylicia Rashad, Betsy Joslyn, Nancy Dussault, Ellen Foley The Baker's Wife: Cynthia Sikes Yorkin The Narrator/Mysterious Man: Dick Cavett Cinderella: Patricia Ben Peterson Jack: Jeff Blumenkrantz Rapunzel: Marin Mazzie Rapunzel's Prince: Dean Butler Notable Broadway revival replacements Cinderella: Erin Dilly Additional The Witch: Tituss Burgess, Heather Headley, Lauren Kennedy, Lourdes Robles, Lea Salonga The Baker: Rob McClure The Baker's Wife: Erin Dilly, Ana Isabelle Cinderella: Elena Shaddow Cinderella's Prince/The Wolf: Philip Quast, Hayden Tee Adaptations Junior version The musical has been adapted
congregational Rabbi raising a family, Klein volunteered for the U.S. Army during World War II as a chaplain, motivated by a cause he saw as clearly right with important implications for the Jewish People. He served over 4 years, rising to the rank of Major and was an advisor to the high commissioner of the Occupation government. He also served on special assignments for Jewish soldiers in the U.S. Army in the 1950s, receiving the simulated rank of Brigadier General for these missions. His experiences in the war are described in his book The Anguish and the Ecstasy of a Jewish Chaplain. Role within Conservative Judaism Klein was a leader of the right-wing of the Conservative movement. He was president of the Rabbinical Assembly, 1958–1960, and a member of its Committee on Jewish Law and Standards, 1948–1979. He was the author of several books, notably, A Guide to Jewish Religious Practice. One of the outstanding halakhists of the movement, he served as a leading member of the Committee on Jewish Law and Standards from 1948 until his death in 1979. As a leading authority on halakha he authored many important teshuvot (responsa), many of which were published in his influential "Responsa and Halakhic Studies". From the 1950s to 1970s, he wrote a comprehensive guide to Jewish law that was used to teach halakha at the JTSA. In 1979 he assembled this into A Guide to Jewish Religious Practice, which is used widely by laypeople and rabbis within Conservative Judaism. Rabbinic thought The philosophy upon which A Guide to Jewish Religious Practice is written is stated in the foreword: "The premise on which Torah is based is that all aspects of life - leisure no less than business, worship or rites of passage (birth, bar mitzvah, marriage, divorce, death) - are part of the covenant and mandate under which every Jew is to serve God in everything he does. In the eyes of Torah there is, strictly speaking, no such thing as the purely private domain, for even
his family, he dedicated his major work, A Guide to Jewish Religious Practice to his children, sons-in-law and 13 grandchildren listing each by name. Klein served as rabbi at Kadimoh Congregation in Springfield, Massachusetts from 1934 to 1953; Temple Emanu-El, Buffalo, New York, 1953–1968; Temple Shaarey Zedek, Buffalo, (which was created from the merger of Emanu-El with Temple Beth David in 1968), 1968–1972. A beloved Rabbi, he influenced generations of congregants and visiting students and, together with his wife who was an educator, founded Jewish day schools in both Springfield and Buffalo. Despite the difficulties facing a congregational Rabbi raising a family, Klein volunteered for the U.S. Army during World War II as a chaplain, motivated by a cause he saw as clearly right with important implications for the Jewish People. He served over 4 years, rising to the rank of Major and was an advisor to the high commissioner of the Occupation government. He also served on special assignments for Jewish soldiers in the U.S. Army in the 1950s, receiving the simulated rank of Brigadier General for these missions. His experiences in the war are described in his book The Anguish and the Ecstasy of a Jewish Chaplain. Role within Conservative Judaism Klein was a leader of the right-wing of the Conservative movement. He was president of the Rabbinical Assembly, 1958–1960, and a member of its Committee on Jewish Law and Standards, 1948–1979. He was the author of several books, notably, A Guide to Jewish Religious Practice. One of the outstanding halakhists of the movement, he served as a leading member of the Committee on Jewish Law and Standards from 1948 until his death in 1979. As a leading authority on halakha he authored many important teshuvot (responsa), many of which were published in his influential "Responsa and Halakhic Studies". From the 1950s to 1970s, he wrote a comprehensive guide to Jewish law that was used to teach halakha at the JTSA. In 1979 he assembled this into A Guide to Jewish Religious Practice, which is used widely by laypeople and rabbis within Conservative Judaism. Rabbinic thought The philosophy upon which A Guide to Jewish Religious Practice is written is stated in the foreword: "The premise on which Torah is based is that all aspects of life - leisure no less than business, worship or rites of passage (birth, bar mitzvah, marriage, divorce, death) - are part of the covenant and mandate under which every Jew is to serve God in everything he does. In the eyes of Torah there is, strictly speaking, no such thing as the purely private domain, for even in solitude - be it the privacy of the bath or the unconsciousness of sleep -
of spliceosomal RNAs), while group I introns use a non-encoded guanosine nucleotide (typically GTP) to initiate splicing, adding it on to the 5'-end of the excised intron. Biological functions and evolution While introns do not encode protein products, they are integral to gene expression regulation. Some introns themselves encode functional RNAs through further processing after splicing to generate noncoding RNA molecules. Alternative splicing is widely used to generate multiple proteins from a single gene. Furthermore, some introns play essential roles in a wide range of gene expression regulatory functions such as nonsense-mediated decay and mRNA export. The biological origins of introns are obscure. After the initial discovery of introns in protein-coding genes of the eukaryotic nucleus, there was significant debate as to whether introns in modern-day organisms were inherited from a common ancient ancestor (termed the introns-early hypothesis), or whether they appeared in genes rather recently in the evolutionary process (termed the introns-late hypothesis). Another theory is that the spliceosome and the intron-exon structure of genes is a relic of the RNA world (the introns-first hypothesis). There is still considerable debate about the extent to which of these hypotheses is most correct. The popular consensus at the moment is that introns arose within the eukaryote lineage as selfish elements. Early studies of genomic DNA sequences from a wide range of organisms show that the intron-exon structure of homologous genes in different organisms can vary widely. More recent studies of entire eukaryotic genomes have now shown that the lengths and density (introns/gene) of introns varies considerably between related species. For example, while the human genome contains an average of 8.4 introns/gene (139,418 in the genome), the unicellular fungus Encephalitozoon cuniculi contains only 0.0075 introns/gene (15 introns in the genome). Since eukaryotes arose from a common ancestor (common descent), there must have been extensive gain or loss of introns during evolutionary time. This process is thought to be subject to selection, with a tendency towards intron gain in larger species due to their smaller population sizes, and the converse in smaller (particularly unicellular) species. Biological factors also influence which genes in a genome lose or accumulate introns. Alternative splicing of exons within a gene after intron excision acts to introduce greater variability of protein sequences translated from a single gene, allowing multiple related proteins to be generated from a single gene and a single precursor mRNA transcript. The control of alternative RNA splicing is performed by a complex network of signaling molecules that respond to a wide range of intracellular and extracellular signals. Introns contain several short sequences that are important for efficient splicing, such as acceptor and donor sites at either end of the intron as well as a branch point site, which are required for proper splicing by the spliceosome. Some introns are known to enhance the expression of the gene that they are contained in by a process known as intron-mediated enhancement (IME). Actively transcribed regions of DNA frequently form R-loops that are vulnerable to DNA damage. In highly expressed yeast genes, introns inhibit R-loop formation and the occurrence of DNA damage. Genome-wide analysis in both yeast and humans revealed that intron-containing genes have decreased R-loop levels and decreased DNA damage compared to intronless genes of similar expression. Insertion of an intron within an R-loop prone gene can also suppress R-loop formation and recombination. Bonnet et al. (2017) speculated that the function of introns in maintaining genetic stability may explain their evolutionary maintenance at certain locations, particularly in highly expressed genes. Starvation adaptation The physical presence of introns promotes cellular resistance to starvation via intron enhanced repression of ribosomal protein genes of nutrient-sensing pathways. As mobile genetic elements Introns may be lost or gained over evolutionary time, as shown by many comparative studies of orthologous genes. Subsequent analyses have identified thousands of examples of intron loss and gain events, and it has been proposed that the emergence of eukaryotes, or the initial stages of eukaryotic evolution, involved an intron invasion. Two definitive mechanisms of intron loss, reverse transcriptase-mediated intron loss (RTMIL) and genomic deletions, have been identified, and are known to occur. The definitive mechanisms of intron gain, however, remain elusive and controversial. At least seven mechanisms of intron gain have been reported thus far: intron transposition, transposon insertion, tandem genomic duplication, intron transfer, intron gain during double-strand break repair (DSBR), insertion of a group II intron, and intronization. In theory it should be easiest to deduce the origin of recently gained introns due to the lack of host-induced mutations, yet even introns gained recently did not arise from any of the aforementioned mechanisms. These findings thus raise the question of whether or not the proposed mechanisms of intron gain fail to describe the mechanistic origin of many novel introns because they are not accurate mechanisms of intron gain, or if there are other, yet to be discovered, processes generating novel introns. In intron transposition, the most commonly purported intron gain mechanism, a spliced intron is thought to reverse splice into either its own mRNA or another mRNA at a previously intron-less position. This intron-containing mRNA is then reverse transcribed and the resulting intron-containing cDNA may then cause intron gain via complete or partial recombination with its original genomic locus. Transposon insertions can also result in intron creation. Such an insertion could intronize the transposon without disrupting the coding sequence when a transposon inserts into the sequence AGGT, resulting in the duplication of this sequence on each side of the transposon. It is not yet understood why these elements are spliced, whether by chance, or by some preferential action by the transposon. In tandem genomic duplication, due to the similarity between consensus donor and acceptor splice sites, which both closely resemble AGGT, the tandem genomic duplication of an exonic segment harboring an AGGT sequence generates two potential splice sites. When recognized by the spliceosome, the sequence between the original and duplicated AGGT will be spliced, resulting in the creation of an intron without alteration of the coding sequence of the gene. Double-stranded break repair via non-homologous end joining was recently identified as a source of intron gain when researchers identified short direct repeats flanking 43% of gained introns in Daphnia. These numbers must be compared to the number of conserved introns flanked by repeats in other organisms, though, for statistical relevance. For group II intron insertion, the retrohoming of a group II intron into a nuclear gene was proposed to cause recent spliceosomal intron gain. Intron transfer has been hypothesized to result in intron gain when a paralog or pseudogene gains an intron and then transfers this intron via recombination to an intron-absent location in its sister paralog. Intronization is the process by which mutations create novel introns from formerly exonic sequence. Thus, unlike other proposed mechanisms of intron gain, this mechanism does not require the insertion or generation of DNA to create a novel intron. The only hypothesized mechanism of recent intron gain lacking any direct evidence is that of group II intron insertion, which when demonstrated in vivo, abolishes gene expression. Group II introns are therefore likely the presumed ancestors of spliceosomal introns, acting as site-specific retroelements, and are no longer responsible for intron gain. Tandem genomic duplication is the only proposed mechanism with supporting in vivo experimental
known about the biochemical apparatus that mediates their splicing. They appear to be related to group II introns, and possibly to spliceosomal introns. Spliceosomal introns Nuclear pre-mRNA introns (spliceosomal introns) are characterized by specific intron sequences located at the boundaries between introns and exons. These sequences are recognized by spliceosomal RNA molecules when the splicing reactions are initiated. In addition, they contain a branch point, a particular nucleotide sequence near the 3' end of the intron that becomes covalently linked to the 5' end of the intron during the splicing process, generating a branched (lariat) intron. Apart from these three short conserved elements, nuclear pre-mRNA intron sequences are highly variable. Nuclear pre-mRNA introns are often much longer than their surrounding exons. tRNA introns Transfer RNA introns that depend upon proteins for removal occur at a specific location within the anticodon loop of unspliced tRNA precursors, and are removed by a tRNA splicing endonuclease. The exons are then linked together by a second protein, the tRNA splicing ligase. Note that self-splicing introns are also sometimes found within tRNA genes. Group I and group II introns Group I and group II introns are found in genes encoding proteins (messenger RNA), transfer RNA and ribosomal RNA in a very wide range of living organisms., Following transcription into RNA, group I and group II introns also make extensive internal interactions that allow them to fold into a specific, complex three-dimensional architecture. These complex architectures allow some group I and group II introns to be self-splicing, that is, the intron-containing RNA molecule can rearrange its own covalent structure so as to precisely remove the intron and link the exons together in the correct order. In some cases, particular intron-binding proteins are involved in splicing, acting in such a way that they assist the intron in folding into the three-dimensional structure that is necessary for self-splicing activity. Group I and group II introns are distinguished by different sets of internal conserved sequences and folded structures, and by the fact that splicing of RNA molecules containing group II introns generates branched introns (like those of spliceosomal RNAs), while group I introns use a non-encoded guanosine nucleotide (typically GTP) to initiate splicing, adding it on to the 5'-end of the excised intron. Biological functions and evolution While introns do not encode protein products, they are integral to gene expression regulation. Some introns themselves encode functional RNAs through further processing after splicing to generate noncoding RNA molecules. Alternative splicing is widely used to generate multiple proteins from a single gene. Furthermore, some introns play essential roles in a wide range of gene expression regulatory functions such as nonsense-mediated decay and mRNA export. The biological origins of introns are obscure. After the initial discovery of introns in protein-coding genes of the eukaryotic nucleus, there was significant debate as to whether introns in modern-day organisms were inherited from a common ancient ancestor (termed the introns-early hypothesis), or whether they appeared in genes rather recently in the evolutionary process (termed the introns-late hypothesis). Another theory is that the spliceosome and the intron-exon structure of genes is a relic of the RNA world (the introns-first hypothesis). There is still considerable debate about the extent to which of these hypotheses is most correct. The popular consensus at the moment is that introns arose within the eukaryote lineage as selfish elements. Early studies of genomic DNA sequences from a wide range of organisms show that the intron-exon structure of homologous genes in different organisms can vary widely. More recent studies of entire eukaryotic genomes have now shown that the lengths and density (introns/gene) of introns varies considerably between related species. For example, while the human genome contains an average of 8.4 introns/gene (139,418 in the genome), the unicellular fungus Encephalitozoon cuniculi contains only 0.0075 introns/gene (15 introns in the genome). Since eukaryotes arose from a common ancestor (common descent), there must have been extensive gain or loss of
manufacturer; see nimo tube Initial Environmental Evaluation, a preliminary environmental impact assessment Institute for Energy Efficiency, a research institute at the University of California, Santa Barbara Institute for Energy & Environment, at New Mexico State University Institution
Institute for Energy & Environment, at New Mexico State University Institution of Electrical Engineers, a British professional organisation now part of the Institution of Engineering and Technology Instituto de Estudos Empresariais, a Brazilian non-profit Intuitive Ethical Extrovert, in socionics Intelligent Energy Europe, CIP
were controversial, as during the elections a leak against Andrzej Przewoźnik accusing him of collaboration with Służba Bezpieczeństwa caused him to withdraw his candidacy. Przewoźnik was cleared of the accusations only after he had lost the election. In 2006, the IPN opened a "Lustration Bureau" that increased the director's power. The bureau was assigned the task of examining the past of all candidates to public office. Kurtyka widened archive access to the public and shifted focus from compensating victims to researching collaboration. Franciszek Gryciuk In 1999, historian Franciszek Gryciuk was appointed to the Collegium of the IPN, which he chaired 2003–2004. From June 2008 to June 2011, he was Vice President of the IPN. He was acting director 2010–2011, between the death of the IPN's second President, Janusz Kurtyka, in the 2010 Polish Air Force Tu-154 crash and the election of Łukasz Kamiński by the Polish Parliament as the third director. Łukasz Kamiński Łukasz Kamiński, was elected by the Sejm in 2011 following the death of his predecessor. Kamiński headed the Wroclaw Regional Bureau of Public Education prior to his election. During his term, the IPN faced a wide array of criticism calling for an overhaul or even replacement. Critics founds fault in the IPN being a state institution, the lack of historical knowledge of its prosecutors, a relatively high number of microhistories with a debatable methodology, overuse of the martyrology motif, research methodology, and isolationism from the wider research community. In response, Kamiński implemented several changes, including organizing public debates with outside historians to counter the charge of isolationism and has suggested refocusing on victims as opposed to agents. Jarosław Szarek On 22 July 2016 Jarosław Szarek was appointed to head IPN. He dismissed Krzysztof Persak, co-author of the 2002 two-volume IPN study on the Jedwabne pogrom. In subsequent months, IPN featured in media headlines for releasing controversial documents, including some relating to Lech Wałęsa, for memory politics conducted in schools, for efforts to change Communist street names, and for legislation efforts. According to historian Idesbald Goddeeris, this marks a return of politics to the IPN. Karol Nawrocki On 23 July 2021 Karol Nawrocki was appointed to head IPN. Activities Research The research conducted by IPN from December 2000 falls into four main topic areas: Security Apparatus and Civil Resistance (with separate sub-projects devoted to Political Processes and Prisoners 1944–1956, Soviet Repressions and Crimes committed against Polish Citizens and Martial Law: a Glance after Twenty Years); Functioning of the repression apparatus (state security and justice organs) – its organizational structure, cadres and relations with other state authority and party organs Activities of the repression apparatus directed against particular selected social groups and organizations Structure and methods of functioning of the People's Poland security apparatus Security apparatus in combat with the political and military underground 1944–1956 Activities of the security apparatus against political emigreés Security apparatus in combat with the Church and freedom of belief Authorities dealing with social crises and democratic opposition in the years 1956–1989 f) List of those repressed and sentenced to death Bibliography of the conspiracy, resistance and repression 1944–1989 War, Occupation and the Polish Underground; deepening of knowledge about the structures and activities of the Polish Underground State examination of the human fates in the territories occupied by the Soviet regime and of Poles displaced into the Soviet Union assessment of sources on the living conditions under the Soviet and German Nazi occupations evaluation of the state of research concerning the victims of the war activities and extermination policy of the Soviet and German Nazi occupiers examining the Holocaust (Extermination of Jews) conducted by Nazis in the Polish territories Response of the Polish Underground State to the extermination of Jewish population The Polish Underground press and the Jewish question during the German Nazi occupation Poles and Other Nations in the Years 1939–1989 (with a part on Poles and Ukrainians); Poles and Ukrainians Poles and Lithuanians Poles and Germans Communist authorities – Belarusians – Underground Fate of Jewish people in the People's Republic of Poland Gypsies in Poland Peasants and the People's Authority 1944–1989 (on the situation of peasants and the rural policy in the years 1944–1989) inhabitants of the rural areas during the creation of the totalitarian regime in Poland; peasant life during the Sovietisation of Poland in the years 1948–1956; attitudes of the inhabitants of rural areas towards the state-Church conflict in the years 1956–1970; the role of peasants in the anti-Communist opposition of the 1970s and 1980s. Education The IPN's Public Education Office (BEP) vaguely defined role in the IPN act is to inform society of Communist and Nazi crimes and institutions. This vaguely defined role allowed Paweł Machcewicz, BEP's director in 2000, freedom to create a wide range of activities. Researchers at the IPN conduct not only research but are required to take part in public outreach. BEP has published music CDs, DVDs, and serials. It has founded "historical clubs" for debates and lectures. It has also organized outdoor historical fairs, picnic, and games. The IPN Bulletin () is a high circulation popular-scientific journal, intended for lay readers and youth. Some 12,000 of 15,000 copies of the Bulletin are distributed free of charge to secondary schools in Poland, and the rest are sold in bookstores. The Bulletin contains: popular-scientific and academic articles, polemics, manifestos, appeals to readers, promotional material on the IPN and BEP, denials and commentary on reports in the news, as well as multimedia supplements. The IPN also publishes the Remembrance and Justice () scientific journal. The IPN has issued several board games to help educate people about recent Polish history, including: 303 – a game about the Battle of Britain that focuses on the Polish 303 Squadron. Kolejka – a game about being forced to queue for basic household products during the Communist era. Lustration On 15 March 2007, an amendment to the Polish law regulating the IPN (enacted on 18 December 2006) came into effect. The change gave the IPN new lustration powers and expanded IPN’s file access. The change was enacted by Law and Justice government in a series of legislative amendments during 2006 and the beginning of 2007. However, several articles of the 2006-7 amendments were held unconstitutional by Poland's Constitutional Court on 11 May 2007, though the IPN's lustration power was still wider than under the original 1997 law. These powers include loss of position for those who submitted false lustration declarations as well as a lustration process of candidates for senior office. An incident which caused controversy involved the "Wildstein list", a partial list of persons who allegedly worked for the communist-era Polish intelligence service, copied in 2004 from IPN archives (without IPN permission) by journalist Bronisław Wildstein and published on the Internet in 2005. The list gained much attention in Polish media and politics, and IPN security procedures and handling of the matter came under criticism. In 2008, two IPN employees, Sławomir Cenckiewicz and Piotr Gontarczyk, published a book, SB a Lech Wałęsa. Przyczynek do biografii (The Security Service and Lech Wałęsa: A Contribution to a Biography) which caused a major controversy. The book's premise was that in the 1970s the Solidarity leader and later President of Poland Lech Wałęsa was a secret informant of the Polish Communist Security Service. Naming of monuments In 2008, the chairman of the IPN wrote to local administrations, calling for the addition of the word "German" before "Nazi" to all monuments and tablets commemorating Germany's victims, stating that "Nazis" is not always understood to relate specifically to Germans. Several scenes of atrocities conducted by Germany were duly updated with commemorative plaques clearly indicating the nationality of the perpetrators. The IPN also requested better documentation and commemoration of crimes that had been perpetrated by the Soviet Union. The Polish government also asked UNESCO to officially change the name "Auschwitz Concentration Camp" to "Former Nazi German Concentration Camp Auschwitz-Birkenau", to clarify that the camp had been built and operated by Nazi Germany. In 2007, UNESCO's World Heritage Committee changed the camp's name to "Auschwitz Birkenau German Nazi Concentration and Extermination Camp (1940–1945)." Previously some German media, including Der Spiegel, had called the camp "Polish". Publications Since 2019, the Institute publishes the Institute of National Remembrance Review (), a yearly peer-reviewed academic journal in English, with Anna Karolina Piekarska as editor-in-chief.. Criticism According to , common criticisms of the IPN include its dominance in the Polish research field, which is guaranteed by a budget that far supersedes that of any similar academic institution; the "thematic monotony ... of micro-historical studies ... of
the Smolensk airplane crash on 10 April 2010. The elections were controversial, as during the elections a leak against Andrzej Przewoźnik accusing him of collaboration with Służba Bezpieczeństwa caused him to withdraw his candidacy. Przewoźnik was cleared of the accusations only after he had lost the election. In 2006, the IPN opened a "Lustration Bureau" that increased the director's power. The bureau was assigned the task of examining the past of all candidates to public office. Kurtyka widened archive access to the public and shifted focus from compensating victims to researching collaboration. Franciszek Gryciuk In 1999, historian Franciszek Gryciuk was appointed to the Collegium of the IPN, which he chaired 2003–2004. From June 2008 to June 2011, he was Vice President of the IPN. He was acting director 2010–2011, between the death of the IPN's second President, Janusz Kurtyka, in the 2010 Polish Air Force Tu-154 crash and the election of Łukasz Kamiński by the Polish Parliament as the third director. Łukasz Kamiński Łukasz Kamiński, was elected by the Sejm in 2011 following the death of his predecessor. Kamiński headed the Wroclaw Regional Bureau of Public Education prior to his election. During his term, the IPN faced a wide array of criticism calling for an overhaul or even replacement. Critics founds fault in the IPN being a state institution, the lack of historical knowledge of its prosecutors, a relatively high number of microhistories with a debatable methodology, overuse of the martyrology motif, research methodology, and isolationism from the wider research community. In response, Kamiński implemented several changes, including organizing public debates with outside historians to counter the charge of isolationism and has suggested refocusing on victims as opposed to agents. Jarosław Szarek On 22 July 2016 Jarosław Szarek was appointed to head IPN. He dismissed Krzysztof Persak, co-author of the 2002 two-volume IPN study on the Jedwabne pogrom. In subsequent months, IPN featured in media headlines for releasing controversial documents, including some relating to Lech Wałęsa, for memory politics conducted in schools, for efforts to change Communist street names, and for legislation efforts. According to historian Idesbald Goddeeris, this marks a return of politics to the IPN. Karol Nawrocki On 23 July 2021 Karol Nawrocki was appointed to head IPN. Activities Research The research conducted by IPN from December 2000 falls into four main topic areas: Security Apparatus and Civil Resistance (with separate sub-projects devoted to Political Processes and Prisoners 1944–1956, Soviet Repressions and Crimes committed against Polish Citizens and Martial Law: a Glance after Twenty Years); Functioning of the repression apparatus (state security and justice organs) – its organizational structure, cadres and relations with other state authority and party organs Activities of the repression apparatus directed against particular selected social groups and organizations Structure and methods of functioning of the People's Poland security apparatus Security apparatus in combat with the political and military underground 1944–1956 Activities of the security apparatus against political emigreés Security apparatus in combat with the Church and freedom of belief Authorities dealing with social crises and democratic opposition in the years 1956–1989 f) List of those repressed and sentenced to death Bibliography of the conspiracy, resistance and repression 1944–1989 War, Occupation and the Polish Underground; deepening of knowledge about the structures and activities of the Polish Underground State examination of the human fates in the territories occupied by the Soviet regime and of Poles displaced into the Soviet Union assessment of sources on the living conditions under the Soviet and German Nazi occupations evaluation of the state of research concerning the victims of the war activities and extermination policy of the Soviet and German Nazi occupiers examining the Holocaust (Extermination of Jews) conducted by Nazis in the Polish territories Response of the Polish Underground State to the extermination of Jewish population The Polish Underground press and the Jewish question during the German Nazi occupation Poles and Other Nations in the Years 1939–1989 (with a part on Poles and Ukrainians); Poles and Ukrainians Poles and Lithuanians Poles and Germans Communist authorities – Belarusians – Underground Fate of Jewish people in the People's Republic of Poland Gypsies in Poland Peasants and the People's Authority 1944–1989 (on the situation of peasants and the rural policy in the years 1944–1989) inhabitants of the rural areas during the creation of the totalitarian regime in Poland; peasant life during the Sovietisation of Poland in the years 1948–1956; attitudes of the inhabitants of rural areas towards the state-Church conflict in the years 1956–1970; the role of peasants in the anti-Communist opposition of the 1970s and 1980s. Education The IPN's Public Education Office (BEP) vaguely defined role in the IPN act is to inform society of Communist and Nazi crimes and institutions. This vaguely defined role allowed Paweł Machcewicz, BEP's director in 2000, freedom to create a wide range of activities. Researchers at the IPN conduct not only research but are required to take part in public outreach. BEP has published music CDs, DVDs, and serials. It has founded "historical clubs" for debates and lectures. It has also organized outdoor historical fairs, picnic, and games. The IPN Bulletin () is a high circulation popular-scientific journal, intended for lay readers and youth. Some 12,000 of 15,000 copies of the Bulletin are distributed free of charge to secondary schools in Poland, and the rest are sold in bookstores. The Bulletin contains: popular-scientific and academic articles, polemics, manifestos, appeals to readers, promotional material on the IPN and BEP, denials and commentary on reports in the news, as well as multimedia supplements. The IPN also publishes the Remembrance and Justice () scientific journal. The IPN has issued several board games to help educate people about recent Polish history, including: 303 – a game about the Battle of Britain that focuses on the Polish 303 Squadron. Kolejka – a game about being forced to queue for basic household products during the Communist era. Lustration On 15 March 2007, an amendment to the Polish law regulating the IPN (enacted on 18 December 2006) came into effect. The change gave the IPN new lustration powers and expanded IPN’s file access. The change was enacted by Law and Justice government in a series of legislative amendments during 2006 and the beginning of 2007. However, several articles of the 2006-7 amendments were held unconstitutional by Poland's Constitutional Court on 11 May 2007, though the IPN's lustration power was still wider than under the original 1997 law. These powers include loss of position for those who submitted false lustration declarations as well as a lustration process of candidates for senior office. An incident which caused controversy involved the "Wildstein list", a partial list of persons who allegedly worked for the communist-era Polish intelligence service, copied in 2004 from IPN archives (without IPN permission) by journalist Bronisław Wildstein and published on the Internet in 2005. The list gained much attention in Polish media and politics, and IPN security procedures and handling of the matter came under criticism. In 2008, two IPN employees, Sławomir Cenckiewicz and Piotr Gontarczyk, published a book, SB a Lech Wałęsa. Przyczynek do biografii (The Security Service and Lech Wałęsa: A Contribution to a Biography) which
purposes Espionage, or intelligence, the clandestine acquisition of confidential information Intelligence assessment, the evaluation of sensitive commercial, military, scientific, or state information Intelligence cycle, the stages of intelligence information processing Military intelligence, the gathering and assessment of policy, strategic, and tactical, information Strategic intelligence (STRATINT), the collection, processing, analysis, and dissemination of intelligence that is required for forming policy and military plans at the national and international level Police intelligence, the gathering of information about crime in order to
one or more capacities of the mind. Intelligence may also refer to: Information Intelligence (information), information collected for use Business intelligence, data transformed into meaningful and useful information for business analysis purposes Espionage, or intelligence, the clandestine acquisition of confidential information Intelligence assessment, the evaluation of sensitive commercial, military, scientific, or state information Intelligence cycle, the stages of intelligence information processing Military intelligence, the gathering and assessment of policy, strategic, and tactical, information Strategic intelligence (STRATINT), the collection, processing, analysis, and dissemination of intelligence that is required for forming policy and military plans at the national and international level Police intelligence, the gathering of information about crime in order to track and predict it with a view to curbing it Media Music
the canonical way of constructing a basis for a tensor product space of the combined system from the individual spaces. This expression is valid for distinguishable particles, however, it is not appropriate for indistinguishable particles since and as a result of exchanging the particles are generally different states. "the particle 1 occupies the n1 state and the particle 2 occupies the n2 state" ≠ "the particle 1 occupies the n2 state and the particle 2 occupies the n1 state". Two states are physically equivalent only if they differ at most by a complex phase factor. For two indistinguishable particles, a state before the particle exchange must be physically equivalent to the state after the exchange, so these two state differ at most by a complex phase factor. This fact suggests that a state for two indistinguishable (and non-interacting) particles is given by following two possibilities: States where it is a sum are known as symmetric, while states involving the difference are called antisymmetric. More completely, symmetric states have the form while antisymmetric states have the form Note that if n1 and n2 are the same, the antisymmetric expression gives zero, which cannot be a state vector since it cannot be normalized. In other words, more than one identical particle cannot occupy an antisymmetric state (one antisymmetric state can be occupied only by one particle). This is known as the Pauli exclusion principle, and it is the fundamental reason behind the chemical properties of atoms and the stability of matter. Exchange symmetry The importance of symmetric and antisymmetric states is ultimately based on empirical evidence. It appears to be a fact of nature that identical particles do not occupy states of a mixed symmetry, such as There is actually an exception to this rule, which will be discussed later. On the other hand, it can be shown that the symmetric and antisymmetric states are in a sense special, by examining a particular symmetry of the multiple-particle states known as exchange symmetry. Define a linear operator P, called the exchange operator. When it acts on a tensor product of two state vectors, it exchanges the values of the state vectors: P is both Hermitian and unitary. Because it is unitary, it can be regarded as a symmetry operator. This symmetry may be described as the symmetry under the exchange of labels attached to the particles (i.e., to the single-particle Hilbert spaces). Clearly, (the identity operator), so the eigenvalues of P are +1 and −1. The corresponding eigenvectors are the symmetric and antisymmetric states: In other words, symmetric and antisymmetric states are essentially unchanged under the exchange of particle labels: they are only multiplied by a factor of +1 or −1, rather than being "rotated" somewhere else in the Hilbert space. This indicates that the particle labels have no physical meaning, in agreement with the earlier discussion on indistinguishability. It will be recalled that P is Hermitian. As a result, it can be regarded as an observable of the system, which means that, in principle, a measurement can be performed to find out if a state is symmetric or antisymmetric. Furthermore, the equivalence of the particles indicates that the Hamiltonian can be written in a symmetrical form, such as It is possible to show that such Hamiltonians satisfy the commutation relation According to the Heisenberg equation, this means that the value of P is a constant of motion. If the quantum state is initially symmetric (antisymmetric), it will remain symmetric (antisymmetric) as the system evolves. Mathematically, this says that the state vector is confined to one of the two eigenspaces of P, and is not allowed to range over the entire Hilbert space. Thus, that eigenspace might as well be treated as the actual Hilbert space of the system. This is the idea behind the definition of Fock space. Fermions and bosons The choice of symmetry or antisymmetry is determined by the species of particle. For example, symmetric states must always be used when describing photons or helium-4 atoms, and antisymmetric states when describing electrons or protons. Particles which exhibit symmetric states are called bosons. The nature of symmetric states has important consequences for the statistical properties of systems composed of many identical bosons. These statistical properties are described as Bose–Einstein statistics. Particles which exhibit antisymmetric states are called fermions. Antisymmetry gives rise to the Pauli exclusion principle, which forbids identical fermions from sharing the same quantum state. Systems of many identical fermions are described by Fermi–Dirac statistics. Parastatistics are also possible. In certain two-dimensional systems, mixed symmetry can occur. These exotic particles are known as anyons, and they obey fractional statistics. Experimental evidence for the existence of anyons exists in the fractional quantum Hall effect, a phenomenon observed in the two-dimensional electron gases that form the inversion layer of MOSFETs. There is another type of statistic, known as braid statistics, which are associated with particles known as plektons. The spin-statistics theorem relates the exchange symmetry of identical particles to their spin. It states that bosons have integer spin, and fermions have half-integer spin. Anyons possess fractional spin. N particles The above discussion generalizes readily to the case of N particles. Suppose there are N particles with quantum numbers n1, n2, ..., nN. If the particles are bosons, they occupy a totally symmetric state, which is symmetric under the exchange of any two particle labels: Here, the sum is taken over all different states under permutations p acting on N elements. The square root left to the sum is a normalizing constant. The quantity mn stands for the number of times each of the single-particle states n appears in the N-particle state. Note that Σn mn = N. In the same vein, fermions occupy totally antisymmetric states: Here, is the sign of each permutation (i.e. if is composed of an even number of transpositions, and if odd). Note that there is no term, because each single-particle state can appear only once in a fermionic state. Otherwise the sum would again be zero due to the antisymmetry, thus representing a physically impossible state. This is the Pauli exclusion principle for many particles. These states have been normalized so that Measurement Suppose there is a system of N bosons (fermions) in the symmetric (antisymmetric) state and a measurement is performed on some other set of discrete observables, m. In general, this yields some result m1 for one particle, m2 for another particle, and so forth. If the particles are bosons (fermions), the state after the measurement must remain symmetric (antisymmetric), i.e. The probability of obtaining a particular result for the m measurement is It can be shown that which verifies that the total probability is 1. The sum has to be restricted to ordered values of m1, ..., mN to ensure that each multi-particle state is not counted more than once. Wavefunction representation So far, the discussion has included only discrete observables. It can be extended to continuous observables, such as the position x. Recall that an eigenstate of a continuous observable represents an infinitesimal range of values of the observable, not a single value as with discrete observables. For instance, if a particle is in a state |ψ⟩, the probability of finding it in a region of volume d3x surrounding some position x is As a result, the continuous eigenstates |x⟩ are normalized to the delta function instead of unity: Symmetric and antisymmetric multi-particle states can be constructed from continuous eigenstates in the same way as before. However, it is customary to use a different normalizing constant: A many-body wavefunction can be written, where the single-particle wavefunctions are defined, as usual, by The most important property of these wavefunctions is that exchanging any two of the coordinate variables changes the wavefunction by only a plus or minus sign. This is the manifestation of symmetry and antisymmetry in the wavefunction representation: The many-body wavefunction has the following significance: if the system is initially in a state with quantum numbers n1, ..., nN, and a position measurement is performed, the probability of finding particles in infinitesimal volumes near x1, x2, ..., xN is The factor of N! comes from our normalizing constant, which has been chosen so that, by analogy with single-particle wavefunctions, Because each integral runs over all possible values of x, each multi-particle state appears N! times in the integral. In other words, the probability associated with each event is evenly distributed across N! equivalent points in the integral space. Because it is usually more convenient to work with unrestricted integrals than restricted ones, the normalizing constant has been chosen to reflect this. Finally, antisymmetric wavefunction can be written as the determinant of a matrix, known as a Slater determinant: The operator approach and parastatistics The Hilbert space for particles is given by the tensor product . The permutation group of acts on this space by permuting the entries. By definition the expectation values for an observable of indistinguishable particles should be invariant under these permutation. This means that for all and or equivalently for each . Two states are equivalent whenever their expectation values coincide for all observables. If we restrict to observables of identical particles, and hence observables satisfying the equation above, we find that the following states (after normalization) are equivalent . The equivalence classes are in bijective relation with irreducible subspaces of under . Two obvious irreducible subspaces are the one dimensional symmetric/bosonic subspace and anti-symmetric/fermionic subspace. There are however more types of irreducible subspaces. States associated with these other irreducible subspaces are called parastatistic states. Young tableaux provide a way to classify all of these irreducible subspaces. Statistical properties Statistical effects of indistinguishability The indistinguishability of particles has a profound effect on their statistical properties. To illustrate this, consider a system of N distinguishable, non-interacting particles. Once again, let nj denote the state (i.e. quantum numbers) of particle j. If the particles have the same physical properties, the nj's run over the same range of values. Let ε(n) denote the energy of a particle in state n. As the particles do not interact, the total energy of the system is the sum of the single-particle energies. The partition function of the system is where k is Boltzmann's constant and T is the temperature. This expression can be factored to obtain where If the particles are identical, this equation is incorrect. Consider a state of the system, described by the single particle states [n1, ..., nN]. In the equation for Z, every possible permutation of the ns occurs once in the sum, even though each of these permutations is describing the same multi-particle state. Thus, the number of states has been over-counted. If the possibility of overlapping states is neglected, which is valid if the temperature is
distinguished from one another, even in principle. Species of identical particles include, but are not limited to, elementary particles (such as electrons), composite subatomic particles (such as atomic nuclei), as well as atoms and molecules. Quasiparticles also behave in this way. Although all known indistinguishable particles only exist at the quantum scale, there is no exhaustive list of all possible sorts of particles nor a clear-cut limit of applicability, as explored in quantum statistics. There are two main categories of identical particles: bosons, which can share quantum states, and fermions, which cannot (as described by the Pauli exclusion principle). Examples of bosons are photons, gluons, phonons, helium-4 nuclei and all mesons. Examples of fermions are electrons, neutrinos, quarks, protons, neutrons, and helium-3 nuclei. The fact that particles can be identical has important consequences in statistical mechanics, where calculations rely on probabilistic arguments, which are sensitive to whether or not the objects being studied are identical. As a result, identical particles exhibit markedly different statistical behaviour from distinguishable particles. For example, the indistinguishability of particles has been proposed as a solution to Gibbs' mixing paradox. Distinguishing between particles There are two methods for distinguishing between particles. The first method relies on differences in the intrinsic physical properties of the particles, such as mass, electric charge, and spin. If differences exist, it is possible to distinguish between the particles by measuring the relevant properties. However, it is an empirical fact that microscopic particles of the same species have completely equivalent physical properties. For instance, every electron in the universe has exactly the same electric charge; this is why it is possible to speak of such a thing as "the charge of the electron". Even if the particles have equivalent physical properties, there remains a second method for distinguishing between particles, which is to track the trajectory of each particle. As long as the position of each particle can be measured with infinite precision (even when the particles collide), then there would be no ambiguity about which particle is which. The problem with the second approach is that it contradicts the principles of quantum mechanics. According to quantum theory, the particles do not possess definite positions during the periods between measurements. Instead, they are governed by wavefunctions that give the probability of finding a particle at each position. As time passes, the wavefunctions tend to spread out and overlap. Once this happens, it becomes impossible to determine, in a subsequent measurement, which of the particle positions correspond to those measured earlier. The particles are then said to be indistinguishable. Quantum mechanical description Symmetrical and antisymmetrical states What follows is an example to make the above discussion concrete, using the formalism developed in the article on the mathematical formulation of quantum mechanics. Let n denote a complete set of (discrete) quantum numbers for specifying single-particle states (for example, for the particle in a box problem, take n to be the quantized wave vector of the wavefunction.) For simplicity, consider a system composed of two particles that are not interacting with each other. Suppose that one particle is in the state n1, and the other is in the state n2. Intuitively, the quantum state of the system is written as where the state writing order matters such as the firstly written state is for the particle 1 and the secondly written state is for the particle 2 (so, if , then the particle 1 occupies the state n2 while the particle 2 occupies the state n1). This is simply the canonical way of constructing a basis for a tensor product space of the combined system from the individual spaces. This expression is valid for distinguishable particles, however, it is not appropriate for indistinguishable particles since and as a result of exchanging the particles are generally different states. "the particle 1 occupies the n1 state and the particle 2 occupies the n2 state" ≠ "the particle 1 occupies the n2 state and the particle 2 occupies the n1 state". Two states are physically equivalent only if they differ at most by a complex phase factor. For two indistinguishable particles, a state before the particle exchange must be physically equivalent to the state after the exchange, so these two state differ at most by a complex phase factor. This fact suggests that a state for two indistinguishable (and non-interacting) particles is given by following two possibilities: States where it is a sum are known as symmetric, while states involving the difference are called antisymmetric. More completely, symmetric states have the form while antisymmetric states have the form Note that if n1 and n2 are the same, the antisymmetric expression gives zero, which cannot be a state vector since it cannot be normalized. In other words, more than one identical particle cannot occupy an antisymmetric state (one antisymmetric state can be occupied only by one particle). This is known as the Pauli exclusion principle, and it is the fundamental reason behind the chemical properties of atoms and the stability of matter. Exchange symmetry The importance of symmetric and antisymmetric states is ultimately based on empirical evidence. It appears to be a fact of nature that identical particles do not occupy states of a mixed symmetry, such as There is actually an exception to this rule, which will be discussed later. On the other hand, it can be shown that the symmetric and antisymmetric states are in a sense special, by examining a particular symmetry of the multiple-particle states known as exchange symmetry. Define a linear operator P, called the exchange operator. When it acts on a tensor product of two state vectors, it exchanges the values of the state vectors: P is both Hermitian and unitary. Because it is unitary, it can be regarded as a symmetry operator. This symmetry may be described as the symmetry under the exchange of labels attached to the particles (i.e., to the single-particle Hilbert spaces). Clearly, (the identity operator), so the eigenvalues of P are +1 and −1. The corresponding eigenvectors are the symmetric and antisymmetric states: In other words, symmetric and antisymmetric states are essentially unchanged under the exchange of particle labels: they are only multiplied by a factor of +1 or −1, rather than being "rotated" somewhere else in the Hilbert space. This indicates that the particle labels have no physical meaning, in agreement with the earlier discussion on indistinguishability. It will be recalled that P is Hermitian. As a result, it can be regarded as an observable of the system, which means that, in principle, a measurement can be performed to find out if a state is symmetric or antisymmetric. Furthermore, the equivalence of the particles indicates that the Hamiltonian can be written in a symmetrical form, such as It is possible to show that such Hamiltonians satisfy the commutation relation According to the Heisenberg equation, this means that the value of P is a constant of motion. If the quantum state is initially symmetric (antisymmetric), it will remain symmetric (antisymmetric) as the system evolves. Mathematically, this says that the state vector is confined to one of the two eigenspaces of P, and is not allowed to range over the entire Hilbert space. Thus, that eigenspace might as well be treated as the actual Hilbert space of the system. This is the idea behind the definition of Fock space. Fermions and bosons The choice of symmetry or antisymmetry is determined by the species of particle. For example, symmetric states must always be used when describing photons or helium-4 atoms, and antisymmetric states when describing electrons or protons. Particles which exhibit symmetric states are called bosons. The nature of symmetric states has important consequences for the statistical properties of systems composed of many identical bosons. These statistical properties are described as Bose–Einstein statistics. Particles which exhibit antisymmetric states are called fermions. Antisymmetry gives rise to the Pauli exclusion principle, which forbids identical fermions from sharing the same quantum state. Systems of many identical fermions are described by Fermi–Dirac statistics. Parastatistics are also possible. In certain two-dimensional systems, mixed symmetry can occur. These exotic particles are known as anyons, and they obey fractional statistics. Experimental evidence for the existence of anyons exists in the fractional quantum Hall effect, a phenomenon observed in the two-dimensional electron gases that form the inversion layer of MOSFETs. There is another type of statistic, known as braid statistics, which are associated with particles known as plektons. The spin-statistics theorem relates the exchange symmetry of identical particles to their spin. It states that bosons have integer spin, and fermions have half-integer spin. Anyons possess fractional spin. N particles The above discussion generalizes readily to the case of N particles. Suppose there are N particles with quantum numbers n1, n2, ..., nN. If the particles are bosons, they occupy a totally symmetric state, which is symmetric under the exchange of any two particle labels: Here, the sum is taken over all different states under permutations p acting on N elements. The square root left to the sum is a
temporary (weeks or months), so is not viable as a long-term treatment for IC/BPS. The proportion of people with IC/BPS who experience relief from hydrodistention is currently unknown and evidence for this modality is limited by a lack of properly controlled studies. Bladder rupture and sepsis may be associated with prolonged, high-pressure hydrodistention. Bladder instillations Bladder instillation of medication is one of the main forms of treatment of interstitial cystitis, but evidence for its effectiveness is currently limited. Advantages of this treatment approach include direct contact of the medication with the bladder and low systemic side effects due to poor absorption of the medication. Single medications or a mixture of medications are commonly used in bladder instillation preparations. Dimethyl sulfoxide (DMSO) is the only approved bladder instillation for IC/BPS yet it is much less frequently used in urology clinics. A 50% solution of DMSO had the potential to create irreversible muscle contraction. However, a lesser solution of 25% was found to be reversible. Long-term use of DMSO is questionable, as its mechanism of action is not fully understood though DMSO is thought to inhibit mast cells and may have anti-inflammatory, muscle-relaxing, and analgesic effects. Other agents used for bladder instillations to treat interstitial cystitis include: heparin, lidocaine, chondroitin sulfate, hyaluronic acid, pentosan polysulfate, oxybutynin, and botulinum toxin A. Preliminary evidence suggests these agents are efficacious in reducing symptoms of interstitial cystitis, but further study with larger, randomized, controlled clinical trials is needed. Diet Diet modification is often recommended as a first-line method of self-treatment for interstitial cystitis, though rigorous controlled studies examining the impact diet has on interstitial cystitis signs and symptoms are currently lacking. An increase in fiber intake may alleviate symptoms. Individuals with interstitial cystitis often experience an increase in symptoms when they consume certain foods and beverages. Avoidance of these potential trigger foods and beverages such as caffeine-containing beverages including coffee, tea, and soda, alcoholic beverages, chocolate, citrus fruits, hot peppers, and artificial sweeteners may be helpful in alleviating symptoms. Diet triggers vary between individuals with IC; the best way for a person to discover his or her own triggers is to use an elimination diet. Sensitivity to trigger foods may be reduced if calcium glycerophosphate and/or sodium bicarbonate is consumed. The foundation of therapy is a modification of diet to help people avoid those foods which can further irritate the damaged bladder wall. The mechanism by which dietary modification benefits people with IC is unclear. Integration of neural signals from pelvic organs may mediate the effects of diet on symptoms of IC. Medications The antihistamine hydroxyzine failed to demonstrate superiority over placebo in treatment of people with IC in a randomized, controlled, clinical trial. Amitriptyline has been shown to be effective in reducing symptoms such as chronic pelvic pain and nocturia in many people with IC/BPS with a median dose of 75 mg daily. In one study, the antidepressant duloxetine was found to be ineffective as a treatment, although a patent exists for use of duloxetine in the context of IC, and is known to relieve neuropathic pain. The calcineurin inhibitor cyclosporine A has been studied as a treatment for interstitial cystitis due to its immunosuppressive properties. A prospective randomized study found cyclosporine A to be more effective at treating IC symptoms than pentosan polysulfate, but also had more adverse effects. Oral pentosan polysulfate is believed to repair the protective glycosaminoglycan coating of the bladder, but studies have encountered mixed results when attempting to determine if the effect is statistically significant compared to placebo. Pelvic floor treatments Urologic pelvic pain syndromes, such as IC/BPS and CP/CPPS, are characterized by pelvic muscle tenderness, and symptoms may be reduced with pelvic myofascial physical therapy. This may leave the pelvic area in a sensitized condition, resulting in a loop of muscle tension and heightened neurological feedback (neural wind-up), a form of myofascial pain syndrome. Current protocols, such as the Wise–Anderson Protocol, largely focus on stretches to release overtensed muscles in the pelvic or anal area (commonly referred to as trigger points), physical therapy to the area, and progressive relaxation therapy to reduce causative stress. Pelvic floor dysfunction is a fairly new area of specialty for physical therapists worldwide. The goal of therapy is to relax and lengthen the pelvic floor muscles, rather than to tighten and/or strengthen them as is the goal of therapy for people with urinary incontinence. Thus, traditional exercises such as Kegel exercises, which are used to strengthen pelvic muscles, can provoke pain and additional muscle tension. A specially trained physical therapist can provide direct, hands on evaluation of the muscles, both externally and internally. A therapeutic wand can also be used to perform pelvic floor muscle myofascial release to provide relief. Surgery Surgery is rarely used for IC/BPS. Surgical intervention is very unpredictable, and is considered a treatment of last resort for severe refractory cases of interstitial cystitis. Some people who opt for surgical intervention continue to experience pain after surgery. Typical surgical interventions for refractory cases of IC/BPS include: bladder augmentation, urinary diversion, transurethral fulguration and resection of ulcers, and bladder removal (cystectomy). Neuromodulation can be successful in treating IC/BPS symptoms, including pain. One electronic pain-killing option is TENS. Percutaneous tibial nerve stimulation stimulators have also been used, with varying degrees of success. Percutaneous sacral nerve root stimulation was able to produce statistically significant improvements in several parameters, including pain. Alternative medicine There is little evidence looking at the effects of
not known. However, several explanations have been proposed and include the following: autoimmune theory, nerve theory, mast cell theory, leaky lining theory, infection theory, and a theory of production of a toxic substance in the urine. Other suggested etiological causes are neurologic, allergic, genetic, and stress-psychological. In addition, recent research shows that those with IC may have a substance in the urine that inhibits the growth of cells in the bladder epithelium. An infection may then predispose those people to develop IC. Evidence from clinical and laboratory studies confirms that mast cells play a central role in IC/BPS possibly due to their ability to release histamine and cause pain, swelling, scarring, and interfere with healing. Research has shown a proliferation of nerve fibers is present in the bladders of people with IC which is absent in the bladders of people who have not been diagnosed with IC. Regardless of the origin, most people with IC/BPS struggle with a damaged urothelium, or bladder lining. When the surface glycosaminoglycan (GAG) layer is damaged (via a urinary tract infection (UTI), excessive consumption of coffee or sodas, traumatic injury, etc.), urinary chemicals can "leak" into surrounding tissues, causing pain, inflammation, and urinary symptoms. Oral medications like pentosan polysulfate and medications placed directly into the bladder via a catheter sometimes work to repair and rebuild this damaged/wounded lining, allowing for a reduction in symptoms. Most literature supports the belief that IC's symptoms are associated with a defect in the bladder epithelium lining, allowing irritating substances in the urine to penetrate into the bladder—a breakdown of the bladder lining (also known as the adherence theory). Deficiency in this glycosaminoglycan layer on the surface of the bladder results in increased permeability of the underlying submucosal tissues. GP51 has been identified as a possible urinary biomarker for IC with significant variations in GP51 levels in those with IC when compared to individuals without interstitial cystitis. Numerous studies have noted the link between IC, anxiety, stress, hyper-responsiveness, and panic. Another proposed cause for interstitial cystitis is that the body's immune system attacks the bladder. Biopsies on the bladder walls of people with IC usually contain mast cells. Mast cells containing histamine packets gather when an allergic reaction is occurring. The body identifies the bladder wall as a foreign agent, and the histamine packets burst open and attack. The body attacks itself, which is the basis of autoimmune disorders. Additionally, IC may be triggered by an unknown toxin or stimulus which causes nerves in the bladder wall to fire uncontrollably. When they fire, they release substances called neuropeptides that induce a cascade of reactions that cause pain in the bladder wall. Genes Some genetic subtypes, in some people, have been linked to the disorder. An antiproliferative factor is secreted by the bladders of people with IC/BPS which inhibits bladder cell proliferation, thus possibly causing the missing bladder lining. PAND, at gene map locus 13q22–q32, is associated with a constellation of disorders (a "pleiotropic syndrome") including IC/BPS and other bladder and kidney problems, thyroid diseases, serious headaches/migraines, panic disorder, and mitral valve prolapse. Diagnosis A diagnosis of IC/BPS is one of exclusion, as well as a review of clinical symptoms. The American Urological Association Guidelines recommend starting with a careful history of the person, physical examination and laboratory tests to assess and document symptoms of interstitial cytitis, as well as other potential disorders. The KCl test, also known as the potassium sensitivity test, is no longer recommended. The test uses a mild potassium solution to evaluate the integrity of the bladder wall. Though the latter is not specific for IC/BPS, it has been determined to be helpful in predicting the use of compounds, such as pentosan polysulphate, which are designed to help repair the GAG layer. For complicated cases, the use of hydrodistention with cystoscopy may be helpful. Researchers, however, determined that this visual examination of the bladder wall after stretching the bladder was not specific for IC/BPS and that the test, itself, can contribute to the development of small glomerulations (petechial hemorrhages) often found in IC/BPS. Thus, a diagnosis of IC/BPS is one of exclusion, as well as a review of clinical symptoms. In 2006, the ESSIC society proposed more rigorous and demanding diagnostic methods with specific classification criteria so that it cannot be confused with other, similar conditions. Specifically, they require that a person must have pain associated with the bladder, accompanied by one other urinary symptom. Thus, a person with just frequency or urgency would be excluded from a diagnosis. Secondly, they strongly encourage the exclusion of confusable diseases through an extensive and expensive series of tests including (A) a medical history and physical exam, (B) a dipstick urinalysis, various urine cultures, and a serum PSA in men over 40, (C) flowmetry and post-void residual urine volume by ultrasound scanning and (D) cystoscopy. A diagnosis of IC/BPS would be confirmed with a hydrodistention during cystoscopy with biopsy. They also propose a ranking system based upon the physical findings in the bladder. People would receive a numeric and letter based score based upon the severity of their disease as found during the hydrodistention. A score of 1–3 would relate to the severity of the disease and a rating of A–C represents biopsy findings. Thus, a person with 1A would have very mild symptoms and disease while a person with 3C would have the worst possible symptoms. Widely recognized scoring systems such as the O'Leary Sant symptom and problem score have emerged to evaluate the severity of IC symptoms such as pain and urinary symptoms. Differential diagnosis The symptoms of IC/BPS are often misdiagnosed as a urinary tract infection. However, IC/BPS has not been shown to be caused by a bacterial infection and antibiotics are an ineffective treatment. IC/BPS is commonly misdiagnosed as chronic prostatitis/chronic pelvic pain syndrome (CP/CPPS) in men, and endometriosis and uterine fibroids (in women). Treatment In 2011, the American Urological Association released consensus-based guideline for the diagnosis and treatment of interstital cystitis. They include treatments ranging from conservative to more invasive: First-line treatments — education, self care (diet modification), stress management Second-line treatments — physical therapy, oral medications (amitriptyline, cimetidine or hydroxyzine, pentosan polysulfate), bladder instillations (DMSO, heparin, or lidocaine) Third-line treatments — treatment of Hunner's lesions (laser, fulguration or triamcinolone injection), hydrodistention (low pressure, short duration) Fourth-line treatments — neuromodulation (sacral or pudendal nerve) Fifth-line treatments — cyclosporine A, botulinum toxin (BTX-A) Sixth-line treatments — surgical intervention (urinary diversion, augmentation, cystectomy) The American Urological Association guidelines also listed several discontinued treatments, including long-term oral antibiotics, intravesical bacillus Calmette Guerin, intravesical resiniferatoxin), high-pressure and long-duration hydrodistention, and systemic glucocorticoids. Bladder distension Bladder distension while under general anesthesia, also known as hydrodistention (a procedure which stretches the bladder capacity), has shown some success in reducing urinary frequency and giving short-term pain relief to those with IC. However, it is unknown exactly how this procedure causes pain relief. Recent studies show pressure on pelvic trigger points can relieve symptoms. The relief achieved by bladder distensions is only temporary (weeks or months), so is not viable as a long-term treatment for IC/BPS. The proportion of people with IC/BPS who experience relief from hydrodistention is currently unknown and evidence for this modality is limited by a lack of properly controlled studies. Bladder rupture and sepsis may be associated with prolonged, high-pressure hydrodistention. Bladder instillations Bladder instillation of medication is one of the main forms of treatment of interstitial cystitis, but evidence for its
on administration and development of colonies International Compact with Iraq, a 2007 joint initiative of Iraq and the United Nations Investment Company Institute, an American investment company trade organization A Woman's Place (bookstore), also referred to as ICI and Information Center Incorporate Media Ici (magazine), a former alternative French language weekly newspaper in Montreal, Canada Ici Radio-Canada, branding of Radio-Canada, the French language service of the Canadian Broadcasting Corporation beginning in 2013 ICI (TV channel) (International Channel/Canal International), Montreal ethnic / multicultural television channel Science and technology ICI (programming language), a computer programming language developed in 1992 Inter Carrier Interface, a telecommunications transport protocol for use with SMDS Interactive Compilation Interface, a framework for compiler research
art projects International Colonial Institute, an Brussels-based think tank on administration and development of colonies International Compact with Iraq, a 2007 joint initiative of Iraq and the United Nations Investment Company Institute, an American investment company trade organization A Woman's Place (bookstore), also referred to as ICI and Information Center Incorporate Media Ici (magazine), a former alternative French language weekly newspaper in Montreal, Canada Ici Radio-Canada, branding of Radio-Canada, the French language service of the Canadian Broadcasting Corporation beginning in 2013 ICI (TV channel) (International Channel/Canal International), Montreal ethnic / multicultural television channel Science and technology ICI (programming language), a computer programming language developed in 1992 Inter Carrier Interface, a telecommunications transport protocol for use with SMDS Interactive Compilation
his tenure. During his tenure, ICI created the wholly owned subsidiary Cleveland Potash Ltd, for the construction of Boulby Mine in Redcar and Cleveland, North Yorkshire. The first shaft was dug in 1968, with full production from 1976. ICI jointly owned the mine with Anglo American, and then with De Beers, before complete ownership was transferred to Israel Chemicals Ltd in 2002. Jack Callard was appointed chairman from 1971 to 1975. He almost doubled company profits between 1972 and 1974, and made ICI Britain's largest exporter. In 1971, the company acquired Atlas Chemical Industries Inc., a major American competitor. In 1977, Imperial Metal Industries was divested as an independent quoted company. From 1982 to 1987, the company was led by the charismatic John Harvey-Jones. Under his leadership, the company acquired the Beatrice Chemical Division in 1985 and Glidden Coatings & Resins, a leading paints business, in 1986. Reorganisation of the business (1991–2007) In 1991, ICI sold the agricultural and merchandising operations of BritAg and Scottish Agricultural Industries to Norsk Hydro, and fought off a hostile takeover bid from Hanson, who had acquired 2.8 percent of the company. It also divested its soda ash products arm to Brunner Mond, ending an association with the trade that had existed since the company's inception, one that had been inherited from the original Brunner, Mond & Co. Ltd. In 1992, the company sold its nylon business to DuPont. In 1993, the company de-merged its pharmaceutical bio-science businesses: pharmaceuticals, agrochemicals, specialities, seeds and biological products were all transferred into a new and independent company called Zeneca. Zeneca subsequently merged with Astra AB to form AstraZeneca. Charles Miller Smith was appointed CEO in 1994, one of the few times that someone from outside ICI had been appointed to lead the company, Smith having previously been a director at Unilever. Shortly afterwards, the company acquired a number of former Unilever businesses in an attempt to move away from its historical reliance on commodity chemicals. In 1995, ICI acquired the American paint companies Devoe Paints, Fuller-O'Brien Paints and Grow Group. In 1997, ICI acquired National Starch & Chemical, Quest International, Unichema, and Crosfield, the speciality chemicals businesses of Unilever for $8 billion. This step was part of a strategy to move away from cyclical bulk chemicals and to progress up the value chain to become a higher growth, higher margin business. Later that year it went on to buy Rutz & Huber, a Swiss paints business. Having taken on some £4 billion of debt to finance these acquisitions, the company had to sell off its commodity chemicals businesses: Disposals of bulk chemicals businesses at that time included the sale of its Australian subsidiary, ICI Australia, for £1 billion in 1997, and of its polyester chemicals business to DuPont for $3 billion also in 1997. In 1998, it bought Acheson Industries Inc., an electronic chemicals business. In 2000, ICI sold its diisocyanate, advanced materials, and speciality chemicals businesses on Teesside and worldwide (including plants at Rozenburg in the Netherlands, and South Africa, Malaysia and Taiwan), and Tioxide, its titanium dioxide subsidiary, to Huntsman Corporation for £1.7 billion. It also sold the last of its industrial chemicals businesses to Ineos for £325 million. In 2002, the ICI wholly transferred ownership of Boulby Mine to Israel Chemicals Ltd. In 2006, the Company sold Quest International, its flavours and fragrances business, to Givaudan, for £1.2 billion and Uniqema, its oleochemical business, to Croda International, for £410 million. Having sold much of its historically profitable commodities businesses, and many of the new speciality businesses which it had failed to integrate, the company consisted mainly of the Dulux paints business, which quickly found itself the subject of a takeover by AkzoNobel. Takeover by AkzoNobel Dutch firm AkzoNobel (owner of Crown Berger paints) bid £7.2 billion (€10.66 billion or $14.5 billion) for ICI in June 2007. An area of concern about a potential deal was ICI's British pension fund, which had future liabilities of more than £9 billion at the time. Regulatory issues in the UK and other markets where Dulux and Crown Paints brands each have significant market share were also a cause for concern for the boards of ICI and AkzoNobel. In the UK, any combined operation without divestments would have seen AkzoNobel have a 54 per cent market share in the paint market. The initial bid was rejected by the ICI board and the majority of shareholders. However, a subsequent bid for £8 billion (€11.82 billion) was accepted by ICI in August 2007, pending approval by regulators. On 2 January 2008, completion of the takeover of ICI plc by AkzoNobel was announced. Shareholders of ICI received either £6.70 in cash or AkzoNobel loan notes to the value of £6.70 per one nominal ICI share. The adhesives business of ICI was transferred to Henkel as a result of the deal, while AkzoNobel agreed to sell its Crown Paints subsidiary to satisfy the concerns of the European Commissioner for Competition. The areas of concern regarding the ICI UK pension scheme were addressed by ICI and AkzoNobel. Operations ICI operated a number of chemical sites around the world. In the UK, the main plants were as follows: Billingham Manufacturing Plant (in Stockton-on-Tees) and Wilton (in present-day Redcar and Cleveland): ICI used the Billingham site to manufacture fertilisers in the 1920s and went on to produce plastics at Billingham in 1934. During World War II it manufactured Synthonia, a synthetic ammonia for explosives. The Wilton R&D site was built to support the plastics division with R&D and chemical engineering facilities. The ICI Billingham Division was split into the ICI Heavy Organic Chemicals Division and ICI Agricultural Division in the 1960s. From 1971 to 1988 ICI Physics and Radioisotopes Section (later known as Tracerco) operated a small General Atomics TRIGA Mark I nuclear reactor at its Billingham factory for the production of radioisotopes used in the manufacture of flow and level instruments, among other products. The Agricultural Division was noted for the development of the world's largest bioreactor at the time – the 1.5 million litre Pruteen Reactor, used for the cultivation of animal feed. Engineering models of components and the builder's model of the complete plant are now in the collection of the Science Museum London. Pruteen had limited economic success but was followed by the much more successful development of Quorn. Blackley (in Manchester) and Huddersfield: ICI used the sites to manufacture dyestuffs. The dye business, known as the ICI Dyestuffs Division in the 1960s, went through several reorganisations. Huddersfield was tied in with Wilton with the production of nitrobenzene and nitrotoluene. Huddersfield also produced insecticides. (Syngenta still manufacture insecticides at Huddersfield). Proxel Biocide was made at Huddersfield from the 80's onwards. Additives also made at Huddersield. Huddersfield became Zeneca then AstraZeneca, in 2004 Huddersfield was Syngenta, Avecia, Arch and Lubrizol running what were all ICI plants at one time. Through the years it was combined with other speciality chemicals businesses and became Organics Division. Then became ICI Colours and Fine Chemicals and then ICI Specialties. Runcorn (in Cheshire): ICI operated a number of separate sites within the Runcorn area, including Castner-Kellner site, where ICI manufactured chlorine and sodium hydroxide (caustic soda). Adjacent to Castner-Kellner site was Rocksavage works, where a variety of chemicals based on chlorine products were manufactured, including Chloromethanes, Arklone dry cleaning fluid, Trichloethylene degreasing fluid and the Arcton range of CFCs. Also on that site were PVC manufacture and HF
paid Courtaulds £2 million a year for five years, "to take account of the future development expenditure of Courtaulds in the nylon field." In return, Courtaulds transferred to ICI their 50 per cent holding in BNS. BNS was absorbed into ICI's existing polyester operation, ICI Fibres. The acquisition included BNS production plants in Pontypool, Gloucester and Doncaster, together with research and development in Pontypool. Early pesticide development under ICI Plant Protection Division, with its plant at Yalding, Kent, research station at Jealott's Hill and HQ at Fernhurst Research Station included paraquat (1962, a herbicide), the insecticides pirimiphos-methyl in 1967 and pirimicarb in 1970, brodifacoum (a rodenticide) was developed in 1974; in the late 1970s, ICI was involved in the early development of synthetic pyrethroid insecticides such as lambda-cyhalothrin. Peter Allen was appointed chairman between 1968 and 1971. He presided over the purchase of Viyella. Profits shrank under his tenure. During his tenure, ICI created the wholly owned subsidiary Cleveland Potash Ltd, for the construction of Boulby Mine in Redcar and Cleveland, North Yorkshire. The first shaft was dug in 1968, with full production from 1976. ICI jointly owned the mine with Anglo American, and then with De Beers, before complete ownership was transferred to Israel Chemicals Ltd in 2002. Jack Callard was appointed chairman from 1971 to 1975. He almost doubled company profits between 1972 and 1974, and made ICI Britain's largest exporter. In 1971, the company acquired Atlas Chemical Industries Inc., a major American competitor. In 1977, Imperial Metal Industries was divested as an independent quoted company. From 1982 to 1987, the company was led by the charismatic John Harvey-Jones. Under his leadership, the company acquired the Beatrice Chemical Division in 1985 and Glidden Coatings & Resins, a leading paints business, in 1986. Reorganisation of the business (1991–2007) In 1991, ICI sold the agricultural and merchandising operations of BritAg and Scottish Agricultural Industries to Norsk Hydro, and fought off a hostile takeover bid from Hanson, who had acquired 2.8 percent of the company. It also divested its soda ash products arm to Brunner Mond, ending an association with the trade that had existed since the company's inception, one that had been inherited from the original Brunner, Mond & Co. Ltd. In 1992, the company sold its nylon business to DuPont. In 1993, the company de-merged its pharmaceutical bio-science businesses: pharmaceuticals, agrochemicals, specialities, seeds and biological products were all transferred into a new and independent company called Zeneca. Zeneca subsequently merged with Astra AB to form AstraZeneca. Charles Miller Smith was appointed CEO in 1994, one of the few times that someone from outside ICI had been appointed to lead the company, Smith having previously been a director at Unilever. Shortly afterwards, the company acquired a number of former Unilever businesses in an attempt to move away from its historical reliance on commodity chemicals. In 1995, ICI acquired the American paint companies Devoe Paints, Fuller-O'Brien Paints and Grow Group. In 1997, ICI acquired National Starch & Chemical, Quest International, Unichema, and Crosfield, the speciality chemicals businesses of Unilever for $8 billion. This step was part of a strategy to move away from cyclical bulk chemicals and to progress up the value chain to become a higher growth, higher margin business. Later that year it went on to buy Rutz & Huber, a Swiss paints business. Having taken on some £4 billion of debt to finance these acquisitions, the company had to sell off its commodity chemicals businesses: Disposals of bulk chemicals businesses at that time included the sale of its Australian subsidiary, ICI Australia, for £1 billion in 1997, and of its polyester chemicals business to DuPont for $3 billion also in 1997. In 1998, it bought Acheson Industries Inc., an electronic chemicals business. In 2000, ICI sold its diisocyanate, advanced materials, and speciality chemicals businesses on Teesside and worldwide (including plants at Rozenburg in the Netherlands, and South Africa, Malaysia and Taiwan), and Tioxide, its titanium dioxide subsidiary, to Huntsman Corporation for £1.7 billion. It also sold the last of its industrial chemicals businesses to Ineos for £325 million. In 2002, the ICI wholly transferred ownership of Boulby Mine to Israel Chemicals Ltd. In 2006, the Company sold Quest International, its flavours and fragrances business, to Givaudan, for £1.2 billion and Uniqema, its oleochemical business, to Croda International, for £410 million. Having sold much of its historically profitable commodities businesses, and many of the new speciality businesses which it had failed to integrate, the company consisted mainly of the Dulux paints business, which quickly found itself the subject of a takeover by AkzoNobel. Takeover by AkzoNobel Dutch firm AkzoNobel (owner of Crown Berger paints) bid £7.2 billion (€10.66 billion or $14.5 billion) for ICI in June 2007. An area of concern about a potential deal was ICI's British pension fund, which had future liabilities of more than £9 billion at the time. Regulatory issues in the UK and other markets where Dulux and Crown Paints brands each have significant market share were also a cause for concern for the boards of ICI and AkzoNobel. In the UK, any combined operation without divestments would have
German airlines that enjoyed heavy government subsidies and following the advice of the government's Hambling Committee (formally known as the C.A.T Subsidies Committee) under Sir Herbert Hambling. The committee, set up on 2 January 1923, produced a report on 15 February 1923 recommending that four of the largest existing airlines, the Instone Air Line Company, owned by shipping magnate Samuel Instone, Noel Pemberton Billing's British Marine Air Navigation (part of the Supermarine flying-boat company), the Daimler Airway, under the management of George Edward Woods, and Handley Page Transport Co Ltd., should be merged. It was hoped that this would create a company which could compete against French and German competition and would be strong enough to develop Britain's external air services while minimizing government subsidies for duplicated services. With this in view, a £1m subsidy over ten years was offered to encourage the merger. Agreement was made between the President of the Air Council and the British, Foreign and Colonial Corporation on 3 December 1923 for the company, under the title of the 'Imperial Air Transport Company' to acquire existing air transport services in the UK. The agreement set out the government subsidies for the new company: £137,000 in the first year diminishing to £32,000 in the tenth year as well as minimum mileages to be achieved and penalties if these weren't met. Imperial Airways Limited was formed on 31 March 1924 with equipment from each contributing concern: British Marine Air Navigation Company Ltd, the Daimler Airway, Handley Page Transport Ltd and the Instone Air Line Ltd. Sir Eric Geddes was appointed the chairman of the board with one director from each of the merged companies. The government had appointed two directors, Hambling (who was also President of the Institute of Bankers) and Major John Hills, a former Treasury Financial Secretary. The land operations were based at Croydon Airport to the south of London. IAL immediately discontinued its predecessors' service to points north of London, the airline being focused on international and imperial service rather than domestic. Thereafter the only IAL aircraft operating 'North of Watford' were charter flights. Industrial troubles with the pilots delayed the start of services until 26 April 1924, when a daily London–Paris route was opened with a de Havilland DH.34. Thereafter the task of expanding the routes between England and the Continent began, with Southampton–Guernsey on 1 May 1924, London-Brussels–Cologne on 3 May, London–Amsterdam on 2 June 1924, and a summer service from London–Paris–Basel–Zürich on 17 June 1924. The first new airliner ordered by Imperial Airways, was the Handley Page W8f City of Washington, delivered on 3 November 1924. In the first year of operation the company carried 11,395 passengers and 212,380 letters. In April 1925, the film The Lost World became the first film to be screened for passengers on a scheduled airliner flight when it was shown on the London-Paris route. Empire services Route proving Between 16 November 1925 and 13 March 1926, Alan Cobham made an Imperial Airways' route survey flight from the UK to Cape Town and back in the Armstrong Siddeley Jaguar–powered de Havilland DH.50J floatplane G-EBFO. The outward route was London–Paris–Marseille–Pisa–Taranto–Athens–Sollum–Cairo–Luxor–Aswan–Wadi Halfa–Atbara–Khartoum–Malakal–Mongalla–Jinja–Kisumu–Tabora–Abercorn–Ndola–Broken Hill–Livingstone–Bulawayo–Pretoria–Johannesburg–Kimberley–Blomfontein–Cape Town. On his return Cobham was awarded the Air Force Cross for his services to aviation. On 30 June 1926, Cobham took off from the River Medway at Rochester in G-EBFO to make an Imperial Airways route survey for a service to Melbourne, arriving on 15 August 1926. He left Melbourne on 29 August 1926, and, after completing in 320 hours flying time over 78 days, he alighted on the Thames at Westminster on 1 October 1926. Cobham was met by the Secretary of State for Air, Sir Samuel Hoare, and was subsequently knighted by HM King George V. On 27 December 1926, Imperial Airways de Havilland DH.66 Hercules G-EBMX City of Delhi left Croydon for a survey flight to India. The flight reached Karachi on 6 January 1927 and Delhi on 8 January 1927. The aircraft was named by Lady Irwin, wife of the Viceroy, on 10 January 1927. The return flight left on 1 February 1927 and arrived at Heliopolis, Cairo on 7 February 1927. The flying time from Croydon to Delhi was 62 hours 27 minutes and Delhi to Heliopolis 32 hours 50 minutes. The Eastern Route Regular services on the Cairo to Basra route began on 12 January 1927 using DH.66 aircraft, replacing the previous RAF mail flight. Following 2 years of negotiations with the Persian authorities regarding overflight rights, a London to Karachi service started on 30 March 1929, taking 7 days and consisting of a flight from London to Basle, a train to Genoa and a Short S.8 Calcutta flying boats to Alexandria, a train to Cairo and finally a DH.66 flight to Karachi. The route was extended as far as Delhi on 29 December 1929. The route across Europe and the Mediterranean changed many times over the next few years but almost always involved a rail journey. In April 1931 an experimental London-Australia air mail flight took place; the mail was transferred at the Dutch East Indies, and took 26 days in total to reach Sydney. For the passenger flight leaving London on 1 October 1932, the Eastern route was switched from the Persian to the Arabian side of the Persian Gulf, and Handley Page HP 42 airliners were introduced on the Cairo to Karachi sector. The move saw the establishment of an airport and rest house, Mahatta Fort, in the Trucial State of Sharjah now part of the United Arab Emirates. On 29 May 1933 an
British colonies were men doing colonial administration, business or research. To begin with only the wealthy could afford to fly, but passenger lists gradually diversified. Travel experiences related to flying low and slow, and were reported enthusiastically in newspapers, magazines and books. There was opportunity for sightseeing from the air and at stops. Crews Imperial Airways stationed its all-male flight deck crew, cabin crew and ground crew along the length of its routes. Specialist engineers and inspectors – and ground crew on rotation or leave – travelled on the airline without generating any seat revenue. Several air crew lost their lives in accidents. At the end of the 1930s crew numbers approximated 3,000. All crew were expected to be ambassadors for Britain and the British Empire. Air Mail In 1934 the Government began negotiations with Imperial Airways to establish a service (Empire Air Mail Scheme) to carry mail by air on routes served by the airline. Indirectly these negotiations led to the dismissal in 1936 of Sir Christopher Bullock, the Permanent Under-Secretary at the Air Ministry, who was found by a Board of Inquiry to have abused his position in seeking a position on the board of the company while these negotiations were in train. The Government, including the Prime Minister, regretted the decision to dismiss him, later finding that, in fact, no corruption was alleged and sought Bullock's reinstatement which he declined. The Empire Air Mail Programme started in July 1937, delivering anywhere for 1 d./oz. By mid-1938 a hundred tons of mail had been delivered to India and a similar amount to Africa. In the same year, construction was started on the Empire Terminal in Victoria, London, designed by A. Lakeman and with a statue by Eric Broadbent, Speed Wings Over the World gracing the portal above the main entrance. From the terminal there were train connections to Imperial's flying boats at Southampton and coaches to its landplane base at Croydon Airport. The terminal operated as recently as 1980. To help promote use of the Air Mail service, in June and July 1939, Imperial Airways participated with Pan American Airways in providing a special "around the world" service; Imperial carried the souvenir mail from Foynes, Ireland, to Hong Kong, out of the eastbound New York to New York route. Pan American provided service from New York to Foynes (departing 24 June, via the first flight of Northern FAM 18) and Hong Kong to San Francisco (via FAM 14), and United Airlines carried it on the final leg from San Francisco to New York, arriving on 28 July. Captain H.W.C. Alger was the pilot for the inaugural air mail flight carrying mail from England to Australia for the first time on the Short Empire flyingboat Castor for Imperial Airways' Empires Air Routes, in 1937. In November 2016, 80 years later, the Crete2Cape Vintage Air Rally flew this old route with fifteen vintage aeroplanes - a celebration of the skill and determination of these early aviators. Second World War Before the outbreak of war on 1 September 1939, the British government had already implemented the Air Navigation (Restriction in Time of War) Order 1939. That ordered military takeover of most civilian airfields in the UK, cessation of all private flying without individual flight permits, and other emergency measures. It was administered by a statutory department of the Air Ministry titled National Air Communications (NAC). By 1 September 1939, the aircraft and administrations of Imperial Airways and British Airways Ltd were physically transferred to Bristol (Whitchurch) Airport, to be operated jointly by NAC. On 1 April 1940, Imperial Airways Ltd and British Airways Ltd were officially combined into a new company, British Overseas Airways Corporation (BOAC), that had already been formed on 24 November 1939 with retrospective financial arrangements. Accidents and incidents Fatal accidents 1920s 24 December 1924: de Havilland DH.34 G-EBBX City of Delhi crashed and caught fire shortly after take-off from Croydon Airport, killing the pilot and all seven passengers. 13 July 1928: Vickers Vulcan G-EBLB crashed at Purley during a test flight, killing four of the six people on board. As a result of the crash, Imperial Airways stopped the flying of staff (so called joy rides) during test flights. 17 June 1929: Handley Page W.10 G-EBMT City of Ottawa ditched in the English Channel following engine failure whilst on a flight from Croydon to Paris with the loss of seven lives. 6 September 1929: de Havilland Hercules G-EBMZ City of Jerusalem crashed and burned on landing at Jask, Iran in the dark due to the pilot misjudging the altitude and stalling the aircraft, killing three of five on board. 26 October 1929: Short Calcutta G-AADN City of Rome force-landed off La Spezia, Italy in poor weather; the flying boat sank in the night during attempts to tow it to shore, killing all seven on board. 1930s 30 October 1930: Handley Page W.8g G-EBIX City of Washington struck high ground in fog at Boulogne, Paris, France, killing three of six on board. 28 March 1933: Armstrong Whitworth Argosy G-AACI City of Liverpool crashed at Diksmuide, Belgium following an in-flight fire. This is suspected to be the first case of sabotage in the air. All fifteen people on board were killed. 30 December 1933: Avro Ten G-ABLU Apollo collided with a radio mast at Ruysselede, Belgium and crashed. All ten people on board were killed. 31 December 1935: Short Calcutta G-AASJ City of Khartoum crashed off Alexandria, Egypt when all four engines failed on approach, possibly due to fuel starvation; twelve of 13 on board drowned when the flying boat sank. 22 August 1936: Short Kent G-ABFA Scipio sank at Mirabello Bay, Crete after a heavy landing, killing two of 11 on board. 24 March 1937: Short Empire G-ADVA Capricornus crashed in the Beaujolois Mountains near Ouroux, France, following a navigation error, killing five. 1 October 1937: Short Empire G-ADVC Courtier crashed on landing in Phaleron Bay, Greece due to poor visibility, killing two of 15 on board. 5 December 1937: Short Empire G-ADUZ Cygnus crashed on takeoff from Brindisi, Italy due to incorrect flap settings, killing two. 27 July 1938: Armstrong Whitworth Atalanta G-ABTG Amalthea flew into a hillside near Kisumu, Kenya shortly after takeoff, killing all four on board. 27 November 1938: Short Empire G-AETW Calpurnia crashed in Lake Habbaniyah, Iraq in bad weather after the pilot descended to maintain visual contact with the ground following spatial disorientation, killing all four crew. 21 January 1939: Short Empire G-ADUU Cavalier ditched in the Atlantic 285 mi off New York due to carburettor icing and loss of engine power; three drowned while ten survivors were picked up by the tanker Esso Baytown. Thereafter Imperial Airways and Pan-American trans-oceanic flying boats had the upper surfaces of the wings painted with orange high visibility markings. 1 May 1939: Short Empire G-ADVD Challenger crashed in the Lumbo lagoon while attempting to land at Lumbo Airport, killing two of six on board. 1940 1 March 1940: Flight 197, operated by Handley Page H.P.42 G-AAGX Hannibal, disappeared over the Gulf of Oman with eight on board; no wreckage, cargo or occupants have been found. The cause of the crash remains unknown, but fuel starvation, a bird strike damaging a propeller and causing an engine or wing to separate, an in-flight breakup or multiple engine failure were theorized. Two months after the crash, the H.P.42 was withdrawn from passenger operations. It was also recommended that all commercial aircraft used in long flights over water be equipped with personal and group life saving gear; this would later become standard throughout the airline industry. Non-fatal accidents 21 October 1926: Handley Page W.10 G-EBMS City of Melbourne ditched in the English Channel off
the case to the King for a Royal Pardon. From 1500 onwards, juries could acquit the insane, and detention required a separate civil procedure. The Criminal Lunatics Act 1800, passed with retrospective effect following the acquittal of James Hadfield, mandated detention at the regent's pleasure (indefinitely) even for those who, although insane at the time of the offence, were now sane. The M'Naghten Rules of 1843 were not a codification or definition of insanity but rather the responses of a panel of judges to hypothetical questions posed by Parliament in the wake of Daniel M'Naghten's acquittal for the homicide of Edward Drummond, whom he mistook for British Prime Minister Robert Peel. The rules define the defense as "at the time of committing the act the party accused was labouring under such a defect of reason, from disease of the mind, as not to know the nature and quality of the act he was doing, or as not to know that what he was doing was wrong." The key is that the defendant could not appreciate the nature of his actions during the commission of the crime. In Ford v. Wainwright 477 U.S. 399 (1986), the US Supreme Court upheld the common law rule that the insane cannot be executed. It further stated that a person under the death penalty is entitled to a competency evaluation and to an evidentiary hearing in court on the question of his competency to be executed. In Wainwright v. Greenfield, the Court ruled that it was fundamentally unfair for the prosecutor to comment during the court proceedings on the petitioner's silence invoked as a result of a Miranda warning. The prosecutor had argued that the respondent's silence after receiving Miranda warnings was evidence of his sanity. Application Incompetency and mental illness An important distinction to be made is the difference between competency and criminal responsibility. The issue of competency is whether a defendant is able to adequately assist his attorney in preparing a defense, make informed decisions about trial strategy and whether to plead guilty, accept a plea agreement or plead not guilty. This issue is dealt with in UK law as "fitness to plead". Competency largely deals with the defendant's present condition, while criminal responsibility addresses the condition at the time the crime was committed. In the United States, a trial in which the insanity defense is invoked typically involves the testimony of psychiatrists or psychologists who will, as expert witnesses, present opinions on the defendant's state of mind at the time of the offense. Therefore, a person whose mental disorder is not in dispute is determined to be sane if the court decides that despite a "mental illness" the defendant was responsible for the acts committed and will be treated in court as a normal defendant. If the person has a mental illness and it is determined that the mental illness interfered with the person's ability to determine right from wrong (and other associated criteria a jurisdiction may have) and if the person is willing to plead guilty or is proven guilty in a court of law, some jurisdictions have an alternative option known as either a Guilty but Mentally Ill (GBMI) or a Guilty but Insane verdict. The GBMI verdict is available as an alternative to, rather than in lieu of, a "not guilty by reason of insanity" verdict. Michigan (1975) was the first state to create a GBMI verdict, after two prisoners released after being found NGRI committed violent crimes within a year of release, one raping two women and the other killing his wife. Temporary insanity The notion of temporary insanity argues that a defendant was insane during the commission of a crime, but they later regained their sanity after the criminal act was carried out. This legal defense is commonly used to defend individuals that have committed crimes of passion. The defense was first successfully used by U.S. Congressman Daniel Sickles of New York in 1859 after he had killed his wife's lover, Philip Barton Key. Mitigating factors and diminished capacity The United States Supreme Court (in Penry v. Lynaugh) and the United States Court of Appeals for the Fifth Circuit (in Bigby v. Dretke) have been clear in their decisions that jury instructions in death penalty cases that do not ask about mitigating factors regarding the defendant's mental health violate the defendant's Eighth Amendment rights, saying that the jury is to be instructed to consider mitigating factors when answering unrelated questions. This ruling suggests specific explanations to the jury are necessary to weigh mitigating factors. Diminished responsibility or diminished capacity can be employed as a mitigating factor or partial defense to crimes. In the United States, diminished capacity is applicable to more circumstances than the insanity defense. The Homicide Act 1957 is the statutory basis for the defense of diminished responsibility in England and Wales, whereas in Scotland it is a product of case law. The number of findings of diminished responsibility has been matched by a fall in unfitness to plead and insanity findings. A plea of diminished capacity is different from a plea of insanity in that "reason of insanity" is a full defense while "diminished capacity" is merely a plea to a lesser crime. Withdrawal or refusal of defense Several cases have ruled that persons found not guilty by reason of insanity may not withdraw the defense in a habeas petition to pursue an alternative, although there have been exceptions in other rulings. In Colorado v. Connelly, 700 A.2d 694 (Conn. App. Ct. 1997), the petitioner who had originally been found not guilty by reason of insanity and committed for ten years to the jurisdiction of a Psychiatric Security Review Board, filed a pro se writ of habeas corpus and the court vacated his insanity acquittal. He was granted a new trial and found guilty of the original charges, receiving a prison sentence of 40 years. In the landmark case of Frendak v. United States in 1979, the court ruled that the insanity defense cannot be imposed upon an unwilling defendant if an intelligent defendant voluntarily wishes to forgo the defense. Usage This increased coverage gives the impression that the defense is widely used, but this is not the case. According to an eight-state study, the insanity defense is used in less than 1% of all court cases and, when used, has only a 26% success rate. Of those cases that were successful, 90% of the defendants had been previously diagnosed with mental illness. Psychiatric treatment Those found to have been not guilty by reason of mental disorder or insanity are generally then required to undergo psychiatric treatment in a mental institution, except in the case of temporary insanity (see below). In England and Wales, under the Criminal Procedure (Insanity and Unfitness to Plead) Act of 1991 (amended by the Domestic Violence, Crime and Victims Act, 2004 to remove the option of a guardianship order), the court can mandate a hospital order, a restriction order (where release from hospital requires the permission of the Home Secretary), a "supervision and treatment" order, or an absolute discharge. Unlike defendants who are found guilty of a crime, they are not institutionalized for a fixed period, but rather held in the institution until they are determined not to be a threat. Authorities making this decision tend to be cautious, and as a result, defendants can often be institutionalized for longer than they would have been incarcerated in prison. Worldwide Australia In Australia there are nine law units, each of which may have different rules governing mental impairment defenses. South Australia In South Australia, the Criminal Law Consolidation Act 1935 (SA) provides that: 269C—Mental competence A person is mentally incompetent to commit an offence if, at the time of the conduct alleged to give rise to the offence, the person is suffering from a mental impairment and, in consequence of the mental impairment— (a) does not know the nature and quality of the conduct; or (b) does not know that the conduct is wrong; or (c) is unable to control the conduct. 269H—Mental unfitness to stand trial A person is mentally unfit to stand trial on a charge of an offence if the person's mental processes are so disordered or impaired that the person is— (a) unable to understand, or to respond rationally to, the charge or the allegations on which the charge is based; or (b) unable to exercise (or to give rational instructions about the exercise of) procedural rights (such as, for example, the right to challenge jurors); or (c) unable to understand the nature of the proceedings, or to follow the evidence or the course of the proceedings. Victoria In Victoria the current defence of mental impairment was introduced in the Crimes (Mental Impairment and Unfitness to be Tried) Act 1997 which replaced the common law defence of insanity and indefinite detention at the governor's pleasure with the following: the accused was suffering from a mental impairment; and the mental impairment affected the accused so they either did not understand the nature and quality of the conduct, or did not know that it was wrong. These requirements are almost identical to the M'Naghten Rules, substituting "mental impairment" for "disease of the mind". New South Wales In New South Wales, the defence has been renamed the 'Defence of Mental Illness' in Part 4 of the Mental Health (Forensic Provisions) Act 1990. However, definitions of the defence are derived from M'Naghten's case and have not been codified. Whether a particular condition amounts to a disease of the mind is not a medical but a legal question to be decided in accordance with the ordinary rules of interpretation. This defence is an exception to the Woolmington v DPP (1935) 'golden thread', as the party raising the issue of the defence of mental illness bears the burden of proving this defence on the balance of probabilities. Generally, the defence will raise the issue of insanity. However, the prosecution can raise it in exceptional circumstances: R v Ayoub (1984). Australian cases have further qualified and explained the M'Naghten Rules. The NSW Supreme Court has held there are two limbs to the M'Naghten Rules, that the accused did not know what he was doing, or that the accused did not appreciate that what he was doing was morally wrong, in both cases the accused must be operating under a 'defect of reason, from a disease of the mind'. The High Court in R v Porter stated that the condition of the accused's mind is relevant only at the time of the actus reus. In Woodbridge v The Queen the court stated that a symptom indicating a disease of the mind must be prone to recur and be the result of an underlying pathological infirmity. A ‘defect of reason’ is the inability to think rationally and pertains to incapacity to reason, rather than having unsound ideas or difficulty with such a task. Examples of disease of the mind include Arteriosclerosis (considered so because the hardening of the arteries affects the mind. Canada Criminal Code provisions The defence of mental disorder is codified in section 16 of the Criminal Code which states, in part: 16. (1) No person is criminally responsible for an act committed or an omission made while suffering from a mental disorder that rendered the person incapable of appreciating the nature and quality of the act or omission or of
1) unable to appreciate the "nature and quality" of the act, or 2) did not know it was "wrong". The meaning of the word "wrong" was determined in the Supreme Court case of R. v. Chaulk [1990] 3 S.C.R. which held that "wrong" was NOT restricted to "legally wrong" but to "morally wrong" as well. Post-verdict conditions The current legislative scheme was created by the Parliament of Canada after the previous scheme was found unconstitutional by the Supreme Court of Canada in R. v. Swain. The new provisions also replaced the old insanity defense with the current mental disorder defence. Once a person is found not criminally responsible ("NCR"), they will have a hearing by a Review Board within 45 days (90 days if the court extends the delay). A Review Board is established under Part XX.1 of the Criminal Code and is composed of at least three members, a person who is a judge or eligible to be a judge, a psychiatrist and another expert in a relevant field, such as social work, criminology or psychology. Parties at a Review Board hearing are usually the accused, the Crown and the hospital responsible for the supervision or assessment of the accused. A Review Board is responsible for both accused persons found NCR or accused persons found unfit to stand trial on account of mental disorder. A Review Board dealing with an NCR offender must consider two questions: whether the accused is a "significant threat to the safety of the public" and, if so, what the "least onerous and least restrictive" restrictions on the liberty of the accused should be in order to mitigate such a threat. Proceedings before a Review Board are inquisitorial rather than adversarial. Often the Review Board will be active in conducting an inquiry. Where the Review Board is unable to conclude that the accused is a significant threat to the safety of the public, the review board must grant the accused an absolute discharge, an order essentially terminating the jurisdiction of the criminal law over the accused. Otherwise, the Review Board must order that the accused be either discharged subject to conditions or detained in a hospital, both subject to conditions. The conditions imposed must be the least onerous and least restrictive necessary to mitigate any danger the accused may pose to others. Since the Review Board is empowered under criminal law powers under s. 91(27) of the Constitution Act, 1867 the sole justification for its jurisdiction is public safety. Therefore, the nature of the inquiry is the danger the accused may pose to public safety rather than whether the accused is "cured". For instance, many "sick" accused persons are discharged absolutely on the basis that they are not a danger to the public while many "sane" accused are detained on the basis that they are dangerous. Moreover, the notion of "significant threat to the safety of the public" is a "criminal threat". This means that the Review Board must find that the threat posed by the accused is of a criminal nature. While proceedings before a Review Board are less formal than in court, there are many procedural safeguards available to the accused given the potential indefinite nature of Part XX.1. Any party may appeal against the decision of a Review Board. In 1992 when the new mental disorder provisions were enacted, Parliament included "capping" provisions which were to be enacted at a later date. These capping provisions limited the jurisdiction of a Review Board over an accused based on the maximum potential sentence had the accused been convicted (e.g. there would be a cap of 5 years if the maximum penalty for the index offence is 5 years). However, these provisions were never proclaimed into force and were subsequently repealed. A Review Board must hold a hearing every 12 months (unless extended to 24 months) until the accused is discharged absolutely. Accused unfit to stand trial The issue of mental disorder may also come into play before a trial even begins if the accused's mental state prevents the accused from being able to appreciate the nature of a trial and to conduct a defence. An accused who is found to be unfit to stand trial is subject to the jurisdiction a Review Board. While the considerations are essentially the same, there are a few provisions which apply only to unfit accused. A Review Board must determine whether the accused is fit to stand trial. Regardless of the determination, the Review Board must then determine what conditions should be imposed on the accused, considering both the protection of the public and the maintenance of the fitness of the accused (or conditions which would render the accused fit). Previously an absolute discharge was unavailable to an unfit accused. However, in R. v. Demers, the Supreme Court of Canada struck down the provision restricting the availability of an absolute discharge to an accused person who is deemed both "permanently unfit" and not a significant threat to the safety of the public. Presently a Review Board may recommend a judicial stay of proceedings in the event that it finds the accused both "permanently unfit" and non-dangerous. The decision is left to the court having jurisdiction over the accused. An additional requirement for an unfit accused is the holding of a "prima facie case" hearing every two years. The Crown must demonstrate to the court having jurisdiction over the accused that it still has sufficient evidence to try the accused. If the Crown fails to meet this burden then the accused is discharged and proceedings are terminated. The nature of the hearing is virtually identical to that of a preliminary hearing. Denmark In Denmark a psychotic person who commits a criminal defense is declared guilty but is sentenced to mandatory treatment instead of prison. Section 16 of the penal code states that "Persons, who, at the time of the act, were irresponsible owing to mental illness or similar conditions or to a pronounced mental deficiency, are not punishable". This means that in Denmark, 'insanity' is a legal term rather than a medical term and that the court retains the authority to decide whether an accused person is irresponsible. Finland In Finland, punishments can only be administered if the accused is compos mentis, of sound mind; not if the accused is insane (syyntakeeton, literally "unable to guarantee [shoulder the responsibility of] guilt"). Thus, an insane defendant may be found guilty based on the facts and his actions just as a sane defendant, but the insanity will only affect the punishment. The definition of insanity is similar to the M'Naught criterion above: "the accused is insane, if during the act, due to a mental illness, profound mental retardation or a severe disruption of mental health or consciousness, he cannot understand the actual nature of his act or its illegality, or that his ability to control his behavior is critically weakened". If an accused is suspected to be insane, the court must consult the National Institute for Health and Welfare (THL), which is obliged to place the accused in involuntary commitment if he is found insane. The offender receives no judicial punishment; he becomes a patient under the jurisdiction of THL, and must be released immediately once the conditions of involuntary commitment are no longer fulfilled. Diminished responsibility is also available, resulting in lighter sentences. Germany According to section 20 of the German criminal code, those who commit an illegal act because a mental disorder makes them unable to see the wrong of the act or to act on this insight is considered not guilty. Norway In Norway, psychotic perpetrators are declared guilty but not punished and, instead of prison, they are sentenced to mandatory treatment. Section 44 of the penal code states specifically that "a person who at the time of the crime was insane or unconscious is not punished". It is the responsibility of a criminal court to consider whether the accused may have been psychotic or suffering from other severe mental defects when perpetrating a criminal act. Thus, even though he himself declared to be sane, the court hearing the case of Anders Behring Breivik considered the question of his sanity. Japan If the ability to recognize the right or wrong of action or the ability to act accordingly is lost due to a mental disorder, then the defendant cannot be pursued under Japanese criminal law so if this is recognized during a trial then an innocent judgment will be given. This is, however, rare, happening in only around 1 in 500,000 cases. Poland Insanity is determined through a judicial decision issued on the basis of expert opinions of psychiatrists and psychologists. Russia A forensic psychiatric examination is used to establish insanity. The result of the forensic examination is then subjected to a legal assessment, taking into account other circumstances of the case, from which a conclusion is drawn about the defendant's sanity or insanity. The Criminal Code of Russia establishes that a person who during the commission of an illegal act was in a state of insanity, that is, could not be aware of the actual nature and social danger of his actions or was unable to control his actions due to a chronic mental disorder, a temporary mental disorder, or dementia is not subject to criminal liability. Sweden In Sweden, psychotic perpetrators are seen as accountable, but the sanction is, if they are psychotic at the time of the trial, forensic mental care. United Kingdom Although use of the insanity defense is rare, since the Criminal Procedure (Insanity and Unfitness to Plead) Act 1991, insanity pleas have steadily increased in the UK. Scotland The Scottish Law Commission, in its Discussion Paper No 122 on Insanity and Diminished Responsibility (2003), pp. 16/18, confirms that the law has not substantially changed from the position stated in Hume's Commentaries: We may next attend to the
drier climates over most of Earth and large land and sea ice masses extending outward from the poles. Mountain glaciers in otherwise unglaciated areas extend to lower elevations due to a lower snow line. Sea levels drop due to the removal of large volumes of water above sea level in the icecaps. There is evidence that ocean circulation patterns are disrupted by glaciations. The glacials and interglacials coincide with changes in orbital forcing of climate due to Milankovitch cycles, which are periodic changes in Earth's orbit and the tilt of Earth's rotational axis. Earth has been in an interglacial period known as the Holocene for around 11,700 years, and an article in Nature in 2004 argues that it might be most analogous to a previous interglacial that lasted 28,000 years. Predicted changes in orbital forcing suggest that the next glacial period would begin at least 50,000 years from now. Moreover, anthropogenic forcing from increased greenhouse gases is estimated to potentially outweigh the orbital forcing of the Milankovitch cycles for hundreds of thousands of years. Feedback processes Each glacial period is subject to positive feedback which makes it more severe, and negative feedback which mitigates and (in all cases so far) eventually ends it. Positive An important form of feedback is provided by Earth's albedo, which is how much of the sun's energy is reflected rather than absorbed by Earth. Ice and snow increase Earth's albedo, while forests reduce its albedo. When the air temperature decreases, ice and snow fields grow, and they reduce forest cover. This continues until competition with a negative feedback mechanism forces the system to an equilibrium. In 1956, Ewing and Donn hypothesized that an ice-free Arctic Ocean leads to increased snowfall at high latitudes. When low-temperature ice covers the Arctic Ocean there is little evaporation or sublimation and the polar regions are quite dry in terms of precipitation, comparable to the amount found in mid-latitude deserts. This low precipitation allows high-latitude snowfalls to melt during the summer. An ice-free Arctic Ocean absorbs solar radiation during the long summer days, and evaporates more water into the Arctic atmosphere. With higher precipitation, portions of this snow may not melt during the summer and so glacial ice can form at lower altitudes and more southerly latitudes, reducing the temperatures over land by increased albedo as noted above. Furthermore, under this hypothesis the lack of oceanic pack ice allows increased exchange of waters between the Arctic and the North Atlantic Oceans, warming the Arctic and cooling the North Atlantic. (Current projected consequences of global warming include a largely ice-free Arctic Ocean within 5–20 years.) Additional fresh water flowing into the North Atlantic during a warming cycle may also reduce the global ocean water circulation. Such a reduction (by reducing the effects of the Gulf Stream) would have a cooling effect on northern Europe, which in turn would lead to increased low-latitude snow retention during the summer. It has also been suggested that during an extensive glacial, glaciers may move through the Gulf of Saint Lawrence, extending into the North Atlantic Ocean far enough to block the Gulf Stream. Negative Ice sheets that form during glaciations erode the land beneath them. This can reduce the land area above sea level and thus diminish the amount of space on which ice sheets can form. This mitigates the albedo feedback, as does the rise in sea level that accompanies the reduced area of ice sheets, since open ocean has a lower albedo than land. Another negative feedback mechanism is the increased aridity occurring with glacial maxima, which reduces the precipitation available to maintain glaciation. The glacial retreat induced by this or any other process can be amplified by similar inverse positive feedbacks as for glacial advances. According to research published in Nature Geoscience, human emissions of carbon dioxide (CO2) will defer the next ice age. Researchers used data on Earth's orbit to find the historical warm interglacial period that looks most like the current one and from this have predicted that the next ice age would usually begin within 1,500 years. They go on to predict that emissions have been so high that it will not. Causes The causes of ice ages are not fully understood for either the large-scale ice age periods or the smaller ebb and flow of glacial–interglacial periods within an ice age. The consensus is that several factors are important: atmospheric composition, such as the concentrations of carbon dioxide and methane (the specific levels of the previously mentioned gases are now able to be seen with the new ice core samples from EPICA Dome C in Antarctica over the past 800,000 years); changes in Earth's orbit around the Sun known as Milankovitch cycles; the motion of tectonic plates resulting in changes in the relative location and amount of continental and oceanic crust on Earth's surface, which affect wind and ocean currents; variations in solar output; the orbital dynamics of the Earth–Moon system; the impact of relatively large meteorites and volcanism including eruptions of supervolcanoes. Some of these factors influence each other. For example, changes in Earth's atmospheric composition (especially the concentrations of greenhouse gases) may alter the climate, while climate change itself can change the atmospheric composition (for example by changing the rate at which weathering removes ). Maureen Raymo, William Ruddiman and others propose that the Tibetan and Colorado Plateaus are immense "scrubbers" with a capacity to remove enough from the global atmosphere to be a significant causal factor of the 40 million year Cenozoic Cooling trend. They further claim that approximately half of their uplift (and "scrubbing" capacity) occurred in the past 10 million years. Changes in Earth's atmosphere There is evidence that greenhouse gas levels fell at the start of ice ages and rose during the retreat of the ice sheets, but it is difficult to establish cause and effect (see the notes above on the role of weathering). Greenhouse gas levels may also have been affected by other factors which have been proposed as causes of ice ages, such as the movement of continents and volcanism. The Snowball Earth hypothesis maintains that the severe freezing in the late Proterozoic was ended by an increase in levels in the atmosphere, mainly from volcanoes, and some supporters of Snowball Earth argue that it was caused in the first place by a reduction in atmospheric . The hypothesis also warns of future Snowball Earths. In 2009, further evidence was provided that changes in solar insolation provide the initial trigger for Earth to warm after an Ice Age, with secondary factors like increases in greenhouse gases accounting for the magnitude of the change. Position of the continents The geological record appears to show that ice ages start when the continents are in positions which block or reduce the flow of warm water from the equator to the poles and thus allow ice sheets to form. The ice sheets increase Earth's reflectivity and thus reduce the absorption of solar radiation. With less radiation absorbed the atmosphere cools; the cooling allows the ice sheets to grow, which further increases reflectivity in a positive feedback loop. The ice age continues until the reduction in weathering causes an increase in the greenhouse effect. There are three main contributors from the layout of the continents that obstruct the movement of warm water to the poles: A continent sits on top of a pole, as Antarctica does today. A polar sea is almost land-locked, as the Arctic Ocean is today. A supercontinent covers most of the equator, as Rodinia did during the Cryogenian period. Since today's Earth has a continent over the South Pole and an almost land-locked ocean over the North Pole, geologists believe that Earth will continue to experience glacial periods in the geologically near future. Some scientists believe that the Himalayas are a major factor in the current ice age, because these mountains have increased Earth's total rainfall and therefore the rate at which carbon dioxide is washed out of the atmosphere, decreasing the greenhouse effect. The Himalayas' formation started about 70 million years ago when the Indo-Australian Plate collided with the Eurasian Plate, and the Himalayas are still rising by about 5 mm per year because the Indo-Australian plate is still moving at 67 mm/year. The history of the Himalayas broadly fits the long-term decrease in Earth's average temperature since the mid-Eocene, 40 million years ago. Fluctuations in ocean currents Another important contribution to ancient climate regimes is the variation of ocean currents, which are modified by continent position, sea levels and salinity, as well as other factors. They have the ability to cool (e.g. aiding the creation of Antarctic ice) and the ability to warm (e.g. giving the British Isles a temperate as opposed to a boreal climate). The closing of the Isthmus of Panama about 3 million years ago may have ushered in the present period of strong glaciation over North America by ending the exchange of water between the tropical Atlantic and Pacific Oceans. Analyses suggest that ocean current fluctuations can adequately account for recent glacial oscillations. During the last glacial period the sea-level has fluctuated 20–30 m as water was sequestered, primarily in the Northern Hemisphere ice sheets. When ice collected and the sea level dropped sufficiently, flow through the Bering Strait (the narrow strait between Siberia and Alaska is about 50 m deep today) was reduced, resulting in increased flow from the North Atlantic. This realigned the thermohaline circulation in the Atlantic, increasing heat transport into the Arctic, which melted the polar ice accumulation and reduced other continental ice sheets. The release of water raised sea levels again, restoring the ingress of colder water from the Pacific with an accompanying shift to northern hemisphere ice accumulation. According to a study published in Nature in 2021, all glacial periods of ice ages over the last 1.5 million years were associated with northward shifts of melting Antarctic icebergs which changed ocean circulation patterns, leading to more CO2 being pulled out of the atmosphere. The authors suggest that this process may be disrupted in the future as the Southern Ocean will become too warm for the icebergs to travel far enough to trigger these changes. Uplift of the Tibetan plateau Matthias Kuhle's geological theory of Ice Age development was suggested by the existence of an ice sheet covering the Tibetan Plateau during the Ice Ages (Last Glacial Maximum?). According to Kuhle, the plate-tectonic uplift of Tibet past the snow-line has led to a surface of c. 2,400,000 square kilometres (930,000 sq mi) changing from bare land to ice with a 70% greater albedo. The reflection of energy into space resulted in a global cooling, triggering the Pleistocene Ice Age. Because this highland is at a subtropical latitude, with 4 to 5 times the insolation of high-latitude areas, what would be Earth's strongest heating surface has turned into a cooling surface. Kuhle explains the interglacial periods by the 100,000-year cycle of radiation changes due to variations in Earth's orbit. This comparatively insignificant warming, when combined with the lowering of the Nordic inland ice areas and Tibet due to the weight of the superimposed ice-load, has led to the repeated complete thawing of the inland ice areas. Variations in Earth's orbit The Milankovitch cycles are a set of cyclic variations in characteristics of Earth's orbit around the Sun. Each cycle has a different length, so at some times their effects reinforce each other and at other times they (partially) cancel each other. There is strong evidence that the Milankovitch cycles affect the occurrence of glacial and interglacial periods within an ice age. The present ice age is the most studied and best understood, particularly the last 400,000 years, since this is the period covered by ice cores that record atmospheric composition and proxies for temperature and ice volume. Within this period, the match of glacial/interglacial frequencies to the Milanković orbital forcing periods is so close that orbital forcing is generally accepted. The combined effects of the changing distance to the Sun, the precession of Earth's axis, and the changing tilt of Earth's axis redistribute the sunlight received by Earth. Of particular importance are changes in the tilt of Earth's axis, which affect the intensity of seasons. For example, the amount of solar influx in July at 65 degrees north latitude varies by as much as 22% (from 450 W/m2 to 550 W/m2). It is widely believed that ice sheets advance when summers become too cool to melt all of the accumulated snowfall from the previous winter. Some believe that the strength of the orbital forcing is too small to trigger glaciations, but feedback mechanisms like may explain this mismatch. While Milankovitch forcing predicts that cyclic changes in Earth's orbital elements can be expressed in the glaciation record, additional explanations are necessary to explain which cycles are observed to be most important in the timing of glacial–interglacial periods. In particular, during the last 800,000 years, the dominant period of glacial–interglacial oscillation has been 100,000 years, which corresponds to changes in Earth's orbital eccentricity and orbital inclination. Yet this is by far the weakest of the three frequencies predicted by Milankovitch. During the period 3.0–0.8 million years ago, the dominant pattern of glaciation corresponded to the 41,000-year period of changes in Earth's obliquity (tilt of the axis). The reasons for dominance of one frequency versus another are poorly understood and an active area of current research, but the answer probably relates to some form of resonance in Earth's climate system. Recent work suggests that the 100K year cycle dominates due to increased southern-pole sea-ice increasing total solar reflectivity. The "traditional" Milankovitch explanation struggles to explain the dominance of the 100,000-year cycle over the last 8 cycles. Richard A. Muller, Gordon J. F. MacDonald, and others have pointed out that those calculations are for a two-dimensional orbit of Earth but the three-dimensional orbit also has a 100,000-year cycle of orbital inclination. They proposed that these variations in orbital inclination lead to variations in insolation, as Earth moves in and out of known dust bands in the solar system. Although this is a different mechanism to the traditional view, the "predicted" periods over the last 400,000 years are nearly the same. The Muller and MacDonald theory, in turn, has been challenged by Jose Antonio Rial. Another worker, William Ruddiman, has suggested a model that explains the 100,000-year cycle by the modulating effect of eccentricity (weak 100,000-year cycle) on precession (26,000-year cycle) combined with greenhouse gas feedbacks in the 41,000- and 26,000-year cycles. Yet another theory has been advanced by Peter Huybers who argued that the 41,000-year cycle has always been dominant, but that Earth has entered a mode of climate behavior where only the second or third cycle triggers an ice age. This would imply that the 100,000-year periodicity is really an illusion created by averaging together cycles lasting 80,000 and 120,000 years. This theory is consistent with a simple empirical multi-state model proposed by Didier Paillard. Paillard suggests that the late Pleistocene glacial cycles can be seen as jumps between three quasi-stable climate states. The jumps are induced by the orbital forcing, while in the early Pleistocene the 41,000-year glacial cycles resulted from jumps between only two climate states. A dynamical model explaining this behavior was proposed by Peter Ditlevsen. This is in support of the suggestion that the late Pleistocene glacial cycles are not due to the weak 100,000-year eccentricity cycle, but a non-linear response to mainly the 41,000-year obliquity cycle. Variations in the Sun's energy output There are at least two types of variation in the Sun's energy output: In the very long term, astrophysicists believe that the Sun's output increases by about 7% every one billion (109) years. Shorter-term variations such as sunspot cycles, and longer episodes such as the Maunder Minimum, which occurred during the coldest part of the Little Ice Age. The long-term increase in the Sun's output cannot be a cause of ice ages. Volcanism Volcanic eruptions may have contributed to the inception and/or the end of ice age periods. At times during the paleoclimate, carbon dioxide levels were two or three times greater than today. Volcanoes and movements in continental plates contributed to high amounts of CO2 in the atmosphere. Carbon dioxide from volcanoes probably contributed to periods with highest overall temperatures. One suggested explanation of the Paleocene-Eocene Thermal Maximum is that undersea volcanoes released methane from clathrates and thus caused a large and rapid increase in the greenhouse effect. There appears to be no geological evidence for such eruptions at the right time, but this does not prove they did not happen. Recent glacial and interglacial phases The current geological period, the Quaternary, which began about 2.6 million years ago and extends into the present, is marked by warm and cold episodes, cold phases called glacials (Quaternary ice age) lasting about 100,000 years, and which are then interrupted by the warmer interglacials which lasted about 10,000–15,000 years. The last cold episode of the last glacial period ended about 10,000 years ago. Earth is currently in an interglacial period of the Quaternary, called the Holocene. Glacial stages in North America The major glacial stages of the current ice age in North America are the Illinoian, Eemian and Wisconsin glaciation. The use of the Nebraskan, Afton, Kansan, and Yarmouthian stages to subdivide the ice age in North America has been discontinued by Quaternary geologists and geomorphologists. These stages have all been merged into the Pre-Illinoian in the 1980s. During the most recent North American glaciation, during the latter part of the Last Glacial Maximum (26,000 to 13,300 years ago), ice sheets extended to about 45th parallel north. These sheets were thick. This Wisconsin glaciation left widespread impacts on the North American landscape. The Great Lakes and the Finger Lakes were carved by ice deepening old valleys. Most of the lakes in Minnesota and Wisconsin were gouged out by glaciers and later filled with glacial meltwaters. The old Teays River drainage system was radically altered and largely reshaped into the Ohio River drainage system. Other rivers were dammed and diverted to new channels, such as Niagara Falls, which formed a dramatic waterfall and gorge, when the waterflow encountered a limestone escarpment. Another similar waterfall, at the present Clark Reservation State Park near Syracuse, New York, is now dry. The area from
ice allows increased exchange of waters between the Arctic and the North Atlantic Oceans, warming the Arctic and cooling the North Atlantic. (Current projected consequences of global warming include a largely ice-free Arctic Ocean within 5–20 years.) Additional fresh water flowing into the North Atlantic during a warming cycle may also reduce the global ocean water circulation. Such a reduction (by reducing the effects of the Gulf Stream) would have a cooling effect on northern Europe, which in turn would lead to increased low-latitude snow retention during the summer. It has also been suggested that during an extensive glacial, glaciers may move through the Gulf of Saint Lawrence, extending into the North Atlantic Ocean far enough to block the Gulf Stream. Negative Ice sheets that form during glaciations erode the land beneath them. This can reduce the land area above sea level and thus diminish the amount of space on which ice sheets can form. This mitigates the albedo feedback, as does the rise in sea level that accompanies the reduced area of ice sheets, since open ocean has a lower albedo than land. Another negative feedback mechanism is the increased aridity occurring with glacial maxima, which reduces the precipitation available to maintain glaciation. The glacial retreat induced by this or any other process can be amplified by similar inverse positive feedbacks as for glacial advances. According to research published in Nature Geoscience, human emissions of carbon dioxide (CO2) will defer the next ice age. Researchers used data on Earth's orbit to find the historical warm interglacial period that looks most like the current one and from this have predicted that the next ice age would usually begin within 1,500 years. They go on to predict that emissions have been so high that it will not. Causes The causes of ice ages are not fully understood for either the large-scale ice age periods or the smaller ebb and flow of glacial–interglacial periods within an ice age. The consensus is that several factors are important: atmospheric composition, such as the concentrations of carbon dioxide and methane (the specific levels of the previously mentioned gases are now able to be seen with the new ice core samples from EPICA Dome C in Antarctica over the past 800,000 years); changes in Earth's orbit around the Sun known as Milankovitch cycles; the motion of tectonic plates resulting in changes in the relative location and amount of continental and oceanic crust on Earth's surface, which affect wind and ocean currents; variations in solar output; the orbital dynamics of the Earth–Moon system; the impact of relatively large meteorites and volcanism including eruptions of supervolcanoes. Some of these factors influence each other. For example, changes in Earth's atmospheric composition (especially the concentrations of greenhouse gases) may alter the climate, while climate change itself can change the atmospheric composition (for example by changing the rate at which weathering removes ). Maureen Raymo, William Ruddiman and others propose that the Tibetan and Colorado Plateaus are immense "scrubbers" with a capacity to remove enough from the global atmosphere to be a significant causal factor of the 40 million year Cenozoic Cooling trend. They further claim that approximately half of their uplift (and "scrubbing" capacity) occurred in the past 10 million years. Changes in Earth's atmosphere There is evidence that greenhouse gas levels fell at the start of ice ages and rose during the retreat of the ice sheets, but it is difficult to establish cause and effect (see the notes above on the role of weathering). Greenhouse gas levels may also have been affected by other factors which have been proposed as causes of ice ages, such as the movement of continents and volcanism. The Snowball Earth hypothesis maintains that the severe freezing in the late Proterozoic was ended by an increase in levels in the atmosphere, mainly from volcanoes, and some supporters of Snowball Earth argue that it was caused in the first place by a reduction in atmospheric . The hypothesis also warns of future Snowball Earths. In 2009, further evidence was provided that changes in solar insolation provide the initial trigger for Earth to warm after an Ice Age, with secondary factors like increases in greenhouse gases accounting for the magnitude of the change. Position of the continents The geological record appears to show that ice ages start when the continents are in positions which block or reduce the flow of warm water from the equator to the poles and thus allow ice sheets to form. The ice sheets increase Earth's reflectivity and thus reduce the absorption of solar radiation. With less radiation absorbed the atmosphere cools; the cooling allows the ice sheets to grow, which further increases reflectivity in a positive feedback loop. The ice age continues until the reduction in weathering causes an increase in the greenhouse effect. There are three main contributors from the layout of the continents that obstruct the movement of warm water to the poles: A continent sits on top of a pole, as Antarctica does today. A polar sea is almost land-locked, as the Arctic Ocean is today. A supercontinent covers most of the equator, as Rodinia did during the Cryogenian period. Since today's Earth has a continent over the South Pole and an almost land-locked ocean over the North Pole, geologists believe that Earth will continue to experience glacial periods in the geologically near future. Some scientists believe that the Himalayas are a major factor in the current ice age, because these mountains have increased Earth's total rainfall and therefore the rate at which carbon dioxide is washed out of the atmosphere, decreasing the greenhouse effect. The Himalayas' formation started about 70 million years ago when the Indo-Australian Plate collided with the Eurasian Plate, and the Himalayas are still rising by about 5 mm per year because the Indo-Australian plate is still moving at 67 mm/year. The history of the Himalayas broadly fits the long-term decrease in Earth's average temperature since the mid-Eocene, 40 million years ago. Fluctuations in ocean currents Another important contribution to ancient climate regimes is the variation of ocean currents, which are modified by continent position, sea levels and salinity, as well as other factors. They have the ability to cool (e.g. aiding the creation of Antarctic ice) and the ability to warm (e.g. giving the British Isles a temperate as opposed to a boreal climate). The closing of the Isthmus of Panama about 3 million years ago may have ushered in the present period of strong glaciation over North America by ending the exchange of water between the tropical Atlantic and Pacific Oceans. Analyses suggest that ocean current fluctuations can adequately account for recent glacial oscillations. During the last glacial period the sea-level has fluctuated 20–30 m as water was sequestered, primarily in the Northern Hemisphere ice sheets. When ice collected and the sea level dropped sufficiently, flow through the Bering Strait (the narrow strait between Siberia and Alaska is about 50 m deep today) was reduced, resulting in increased flow from the North Atlantic. This realigned the thermohaline circulation in the Atlantic, increasing heat transport into the Arctic, which melted the polar ice accumulation and reduced other continental ice sheets. The release of water raised sea levels again, restoring the ingress of colder water from the Pacific with an accompanying shift to northern hemisphere ice accumulation. According to a study published in Nature in 2021, all glacial periods of ice ages over the last 1.5 million years were associated with northward shifts of melting Antarctic icebergs which changed ocean circulation patterns, leading to more CO2 being pulled out of the atmosphere. The authors suggest that this process may be disrupted in the future as the Southern Ocean will become too warm for the icebergs to travel far enough to trigger these changes. Uplift of the Tibetan plateau Matthias Kuhle's geological theory of Ice Age development was suggested by the existence of an ice sheet covering the Tibetan Plateau during the Ice Ages (Last Glacial Maximum?). According to Kuhle, the plate-tectonic uplift of Tibet past the snow-line has led to a surface of c. 2,400,000 square kilometres (930,000 sq mi) changing from bare land to ice with a 70% greater albedo. The reflection of energy into space resulted in a global cooling, triggering the Pleistocene Ice Age. Because this highland is at a subtropical latitude, with 4 to 5 times the insolation of high-latitude areas, what would be Earth's strongest heating surface has turned into a cooling surface. Kuhle explains the interglacial periods by the 100,000-year cycle of radiation changes due to variations in Earth's orbit. This comparatively insignificant warming, when combined with the lowering of the Nordic inland ice areas and Tibet due to the weight of the superimposed ice-load, has led to the repeated complete thawing of the inland ice areas. Variations in Earth's orbit The Milankovitch cycles are a set of cyclic variations in characteristics of Earth's orbit around the Sun. Each cycle has a different length, so at some times their effects reinforce each other and at other times they (partially) cancel each other. There is strong evidence that the Milankovitch cycles affect the occurrence of glacial and interglacial periods within an ice age. The present ice age is the most studied and best understood, particularly the last 400,000 years, since this is the period covered by ice cores that record atmospheric composition and proxies for temperature and ice volume. Within this period, the match of glacial/interglacial frequencies to the Milanković orbital forcing periods is so close that orbital forcing is generally accepted. The combined effects of the changing distance to the Sun, the precession of Earth's axis, and the changing tilt of Earth's axis redistribute the sunlight received by Earth. Of particular importance are changes in the tilt of Earth's axis, which affect the intensity of seasons. For example, the amount of solar influx in July at 65 degrees north latitude varies by as much as 22% (from 450 W/m2 to 550 W/m2). It is widely believed that ice sheets advance when summers become too cool to melt all of the accumulated snowfall from the previous winter. Some believe that the strength of the orbital forcing is too small to trigger glaciations, but feedback mechanisms like may explain this mismatch. While Milankovitch forcing predicts that cyclic changes in Earth's orbital elements can be expressed in the glaciation record, additional explanations are necessary to explain which cycles are observed to be most important in the timing of glacial–interglacial periods. In particular, during the last 800,000 years, the dominant period of glacial–interglacial oscillation has been 100,000 years, which corresponds to changes in Earth's orbital eccentricity and orbital inclination. Yet this is by far the weakest of the three frequencies predicted by Milankovitch. During the period 3.0–0.8 million years ago, the dominant pattern of glaciation corresponded to the 41,000-year period of changes in Earth's obliquity (tilt of the axis). The reasons for dominance of one frequency versus another are poorly understood and an active area of current research, but the answer probably relates to some form of resonance in Earth's climate system. Recent work suggests that the 100K year cycle dominates due to increased southern-pole sea-ice increasing total solar reflectivity. The "traditional" Milankovitch explanation struggles to explain the dominance of the 100,000-year cycle over the last 8 cycles. Richard A. Muller, Gordon J. F. MacDonald, and others have pointed out that those calculations are for a two-dimensional orbit of Earth but the three-dimensional orbit also has a 100,000-year cycle of orbital inclination. They proposed that these variations in orbital inclination lead to variations in insolation, as Earth moves in and out of known dust bands in the solar system. Although this is a different mechanism to the traditional view, the "predicted" periods over the last 400,000 years are nearly the same. The Muller and MacDonald theory, in turn, has been challenged by Jose Antonio Rial. Another worker, William Ruddiman, has suggested a model that explains the 100,000-year cycle by the modulating effect of eccentricity (weak 100,000-year cycle) on precession (26,000-year cycle) combined with greenhouse gas feedbacks in the 41,000- and 26,000-year cycles. Yet another theory has been advanced by Peter Huybers who argued that the 41,000-year cycle has always been dominant, but that Earth has entered a mode of climate behavior where only the second or third cycle triggers an ice age. This would imply that the 100,000-year periodicity is really an illusion created by averaging together cycles lasting 80,000 and 120,000 years. This theory is consistent with a simple empirical multi-state model proposed by Didier Paillard. Paillard suggests that the late Pleistocene glacial cycles can be seen as jumps between three quasi-stable climate states. The jumps are induced by the orbital forcing, while in the early Pleistocene the 41,000-year glacial cycles resulted from jumps between only two climate states. A dynamical model explaining this behavior was proposed by Peter Ditlevsen. This is in support of the suggestion that the late Pleistocene glacial cycles are not due to the weak 100,000-year eccentricity cycle, but a non-linear response to mainly the 41,000-year obliquity cycle. Variations in the Sun's energy output There are at least two types of variation in the Sun's energy output: In the very long term, astrophysicists believe that the Sun's output increases by about 7% every one billion (109) years. Shorter-term variations such as sunspot cycles, and longer episodes such as the Maunder Minimum, which occurred during the coldest part of the Little Ice Age. The long-term increase in the Sun's output cannot be a cause of ice ages. Volcanism Volcanic eruptions may have contributed to the inception and/or the end of ice age periods. At times during the paleoclimate, carbon dioxide levels were two or three times greater than today. Volcanoes and movements in continental plates contributed to high amounts of CO2 in the atmosphere. Carbon dioxide from volcanoes probably contributed to periods with highest overall temperatures. One suggested explanation of the Paleocene-Eocene Thermal Maximum is that undersea volcanoes released methane from clathrates and thus caused a large and rapid increase in the greenhouse effect. There appears to be no geological evidence for such eruptions at the right time, but this does not prove they did not happen. Recent glacial and interglacial phases The current geological period, the Quaternary, which began about 2.6 million years ago and extends into the present, is marked by warm and cold episodes, cold phases called glacials (Quaternary ice age) lasting about 100,000 years, and which are then interrupted by the warmer interglacials which lasted about 10,000–15,000 years. The last cold episode of the last glacial period ended about 10,000 years ago. Earth is currently in an interglacial period of the Quaternary, called the Holocene. Glacial stages in North America The major glacial stages of the current ice age in North America are the Illinoian, Eemian and Wisconsin glaciation. The use of the Nebraskan, Afton, Kansan, and Yarmouthian stages to subdivide the ice age in North America has been discontinued by Quaternary geologists and geomorphologists. These stages have all been merged into the Pre-Illinoian in the 1980s. During the most recent North American glaciation, during the latter part of the Last Glacial Maximum (26,000 to 13,300 years ago), ice sheets extended to about 45th parallel north. These sheets were thick. This Wisconsin glaciation left widespread impacts on the North American landscape. The Great Lakes and the Finger Lakes were carved by ice deepening old valleys. Most of the lakes in Minnesota and Wisconsin were gouged out by glaciers and later filled with glacial meltwaters. The old Teays River drainage system was radically altered and largely reshaped into the Ohio River drainage system. Other rivers were dammed and diverted to new channels, such as Niagara Falls, which formed a dramatic waterfall and gorge, when the waterflow encountered a limestone escarpment. Another similar waterfall, at the present Clark Reservation State Park near Syracuse, New York, is now dry. The area from Long Island to Nantucket, Massachusetts was formed from glacial till, and the plethora of lakes on the Canadian Shield in northern Canada can be almost entirely attributed to the action of the ice. As the ice retreated and the rock dust dried, winds carried the material hundreds of miles, forming beds of loess many dozens of feet thick in the Missouri Valley. Post-glacial rebound continues to reshape the Great Lakes and other areas formerly under the weight of the ice sheets. The Driftless Area, a portion of western and southwestern Wisconsin along with parts of adjacent Minnesota, Iowa, and Illinois, was not covered by glaciers. Last Glacial Period in the semiarid Andes around Aconcagua and Tupungato A specially interesting climatic change during glacial times has taken place in the semi-arid Andes. Beside the expected cooling down in comparison with the current climate, a significant precipitation change happened here. So, researches in the presently semiarid subtropic Aconcagua-massif (6,962 m) have shown an unexpectedly extensive glacial glaciation of the type "ice stream network". The connected valley glaciers exceeding 100 km in length, flowed down on the East-side of this section of the Andes at 32–34°S and 69–71°W as far as a height of 2,060 m and on the western luff-side still clearly deeper. Where current glaciers scarcely reach 10 km in length, the snowline (ELA) runs at a height of 4,600 m and at that time was lowered to 3,200 m asl, i.e. about 1,400 m. From this follows that—beside of an annual depression of temperature about c. 8.4 °C— here was an increase in precipitation. Accordingly, at glacial times the humid climatic belt that today is situated several latitude degrees further to the S, was shifted much further to the N. Effects of glaciation Although the last glacial period ended more than 8,000 years ago, its effects can still be felt today. For example, the moving ice carved out the landscape in Canada (See Canadian Arctic Archipelago), Greenland, northern Eurasia and Antarctica. The erratic boulders, till, drumlins,
into gas tungsten arc welding. In 1917, he published a paper on the chemistry of oil films that later became the basis for the award of the 1932 Nobel Prize in chemistry. Langmuir theorized that oils consisting of an aliphatic chain with a hydrophilic end group (perhaps an alcohol or acid) were oriented as a film one molecule thick upon the surface of water, with the hydrophilic group down in the water and the hydrophobic chains clumped together on the surface. The thickness of the film could be easily determined from the known volume and area of the oil, which allowed investigation of the molecular configuration before spectroscopic techniques were available. Later years Following World War I Langmuir contributed to atomic theory and the understanding of atomic structure by defining the modern concept of valence shells and isotopes. Langmuir was president of the Institute of Radio Engineers in 1923. Based on his work at General Electric, John B. Taylor developed a detector ionizing beams of alkali metals, called nowadays the Langmuir-Taylor detector. In 1927, he was one of the participants of the fifth Solvay Conference on Physics that took place at the International Solvay Institute for Physics in Belgium. He joined Katharine B. Blodgett to study thin films and surface adsorption. They introduced the concept of a monolayer (a layer of material one molecule thick) and the two-dimensional physics which describe such a surface. In 1932 he received the Nobel Prize in Chemistry "for his discoveries and investigations in surface chemistry." In 1938, Langmuir's scientific interests began to turn to atmospheric science and meteorology. One of his first ventures, although tangentially related, was a refutation of the claim of entomologist Charles H. T. Townsend that the deer botfly flew at speeds of over 800 miles per hour. Langmuir estimated the fly's speed at 25 miles per hour. After observing windrows of drifting seaweed in the Sargasso Sea he discovered a wind-driven surface circulation in the sea. It is now called the Langmuir circulation. During World War II, Langmuir worked on improving naval sonar for submarine detection, and later to develop protective smoke screens and methods for deicing aircraft wings. This research led him to theorize that the introduction of dry ice and iodide into a sufficiently moist cloud of low temperature could induce precipitation (cloud seeding); though in frequent practice, particularly in Australia and the People's Republic of China, the efficiency of this technique remains controversial today. In 1953 Langmuir coined the term "pathological science", describing research conducted with accordance to the scientific method, but tainted by unconscious bias or subjective effects. This is in contrast to pseudoscience, which has no pretense of following the scientific method. In his original speech, he presented ESP and flying saucers as examples of pathological science; since then, the label has been applied to polywater and cold fusion. His house in Schenectady, was designated a National Historic Landmark in 1976. Personal life Langmuir was married to Marion Mersereau (1883–1971) in 1912 with whom he adopted two children: Kenneth and Barbara. After a short illness, he died in Woods Hole, Massachusetts from a heart attack on August 16, 1957. His obituary ran on the front page of The New York Times. On his religious views, Langmuir was an agnostic. In fiction According to author Kurt Vonnegut, Langmuir was the inspiration for his fictional scientist Dr. Felix Hoenikker in the novel Cat's Cradle. The character's invention of ice-nine eventually destroyed the world by seeding a new phase of ice water (similar in name only to Ice IX). Langmuir had worked with Vonnegut's brother, Bernard Vonnegut at General Electric on seeding ice crystals to diminish or increase rain or storms. Honors Fellow of the American Academy of Arts and Sciences (1918) Perkin Medal (1928) Nobel Prize in Chemistry (1932) Franklin Medal (1934) Faraday Medal (1944) John J. Carty Award of the National Academy of Sciences (1950) Mount Langmuir (elevation 8022 ft / 2445m ) in Alaska is named after him (Chugach National Forest, Copper River, AK) Langmuir College, a residential college at Stony Brook University in H-Quad, named for him in 1970 grandson, Roger R Summerhayes, directed/wrote/produced/edited a 57-minute documentary in 1999 called Langmuir's World Patents Langmuir, , "Incandescent Electric Lamp" Langmuir, , "Electron-discharge apparatus and method of operating the same" Langmuir, , "Method of and apparatus for controlling x-ray tubes" See also 18-electron rule Irving Langmuir House Langmuir isotherm Langmuir trough Langmuir equation, an equation that relates the coverage or adsorption of molecules on a solid surface to gas pressure or concentration of a medium above the solid surface at a fixed temperature Langmuir wave, a rapid oscillation of the electron density in conducting media such as plasmas or metals Langmuir states, three-dimensional quantum states of Helium when both electrons move in phase on Bohr circular orbits and mutually repel Langmuir–Blodgett film Child–Langmuir law Langmuir–Taylor detector List of things named after Irving Langmuir References External links Langmuir Journal ACS Chemistry Journal of Surfaces and Colloids "Langmuir, Irving" Infoplease.com. " Irving Langmuir's Ball Lightning Tube". Ball Lightning Page. Science
weld ever made. Plasma welding has since been developed into gas tungsten arc welding. In 1917, he published a paper on the chemistry of oil films that later became the basis for the award of the 1932 Nobel Prize in chemistry. Langmuir theorized that oils consisting of an aliphatic chain with a hydrophilic end group (perhaps an alcohol or acid) were oriented as a film one molecule thick upon the surface of water, with the hydrophilic group down in the water and the hydrophobic chains clumped together on the surface. The thickness of the film could be easily determined from the known volume and area of the oil, which allowed investigation of the molecular configuration before spectroscopic techniques were available. Later years Following World War I Langmuir contributed to atomic theory and the understanding of atomic structure by defining the modern concept of valence shells and isotopes. Langmuir was president of the Institute of Radio Engineers in 1923. Based on his work at General Electric, John B. Taylor developed a detector ionizing beams of alkali metals, called nowadays the Langmuir-Taylor detector. In 1927, he was one of the participants of the fifth Solvay Conference on Physics that took place at the International Solvay Institute for Physics in Belgium. He joined Katharine B. Blodgett to study thin films and surface adsorption. They introduced the concept of a monolayer (a layer of material one molecule thick) and the two-dimensional physics which describe such a surface. In 1932 he received the Nobel Prize in Chemistry "for his discoveries and investigations in surface chemistry." In 1938, Langmuir's scientific interests began to turn to atmospheric science and meteorology. One of his first ventures, although tangentially related, was a refutation of the claim of entomologist Charles H. T. Townsend that the deer botfly flew at speeds of over 800 miles per hour. Langmuir estimated the fly's speed at 25 miles per hour. After observing windrows of drifting seaweed in the Sargasso Sea he discovered a wind-driven surface circulation in the sea. It is now called the Langmuir circulation. During World War II, Langmuir worked on improving naval sonar for submarine detection, and later to develop protective smoke screens and methods for deicing aircraft wings. This research led him to theorize that the introduction of dry ice and iodide into a sufficiently moist cloud of low temperature could induce precipitation (cloud seeding); though in frequent practice, particularly in Australia and the People's Republic of China, the efficiency of this technique remains controversial today. In 1953 Langmuir coined the term "pathological science", describing research conducted with accordance to the scientific method, but tainted by unconscious bias or subjective effects. This is in contrast to pseudoscience, which has no pretense of following the scientific method. In his original speech, he presented ESP and flying saucers as examples of pathological science; since then, the label has been applied to polywater and cold fusion. His house in Schenectady, was designated a National Historic Landmark in 1976. Personal life Langmuir was married to Marion Mersereau (1883–1971) in 1912 with whom he adopted two children: Kenneth and Barbara. After a short illness, he died in Woods Hole, Massachusetts from a heart attack on August 16, 1957. His obituary ran on the front page of The New York Times. On his religious views, Langmuir was an agnostic. In fiction
the IATA) is the body responsible for the standard international codes for airlines, airports, hotels, cities and car rental firms (for example, the three-character codes that designate London Heathrow Airport as LHR). These codes provide a method to link international travel network with international suppliers. See also American Society of Travel
the body responsible for the standard international codes for airlines, airports, hotels, cities and car rental firms (for example, the three-character codes that designate London Heathrow Airport as LHR). These codes provide a method to link international travel network with international suppliers. See also American Society of Travel Agents IATA airport code International Air Transport Association List of airports
on the evening of September 18, 2008 when Hank Paulson and Ben Bernanke informed members of Congress about the issues due to the financial crisis of 2007–2008, Bachus then shorted stocks the next morning and cashed in his profits within a week. Also attending the same meeting were Senator Dick Durbin and John Boehner; the same day (trade effective the next day), Durbin sold mutual-fund shares worth $42,696, and reinvested it all with Warren Buffett. Also the same day (trade effective the next day), Congressman Boehner cashed out of an equity mutual fund. In May 2007, a bill entitled the Stop Trading on Congressional Knowledge Act, or STOCK Act was introduced that would hold congressional and federal employees liable for stock trades they made using information they gained through their jobs and also regulate analysts or political intelligence firms that research government activities. The STOCK Act was enacted on April 4, 2012. As of 2021, in the approximately nine month period up to September 2021, Senate and House members disclosed 4,000 trades worth at least $315 million of stocks and bonds. Arguments for legalizing Some economists and legal scholars (such as Henry Manne, Milton Friedman, Thomas Sowell, Daniel Fischel, and Frank H. Easterbrook) have argued that laws against insider trading should be repealed. They claim that insider trading based on material nonpublic information benefits investors, in general, by more quickly introducing new information into the market. Friedman, laureate of the Nobel Memorial Prize in Economics, said: "You want more insider trading, not less. You want to give the people most likely to have knowledge about deficiencies of the company an incentive to make the public aware of that." Friedman did not believe that the trader should be required to make his trade known to the public, because the buying or selling pressure itself is information for the market. Other critics argue that insider trading is a victimless act: a willing buyer and a willing seller agree to trade property that the seller rightfully owns, with no prior contract (according to this view) having been made between the parties to refrain from trading if there is asymmetric information. The Atlantic has described the process as "arguably the closest thing that modern finance has to a victimless crime". Legalization advocates also question why "trading" where one party has more information than the other is legal in other markets, such as real estate, but not in the stock market. For example, if a geologist knows there is a high likelihood of the discovery of petroleum under Farmer Smith's land, he may be entitled to make Smith an offer for the land, and buy it, without first telling Farmer Smith of the geological data. Advocates of legalization make free speech arguments. Punishment for communicating about a development pertinent to the next day's stock price might seem an act of censorship. If the information being conveyed is proprietary information and the corporate insider has contracted to not expose it, he has no more right to communicate it than he would to tell others about the company's confidential new product designs, formulas, or bank account passwords. Some authors have used these arguments to propose legalizing insider trading on negative information (but not on positive information). Since negative information is often withheld from the market, trading on such information has a higher value for the market than trading on positive information. There are very limited laws against "insider trading" in the commodities markets if, for no other reason than that the concept of an "insider" is not immediately analogous to commodities themselves (corn, wheat, steel, etc.). However, analogous activities such as front running are illegal under US commodity and futures trading laws. For example, a commodity broker can be charged with fraud for receiving a large purchase order from a client (one likely to affect the price of that commodity) and then purchasing that commodity before executing the client's order to benefit from the anticipated price increase. Commercialisation The advent of the Internet has provided a forum for the commercialisation of trading on insider information. In 2016 a number of dark web sites were identified as marketplaces where such non-public information was bought and sold. At least one such site used bitcoins to avoid currency restrictions and to impede tracking. Such sites also provide a place for soliciting for corporate informants, where non-public information may be used for purposes other than stock trading. Legal differences among jurisdictions The US and the UK vary in the way the law is interpreted and applied with regard to insider trading. In the UK, the relevant laws are the Criminal Justice Act 1993, Part V, Schedule 1; the Financial Services and Markets Act 2000, which defines an offence of "market abuse"; and the European Union Regulation No 596/2014. The principle is that it is illegal to trade on the basis of market-sensitive information that is not generally known. This is a much broader scope that under U.S. law. The key differences from U.S. law are that no relationship to either the issuer of the security or the tipster is required; all that is required is that the guilty party traded (or caused trading) whilst having inside information, and there is no scienter requirement under UK law. Japan enacted its first law against insider trading in 1988. Roderick Seeman said, "Even today many Japanese do not understand why this is illegal. Indeed, previously it was regarded as common sense to make a profit from your knowledge." In Malta the law follows the European broader scope model. The relevant statute is the Prevention of Financial Markets Abuse Act of 2005, as amended. Earlier acts included the Financial Markets Abuse Act in 2002, and the Insider Dealing and Market Abuse Act of 1994. The International Organization of Securities Commissions (IOSCO) paper on the "Objectives and Principles of Securities Regulation" (updated to 2003) states that the three objectives of good securities market regulation are investor protection, ensuring that markets are fair, efficient and transparent, and reducing systemic risk. The discussion of these "Core Principles" state that "investor protection" in this context means "Investors should be protected from misleading, manipulative or fraudulent practices, including insider trading, front running or trading ahead of customers and the misuse of client assets." More than 85 percent of the world's securities and commodities market regulators are members of IOSCO and have signed on to these Core Principles. The World Bank and International Monetary Fund now use the IOSCO Core Principles in reviewing the financial health of different country's regulatory systems as part of these organization's financial sector assessment program, so laws against insider trading based on non-public information are now expected by the international community. Enforcement of insider trading laws varies widely from country to country, but the vast majority of jurisdictions now outlaw the practice, at least in principle. Larry Harris claims that differences in the effectiveness with which countries restrict insider trading help to explain the differences in executive compensation among those countries. The US, for example, has much higher CEO salaries than have Japan or Germany, where insider trading is less effectively restrained. By nation European Union In 2014, the European Union (EU) adopted legislation (Criminal Sanctions for Market Abuse Directive) that harmonised criminal sanctions for insider dealing. All EU Member States agreed to introduce maximum prison sentences of at least four years for serious cases of market manipulation and insider dealing, and at least two years for improper disclosure of insider information. Australia The current Australian legislation arose out of the report of a 1989 parliamentary committee report which recommended removal of the requirement that the trader be ‘connected’ with the body corporate. This may have weakened the importance of the fiduciary duty rationale and possibly brought new potential offenders within its ambit. In Australia if a person possesses inside information and knows, or ought reasonably to know, that the information is not generally available and is materially price sensitive then the insider must not trade. Nor must she or he procure another to trade and must not tip another. Information will be considered generally available if it consists of readily observable matter or it has been made known to common investors and a reasonable period for it to be disseminated among such investors has elapsed. Norway In 2009, a journalist in Nettavisen (Thomas Gulbrandsen) was sentenced to 4 months in prison for insider trading. The longest prison sentence in a Norwegian trial where the main charge was insider trading, was for eight years (two suspended) when Alain Angelil was convicted in a district court on December 9, 2011. United Kingdom Although insider trading in the UK has been illegal since 1980, it proved difficult to successfully prosecute individuals accused of insider trading. There were a number of notorious cases where individuals were able to escape prosecution. Instead the UK regulators relied on a series of fines to punish market abuses. These fines were widely perceived as an ineffective deterrent (Cole, 2007), and there was a statement of intent by the UK regulator (the Financial Services Authority) to use its powers to enforce the legislation (specifically the Financial Services and Markets Act 2000). Between 2009 and 2012 the FSA secured 14 convictions in relation to insider dealing. United States Anil Kumar, a senior partner at management consulting firm McKinsey & Company, pleaded guilty in 2010 to insider trading in a "descent from the pinnacle of the business world". Chip Skowron, a hedge fund co-portfolio manager of FrontPoint Partners LLC's health care funds, was convicted of insider trading in 2011, for which he served five years in prison. He had been tipped off by a consultant to a company that the company was about to make a negative announcement regarding its clinical trial for a drug. At first Skowron denied the charges against him, and his defense attorney said he would plead not guilty, saying "We look forward to responding to the allegations more fully in court at the appropriate time". However, after the consultant charged with tipping him off pleaded guilty, he changed his position, and admitted his guilt. Rajat Gupta, who had been managing partner of McKinsey & Co. and a director at Goldman Sachs Group Inc. and Procter & Gamble Co., was convicted by a federal jury in 2012 and sentence to two years in prison for leaking inside information to hedge fund manager Raj Rajaratnam who was sentenced to 11 years in prison. The case was prosecuted by the office of United States Attorney for the Southern District of New York Preet Bharara. Mathew Martoma, former hedge fund trader and portfolio manager at S.A.C. Capital Advisors, was accused of generating possibly the largest single insider trading transaction profit in history at a value of $276 million. He was convicted in February 2014, and is serving a nine-year prison sentence. With the guilty plea by Perkins Hixon in 2014 for insider trading from 2010 to 2013 while at Evercore Partners, Bharara said in a press release that 250 defendants whom his office had charged since August 2009 had now been convicted. On December 10, 2014, a federal appeals court overturned the insider trading convictions of two former hedge fund traders, Todd Newman and Anthony Chiasson, based on the "erroneous" instructions given to jurors by the trial judge. The decision was expected to affect the appeal of the separate insider-trading conviction of former SAC Capital portfolio manager Michael Steinberg and the U.S. Attorney and the SEC in 2015 did drop their cases against Steinberg and others. In 2016, Sean Stewart, a former managing director at Perella Weinberg Partners LP and vice president at JPMorgan Chase, was convicted on allegations he tipped his father on pending health-care deals. The father, Robert Stewart, previously had pleaded guilty but didn't testify during his son's trial. It was argued that by way of compensation for the tip, the father had paid more than $10,000 for Sean's wedding photographer. In 2017, Billy Walters, Las Vegas sports bettor, was convicted of making $40 million on private information of Dallas-based dairy processing company Dean Foods, and sentenced to five years in prison. Walters's source, company director Thomas C. Davis employing a prepaid cell phone and sometimes the code words "Dallas Cowboys" for Dean Foods, helped him from 2008 to 2014 realize profits and avoid losses in the stock, the federal jury found. Golfer Phil Mickelson "was also mentioned during the trial as someone who had traded in Dean Foods shares and once owed nearly $2 million in gambling debts to" Walters. Mickelson "made roughly $1 million trading Dean Foods shares; he agreed to forfeit those profits in a related civil case brought by the Securities and Exchange Commission". Walters appealed the verdict, but in December 2018 his conviction was upheld by the 2nd U.S. Circuit Court of Appeals in Manhattan. Canada In 2008, police uncovered an insider trading conspiracy involving Bay Street and Wall Street lawyer Gil Cornblum who had worked at Sullivan & Cromwell and was working at Dorsey & Whitney, and a former lawyer, Stan Grmovsek, who were found to have gained over $10 million in illegal profits over a 14-year span. Cornblum committed suicide by jumping from a bridge as he was under investigation and shortly before he was to be arrested but before criminal charges were laid against him, one day before his alleged co-conspirator Grmovsek pled guilty. Grmovsek pleaded guilty to insider trading and was sentenced to 39 months in prison. This was the longest term ever imposed for insider trading in Canada. These crimes were explored in Mark Coakley's 2011 non-fiction book, Tip and Trade. Kuwait The U.S. SEC alleged that in 2009 Kuwaiti trader Hazem Al-Braikan engaged in insider trading after misleading the public about possible takeover bids for two companies. Three days after Al-Braikan was sued by the SEC, he was found dead of a gunshot wound to the head in his home in Kuwait City on July 26, 2009, in what Kuwaiti police called a suicide. The SEC later reached a $6.5 million settlement of civil insider trading charges, with his estate and others. China The majority of shares in China before 2005 were non-tradeable shares that were not sold on the stock exchange publicly but privately. To make shares more accessible, the China Securities Regulation Commission (CSRC) required the companies to convert the non-tradeable shares into tradeable shares. There was a deadline for companies to convert their shares and the deadline was short, due to this there was a massive amount of exchanges and in the midst of these exchanges many people committed insider trading knowing that the selling of these shares would affect prices. Chinese people did not fear insider trading as much as one may in the United States because there is no possibility of imprisonment. Punishment may include monetary fees or temporary relieving from a position in the company. The Chinese do not view insider trading as a crime worth prison time because generally the person has a clean record and a path of success with references to deter them from being viewed as a criminal. On October 1, 2015, Chinese fund manager Xu Xiang was arrested due to insider trading. India Insider trading in India is an offense according to Sections 12A, 15G of the Securities and Exchange Board of India Act, 1992. Insider trading is when one with access to non-public, price-sensitive information about the securities of the company subscribes, buys, sells, or deals, or agrees to do so or counsels another to do so as principal or agent. Price-sensitive information is information that materially affects the value of the securities. The penalty for insider trading is imprisonment, which may extend to five years, and a minimum of five lakh rupees (500,000) to 25 crore rupees (250 million) or three times the profit made, whichever is higher. The
price would likely rise. In the United States and many other jurisdictions, however, "insiders" are not just limited to corporate officials and major shareholders where illegal insider trading is concerned but can include any individual who trades shares based on material non-public information in violation of some duty of trust. This duty may be imputed; for example, in many jurisdictions, in cases of where a corporate insider "tips" a friend about non-public information likely to have an effect on the company's share price, the duty the corporate insider owes the company is now imputed to the friend and the friend violates a duty to the company if he trades on the basis of this information. Liability Liability for inside trading violations generally cannot be avoided by passing on the information in an "I scratch your back; you scratch mine" or quid pro quo arrangement if the person receiving the information knew or should have known that the information was material non-public information. In the United States, at least one court has indicated that the insider who releases the non-public information must have done so for an improper purpose. In the case of a person who receives the insider information (called the "tippee"), the tippee must also have been aware that the insider released the information for an improper purpose. One commentator has argued that if Company A's CEO did not trade on undisclosed takeover news, but instead passed the information on to his brother-in-law who traded on it, illegal insider trading would still have occurred (albeit by proxy, by passing it on to a "non-insider" so Company A's CEO would not get his hands dirty). Misappropriation theory A newer view of insider trading, the misappropriation theory, is now accepted in U.S. law. It states that anyone who misappropriates material non-public information and trades on that information in any stock may be guilty of insider trading. This can include elucidating material non-public information from an insider with the intention of trading on it, or passing it on to someone who will. Proof of responsibility Proving that someone has been responsible for a trade can be difficult because traders may try to hide behind nominees, offshore companies, and other proxies. The Securities and Exchange Commission (SEC) prosecutes over 50 cases each year, with many being settled administratively out of court. The SEC and several stock exchanges actively monitor trading, looking for suspicious activity. The SEC does not have criminal enforcement authority, but can refer serious matters to the U.S. Attorney's Office for further investigation and prosecution. Trading on information in general In the United States and most non-European jurisdictions not all trading on non-public information is illegal insider trading. For example, a person in a restaurant who hears the CEO of Company A at the next table tell the CFO that the company's profits will be higher than expected and then buys the stock is not guilty of insider trading—unless he or she had some closer connection to the company or company officers. However, even where the tippee is not himself an insider, where the tippee knows that the information is non-public and the information is paid for, or the tipper receives a benefit for giving it, then in the broader-scope jurisdictions the subsequent trading is illegal. Notwithstanding, information about a tender offer (usually regarding a merger or acquisition) is held to a higher standard. If this type of information is obtained (directly or indirectly) and there is reason to believe it is nonpublic, there is a duty to disclose it or abstain from trading. In the United States in addition to civil penalties, the trader may also be subject to criminal prosecution for fraud or where SEC regulations have been broken, the U.S. Department of Justice (DOJ) may be called to conduct an independent parallel investigation. If the DOJ finds criminal wrongdoing, the department may file criminal charges. Legal Legal trades by insiders are common, as employees of publicly traded corporations often have stock or stock options. These trades are made public in the United States through Securities and Exchange Commission filings, mainly Form 4. U.S. SEC Rule 10b5-1 clarified that the prohibition against insider trading does not require proof that an insider actually used material nonpublic information when conducting a trade; possession of such information alone is sufficient to violate the provision, and the SEC would infer that an insider in possession of material nonpublic information used this information when conducting a trade. However, SEC Rule 10b5-1 also created for insiders an affirmative defense if the insider can demonstrate that the trades conducted on behalf of the insider were conducted as part of a pre-existing contract or written binding plan for trading in the future. For example, if an insider expects to retire after a specific period of time and, as part of retirement planning, the insider has adopted a written binding plan to sell a specific amount of the company's stock every month for two years, and the insider later comes into possession of material nonpublic information about the company, trades based on the original plan might not constitute prohibited insider trading. United States law Until the 21st century and the European Union's market abuse laws, the United States was the leading country in prohibiting insider trading made on the basis of material non-public information. Thomas Newkirk and Melissa Robertson of the SEC summarize the development of US insider trading laws. Insider trading has a base offense level of 8, which puts it in Zone A under the U.S. Sentencing Guidelines. This means that first-time offenders are eligible to receive probation rather than incarceration. Statutory U.S. insider trading prohibitions are based on English and American common law prohibitions against fraud. In 1909, well before the Securities Exchange Act was passed, the United States Supreme Court ruled that a corporate director who bought that company's stock when he knew the stock's price was about to increase committed fraud by buying but not disclosing his inside information. Section 15 of the Securities Act of 1933 contained prohibitions of fraud in the sale of securities, later greatly strengthened by the Securities Exchange Act of 1934. Section 16(b) of the Securities Exchange Act of 1934 prohibits short-swing profits (from any purchases and sales within any six-month period) made by corporate directors, officers, or stockholders owning more than 10% of a firm's shares. Under Section 10(b) of the 1934 Act, SEC Rule 10b-5, prohibits fraud related to securities trading. The Insider Trading Sanctions Act of 1984 and the Insider Trading and Securities Fraud Enforcement Act of 1988 place penalties for illegal insider trading as high as three times the amount of profit gained or loss avoided from the illegal trading. SEC regulations SEC regulation FD ("Fair Disclosure") requires that if a company intentionally discloses material non-public information to one person, it must simultaneously disclose that information to the public at large. In the case of an unintentional disclosure of material non-public information to one person, the company must make a public disclosure "promptly". Insider trading, or similar practices, are also regulated by the SEC under its rules on takeovers and tender offers under the Williams Act. Court decisions Much of the development of insider trading law has resulted from court decisions. In 1909, the Supreme Court of the United States ruled in Strong v. Repide that a director who expects to act in a way that affects the value of shares cannot use that knowledge to acquire shares from those who do not know of the expected action. Even though, in general, ordinary relations between directors and shareholders in a business corporation are not of such a fiduciary nature as to make it the duty of a director to disclose to a shareholder general knowledge regarding the value of the shares of the company before he purchases any from a shareholder, some cases involve special facts that impose such duty. In 1968, the Second Circuit Court of Appeals advanced a "level playing field" theory of insider trading in SEC v. Texas Gulf Sulphur Co. The court stated that anyone in possession of inside information must either disclose the information or refrain from trading. Officers of the Texas Gulf Sulphur Company had used inside information about the discovery of the Kidd Mine to make profits by buying shares and call options on company stock. In 1984, the Supreme Court of the United States ruled in the case of Dirks v. Securities and Exchange Commission that tippees (receivers of second-hand information) are liable if they had reason to believe that the tipper had breached a fiduciary duty in disclosing confidential information. One such example would be if the tipper received any personal benefit from the disclosure, thereby breaching his or her duty of loyalty to the company. In Dirks, the "tippee" received confidential information from an insider, a former employee of a company. The reason the insider disclosed the information to the tippee, and the reason the tippee disclosed the information to third parties, was to blow the whistle on massive fraud at the company. As a result of the tippee's efforts the fraud was uncovered, and the company went into bankruptcy. But, while the tippee had given the "inside" information to clients who made profits from the information, the U.S. Supreme Court ruled that the tippee could not be held liable under the federal securities laws—for the simple reason that the insider from whom he received the information was not releasing the information for an improper purpose (a personal benefit), but rather for the purpose of exposing the fraud. The Supreme Court ruled that the tippee could not have been aiding and abetting a securities law violation committed by the insider—for the simple reason that no securities law violation had been committed by the insider. In Dirks, the Supreme Court also defined the concept of "constructive insiders", who are lawyers, investment bankers, and others who receive confidential information from a corporation while providing services to the corporation. Constructive insiders are also liable for insider trading violations if the corporation expects the information to remain confidential, since they acquire the fiduciary duties of the true insider. The next expansion of insider trading liability came in SEC vs. Materia 745 F.2d 197 (2d Cir. 1984), the case that first introduced the misappropriation theory of liability for insider trading. Materia, a financial printing firm proofreader, and clearly not an insider by any definition, was found to have determined the identity of takeover targets based on proofreading tender offer documents in the course of his employment. After a two-week trial, the district court found him liable for insider trading, and the Second Circuit Court of Appeals affirmed holding that the theft of information from an employer, and the use of that information to purchase or sell securities in another entity, constituted a fraud in connection with the purchase or sale of a securities. The misappropriation theory of insider trading was born, and liability further expanded to encompass a larger group of outsiders. In United States v. Carpenter (1986) the U.S. Supreme Court cited an earlier ruling while unanimously upholding mail and wire fraud convictions for a defendant who received his information from a journalist rather than from the company itself. The journalist R. Foster Winans was also convicted, on the grounds that he had misappropriated information belonging to his employer, the Wall Street Journal. In that widely publicized case, Winans traded in advance of "Heard on the Street" columns appearing in the Journal. The Court stated in Carpenter: "It is well established, as a general proposition, that a person who acquires special knowledge or information by virtue of a confidential or fiduciary relationship with another is not free to exploit that knowledge or information for his own personal benefit but must account to his principal for any profits derived therefrom." However, in upholding the securities fraud (insider trading) convictions,
fight, the Nationalist troops had been forced to retreat, abandoning all hopes of a direct assault on Madrid by Casa de Campo, while the XIth Brigade had lost a third of its personnel. On 13 November, the 1,550-man strong XII International Brigade, made up of the Thälmann Battalion, the Garibaldi Battalion and the André Marty Battalion, deployed. Commanded by General "Lukacs", they assaulted Nationalist positions on the high ground of Cerro de Los Angeles. As a result of language and communication problems, command issues, lack of rest, poor coordination with armored units, and insufficient artillery support, the attack failed. On 19 November, the anarchist militias were forced to retreat, and Nationalist troops — Moroccans and Spanish Foreign Legionnaires, covered by the Nazi Condor Legion — captured a foothold in the University City. The 11th Brigade was sent to drive the Nationalists out of the University City. The battle was extremely bloody, a mix of artillery and aerial bombardment, with bayonet and grenade fights, room by room. Anarchist leader Buenaventura Durruti was shot there on 19 November 1936 and died the next day. The battle in the university went on until three-quarters of the University City was under Nationalist control. Both sides then started setting up trenches and fortifications. It was then clear that any assault from either side would be far too costly; the Nationalist leaders had to renounce the idea of a direct assault on Madrid, and prepare for a siege of the capital. On 13 December 1936, 18,000 nationalist troops attempted an attack to close the encirclement of Madrid at Guadarrama — an engagement known as the Battle of the Corunna Road. The Republicans sent in a Soviet armored unit, under General Dmitry Pavlov, and both XI and XII International Brigades. Violent combat followed, and they stopped the Nationalist advance. An attack was then launched by the Republic on the Córdoba front. The battle ended in a form of stalemate; a communique was issued, saying: "During the day the advance continued without the loss of any territory." Poets Ralph Winston Fox and John Cornford were killed. Eventually, the Nationalists advanced, taking the hydroelectric station at El Campo. André Marty accused the commander of the Marseillaise Battalion, Gaston Delasalle, of espionage and treason and had him executed. (It is doubtful that Delasalle would have been a spy for Francisco Franco; he was denounced by his second-in-command, André Heussler, who was subsequently executed for treason during World War II by the French Resistance.) Further Nationalist attempts after Christmas to encircle Madrid met with failure, but not without extremely violent combat. On 6 January 1937, the Thälmann Battalion arrived at Las Rozas, and held its positions until it was destroyed as a fighting force. On 9 January, only 10 km had been lost to the Nationalists, when the XIII International Brigade and XIV International Brigade and the 1st British Company, arrived in Madrid. Violent Republican assaults were launched in an attempt to retake the land, with little success. On 15 January, trenches and fortifications were built by both sides, resulting in a stalemate. The Nationalists did not take Madrid until the very end of the war, in March 1939, when they marched in unopposed. There were some pockets of resistance during the subsequent months. Battle of Jarama On 6 February 1937, following the fall of Málaga, the nationalists launched an attack on the Madrid–Andalusia road, south of Madrid. The Nationalists quickly advanced on the little town of Ciempozuelos, held by the XV International Brigade. was composed of the British Battalion (British Commonwealth and Irish), the Dimitrov Battalion (miscellaneous Balkan nationalities), the Sixth February Battalion (Belgians and French), the Canadian Mackenzie-Papineau Battalion and the Abraham Lincoln Brigade. An independent 80-men-strong (mainly) Irish unit, known afterward as the Connolly Column, also fought. Battalions were rarely composed entirely of one nationality, rather they were, for the most part, a mix of many. On 11 February 1937, a Nationalist brigade launched a surprise attack on the André Marty Battalion (XIV International Brigade), killing its sentries silently and crossing the Jarama. The Garibaldi Battalion stopped the advance with heavy fire. At another point, the same tactic allowed the Nationalists to move their troops across the river. On 12 February, the British Battalion, XV International Brigade took the brunt of the attack, remaining under heavy fire for seven hours. The position became known as "Suicide Hill". At the end of the day, only 225 of the 600 members of the British battalion remained. One company was captured by ruse, when Nationalists advanced among their ranks singing The Internationale. On 17 February, the Republican Army counter-attacked. On 23 and 27 February, the International Brigades were engaged, but with little success. The Lincoln Battalion was put under great pressure, with no artillery support. It suffered 120 killed and 175 wounded. Amongst the dead was the Irish poet Charles Donnelly and Leo Greene. There were heavy casualties on both sides, and although "both claimed victory ... both suffered defeats". The battle resulted in a stalemate, with both sides digging in and creating elaborate trench systems. On 22 February 1937, the League of Nations Non-Intervention Committee ban on foreign volunteers went into effect. Battle of Guadalajara After the failed assault on the Jarama, the Nationalists attempted another assault on Madrid, this time from the northeast. The objective was the town of Guadalajara, 50 km from Madrid. The whole Italian expeditionary corps — 35,000 men, with 80 battle tanks and 200 field artillery — was deployed, as Benito Mussolini wanted the victory to be credited to Italy. On 9 March 1937, the Italians made a breach in the Republican lines but did not properly exploit the advance. However, the rest of the Nationalist army was advancing, and the situation appeared critical for the Republicans. A formation drawn from the best available units of the Republican army, including the XI and XII International Brigades, was quickly assembled. At dawn on 10 March, the Nationalists closed in, and by noon, the Garibaldi Battalion counterattacked. Some confusion arose from the fact that the sides were not aware of each other's movements, and that both sides spoke Italian; this resulted in scouts from both sides exchanging information without realizing they were enemies. The Republican lines advanced and made contact with XI International Brigade. Nationalist tanks were shot at and infantry patrols came into action. On 11 March, the Nationalist army broke the front of the Republican army. The Thälmann Battalion suffered heavy losses, but succeeded in holding the Trijueque–Torija road. The Garibaldi also held its positions. On 12 March, Republican planes and tanks attacked. The Thälmann Battalion attacked Trijuete in a bayonet charge and re-took the town, capturing numerous prisoners. Other battles The International Brigades also saw combat in the Battle of Teruel in January 1938. The 35th International Division suffered heavily in this battle from aerial bombardment as well as shortages of food, winter clothing, and ammunition. The XIV International Brigade fought in the Battle of Ebro in July 1938, the last Republican offensive of the war. Casualties Although exact figures are not available, an estimated 5,857 to 25,229 members of the International Brigades died in Spain, of an estimated 23,670 to 59,380 who served, with estimated death rates of 16.7% to 29.2%. These high casualty rates are blamed on lack of training, poor leadership and use as shock troops. Disbandment In October 1938, at the height of the Battle of the Ebro, the Non-Intervention Committee demanded the withdrawal of the International Brigades. The Republican government of Juan Negrín announced the decision in the League of Nations on 21 September 1938. The disbandment was part of an ill-advised effort to get the Nationalists' foreign backers to withdraw their troops and to persuade the Western democracies such as France and Britain to end their arms embargo on the Republic. By this time there were about an estimated 10,000 foreign volunteers still serving in Spain for the Republican side, and about 50,000 foreign conscripts for the Nationalists (excluding another 30,000 Moroccans). Perhaps half of the International Brigadistas were exiles or refugees from Nazi Germany, Fascist Italy or other countries, such as Hungary, which had authoritarian right-wing governments at the time. These men could not safely return home and some were instead given honorary Spanish citizenship and integrated into Spanish units of the Popular Army. The remainder were repatriated to their own countries. The Belgian and Dutch volunteers lost their citizenship because they had served in a foreign army. Composition Overview The first brigades were composed mostly of French, Belgian, Italian, and German volunteers, backed by a sizeable contingent of Polish miners from Northern France and Belgium. The XIth, XIIth and XIIIth were the first brigades formed. Later, the XIVth and XVth Brigades were raised, mixing experienced soldiers with new volunteers. Smaller Brigades — the 86th, 129th and 150th - were formed in late 1937 and 1938, mostly for temporary tactical reasons. About 32,000 foreigners volunteered to defend the Spanish Republic, the vast majority of them with the International Brigades. Many were veterans of World War I. Their early engagements in 1936 during the Siege of Madrid amply demonstrated their military and propaganda value. The international volunteers were mainly socialists, communists, or others willing to accept communist authority, and a high proportion were Jewish. Some were involved in the Barcelona May Days fighting against leftist opponents of the Communists: the Workers' Party of Marxist Unification (POUM) (Partido Obrero de Unificación Marxista, an anti-Stalinist Marxist party) and the anarchist CNT (CNT, Confederación Nacional del Trabajo) and FAI (FAI, Iberian Anarchist Federation), who had strong support in Catalonia. These libertarian groups attracted fewer foreign volunteers. To simplify communication, the battalions usually concentrated on people of the same nationality or language group. The battalions were often (formally, at least) named after inspirational people or events. From spring 1937 onwards, many battalions contained one Spanish volunteer company of about 150 men. Later in the war, military discipline tightened and learning Spanish became mandatory. By decree of 23 September 1937, the International Brigades formally became units of the Spanish Foreign Legion. This made them subject to the Spanish Code of Military Justice. However, the Spanish Foreign Legion itself sided with the Nationalists throughout the coup and the civil war. The same decree also specified that non-Spanish officers in the Brigades should not exceed Spanish ones by more than 50 percent. Non-Spanish battalions Abraham Lincoln Battalion - from the United States, Canada and Irish Free State, with some British, Cypriots, and Chileans from the Chilean Worker Club of New York. Connolly Column - a mostly Irish republican group who fought as a section of the Lincoln Battalion Mickiewicz Battalion - predominantly Polish. André Marty Battalion - predominantly French and Belgian, named after André Marty. British Battalion - mainly British but with many from the Irish Free State, Australia, New Zealand, South Africa, Cyprus and other Commonwealth countries. Checo-Balcánico Battalion - Czechoslovakian and Balkan. Commune de Paris Battalion - predominantly French. Deba Blagoiev Battalion - predominantly Bulgarian, later merged into the Djakovic Battalion. Dimitrov Battalion - Greek, Yugoslav, Bulgarian, Czechoslovakian, Hungarian and Romanian. Named after Georgi Dimitrov. Djuro Djakovic Battalion - Yugoslav, Bulgarian, anarchist, named for former Yugoslav Communist Party secretary Đuro Đaković. Dabrowski Battalion - mostly Polish and Hungarian, also Czechoslovak, Ukrainian, Bulgarian and Palestinian Jews. Edgar André Battalion - mostly German, also Austrian, Yugoslav, Bulgarian, Albanian, Romanian, Danish, Swedish, Norwegian and Dutch. Español Battalion - Mexican, Cuban, Puerto Rican, Chilean, Argentine and Bolivian. Figlio Battalion - mostly Italian; later merged with the Garibaldi Battalion. Garibaldi Battalion - raised as the Italoespañol Battalion and renamed. Mostly Italian and Spanish, but contained some Albanians. George Washington Battalion - the second U.S. battalion. Later merged with the Lincoln Battalion, to form the Lincoln-Washington Battalion. Hans Beimler Battalion - mostly German; later merged with the Thälmann Battalion. Henri Barbusse Battalion - predominantly French. Henri Vuilleman Battalion - predominantly French. (Matteotti Battalion) - predominantly Italian and the first international group to reach Spain Louise Michel Battalions - French-speaking, later merged with the Henri Vuillemin Battalion. Mackenzie–Papineau Battalion - the "Mac-Paps", predominantly Canadian. Marseillaise Battalion - predominantly French, commanded by George Nathan. Incorporated one separate British company. Palafox Battalion - Yugoslav, Polish, Czechoslovakian, Hungarian, Jewish and French. Naftali Botwin Company - a Jewish unit formed within the Palafox Battalion in December 1937. Pierre Brachet Battalion - mostly French. Rakosi Battalion - mainly Hungarian, also Czechoslovaks, Ukrainians, Poles, Chinese, Mongolians and Palestinian Jews. Nine Nations Battalion (also known as the Sans nons and Neuf Nationalités - French, Belgian, Italian, German, Austrian, Dutch, Danish, Swiss and Polish. Sixth of February Battalion - French, Belgian, Moroccan, Algerian, Libyan, Syrian, Iranian, Iraqi, Egyptian, Chinese, Japanese, Indian, Filipino and Palestinian Jewish. Thälmann Battalion - predominantly German, named after German communist leader Ernst Thälmann. Tom Mann Centuria - a small, mostly British, group who operated as a section of the Thälmann Battalion. Thomas Masaryk Battalion: mostly Czechoslovak. Chapaev Battalion - composed of 21 nationalities (Ukrainian, Polish, Czechoslovakian, Bulgarian, Yugoslavian, Turkish, Italian, German, Austrian, Finnish, Swedish, Norwegian, Danish, Belgian, French, Greek, Albanian, Dutch, Swiss, Lithuanian and Estonian). Vaillant-Couturier Battalion - French, Belgian, Czechoslovakian, Bulgarian, Swedish, Norwegian and Danish. Veinte Battalion - American, British, Italian, Yugoslav and Bulgarian. Zwölfte Februar Battalion - mostly Austrian. Company De Zeven Provinciën - Dutch. Brigadistas by country of origin {| class="wikitable" |- ! Country !! Estimate !! Notes |- | France ||8,962–9,000 || |- | Italy || 3,000–3,350 || |- | Germany | rowspan="2" | 3,000–5,000 Beevor quotes 2,217 Germans and 872 Austrians. Austrian Resistance documents name 1400 Austrians || |- | Austria |annexed in 1938 by Germany |- | Poland || 500-5,000 || International historiography tends to hover around the figure of 3,000 "Poles". It includes migrants from Poland but recruited in France and Belgium, who made up some 75% of the Polish contingent; it also includes volunteers of Belorussian, Ukrainian and especially Jewish origin; the latter might have accounted for 45% of all volunteers classified as "Poles" |- | ||2,341–2,800 || |- | Yugoslavia | 2,095 || |- | || 2,500 || |- | || 1,600–1,722 || |- | || 1,546–2,000 Thomas estimates 1,000. || |- | Yugoslavia || 1,500–1,660 || |- | Cuba|| 1,101 || |- | Czechoslovakia || 1,006–1,500 || |- | ||740 || |- | ||628–691|| |- | ||550 || 220 died. |- | Hungary ||528–1,500 || |- | ||500 || Est. 799–1,000 from Scandinavia (of whom 500 were Swedes.) |- | Romania || 500 || |- | Bulgaria ||462 || |- | ||408–800 || |- | |300-600 | |- | Ireland || 250 || Split between the British Battalion and the Lincoln Battalion which included the famed Connolly Column |- | ||225 || 100 died. |- | || 225 || Including 78 Finnish Americans and 73 Finnish Canadians, ca. 70 died. |- | Estonia ||200 || |- | Greece || 290–400 || |- | Portugal || 134|| Due to the geographic and linguistic proximity most Portuguese volunteers joined the Republican forces directly and not the International Brigades (such is the case of Emídio Guerreiro and that was the plan of the failed 1936 Naval Revolt). At the time it was estimated that about 2,000 Portuguese fought on the Republican side, spread throughout different units. |- | ||103 || Livre historiographic d'Henri Wehenkel - D'Spueniekämfer (1997) |- | China || 100||Organised by the Chinese Communist Party, members were mostly overseas Chinese led by Xie Weijin. |- | ||90 || |- | Cyprus ||60 || |- | || 60 || Of whom 16 killed. |- | Philippines || 50 || |- | Albania || 43 || Organised in the "Garibaldi Battalion" together with Italians. They were led by the Kosovar revolutionary Asim Vokshi |- | || 24 || |- | New Zealand || "Perhaps 20" || Mixed into British units |- | Others
prove invaluable in combat). The operation was met with enthusiasm by communists, but by anarchists with skepticism, at best. At first, the anarchists, who controlled the borders with France, were told to refuse communist volunteers, but reluctantly allowed their passage after protests. A group of 500 volunteers (mainly French, with a few exiled Poles and Germans) arrived in Albacete on 14 October 1936. They were met by international volunteers who had already been fighting in Spain: Germans from the Thälmann Battalion, Italians from the Centuria Gastone Sozzi and French from the Commune de Paris Battalion. Among them was British poet John Cornford. Men were sorted according to their experience and origin and dispatched to units. On 30 May 1937, the Spanish liner Ciudad de Barcelona, carrying 200–250 volunteers from Marseille to Spain, was torpedoed by a Nationalist submarine off the coast of Malgrat de Mar. The ship sunk and up to 65 volunteers are estimated to have drowned. Albacete soon became the International Brigades headquarters and its main depot. It was run by a troika of Comintern heavyweights: André Marty was commander; Luigi Longo (Gallo) was Inspector-General; and Giuseppe Di Vittorio (Nicoletti) was chief political commissar. There were many Jewish volunteers amongst the brigaders - about a quarter of the total. A Jewish company was formed within the Polish battalion that was named after Naftali Botwin, a young Jewish communist killed in Poland in 1925. The French Communist Party provided uniforms for the Brigades. They were organized into mixed brigades, the basic military unit of the Republican People's Army. Discipline was severe. For several weeks, the Brigades were locked in their base while their strict military training was underway. Service First engagements: Siege of Madrid The Battle of Madrid was a major success for the Republic, and staved off the prospect of a rapid defeat at the hands of Francisco Franco's forces. The role of the International Brigades in this victory was generally recognized but was exaggerated by Comintern propaganda so that the outside world heard only of their victories and not those of Spanish units. So successful was such propaganda that the British Ambassador, Sir Henry Chilton, declared that there were no Spaniards in the army which had defended Madrid. The International Brigade forces that fought in Madrid arrived after another successful Republican fighting. Of the 40,000 Republican troops in the city, the foreign troops numbered less than 3,000. Even though the International Brigades did not win the battle by themselves, nor significantly change the situation, they certainly did provide an example by their determined fighting and improved the morale of the population by demonstrating the concern of other nations in the fight. Many of the older members of the International Brigades provided valuable combat experience, having fought during the First World War (Spain remained neutral in 1914–1918) and the Irish War of Independence (some had fought in the British Army while others had fought in the Irish Republican Army (IRA)). One of the strategic positions in Madrid was the Casa de Campo. There the Nationalist troops were Moroccans, commanded by General José Enrique Varela. They were stopped by III and IV Brigades of the Spanish Republican Army. On 9 November 1936, the XI International Brigade – comprising 1,900 men from the Edgar André Battalion, the Commune de Paris Battalion and the Dabrowski Battalion, together with a British machine-gun company — took up position at the Casa de Campo. In the evening, its commander, General Kléber, launched an assault on the Nationalist positions. This lasted for the whole night and part of the next morning. At the end of the fight, the Nationalist troops had been forced to retreat, abandoning all hopes of a direct assault on Madrid by Casa de Campo, while the XIth Brigade had lost a third of its personnel. On 13 November, the 1,550-man strong XII International Brigade, made up of the Thälmann Battalion, the Garibaldi Battalion and the André Marty Battalion, deployed. Commanded by General "Lukacs", they assaulted Nationalist positions on the high ground of Cerro de Los Angeles. As a result of language and communication problems, command issues, lack of rest, poor coordination with armored units, and insufficient artillery support, the attack failed. On 19 November, the anarchist militias were forced to retreat, and Nationalist troops — Moroccans and Spanish Foreign Legionnaires, covered by the Nazi Condor Legion — captured a foothold in the University City. The 11th Brigade was sent to drive the Nationalists out of the University City. The battle was extremely bloody, a mix of artillery and aerial bombardment, with bayonet and grenade fights, room by room. Anarchist leader Buenaventura Durruti was shot there on 19 November 1936 and died the next day. The battle in the university went on until three-quarters of the University City was under Nationalist control. Both sides then started setting up trenches and fortifications. It was then clear that any assault from either side would be far too costly; the Nationalist leaders had to renounce the idea of a direct assault on Madrid, and prepare for a siege of the capital. On 13 December 1936, 18,000 nationalist troops attempted an attack to close the encirclement of Madrid at Guadarrama — an engagement known as the Battle of the Corunna Road. The Republicans sent in a Soviet armored unit, under General Dmitry Pavlov, and both XI and XII International Brigades. Violent combat followed, and they stopped the Nationalist advance. An attack was then launched by the Republic on the Córdoba front. The battle ended in a form of stalemate; a communique was issued, saying: "During the day the advance continued without the loss of any territory." Poets Ralph Winston Fox and John Cornford were killed. Eventually, the Nationalists advanced, taking the hydroelectric station at El Campo. André Marty accused the commander of the Marseillaise Battalion, Gaston Delasalle, of espionage and treason and had him executed. (It is doubtful that Delasalle would have been a spy for Francisco Franco; he was denounced by his second-in-command, André Heussler, who was subsequently executed for treason during World War II by the French Resistance.) Further Nationalist attempts after Christmas to encircle Madrid met with failure, but not without extremely violent combat. On 6 January 1937, the Thälmann Battalion arrived at Las Rozas, and held its positions until it was destroyed as a fighting force. On 9 January, only 10 km had been lost to the Nationalists, when the XIII International Brigade and XIV International Brigade and the 1st British Company, arrived in Madrid. Violent Republican assaults were launched in an attempt to retake the land, with little success. On 15 January, trenches and fortifications were built by both sides, resulting in a stalemate. The Nationalists did not take Madrid until the very end of the war, in March 1939, when they marched in unopposed. There were some pockets of resistance during the subsequent months. Battle of Jarama On 6 February 1937, following the fall of Málaga, the nationalists launched an attack on the Madrid–Andalusia road, south of Madrid. The Nationalists quickly advanced on the little town of Ciempozuelos, held by the XV International Brigade. was composed of the British Battalion (British Commonwealth and Irish), the Dimitrov Battalion (miscellaneous Balkan nationalities), the Sixth February Battalion (Belgians and French), the Canadian Mackenzie-Papineau Battalion and the Abraham Lincoln Brigade. An independent 80-men-strong (mainly) Irish unit, known afterward as the Connolly Column, also fought. Battalions were rarely composed entirely of one nationality, rather they were, for the most part, a mix of many. On 11 February 1937, a Nationalist brigade launched a surprise attack on the André Marty Battalion (XIV International Brigade), killing its sentries silently and crossing the Jarama. The Garibaldi Battalion stopped the advance with heavy fire. At another point, the same tactic allowed the Nationalists to move their troops across the river. On 12 February, the British Battalion, XV International Brigade took the brunt of the attack, remaining under heavy fire for seven hours. The position became known as "Suicide Hill". At the end of the day, only 225 of the 600 members of the British battalion remained. One company was captured by ruse, when Nationalists advanced among their ranks singing The Internationale. On 17 February, the Republican Army counter-attacked. On 23 and 27 February, the International Brigades were engaged, but with little success. The Lincoln Battalion was put under great pressure, with no artillery support. It suffered 120 killed and 175 wounded. Amongst the dead was the Irish poet Charles Donnelly and Leo Greene. There were heavy casualties on both sides, and although "both claimed victory ... both suffered defeats". The battle resulted in a stalemate, with both sides digging in and creating elaborate trench systems. On 22 February 1937, the League of Nations Non-Intervention Committee ban on foreign volunteers went into effect. Battle of Guadalajara After the failed assault on the Jarama, the Nationalists attempted another assault on Madrid, this time from the northeast. The objective was the town of Guadalajara, 50 km from Madrid. The whole Italian expeditionary corps — 35,000 men, with 80 battle tanks and 200 field artillery — was deployed, as Benito Mussolini wanted the victory to be credited to Italy. On 9 March 1937, the Italians made a breach in the Republican lines but did not properly exploit the advance. However, the rest of the Nationalist army was advancing, and the situation appeared critical for the Republicans. A formation drawn from the best available units of the Republican army, including the XI and XII International Brigades, was quickly assembled. At dawn on 10 March, the Nationalists closed in, and by noon, the Garibaldi Battalion counterattacked. Some confusion arose from the fact that the sides were not aware of each other's movements, and that both sides spoke Italian; this resulted in scouts from both sides exchanging information without realizing they were enemies. The Republican lines advanced and made contact with XI International Brigade. Nationalist tanks were shot at and infantry patrols came into action. On 11 March, the Nationalist army broke the front of the Republican army. The Thälmann Battalion suffered heavy losses, but succeeded in holding the Trijueque–Torija road. The Garibaldi also held its positions. On 12 March, Republican planes and tanks attacked. The Thälmann Battalion attacked Trijuete in a bayonet charge and re-took the town, capturing numerous prisoners. Other battles The International Brigades also saw combat in the Battle of Teruel in January 1938. The 35th International Division suffered heavily in this battle from aerial bombardment as well as shortages of food, winter clothing, and ammunition. The XIV International Brigade fought in the Battle of Ebro in July 1938, the last Republican offensive of the war. Casualties Although exact figures are not available, an estimated 5,857 to 25,229 members of the International Brigades died in Spain, of an estimated 23,670 to 59,380 who served, with estimated death rates of 16.7% to 29.2%. These high casualty rates are blamed on lack of training, poor leadership and use as shock troops. Disbandment In October 1938, at the height of the Battle of the Ebro, the Non-Intervention Committee demanded the withdrawal of the International Brigades. The Republican government of Juan Negrín announced the decision in the League of Nations on 21 September 1938. The disbandment was part of an ill-advised effort to get the Nationalists' foreign backers to withdraw their troops and to persuade the Western democracies such as France and Britain to end their arms embargo on the Republic. By this time there were about an estimated 10,000 foreign volunteers still serving in Spain for the Republican side, and about 50,000 foreign conscripts for the Nationalists (excluding another 30,000 Moroccans). Perhaps half of the International Brigadistas were exiles or refugees from Nazi Germany, Fascist Italy or other countries, such as Hungary, which had authoritarian right-wing governments at the time. These men could not safely return home and some were instead given honorary Spanish citizenship and integrated into Spanish units of the Popular Army. The remainder were repatriated to their own countries. The Belgian and Dutch volunteers lost their citizenship because they had served in a foreign army. Composition Overview The first brigades were composed mostly of French, Belgian, Italian, and German volunteers, backed by a sizeable contingent of Polish miners from Northern France and Belgium. The XIth, XIIth and
Luís Alves de Lima e Silva, Duke of Caxias (1803–1880), Brazilian army officer and politician Arthur Wellesley, 1st Duke of Wellington (1769–1852), British soldier and statesman Beltrán Alfonso Osorio, 18th duke of Alburquerque (1918–1994), Spanish noble and amateur jockey Robert William Wilcox (1855–1903), Hawaiian revolutionary soldier and politician Ships , any of several British Royal Navy ships HMS Iron Duke (1870), a battleship sold for scrap in 1906 HMS Iron Duke (1912), the fleet flagship at the Battle of Jutland HMS Iron Duke (F234), a Type 23 frigate launched in 1991 Trains GWR Iron Duke Class, a class of locomotive built by the Great Western Railway in
de Lima e Silva, Duke of Caxias (1803–1880), Brazilian army officer and politician Arthur Wellesley, 1st Duke of Wellington (1769–1852), British soldier and statesman Beltrán Alfonso Osorio, 18th duke of Alburquerque (1918–1994), Spanish noble and amateur jockey Robert William Wilcox (1855–1903), Hawaiian revolutionary soldier and politician Ships , any of several British Royal Navy ships HMS Iron Duke (1870), a battleship sold for scrap in 1906 HMS Iron Duke (1912), the fleet flagship at the Battle of Jutland HMS Iron Duke (F234), a Type 23 frigate launched in 1991 Trains GWR Iron Duke Class, a class of locomotive built by the Great Western Railway in England Iron Duke, a GWR 3031 Class locomotive built in 1892 BR Standard Class 7
Industrial process Up to the point where the food is processed by irradiation, the food is processed in the same way as all other food. Packaging For some forms of treatment, packaging is used to ensure the food stuffs never come in contact with radioactive substances and prevent re-contamination of the final product. Food processors and manufacturers today struggle with using affordable, efficient packaging materials for irradiation based processing. The implementation of irradiation on prepackaged foods has been found to impact foods by inducing specific chemical alterations to the food packaging material that migrates into the food. Cross-linking in various plastics can lead to physical and chemical modifications that can increase the overall molecular weight. On the other hand, chain scission is fragmentation of polymer chains that leads to a molecular weight reduction. Treatment To treat the food, it is exposed to a radioactive source for a set period of time to achieve a desired dose. Radiation may be emitted by a radioactive substance, or by X-ray and electron beam accelerators. Special precautions are taken to ensure the food stuffs never come in contact with the radioactive substances and that the personnel and the environment are protected from exposure radiation. Irradiation treatments are typically classified by dose (high, medium, and low), but are sometimes classified by the effects of the treatment (radappertization, radicidation and radurization). Food irradiation is sometimes referred to as "cold pasteurization" or "electronic pasteurization" because ionizing the food does not heat the food to high temperatures during the process, and the effect is similar to heat pasteurization. The term "cold pasteurization" is controversial because the term may be used to disguise the fact the food has been irradiated and pasteurization and irradiation are fundamentally different processes. Gamma irradiation Gamma irradiation is produced from the radioisotopes cobalt-60 and caesium-137, which are derived by neutron bombardment of cobalt-59 and as a nuclear source by-product, respectively. Cobalt-60 is the most common source of gamma rays for food irradiation in commercial scale facilities as it is water insoluble and hence has little risk of environmental contamination by leakage into the water systems. As for transportation of the radiation source, cobalt-60 is transported in special trucks that prevent release of radiation and meet standards mentioned in the Regulations for Safe Transport of Radioactive Materials of the International Atomic Energy Act. The special trucks must meet high safety standards and pass extensive tests to be approved to ship radiation sources. Conversely, caesium-137, is water-soluble and poses a risk of environmental contamination. Insufficient quantities are available for large scale commercial use. An incident where water-soluble caesium-137 leaked into the source storage pool requiring NRC intervention has led to near elimination of this radioisotope. Gamma irradiation is widely used due to its high penetration depth and dose uniformity, allowing for large-scale applications with high through puts. Additionally, gamma irradiation is significantly less expensive than using an X-ray source. In most designs, the radioisotope, contained in stainless steel pencils, is stored in a water-filled storage pool which absorbs the radiation energy when not in use. For treatment, the source is lifted out of the storage tank, and product contained in totes is passed around the pencils to achieve required processing. Treatment costs vary as a function of dose and facility usage. A pallet or tote is typically exposed for several minutes to hours depending on dose. Low-dose applications such as disinfestation of fruit range between US$0.01/lbs and US$0.08/lbs while higher-dose applications can cost as much as US$0.20/lbs. Electron beam Treatment of electron beams is created as a result of high energy electrons in an accelerator that generates electrons accelerated to 99% the speed of light. This system uses electrical energy and can be powered on and off. The high power correlates with a higher throughput and lower unit cost, but electron beams have low dose uniformity and a penetration depth of centimeters. Therefore, electron beam treatment works for products that have low thickness. X-ray X-rays are produced by bombardment of dense target material with high-energy accelerated electrons(this process is known as bremsstrahlung-conversion), giving rise to a continuous energy spectrum. Heavy metals, such as tantalum and tungsten, are used because of their high atomic numbers and high melting temperatures. Tantalum is usually preferred versus tungsten for industrial, large-area, high-power targets because it is more workable than tungsten and has a higher threshold energy for induced reactions. Like electron beams, x-rays do not require the use of radioactive materials and can be turned off when not in use. X-rays have high penetration depths and high dose uniformity but they are a very expensive source of irradiation as only 8% of the incident energy is converted into X-rays. UV-C UV-C does not penetrate as deeply as other methods. As such, its direct antimicrobial effect is limited to the surface only. Its DNA damage effect produces cyclobutane-type pyrimidine dimers. Besides the direct effects, UV-C also induces resistance even against pathogens not yet inoculated. Some of this induced resistance is understood, being the result of temporary inactivation of self-degradation enzymes like polygalacturonase and increased expression of enzymes associated with cell wall repair. Cost Irradiation is a capital-intensive technology requiring a substantial initial investment, ranging from $1 million to $5 million. In the case of large research or contract irradiation facilities, major capital costs include a radiation source, hardware (irradiator, totes and conveyors, control systems, and other auxiliary equipment), land (1 to 1.5 acres), radiation shield, and warehouse. Operating costs include salaries (for fixed and variable labor), utilities, maintenance, taxes/insurance, cobalt-60 replenishment, general utilities, and miscellaneous operating costs. Perishable food items, like fruits, vegetables and meats would still require to be handled in the cold chain, so all other supply chain costs remain the same. Food manufacturers have not embraced food irradiation because the market does not support the increased price of irradiated foods, and because of potential consumer backlash due to irradiated foods. The cost of food irradiation is influenced by dose requirements, the food's tolerance of radiation, handling conditions, i.e., packaging and stacking requirements, construction costs, financing arrangements, and other variables particular to the situation. State of the industry Irradiation has been approved by many countries. For example, in the U.S. and Canada, food irradiation has existed for decades. Food irradiation is used commercially and volumes are in general increasing at a slow rate, even in the European Union where all member countries allow the irradiation of dried herbs spices and vegetable seasonings, but only a few allow other foods to be sold as irradiated. Although there are some consumers who choose not to purchase irradiated food, a sufficient market has existed for retailers to have continuously stocked irradiated products for years. When labeled irradiated food is offered for retail sale, consumers buy it and re-purchase it, indicating a market for irradiated foods, although there is a continuing need for consumer education. Food scientists have concluded that any fresh or frozen food undergoing irradiation at specified doses is safe to consume, with some 60 countries using irradiation to
of chemical transformations due to radiolysis effects. Irradiation does not make foods radioactive, change food chemistry, compromise nutrient contents, or change the taste, texture, or appearance of food . Food quality Assessed rigorously over several decades, irradiation in commercial amounts to treat food has no negative impact on the sensory qualities and nutrient content of foods. Research on minimally processed vegetables Watercress (Nasturtium officinale) is a rapidly growing aquatic or semi aquatic perennial plant. Because chemical agents do not provide efficient microbial reductions, watercress has been tested with gamma irradiation treatment in order to improve both safety and the shelf life of the product. It is traditionally used on horticultural products to prevent sprouting and post-packaging contamination, delay post-harvest ripening, maturation and senescence. Public Perceptions Some who advocate against food irradiation argue the long term health effects & safety of irradiated food cannot be scientifically proven, despite hundreds of animal feeding studies of irradiated food performed since 1950. Endpoints include subchronic and chronic changes in metabolism, histopathology, function of most organs, reproductive effects, growth, teratogenicity, and mutagenicity. Industrial process Up to the point where the food is processed by irradiation, the food is processed in the same way as all other food. Packaging For some forms of treatment, packaging is used to ensure the food stuffs never come in contact with radioactive substances and prevent re-contamination of the final product. Food processors and manufacturers today struggle with using affordable, efficient packaging materials for irradiation based processing. The implementation of irradiation on prepackaged foods has been found to impact foods by inducing specific chemical alterations to the food packaging material that migrates into the food. Cross-linking in various plastics can lead to physical and chemical modifications that can increase the overall molecular weight. On the other hand, chain scission is fragmentation of polymer chains that leads to a molecular weight reduction. Treatment To treat the food, it is exposed to a radioactive source for a set period of time to achieve a desired dose. Radiation may be emitted by a radioactive substance, or by X-ray and electron beam accelerators. Special precautions are taken to ensure the food stuffs never come in contact with the radioactive substances and that the personnel and the environment are protected from exposure radiation. Irradiation treatments are typically classified by dose (high, medium, and low), but are sometimes classified by the effects of the treatment (radappertization, radicidation and radurization). Food irradiation is sometimes referred to as "cold pasteurization" or "electronic pasteurization" because ionizing the food does not heat the food to high temperatures during the process, and the effect is similar to heat pasteurization. The term "cold pasteurization" is controversial because the term may be used to disguise the fact the food has been irradiated and pasteurization and irradiation are fundamentally different processes. Gamma irradiation Gamma irradiation is produced from the radioisotopes cobalt-60 and caesium-137, which are derived by neutron bombardment of cobalt-59 and as a nuclear source by-product, respectively. Cobalt-60 is the most common source of gamma rays for food irradiation in commercial scale facilities as it is water insoluble and hence has little risk of environmental contamination by leakage into the water systems. As for transportation of the radiation source, cobalt-60 is transported in special trucks that prevent release of radiation and meet standards mentioned in the Regulations for Safe Transport of Radioactive Materials of the International Atomic Energy Act. The special trucks must meet high safety standards and pass extensive tests to be approved to ship radiation sources. Conversely, caesium-137, is water-soluble and poses a risk of environmental contamination. Insufficient quantities are available for large scale commercial use. An incident where water-soluble caesium-137 leaked into the source storage pool requiring NRC intervention has led to near elimination of this radioisotope. Gamma irradiation is widely used due to its high penetration depth and dose uniformity, allowing for large-scale applications with high through puts. Additionally, gamma irradiation is significantly less expensive than using an X-ray source. In most designs, the radioisotope, contained in stainless steel pencils, is stored in a water-filled storage pool which absorbs the radiation energy when not in use. For treatment, the source is lifted out of the storage tank, and product contained in totes is passed around the pencils to achieve required processing. Treatment costs vary as a function of dose and facility usage. A pallet or tote is typically exposed for several minutes to hours depending on dose. Low-dose applications such as disinfestation of fruit range between US$0.01/lbs and US$0.08/lbs while higher-dose applications can cost as much as US$0.20/lbs. Electron beam Treatment of electron beams is created as a result of high energy electrons in an accelerator that generates electrons accelerated to 99% the speed of light. This system uses electrical energy and can be powered on and off. The high power correlates with a higher throughput and lower unit cost, but electron beams have low dose uniformity and a penetration depth of centimeters. Therefore, electron beam treatment works for products that have low thickness. X-ray X-rays are produced by bombardment of dense target material with high-energy accelerated electrons(this process is known as bremsstrahlung-conversion), giving rise to a continuous energy spectrum. Heavy metals, such as tantalum and tungsten, are used because of their high atomic numbers and high melting temperatures. Tantalum is usually preferred versus tungsten for industrial, large-area, high-power targets because it is more workable than tungsten and has a higher threshold energy for induced reactions. Like electron beams, x-rays do not require the use of radioactive materials and can be turned off when not in use. X-rays have high penetration depths and high dose uniformity but they are a very expensive source of irradiation as only 8% of the incident energy is converted into X-rays. UV-C UV-C does not penetrate as deeply as other methods. As such, its direct antimicrobial effect is limited to the surface only. Its DNA damage effect produces cyclobutane-type pyrimidine dimers. Besides the direct effects, UV-C also induces resistance even against pathogens not yet inoculated. Some of this induced resistance is understood, being the result of temporary inactivation of self-degradation enzymes like polygalacturonase and increased expression of enzymes associated with cell wall repair. Cost Irradiation is a capital-intensive technology requiring a substantial initial investment, ranging from $1 million to $5 million. In the case of large research or contract irradiation facilities, major capital costs include a radiation source, hardware (irradiator, totes and conveyors, control systems, and other auxiliary equipment), land (1 to 1.5 acres), radiation shield, and warehouse. Operating costs include salaries (for fixed and variable labor), utilities, maintenance, taxes/insurance, cobalt-60 replenishment, general utilities, and miscellaneous operating costs. Perishable food items, like fruits, vegetables and meats would still require to be handled in the cold chain, so all other supply chain costs remain the same. Food manufacturers have not embraced food irradiation because the market does not support the increased price of irradiated foods, and because of potential consumer backlash due to irradiated foods. The cost of food irradiation is influenced by dose requirements, the food's tolerance of radiation, handling conditions, i.e., packaging and stacking requirements, construction costs, financing arrangements, and other variables particular to the situation. State of the industry Irradiation has been approved by many countries. For example, in the U.S. and Canada, food irradiation has existed for decades. Food irradiation is used commercially and volumes are in general increasing at a slow rate, even in the European Union where all member countries allow the irradiation of dried herbs spices and vegetable seasonings, but only a few allow other foods to be sold as irradiated. Although there are some consumers who choose not to purchase irradiated food, a sufficient market has existed for retailers to have continuously stocked irradiated products for years. When labeled irradiated food is offered for retail sale, consumers buy it and re-purchase it, indicating a market for irradiated foods, although there is a continuing need for consumer education. Food scientists have concluded that any fresh or frozen food undergoing irradiation at specified doses is safe to consume, with some 60 countries using irradiation to maintain quality in their food supply. Standards and regulations The Codex Alimentarius represents the global standard for irradiation of food, in particular under the WTO-agreement. Regardless of treatment source, all processing facilities must adhere to safety standards set by the International Atomic Energy Agency (IAEA), Codex Code of Practice for the Radiation Processing of Food, Nuclear Regulatory Commission (NRC), and the International Organization for Standardization (ISO). More specifically, ISO 14470 and ISO 9001 provide in-depth information regarding safety in irradiation facilities. All commercial irradiation facilities contain safety systems which are designed to prevent exposure of personnel to radiation. The radiation source is constantly shielded by water, concrete, or metal. Irradiation facilities are designed with overlapping layers of protection, interlocks, and safeguards to prevent accidental radiation exposure. Additionally, "melt-downs" do not occur in facilities because the radiation source gives off radiation and decay heat; however, the heat is not sufficient to melt any material. Labeling The provisions of the Codex Alimentarius are that any "first generation" product must be labeled "irradiated" as any product derived directly from an irradiated raw material; for ingredients the provision is that even the last molecule of an irradiated ingredient must be listed with the ingredients even in cases where the unirradiated ingredient does not appear on the label. The RADURA-logo is optional; several countries use a graphical version that differs from the Codex-version. The suggested rules for labeling is published at CODEX-STAN – 1 (2005), and includes the usage of the Radura symbol for all products that contain irradiated foods. The Radura symbol is not a designator of quality. The amount of pathogens remaining is based upon dose and the original content and the dose applied can vary on a product by product basis. The European Union follows the Codex's provision to label irradiated ingredients down to the last molecule of irradiated food. The European Union does not provide for the use of the Radura logo and relies exclusively on labeling by the appropriate phrases in the respective languages of the Member States. The European Union enforces its irradiation labeling laws by requiring its member countries to perform tests on a cross section of food items in the market-place and to report to the European Commission. The results are published annually on EUR-Lex. The US defines irradiated foods as foods in which the irradiation causes a material change in the food, or a material change in the consequences that may result from the use of the food. Therefore, food that is processed as an ingredient by a restaurant or food processor is exempt from the labeling requirement in the US. All irradiated foods must include a prominent Radura symbol followed in addition to the statement "treated with irradiation" or "treated by irradiation. Bulk foods must be individually labeled with the symbol and statement or, alternatively, the Radura and statement should be located next to the sale container. Packaging Under section 409 of the Federal Food, Drug, and Cosmetic Act, irradiation of prepackaged foods requires premarket approval for not only the irradiation source for a specific food but also for the food packaging material. Approved packaging materials include various plastic
Medical Eligibility Criteria for Contraceptive Use and the Centers for Disease Control and Prevention (CDC) United States Medical Eligibility Criteria for Contraceptive Use. Being a nulliparous women (women who have never given birth) is not a contraindication for IUD use. IUDs are safe and acceptable even in young nulliparous women. The same is likely the case for virgin women, unless there is a microperforate hymen that obstructs any insertion of the IUD. Device description There are a number of models of copper IUDs available around the world. Most copper devices consist of a plastic core that is wrapped in a copper wire. Many of the devices have a T-shape similar to the hormonal IUD. However, there are "frameless" copper IUDs available as well.ParaGard is the only model currently available in the United States. At least three copper IUD models are available in Canada, two of which are slimmer T-shape versions used for women who have not had children. Early copper IUDs had copper around only the vertical stem, but more recent models have copper sleeves wrapped around the horizontal arms as well, increasing effectiveness. Some newer models also contain a silver core instead of a plastic core to delay copper fragmentation as well as increase the lifespan of the device. The lifespan of the devices range from 3 years to 10 years; however, some studies have demonstrated that the TCu 380A may be effective through 12 years. Its ATC code is . Insertion The copper IUD must be inserted by a qualified medical practitioner. It is recommended to consult an obstetrician/gynecologist, who has the equipment to properly insert the IUD and check that it does not move during the months following insertion. A copper IUD can be inserted at any phase of the menstrual cycle, but the optimal time is right after the menstrual period when the cervix is softest and the woman is least likely to be pregnant. The insertion process generally takes five minutes or less. The procedure can cause cramping or be painful for some women. Before placement of an IUD, a medical history and physical examination by a medical professional is useful to check for any contraindications or concerns. It is also recommended by some clinicians that patients be tested for gonorrhea and chlamydia, as these two infections increase the risk of contracting pelvic inflammatory disease shortly after insertion. Immediately prior to insertion, the clinician will perform a pelvic exam to determine the position of the uterus. After the pelvic exam, the vagina is held open with a speculum. A tenaculum is used to steady the cervix and uterus. Uterine sounding may be used to measure the length and direction of the cervical canal and uterus in order to decrease the risk of uterine perforation. The IUD is placed using a narrow tube, which is inserted through the cervix into the uterus. Short monofilament plastic/nylon strings hang down from the uterus into the vagina. The clinician will trim the threads so that they only protrude 3 to 4 cm out of the cervix and remain in the upper vagina. The strings allow the patient or clinician to periodically check to ensure the IUD is still in place and to enable easy removal of the device. The copper IUD can be inserted at any time in a woman's menstrual cycle as long as the woman is not pregnant. An IUD can also be inserted immediately postpartum and post-abortion as long as no infection has occurred. Breastfeeding is not a contraindication for the use of the copper IUD. The IUD can be inserted in women with HIV or AIDS as it does not increase the risk of transmission. Although previously not recommended for nulliparous women (women who have not had children), the IUD is now recommended for most women who are past menarche (their first period), including adolescents. After the insertion is finished, normal activities such as sex, exercise, and swimming can be performed as soon as it feels comfortable. Strenuous physical activity does not affect the position of the IUD. Types Many different types of copper IUDs are currently manufactured worldwide, but availability varies by country. In the United States, only one type of copper IUD is approved for use, while in the United Kingdom, over ten varieties are available. One company, Mona Lisa N.V., offers generic versions of many existing IUDs. Frameless IUDs The frameless IUD eliminates the use of the frame that gives conventional IUDs their signature T-shape. This change in design was made to reduce discomfort and expulsion associated with prior IUDs; without a solid frame, the frameless IUD should mold to the shape of the uterus. It may reduce expulsion and discontinuation rates compared to framed copper IUDs. Gynefix is the only frameless IUD brand currently available. It consists of hollow copper tubes on a polypropylene thread. It is inserted through the cervix with a special applicator that sutures the thread to the fundus (top) of the uterus; the thread is then cut with a tail hanging outside of the cervix, similar to frame IUDs. When this tail is pulled, the suture comes undone and the device can be removed. This requires more force than removing a T-shaped IUD but results in comparable discomfort during removal. Gynefix is not approved for use in the United States. Mechanism of action The copper IUD's primary mechanism of action is to prevent fertilization. Copper acts as a spermicide within the uterus. The presence of copper increases the levels of copper ions, prostaglandins, and white blood cells within the uterine and tubal fluids. Although not a primary mechanism of action, some experts in human reproduction believe there is sufficient evidence to suggest that IUDs with copper can disrupt implantation, especially when used for emergency contraception. Despite this, there has been no definitive evidence that IUD users have higher rates of embryonic loss than women not using contraception. Therefore, the copper IUD is considered to be a true contraceptive and not an abortifacient. Usage Globally, the IUD is the most widely used method of reversible birth control. The most recent data indicates that there are 169 million IUD users around the world. This includes both the nonhormonal and hormonal IUDs. IUDs are most popular in Asia, where the prevalence is almost 30%. In Africa and Europe, the prevalence is around 20%. As of 2009, levels of IUD use in the United States are estimated to be 5.5%. Data in the United States does not distinguish between hormonal and non-hormonal IUDs. In Europe, copper IUD prevalence ranges from under 5% in the United Kingdom to over 10% in Denmark in 2006. History According to popular legend, Arab traders inserted small stones into the uteruses of their camels to prevent pregnancy during long desert treks. The story was originally a tall tale to entertain delegates at a scientific conference on family planning; although it was later repeated as truth, it has no known historical basis. Precursors to IUDs were first marketed in 1902. Developed from stem pessaries (where the stem held the pessary in place over the cervix), the 'stem' on these devices actually extended into the uterus itself. Because they occupied both the vagina and the uterus, this type of stem pessary was also known as an intrauterine device. The use of intrauterine devices was associated with high rates of infection; for this reason, they were condemned by the medical community. The first intrauterine device (contained entirely in the uterus) was described in a German publication in 1909, although the author appears to have never marketed his product. In 1929, Ernst Gräfenberg of Germany published a report on an IUD made of silk sutures. He had found a 3% pregnancy rate among 1,100 women using his ring. In 1930, Gräfenberg reported a lower pregnancy rate of 1.6% among 600 women using an improved ring wrapped in silver wire. Unbeknownst to Gräfenberg, the silver wire was contaminated with 26% copper. Copper's role in increasing IUD efficacy would not be recognized until nearly 40 years later. In 1934, Japanese physician Tenrei Ota developed a variation of Gräfenberg's ring that contained a supportive structure in the center. The addition of this central disc lowered the IUD's expulsion rate. These devices still had high rates of infection, and their use and development were further stifled by World War II politics: contraception was forbidden in both Nazi Germany and Axis-allied Japan. The Allies did not learn of the work by Gräfenberg and Ota until well after the war ended. The first plastic IUD, the Margulies Coil or Margulies Spiral, was introduced in 1958. This device was somewhat large, causing discomfort to a large proportion of women users, and had a hard plastic tail, causing discomfort to their male partners. The modern colloquialism "coil" is based on the coil-shaped design of early IUDs. The Lippes Loop, a slightly smaller device with a monofilament tail, was introduced in 1962 and gained in popularity over the Margulies device. The stainless steel single-ring IUD was developed in the 1970s and widely used in China because of low manufacturing costs. The Chinese government banned production of steel IUDs in 1993 due to high failure rates (up to 10% per year). Howard Tatum, in the US, conceived the plastic T-shaped IUD in 1968. Shortly thereafter Jaime Zipper, in Chile, introduced the idea of adding copper to the devices to improve their contraceptive effectiveness. It was found that copper-containing devices could be made in smaller sizes without compromising effectiveness, resulting in fewer side effects such as pain and bleeding. T-shaped devices had lower rates of expulsion due to their greater similarity to the shape of the uterus. The poorly designed Dalkon Shield plastic IUD (which had a multifilament tail) was manufactured by the A. H. Robins Company and sold by Robins in the United States for three and a half years from January 1971 through June 1974, before sales were suspended by Robins
postpartum between 48 hours and 4 weeks (increased IUD expulsion rate with delayed postpartum insertion). The CDC and WHO criteria differ in their recommendation for women postpartum between 48 hours and 4 weeks. The CDC does not list this as a contraindication. Have AIDS (unless clinically well on anti-retroviral therapy) Have benign gestational trophoblastic disease Have ovarian cancer Have very high individual likelihood of exposure to gonorrhea or chlamydial STIs A full list of contraindications can be found in the World Health Organization (WHO) Medical Eligibility Criteria for Contraceptive Use and the Centers for Disease Control and Prevention (CDC) United States Medical Eligibility Criteria for Contraceptive Use. Being a nulliparous women (women who have never given birth) is not a contraindication for IUD use. IUDs are safe and acceptable even in young nulliparous women. The same is likely the case for virgin women, unless there is a microperforate hymen that obstructs any insertion of the IUD. Device description There are a number of models of copper IUDs available around the world. Most copper devices consist of a plastic core that is wrapped in a copper wire. Many of the devices have a T-shape similar to the hormonal IUD. However, there are "frameless" copper IUDs available as well.ParaGard is the only model currently available in the United States. At least three copper IUD models are available in Canada, two of which are slimmer T-shape versions used for women who have not had children. Early copper IUDs had copper around only the vertical stem, but more recent models have copper sleeves wrapped around the horizontal arms as well, increasing effectiveness. Some newer models also contain a silver core instead of a plastic core to delay copper fragmentation as well as increase the lifespan of the device. The lifespan of the devices range from 3 years to 10 years; however, some studies have demonstrated that the TCu 380A may be effective through 12 years. Its ATC code is . Insertion The copper IUD must be inserted by a qualified medical practitioner. It is recommended to consult an obstetrician/gynecologist, who has the equipment to properly insert the IUD and check that it does not move during the months following insertion. A copper IUD can be inserted at any phase of the menstrual cycle, but the optimal time is right after the menstrual period when the cervix is softest and the woman is least likely to be pregnant. The insertion process generally takes five minutes or less. The procedure can cause cramping or be painful for some women. Before placement of an IUD, a medical history and physical examination by a medical professional is useful to check for any contraindications or concerns. It is also recommended by some clinicians that patients be tested for gonorrhea and chlamydia, as these two infections increase the risk of contracting pelvic inflammatory disease shortly after insertion. Immediately prior to insertion, the clinician will perform a pelvic exam to determine the position of the uterus. After the pelvic exam, the vagina is held open with a speculum. A tenaculum is used to steady the cervix and uterus. Uterine sounding may be used to measure the length and direction of the cervical canal and uterus in order to decrease the risk of uterine perforation. The IUD is placed using a narrow tube, which is inserted through the cervix into the uterus. Short monofilament plastic/nylon strings hang down from the uterus into the vagina. The clinician will trim the threads so that they only protrude 3 to 4 cm out of the cervix and remain in the upper vagina. The strings allow the patient or clinician to periodically check to ensure the IUD is still in place and to enable easy removal of the device. The copper IUD can be inserted at any time in a woman's menstrual cycle as long as the woman is not pregnant. An IUD can also be inserted immediately postpartum and post-abortion as long as no infection has occurred. Breastfeeding is not a contraindication for the use of the copper IUD. The IUD can be inserted in women with HIV or AIDS as it does not increase the risk of transmission. Although previously not recommended for nulliparous women (women who have not had children), the IUD is now recommended for most women who are past menarche (their first period), including adolescents. After the insertion is finished, normal activities such as sex, exercise, and swimming can be performed as soon as it feels comfortable. Strenuous physical activity does not affect the position of the IUD. Types Many different types of copper IUDs are currently manufactured worldwide, but availability varies by country. In the United States, only one type of copper IUD is approved for use, while in the United Kingdom, over ten varieties are available. One company, Mona Lisa N.V., offers generic versions of many existing IUDs. Frameless IUDs The frameless IUD eliminates the use of the frame that gives conventional IUDs their signature T-shape. This change in design was made to reduce discomfort and expulsion associated with prior IUDs; without a solid frame, the frameless IUD should mold to the shape of the uterus. It may reduce expulsion and discontinuation rates compared to framed copper IUDs. Gynefix is the only frameless IUD brand currently available. It consists of hollow copper tubes on a polypropylene thread. It is inserted through the cervix with a special applicator
Reserve in 1980, and added to the National Register of Historic Places in 2019 as the Minong Traditional Cultural Property. The park covers , with of land and of surrounding waters. The park's northern boundary lies adjacent to the Canadian Lake Superior National Marine Conservation Area along the international border. With 25,798 visitors in 2018, it is the least-visited national park in the contiguous United States. Geography In 1875, Isle Royale was set off from Keweenaw County, as a separate county, "Isle Royale County". In 1897, the county was dissolved, and the island was reincorporated into Keweenaw County. The highest point on the island is Mount Desor at , or about above lake level. Isle Royale, the largest island in Lake Superior, is over in length and wide at its widest point. The park is made up of Isle Royale itself and approximately 400 smaller islands, along with any submerged lands within of the surrounding islands (16USC408g). Isle Royale is within about from the shore of the Canadian province of Ontario and adjacently, the state of Minnesota (near the city of Thunder Bay), and is from the Michigan shore, on the Keweenaw Peninsula, itself part of Upper Peninsula. There are no roads on the island, and wheeled vehicles or devices, other than wheelchairs, are not permitted. Rock Harbor has wheeled carts available to move personal belongings from the Rock Harbor marina to the cabins and hotel. Also, the National Park Service employs tractors and utility terrain vehicles to move items around the developed areas at Windigo, Rock Harbor, and Mott Island. Topsoil tends to be thin, which favors trees that have horizontal root patterns such as balsam fir, white spruce, and black spruce. Interior lakes Siskiwit Lake is the largest lake on the island. It has cold, clear water which is relatively low in nutrients. Siskiwit Lake contains several islands, including Ryan Island, the largest. Chicken Bone Lake Lake Desor Feldtmann Lake Intermediate Lake (Isle Royale) Lake Ritchie Sargent Lake Climate According to the Köppen climate classification system, Isle Royale National Park has a mild summer Humid continental climate (Dfb). According to the United States Department of Agriculture, the Plant Hardiness zone is 4b at 1178 ft (359 m) elevation with an average annual extreme minimum temperature of -24.2 °F (-31.2 °C). There is no weather station in the park, but the PRISM Climate Group, a project of Oregon State University, provides interpolated data for the island based on the climates of nearby areas. History Prehistory The island was a common hunting ground for native people from nearby Minnesota and Ontario. A canoe voyage of thirteen miles is necessary to reach the island's west end from the mainland. Large quantities of copper artifacts found in indian mounds and settlements, some dating back to 3000 B.C., were most likely mined on Isle Royale and the nearby Keweenaw Peninsula. The island has hundreds of pits and trenches up to 65 feet (20 m) deep from these indigenous peoples, with most in the McCargoe Cove area. Carbon-14 testing of wood remains found in sockets of copper artifacts indicates that they are at least 6500 years old.In Prehistoric Copper Mining in the Lake Superior Region, Drier and Du Temple estimated that over 750,000 tons of copper had been mined from the region. However, David Johnson and Susan Martin contend that their estimate was based on exaggerated and inaccurate assumptions. The Jesuit missionary Dablon published an account in 1669-70 of "an island called Menong, celebrated for its copper." Menong, or Minong, was the native term for the island, and is the basis for Minong Ridge. Prospecting began in earnest when the Chippewas relinquished their claims to the island in 1843, starting with many of the original native pits. This activity had ended by 1855, when no economic deposits were found. The Minong Mine and Island Mine were the result of renewed but short-lived activity from 1873 to 1881. Isle Royale was given to the United States by the 1783 treaty with Great Britain, but the British remained in control until after the War of 1812, and the Ojibwa peoples considered the island to be their territory. The Ojibwas ceded the island to the U.S. in the 1842 Treaty of La Pointe, with the Grand Portage Band unaware that neither they nor Isle Royale were in British territory. With the clarification to the Ojibwas of the 1842 Webster–Ashburton Treaty that was signed before the Treaty of La Pointe, the Ojibwas re-affirmed the 1842 Treaty of La Pointe in the 1844 Isle Royale Agreement, with the Grand Portage Band signing the agreement as an addendum to the 1842 treaty. In the mid-1840s, a report by Douglass Houghton, Michigan's first state geologist, set off a copper boom in the state, and the first modern copper mines were opened on the island. Evidence of the earlier mining efforts was everywhere, in the form of many stone hammers, some copper artifacts, and places where copper had been partially worked out of the rock but left in place. The ancient pits and trenches led to the discovery of many of the copper deposits that were mined in the 19th century. The remoteness of the island, combined with the small veins of copper, caused most of the 19th-century mines to fail quickly. Between the miners and commercial loggers, much of the island was deforested during the late 19th century. Once the island became a national park in 1940, logging and other exploitive activities ended, and the forest began to regenerate. The island was once the site of several lake trout and whitefish fisheries, as well as a few resorts. The fishing industry has declined considerably, but continues at Edisen Fishery. Today, it has no permanent inhabitants; the small communities of Scandinavian fishermen were removed by the United States National Park Service after the island became a national park in the 1940s. About 12 families still have lifetime leases for their cabins and claim Isle Royale as their heritage, and several descendant fishermen fish the Isle Royale waters commercially. Because numerous small islands surround Isle Royale, ships were once guided through the area by lighthouses at Passage Island, Rock Harbor, Rock of Ages, and Isle Royale Lighthouse on Menagerie Island. The western tip of the island is home to several shipwrecks that are very popular with scuba divers, including the SS America. The NPS Submerged Resources Center mapped the 10 most famous of the shipwrecks contained within the park, and published Shipwrecks of Isle Royale National Park; The Archeological Survey, which gives an overview of the maritime history of the area. The area’s notoriously harsh weather, dramatic
Royale Lighthouse on Menagerie Island. The western tip of the island is home to several shipwrecks that are very popular with scuba divers, including the SS America. The NPS Submerged Resources Center mapped the 10 most famous of the shipwrecks contained within the park, and published Shipwrecks of Isle Royale National Park; The Archeological Survey, which gives an overview of the maritime history of the area. The area’s notoriously harsh weather, dramatic underwater topography, the island’s central location on historic shipping routes, and the cold, fresh water have resulted in largely intact, well preserved wrecks throughout the park. In January 2019, the entire island chain was added to the National Register of Historic Places by the federal government. On the Register it is called 'the Minong Traditional Cultural Property.' The Survival of Angelique Mott In 1845, an Ojibwe woman named Angelique and her voyageur husband Charlie Mott were left on Isle Royale, as hires for Cyrus Mendenhall and the Lake Superior Copper Company. They were hired and carried to Isle Royale by Mendenhall's schooner, the "Algonquin", first to scout for copper. Angelique found a large mass of copper ore, upon which she and her husband were hired to stay and guard until a barge could come to retrieve it, promised in no more than 3 months' time. They were dropped off in July and were left stranded there until the following Spring. They were left with minimal provisions, which consisted of a half-barrel of flour, six pounds of butter, and some beans. A supply boat was promised to arrive after the first few weeks, but it was never sent out. Angelique and her husband were left to survive in the wilderness with limited supplies, on an island with scarce resources. They lost their canoe in a fall storm, and their fishing net was destroyed. By January 1846, Charlie went mad with hunger and even threatened to murder and eat Angelique. He returned to himself, loving and soft, but was weakening greatly, and eventually succumbed to his starvation, dying. Angelique was forced to leave the body in the cabin and created a brush shelter for herself to live in. She survived by eating poplar bark, bitter berries, and by pulling out her own hair, plaiting the strands, and creating snares with it, by which she caught rabbits on rare occasions. In the Spring of 1846, the Algonquin returned, and brought Angelique back to her mother. She died in 1874, in Sault Ste. Marie, Ontario. The full events were chronicled in a footnote as told by Angelique, in the first printing of a book called "The Honorable Peter White" by Ralph D. Williams in 1907; Angelique's story was pulled from the subsequent printing, thus making it the only written record survives.Humans haven't normally settled year-round on Isle Royale. For about three thousand years, Native Americans used the land for copper and fish. These native Americans usually limited their visiting to the island in the summer. Americans in the nineteenth century did the same thing. Natural history A number of habitats exist on the island, the primary being boreal forest, similar to neighboring Ontario and Minnesota. Upland areas along some of the ridges are effectively "balds" with exposed bedrock and a few scrubby trees, blueberry bushes, and hardy grasses. Occasional marshes exist, which are typically the by-product of beaver activities. There are also several lakes, often with wooded or marshy shores. The climate, especially in lowland areas, is heavily influenced by the cold waters of Lake Superior. Flora According to the A. W. Kuchler U.S. Potential natural vegetation Types, Isle Royale National Park has a Great Lakes Spruce/Fir (93) potential vegetation type and a Northern Conifer Forest (22) potential vegetation form. The predominant floral habitats of Isle Royale are within the Laurentian Mixed Forest Province. The area is a temperate broadleaf and mixed forests biome transition zone between the true boreal forest to the north and Big Woods to the south, with characteristics of each. It has areas of both broadleaf and conifer forest cover, and bodies of water ranging from conifer bogs to swamps. Conifers include jack pines (Pinus banksiana), black and white spruces (Picea mariana and Picea glauca), balsam firs (Abies balsamea), and eastern redcedars (Juniperus virginiana). Deciduous trees include quaking aspens (Populus tremuloides), red oaks (Quercus rubra), paper birches (Betula papyrifera), American mountain ash (Sorbus americana), red maples (Acer rubrum), sugar maples (Acer saccharum), and mountain maples (Acer spicatum). There are over 600 species of flowering plants found in Isle Royale National Park such as wild sarsaparilla, marsh-marigold, wood lily and prickly wild rose. Fauna Isle Royale National Park is known for its timber wolf and moose populations which are studied by scientists investigating predator-prey relationships in a closed environment. There is a cyclical relationship between the two animals: as the moose increase in population, so do the wolves. Eventually, the wolves kill too many moose and begin to starve and lower their reproductive rates. This is made easier because Isle Royale has been colonized by roughly just one third of the mainland mammal species, because it is so remote. In addition, the environment is unique in that it is the only known place where wolves and moose coexist without the presence of bears. Other common mammals are red foxes, beavers, and red squirrels. Some foxes are quite used to human contact, and can be seen prowling the campgrounds at dawn, looking for stray scraps left by unwary campers. For its part, the wolf is an elusive species which avoids human interaction. Few documented cases of direct wolf/human contact exist. Ermine have been periodically sighted around docks. Other mammals that can be seen include mink (along the various lake shores) and muskrats (occasionally at beaver ponds). Several species of bat also exist on the island. Reptiles include the eastern garter snake, painted turtle, and northern redbelly snake. Six species of frogs and three species of salamander also live on the island. Historically neither moose nor wolves inhabited Isle Royale. Just prior to becoming a national park the large mammals on Isle Royale were Canada lynx and the boreal woodland caribou. Archeological evidence indicates both of these species were present on Isle Royale for 3,500 years prior to being removed by direct human actions (hunting, trapping, mining, logging, fires, competition for resources from exotic species and possibly disease due to the introduction of invasive species). The last caribou documented on Isle Royale was in 1925. Though lynx were removed by the 1930s some have periodically crossed the ice bridge from neighboring Ontario, Canada, the most recent being an individual sighting in 1980. Although lynx are no longer present on the island, their primary prey, snowshoe hares, remain. Before the appearance of wolves, coyotes were also predators on the island. Coyotes appeared around 1905 and disappeared shortly after wolves arrived in the 1950s. Four wolves were brought from Minnesota in 2018. after some debate as to whether or not the introduction was an unnatural intervention. Moose are believed to have colonized Isle Royale sometime between 1905 and 1912. It was initially believed that a small herd of moose (moose typically do not travel in herds) colonized the islands by crossing the ice from the adjacent mainland; later this theory was modified to a herd of moose swimming 20 miles across Lake Superior from the nearest mainland. The improbability of these theories received little scrutiny until recent years. Although no thorough scientific investigation to determine how moose arrived on Isle Royale has been carried out to date, both cultural and genetic evidence indicates they were likely introduced by humans to create a private hunting preserve in the early 1900s. The cultural evidence that moose were trapped in northwestern Minnesota and transported to Isle Royale sounded far fetched to many until decades later when genetic evidence revealed the moose on Isle Royale were more closely related to moose in the far northwestern Minnesota/Manitoba border area than the mainland adjacent to Isle Royale in far northeastern Minnesota bordering Ontario. Further evidence has also shown that the Washington Harbor Club, a group of well-to-do businessmen, owned various buildings on Isle Royale in addition to railroads that ran from Baudette to Duluth and Two Harbors and so had the means to transport moose from northwestern Minnesota to Two Harbors. There are usually around 25 wolves and 1000 moose on the island, but the numbers change greatly year to year. In the 2006-2007 winter, 385 moose were counted, as well as 21 wolves, in three packs. In spring 2008, 23 wolves and approximately 650 moose were counted. However, recent reductions in winter pack ice had ended replenishment of the wolf population from the mainland. Due to genetic inbreeding, the wolf population had declined to two individuals in 2016, causing researchers to expect that the island's wolf population would eventually become extinct. At the same time, the island's moose population had exploded to an estimated 1600. By November 2017, the wolf population was down to one, a female. In December 2016, the National Park Service put forward an initial plan in which they would bring additional wolves to the island in order to prevent the pack from disappearing completely. The decision to relocate 20-30 wolves to the island was approved and from September 2018 to September 2019, 19 wolves were relocated to Isle Royale from various locations in Minnesota, Michigan, and Ontario. As of April 14, 2020, there were an estimated 14 wolves remaining on the island. Geology The island is composed largely of ridges, running roughly southwest-to-northeast. The main ridge, Greenstone Ridge, is over in many places. Greenstone belts are exposed, with rounded stones of chlorastrolite, also known as greenstone, near and in the lake. The two main rock assemblages found on the island include the Portage Lake Volcanics and the Copper Harbor Conglomerate, both Precambrian in age. The volcanics are mainly ophitic flood basalts, some 100 individual flows over an accumulated thickness of at least 10,000 feet. The conglomerate outcrops on the southwestern portion of the island and consists of sedimentary rock derived from volcanic rocks in present-day Minnesota. Glacial erosion accentuated the ridge and valley topography from pre-glacial stream erosion. Glacial striations indicate a generally westward movement of the glaciers as do the recessional moraines west of Lake Desor. Drumlins are found west of
91st Air Force Base (Zagreb - Pleso) Airspace Surveillance Centre, in Podvornica Sector Operational Centre, in Split Mount Sljeme Radar Post, with AN/FPS-117(E)1T Borinci Radar Post, with AN/FPS-117(E)1T Papuk Radar Post, with AN/FPS-117(E)1T Učka Radar Post, with AN/FPS-117(E)1T Mount Rota, with AN/FPS-117(E)1T Czech Republic The Czech Air Force's Control and Reporting Centre is located in Hlavenec and reports to CAOC Uedem. Air Force Command, in Prague 26th Air Command, Control and Surveillance Regiment, in Stará Boleslav 261st Control and Reporting Centre (CRC), in Hlavenec 262nd Radiotechnical Battalion, in Hlavenec 1st Radiotechnical Company, in Nepolisy, with RAT-31DL 4th Radiotechnical Company, in Sokolnice, with RAT-31DL 263nd Support Battalion, in Hlavenec Reserve Control and Reporting Centre, in Větrušice Denmark The Royal Danish Air Force's Combined Air Operations Centre (CAOC 1) in Finderup was deactivated in 2008 and replaced at the same location by the Combined Air Operations Centre Finderup (CAOC F), which had responsibility for the airspaces of Iceland, Norway, Denmark and the United Kingdom. CAOC F was deactivated in 2013 and its responsibilities were transferred to CAOC Uedem in Germany. The national Danish Control and Reporting Centre is located at Karup Air Base and it reports to CAOC Uedem. The Thule Air Base in Greenland is a United States Air Force installation and its radars are part of the North American Aerospace Defense Command. Air Force Tactical Command, at Karup Air Base Air Control Wing, at Karup Air Base Control and Reporting Centre, at Karup Air Base Radar Station Skagen, in Skagen, with RAT-31DL Radar Station Skrydstrup, at Skrydstrup Air Base, with AN/TPS-77 Radar Station Bornholm, in Almindingen, with Marconi S-723 Estonia The Estonian Air Force's Air Operations Control Centre is located at Ämari Air Base and reports to the Baltic Air Surveillance Network's Regional Airspace Surveillance Coordination Centre (RASCC) in Karmėlava, Lithuania, which in turn reports to CAOC Uedem. Air Force Command, in Tallinn Air Surveillance Wing, at Ämari Air Base Air Operations Control Centre, at Ämari Air Base Engineering and Technical Group, at Ämari Air Base Radar Station, in Levalõpme, with GM 403 Radar Station, in Otepää, with GM 403 Radar Station, in Kellavere, with AN/TPS-77(V) Airport Surveillance Radar at Ämari Air Base, with ASR-8 France The French Air and Space Force's Air Operations Centre is located at Mont Verdun Air Base and reports to CAOC Uedem. Most French radar sites use the PALMIER radar, which is being taken out of service. By 2022 all PALMIER radars will have been replaced with new radar stations using the GM 403 radar. Air Defense and Air Operations Command Air Operations Brigade, at Mont Verdun Air Base Air Operations Centre, at Mont Verdun Air Base Control and Reporting Centre, at Mont-de-Marsan Air Base Control and Reporting Centre, in Cinq-Mars-la-Pile Mont Verdun Air Base radar, with GM GM 406 Élément Air Rattaché (EAR) 943, on Mont Agel, with GM 406 Additionally the French Air and Space Force fields a GM 406 radar at the Cayenne-Rochambeau Air Base in French Guiana to protect the Guiana Space Centre in Kourou. Germany The German Air Force's Combined Air Operations Centre (CAOC 2) in Uedem was deactivated in 2008 and reactivated as CAOC Uedem in 2013. CAOC Uedem is responsible for the NATO airspace North of the Alps. The HADR radars are a variant of the HR-3000 radar, while the RRP-117 radars are a variant of the AN/FPS-117. Air Operations Centre (Zentrum Luftoperationen der Luftwaffe) (NATO CAOC Uedem), in Uedem Control and Reporting Centre 2 (Einsatzführungsbereich 2), in Erndtebrück Operations Squadron 21, in Erndtebrück Operations Support Squadron 22, in Erndtebrück Sensor Platoon I, in Lauda Remote Radar Post 240 "Loneship", in Erndtebrück with GM 406F Remote Radar Post 246 "Hardwheel", on Erbeskopf with HADR Remote Radar Post 247 "Batman", in Lauda with GM 406F Remote Radar Post 248 "Coldtrack", in Freising with GM 406F Remote Radar Post 249 "Sweet Apple", in Meßstetten with HADR Sensor Platoon II, in Auenhausen Remote Radar Post 241 "Crabtree", in Marienbaum with HADR Remote Radar Post 242 "Backwash", in Auenhausen with GM 406F Remote Radar Post 243 "Silver Cork", in Visselhövede with GM 406F Remote Radar Post 244 "Round up", in Brockzetel with HADR Remote Radar Post 245 "Bugle", in Brekendorf with GM 406F Control and Reporting Training Inspection 23, in Erndtebrück Education and Training Centre, in Erndtebrück Education, Test and Training Group, in Erndtebrück Control and Reporting Centre 3 (Einsatzführungsbereich 3), in Schönewalde Operations Squadron 31, in Schönewalde Operations Support Squadron 32, in Schönewalde Sensor Platoon III, in Cölpin Remote Radar Post 351 "Matchpoint", in Putgarten with RRP-117 Remote Radar Post 352 "Mindreader", in Cölpin with RRP-117 Remote Radar Post 353 "Teddy Bear", in Tempelhof with RRP-117 Remote Radar Post 356 "", in Elmenhorst with RRP-117 Sensor Platoon IV, in Regen Remote Radar Post 354 "Blackmoor", in Döbern with RRP-117 Remote Radar Post 355 "Royal Flash", in Gleina with RRP-117 Remote Radar Post 357 "", on Döbraberg with RRP-117 Remote Radar Post 358 "Snow Cap", on Großer Arber with RRP-117 Greece 1st Area Control Centre, inside Mount Chortiatis, with Marconi S-743D 2nd Area Control Centre, inside Mount Parnitha, with Marconi S-743D 9th Control and Warning Station Squadron, on Mount Pelion, with Marconi S-743D 10th Control and Warning Station Squadron, on Mount Chortiatis, with Marconi S-743D The Hellenic Air Force's Combined Air Operations Centre (CAOC 7) at Larissa Air Base was deactivated in 2013 and its responsibilities transferred to the CAOC Torrejón in Spain. The Hellenic Air Force fields two HR-3000, four AR-327 and six Marconi S-743D radar systems, however as of 2018 the air force is in the process of replacing some of its older systems with three RAT-31DL radars. Air Force Tactical Command, at Larissa Air Base Air Operations Centre, at Larissa Air Base 1st Area Control Centre, inside Mount Chortiatis 2nd Area Control Centre, inside Mount Parnitha 1st Control and Warning Station Squadron, in Didymoteicho, with AR-327 2nd Control and Warning Station Squadron, on Mount Ismaros, with HR-3000 3rd Control and Warning Station Squadron, on Mount Vitsi, with Marconi S-743D 4th Control and Warning Station Squadron, on Mount Elati, with RAT-31DL 5th Control and Warning Station Squadron, in Kissamos, with Marconi S-743D 6th Control and Warning Station Squadron, on Mykonos, with AR-327 7th Control and Warning Station Squadron, on Mount Mela, with AR-327 8th Control and Warning Station Squadron, on Lemnos, with AR-327 9th Control and Warning Station Squadron, on Mount Pelion, with Marconi S-743D 10th Control and Warning Station Squadron, on Mount Chortiatis, with Marconi S-743D 11th Control and Warning Station Squadron, in Ziros, with HR-3000 Hungary The Hungarian Air Force's Air Operations Centre is located in Veszprém and reports to CAOC Uedem. There are additional three radar companies with Soviet-era equipment subordinate to the 54th Radar Regiment "Veszprém", however it is unclear if they will remain in service once Hungary's newest radar at Medina reaches full operational capability. Air Force Command, in Budapest Air Operations Centre, in Veszprém 54th Radar Regiment "Veszprém", in Veszprém 1st Radar Data Centre, in Békéscsaba, with RAT-31DL 2nd Radar Data Centre, in Medina, with RAT-31DL 3rd Radar Data Centre, in Bánkút, with RAT-31DL Iceland The Iceland Air Defense System, which is part of the Icelandic Coast Guard, monitors Iceland's airspace. Air Defense is provided by fighter jets from NATO allies, which rotate units for the Icelandic Air Policing mission to Keflavik Air Base. The Iceland Air Defense System's Control and Reporting Centre is at Keflavik Air Base and reports to CAOC Uedem in Germany. Iceland Air Defense System, at Keflavik Air Base Control and Reporting Centre, at Keflavik Air Base H1 Radar Station, at Miðnesheiði, with AN/FPS-117(V)5 H2 Radar Station, on Mount Gunnolfsvík, with AN/FPS-117(V)5 H3 Radar Station, at Stokksnes, with AN/FPS-117(V)5 H4 Radar Station, on Mount Bolafjalli, with AN/FPS-117(V)5 Italy The Italian Air Force's Combined Air Operations Centre (CAOC 5) in Poggio Renatico was deactivated in 2013 and replaced with the Mobile Command and Control Regiment (RMCC) at Bari Air Base, while the Centre's responsibilities were transferred to the CAOC Torrejón in Spain. Air Operations Command (COA), in Poggio Renatico Air Operations Centre, in Poggio Renatico Integrated Missile Air-defense Regiment (Rep. DAMI), in Poggio Renatico 11th Integrated Missile Air-defense Squadron, in Poggio Renatico 22nd Air Force Radar Squadron (GrRAM), in Licola, with AN/FPS-117(V) 112th Remote Radar Station Flight, in Mortara, with RAT-31DL 113th Remote Radar Station Flight, in Lame di Concordia, with RAT-31DL 114th Remote Radar Station Flight, in Potenza Picena, with RAT-31DL 115th Remote Radar Station Flight, in Capo Mele, with RAT-31DL 121st Remote Radar Station Flight, in Poggio Ballone, with AN/FPS-117(V) 123rd Remote Radar Station Flight, in Capo Frasca, with AN/FPS-117(V) 131st Remote Radar Station Flight, in Jacotenente, with RAT-31DL 132nd Remote Radar Station Flight, in Capo Rizzuto, with RAT-31DL 133rd Remote Radar Station Flight, in San Giovanni Teatino, with AN/FPS-117(V) 134th Remote Radar Station Flight, in Lampedusa, with RAT-31DL 135th Remote Radar Station Flight, in Marsala, with RAT-31DL 136th Remote Radar Station Flight, in Otranto, with RAT-31DL 137th Remote Radar Station Flight, in Mezzogregorio, with RAT-31DL Latvia The Latvian Air Force's Air Operations Centre is located at Lielvārde Air Base and reports to the Baltic Air Surveillance Network's Regional Airspace Surveillance Coordination Centre (RASCC) in Karmėlava, Lithuania, which in turn reports to CAOC Uedem. Air Force Headquarters, at Lielvārde Air Base Air Surveillance Squadron, at Lielvārde Air Base Air Operations Centre, at Lielvārde Air Base 1st Radiotechnical (Radar) Post, at Lielvārde Air Base, with AN/TPS-77(V) 2nd Radiotechnical (Radar) Post, in Audriņi, with AN/TPS-77(V) 3rd Radiotechnical (Radar) Post, in Čalas, with AN/TPS-77(V) Mobile Radar Section, with TPS-77 MRR Lithuania The Lithuanian Air Force's Air Operations Control Centre is located in Karmėlava and reports to the Baltic Air Surveillance Network's Regional Airspace Surveillance Coordination Centre (RASCC) co-located in Karmėlava, which in turn reports to CAOC Uedem. Lithuanian Air Force Headquarters, in Kaunas Airspace Surveillance and Control Command, in Kaunas Airspace Control Centre, in Karmėlava 1st Radar Post, in Antaveršis 3rd Radar Post, in Degučiai 4th Radar Post, in Ceikiškės Luxembourg Luxembourg's airspace is monitored and guarded by the Belgian Air Component's Control and Reporting Centre at Beauvechain Air Base. Montenegro The Armed Forces of Montenegro do not possess a modern air defense radar and the country's airspace is monitored by Italian Air Force radar sites. The Armed Forces Air Surveillance and Reporting Centre is located at Podgorica Airport in Golubovci and reports to CAOC Torrejón in Spain. Netherlands The Royal Netherlands Air Force's Air Operations Centre is located at Nieuw-Milligen and reports to CAOC Uedem. The air force's main radars are being replaced with two modern SMART-L GB radars. Air Force Command, in The Hague Air Operations Control Station, in Nieuw-Milligen Control and Reporting Centre, in Nieuw-Milligen Radar Station South, in Nieuw-Milligen, with SMART-L GB Radar Station North, at Wier, with SMART-L GB Norway The Royal Norwegian Air Force's Combined Air Operations Centre (CAOC 3) in Reitan was deactivated in 2008 and its responsibilities were transferred to the Combined Air Operations Centre Finderup (CAOC F). After CAOC F was deactivated in 2013 the responsibility for the air defense of Norway was transferred to CAOC Uedem in Germany and the Royal Norwegian Air Force's Control and Reporting Centre in Sørreisa reports to it. Until 2016 the Royal Norwegian Air Force's radar installations were distributed between two CRCs. That year the CRC Mågerø was disbanded. In its place a wartime mobilization back-up CRC has been formed with a reduction in personnel from the around active 170 duty to about 50 air force home guardsmen. The SINDRE I radars are a variant of the HR-3000 radar, which is also used in the German HADR radars. The newer RAT-31SL/N radars are sometimes designated SINDRE II. Armed Forces Operational Headquarters, Reitan near Bodø Main Air Station 131 Air Wing, in Sørreisa Control and Reporting Centre Sørreisa Radar Station Njunis, with RAT-31SL/N Radar Station Senja, with RAT-31SL/N Radar Station Honningsvåg, with RAT-31SL/N Radar Station Vestvågøy, with SINDRE I Radar Station Vågsøy, with SINDRE I Radar Station Skykula, with SINDRE I Poland The Polish Armed Forces Operational Command's Air Operations Centre is located in the Warsaw-Pyry neighborhood and reports to CAOC Uedem. The 3rd Wrocław Radiotechnical Brigade is responsible for the operation of the Armed Forces radar equipment. As of 2021 the Polish Air Force possesses three NUR-12M and three RAT-31DL long-range radars making up BACKBONE system, which are listed below. Armed Forces Operational Command, in Warsaw Air Operations Centre - Air Component Command, in Warsaw-Pyry Mobile Air Operations Command Unit, in Babki 22nd Command and Control Centre, in Osówiec 32nd Command and Control Centre, at Kraków-Balice Air Base 1st Air Operations Coordination Centre, in Gdynia 2nd Air Operations Coordination Centre, in Kraków 4th Air Operations Coordination Centre, in Szczecin 3rd Wrocław Radiotechnical Brigade, in Wrocław 3rd Sandomierz Radiotechnical Battalion, in Sandomierz 110th Long Range Radiolocating Post, in Łabunie, with RAT-31DL 360th Long Range Radiolocating Post, in Brzoskwinia, with NUR-12M 8th Szczycień Radiotechnical Battalion, in Lipowiec 144th Long Range Radiolocating Post, in Roskosz, with NUR-12M 184th Long Range Radiolocating Post, in Szypliszki, with RAT-31DL 211th Long Range Radiolocating Post, in Chruściel, with RAT-31DL 31st Lower Silesian Radiotechnical Battalion, in Wrocław 170th Long Range Radiolocating Post, in Wronowice, with NUR-12M 34th Chojnice Radiotechnical Battalion, in Chojnice Portugal The Portuguese Air Force's Combined Air Operations Centre (CAOC 10) in Lisbon was deactivated in 2013 and its responsibilities were transferred to CAOC Torrejón in Spain. Air Command, in Lisbon Control and Reporting Centre, in Monsanto Radar Station 1, on Monte Fóia, with HR-3000
in the event of war. These forces included command & control (C2) systems, radar installations, and Surface-to-Air (SAM) missile units as well as interceptor aircraft. By 1972 NADGE was converted into NATINADS consisting of 84 radar sites and associated Control Reporting Centers (CRC) and in the 1980s the Airborne Early Warning / Ground Environment Integration Segment (AEGIS) upgraded the NATINADS with the possibility to integrate the AWACS radar picture and all of its information into its visual displays. (NOTE: This AEGIS is not to be confused with the U.S.Navy AEGIS, a shipboard fire control radar and weapons system.) AEGIS processed the information through Hughes H5118ME computers, which replaced the H3118M computers installed at NADGE sites in the late 1960s and early 1970s. NATINADS ability to handle data increased with faster clock rates. The H5118M computer had a staggering 1 megabyte of memory and could handle 1.2 million instructions per second while the former model had a memory of only 256 kilobytes and a clock speed of 150,000 instructions per seconds. NATINADS/AEGIS were complemented, in West Germany by the German Air Defence Ground Environment (GEADGE), an updated radar network adding the southern part of Germany to the European system and Coastal Radar Integration System (CRIS), adding data links from Danish coastal radars. In order to counter the hardware obsolescence, during the mid-1990s NATO started the AEGIS Site Emulator (ASE) program allowing the NATINADS/AEGIS sites to replace the proprietary hardware (the 5118ME computer and the various operator consoles IDM-2, HMD-22, IDM-80) with commercial-off-the-shelf (COTS) servers and workstations. In the first years 2000, the initial ASE capability was expanded with the possibility to run, thanks to the new hardware power, multiple site emulators on the same hardware, so the system was renamed into Multi-AEGIS Site Emulator (MASE). The NATO system designed to replace MASE in the near future is the Air Command and Control System (ACCS). Because of changing politics, NATO expanding and financial crises most European (NATO) countries are trying to cut defence budgets; as a direct result, many obsolete and outdated NATINADS facilities are phased out earlier. As of 2013, operational NATO radar sites in Europe are as follows: Allied Air Command Allied Air Command (AIRCOM) is the central command of all NATO air forces on the European continent. The command is based at Ramstein Air Base in Germany and has two subordinate commands in Germany and Spain. The Royal Canadian Air Force and United States Air Force fall under command of the Canadian/American North American Aerospace Defense Command. Allied Air Command, at Ramstein Air Base, Germany CAOC Torrejón, at Torrejón Air Base, Spain - responsible for the airspace South of the Alps Albania: Air Surveillance Centre, at Tirana International Airport Bulgaria: Air Sovereignty Operations Centre, in Sofia Croatia: Airspace Surveillance Centre, in Podvornica Greece: Air Operations Centre, at Larissa Air Base Italy: Air Operations Centre, in Poggio Renatico Montenegro: Air Surveillance and Reporting Centre, at Podgorica Airport Portugal: Control and Reporting Centre, in Monsanto Romania: Air Operations Center, in Bucharest Slovenia: Airspace Surveillance and Control Centre, in Brnik Spain: Air Operations Centre, in Torrejón Central Command and Control Group, at Torrejón Air Base Northern Command and Control Group, at Zaragoza Air Base Turkey: Control and Reporting Centre, in Ahlatlıbel CAOC Uedem, in Uedem, Germany - responsible for the airspace North of the Alps Baltic Air Surveillance Network - Regional Airspace Surveillance Coordination Centre, in Karmėlava Estonia: Air Operations Control Centre, at Ämari Air Base Latvia: Air Operations Centre, at Lielvārde Air Base Lithuania: Airspace Control Centre, in Karmėlava Belgium: Control and Reporting Centre, at Beauvechain Air Base Czech Republic: Control and Reporting Centre, in Hlavenec Denmark: Control and Reporting Centre, at Karup Air Base France: Control and Reporting Centre, at Mont Verdun Air Base Germany: Air Operations Centre, in Uedem Control and Reporting Centre 2, in Erndtebrück Control and Reporting Centre 3, in Schönewalde Hungary: Air Operations Centre, in Veszprém Iceland: Control and Reporting Centre, at Keflavik Air Base Luxembourg: airspace controlled by Belgium's Control and Reporting Centre, at Beauvechain Air Base Netherlands: Control and Reporting Centre, in Nieuw-Milligen Norway: Control and Reporting Centre, in Sørreisa Poland: Air Operations Centre, in Warsaw-Pyry 22nd Command and Control Centre, in Osówiec 32nd Command and Control Centre, in Balice Slovakia: Air Operations Centre, at Sliač Air Base United Kingdom: Control and Reporting Centre, at RAF Boulmer Radar stations Albania The Albanian Air Force operates Lockheed Martin AN/TPS-77 radars. Belgium The Belgian Air Component's Control and Reporting Centre was based at Glons, where also its main radar was located. The radar was deactivated in 2015 and the Centre moved to Beauvechain Air Base in 2020. The Belgian Control and Reporting Centre reports to CAOC Uedem in Germany and is also responsible for guarding the airspace of Luxembourg. At the new location the Control and Reporting Centre uses digital radar data of the civilian radars of Belgocontrol and the Marconi S-723 radar of the Air Component's Air Traffic Control Centre in Semmerzake. Bulgaria The Bulgarian Air Force's Air Sovereignty Operations Centre is located in Sofia and reports to CAOC Torrejón. The Bulgarian Air Force fields three control and surveillance zones, which operate obsolete Soviet-era radars. The Bulgarian Air Force intends to replace these radars with fewer, but more capable Western 3-D radars as soon as possible. The future locations of the new radars are as of 2018 unknown. Joint Forces Command, in Sofia Air Sovereignty Operational Center (ASOC), in Sofia Base Operative Center (part of 3rd Air Base), Graf Ignatievo Air Base, operational control of fighter aviation Command, Control and Surveillance Base, in Sofia 1st Control and Surveillance Zone, in Bozhurishte, Sofia Province 2nd Control and Surveillance Zone, in Trud, Plovdiv Province 3rd Control and Surveillance Zone, in Bratovo, Burgas Province Canada The Royal Canadian Air Force's control centres and radar stations are part of the Canadian/American North American Aerospace Defense Command. Croatia The Croatian Air Force and Air Defense's Airspace Surveillance Centre is headquartered in Podvornica and reports to CAOC Torrejón. Air Force and Air Defense Command Airspace Surveillance and Control Battalion, at 91st Air Force Base (Zagreb - Pleso) Airspace Surveillance Centre, in Podvornica Sector Operational Centre, in Split Mount Sljeme Radar Post, with AN/FPS-117(E)1T Borinci Radar Post, with AN/FPS-117(E)1T Papuk Radar Post, with AN/FPS-117(E)1T Učka Radar Post, with AN/FPS-117(E)1T Mount Rota, with AN/FPS-117(E)1T Czech Republic The Czech Air Force's Control and Reporting Centre is located in Hlavenec and reports to CAOC Uedem. Air Force Command, in Prague 26th Air Command, Control and Surveillance Regiment, in Stará Boleslav 261st Control and Reporting Centre (CRC), in Hlavenec 262nd Radiotechnical Battalion, in Hlavenec 1st Radiotechnical Company, in Nepolisy, with RAT-31DL 4th Radiotechnical Company, in Sokolnice, with RAT-31DL 263nd Support Battalion, in Hlavenec Reserve Control and Reporting Centre, in Větrušice Denmark The Royal Danish Air Force's Combined Air Operations Centre (CAOC 1) in Finderup was deactivated in 2008 and replaced at the same location by the Combined Air Operations Centre Finderup (CAOC F), which had responsibility for the airspaces of Iceland, Norway, Denmark and the United Kingdom. CAOC F was deactivated in 2013 and its responsibilities were transferred to CAOC Uedem in Germany. The national Danish Control and Reporting Centre is located at Karup Air Base and it reports to CAOC Uedem. The Thule Air Base in Greenland is a United States Air Force installation and its radars are part of the North American Aerospace Defense Command. Air Force Tactical Command, at Karup Air Base Air Control Wing, at Karup Air Base Control and Reporting Centre, at Karup Air Base Radar Station Skagen, in Skagen, with RAT-31DL Radar Station Skrydstrup, at Skrydstrup Air Base, with AN/TPS-77 Radar Station Bornholm, in Almindingen, with Marconi S-723 Estonia The Estonian Air Force's Air Operations Control Centre is located at Ämari Air Base and reports to the Baltic Air Surveillance Network's Regional Airspace Surveillance Coordination Centre (RASCC) in Karmėlava, Lithuania, which in turn reports to CAOC Uedem. Air Force Command, in Tallinn Air Surveillance Wing, at Ämari Air Base Air Operations Control Centre, at Ämari Air Base Engineering and Technical Group, at Ämari Air Base Radar Station, in Levalõpme, with GM 403 Radar Station, in Otepää, with GM 403 Radar Station, in Kellavere, with AN/TPS-77(V) Airport Surveillance Radar at Ämari Air Base, with ASR-8 France The French Air and Space Force's Air Operations Centre is located at Mont Verdun Air Base and reports to CAOC Uedem. Most French radar sites use the PALMIER radar, which is being taken out of service. By 2022 all PALMIER radars will have been replaced with new radar stations using the GM 403 radar. Air Defense and Air Operations Command Air Operations Brigade, at Mont Verdun Air Base Air Operations Centre, at Mont Verdun Air Base Control and Reporting Centre, at Mont-de-Marsan Air Base Control and Reporting Centre, in Cinq-Mars-la-Pile Mont Verdun Air Base radar, with GM GM 406 Élément Air Rattaché (EAR) 943, on Mont Agel, with GM 406 Additionally the French Air and Space Force fields a GM 406 radar at the Cayenne-Rochambeau Air Base in French Guiana to protect the Guiana Space Centre in Kourou. Germany The German Air Force's Combined Air Operations Centre (CAOC 2) in Uedem was deactivated in 2008 and reactivated as CAOC Uedem in 2013. CAOC Uedem is responsible for the NATO airspace North of the Alps. The HADR radars are a variant of the HR-3000 radar, while the RRP-117 radars are a variant of the AN/FPS-117. Air Operations Centre (Zentrum Luftoperationen der Luftwaffe) (NATO CAOC Uedem), in Uedem Control and Reporting Centre 2 (Einsatzführungsbereich 2), in Erndtebrück Operations Squadron 21, in Erndtebrück Operations Support Squadron 22, in Erndtebrück Sensor Platoon I, in Lauda Remote Radar Post 240 "Loneship", in Erndtebrück with GM 406F Remote Radar Post 246 "Hardwheel", on Erbeskopf with HADR Remote Radar Post 247 "Batman", in Lauda with GM 406F Remote Radar Post 248 "Coldtrack", in Freising with GM 406F Remote Radar Post 249 "Sweet Apple", in Meßstetten with HADR Sensor Platoon II, in Auenhausen Remote Radar Post 241 "Crabtree", in Marienbaum with HADR Remote Radar Post 242 "Backwash", in Auenhausen with GM 406F Remote Radar Post 243 "Silver Cork", in Visselhövede with GM 406F Remote Radar Post 244 "Round up", in Brockzetel with HADR Remote Radar Post 245 "Bugle", in Brekendorf with GM 406F Control and Reporting Training Inspection 23, in Erndtebrück Education and Training Centre, in Erndtebrück Education, Test and Training Group, in Erndtebrück Control and Reporting Centre 3 (Einsatzführungsbereich 3), in Schönewalde Operations Squadron 31, in Schönewalde Operations Support Squadron 32, in Schönewalde Sensor Platoon III, in Cölpin Remote Radar Post 351 "Matchpoint", in Putgarten with RRP-117 Remote Radar Post 352 "Mindreader", in Cölpin with RRP-117 Remote Radar Post 353 "Teddy Bear", in Tempelhof with RRP-117 Remote Radar Post 356 "", in Elmenhorst with RRP-117 Sensor Platoon IV, in Regen Remote Radar Post 354 "Blackmoor", in Döbern with RRP-117 Remote Radar Post 355 "Royal Flash", in Gleina with RRP-117 Remote Radar Post 357 "", on Döbraberg with RRP-117 Remote Radar Post 358 "Snow Cap", on Großer Arber with RRP-117 Greece 1st Area Control Centre, inside Mount Chortiatis, with Marconi S-743D 2nd Area Control Centre, inside Mount Parnitha, with Marconi S-743D 9th Control and Warning Station Squadron, on Mount Pelion, with Marconi S-743D 10th Control and Warning Station Squadron, on Mount Chortiatis, with Marconi S-743D The Hellenic Air Force's Combined Air Operations Centre (CAOC 7) at Larissa Air Base was deactivated in 2013 and its responsibilities transferred to the CAOC Torrejón in Spain. The Hellenic Air Force fields two HR-3000, four AR-327 and six Marconi S-743D radar systems, however as of 2018 the air force is in the process of replacing some of its older systems with three RAT-31DL radars. Air Force Tactical Command, at Larissa Air Base Air Operations Centre, at Larissa Air Base 1st Area Control Centre, inside Mount Chortiatis 2nd Area Control Centre, inside Mount Parnitha 1st Control and Warning Station Squadron, in Didymoteicho, with AR-327 2nd Control and Warning Station Squadron, on Mount Ismaros, with HR-3000 3rd Control and Warning Station Squadron, on Mount Vitsi, with Marconi S-743D 4th Control and Warning Station Squadron, on Mount Elati, with RAT-31DL 5th Control and Warning Station Squadron, in Kissamos, with Marconi S-743D 6th Control and Warning Station Squadron, on Mykonos, with AR-327 7th Control and Warning Station Squadron, on Mount Mela, with AR-327 8th Control and Warning Station Squadron, on Lemnos, with AR-327 9th Control and Warning Station Squadron, on Mount Pelion, with Marconi S-743D 10th Control and Warning Station Squadron, on Mount Chortiatis, with Marconi S-743D 11th Control and Warning Station Squadron, in Ziros, with HR-3000 Hungary The Hungarian Air Force's Air Operations Centre is located in
are also included in this category, as are license fees paid for the use of patents and trademarks. Government transfers may involve loans made or official aid given to foreign countries, while transfers made by NGO's include money designated for charitable work within foreign countries, respectively. Balance of payments and invisibles In many countries a useful distinction is drawn between the balance of trade and the balance of payments. 'Balance of trade' refers to the trade of both tangible (physical) objects as well as the trade in services – collectively known as exports and imports (in other words, 'visibles plus services') – while the 'balance of payments' also includes transfers of Capital in the form of loans, investments in shares or direct investment in projects. A nation may have a visibles balance surplus but this can be offset by a larger deficit in the invisibles balance (creating a Balance of Trade deficit overall) – if, for example, there are large payments made to foreign businesses for invisibles such as shipping or tourism. On the other hand, a Visibles Balance deficit can be offset by a strong surplus on the invisibles balance if, for example, foreign aid is being provided. In a similar way, a nation may also have a surplus 'balance of trade' because it exports more than it imports but a negative (or deficit) 'balance of payments' because, it has a much greater shortfall in transfers of capital. And, just as easily, a deficit in the 'balance of trade' may be offset by a larger surplus in capital transfers from overseas to produce a balance of payments surplus overall. Balance of payments problems and the invisible balance Problems with a country's balance of trade (or
associated with an inappropriate valuation of its currency, its country's foreign exchange rate. If a country's exchange rate is too high, its exports will become uncompetitive as buyers in foreign countries require more of their own currency to pay for them. In the meantime, it also becomes cheaper for the citizens of the country to buy goods from overseas, as opposed to buying locally produced goods), because an overvalued currency makes foreign products less expensive. The simultaneous decline in currency inflows from decreased exports and the rise in outflows, due to increased imports, sends the balance of trade into deficit, which then needs to be paid for by a transfer of funds in some form, either invisible transfers (aid, etc.) or capital flows (loans, etc.). However, relying on funds like that to support a trade deficit, is unsustainable, and the country may eventually require its currency to be devalued. If, on the other hand, a currency is undervalued, its exports will become cheaper and therefore more competitive internationally. At the same time, imports will also become more costly, stimulating the production of domestic substitutes to replace them. That will result in a growth of currency flowing into the country and a decline in currency flowing out of it, resulting in an improvement in the country's balance of trade. Because a nation's exchange rate has a big impact on its 'balance of trade' and its 'balance of payments', many economists favour freely floating exchange rates over the older, fixed
was impossible, "awed by the adaptations of living things, to be stunned by their complexity and suitability", was "to accept the inescapable but not humiliating fact that much of mankind can be seen in a tree or a lizard." In 1981, Ariel Roth, in defense of the creation-science position in the trial McLean v. Arkansas, said of "complex integrated structures": "This system would not be functional until all the parts were there ... How did these parts survive during evolution ...?" In 1985 Cairns-Smith wrote of "interlocking": "How can a complex collaboration between components evolve in small steps?" and used the analogy of the scaffolding called centering - used to build an arch then removed afterwards: "Surely there was 'scaffolding'. Before the multitudinous components of present biochemistry could come to lean together they had to lean on something else." However, neither Muller or Cairns-Smith claimed their ideas as evidence of something supernatural. An essay in support of creationism published in 1994 referred to bacterial flagella as showing "multiple, integrated components", where "nothing about them works unless every one of their complexly fashioned and integrated components are in place". The author asked the reader to "imagine the effects of natural selection on those organisms that fortuitously evolved the flagella ... without the concommitant control mechanisms". An early concept of irreducibly complex systems comes from Ludwig von Bertalanffy (1901-1972), an Austrian biologist. He believed that complex systems must be examined as complete, irreducible systems in order to fully understand how they work. He extended his work on biological complexity into a general theory of systems in a book titled General Systems Theory. After James Watson and Francis Crick published the structure of DNA in the early 1950s, General Systems Theory lost many of its adherents in the physical and biological sciences. However, systems theory remained popular in the social sciences long after its demise in the physical and biological sciences. Origins Michael Behe developed his ideas on the concept around 1992, in the early days of the 'wedge movement', and first presented his ideas about "irreducible complexity" in June 1993 when the "Johnson-Behe cadre of scholars" met at Pajaro Dunes in California. He set out his ideas in the second edition of Of Pandas and People published in 1993, extensively revising Chapter 6 Biochemical Similarities with new sections on the complex mechanism of blood clotting and on the origin of proteins. He first used the term "irreducible complexity" in his 1996 book Darwin's Black Box, to refer to certain complex biochemical cellular systems. He posits that evolutionary mechanisms cannot explain the development of such "irreducibly complex" systems. Notably, Behe credits philosopher William Paley for the original concept (alone among the predecessors) and suggests that his application of the concept to biological systems is entirely original. Intelligent design advocates argue that irreducibly complex systems must have been deliberately engineered by some form of intelligence. In 2001, Michael Behe wrote: "[T]here is an asymmetry between my current definition of irreducible complexity and the task facing natural selection. I hope to repair this defect in future work." Behe specifically explained that the "current definition puts the focus on removing a part from an already functioning system", but the "difficult task facing Darwinian evolution, however, would not be to remove parts from sophisticated pre-existing systems; it would be to bring together components to make a new system in the first place". In the 2005 Kitzmiller v. Dover Area School District trial, Behe testified under oath that he "did not judge [the asymmetry] serious enough to [have revised the book] yet." Behe additionally testified that the presence of irreducible complexity in organisms would not rule out the involvement of evolutionary mechanisms in the development of organic life. He further testified that he knew of no earlier "peer reviewed articles in scientific journals discussing the intelligent design of the blood clotting cascade," but that there were "probably a large number of peer reviewed articles in science journals that demonstrate that the blood clotting system is indeed a purposeful arrangement of parts of great complexity and sophistication." (The judge ruled that "intelligent design is not science and is essentially religious in nature".) According to the theory of evolution, genetic variations occur without specific design or intent. The environment "selects" the variants that have the highest fitness, which are then passed on to the next generation of organisms. Change occurs by the gradual operation of natural forces over time, perhaps slowly, perhaps more quickly (see punctuated equilibrium). This process is able to adapt complex structures from simpler beginnings, or convert complex structures from one function to another (see spandrel). Most intelligent design advocates accept that evolution occurs through mutation and natural selection at the "micro level", such as changing the relative frequency of various beak lengths in finches, but assert that it cannot account for irreducible complexity, because none of the parts of an irreducible system would be functional or advantageous until the entire system is in place. The mousetrap example Behe uses the mousetrap as an illustrative example of this concept. A mousetrap consists of five interacting pieces: the base, the catch, the spring, the hammer, and the hold-down bar. All of these must be in place for the mousetrap to work, as the removal of any one piece destroys the function of the mousetrap. Likewise, he asserts that biological systems require multiple parts working together in order to function. Intelligent design advocates claim that natural selection could not create from scratch those systems for which science is currently unable to find a viable evolutionary pathway of successive, slight modifications, because the selectable function is only present when all parts are assembled. In his 2008 book Only A Theory, biologist Kenneth R. Miller challenges Behe's claim that the mousetrap is irreducibly complex. Miller observes that various subsets of the five components can be devised to form cooperative units, ones that have different functions from the mousetrap and so, in biological terms, could form functional spandrels before being adapted to the new function of catching mice. In an example taken from his high school experience, Miller recalls that one of his classmates...struck upon the brilliant idea of using an old, broken mousetrap as a spitball catapult, and it worked brilliantly.... It had worked perfectly as something other than a mousetrap.... my rowdy friend had pulled a couple of parts --probably the hold-down bar and catch-- off the trap to make it easier to conceal and more effective as a catapult... [leaving] the base, the spring, and the hammer. Not much of a mousetrap, but a helluva spitball launcher.... I realized why [Behe's] mousetrap analogy had bothered me. It was wrong. The mousetrap is not irreducibly complex after all. Other systems identified by Miller that include mousetrap components include the following: use the spitball launcher as a tie clip (same three-part system with different function) remove the spring from the spitball launcher/tie clip to create a two-part key chain (base + hammer) glue the spitball launcher/tie clip to a sheet of wood to create a clipboard (launcher + glue + wood) remove the hold-down bar for use as a toothpick (single element system) The point of the reduction is that—in biology—most or all of the components were already at hand, by the time it became necessary to build a mousetrap. As such, it required far fewer steps to develop a mousetrap than to design all the components from scratch. Thus, the development of the mousetrap, said to consist of five different parts which had no function on their own, has been reduced to one step: the assembly from parts that are already present, performing other functions. Consequences Supporters of intelligent design argue that anything less than the complete form of such a system or organ would not work at all, or would in fact be a detriment to the organism, and would therefore never survive the process of natural selection. Although they accept that some complex systems and organs can be explained by evolution, they claim that organs and biological features which are irreducibly complex cannot be explained by current models, and that an intelligent designer must have created life or guided its evolution. Accordingly, the debate on irreducible complexity concerns two questions: whether irreducible complexity can be found in nature, and what significance it would have if it did exist in nature. Behe's original examples of irreducibly complex mechanisms included the bacterial flagellum of E. coli, the blood clotting cascade, cilia, and the adaptive immune system. Behe argues that organs and biological features which are irreducibly complex cannot be wholly explained by current models of evolution. In explicating his definition of "irreducible complexity" he notes that: An irreducibly complex system cannot be produced directly (that is, by continuously improving the initial function, which continues to work by the same mechanism) by slight, successive modifications of a precursor system, because any precursor to an irreducibly complex system that is missing a part is by definition nonfunctional. Irreducible complexity is not an argument that evolution does not occur, but rather an argument that it is "incomplete". In the last chapter of Darwin's Black Box, Behe goes on to explain his view that irreducible complexity is evidence for intelligent design. Mainstream critics, however, argue that irreducible complexity, as defined by Behe, can be generated by known evolutionary mechanisms. Behe's claim that no scientific literature adequately modeled the origins of biochemical systems through evolutionary mechanisms has been challenged by TalkOrigins. The judge in the Dover trial wrote "By defining irreducible complexity in the way that he has, Professor Behe attempts to exclude the phenomenon of exaptation by definitional fiat, ignoring as he does so abundant evidence which refutes his argument. Notably, the NAS has rejected Professor Behe's claim for irreducible complexity..." Stated examples Behe and others have suggested a number of biological features that they believed to be irreducibly complex. Blood clotting cascade The process of blood clotting or coagulation cascade in vertebrates is a complex biological pathway which is given as an example of apparent irreducible complexity. The irreducible complexity argument assumes that the necessary parts of a system have always been necessary, and therefore could not have been added sequentially. However, in evolution, something which is at first merely advantageous can later become necessary. Natural selection can lead to complex biochemical systems being built up from simpler systems, or to existing functional systems being recombined as a new system with a different function. For example, one of the clotting factors that Behe listed as a part of the clotting cascade (Factor XII, also called Hageman factor) was later found to be absent in whales, demonstrating that it is not essential for a clotting system. Many purportedly irreducible structures can be found in other organisms as much simpler systems that utilize fewer parts. These systems, in turn, may have had even simpler precursors that are now extinct. Behe has responded to critics of his clotting cascade arguments by suggesting that homology is evidence for evolution, but not for natural selection. The "improbability argument" also misrepresents natural selection. It is correct to say that a set of simultaneous mutations that form a complex protein structure is so unlikely as to be unfeasible, but that is not what Darwin advocated. His explanation is based on small accumulated changes that take place without a final goal. Each step must be advantageous in its own right, although biologists may not yet understand the reason behind all of them—for example, jawless fish accomplish blood clotting with just six proteins instead of the full ten. Eye The eye is frequently cited by intelligent design and creationism advocates as a purported example of irreducible complexity. Behe used the "development of the eye problem" as evidence for intelligent design in Darwin's Black Box. Although Behe acknowledged that the evolution of the larger anatomical features of the eye have been well-explained, he pointed out that the complexity of the minute biochemical reactions required at a molecular level for light sensitivity still defies explanation. Creationist Jonathan Sarfati has described the eye as evolutionary biologists' "greatest challenge as an example of superb 'irreducible complexity' in God's creation", specifically pointing to the supposed "vast complexity" required for transparency. In an often misquoted passage from On the Origin of Species, Charles Darwin appears to acknowledge the eye's development as a difficulty for his theory. However, the quote in context shows that Darwin actually had a very good understanding of the evolution of the eye (see fallacy of quoting out of context). He notes that "to suppose that the eye ... could have been formed by natural selection, seems, I freely confess, absurd in the highest possible degree". Yet this observation was merely a rhetorical device for Darwin. He goes on to explain that if gradual evolution of the eye could be shown to be possible, "the difficulty of believing that a perfect and complex eye could be formed by natural selection ... can hardly be considered real". He then proceeded to roughly map out a likely course for evolution using examples of gradually more complex eyes of various species. Since Darwin's day, the eye's ancestry has become much better understood. Although learning about the construction of ancient eyes through fossil evidence is problematic due to the soft tissues leaving no imprint or remains, genetic and comparative anatomical evidence has increasingly supported the idea of a common ancestry for all eyes. Current evidence does suggest possible evolutionary lineages for the origins of the anatomical features of the eye. One likely chain of development is that the eyes originated as simple patches of photoreceptor cells that could detect the presence or absence of light, but not its direction. When, via random mutation across the population, the photosensitive cells happened to have developed on a small depression, it endowed the organism with a better sense of the light's source. This small change gave the organism an advantage over those without the mutation. This genetic trait would then be "selected for" as those with the trait would have an increased chance of survival, and therefore progeny, over those without the trait. Individuals with deeper depressions would be able to discern changes in light over a wider field than those individuals with shallower depressions. As ever deeper depressions were advantageous to the organism, gradually, this depression would become a pit into which light would strike certain cells depending on its angle. The organism slowly gained increasingly precise visual information. And again, this gradual process continued as individuals having a slightly shrunken aperture of the eye had an advantage over those without the mutation as an aperture increases how collimated the light is at any one specific group of photoreceptors. As this trait developed, the eye became effectively a pinhole camera which allowed the organism to dimly make out shapes—the nautilus is a modern example of an animal with such an eye. Finally, via this same selection process, a protective layer of transparent cells over the aperture was differentiated into a crude lens, and the interior of the eye was filled with humours to assist in focusing images. In this way, eyes are recognized by modern biologists as actually a relatively unambiguous and simple structure to evolve, and many of the major developments of the eye's evolution are believed to have taken place over only a few million years, during the Cambrian explosion. Behe asserts that this is only an explanation of the gross anatomical steps, however, and not an explanation of the changes in discrete biochemical systems that would have needed to take place. Behe maintains that the complexity of light sensitivity at the molecular level and the minute biochemical reactions required for those first "simple patches of photoreceptor[s]" still defies explanation, and that the proposed series of infinitesimal steps to get from patches of photoreceptors to a fully functional eye would actually be considered great, complex leaps in evolution if viewed on the molecular scale. Other intelligent design proponents claim that the evolution of the entire visual system would be difficult rather than the eye alone. Flagella The flagella of certain bacteria constitute a molecular motor requiring the interaction of about 40 different protein parts. Behe presents this as a prime example of an irreducibly complex structure defined as "a single system composed of several well-matched, interacting parts that contribute to the basic function, wherein the removal of any one of the parts causes the system to effectively cease functioning", and argues that since "an irreducibly complex system that is missing a part is by definition nonfunctional", it could not have evolved gradually through natural selection. Reducible complexity. In contrast to Behe's claims, many proteins can be deleted or mutated and the flagellum still works, even though sometimes at reduced efficiency. In fact, the composition of flagella is surprisingly diverse across bacteria with many proteins only found in some species but not others. Hence the flagellar apparatus is clearly very flexible in evolutionary terms and perfectly able to lose or gain protein components. Further studies have shown that, contrary to claims of "irreducible complexity", flagella and the type-III secretion system share several components which provides strong evidence of a shared evolutionary history (see below). In fact, this example shows how a complex system can evolve from simpler components. Multiple processes were involved in the evolution of the flagellum, including horizontal gene transfer. Evolution from type three secretion systems. The basal body of the flagella has been found to be similar to the Type III secretion system (TTSS), a needle-like structure that pathogenic germs such as Salmonella and Yersinia pestis use to inject toxins into living eucaryote cells. The needle's base has ten elements in common with the flagellum, but it is missing forty of the proteins that make a flagellum work. The TTSS system negates Behe's claim that taking away any one of the flagellum's parts would prevent the system from functioning. On this basis, Kenneth Miller notes that, "The parts of this supposedly irreducibly complex system actually have functions of their own." Studies have also shown that similar parts of the flagellum in different bacterial species can have different functions despite showing evidence of common descent, and that certain parts of the flagellum can be removed without completely eliminating its functionality. Dembski has argued that phylogenetically, the TTSS is found in a narrow range of bacteria which makes it seem to him to be a late innovation, whereas flagella are widespread throughout many bacterial groups, and he argues that it was an early innovation. Against Dembski's argument, different flagella use completely different mechanisms, and publications show a plausible path in which bacterial flagella could have evolved from a secretion system. Cilium motion The cilium construction of axoneme microtubules movement by the sliding of dynein protein was cited by Behe as an example of irreducible complexity. He further said that the advances in knowledge in the subsequent 10 years had shown that the complexity of intraflagellar transport for two hundred components cilium and many other cellular structures is substantially greater than was known earlier. Bombardier beetle's defense mechanism The bombardier beetle is able to defend itself by directing a spray of hot fluid at an attacker. The mechanism involves a system for mixing hydroquinones and hydrogen peroxide, which react violently to attain a temperature near boiling point, and in some species a nozzle which allows the spray to be directed accurately in any direction. The unique combination of features of the bombardier beetle's defense mechanism—strongly exothermic reactions, boiling-hot fluids, and explosive release—have been claimed by creationists and proponents of intelligent design to be examples of irreducible complexity. Biologists such as the taxonomist Mark Isaak note however that step-by-step evolution of the mechanism could readily have occurred. In particular, quinones are precursors to sclerotin, used to harden the skeleton of many insects, while peroxide is a common by-product of metabolism. Response of the scientific community Like intelligent design, the concept it seeks to support, irreducible complexity has failed to gain any notable acceptance within the scientific community. Reducibility of "irreducible" systems Researchers have proposed potentially viable evolutionary pathways for allegedly irreducibly complex systems such as blood clotting, the immune system and the flagellum—the three examples Behe proposed. John H. McDonald even showed his example of a mousetrap to be reducible. If irreducible complexity is an insurmountable obstacle to evolution, it should not be possible to conceive of such pathways. Niall Shanks and Karl H. Joplin, both of East Tennessee State University, have shown that systems satisfying Behe's characterization of irreducible biochemical complexity can arise naturally and spontaneously as the result of self-organizing chemical processes. They also assert that what evolved biochemical and molecular systems actually exhibit is "redundant complexity"—a kind of complexity that is the product of an evolved biochemical process. They claim that Behe overestimated the significance of irreducible complexity because of his simple, linear view of biochemical reactions,
by their complexity and suitability", was "to accept the inescapable but not humiliating fact that much of mankind can be seen in a tree or a lizard." In 1981, Ariel Roth, in defense of the creation-science position in the trial McLean v. Arkansas, said of "complex integrated structures": "This system would not be functional until all the parts were there ... How did these parts survive during evolution ...?" In 1985 Cairns-Smith wrote of "interlocking": "How can a complex collaboration between components evolve in small steps?" and used the analogy of the scaffolding called centering - used to build an arch then removed afterwards: "Surely there was 'scaffolding'. Before the multitudinous components of present biochemistry could come to lean together they had to lean on something else." However, neither Muller or Cairns-Smith claimed their ideas as evidence of something supernatural. An essay in support of creationism published in 1994 referred to bacterial flagella as showing "multiple, integrated components", where "nothing about them works unless every one of their complexly fashioned and integrated components are in place". The author asked the reader to "imagine the effects of natural selection on those organisms that fortuitously evolved the flagella ... without the concommitant control mechanisms". An early concept of irreducibly complex systems comes from Ludwig von Bertalanffy (1901-1972), an Austrian biologist. He believed that complex systems must be examined as complete, irreducible systems in order to fully understand how they work. He extended his work on biological complexity into a general theory of systems in a book titled General Systems Theory. After James Watson and Francis Crick published the structure of DNA in the early 1950s, General Systems Theory lost many of its adherents in the physical and biological sciences. However, systems theory remained popular in the social sciences long after its demise in the physical and biological sciences. Origins Michael Behe developed his ideas on the concept around 1992, in the early days of the 'wedge movement', and first presented his ideas about "irreducible complexity" in June 1993 when the "Johnson-Behe cadre of scholars" met at Pajaro Dunes in California. He set out his ideas in the second edition of Of Pandas and People published in 1993, extensively revising Chapter 6 Biochemical Similarities with new sections on the complex mechanism of blood clotting and on the origin of proteins. He first used the term "irreducible complexity" in his 1996 book Darwin's Black Box, to refer to certain complex biochemical cellular systems. He posits that evolutionary mechanisms cannot explain the development of such "irreducibly complex" systems. Notably, Behe credits philosopher William Paley for the original concept (alone among the predecessors) and suggests that his application of the concept to biological systems is entirely original. Intelligent design advocates argue that irreducibly complex systems must have been deliberately engineered by some form of intelligence. In 2001, Michael Behe wrote: "[T]here is an asymmetry between my current definition of irreducible complexity and the task facing natural selection. I hope to repair this defect in future work." Behe specifically explained that the "current definition puts the focus on removing a part from an already functioning system", but the "difficult task facing Darwinian evolution, however, would not be to remove parts from sophisticated pre-existing systems; it would be to bring together components to make a new system in the first place". In the 2005 Kitzmiller v. Dover Area School District trial, Behe testified under oath that he "did not judge [the asymmetry] serious enough to [have revised the book] yet." Behe additionally testified that the presence of irreducible complexity in organisms would not rule out the involvement of evolutionary mechanisms in the development of organic life. He further testified that he knew of no earlier "peer reviewed articles in scientific journals discussing the intelligent design of the blood clotting cascade," but that there were "probably a large number of peer reviewed articles in science journals that demonstrate that the blood clotting system is indeed a purposeful arrangement of parts of great complexity and sophistication." (The judge ruled that "intelligent design is not science and is essentially religious in nature".) According to the theory of evolution, genetic variations occur without specific design or intent. The environment "selects" the variants that have the highest fitness, which are then passed on to the next generation of organisms. Change occurs by the gradual operation of natural forces over time, perhaps slowly, perhaps more quickly (see punctuated equilibrium). This process is able to adapt complex structures from simpler beginnings, or convert complex structures from one function to another (see spandrel). Most intelligent design advocates accept that evolution occurs through mutation and natural selection at the "micro level", such as changing the relative frequency of various beak lengths in finches, but assert that it cannot account for irreducible complexity, because none of the parts of an irreducible system would be functional or advantageous until the entire system is in place. The mousetrap example Behe uses the mousetrap as an illustrative example of this concept. A mousetrap consists of five interacting pieces: the base, the catch, the spring, the hammer, and the hold-down bar. All of these must be in place for the mousetrap to work, as the removal of any one piece destroys the function of the mousetrap. Likewise, he asserts that biological systems require multiple parts working together in order to function. Intelligent design advocates claim that natural selection could not create from scratch those systems for which science is currently unable to find a viable evolutionary pathway of successive, slight modifications, because the selectable function is only present when all parts are assembled. In his 2008 book Only A Theory, biologist Kenneth R. Miller challenges Behe's claim that the mousetrap is irreducibly complex. Miller observes that various subsets of the five components can be devised to form cooperative units, ones that have different functions from the mousetrap and so, in biological terms, could form functional spandrels before being adapted to the new function of catching mice. In an example taken from his high school experience, Miller recalls that one of his classmates...struck upon the brilliant idea of using an old, broken mousetrap as a spitball catapult, and it worked brilliantly.... It had worked perfectly as something other than a mousetrap.... my rowdy friend had pulled a couple of parts --probably the hold-down bar and catch-- off the trap to make it easier to conceal and more effective as a catapult... [leaving] the base, the spring, and the hammer. Not much of a mousetrap, but a helluva spitball launcher.... I realized why [Behe's] mousetrap analogy had bothered me. It was wrong. The mousetrap is not irreducibly complex after all. Other systems identified by Miller that include mousetrap components include the following: use the spitball launcher as a tie clip (same three-part system with different function) remove the spring from the spitball launcher/tie clip to create a two-part key chain (base + hammer) glue the spitball launcher/tie clip to a sheet of wood to create a clipboard (launcher + glue + wood) remove the hold-down bar for use as a toothpick (single element system) The point of the reduction is that—in biology—most or all of the components were already at hand, by the time it became necessary to build a mousetrap. As such, it required far fewer steps to develop a mousetrap than to design all the components from scratch. Thus, the development of the mousetrap, said to consist of five different parts which had no function on their own, has been reduced to one step: the assembly from parts that are already present, performing other functions. Consequences Supporters of intelligent design argue that anything less than the complete form of such a system or organ would not work at all, or would in fact be a detriment to the organism, and would therefore never survive the process of natural selection. Although they accept that some complex systems and organs can be explained by evolution, they claim that organs and biological features which are irreducibly complex cannot be explained by current models, and that an intelligent designer must have created life or guided its evolution. Accordingly, the debate on irreducible complexity concerns two questions: whether irreducible complexity can be found in nature, and what significance it would have if it did exist in nature. Behe's original examples of irreducibly complex mechanisms included the bacterial flagellum of E. coli, the blood clotting cascade, cilia, and the adaptive immune system. Behe argues that organs and biological features which are irreducibly complex cannot be wholly explained by current models of evolution. In explicating his definition of "irreducible complexity" he notes that: An irreducibly complex system cannot be produced directly (that is, by continuously improving the initial function, which continues to work by the same mechanism) by slight, successive modifications of a precursor system, because any precursor to an irreducibly complex system that is missing a part is by definition nonfunctional. Irreducible complexity is not an argument that evolution does not occur, but rather an argument that it is "incomplete". In the last chapter of Darwin's Black Box, Behe goes on to explain his view that irreducible complexity is evidence for intelligent design. Mainstream critics, however, argue that irreducible complexity, as defined by Behe, can be generated by known evolutionary mechanisms. Behe's claim that no scientific literature adequately modeled the origins of biochemical systems through evolutionary mechanisms has been challenged by TalkOrigins. The judge in the Dover trial wrote "By defining irreducible complexity in the way that he has, Professor Behe attempts to exclude the phenomenon of exaptation by definitional fiat, ignoring as he does so abundant evidence which refutes his argument. Notably, the NAS has rejected Professor Behe's claim for irreducible complexity..." Stated examples Behe and others have suggested a number of biological features that they believed to be irreducibly complex. Blood clotting cascade The process of blood clotting or coagulation cascade in vertebrates is a complex biological pathway which is given as an example of apparent irreducible complexity. The irreducible complexity argument assumes that the necessary parts of a system have always been necessary, and therefore could not have been added sequentially. However, in evolution, something which is at first merely advantageous can later become necessary. Natural selection can lead to complex biochemical systems being built up from simpler systems, or to existing functional systems being recombined as a new system with a different function. For example, one of the clotting factors that Behe listed as a part of the clotting cascade (Factor XII, also called Hageman factor) was later found to be absent in whales, demonstrating that it is not essential for a clotting system. Many purportedly irreducible structures can be found in other organisms as much simpler systems that utilize fewer parts. These systems, in turn, may have had even simpler precursors that are now extinct. Behe has responded to critics of his clotting cascade arguments by suggesting that homology is evidence for evolution, but not for natural selection. The "improbability argument" also misrepresents natural selection. It is correct to say that a set of simultaneous mutations that form a complex protein structure is so unlikely as to be unfeasible, but that is not what Darwin advocated. His explanation is based on small accumulated changes that take place without a final goal. Each step must be advantageous in its own right, although biologists may not yet understand the reason behind all of them—for example, jawless fish accomplish blood clotting with just six proteins instead of the full ten. Eye The eye is frequently cited by intelligent design and creationism advocates as a purported example of irreducible complexity. Behe used the "development of the eye problem" as evidence for intelligent design in Darwin's Black Box. Although Behe acknowledged that the evolution of the larger anatomical features of the eye have been well-explained, he pointed out that the complexity of the minute biochemical reactions required at a molecular level for light sensitivity still defies explanation. Creationist Jonathan Sarfati has described the eye as evolutionary biologists' "greatest challenge as an example of superb 'irreducible complexity' in God's creation", specifically pointing to the supposed "vast complexity" required for transparency. In an often misquoted passage from On the Origin of Species, Charles Darwin appears to acknowledge the eye's development as a difficulty for his theory. However, the quote in context shows that Darwin actually had a very good understanding of the evolution of the eye (see fallacy of quoting out of context). He notes that "to suppose that the eye ... could have been formed by natural selection, seems, I freely confess, absurd in the highest possible degree". Yet this observation was merely a rhetorical device for Darwin. He goes on to explain that if gradual evolution of the eye could be shown to be possible, "the difficulty of believing that a perfect and complex eye could be formed by natural selection ... can hardly be considered real". He then proceeded to roughly map out a likely course for evolution using examples of gradually more complex eyes of various species. Since Darwin's day, the eye's ancestry has become much better understood. Although learning about the construction of ancient eyes through fossil evidence is problematic due to the soft tissues leaving no imprint or remains, genetic and comparative anatomical evidence has increasingly supported the idea of a common ancestry for all eyes. Current evidence does suggest possible evolutionary lineages for the origins of the anatomical features of the eye. One likely chain of development is that the eyes originated as simple patches of photoreceptor cells that could detect the presence or absence of light, but not its direction. When, via random mutation across the population, the photosensitive cells happened to have developed on a small depression, it endowed the organism with a better sense of the light's source. This small change gave the organism an advantage over those without the mutation. This genetic trait would then be "selected for" as those with the trait would have an increased chance of survival, and therefore progeny, over those without the trait. Individuals with deeper depressions would be able to discern changes in light over a wider field than those individuals with shallower depressions. As ever deeper depressions were advantageous to the organism, gradually, this depression would become a pit into which light would strike certain cells depending on its angle. The organism slowly gained increasingly precise visual information. And again, this gradual process continued as individuals having a slightly shrunken aperture of the eye had an advantage over those without the mutation as an aperture increases how collimated the light is at any one specific group of photoreceptors. As this trait developed, the eye became effectively a pinhole camera which allowed the organism to dimly make out shapes—the nautilus is a modern example of an animal with such an eye. Finally, via this same selection process, a protective layer of transparent cells over the aperture was differentiated into a crude lens, and the interior of the eye was filled with humours to assist in focusing images. In this way, eyes are recognized by modern biologists as actually a relatively unambiguous and simple structure to evolve, and many of the major developments of the eye's evolution are believed to have taken place over only a few million years, during the Cambrian explosion. Behe asserts that this is only an explanation of the gross anatomical steps, however, and not an explanation of the changes in discrete biochemical systems that would have needed to take place. Behe maintains that the complexity of light sensitivity at the molecular level and the minute biochemical reactions required for those first "simple patches of photoreceptor[s]" still defies explanation, and that the proposed series of infinitesimal steps to get from patches of photoreceptors to a fully functional eye would actually be considered great, complex leaps in evolution if viewed on the molecular scale. Other intelligent design proponents claim that the evolution of the entire visual system would be difficult rather than the eye alone. Flagella The flagella of certain bacteria constitute a molecular motor requiring the interaction of about 40 different protein parts. Behe presents this as a prime example of an irreducibly complex structure defined as "a single system composed of several well-matched, interacting parts that contribute to the basic function, wherein the removal of any one of the parts causes the system to effectively cease functioning", and argues that since "an irreducibly complex system that is missing a part is by definition nonfunctional", it could not have evolved gradually through natural selection. Reducible complexity. In contrast to Behe's claims, many proteins can be deleted or mutated and the flagellum still works, even though sometimes at reduced efficiency. In fact, the composition of flagella is surprisingly diverse across bacteria with many proteins only found in some species but not others. Hence the flagellar apparatus is clearly very flexible in evolutionary terms and perfectly able to lose or gain protein components. Further studies have shown that, contrary to claims of "irreducible complexity", flagella and the type-III secretion system share several components which provides strong evidence of a shared evolutionary history (see below). In fact, this example shows how a complex system can evolve from simpler components. Multiple processes were involved in the evolution of the flagellum, including horizontal gene transfer. Evolution from type three secretion systems. The basal body of the flagella has been found to be similar to the Type III secretion system (TTSS), a needle-like structure that pathogenic germs such as Salmonella and Yersinia pestis use to inject toxins into living eucaryote cells. The needle's base has ten elements in common with the flagellum, but it is missing forty of the proteins that make a flagellum work. The TTSS system negates Behe's claim that taking away any one of the flagellum's parts would prevent the system from functioning. On
kings radically opposed polytheism in favor of Judaism, beginning officially in 380. The last trace of polytheism in South Arabia, an inscription commemorating a construction project with a polytheistic invocation, and another, mentioning the temple of Ta’lab, all date from just after 380 (the former dating to the rule of the king Dhara’amar Ayman, and the latter dating to the year 401–402). The rejection of polytheism from the public sphere did not mean the extinction of it altogether, as polytheism likely continued in the private sphere. Central Arabia The Kinda tribe's chief god was Kahl, whom their capital Qaryat Dhat Kahl (modern Qaryat al-Faw) was named for. His name appears in the form of many inscriptions and rock engravings on the slopes of the Tuwayq, on the walls of the souk of the village, in the residential houses and on the incense burners. An inscription in Qaryat Dhat Kahl invokes the gods Kahl, Athtar al-Shariq and Lah. Hejaz According to Islamic sources, the Hejaz region was home to three important shrines dedicated to al-Lat, al-’Uzza and Manat. The shrine and idol of al-Lat, according to the Book of Idols, once stood in Ta'if, and was primarily worshipped by the Banu Thaqif tribe. Al-’Uzza's principal shrine was in Nakhla and was the chief-goddess of the Quraysh tribe. Manāt's idol, reportedly the oldest of the three, was erected on the seashore between Medina and Mecca, and was honored by the Aws and Khazraj tribes. Inhabitants of several areas venerated Manāt, performing sacrifices before her idol, and pilgrimages of some were not considered completed until they visited Manāt and shaved their heads. In the Muzdalifah region near Mecca, the god Quzah, who is a god of rains and storms, was worshipped. In pre-Islamic times pilgrims used to halt at the "hill of Quzah" before sunrise. Qusai ibn Kilab is traditionally reported to have introduced the association of fire worship with him on Muzdalifah. Various other deities were venerated in the area by specific tribes, such as the god Suwa' by the Banu Hudhayl tribe and the god Nuhm by the Muzaynah tribe. Historiography The majority of extant information about Mecca during the rise of Islam and earlier times comes from the text of the Quran itself and later Muslim sources such as the prophetic biography literature dealing with the life of Muhammad and the Book of Idols. Alternative sources are so fragmentary and specialized that writing a convincing history of this period based on them alone is impossible. Several scholars hold that the sīra literature is not independent of the Quran but has been fabricated to explain the verses of the Quran. There is evidence to support the contention that some reports of the sīras are of dubious validity, but there is also evidence to support the contention that the sīra narratives originated independently of the Quran. Compounding the problem is that the earliest extant Muslim historical works, including the sīras, were composed in their definitive form more than a century after the beginning of the Islamic era. Some of these works were based on subsequently lost earlier texts, which in their turn recorded a fluid oral tradition. Scholars do not agree as to the time when such oral accounts began to be systematically collected and written down, and they differ greatly in their assessment of the historical reliability of the available texts. Role of Mecca and the Kaaba The Kaaba, whose environs were regarded as sacred (haram), became a national shrine under the custodianship of the Quraysh, the chief tribe of Mecca, which made the Hejaz the most important religious area in north Arabia. Its role was solidified by a confrontation with the Christian king Abraha, who controlled much of Arabia from a seat of power in Yemen in the middle of the sixth century. Abraha had recently constructed a splendid church in Sana'a, and he wanted to make that city a major center of pilgrimage, but Mecca's Kaaba presented a challenge to his plan. Abraha found a pretext for an attack on Mecca, presented by different sources alternatively as pollution of the church by a tribe allied to the Meccans or as an attack on Abraha's grandson in Najran by a Meccan party. The defeat of the army he assembled to conquer Mecca is recounted with miraculous details by the Islamic tradition and is also alluded to in the Quran and pre-Islamic poetry. After the battle, which probably occurred around 565, the Quraysh became a dominant force in western Arabia, receiving the title "God's people" (ahl Allah) according to Islamic sources, and formed the cult association of ḥums, which tied members of many tribes in western Arabia to the Kaaba. The Kaaba, Allah, and Hubal According to tradition, the Kaaba was a cube-like, originally roofless structure housing a black stone revered as a relic. The sanctuary was dedicated to Hubal (Arabic: هبل), who, according to some sources, was worshiped as the greatest of the 360 idols the Kaaba contained, which probably represented the days of the year. Ibn Ishaq and Ibn Al-Kalbi both report that the human-shaped idol of Hubal made of precious stone came into the possession of the Quraysh with its right hand broken off and that the Quraysh made a hand of gold to replace it. A soothsayer performed divination in the shrine by drawing ritual arrows, and vows and sacrifices were made to assure success. Marshall Hodgson argues that relations with deities and fetishes in pre-Islamic Mecca were maintained chiefly on the basis of bargaining, where favors were expected in return for offerings. A deity's or oracle's failure to provide the desired response was sometimes met with anger. Different theories have been proposed regarding the role of Allah in Meccan religion. According to one hypothesis, which goes back to Julius Wellhausen, Allah (the supreme deity of the tribal federation around Quraysh) was a designation that consecrated the superiority of Hubal (the supreme deity of Quraysh) over the other gods. However, there is also evidence that Allah and Hubal were two distinct deities. According to that hypothesis, the Kaaba was first consecrated to a supreme deity named Allah and then hosted the pantheon of Quraysh after their conquest of Mecca, about a century before the time of Muhammad. Some inscriptions seem to indicate the use of Allah as a name of a polytheist deity centuries earlier, but we know nothing precise about this use. Some scholars have suggested that Allah may have represented a remote creator god who was gradually eclipsed by more particularized local deities. There is disagreement on whether Allah played a major role in the Meccan religious cult. No iconic representation or idol of Allah is known to have existed. Other deities The three chief goddesses of Meccan religion were al-Lat, Al-‘Uzzá, and Manāt, who were called the daughters of Allah. Egerton Sykes meanwhile states that Al-lāt was the female counterpart of Allah while Uzza was a name given by Banu Ghatafan to the planet Venus. Other deities of the Quraysh in Mecca included Manaf, Isaf and Na’ila. Although the early Arab historian Al-Tabari calls Manaf (Arabic: مناف) "one of the greatest deities of Mecca", very little information is available about it. Women touched his idol as a token of blessing, and kept away from it during menstruation. Gonzague Ryckmans described this as a practice peculiar to Manaf, but according to the Encyclopedia of Islam, a report from Ibn Al-Kalbi indicates that it was common to all idols. Muhammad's great-great-grandfather's name was Abd Manaf which means "slave of Manaf". He is thought by some scholars to be a sun-god. The idols of Isāf and Nā'ila were located near the Black Stone with a talbiyah performed to Isāf during sacrifices. Various legends existed about the idols, including one that they were petrified after they committed adultery in the Kaaba. The pantheon of the Quraysh was not identical with that of the tribes who entered into various cult and commercial associations with them, especially that of the hums. Christian Julien Robin argues that the former was composed principally of idols that were in the sanctuary of Mecca, including Hubal and Manaf, while the pantheon of the associations was superimposed on it, and its principal deities included the three goddesses, who had neither idols nor a shrine in that city. Political and religious developments The second half of the sixth century was a period of political disorder in Arabia and communication routes were no longer secure. Religious divisions were an important cause of the crisis. Judaism became the dominant religion in Yemen while Christianity took root in the Persian Gulf area. In line with the broader trends of the ancient world, Arabia yearned for a more spiritual form of religion and began believing in afterlife, while the choice of religion increasingly became a personal rather than communal choice. While many were reluctant to convert to a foreign faith, those faiths provided intellectual and spiritual reference points, and the old pagan vocabulary of Arabic began to be replaced by Jewish and Christian loanwords from Aramaic everywhere, including Mecca. The distribution of pagan temples supports Gerald Hawting's argument that Arabian polytheism was marginalized in the region and already dying in Mecca on the eve of Islam. The practice of polytheistic cults was increasingly limited to the steppe and the desert, and in Yathrib (later known as Medina), which included two tribes with polytheistic majorities, the absence of a public pagan temple in the town or its immediate neighborhood indicates that polytheism was confined to the private sphere. Looking at the text of the Quran itself, Hawting has also argued that the criticism of idolaters and polytheists contained in Quran is in fact a hyperbolic reference to other monotheists, in particular the Arab Jews and Arab Christians, whose religious beliefs were considered imperfect. According to some traditions, the Kaaba contained no statues, but its interior was decorated with images of Mary and Jesus, prophets, angels, and trees. To counter the effects of anarchy, the institution of sacred months, during which every act of violence was prohibited, was reestablished. During those months, it was possible to participate in pilgrimages and fairs without danger. The Quraysh upheld the principle of two annual truces, one of one month and the second of three months, which conferred a sacred character to the Meccan sanctuary. The cult association of hums, in which individuals and groups partook in the same rites, was primarily religious, but it also had important economic consequences. Although, as Patricia Crone has shown, Mecca could not compare with the great centers of caravan trade on the eve of Islam, it was probably one of the most prosperous and secure cities of the peninsula, since, unlike many of them, it did not have surrounding walls. Pilgrimage to Mecca was a popular custom. Some Islamic rituals, including processions around the Kaaba and between the hills of al-Safa and Marwa, as well as the salutation "we are here, O Allah, we are here" repeated on approaching the Kaaba are believed to have antedated Islam. Spring water acquired a sacred character in Arabia early on and Islamic sources state that the well of Zamzam became holy long before the Islamic era. Advent of Islam According to Ibn Sa'd, the opposition in Mecca started when the prophet of Islam, Muhammad, delivered verses that "spoke shamefully of the idols they (the Meccans) worshiped other than Himself (God) and mentioned the perdition of their fathers who died in disbelief". According to William Montgomery Watt, as the ranks of Muhammad's followers swelled, he became a threat to the local tribes and the rulers of the city, whose wealth rested upon the Kaaba, the focal point of Meccan religious life, which Muhammad threatened to overthrow. Muhammad's denunciation of the Meccan traditional religion was especially offensive to his own tribe, the Quraysh, as they were the guardians of the Kaaba. The conquest of Mecca around 629–630 AD led to the destruction of the idols around the Kaaba, including Hubal. Following the conquest, shrines and temples dedicated to deities were destroyed, such as the shrines to al-Lat, al-’Uzza and Manat in Ta’if, Nakhla and al-Qudayd respectively. North Arabia Less complex societies outside South Arabia often had smaller pantheons, with the patron deity having much prominence. The deities attested in north Arabian inscriptions include Ruda, Nuha, Allah, Dathan, and Kahl. Inscriptions in a North Arabian dialect in the region of Najd referring to Nuha describe emotions as a gift from him. In addition, they also refer to Ruda being responsible for all things good and bad. The Safaitic tribes in particular prominently worshipped the goddess al-Lat as a bringer of prosperity. The Syrian god Baalshamin was also worshipped by Safaitic tribes and is mentioned in Safaitic inscriptions. Religious worship amongst the Qedarites, an ancient tribal confederation that was probably subsumed into Nabataea around the 2nd century AD, was centered around a polytheistic system in which women rose to prominence. Divine images of the gods and goddesses worshipped by Qedarite Arabs, as noted in Assyrian inscriptions, included representations of Atarsamain, Nuha, Ruda, Dai, Abirillu and Atarquruma. The female guardian of these idols, usually the reigning queen, served as a priestess (, in Assyrian texts) who communed with the other world. There is also evidence that the Qedar worshipped al-Lat to whom the inscription on a silver bowl from a king of Qedar is dedicated. In the Babylonian Talmud, which was passed down orally for centuries before being transcribed c. 500 AD, in tractate Taanis (folio 5b), it is said that most Qedarites worshiped pagan gods. The Aramaic stele inscription discovered by Charles Hubert in 1880 at Tayma mentions the introduction of a new god called Salm of hgm into the city's pantheon being permitted by three local gods – Salm of Mahram who was the chief god, Shingala, and Ashira. The name Salm means "image" or "idol". The Midianites, a people referred to in the Book of Genesis and located in north-western Arabia, may have worshipped Yahweh. Indeed, some scholars believe that Yahweh was originally a Midianite god and that he was subsequently adopted by the Israelites. An Egyptian temple of Hathor continued to be used during the Midianite occupation of the site, although images of Hathor were defaced suggesting Midianite opposition. They transformed it into a desert tent-shrine set up with a copper sculpture of a snake. The Lihyanites worshipped the god Dhu-Ghabat and rarely turned to others for their needs. Dhu-Ghabat's name means "he of the thicket", based on the etymology of gabah, meaning forest or thicket. The god al-Kutba', a god of writing probably related to a Babylonian deity and perhaps was brought into the region by the Babylonian king Nabonidus, is mentioned in Lihyanite inscriptions as well. The worship of the Hermonian gods Leucothea and Theandrios was spread from Phoenicia to Arabia. According to the Book of Idols, the Tayy tribe worshipped al-Fals, whose idol stood on Jabal Aja, while the Kalb tribe worshipped Wadd, who had an idol in Dumat al-Jandal. Nabataeans The Nabataeans worshipped primarily northern Arabian deities. Under foreign influences, they also incorporated foreign deities and elements into their beliefs. The Nabataeans’ chief-god is Dushara. In Petra, the only major goddess is Al-‘Uzzá, assuming the traits of Isis, Tyche and Aphrodite. It is unknown if her worship and identity is related to her cult at Nakhla and others. The Nabatean inscriptions define Allāt and Al-Uzza as the "bride of Dushara". Al-Uzza may have been an epithet of Allāt in the Nabataean religion according to John F. Healey. Outside Petra, other deities were worshipped; for example, Hubal and Manat were invoked in the Hejaz, and al-Lat was invoked in the Hauran and the Syrian desert. The Nabataean king Obodas I, who founded Obodat, was deified and worshipped as a god. They also worshipped Shay al-Qawm, al-Kutba', and various Greco-Roman deities such as Nike and Tyche. Maxime Rodinson suggests that Hubal, who was popular in Mecca, had a Nabataean origin. The worship of Pakidas, a Nabataean god, is attested at Gerasa alongside Hera in an inscription dated to the first century A.D. while an Arabian god is also attested by three inscriptions dated to the second century. The Nabataeans were known for their elaborate tombs, but they were not just for show; they were meant to be comfortable places for the dead. Petra has many "sacred high places" which include altars that have usually been interpreted as places of human sacrifice, although, since the 1960s, an alternative theory that they are "exposure platforms" for placing the corpses of the deceased as part of a funerary ritual has been put forward. However, there is, in fact, little evidence for either proposition. Religious beliefs of Arabs outside Arabia Palmyra was a cosmopolitan society, with its population being a mix of Aramaeans and Arabs. The Arabs of Palmyra worshipped al-Lat, Rahim and Shamash. The temple of al-Lat was established by the Bene Ma'zin tribe, who were probably an Arab tribe. The nomads of the countryside worshipped a set of deities, bearing Arab names and attributes, most prominent of them was Abgal, who himself is not attested in Palmyra itself. Ma'n, an Arab god, was worshipped alongside Abgal in a temple dedicated in 195 AD at Khirbet Semrin in the Palmyrene region while an inscription dated 194 AD at Ras esh-Shaar calls him the "good and bountiful god". A stele at Ras esh-Shaar shows him riding a horse with a lance while the god Saad is riding a camel. Abgal, Ma'n and Sa'd were known as the genii. The god Ashar was represented on a stele in Dura-Europos alongside another god Sa'd. The former was represented on a horse with Arab dress while the other was shown standing on the ground. Both had Parthian hairstyle, large facial hair and moustaches as well as similar clothing. Ashar's name is found to have been used in a theophoric manner among the Arab-majority areas of the region of the Northwest Semitic languages, like Hatra, where names like "Refuge of Ashar", "Servant of Ashar" and "Ashar has given" are recorded on an inscription. In Edessa, the solar deity was the primary god around the time of the Roman Emperor Julian and this worship was presumably brought in by migrants from Arabia. Julian's oration delivered to the denizens of the city mentioned that they worshipped the Sun surrounded by Azizos and Monimos whom Iamblichus identified with Ares and Hermes respectively. Monimos derived from Mu'nim or "the favourable one", and was another name of Ruda or Ruldaiu as apparent from spellings of his name in Sennacherib's Annals. The idol of the god al-Uqaysir was, according to the Book of Idols, located in Syria, and was worshipped by the tribes of Quda'a, Lakhm, Judham, Amela, and Ghatafan. Adherents would go on a pilgrimage to the idol and shave their heads, then mix their hair with wheat, "for every single hair a handful of wheat". A shrine to Dushara has been discovered in the harbour of ancient Puteoli in Italy. The city was an important nexus for trade to the Near East, and it is known to have had a Nabataean presence during the mid 1st century BCE. A Minaean altar dedicated to Wadd evidently existed in Delos, containing two inscriptions in Minaean and Greek respectively. Bedouin religious beliefs The Bedouin were introduced to Meccan ritualistic practices as they frequented settled towns of the Hejaz during the four months of the "holy truce", the first three of which were devoted to religious observance, while the fourth was set aside for trade. Alan Jones infers from Bedouin poetry that the gods, even Allah, were less important to the Bedouins than Fate. They seem to have had little trust in rituals and pilgrimages as means of propitiating Fate, but had recourse to divination and soothsayers (). The Bedouins regarded some trees, wells, caves and stones as sacred objects, either as fetishes or as means of reaching a deity. They created sanctuaries where people could worship fetishes. The Bedouins had a code of honor which Fazlur Rahman Malik states may be regarded as their religious ethics. This code encompassed women, bravery, hospitality, honouring one's promises and pacts, and vengeance. They believed that the ghost of a slain person would cry out from the grave until their thirst for blood was quenched. Practices such as killing of infant girls were often regarded as having religious sanction. Numerous mentions of jinn in the Quran and testimony of both pre-Islamic and Islamic literature indicate that the belief in spirits was prominent in pre-Islamic Bedouin religion. However, there is evidence that the word jinn is derived from Aramaic, , which was widely attested in Palmyrene inscriptions. The Aramaic word was used by Christians to designate pagan gods reduced to the status of demons, and was introduced into Arabic folklore only late in the pre-Islamic era. Julius Wellhausen has observed that such spirits were thought to inhabit desolate, dingy and dark places and that they were feared. One had to protect oneself from them, but they were not the objects of a true cult. Bedouin religious experience also included an apparently indigenous cult of ancestors. The dead were not regarded as powerful, but rather as deprived of protection and needing charity of the living as a continuation of social obligations beyond the grave. Only certain ancestors, especially heroes from which the tribe was said to derive its name, seem to have been objects of real veneration. Other religions Iranian religions Iranian religions existed in pre-Islamic Arabia on account of Sasanian military presence along the Persian Gulf and South Arabia and on account of trade routes between the Hejaz and Iraq. Some Arabs in northeast of the peninsula converted to Zoroastrianism and several Zoroastrian temples were constructed in Najd. Some of the members from the tribe of Banu Tamim had converted to the religion. There is also evidence of existence of Manichaeism in Arabia as several early sources indicate a presence of "zandaqas" in Mecca, although the term could also be interpreted as referring to Mazdakism. However, according to the most recent research by Tardieu, the prevalence of Manichaeism in Mecca during the 6th and 7th centuries, when Islam emerged, can not be proven. Similar reservations regarding the appearance of Manichaeism and Mazdakism in pre-Islamic Mecca are offered by Trompf & Mikkelsen et al. in their latest work (2018). There is evidence for the circulation of Iranian religious ideas in the form of Persian loan words in Quran such as firdaws (paradise). Zoroastrianism was also present in Eastern Arabia and Persian-speaking Zoroastrians lived in the region. The religion was introduced in the region including modern-day Bahrain during the rule of Persian empires in the region starting from 250 B.C. It was mainly practiced in Bahrain by Persian settlers. Zoroastrianism was also practiced in the Persian-ruled area of modern-day Oman. The religion also existed in Persian-ruled area of modern Yemen. The descendants of Abna, the Persian conquerors of Yemen, were followers of Zoroastrianism. Yemen's Zoroastrians who had the jizya imposed on them after being conquered by Muhammad are mentioned by the Islamic historian al-Baladhuri. According to Serjeant, the Baharna people may be the Arabized descendants of converts from the original population of ancient Persians (majus) as well as other religions. Abrahamic religions Judaism A thriving community of Jewish tribes existed in pre-Islamic Arabia and included both sedentary and nomadic communities. Jews had migrated into Arabia from Roman times onwards. Arabian Jews spoke Arabic as well as Hebrew and Aramaic and had contact with Jewish religious centers in Babylonia and Palestine. The Yemeni Himyarites converted to Judaism in the 4th century, and some of the Kinda were also converted in the 4th/5th century. Jewish tribes existed in all major Arabian towns during Muhammad's time including in Tayma and Khaybar as well as Medina with twenty tribes living in the peninsula. From tomb inscriptions, it is visible that Jews also lived in Mada'in Saleh and Al-'Ula. There is evidence that Jewish converts in the Hejaz were regarded as Jews by other Jews, as well as by non-Jews, and sought advice from Babylonian rabbis on matters of attire and kosher food. In at least one case, it is known that an Arab tribe agreed to adopt Judaism as a condition for settling in a town dominated by Jewish inhabitants. Some Arab women in Yathrib/Medina are said to have vowed to make their child a Jew if the child survived, since they considered the Jews to be people "of knowledge and the book" (ʿilmin wa-kitābin). Philip Hitti infers from proper names and agricultural vocabulary that the Jewish tribes of Yathrib consisted mostly of Judaized clans of Arabian and Aramaean origin. The key role played by Jews in the trade and markets of the Hejaz meant that market day for the week was the day preceding the Jewish Sabbath. This day, which was called aruba in Arabic, also provided occasion for legal proceedings and entertainment, which in turn may
Asir region was said to have worshipped Dhu'l-Shara, Dhu'l-Kaffayn, Dhu'l-Khalasa and A'im. According to the Book of Idols, Dhu'l-Kaffayn originated from a clan of the Banu Daws. In addition to being worshipped among the Azd, Dushara is also reported to have a shrine amongst the Daws. Dhu’l-Khalasa was an oracular god and was also worshipped by the Bajila and Khatham tribes. Influence on Aksum Before conversion to Christianity, the Aksumites followed a polytheistic religion that was similar to that of Southern Arabia. The lunar god Hawbas was worshiped in South Arabia and Aksum. The name of the god Astar, a sky-deity was related to that of 'Attar. The god Almaqah was worshiped at Hawulti-Melazo. The South Arabian gods in Aksum included Dhat-Himyam and Dhat-Ba'adan. A stone later reused for the church of Enda-Cerqos at Melazo mentions these gods. Hawbas is also mentioned on an altar and sphinx in Dibdib. The name of Nrw who is mentioned in Aksum inscriptions is related to that of the South Arabian god Nawraw, a deity of stars. Transition to Judaism The Himyarite kings radically opposed polytheism in favor of Judaism, beginning officially in 380. The last trace of polytheism in South Arabia, an inscription commemorating a construction project with a polytheistic invocation, and another, mentioning the temple of Ta’lab, all date from just after 380 (the former dating to the rule of the king Dhara’amar Ayman, and the latter dating to the year 401–402). The rejection of polytheism from the public sphere did not mean the extinction of it altogether, as polytheism likely continued in the private sphere. Central Arabia The Kinda tribe's chief god was Kahl, whom their capital Qaryat Dhat Kahl (modern Qaryat al-Faw) was named for. His name appears in the form of many inscriptions and rock engravings on the slopes of the Tuwayq, on the walls of the souk of the village, in the residential houses and on the incense burners. An inscription in Qaryat Dhat Kahl invokes the gods Kahl, Athtar al-Shariq and Lah. Hejaz According to Islamic sources, the Hejaz region was home to three important shrines dedicated to al-Lat, al-’Uzza and Manat. The shrine and idol of al-Lat, according to the Book of Idols, once stood in Ta'if, and was primarily worshipped by the Banu Thaqif tribe. Al-’Uzza's principal shrine was in Nakhla and was the chief-goddess of the Quraysh tribe. Manāt's idol, reportedly the oldest of the three, was erected on the seashore between Medina and Mecca, and was honored by the Aws and Khazraj tribes. Inhabitants of several areas venerated Manāt, performing sacrifices before her idol, and pilgrimages of some were not considered completed until they visited Manāt and shaved their heads. In the Muzdalifah region near Mecca, the god Quzah, who is a god of rains and storms, was worshipped. In pre-Islamic times pilgrims used to halt at the "hill of Quzah" before sunrise. Qusai ibn Kilab is traditionally reported to have introduced the association of fire worship with him on Muzdalifah. Various other deities were venerated in the area by specific tribes, such as the god Suwa' by the Banu Hudhayl tribe and the god Nuhm by the Muzaynah tribe. Historiography The majority of extant information about Mecca during the rise of Islam and earlier times comes from the text of the Quran itself and later Muslim sources such as the prophetic biography literature dealing with the life of Muhammad and the Book of Idols. Alternative sources are so fragmentary and specialized that writing a convincing history of this period based on them alone is impossible. Several scholars hold that the sīra literature is not independent of the Quran but has been fabricated to explain the verses of the Quran. There is evidence to support the contention that some reports of the sīras are of dubious validity, but there is also evidence to support the contention that the sīra narratives originated independently of the Quran. Compounding the problem is that the earliest extant Muslim historical works, including the sīras, were composed in their definitive form more than a century after the beginning of the Islamic era. Some of these works were based on subsequently lost earlier texts, which in their turn recorded a fluid oral tradition. Scholars do not agree as to the time when such oral accounts began to be systematically collected and written down, and they differ greatly in their assessment of the historical reliability of the available texts. Role of Mecca and the Kaaba The Kaaba, whose environs were regarded as sacred (haram), became a national shrine under the custodianship of the Quraysh, the chief tribe of Mecca, which made the Hejaz the most important religious area in north Arabia. Its role was solidified by a confrontation with the Christian king Abraha, who controlled much of Arabia from a seat of power in Yemen in the middle of the sixth century. Abraha had recently constructed a splendid church in Sana'a, and he wanted to make that city a major center of pilgrimage, but Mecca's Kaaba presented a challenge to his plan. Abraha found a pretext for an attack on Mecca, presented by different sources alternatively as pollution of the church by a tribe allied to the Meccans or as an attack on Abraha's grandson in Najran by a Meccan party. The defeat of the army he assembled to conquer Mecca is recounted with miraculous details by the Islamic tradition and is also alluded to in the Quran and pre-Islamic poetry. After the battle, which probably occurred around 565, the Quraysh became a dominant force in western Arabia, receiving the title "God's people" (ahl Allah) according to Islamic sources, and formed the cult association of ḥums, which tied members of many tribes in western Arabia to the Kaaba. The Kaaba, Allah, and Hubal According to tradition, the Kaaba was a cube-like, originally roofless structure housing a black stone revered as a relic. The sanctuary was dedicated to Hubal (Arabic: هبل), who, according to some sources, was worshiped as the greatest of the 360 idols the Kaaba contained, which probably represented the days of the year. Ibn Ishaq and Ibn Al-Kalbi both report that the human-shaped idol of Hubal made of precious stone came into the possession of the Quraysh with its right hand broken off and that the Quraysh made a hand of gold to replace it. A soothsayer performed divination in the shrine by drawing ritual arrows, and vows and sacrifices were made to assure success. Marshall Hodgson argues that relations with deities and fetishes in pre-Islamic Mecca were maintained chiefly on the basis of bargaining, where favors were expected in return for offerings. A deity's or oracle's failure to provide the desired response was sometimes met with anger. Different theories have been proposed regarding the role of Allah in Meccan religion. According to one hypothesis, which goes back to Julius Wellhausen, Allah (the supreme deity of the tribal federation around Quraysh) was a designation that consecrated the superiority of Hubal (the supreme deity of Quraysh) over the other gods. However, there is also evidence that Allah and Hubal were two distinct deities. According to that hypothesis, the Kaaba was first consecrated to a supreme deity named Allah and then hosted the pantheon of Quraysh after their conquest of Mecca, about a century before the time of Muhammad. Some inscriptions seem to indicate the use of Allah as a name of a polytheist deity centuries earlier, but we know nothing precise about this use. Some scholars have suggested that Allah may have represented a remote creator god who was gradually eclipsed by more particularized local deities. There is disagreement on whether Allah played a major role in the Meccan religious cult. No iconic representation or idol of Allah is known to have existed. Other deities The three chief goddesses of Meccan religion were al-Lat, Al-‘Uzzá, and Manāt, who were called the daughters of Allah. Egerton Sykes meanwhile states that Al-lāt was the female counterpart of Allah while Uzza was a name given by Banu Ghatafan to the planet Venus. Other deities of the Quraysh in Mecca included Manaf, Isaf and Na’ila. Although the early Arab historian Al-Tabari calls Manaf (Arabic: مناف) "one of the greatest deities of Mecca", very little information is available about it. Women touched his idol as a token of blessing, and kept away from it during menstruation. Gonzague Ryckmans described this as a practice peculiar to Manaf, but according to the Encyclopedia of Islam, a report from Ibn Al-Kalbi indicates that it was common to all idols. Muhammad's great-great-grandfather's name was Abd Manaf which means "slave of Manaf". He is thought by some scholars to be a sun-god. The idols of Isāf and Nā'ila were located near the Black Stone with a talbiyah performed to Isāf during sacrifices. Various legends existed about the idols, including one that they were petrified after they committed adultery in the Kaaba. The pantheon of the Quraysh was not identical with that of the tribes who entered into various cult and commercial associations with them, especially that of the hums. Christian Julien Robin argues that the former was composed principally of idols that were in the sanctuary of Mecca, including Hubal and Manaf, while the pantheon of the associations was superimposed on it, and its principal deities included the three goddesses, who had neither idols nor a shrine in that city. Political and religious developments The second half of the sixth century was a period of political disorder in Arabia and communication routes were no longer secure. Religious divisions were an important cause of the crisis. Judaism became the dominant religion in Yemen while Christianity took root in the Persian Gulf area. In line with the broader trends of the ancient world, Arabia yearned for a more spiritual form of religion and began believing in afterlife, while the choice of religion increasingly became a personal rather than communal choice. While many were reluctant to convert to a foreign faith, those faiths provided intellectual and spiritual reference points, and the old pagan vocabulary of Arabic began to be replaced by Jewish and Christian loanwords from Aramaic everywhere, including Mecca. The distribution of pagan temples supports Gerald Hawting's argument that Arabian polytheism was marginalized in the region and already dying in Mecca on the eve of Islam. The practice of polytheistic cults was increasingly limited to the steppe and the desert, and in Yathrib (later known as Medina), which included two tribes with polytheistic majorities, the absence of a public pagan temple in the town or its immediate neighborhood indicates that polytheism was confined to the private sphere. Looking at the text of the Quran itself, Hawting has also argued that the criticism of idolaters and polytheists contained in Quran is in fact a hyperbolic reference to other monotheists, in particular the Arab Jews and Arab Christians, whose religious beliefs were considered imperfect. According to some traditions, the Kaaba contained no statues, but its interior was decorated with images of Mary and Jesus, prophets, angels, and trees. To counter the effects of anarchy, the institution of sacred months, during which every act of violence was prohibited, was reestablished. During those months, it was possible to participate in pilgrimages and fairs without danger. The Quraysh upheld the principle of two annual truces, one of one month and the second of three months, which conferred a sacred character to the Meccan sanctuary. The cult association of hums, in which individuals and groups partook in the same rites, was primarily religious, but it also had important economic consequences. Although, as Patricia Crone has shown, Mecca could not compare with the great centers of caravan trade on the eve of Islam, it was probably one of the most prosperous and secure cities of the peninsula, since, unlike many of them, it did not have surrounding walls. Pilgrimage to Mecca was a popular custom. Some Islamic rituals, including processions around the Kaaba and between the hills of al-Safa and Marwa, as well as the salutation "we are here, O Allah, we are here" repeated on approaching the Kaaba are believed to have antedated Islam. Spring water acquired a sacred character in Arabia early on and Islamic sources state that the well of Zamzam became holy long before the Islamic era. Advent of Islam According to Ibn Sa'd, the opposition in Mecca started when the prophet of Islam, Muhammad, delivered verses that "spoke shamefully of the idols they (the Meccans) worshiped other than Himself (God) and mentioned the perdition of their fathers who died in disbelief". According to William Montgomery Watt, as the ranks of Muhammad's followers swelled, he became a threat to the local tribes and the rulers of the city, whose wealth rested upon the Kaaba, the focal point of Meccan religious life, which Muhammad threatened to overthrow. Muhammad's denunciation of the Meccan traditional religion was especially offensive to his own tribe, the Quraysh, as they were the guardians of the Kaaba. The conquest of Mecca around 629–630 AD led to the destruction of the idols around the Kaaba, including Hubal. Following the conquest, shrines and temples dedicated to deities were destroyed, such as the shrines to al-Lat, al-’Uzza and Manat in Ta’if, Nakhla and al-Qudayd respectively. North Arabia Less complex societies outside South Arabia often had smaller pantheons, with the patron deity having much prominence. The deities attested in north Arabian inscriptions include Ruda, Nuha, Allah, Dathan, and Kahl. Inscriptions in a North Arabian dialect in the region of Najd referring to Nuha describe emotions as a gift from him. In addition, they also refer to Ruda being responsible for all things good and bad. The Safaitic tribes in particular prominently worshipped the goddess al-Lat as a bringer of prosperity. The Syrian god Baalshamin was also worshipped by Safaitic tribes and is mentioned in Safaitic inscriptions. Religious worship amongst the Qedarites, an ancient tribal confederation that was probably subsumed into Nabataea around the 2nd century AD, was centered around a polytheistic system in which women rose to prominence. Divine images of the gods and goddesses worshipped by Qedarite Arabs, as noted in Assyrian inscriptions, included representations of Atarsamain, Nuha, Ruda, Dai, Abirillu and Atarquruma. The female guardian of these idols, usually the reigning queen, served as a priestess (, in Assyrian texts) who communed with the other world. There is also evidence that the Qedar worshipped al-Lat to whom the inscription on a silver bowl from a king of Qedar is dedicated. In the Babylonian Talmud, which was passed down orally for centuries before being transcribed c. 500 AD, in tractate Taanis (folio 5b), it is said that most Qedarites worshiped pagan gods. The Aramaic stele inscription discovered by Charles Hubert in 1880 at Tayma mentions the introduction of a new god called Salm of hgm into the city's pantheon being permitted by three local gods – Salm of Mahram who was the chief god, Shingala, and Ashira. The name Salm means "image" or "idol". The Midianites, a people referred to in the Book of Genesis and located in north-western Arabia, may have worshipped Yahweh. Indeed, some scholars believe that Yahweh was originally a Midianite god and that he was subsequently adopted by the Israelites. An Egyptian temple of Hathor continued to be used during the Midianite occupation of the site, although images of Hathor were defaced suggesting Midianite opposition. They transformed it into a desert tent-shrine set up with a copper sculpture of a snake. The Lihyanites worshipped the god Dhu-Ghabat and rarely turned to others for their needs. Dhu-Ghabat's name means "he of the thicket", based on the etymology of gabah, meaning forest or thicket. The god al-Kutba', a god of writing probably related to a Babylonian deity and perhaps was brought into the region by the Babylonian king Nabonidus, is mentioned in Lihyanite inscriptions as well. The worship of the Hermonian gods Leucothea and Theandrios was spread from Phoenicia to Arabia. According to the Book of Idols, the Tayy tribe worshipped al-Fals, whose idol stood on Jabal Aja, while the Kalb tribe worshipped Wadd, who had an idol in Dumat al-Jandal. Nabataeans The Nabataeans worshipped primarily northern Arabian deities. Under foreign influences, they also incorporated foreign deities and elements into their beliefs. The Nabataeans’ chief-god is Dushara. In Petra, the only major goddess is Al-‘Uzzá, assuming the traits of Isis, Tyche and Aphrodite. It is unknown if her worship and identity is related to her cult at Nakhla and others. The Nabatean inscriptions define Allāt and Al-Uzza as the "bride of Dushara". Al-Uzza may have been an epithet of Allāt in the Nabataean religion according to John F. Healey. Outside Petra, other deities were worshipped; for example, Hubal and Manat were invoked in the Hejaz, and al-Lat was invoked in the Hauran and the Syrian desert. The Nabataean king Obodas I, who founded Obodat, was deified and worshipped as a god. They also worshipped Shay al-Qawm, al-Kutba', and various Greco-Roman deities such as Nike and Tyche. Maxime Rodinson suggests that Hubal, who was popular in Mecca, had a Nabataean origin. The worship of Pakidas, a Nabataean god, is attested at Gerasa alongside Hera in an inscription dated to the first century A.D. while an Arabian god is also attested by three inscriptions dated to the second century. The Nabataeans were known for their elaborate tombs, but they were not just for show; they were meant to be comfortable places for the dead. Petra has many "sacred high places" which include altars that have usually been interpreted as places of human sacrifice, although, since the 1960s, an alternative theory that they are "exposure platforms" for placing the corpses of the deceased as part of a funerary ritual has been put forward. However, there is, in fact, little evidence for either proposition. Religious beliefs of Arabs outside Arabia Palmyra was a cosmopolitan society, with its population being a mix of Aramaeans and Arabs. The Arabs of Palmyra worshipped al-Lat, Rahim and Shamash. The temple of al-Lat was established by the Bene Ma'zin tribe, who were probably an Arab tribe. The nomads of the countryside worshipped a set of deities, bearing Arab names and attributes, most prominent of them was Abgal, who himself is not attested in Palmyra itself. Ma'n, an Arab god, was worshipped alongside Abgal in a temple dedicated in 195 AD at Khirbet Semrin in the Palmyrene region while an inscription dated 194 AD at Ras esh-Shaar calls him the "good and bountiful god". A stele at Ras esh-Shaar shows him riding a horse with a lance while the god Saad is riding a camel. Abgal, Ma'n and Sa'd were known as the genii. The god Ashar was represented on a stele in Dura-Europos alongside another god Sa'd. The former was represented on a horse with Arab dress while the other was shown standing on the ground. Both had Parthian hairstyle, large facial hair and moustaches as well as similar clothing. Ashar's name is found to have been used in a theophoric manner among the Arab-majority areas of the region of the Northwest Semitic languages, like Hatra, where names like "Refuge of Ashar", "Servant of Ashar" and "Ashar has given" are recorded on an inscription. In Edessa, the solar deity was the primary god around the time of the Roman Emperor Julian and this worship was presumably brought in by migrants from Arabia. Julian's oration delivered to the denizens of the city mentioned that they worshipped the Sun surrounded by Azizos and Monimos whom Iamblichus identified with Ares and Hermes respectively. Monimos derived from Mu'nim or "the favourable one", and was another name of Ruda or Ruldaiu as apparent from spellings of his name in Sennacherib's Annals. The idol of the god al-Uqaysir was, according to the Book of Idols, located in Syria, and was worshipped by the tribes of Quda'a, Lakhm, Judham, Amela, and Ghatafan. Adherents would go on a pilgrimage to the idol and shave their heads, then mix their hair with wheat, "for every single hair a handful of wheat". A shrine to Dushara has been discovered in the harbour of ancient Puteoli in Italy. The city was an important nexus for trade to the Near East, and it is known to have had a Nabataean presence during the mid 1st century BCE. A Minaean altar dedicated to Wadd evidently existed in Delos, containing two inscriptions in Minaean and Greek respectively. Bedouin religious beliefs The Bedouin were introduced to Meccan ritualistic practices as they frequented settled towns of the Hejaz during the four months of the "holy truce", the first three of which were devoted to religious observance, while the fourth was set aside for trade. Alan Jones infers from Bedouin poetry that the gods, even Allah, were less important to the Bedouins than Fate. They seem to have had little trust in rituals and pilgrimages as means of propitiating Fate, but had recourse to divination and soothsayers (). The Bedouins regarded some trees, wells, caves and stones as sacred objects, either as fetishes or as means of reaching a deity. They created sanctuaries where people could worship fetishes. The Bedouins had a code of honor which Fazlur Rahman Malik states may be regarded as their religious ethics. This code encompassed women, bravery, hospitality, honouring one's promises and pacts, and vengeance. They believed that the ghost of a slain person would cry out from the grave until their thirst for blood was quenched. Practices such as killing of infant girls were often regarded as having religious sanction. Numerous mentions of jinn in the Quran and testimony of both pre-Islamic and Islamic literature indicate that the belief in spirits was prominent in pre-Islamic Bedouin religion. However, there is evidence that the word jinn is derived from Aramaic, , which was widely attested in Palmyrene inscriptions. The Aramaic word was used by Christians to designate pagan gods reduced to the status of demons, and was introduced into Arabic folklore only late in the pre-Islamic era. Julius Wellhausen has observed that such spirits were thought to inhabit desolate, dingy and dark places and that they were feared. One had to protect oneself from them, but they were not the objects of a true cult. Bedouin religious experience also included an apparently indigenous cult of ancestors. The dead were not regarded as powerful, but rather as deprived of protection and needing charity of the living as a continuation of social obligations beyond the grave. Only certain ancestors, especially heroes from which the tribe was said to derive its name, seem to have been objects of real veneration. Other religions Iranian religions Iranian religions existed in pre-Islamic Arabia on account of Sasanian military presence along the Persian Gulf and South Arabia and on account of trade routes between the Hejaz and Iraq. Some Arabs in northeast of the peninsula converted to Zoroastrianism and several Zoroastrian temples were constructed in Najd. Some of the members from the tribe of Banu Tamim had converted to the religion. There is also evidence of existence of Manichaeism in Arabia as several early sources indicate a presence of "zandaqas" in Mecca, although the term could also be interpreted as referring to Mazdakism. However, according to the most recent research by Tardieu, the prevalence of Manichaeism in Mecca during the 6th and 7th centuries, when Islam emerged, can not be proven. Similar reservations regarding the appearance of Manichaeism and Mazdakism in pre-Islamic Mecca are offered by
the statute until some years afterwards. The 1930 conference was notable, too, for the attendance of Southern Rhodesia, despite it being a self-governing colony, not a dominion. Towards Commonwealth meetings As World War II drew to a close, Imperial Conferences were replaced by Commonwealth Prime Ministers' Conferences, with 17 such meetings occurring from 1944 until 1969, all but one of the meetings occurred in London. The gatherings were renamed Commonwealth Heads of Government Meetings (CHOGM) in 1971 and were henceforth held every two years with hosting duties rotating around the Commonwealth. See also British Empire Economic Conference (1932) Commonwealth Heads of Government Meeting First Colonial Conference Historiography of the British Empire Imperial War Cabinet Footnotes Further reading Keith, A.B. The Government of the British Empire (1935). Olson, James S., ed. Historical Dictionary of European Imperialism (1991) pp 292–300; Covers 1907, 1911, 1921, 1923, 1926 and 1932 Palmer, G.E.H. Constitution and Cooperation in the British Commonwealth (1934) Governance of the British Empire Diplomatic conferences in the United Kingdom
the 1894 and 1932 conferences which were held in Ottawa, the capital of the senior Dominion of the Crown. The 1907 conference changed the name of the meetings to Imperial Conferences and agreed that the meetings should henceforth be regular rather than taking place while overseas statesmen were visiting London for royal occasions (e.g. jubilees and coronations). List of conferences Notable meetings Originally instituted to emphasise imperial unity, as time went on, the conferences became a key forum for dominion governments to assert the desire for removing the remaining vestiges of their colonial status. The conference of 1926 agreed to the Balfour Declaration, which acknowledged that the dominions would henceforth rank as equals to the United Kingdom, as members of the 'British Commonwealth of Nations'. The conference of 1930 decided to abolish the legislative supremacy of the British Parliament as it was expressed through the
United Nations High Commissioner for Refugees (UNHCR). The Constitution of the International Refugee Organization, adopted by the United Nations General Assembly on 15 December 1946, is the founding document of the IRO. The constitution specified the organization's field of operations. Controversially, the constitution defined "persons of German ethnic origin" who had been expelled, or were to be expelled from their countries of birth into the postwar Germany, as individuals who would "not be the concern of the Organization." This excluded from its purview a group that exceeded in number all the other European displaced persons put together. Also, because of disagreements between the Western allies and the Soviet Union, the IRO only worked in areas controlled by Western armies of occupation. Twenty-six states became members of the IRO and it formally came into existence in 1948: Argentina, Australia, Belgium, Bolivia, Brazil, Canada, Republic of China, Chile, Denmark, the Dominican Republic, France, Guatemala, Honduras, Iceland, Italy, Liberia, Luxembourg, the Netherlands, New Zealand, Norway, Panama, Peru, the Philippines, Switzerland, the United Kingdom, the United States, and Venezuela. The U.S. provided about 40% of the IRO's $155 million annual budget. The total contribution by the members for the five years of operation
Refugees, established in January 1951 as a part of the United Nations, and the Intergovernmental Committee for European Migration (originally PICMME), set up in December 1951. Filmography The Search by Fred Zinnemann (1948): The IRO helped the producers to make this story about children refugees, in 1945 Germany. References Further reading Holborn, Louise W. The International Refugee Organization: a specialized agency of the United Nations, its history and work, 1946–1952 (Oxford UP, 1956. 1956) online Holborn, Louise W. Philip Chartrand, and Rita Chartrand. Refugees, a problem of our time: the work of the United Nations High Commissioner for Refugees, 1951-1972 (Scarecrow Press, 1975). External links Records of the International Refugee Organization (IRO) at the United Nations Archives Constitution of the International Refugee Organisation Original, complete constitution of the IRO, assigned by the Government of the United Kingdom: https://treaties.un.org/doc/Publication/UNTS/Volume%2018/v18.pdf IRO. Area Vocational Training School. Ingolstadt,
agency assisting European Jewish immigrants to the U.S. in the early 20th century People Given name Iro Haarla (born 1956), Finnish jazz musician Iro Ilk, German Luftwaffe pilot; recipient of the Knight's Cross of the Iron Cross Iro Konstantopoulou (1927–1944), Greek resistance member during World War II Iro Tembeck (1946–2004), Canadian dancer, choreographer, and dance historian Surname Andy Iro (born 1984), English footballer Edgar Iro (born 2000), Solomon Islands swimmer Hapilyn Iro (born 1992), Solomon Islands weightlifter Kayal Iro (born 2000), Cook Islands rugby league footballer Kevin Iro
Railway Operators since October 2021) Internal Revolutionary Organization, Bulgaria International Refugee Organization, a United Nations agency 1946–1952 International Rescue Dog Organisation Jewish Industrial Removal Office, an agency assisting European Jewish immigrants to the U.S. in the early 20th century People Given name Iro Haarla (born 1956), Finnish jazz musician Iro Ilk, German Luftwaffe pilot; recipient of the Knight's Cross of the
managed to convert them both to orlando's faith, but Isabella, once back in Mantua, returned to prefer Rinaldo, so that Galeazzo remembered her as "I alone was enough to make her change her mind and cry out Rolando! Rolando!", invited her to follow her sister's example and swore that he would convert her a second time, as soon as they met again. Isabella jokingly replied that she would then bring a frog to offend him, and the dispute went on for a long time. On February 11, speaking to her about the amusements he had with Beatrice, he wrote to her: "I will also strive to improve in order to give greater pleasure to the S. V., when I come for her this summer", and lamented the lack of "his sweet company". Isabella's presence was in fact much desired in Milan, not only by Galeazzo but also by her sister, Ludovico and the other courtiers, however the Marquise was able to go there a few times, as her husband Francesco was wary of sending it to her, judging that in that court too many "madness" were committed, and perhaps also out of jealousy of Ludovico. Despite the affection, Isabella began to feel envy for her sister Beatrice, first for the very fortunate marriage that had touched her and for the enormous riches, then for the two sons in perfect health who were born to her a short time later, while she seemed unable to have children, and in this aroused the concerns of her mother Eleonora, who continually exhorted her in letters to be as close as possible to her husband. A certain hatred can also be seen in a letter to his mother dating back to his visit to Pavia in August 1492, when, speaking of Beatrice, he wrote: "she is not a greater than me, but she is much bigger!", not being able yet to know, perhaps, that the sister's coarseness was due to the incipient pregnancy. These frictions were perhaps also linked to the fact that Ludovico had initially asked for Isabella's hand, in 1480, and that this had not been possible because, only a few days earlier, Duke Ercole had officially promised it to Francesco Gonzaga. Despite everything, in 1492 she was very close to Beatrice in a difficult moment of her pregnancy, that is when she was suddenly struck by an attack of malarial fevers, and in 1495 she went again to Milan to assist her sister in her second birth and also baptized her nephew Francesco. In the summer of 1494, on the occasion of the descent of the French into Italy, Beatrice invited her sister to Milan to kiss Gilbert of Montpensier and others of the royal house, according to the custom French. Secretary Benedetto Capilupi reported: In fact, it does not seem that Beatrice had any conflicting feelings towards Isabella, nor that she saw with a bad eye the complicity between the latter and her husband Ludovico. The Moro in fact, who was of generous nature, often gave Isabella even very expensive gifts: once he sent her fifteen arms of a fabric so precious as to cost forty ducats on her arm - an amazing sum - saying that he had already made a dress for Beatrice. After the death of his wife, which took place in 1497, Ludovico came to allude to a secret relationship with Isabella, claiming that it was out of jealousy of his wife that the Marquis Francesco played a double game between him and the Lordship of Venice. The rumor was however promptly denied by his father Ercole. Others instead defined Beatrice's attitude towards her sister as "complexed second child" because in the letter of congratulations to Isabella for the birth of little Eleonora - who, being female, incredibly disappointed her mother - she added the greetings of her little son Hercules to "soa cusina", despite not having the child yet turned one year of age, something that historians such as Luciano Chiappini interpreted as a sort of mockery, of "refined malice", "a slap given with grace and grace". In fact, if Isabella was always the daughter most loved by her parents, Beatrice had been ceded to her grandfather, and only with the birth of the firstborn had she obtained her own revenge. Having also received different educations, the two sisters were the opposite of each other: Isabella, more like her mother, was sweet, graceful and a lover of tranquility; Beatrice, more like her father, was impetuous, adventurous and aggressive. However, they were united by the desire to excel in everything. A difficult marriage As the couple had known and admired one another for many years, their mutual attraction deepened into love. Reportedly, marriage to Francesco caused Isabella to "bloom". At the time of her wedding, Isabella was said to have been pretty, slim, graceful, and well-dressed. Her long, fine hair was dyed a fashionable pale blonde and her eyes were described as "brown as fir cones in autumn, scattered laughter". The relationship with her husband over the years often proved to be tense, at times very tense, both for the political differences between the two and for the difficulty in procreating a male heir. In truth, Francesco for his part was always very proud of his daughters and never showed himself disappointed, indeed from the beginning he declared himself in love with the firstborn Eleonora, born in 1493, despite the absolute disappointment of Isabella who refused her daughter, who was then very lovingly educated by her sister-in-law Elisabetta, who because of her husband's impotence never had children. When in 1496 the second daughter Margherita was born, Isabella was so angry that she wrote to her husband, who was then fighting the French in Calabria, a letter in which she blamed him, declaring that she did nothing but reap the fruits of his sown. Francis replied that he was instead very happy with the birth of his daughter - who, however, did not have time to know, having died in swaddling clothes - and indeed forbade anyone to show discontent with it. Only in 1500 was finally born the long-awaited son Federico, who was the most loved by Isabella. In his capacity of captain general of the Venetian armies, Francesco often was required to go to Venice for conferences that left Isabella in Mantua on her own at La Reggia, the ancient palace that was the family seat of the Gonzagas. She did not lack company, however, as she passed the time with her mother and with her sister, Beatrice. Upon meeting Elisabetta Gonzaga, her 18-year-old sister-in-law, the two women became close friends. They enjoyed reading books, playing cards, and travelling about the countryside together. Once they journeyed as far as Lake Garda during one of Francesco's absences, and later travelled to Venice. They maintained a steady correspondence until Elisabetta's death in 1526. Almost four years after her marriage in December 1493, Isabella gave birth to her first child out of an eventual total of eight. She was a daughter, Eleonora, whom they called Leonora for short, after Isabella's mother, Eleonora of Naples. Children Together Isabella and Francesco had eight children: Eleonora Gonzaga (31 December 1493 – 13 February 1570), married Francesco Maria I della Rovere, Duke of Urbino, by whom she had issue Margherita Gonzaga (13 July 1496 – 22 September 1496) Federico II Gonzaga, Duke of Mantua (17 May 1500 – 28 August 1540), married Margaret Paleologa, by whom he had issue Livia Gonzaga (1501 – January 1508) Ippolita Gonzaga (13 November 1503 – 16 March 1570), who became a nun Ercole Gonzaga (23 November 1505 – 2 March 1563), Cardinal, Bishop of Mantua Ferrante Gonzaga (28 January 1507 – 15 November 1557), a condottiero; married Isabella di Capua, by whom he had issue Livia Gonzaga (August 1508 – 1569), who became a nun Lucrezia Borgia A year after her 1502 marriage to Isabella's brother Alfonso, the notorious Lucrezia Borgia became the mistress of Francesco. At about the same time, Isabella had given birth to a daughter, Ippolita, and she continued to bear him children throughout Francesco and Lucrezia's long, passionate affair, which was more sexual than romantic. Lucrezia had previously made overtures of friendship to Isabella which the latter had coldly and disdainfully ignored. From the time Lucrezia had first arrived in Ferrara as Alfonso's intended bride, Isabella, despite having acted as hostess during the wedding festivities, had regarded Lucrezia as a rival, whom she sought to outdo at every opportunity. Francesco's affair with Lucrezia, whose beauty was renowned, caused Isabella much jealous suffering and emotional pain. The liaison ended when he contracted syphilis as a result of encounters with prostitutes. Regency Isabella played an important role in Mantua during troubled times for the city. When her husband was captured in 1509 and held hostage in Venice, she took control of Mantua's military forces and held off the invaders until his release in 1512. In the same year, 1512, she was the hostess at the Congress of Mantua, which was held to settle questions concerning Florence and Milan. As a ruler, she appeared to have been much more assertive and competent than her husband. When apprised of this fact upon his return, Francesco was furious and humiliated at being surpassed by his wife's superior political ability. This caused their marriage to break down irrevocably. As a result, Isabella began to travel freely and live independently from her husband until his death on 19 March 1519. After the death of her husband, Isabella ruled Mantua as regent for her son Federico. She began to play an increasingly important role in Italian politics, steadily advancing Mantua's position. She was instrumental in promoting Mantua to a Duchy, which was obtained by wise diplomatic use of her son's marriage contracts. She also succeeded in obtaining a cardinalate for her son
be as close as possible to her husband. A certain hatred can also be seen in a letter to his mother dating back to his visit to Pavia in August 1492, when, speaking of Beatrice, he wrote: "she is not a greater than me, but she is much bigger!", not being able yet to know, perhaps, that the sister's coarseness was due to the incipient pregnancy. These frictions were perhaps also linked to the fact that Ludovico had initially asked for Isabella's hand, in 1480, and that this had not been possible because, only a few days earlier, Duke Ercole had officially promised it to Francesco Gonzaga. Despite everything, in 1492 she was very close to Beatrice in a difficult moment of her pregnancy, that is when she was suddenly struck by an attack of malarial fevers, and in 1495 she went again to Milan to assist her sister in her second birth and also baptized her nephew Francesco. In the summer of 1494, on the occasion of the descent of the French into Italy, Beatrice invited her sister to Milan to kiss Gilbert of Montpensier and others of the royal house, according to the custom French. Secretary Benedetto Capilupi reported: In fact, it does not seem that Beatrice had any conflicting feelings towards Isabella, nor that she saw with a bad eye the complicity between the latter and her husband Ludovico. The Moro in fact, who was of generous nature, often gave Isabella even very expensive gifts: once he sent her fifteen arms of a fabric so precious as to cost forty ducats on her arm - an amazing sum - saying that he had already made a dress for Beatrice. After the death of his wife, which took place in 1497, Ludovico came to allude to a secret relationship with Isabella, claiming that it was out of jealousy of his wife that the Marquis Francesco played a double game between him and the Lordship of Venice. The rumor was however promptly denied by his father Ercole. Others instead defined Beatrice's attitude towards her sister as "complexed second child" because in the letter of congratulations to Isabella for the birth of little Eleonora - who, being female, incredibly disappointed her mother - she added the greetings of her little son Hercules to "soa cusina", despite not having the child yet turned one year of age, something that historians such as Luciano Chiappini interpreted as a sort of mockery, of "refined malice", "a slap given with grace and grace". In fact, if Isabella was always the daughter most loved by her parents, Beatrice had been ceded to her grandfather, and only with the birth of the firstborn had she obtained her own revenge. Having also received different educations, the two sisters were the opposite of each other: Isabella, more like her mother, was sweet, graceful and a lover of tranquility; Beatrice, more like her father, was impetuous, adventurous and aggressive. However, they were united by the desire to excel in everything. A difficult marriage As the couple had known and admired one another for many years, their mutual attraction deepened into love. Reportedly, marriage to Francesco caused Isabella to "bloom". At the time of her wedding, Isabella was said to have been pretty, slim, graceful, and well-dressed. Her long, fine hair was dyed a fashionable pale blonde and her eyes were described as "brown as fir cones in autumn, scattered laughter". The relationship with her husband over the years often proved to be tense, at times very tense, both for the political differences between the two and for the difficulty in procreating a male heir. In truth, Francesco for his part was always very proud of his daughters and never showed himself disappointed, indeed from the beginning he declared himself in love with the firstborn Eleonora, born in 1493, despite the absolute disappointment of Isabella who refused her daughter, who was then very lovingly educated by her sister-in-law Elisabetta, who because of her husband's impotence never had children. When in 1496 the second daughter Margherita was born, Isabella was so angry that she wrote to her husband, who was then fighting the French in Calabria, a letter in which she blamed him, declaring that she did nothing but reap the fruits of his sown. Francis replied that he was instead very happy with the birth of his daughter - who, however, did not have time to know, having died in swaddling clothes - and indeed forbade anyone to show discontent with it. Only in 1500 was finally born the long-awaited son Federico, who was the most loved by Isabella. In his capacity of captain general of the Venetian armies, Francesco often was required to go to Venice for conferences that left Isabella in Mantua on her own at La Reggia, the ancient palace that was the family seat of the Gonzagas. She did not lack company, however, as she passed the time with her mother and with her sister, Beatrice. Upon meeting Elisabetta Gonzaga, her 18-year-old sister-in-law, the two women became close friends. They enjoyed reading books, playing cards, and travelling about the countryside together. Once they journeyed as far as Lake Garda during one of Francesco's absences, and later travelled to Venice. They maintained a steady correspondence until Elisabetta's death in 1526. Almost four years after her marriage in December 1493, Isabella gave birth to her first child out of an eventual total of eight. She was a daughter, Eleonora, whom they called Leonora for short, after Isabella's mother, Eleonora of Naples. Children Together Isabella and Francesco had eight children: Eleonora Gonzaga (31 December 1493 – 13 February 1570), married Francesco Maria I della Rovere, Duke of Urbino, by whom she had issue Margherita Gonzaga (13 July 1496 – 22 September 1496) Federico II Gonzaga, Duke of Mantua (17 May 1500 – 28 August 1540), married Margaret Paleologa, by whom he had issue Livia Gonzaga (1501 – January 1508) Ippolita Gonzaga (13 November 1503 – 16 March 1570), who became a nun Ercole Gonzaga (23 November 1505 – 2 March 1563), Cardinal, Bishop of Mantua Ferrante Gonzaga (28 January 1507 – 15 November 1557), a condottiero; married Isabella di Capua, by whom he had issue Livia Gonzaga (August 1508 – 1569), who became a nun Lucrezia Borgia A year after her 1502 marriage to Isabella's brother Alfonso, the notorious Lucrezia Borgia became the mistress of Francesco. At about the same time, Isabella had given birth to a daughter, Ippolita, and she continued to bear him children throughout Francesco and Lucrezia's long, passionate affair, which was more sexual than romantic. Lucrezia had previously made overtures of friendship to Isabella which the latter had coldly and disdainfully ignored. From the time Lucrezia had first arrived in Ferrara as Alfonso's intended bride, Isabella, despite having acted as hostess during the wedding festivities, had regarded Lucrezia as a rival, whom she sought to outdo at every opportunity. Francesco's affair with Lucrezia, whose beauty was renowned, caused Isabella much jealous suffering and emotional pain. The liaison ended when he contracted syphilis as a result of encounters with prostitutes. Regency Isabella played an important role in Mantua during troubled times for the city. When her husband was captured in 1509 and held hostage in Venice, she took control of Mantua's military forces and held off the invaders until his release in 1512. In the same year, 1512, she was the hostess at the Congress of Mantua, which was held to settle questions concerning Florence and Milan. As a ruler, she appeared to have been much more assertive and competent than her husband. When apprised of this fact upon his return, Francesco was furious and humiliated at being surpassed by his wife's superior political ability. This caused their marriage to break down irrevocably. As a result, Isabella began to travel freely and live independently from her husband until his death on 19 March 1519. After the death of her husband, Isabella ruled Mantua as regent for her son Federico. She began to play an increasingly important role in Italian politics, steadily advancing Mantua's position. She was instrumental in promoting Mantua to a Duchy, which was obtained by wise diplomatic use of her son's marriage contracts. She also succeeded in obtaining a cardinalate for her son Ercole. She further displayed shrewd political acumen in her negotiations with Cesare Borgia, who had dispossessed Guidobaldo da Montefeltro, duke of Urbino, the husband of her sister-in-law and good friend Elisabetta Gonzaga in 1502. Widowhood "Devoted head of state" As a widow, Isabella at the age of 45 became a "devoted head of state". Her position as a Marquise required her serious attention, therefore she was required to study the problems faced by a ruler of a city-state. To improve the well-being of her subjects she studied architecture, agriculture, and industry, and followed the principles that Niccolò Machiavelli had set forth for rulers in his book The Prince. In return, the people of Mantua respected and loved her. Isabella left Mantua for Rome in 1527. She was present during the catastrophic Sack of Rome, when she converted her house into an asylum for approximately 2,000 people fleeing the Imperial soldiers. Isabella's house was one of the very few that was not attacked because her son was a member of the invading army. When she left Rome, she managed to acquire safe passage for all the refugees who had sought refuge in her home. Later years and death Once Rome became stabilized following the sacking, she left the city and returned to Mantua. She made it a centre of culture, started a school for girls, and turned her ducal apartments into a museum containing the finest art treasures. This was not enough to satisfy Isabella, already in her mid-sixties, so she returned to political life and ruled Solarolo, in Romagna until her death on 13 February 1539. She was buried beside her husband in the Church of San Francesco in Mantua. Cultural pursuits Isabella d'Este is famous as the most important art patron of the Renaissance; her life is documented by her correspondence, which remains archived in Mantua (approximately 28,000 letters received and copies of approximately 12,000 letters written). Art patronage In painting she had numerous famous artists of the time work for her, including Giovanni Bellini, Giorgione, Leonardo da Vinci, Andrea Mantegna (court painter until 1506), Perugino, Raphael, Titian, Antonio da Correggio, Lorenzo Costa (court painter from 1509), Dosso Dossi, Francesco Francia, Giulio Romano, and many others. For instance her 'Studiolo' in the Ducal Palace, Mantua, was decorated with allegories by Mantegna, Perugino, Costa, and Correggio. It is suggested that she requested a specific painting for her studio from da Vinci that is known as La Scapigliata and may have given it to her son Federico II on the occasion of his wedding to Margaret Paleologa. In parallel she contracted the most important sculptors and medallists of her time, i.e. Michelangelo, Pier Jacopo Alari Bonacolsi (L'Antico), Gian Cristoforo Romano, and Tullio Lombardo. She also collected ancient Roman art. For what concerns writers, she was in contact with Pietro Aretino, Ludovico Ariosto, Pietro Bembo, Baldassare Castiglione, Mario Equicola, Gian Giorgio Trissino, and others. In music Isabella sponsored the composers Bartolomeo Tromboncino and Marco Cara and she played the lute. Unusually, she employed women as professional singers at her court, including Giovanna Moreschi, the wife of Marchetto Cara. In the architecture field, she could not afford new palaces, however she commissioned architects such as Biagio Rossetti and Battista Covo. Being a leader of fashion, she ordered the finest clothing, including furs as well as the newest distillations of perfume, from which she concocted original perfumes that she sent as presents. Her style of dressing in caps ('capigliari') and plunging décolletage was imitated throughout Italy and at
standard is a technical standard developed by one or more international standards organizations. International standards are available for consideration and use worldwide. The most prominent such organization is the International Organization for Standardization (ISO). Other prominent international standards organizations include the International Telecommunication Union (ITU) and the International Electrotecal Commission (IEC). Together, these three organizations have formed the World Standards Cooperation alliance. Purpose International standards may be used either by direct application or by a process of modifying an international standard to suit local conditions. Adopting international standards results in creating national standards that are equivalent, or substantially the same as international standards in technical content, but may have (i) editorial differences as to appearance, use of symbols and measurement units, substitution of a point for a comma as the decimal marker, and (ii) differences resulting from conflicts in government regulations or industry-specific requirements caused by fundamental climatic, geographic, technologic, or infrastructure factors, or the stringency of safety requirements that a given standard authority considers appropriate. International standards are one way to overcome technical barriers in international commerce caused by differences among technical regulations and standards developed independently and separately by each nation, national standards organization, or business. Technical barriers arise when different groups come together, each with a large user base, doing some well established thing that between them is mutually incompatible. Establishing international standards is one way of preventing or overcoming this problem. To support this, the World Trade Organization (WTO) Technical Barriers to Trade (TBT) Committee published the "Six Principles" guiding members in the development of international standards. History Standardization The implementation of standards in industry and commerce became highly important with the onset of the Industrial Revolution and the
Standardization (ISO). Other prominent international standards organizations include the International Telecommunication Union (ITU) and the International Electrotecal Commission (IEC). Together, these three organizations have formed the World Standards Cooperation alliance. Purpose International standards may be used either by direct application or by a process of modifying an international standard to suit local conditions. Adopting international standards results in creating national standards that are equivalent, or substantially the same as international standards in technical content, but may have (i) editorial differences as to appearance, use of symbols and measurement units, substitution of a point for a comma as the decimal marker, and (ii) differences resulting from conflicts in government regulations or industry-specific requirements caused by fundamental climatic, geographic, technologic, or infrastructure factors, or the stringency of safety requirements that a given standard authority considers appropriate. International standards are one way to overcome technical barriers in international commerce caused by differences among technical regulations and standards developed independently and separately by each nation, national standards organization, or business. Technical barriers arise when different groups come together, each with a large user base, doing some well established thing that between them is mutually incompatible. Establishing international standards is one way of preventing or overcoming this problem. To support this, the World Trade Organization (WTO) Technical Barriers to Trade (TBT) Committee published the "Six Principles" guiding members in the development of international standards. History Standardization The implementation of standards in industry and commerce became highly important with the onset of the Industrial Revolution and the need for high-precision machine tools and interchangeable parts. Henry Maudslay developed the first industrially practical screw-cutting lathe in 1800, which allowed for the standardisation of screw thread sizes for the first time. Maudslay's work, as well as the contributions of other engineers, accomplished a modest amount of industry standardization; some companies' in-house standards spread a bit within their industries. Joseph Whitworth's screw thread measurements were adopted as the first (unofficial) national standard by companies around the country in 1841. It came to be known as the British Standard Whitworth, and was widely adopted in other countries. By the end of the 19th century differences in standards between companies were making trade increasingly difficult and strained. The Engineering Standards Committee was established in London in 1901 as the world's first national standards body. After the First World War, similar national bodies were established in other countries. The Deutsches Institut für Normung was set up in
Irish, Latvian and Maltese texts, the ISO 4217 code is to be followed by a hard space and the amount: a sum of EUR 30 In Bulgarian, Croatian, Czech, Danish, Dutch, Estonian, Finnish, French, German, Greek, Hungarian, Italian, Lithuanian, Polish, Portuguese, Romanian, Slovak, Slovene, Spanish and Swedish the order is reversed; the amount is followed by a hard space and the ISO 4217 code: une somme de 30 EUR Note that, as illustrated, the order is determined not by the currency but by the native language of the document context. History In 1973, the ISO Technical Committee 68 decided to develop codes for the representation of currencies and funds for use in any application of trade, commerce or banking. At the 17th session (February 1978), the related UN/ECE Group of Experts agreed that the three-letter alphabetic codes for International Standard ISO 4217, "Codes for the representation of currencies and funds", would be suitable for use in international trade. Over time, new currencies are created and old currencies are discontinued. Such changes usually originate from the formation of new countries, treaties between countries on shared currencies or monetary unions, or redenomination from an existing currency due to excessive inflation. As a result, the list of codes must be updated from time to time. The ISO 4217 maintenance agency (MA), SIX Interbank Clearing, is responsible for maintaining the list of codes. Active codes The following is a list of active codes of official ISO 4217 currency names . In the standard the values are called "alphabetic code", "numeric code", "minor unit", and "entity". USD/USN, two currency codes belonging to the US The US dollar has two codes assigned: USD and USN (next day). The USS (same day) code is not in use any longer, and was removed from the list of active ISO 4217 codes in March 2014. According to UN/CEFACT recommendation 9, paragraphs 8–9 ECE/TRADE/203, 1996: 8. In applications where monetary resources associated with a currency (i.e. funds) need not be specified and where a field identifier indicating currency is used, the first two (leftmost) characters are sufficient to identify a currency—example: US for United States dollars for general, unspecified purposes where a field identifier indicating currency is present. (A field identifier can be a preprinted field heading in an aligned document or a similarly-agreed application in electronic transmission of data.) 9. In applications where there is a need to distinguish between types of currencies, or where funds are required as in the banking environment, or where there is no field identifier, the third (rightmost) character of the alphabetic code is an indicator, preferably mnemonic, derived from the name of the major currency unit or fund—example: USD for general, unspecified purposes; USN for United States dollar next-day funds, and USS for funds which are immediately available for Federal Reserve transfer, withdrawal in cash or transfer in like funds (same-day funds). Since there is no need for such a distinction in international trade applications, the funds codes have not been included in the Annex to the present Recommendation. Non ISO 4217 currencies Currencies without ISO 4217 currency codes A number of active currencies do not have an ISO 4217 code, because they may be: (1) a minor currency pegged at par (1:1) to a larger currency, even if independently regulated, (2) a currency only used for commemorative banknotes or coins, or (3) a currency of an unrecognized or partially recognized state. These currencies include: Abkhazian apsar Alderney pound (1:1 pegged to the
euro. ISO 4217 amendment 94, which created this code, states “The code element 'EU' has been reserved by the ISO 3166 Maintenance Agency for use within ISO 4217 where 'R' has been appended to make an acceptable mnemonic code.”. Here the R comes from the third letter in the word “euro”. The currency in question is replacing another currency of the same name, due to devaluation. So that the two currencies have different codes, a different third letter must be chosen for the code of the new currency. In some cases, the third letter is the initial for "new" in that country's language, to distinguish it from an older currency that was revalued; the code sometimes outlasts the usage of the term "new" itself (for example, the code for the Mexican peso is MXN). Another solution to a devalued currency having the same name as its predecessor is to choose a third letter which results in a 3-letter code with mnemonic significance. For example, the Russian ruble changed from RUR to RUB following a devaluation, where the B comes from the third letter in the word "ruble". X currencies In addition to codes for most active national currencies ISO 4217 provides codes for "supranational" currencies, procedural purposes, and several things which are "similar to" currencies: Codes for the precious metals gold (XAU), silver (XAG), palladium (XPD), and platinum (XPT) are formed by prefixing the element's chemical symbol with the letter "X". These "currency units" are denominated as one troy ounce of the specified metal as opposed to "USD 1" or "EUR 1". The code XTS is reserved for use in testing. The code XXX is used to denote a "transaction" involving no currency. There are also codes specifying certain monetary instruments used in international finance, e.g. XDR is the symbol for special drawing right issued by the International Monetary Fund. The codes for most supranational currencies, such as the East Caribbean dollar, the CFP franc, the CFA franc BEAC and the CFA franc BCEAO. The predecessor to the euro, the European Currency Unit (ECU), had the code XEU. The use of an initial letter "X" for these purposes is facilitated by the ISO 3166 rule that no official country code beginning with X will ever be assigned. The inclusion of EU (denoting the European Union) in the ISO 3166-1 reserved codes list allows the euro to be coded as EUR rather than assigned a code beginning with X, even though it is a supranational currency. Numeric codes ISO 4217 also assigns a three-digit numeric code to each currency, much like the three-digit numeric code assigned to each country by ISO 3166. The numeric code assigned to a currency by ISO 4217 is usually the same as the numeric code assigned to the corresponding country by ISO 3166-1. For example, USD (United States dollar) has numeric code 840 which is also the numeric code for the US (United States). Minor units of currency The 2008 (7th) edition of ISO 4217 says the following about minor units of currency: Examples for the ratios of 100:1 and 1 000:1 include the United States dollar and the Bahraini dinar, for which the column headed “Minor unit” shows “2” and “3”, respectively. , two currencies have non-decimal ratios, the Mauritanian ouguiya and the Malagasy ariary; in both cases the ratio is 5:1. For these, the “Minor unit” column shows the number “2”. Some currencies, such as the Burundian franc, do not in practice have any minor currency unit at all. These show the number “0”, as with currencies whose minor units are unused due to negligible value. Position of ISO 4217 code in amounts The ISO standard does not regulate either the spacing, prefixing or suffixing in usage of currency codes. According however to the European Union's Publication Office, in English, Irish, Latvian and Maltese texts, the ISO 4217 code is to be followed by a hard space and the amount: a sum of EUR 30 In Bulgarian, Croatian, Czech, Danish, Dutch, Estonian, Finnish, French, German, Greek, Hungarian, Italian, Lithuanian, Polish, Portuguese, Romanian, Slovak, Slovene, Spanish and Swedish the order is reversed; the amount is followed by a hard space and the ISO 4217 code: une somme de 30 EUR Note that, as illustrated, the order is determined not by the currency but by the native language of the document context. History In 1973, the ISO Technical Committee 68 decided to develop codes for the representation of currencies and funds for use in any application of trade, commerce or banking. At the 17th session (February 1978), the related UN/ECE Group of Experts agreed that the three-letter alphabetic codes for International Standard ISO 4217, "Codes for the representation of currencies and funds", would be suitable for use in international trade. Over time, new currencies are created and old currencies are discontinued. Such changes usually originate from the formation of new countries, treaties between countries on shared currencies or monetary unions, or redenomination from an existing currency due to excessive inflation. As a result, the list of codes must be updated from time to time. The ISO 4217 maintenance agency (MA), SIX Interbank Clearing, is responsible for maintaining the list of codes. Active codes The following is a list of active codes of official ISO 4217 currency names . In the standard the values are called "alphabetic code", "numeric code", "minor unit", and "entity". USD/USN, two currency codes belonging to the US The US dollar has two codes assigned: USD and USN (next day). The USS (same day) code is not in use any longer, and was removed from
Yaakov Meridor and a rank of High Commander (Aluf) to David Raziel. Until his death in 1940, Jabotinsky was known as the "Military Commander of the Etzel" or the Ha-Matzbi Ha-Elyon ("Supreme Commander"). Under the command of Menachem Begin, the Irgun was divided into different corps: Hayil Kravi (Combat Corps) – responsible for combat operations Delek ("Gasoline") – the intelligence section; responsible for gathering and translating intelligence, and maintaining contact with local and foreign journalists HAT (Planning Division) – responsible for planning activities HATAM (Revolutionary Publicity Corps) – responsible for printing and disseminating propaganda The Irgun's commanders planned for it to have a regular combat force, a reserve, and shock units, but in practice there were not enough personnel for a reserve or for a shock force. The Irgun emphasized that its fighters be highly disciplined. Strict drill exercises were carried out at ceremonies at different times, and strict attention was given to discipline, formal ceremonies and military relationships between the various ranks. The Irgun put out professional publications on combat doctrine, weaponry, leadership, drill exercises, etc. Among these publications were three books written by David Raziel, who had studied military history, techniques, and strategy: The Pistol (written in collaboration with Avraham Stern) The Theory of Training Parade Ground and Field Drill A British analysis noted that the Irgun's discipline was "as strict as any army in the world." The Irgun operated a sophisticated recruitment and military-training regime. Those wishing to join had to find and make contact with a member, meaning only those who personally knew a member or were persistent could find their way in. Once contact had been established, a meeting was set up with the three-member selection committee at a safe-house, where the recruit was interviewed in a darkened room, with the committee either positioned behind a screen, or with a flashlight shone into the recruit's eyes. The interviewers asked basic biographical questions, and then asked a series of questions designed to weed out romantics and adventurers and those who had not seriously contemplated the potential sacrifices. Those selected attended a four-month series of indoctrination seminars in groups of five to ten, where they were taught the Irgun's ideology and the code of conduct it expected of its members. These seminars also had another purpose - to weed out the impatient and those of flawed purpose who had gotten past the selection interview. Then, members were introduced to other members, were taught the locations of safe-houses, and given military training. Irgun recruits trained with firearms, hand grenades, and were taught how to conduct combined attacks on targets. Arms handling and tactics courses were given in clandestine training camps, while practice shooting took place in the desert or by the sea. Eventually, separate training camps were established for heavy-weapons training. The most rigorous course was the explosives course for bomb-makers, which lasted a year. The British authorities believed that some Irgun members enlisted in the Jewish section of the Palestine Police Force for a year as part of their training, during which they also passed intelligence. In addition to the Irgun's sophisticated training program, many Irgun members were veterans of the Haganah (including the Palmach), the British Armed Forces, and Jewish partisan groups that had waged guerrilla warfare in Nazi-occupied Europe, thus bringing significant military training and combat experience into the organization. The Irgun also operated a course for its intelligence operatives, in which recruits were taught espionage, cryptography, and analysis techniques. Of the Irgun's members, almost all were part-time members. They were expected to maintain their civilian lives and jobs, dividing their time between their civilian lives and underground activities. There were never more than 40 full-time members, who were given a small expense stipend on which to live on. Upon joining, every member received an underground name. The Irgun's members were divided into cells, and worked with the members of their own cells. The identities of Irgun members in other cells were withheld. This ensured that an Irgun member taken prisoner could betray no more than a few comrades. In addition to the Irgun's members in Palestine, underground Irgun cells composed of local Jews were established in Europe following World War II. An Irgun cell was also established in Shanghai, home to many European-Jewish refugees. The Irgun also set up a Swiss bank account. Eli Tavin, the former head of Irgun intelligence, was appointed commander of the Irgun abroad. In November 1947, the Jewish insurgency came to an end as the UN approved of the partition of Palestine, and the British had announced their intention to withdraw the previous month. As the British left and the 1947-48 Civil War in Mandatory Palestine got underway, the Irgun came out of the underground and began to function more as a standing army rather an underground organization. It began openly recruiting, training, and raising funds, and established bases, including training facilities. It also introduced field communications and created a medical unit and supply service.Segal, Hagai: How My Grandmother Prevented A Civil War (2014) Until World War II the group armed itself with weapons purchased in Europe, primarily Italy and Poland, and smuggled to Palestine. The Irgun also established workshops that manufactured spare parts and attachments for the weapons. Also manufactured were land mines and simple hand grenades. Another way in which the Irgun armed itself was theft of weapons from the British Police and military. Prior to World War II Founding The Irgun's first steps were in the aftermath of the Riots of 1929. In the Jerusalem branch of the Haganah there were feelings of disappointment and internal unrest towards the leadership of the movements and the Histadrut (at that time the organization running the Haganah). These feelings were a result of the view that the Haganah was not adequately defending Jewish interests in the region. Likewise, critics of the leadership spoke out against alleged failures in the number of weapons, readiness of the movement and its policy of restraint and not fighting back. On April 10, 1931, commanders and equipment managers announced that they refused to return weapons to the Haganah that had been issued to them earlier, prior to the Nebi Musa holiday. These weapons were later returned by the commander of the Jerusalem branch, Avraham Tehomi, a.k.a. "Gideon". However, the commanders who decided to rebel against the leadership of the Haganah relayed a message regarding their resignations to the Vaad Leumi, and thus this schism created a new independent movement. The leader of the new underground movement was Avraham Tehomi, alongside other founding members who were all senior commanders in the Haganah, members of Hapoel Hatzair and of the Histadrut. Also among them was Eliyahu Ben Horin, an activist in the Revisionist Party. This group was known as the "Odessan Gang", because they previously had been members of the Haganah Ha'Atzmit of Jewish Odessa. The new movement was named Irgun Tsvai Leumi, ("National Military Organization") in order to emphasize its active nature in contrast to the Haganah. Moreover, the organization was founded with the desire to become a true military organization and not just a militia as the Haganah was at the time. In the autumn of that year the Jerusalem group merged with other armed groups affiliated with Betar. The Betar groups' center of activity was in Tel Aviv, and they began their activity in 1928 with the establishment of "Officers and Instructors School of Betar". Students at this institution had broken away from the Haganah earlier, for political reasons, and the new group called itself the "National Defense", הגנה הלאומית. During the riots of 1929 Betar youth participated in the defense of Tel Aviv neighborhoods under the command of Yermiyahu Halperin, at the behest of the Tel Aviv city hall. After the riots the Tel Avivian group expanded, and was known as "The Right Wing Organization". After the Tel Aviv expansion another branch was established in Haifa. Towards the end of 1932 the Haganah branch of Safed also defected and joined the Irgun, as well as many members of the Maccabi sports association. At that time the movement's underground newsletter, Ha'Metsudah (the Fortress) also began publication, expressing the active trend of the movement. The Irgun also increased its numbers by expanding draft regiments of Betar – groups of volunteers, committed to two years of security and pioneer activities. These regiments were based in places that from which stemmed new Irgun strongholds in the many places, including the settlements of Yesod HaMa'ala, Mishmar HaYarden, Rosh Pina, Metula and Nahariya in the north; in the center – Hadera, Binyamina, Herzliya, Netanya and Kfar Saba, and south of there – Rishon LeZion, Rehovot and Ness Ziona. Later on regiments were also active in the Old City of Jerusalem ("the Kotel Brigades") among others. Primary training centers were based in Ramat Gan, Qastina (by Kiryat Mal'akhi of today) and other places. Under Tehomi's command In 1933 there were some signs of unrest, seen by the incitement of the local Arab leadership to act against the authorities. The strong British response put down the disturbances quickly. During that time the Irgun operated in a similar manner to the Haganah and was a guarding organization. The two organizations cooperated in ways such as coordination of posts and even intelligence sharing. Within the Irgun, Tehomi was the first to serve as "Head of the Headquarters" or "Chief Commander". Alongside Tehomi served the senior commanders, or "Headquarters" of the movement. As the organization grew, it was divided into district commands. In August 1933 a "Supervisory Committee" for the Irgun was established, which included representatives from most of the Zionist political parties. The members of this committee were Meir Grossman (of the Hebrew State Party), Rabbi Meir Bar-Ilan (of the Mizrachi Party), either Immanuel Neumann or Yehoshua Supersky (of the General Zionists) and Ze'ev Jabotinsky or Eliyahu Ben Horin (of Hatzohar). In protest against, and with the aim of ending Jewish immigration to Palestine, the Great Arab Revolt of 1936–1939 broke out on April 19, 1936. The riots took the form of attacks by Arab rioters ambushing main roads, bombing of roads and settlements as well as property and agriculture vandalism. In the beginning, the Irgun and the Haganah generally maintained a policy of restraint, apart from a few instances. Some expressed resentment at this policy, leading up internal unrest in the two organizations. The Irgun tended to retaliate more often, and sometimes Irgun members patrolled areas beyond their positions in order to encounter attackers ahead of time. However, there were differences of opinion regarding what to do in the Haganah, as well. Due to the joining of many Betar Youth members, Jabotinsky (founder of Betar) had a great deal of influence over Irgun policy. Nevertheless, Jabotinsky was of the opinion that for moral reasons violent retaliation was not to be undertaken. In November 1936 the Peel Commission was sent to inquire regarding the breakout of the riots and propose a solution to end the Revolt. In early 1937 there were still some in the Yishuv who felt the commission would recommend a partition of Mandatory Palestine (the land west of the Jordan River), thus creating a Jewish state on part of the land. The Irgun leadership, as well as the "Supervisory Committee" held similar beliefs, as did some members of the Haganah and the Jewish Agency. This belief strengthened the policy of restraint and led to the position that there was no room for defense institutions in the future Jewish state. Tehomi was quoted as saying: "We stand before great events: a Jewish state and a Jewish army. There is a need for a single military force". This position intensified the differences of opinion regarding the policy of restraint, both within the Irgun and within the political camp aligned with the organization. The leadership committee of the Irgun supported a merger with the Haganah. On April 24, 1937, a referendum was held among Irgun members regarding its continued independent existence. David Raziel and Avraham (Yair) Stern came out publicly in support for the continued existence of the Irgun: The Irgun has been placed ... before a decision to make, whether to submit to the authority of the government and the Jewish Agency or to prepare for a double sacrifice and endangerment. Some of our friends do not have appropriate willingness for this difficult position, and have submitted to the Jewish Agency and has left the battle ... all of the attempts ... to unite with the leftist organization have failed, because the Left entered into negotiations not on the basis of unification of forces, but the submission of one such force to the other.... The first split In April 1937 the Irgun split after the referendum. Approximately 1,500–2,000 people, about half of the Irgun's membership, including the senior command staff, regional committee members, along with most of the Irgun's weapons, returned to the Haganah, which at that time was under the Jewish Agency's leadership. The Supervisory Committee's control over the Irgun ended, and Jabotinsky assumed command. In their opinion, the removal of the Haganah from the Jewish Agency's leadership to the national institutions necessitated their return. Furthermore, they no longer saw significant ideological differences between the movements. Those who remained in the Irgun were primarily young activists, mostly laypeople, who sided with the independent existence of the Irgun. In fact, most of those who remained were originally Betar people. Moshe Rosenberg estimated that approximately 1,800 members remained. In theory, the Irgun remained an organization not aligned with a political party, but in reality the supervisory committee was disbanded and the Irgun's continued ideological path was outlined according to Ze'ev Jabotinsky's school of thought and his decisions, until the movement eventually became Revisionist Zionism's military arm. One of the major changes in policy by Jabotinsky was the end of the policy of restraint. On April 27, 1937, the Irgun founded a new headquarters, staffed by Moshe Rosenberg at the head, Avraham (Yair) Stern as secretary, David Raziel as head of the Jerusalem branch, Hanoch Kalai as commander of Haifa and Aharon Haichman as commander of Tel Aviv. On 20 Tammuz, (June 29) the day of Theodor Herzl's death, a ceremony was held in honor of the reorganization of the underground movement. For security purposes this ceremony was held at a construction site in Tel Aviv. Ze'ev Jabotinsky placed Col. Robert Bitker at the head of the Irgun. Bitker had previously served as Betar commissioner in China and had military experience. A few months later, probably due to total incompatibility with the position, Jabotinsky replaced Bitker with Moshe Rosenberg. When the Peel Commission report was published a few months later, the Revisionist camp decided not to accept the commission's recommendations. Moreover, the organizations of Betar, Hatzohar and the Irgun began to increase their efforts to bring Jews to the land of Israel, illegally. This Aliyah was known as the עליית אף על פי "Af Al Pi (Nevertheless) Aliyah". As opposed to this position, the Jewish Agency began acting on behalf of the Zionist interest on the political front, and continued the policy of restraint. From this point onwards the differences between the Haganah and the Irgun were much more obvious. Illegal immigration According to Jabotinsky's "Evacuation Plan", which called for millions of European Jews to be brought to Palestine at once, the Irgun helped the illegal immigration of European Jews to the land of Israel. This was named by Jabotinsky the "National Sport". The most significant part of this immigration prior to World War II was carried out by the Revisionist camp, largely because the Yishuv institutions and the Jewish Agency shied away from such actions on grounds of cost and their belief that Britain would in the future allow widespread Jewish immigration. The Irgun joined forces with Hatzohar and Betar in September 1937, when it assisted with the landing of a convoy of 54 Betar members at Tantura Beach (near Haifa.) The Irgun was responsible for discreetly bringing the Olim, or Jewish immigrants, to the beaches, and dispersing them among the various Jewish settlements. The Irgun also began participating in the organisation of the immigration enterprise and undertook the process of accompanying the ships. This began with the ship Draga which arrived at the coast of British Palestine in September 1938. In August of the same year, an agreement was made between Ari Jabotinsky (the son of Ze'ev Jabotinsky), the Betar representative and Hillel Kook, the Irgun representative, to coordinate the immigration (also known as Ha'apala). This agreement was also made in the "Paris Convention" in February 1939, at which Ze'ev Jabotinsky and David Raziel were present. Afterwards, the "Aliyah Center" was founded, made up of representatives of Hatzohar, Betar, and the Irgun, thereby making the Irgun a full participant in the process. The difficult conditions on the ships demanded a high level of discipline. The people on board the ships were often split into units, led by commanders. In addition to having a daily roll call and the distribution of food and water (usually very little of either), organized talks were held to provide information regarding the actual arrival in Palestine. One of the largest ships was the Sakaria, with 2,300 passengers, which equalled about 0.5% of the Jewish population in Palestine. The first vessel arrived on April 13, 1937, and the last on February 13, 1940. All told, about 18,000 Jews immigrated to Palestine with the help of the Revisionist organizations and private initiatives by other Revisionists. Most were not caught by the British. End of restraint Irgun members continued to defend settlements, but at the same time began attacks on Arab villages, thus ending the policy of restraint. These attacks were intended to instill fear in the Arab side, in order to cause the Arabs to wish for peace and quiet. In March 1938, David Raziel wrote in the underground newspaper "By the Sword" a constitutive article for the Irgun overall, in which he coined the term "Active Defense": The actions of the Haganah alone will never be a true victory. If the goal of the war is to break the will of the enemy – and this cannot be attained without destroying his spirit – clearly we cannot be satisfied with solely defensive operations.... Such a method of defense, that allows the enemy to attack at will, to reorganize and attack again ... and does not intend to remove the enemy's ability to attack a second time – is called passive defense, and ends in downfall and destruction ... whoever does not wish to be beaten has no choice but to attack. The fighting side, that does not intend to oppress but to save its liberty and honor, he too has only one way available – the way of attack. Defensiveness by way of offensiveness, in order to deprive the enemy the option of attacking, is called active defense. The first attacks began around April 1936, and by the end of World War II, more than 250 Arabs had been killed. Examples include: After an Arab shooting at Carmel school in Tel Aviv, which resulted in the death of a Jewish child, Irgun members attacked an Arab neighborhood near Kerem Hatemanim in Tel Aviv, killing one Arab man and injuring another. On August 17, the Irgun responded to shootings by Arabs from the Jaffa–Jerusalem train towards Jews that were waiting by the train block on Herzl Street in Tel Aviv. The same day, when a Jewish child was injured by the shooting, Irgun members attacked a train on the same route, killing one Arab and injuring five. During 1936, Irgun members carried out approximately ten attacks. Throughout 1937 the Irgun continued this line of operation. On March 6, a Jew at Sabbath prayers at the Western Wall was shot by a local Arab. A few hours later, the Irgun shot at an Arab in the Jerusalem neighborhood of Rechavia. On June 29, a band of Arabs attacked an Egged bus on the Jerusalem – Tel Aviv road, killing one Jew. The following day, two Jews were also killed near Karkur. A few hours later, the Irgun carried out a number of operations. An Arab bus making its way from Lifta was attacked in Jerusalem. In two other locations in Jerusalem, Arabs were shot as well. In Tel Aviv, a hand grenade was thrown at an Arab coffee shop on Carmel St., injuring many of the patrons. Irgun members also injured an Arab on Reines St. in Tel Aviv. On September 5, the Irgun responded to the murder of a rabbi on his way home from prayer in the Old City of Jerusalem by throwing explosives at an Arab bus that had left Lifta, injuring two female passengers and a British police officer. A more complete list can be found here. At that time, however, these acts were not yet a part of a formulated policy of the Irgun. Not all of the aforementioned operations received a commander's approval, and Jabotinsky was not in favor of such actions at the time. Jabotinsky still hoped to establish a Jewish force out in the open that would not have to operate underground. However, the failure, in its eyes, of the Peel Commission and the renewal of violence on the part of the Arabs caused the Irgun to rethink its official policy. Increase in operations 14 November 1937 was a watershed in Irgun activity. From that date, the Irgun increased its reprisals. Following an increase in the number of attacks aimed at Jews, including the killing of five kibbutz members near Kiryat Anavim (today kibbutz Ma'ale HaHamisha), the Irgun undertook a series of attacks in various places in Jerusalem, killing five Arabs. Operations were also undertaken in Haifa (shooting at the Arab-populated Wadi Nisnas neighborhood) and in Herzliya. The date is known as the day the policy of restraint (Havlagah) ended, or as Black Sunday when operations resulted in the murder of 10 Arabs. This is when the organization fully changed its policy, with the approval of Jabotinsky and Headquarters to the policy of "active defense" in respect of Irgun actions. The British responded with the arrest of Betar and Hatzohar members as suspected members of the Irgun. Military courts were allowed to act under "Time of Emergency Regulations" and even sentence people to death. In this manner Yehezkel Altman, a guard in a Betar battalion in the Nahalat Yizchak neighborhood of Tel Aviv, shot at an Arab bus, without his commanders' knowledge. Altman was acting in response to a shooting at Jewish vehicles on the Tel Aviv–Jerusalem road the day before. He turned himself in later and was sentenced to death, a sentence which was later commuted to a life sentence. Despite the arrests, Irgun members continued fighting. Jabotinsky lent his moral support to these activities. In a letter to Moshe Rosenberg on 18 March 1938 he wrote: Tell them: from afar I collect and save, as precious treasures, news items about your lives. I know of the obstacles that have not impeded your spirit; and I know of your actions as well. I am overjoyed that I have been blessed with such students. Although the Irgun continued activities such as these, following Rosenberg's orders, they were greatly curtailed. Furthermore, in fear of the British threat of the death sentence for anyone found carrying a weapon, all operations were suspended for eight months. However, opposition to this policy gradually increased. In April, 1938, responding to the killing of six Jews, Betar members from the Rosh Pina Brigade went on a reprisal mission, without the consent of their commander, as described by historian Avi Shlaim: On 21 April 1938, after several weeks of planning, he and two of his colleagues from the Irgun (Etzel) ambushed an Arab bus at a bend on a mountain road near Safad. They had a hand grenade, a gun and a pistol. Their plan was to destroy the engine so that the bus would fall off the side of the road and all the passengers would be killed. When the bus approached, they fired at it (not in the air, as Mailer has it) but the grenade lobbed by Ben Yosef did not detonate. The bus with its screaming and terrified passengers drove on. Although the incident ended without casualties, the three were caught, and one of them – Shlomo Ben-Yosef was sentenced to death. Demonstrations around the country, as well as pressure from institutions and people such as Dr. Chaim Weizmann and the Chief Rabbi of Mandatory Palestine, Yitzhak HaLevi Herzog did not reduce his sentence. In Shlomo Ben-Yosef's writings in Hebrew were later found: I am going to die and I am not sorry at all. Why? Because I am going to die for our country. Shlomo Ben-Yosef. On 29 June 1938 he was executed, and was the first of the Olei Hagardom. The Irgun revered him after his death and many regarded him as an example. In light of this, and due to the anger of the Irgun leadership over the decision to adopt a policy of restraint until that point, Jabotinsky relieved Rosenberg of his post and replaced him with David Raziel, who proved to be the most prominent Irgun commander until Menachem Begin. Jabotinsky simultaneously instructed the Irgun to end its policy of restraint, leading to armed offensive operations until the end of the Arab Revolt in 1939. In this time, the Irgun mounted about 40 operations against Arabs and Arab villages, for instance: After a Jewish father and son were killed in the Old City of Jerusalem, on June 6, 1938, Irgun members threw explosives from the roof of a nearby house, killing two Arabs and injuring four. The Irgun planted land mines in a number of Arab markets, primarily in places identified by the Irgun as activity centers of armed Arab gangs. Explosives detonated in the Arab souk in Jerusalem on July 15, killed ten local Arabs. In similar circumstances, 70 Arabs were killed by a land mine planted in the Arab souk in Haifa. This action led the British Parliament to discuss the disturbances in Palestine. On 23 February 1939 the Secretary of State for the Colonies, Malcolm MacDonald revealed the British intention to cancel the mandate and establish a state that would preserve Arab rights. This caused a wave of riots and attacks by Arabs against Jews. The Irgun responded four days later with a series of attacks on Arab buses and other sites. The British used military force against the Arab rioters and in the latter stages of the revolt by the Arab community in Palestine, it deteriorated into a series of internal gang wars. During the same period At the same time, the Irgun also established itself in Europe. The Irgun built underground cells that participated in organizing migration to Palestine. The cells were made up almost entirely of Betar members, and their primary activity was military training in preparation for emigration to Palestine. Ties formed with the Polish authorities brought about courses in which Irgun commanders were trained by Polish officers in advanced military issues such as guerrilla warfare, tactics and laying land mines. Avraham (Yair) Stern was notable among the cell organizers in Europe. In 1937 the Polish authorities began to deliver large amounts of weapons to the underground. According to Irgun activists Poland supplied the organization with 25,000 rifles, and additional material and weapons, by summer 1939 the Warsaw warehouses of Irgun held 5,000 rifles and 1,000 machine guns. The training and support by Poland would allow the organization to mobilize 30,000-40,000 men The transfer of handguns, rifles, explosives and ammunition stopped with the outbreak of World War II. Another field in which the Irgun operated was the training of pilots, so they could serve in the Air Force in the future war for independence, in the flight school in Lod. Towards the end of 1938 there was progress towards aligning the ideologies of the Irgun and the Haganah. Many abandoned the belief that the land would be divided and a Jewish state would soon exist. The Haganah founded פו"מ, a special operations unit, (pronounced poom), which carried out reprisal attacks following Arab violence. These operations continued into 1939. Furthermore, the opposition within the Yishuv to illegal immigration significantly decreased, and the Haganah began to bring Jews to Palestine using rented ships, as the Irgun had in the past. First operations against the British The publishing of the MacDonald White Paper of 1939 brought with it new edicts that were intended to lead to a more equitable settlement between Jews and Arabs. However, it was considered by some Jews to have an adverse effect on the continued development of the Jewish community in Palestine. Chief among these was the prohibition on selling land to Jews, and the smaller quotas for Jewish immigration. The entire Yishuv was furious at the contents of the White Paper. There were demonstrations against the "Treacherous Paper", as it was considered that it would preclude the establishment of a Jewish homeland in Palestine. Under the temporary command of Hanoch Kalai, the Irgun began sabotaging strategic infrastructure such as electricity facilities, radio and telephone lines. It also started publicizing its activity and its goals. This was done in street announcements, newspapers,
authorities believed that some Irgun members enlisted in the Jewish section of the Palestine Police Force for a year as part of their training, during which they also passed intelligence. In addition to the Irgun's sophisticated training program, many Irgun members were veterans of the Haganah (including the Palmach), the British Armed Forces, and Jewish partisan groups that had waged guerrilla warfare in Nazi-occupied Europe, thus bringing significant military training and combat experience into the organization. The Irgun also operated a course for its intelligence operatives, in which recruits were taught espionage, cryptography, and analysis techniques. Of the Irgun's members, almost all were part-time members. They were expected to maintain their civilian lives and jobs, dividing their time between their civilian lives and underground activities. There were never more than 40 full-time members, who were given a small expense stipend on which to live on. Upon joining, every member received an underground name. The Irgun's members were divided into cells, and worked with the members of their own cells. The identities of Irgun members in other cells were withheld. This ensured that an Irgun member taken prisoner could betray no more than a few comrades. In addition to the Irgun's members in Palestine, underground Irgun cells composed of local Jews were established in Europe following World War II. An Irgun cell was also established in Shanghai, home to many European-Jewish refugees. The Irgun also set up a Swiss bank account. Eli Tavin, the former head of Irgun intelligence, was appointed commander of the Irgun abroad. In November 1947, the Jewish insurgency came to an end as the UN approved of the partition of Palestine, and the British had announced their intention to withdraw the previous month. As the British left and the 1947-48 Civil War in Mandatory Palestine got underway, the Irgun came out of the underground and began to function more as a standing army rather an underground organization. It began openly recruiting, training, and raising funds, and established bases, including training facilities. It also introduced field communications and created a medical unit and supply service.Segal, Hagai: How My Grandmother Prevented A Civil War (2014) Until World War II the group armed itself with weapons purchased in Europe, primarily Italy and Poland, and smuggled to Palestine. The Irgun also established workshops that manufactured spare parts and attachments for the weapons. Also manufactured were land mines and simple hand grenades. Another way in which the Irgun armed itself was theft of weapons from the British Police and military. Prior to World War II Founding The Irgun's first steps were in the aftermath of the Riots of 1929. In the Jerusalem branch of the Haganah there were feelings of disappointment and internal unrest towards the leadership of the movements and the Histadrut (at that time the organization running the Haganah). These feelings were a result of the view that the Haganah was not adequately defending Jewish interests in the region. Likewise, critics of the leadership spoke out against alleged failures in the number of weapons, readiness of the movement and its policy of restraint and not fighting back. On April 10, 1931, commanders and equipment managers announced that they refused to return weapons to the Haganah that had been issued to them earlier, prior to the Nebi Musa holiday. These weapons were later returned by the commander of the Jerusalem branch, Avraham Tehomi, a.k.a. "Gideon". However, the commanders who decided to rebel against the leadership of the Haganah relayed a message regarding their resignations to the Vaad Leumi, and thus this schism created a new independent movement. The leader of the new underground movement was Avraham Tehomi, alongside other founding members who were all senior commanders in the Haganah, members of Hapoel Hatzair and of the Histadrut. Also among them was Eliyahu Ben Horin, an activist in the Revisionist Party. This group was known as the "Odessan Gang", because they previously had been members of the Haganah Ha'Atzmit of Jewish Odessa. The new movement was named Irgun Tsvai Leumi, ("National Military Organization") in order to emphasize its active nature in contrast to the Haganah. Moreover, the organization was founded with the desire to become a true military organization and not just a militia as the Haganah was at the time. In the autumn of that year the Jerusalem group merged with other armed groups affiliated with Betar. The Betar groups' center of activity was in Tel Aviv, and they began their activity in 1928 with the establishment of "Officers and Instructors School of Betar". Students at this institution had broken away from the Haganah earlier, for political reasons, and the new group called itself the "National Defense", הגנה הלאומית. During the riots of 1929 Betar youth participated in the defense of Tel Aviv neighborhoods under the command of Yermiyahu Halperin, at the behest of the Tel Aviv city hall. After the riots the Tel Avivian group expanded, and was known as "The Right Wing Organization". After the Tel Aviv expansion another branch was established in Haifa. Towards the end of 1932 the Haganah branch of Safed also defected and joined the Irgun, as well as many members of the Maccabi sports association. At that time the movement's underground newsletter, Ha'Metsudah (the Fortress) also began publication, expressing the active trend of the movement. The Irgun also increased its numbers by expanding draft regiments of Betar – groups of volunteers, committed to two years of security and pioneer activities. These regiments were based in places that from which stemmed new Irgun strongholds in the many places, including the settlements of Yesod HaMa'ala, Mishmar HaYarden, Rosh Pina, Metula and Nahariya in the north; in the center – Hadera, Binyamina, Herzliya, Netanya and Kfar Saba, and south of there – Rishon LeZion, Rehovot and Ness Ziona. Later on regiments were also active in the Old City of Jerusalem ("the Kotel Brigades") among others. Primary training centers were based in Ramat Gan, Qastina (by Kiryat Mal'akhi of today) and other places. Under Tehomi's command In 1933 there were some signs of unrest, seen by the incitement of the local Arab leadership to act against the authorities. The strong British response put down the disturbances quickly. During that time the Irgun operated in a similar manner to the Haganah and was a guarding organization. The two organizations cooperated in ways such as coordination of posts and even intelligence sharing. Within the Irgun, Tehomi was the first to serve as "Head of the Headquarters" or "Chief Commander". Alongside Tehomi served the senior commanders, or "Headquarters" of the movement. As the organization grew, it was divided into district commands. In August 1933 a "Supervisory Committee" for the Irgun was established, which included representatives from most of the Zionist political parties. The members of this committee were Meir Grossman (of the Hebrew State Party), Rabbi Meir Bar-Ilan (of the Mizrachi Party), either Immanuel Neumann or Yehoshua Supersky (of the General Zionists) and Ze'ev Jabotinsky or Eliyahu Ben Horin (of Hatzohar). In protest against, and with the aim of ending Jewish immigration to Palestine, the Great Arab Revolt of 1936–1939 broke out on April 19, 1936. The riots took the form of attacks by Arab rioters ambushing main roads, bombing of roads and settlements as well as property and agriculture vandalism. In the beginning, the Irgun and the Haganah generally maintained a policy of restraint, apart from a few instances. Some expressed resentment at this policy, leading up internal unrest in the two organizations. The Irgun tended to retaliate more often, and sometimes Irgun members patrolled areas beyond their positions in order to encounter attackers ahead of time. However, there were differences of opinion regarding what to do in the Haganah, as well. Due to the joining of many Betar Youth members, Jabotinsky (founder of Betar) had a great deal of influence over Irgun policy. Nevertheless, Jabotinsky was of the opinion that for moral reasons violent retaliation was not to be undertaken. In November 1936 the Peel Commission was sent to inquire regarding the breakout of the riots and propose a solution to end the Revolt. In early 1937 there were still some in the Yishuv who felt the commission would recommend a partition of Mandatory Palestine (the land west of the Jordan River), thus creating a Jewish state on part of the land. The Irgun leadership, as well as the "Supervisory Committee" held similar beliefs, as did some members of the Haganah and the Jewish Agency. This belief strengthened the policy of restraint and led to the position that there was no room for defense institutions in the future Jewish state. Tehomi was quoted as saying: "We stand before great events: a Jewish state and a Jewish army. There is a need for a single military force". This position intensified the differences of opinion regarding the policy of restraint, both within the Irgun and within the political camp aligned with the organization. The leadership committee of the Irgun supported a merger with the Haganah. On April 24, 1937, a referendum was held among Irgun members regarding its continued independent existence. David Raziel and Avraham (Yair) Stern came out publicly in support for the continued existence of the Irgun: The Irgun has been placed ... before a decision to make, whether to submit to the authority of the government and the Jewish Agency or to prepare for a double sacrifice and endangerment. Some of our friends do not have appropriate willingness for this difficult position, and have submitted to the Jewish Agency and has left the battle ... all of the attempts ... to unite with the leftist organization have failed, because the Left entered into negotiations not on the basis of unification of forces, but the submission of one such force to the other.... The first split In April 1937 the Irgun split after the referendum. Approximately 1,500–2,000 people, about half of the Irgun's membership, including the senior command staff, regional committee members, along with most of the Irgun's weapons, returned to the Haganah, which at that time was under the Jewish Agency's leadership. The Supervisory Committee's control over the Irgun ended, and Jabotinsky assumed command. In their opinion, the removal of the Haganah from the Jewish Agency's leadership to the national institutions necessitated their return. Furthermore, they no longer saw significant ideological differences between the movements. Those who remained in the Irgun were primarily young activists, mostly laypeople, who sided with the independent existence of the Irgun. In fact, most of those who remained were originally Betar people. Moshe Rosenberg estimated that approximately 1,800 members remained. In theory, the Irgun remained an organization not aligned with a political party, but in reality the supervisory committee was disbanded and the Irgun's continued ideological path was outlined according to Ze'ev Jabotinsky's school of thought and his decisions, until the movement eventually became Revisionist Zionism's military arm. One of the major changes in policy by Jabotinsky was the end of the policy of restraint. On April 27, 1937, the Irgun founded a new headquarters, staffed by Moshe Rosenberg at the head, Avraham (Yair) Stern as secretary, David Raziel as head of the Jerusalem branch, Hanoch Kalai as commander of Haifa and Aharon Haichman as commander of Tel Aviv. On 20 Tammuz, (June 29) the day of Theodor Herzl's death, a ceremony was held in honor of the reorganization of the underground movement. For security purposes this ceremony was held at a construction site in Tel Aviv. Ze'ev Jabotinsky placed Col. Robert Bitker at the head of the Irgun. Bitker had previously served as Betar commissioner in China and had military experience. A few months later, probably due to total incompatibility with the position, Jabotinsky replaced Bitker with Moshe Rosenberg. When the Peel Commission report was published a few months later, the Revisionist camp decided not to accept the commission's recommendations. Moreover, the organizations of Betar, Hatzohar and the Irgun began to increase their efforts to bring Jews to the land of Israel, illegally. This Aliyah was known as the עליית אף על פי "Af Al Pi (Nevertheless) Aliyah". As opposed to this position, the Jewish Agency began acting on behalf of the Zionist interest on the political front, and continued the policy of restraint. From this point onwards the differences between the Haganah and the Irgun were much more obvious. Illegal immigration According to Jabotinsky's "Evacuation Plan", which called for millions of European Jews to be brought to Palestine at once, the Irgun helped the illegal immigration of European Jews to the land of Israel. This was named by Jabotinsky the "National Sport". The most significant part of this immigration prior to World War II was carried out by the Revisionist camp, largely because the Yishuv institutions and the Jewish Agency shied away from such actions on grounds of cost and their belief that Britain would in the future allow widespread Jewish immigration. The Irgun joined forces with Hatzohar and Betar in September 1937, when it assisted with the landing of a convoy of 54 Betar members at Tantura Beach (near Haifa.) The Irgun was responsible for discreetly bringing the Olim, or Jewish immigrants, to the beaches, and dispersing them among the various Jewish settlements. The Irgun also began participating in the organisation of the immigration enterprise and undertook the process of accompanying the ships. This began with the ship Draga which arrived at the coast of British Palestine in September 1938. In August of the same year, an agreement was made between Ari Jabotinsky (the son of Ze'ev Jabotinsky), the Betar representative and Hillel Kook, the Irgun representative, to coordinate the immigration (also known as Ha'apala). This agreement was also made in the "Paris Convention" in February 1939, at which Ze'ev Jabotinsky and David Raziel were present. Afterwards, the "Aliyah Center" was founded, made up of representatives of Hatzohar, Betar, and the Irgun, thereby making the Irgun a full participant in the process. The difficult conditions on the ships demanded a high level of discipline. The people on board the ships were often split into units, led by commanders. In addition to having a daily roll call and the distribution of food and water (usually very little of either), organized talks were held to provide information regarding the actual arrival in Palestine. One of the largest ships was the Sakaria, with 2,300 passengers, which equalled about 0.5% of the Jewish population in Palestine. The first vessel arrived on April 13, 1937, and the last on February 13, 1940. All told, about 18,000 Jews immigrated to Palestine with the help of the Revisionist organizations and private initiatives by other Revisionists. Most were not caught by the British. End of restraint Irgun members continued to defend settlements, but at the same time began attacks on Arab villages, thus ending the policy of restraint. These attacks were intended to instill fear in the Arab side, in order to cause the Arabs to wish for peace and quiet. In March 1938, David Raziel wrote in the underground newspaper "By the Sword" a constitutive article for the Irgun overall, in which he coined the term "Active Defense": The actions of the Haganah alone will never be a true victory. If the goal of the war is to break the will of the enemy – and this cannot be attained without destroying his spirit – clearly we cannot be satisfied with solely defensive operations.... Such a method of defense, that allows the enemy to attack at will, to reorganize and attack again ... and does not intend to remove the enemy's ability to attack a second time – is called passive defense, and ends in downfall and destruction ... whoever does not wish to be beaten has no choice but to attack. The fighting side, that does not intend to oppress but to save its liberty and honor, he too has only one way available – the way of attack. Defensiveness by way of offensiveness, in order to deprive the enemy the option of attacking, is called active defense. The first attacks began around April 1936, and by the end of World War II, more than 250 Arabs had been killed. Examples include: After an Arab shooting at Carmel school in Tel Aviv, which resulted in the death of a Jewish child, Irgun members attacked an Arab neighborhood near Kerem Hatemanim in Tel Aviv, killing one Arab man and injuring another. On August 17, the Irgun responded to shootings by Arabs from the Jaffa–Jerusalem train towards Jews that were waiting by the train block on Herzl Street in Tel Aviv. The same day, when a Jewish child was injured by the shooting, Irgun members attacked a train on the same route, killing one Arab and injuring five. During 1936, Irgun members carried out approximately ten attacks. Throughout 1937 the Irgun continued this line of operation. On March 6, a Jew at Sabbath prayers at the Western Wall was shot by a local Arab. A few hours later, the Irgun shot at an Arab in the Jerusalem neighborhood of Rechavia. On June 29, a band of Arabs attacked an Egged bus on the Jerusalem – Tel Aviv road, killing one Jew. The following day, two Jews were also killed near Karkur. A few hours later, the Irgun carried out a number of operations. An Arab bus making its way from Lifta was attacked in Jerusalem. In two other locations in Jerusalem, Arabs were shot as well. In Tel Aviv, a hand grenade was thrown at an Arab coffee shop on Carmel St., injuring many of the patrons. Irgun members also injured an Arab on Reines St. in Tel Aviv. On September 5, the Irgun responded to the murder of a rabbi on his way home from prayer in the Old City of Jerusalem by throwing explosives at an Arab bus that had left Lifta, injuring two female passengers and a British police officer. A more complete list can be found here. At that time, however, these acts were not yet a part of a formulated policy of the Irgun. Not all of the aforementioned operations received a commander's approval, and Jabotinsky was not in favor of such actions at the time. Jabotinsky still hoped to establish a Jewish force out in the open that would not have to operate underground. However, the failure, in its eyes, of the Peel Commission and the renewal of violence on the part of the Arabs caused the Irgun to rethink its official policy. Increase in operations 14 November 1937 was a watershed in Irgun activity. From that date, the Irgun increased its reprisals. Following an increase in the number of attacks aimed at Jews, including the killing of five kibbutz members near Kiryat Anavim (today kibbutz Ma'ale HaHamisha), the Irgun undertook a series of attacks in various places in Jerusalem, killing five Arabs. Operations were also undertaken in Haifa (shooting at the Arab-populated Wadi Nisnas neighborhood) and in Herzliya. The date is known as the day the policy of restraint (Havlagah) ended, or as Black Sunday when operations resulted in the murder of 10 Arabs. This is when the organization fully changed its policy, with the approval of Jabotinsky and Headquarters to the policy of "active defense" in respect of Irgun actions. The British responded with the arrest of Betar and Hatzohar members as suspected members of the Irgun. Military courts were allowed to act under "Time of Emergency Regulations" and even sentence people to death. In this manner Yehezkel Altman, a guard in a Betar battalion in the Nahalat Yizchak neighborhood of Tel Aviv, shot at an Arab bus, without his commanders' knowledge. Altman was acting in response to a shooting at Jewish vehicles on the Tel Aviv–Jerusalem road the day before. He turned himself in later and was sentenced to death, a sentence which was later commuted to a life sentence. Despite the arrests, Irgun members continued fighting. Jabotinsky lent his moral support to these activities. In a letter to Moshe Rosenberg on 18 March 1938 he wrote: Tell them: from afar I collect and save, as precious treasures, news items about your lives. I know of the obstacles that have not impeded your spirit; and I know of your actions as well. I am overjoyed that I have been blessed with such students. Although the Irgun continued activities such as these, following Rosenberg's orders, they were greatly curtailed. Furthermore, in fear of the British threat of the death sentence for anyone found carrying a weapon, all operations were suspended for eight months. However, opposition to this policy gradually increased. In April, 1938, responding to the killing of six Jews, Betar members from the Rosh Pina Brigade went on a reprisal mission, without the consent of their commander, as described by historian Avi Shlaim: On 21 April 1938, after several weeks of planning, he and two of his colleagues from the Irgun (Etzel) ambushed an Arab bus at a bend on a mountain road near Safad. They had a hand grenade, a gun and a pistol. Their plan was to destroy the engine so that the bus would fall off the side of the road and all the passengers would be killed. When the bus approached, they fired at it (not in the air, as Mailer has it) but the grenade lobbed by Ben Yosef did not detonate. The bus with its screaming and terrified passengers drove on. Although the incident ended without casualties, the three were caught, and one of them – Shlomo Ben-Yosef was sentenced to death. Demonstrations around the country, as well as pressure from institutions and people such as Dr. Chaim Weizmann and the Chief Rabbi of Mandatory Palestine, Yitzhak HaLevi Herzog did not reduce his sentence. In Shlomo Ben-Yosef's writings in Hebrew were later found: I am going to die and I am not sorry at all. Why? Because I am going to die for our country. Shlomo Ben-Yosef. On 29 June 1938 he was executed, and was the first of the Olei Hagardom. The Irgun revered him after his death and many regarded him as an example. In light of this, and due to the anger of the Irgun leadership over the decision to adopt a policy of restraint until that point, Jabotinsky relieved Rosenberg of his post and replaced him with David Raziel, who proved to be the most prominent Irgun commander until Menachem Begin. Jabotinsky simultaneously instructed the Irgun to end its policy of restraint, leading to armed offensive operations until the end of the Arab Revolt in 1939. In this time, the Irgun mounted about 40 operations against Arabs and Arab villages, for instance: After a Jewish father and son were killed in the Old City of Jerusalem, on June 6, 1938, Irgun members threw explosives from the roof of a nearby house, killing two Arabs and injuring four. The Irgun planted land mines in a number of Arab markets, primarily in places identified by the Irgun as activity centers of armed Arab gangs. Explosives detonated in the Arab souk in Jerusalem on July 15, killed ten local Arabs. In similar circumstances, 70 Arabs were killed by a land mine planted in the Arab souk in Haifa. This action led the British Parliament to discuss the disturbances in Palestine. On 23 February 1939 the Secretary of State for the Colonies, Malcolm MacDonald revealed the British intention to cancel the mandate and establish a state that would preserve Arab rights. This caused a wave of riots and attacks by Arabs against Jews. The Irgun responded four days later with a series of attacks on Arab buses and other sites. The British used military force against the Arab rioters and in the latter stages of the revolt by the Arab community in Palestine, it deteriorated into a series of internal gang wars. During the same period At the same time, the Irgun also established itself in Europe. The Irgun built underground cells that participated in organizing migration to Palestine. The cells were made up almost entirely of Betar members, and their primary activity was military training in preparation for emigration to Palestine. Ties formed with the Polish authorities brought about courses in which Irgun commanders were trained by Polish officers in advanced military issues such as guerrilla warfare, tactics and laying land mines. Avraham (Yair) Stern was notable among the cell organizers in Europe. In 1937 the Polish authorities began to deliver large amounts of weapons to the underground. According to Irgun activists Poland supplied the organization with 25,000 rifles, and additional material and weapons, by summer 1939 the Warsaw warehouses of Irgun held 5,000 rifles and 1,000 machine guns. The training and support by Poland would allow the organization to mobilize 30,000-40,000 men The transfer of handguns, rifles, explosives and ammunition stopped with the outbreak of World War II. Another field in which the Irgun operated was the training of pilots, so they could serve in the Air Force in the future war for independence, in the flight school in Lod. Towards the end of 1938 there was progress towards aligning the ideologies of the Irgun and the Haganah. Many abandoned the belief that the land would be divided and a Jewish state would soon exist. The Haganah founded פו"מ, a special operations unit, (pronounced poom), which carried out reprisal attacks following Arab violence. These operations continued into 1939. Furthermore, the opposition within the Yishuv to illegal immigration significantly decreased, and the Haganah began to bring Jews to Palestine using rented ships, as the Irgun had in the past. First operations against the British The publishing of the MacDonald White Paper of 1939 brought with it new edicts that were intended to lead to a more equitable settlement between Jews and Arabs. However, it was considered by some Jews to have an adverse effect on the continued development of the Jewish community in Palestine. Chief among these was the prohibition on selling land to Jews, and the smaller quotas for Jewish immigration. The entire Yishuv was furious at the contents of the White Paper. There were demonstrations against the "Treacherous Paper", as it was considered that it would preclude the establishment of a Jewish homeland in Palestine. Under the temporary command of Hanoch Kalai, the Irgun began sabotaging strategic infrastructure such as electricity facilities, radio and telephone lines. It also started publicizing its activity and its goals. This was done in street announcements, newspapers, as well as the underground radio station Kol Zion HaLochemet. On August 26, 1939, the Irgun killed Ralph Cairns, a British police officer who, as head of the Jewish Department in the Palestine Police, had tortured a number of youths who were underground members. Cairns and Ronald Barker, another British police officer, were killed by an Irgun IED. The British increased their efforts against the Irgun. As a result, on August 31 the British police arrested members meeting in the Irgun headquarters. On the next day, September 1, 1939, World War II broke out. During World War II Following the outbreak of war, Ze'ev Jabotinsky and the New Zionist Organization voiced their support for Britain and France. In mid-September 1939 Raziel was moved from his place of detention in Tzrifin. This, among other events, encouraged the Irgun to announce a cessation of its activities against the British so as not to hinder Britain's effort to fight "the Hebrew's greatest enemy in the world – German Nazism". This announcement ended with the hope that after the war a Hebrew state would be founded "within the historical borders of the liberated homeland". After this announcement Irgun, Betar and Hatzohar members, including Raziel and the Irgun leadership, were gradually released from detention. The Irgun did not rule out joining the British army and the Jewish Brigade. Irgun members did enlist in various British units. Irgun members also assisted British forces with intelligence in Romania, Bulgaria, Morocco and Tunisia. An Irgun unit also operated in Syria and Lebanon. David Raziel later died during one of these operations. During the Holocaust, Betar members revolted numerous times against the Nazis in occupied Europe. The largest of these revolts was the Warsaw Ghetto Uprising, in which an armed underground organization fought, formed by Betar and Hatzoar and known as the Żydowski Związek Wojskowy (ŻZW) (Jewish Military Union). Despite its political origins, the ŻZW accepted members without regard to political affiliation, and had contacts established before the war with elements of the Polish military. Because of differences over objectives and strategy, the ŻZW was unable to form a common front with the mainstream ghetto fighters of the Żydowska Organizacja Bojowa, and fought independently under the military leadership of Paweł Frenkiel and the political leadership of Dawid Wdowiński. There were instances of Betar members enlisted in the British military smuggling British weapons to the Irgun. From 1939 onwards, an Irgun delegation in the United States worked for the creation of a Jewish army made up of Jewish refugees and Jews from Palestine, to fight alongside the Allied Forces. In July 1943 the "Emergency Committee to Save the Jewish People in Europe" was formed, and worked until the end of the war to rescue the Jews of Europe from the Nazis and to garner public support for a Jewish state. However, it was not until January 1944 that US President Franklin Roosevelt established the War Refugee Board, which achieved some success in saving European Jews. Second split Throughout this entire period, the British continued enforcing the White Paper's provisions, which included a ban on the sale of land, restrictions on Jewish immigration and increased vigilance against illegal immigration. Part of the reason why the British banned land sales (to anyone) was the confused state of the post Ottoman land registry; it was difficult to determine who actually owned the land that was for sale. Within the ranks of the Irgun this created much disappointment and unrest, at the center of which was disagreement with the leadership of the New Zionist Organization, David Raziel and the Irgun Headquarters. On June 18, 1939, Avraham (Yair) Stern and others of the leadership were released from prison and a rift opened between them the Irgun and Hatzohar leadership. The controversy centred on the issues of the underground movement submitting to public political leadership and fighting the British. On his release from prison Raziel resigned from Headquarters. To his chagrin, independent operations of senior members of the Irgun were carried out and some commanders even doubted Raziel's loyalty. In his place, Stern was elected to the leadership. In the past, Stern had founded secret Irgun cells in Poland without Jabotinsky's knowledge, in opposition to his wishes. Furthermore, Stern was in favor of removing the Irgun from the authority of the New Zionist Organization, whose leadership urged Raziel to return to the command of the Irgun. He finally consented. Jabotinsky wrote to Raziel and to Stern, and these letters were distributed to the branches of the Irgun: ... I call upon you: Let nothing disturb our unity. Listen to the commissioner (Raziel), whom I trust, and promise me that you and Betar, the greatest of my life's achievements, will stand strong and united and allow me to continue with the hope for victory in the war to realize our old Maccabean dream.... Stern was sent a telegram with an order to obey Raziel, who was reappointed. However, these events did not prevent the splitting of the organization. Suspicion and distrust were rampant among the members. Out of the Irgun a new organization was created on July 17, 1940, which was first named "The National Military Organization in Israel" (as opposed to the "National Military Organization in the Land of Israel") and later on changed its name to Lehi, an acronym for Lohamei Herut Israel''', "Fighters for the Freedom of Israel", (לח"י – לוחמי
and four transports) against the Aleutians, raiding Dutch Harbor on Unalaska Island and invading the more distant islands of Kiska and Attu. While Fifth Fleet attacked the Aleutians, First Mobile Force (four carriers, two battleships, three cruisers, and 12 destroyers) would attack Midway and destroy its air force. Once this was neutralized, Second Fleet (one light carrier, two battleships, 10 cruisers, 21 destroyers, and 11 transports) would land 5,000 troops to seize the atoll from the United States Marines. The seizure of Midway was expected to draw the American carriers west into a trap where the First Mobile Force would engage and destroy them. Afterwards, First Fleet (one light carrier, three battleships, one light cruiser and nine destroyers), in conjunction with elements of Second Fleet, would mop up remaining US surface forces and complete the destruction of the American Pacific Fleet. To guard against failure, Yamamoto initiated two security measures. The first was an aerial reconnaissance mission (Operation K) over Pearl Harbor to ascertain if the American carriers were there. The second was a picket line of submarines to detect the movement of enemy carriers toward Midway in time for First Mobile Force, First Fleet, and Second Fleet to combine against it. In the event, the first measure was aborted and the second delayed until after the American carriers had already sortied. The plan was a compromise and hastily prepared, apparently so it could be launched in time for the anniversary of the Battle of Tsushima, but appeared well thought out, well organized, and finely timed when viewed from a Japanese viewpoint. Against four carriers, two light carriers, seven battleships, 14 cruisers and 42 destroyers likely to be in the area of the main battle, the United States could field only three carriers, eight cruisers, and 15 destroyers. The disparity appeared crushing. Only in numbers of carrier decks, available aircraft, and submarines was there near parity between the two sides. Despite various mishaps developed in the execution, it appeared that—barring something unforeseen—Yamamoto held all the cards. Unknown to Yamamoto, the Americans had learned of Japanese plans thanks to the code breaking of Japanese naval code D (known to the US as JN-25). As a result, Admiral Chester Nimitz, the Pacific Fleet commander, was able to place his outnumbered forces in a position to conduct their own ambush. By Nimitz's calculation, his three available carrier decks, plus Midway, gave him rough parity with Nagumo's First Mobile Force. Following a nuisance raid by Japanese flying boats in May, Nimitz dispatched a minesweeper to guard the intended refueling point for Operation K near French Frigate Shoals, causing the reconnaissance mission to be aborted and leaving Yamamoto ignorant of whether the Pacific Fleet carriers were still at Pearl Harbor. It remains unclear why Yamamoto permitted the earlier attack, and why his submarines did not sortie sooner, as reconnaissance was essential to success at Midway. Nimitz also dispatched his carriers toward Midway early, and they passed the Japanese submarines en route to their picket line positions. Nimitz's carriers positioned themselves to ambush the Kidō Butai (striking force) when it struck Midway. A token cruiser and destroyer force was sent toward the Aleutians, but otherwise Nimitz ignored them. On June 4, 1942, days before Yamamoto expected them to interfere in the Midway operation, American carrier-based aircraft destroyed the four carriers of the Kidō Butai, catching the Japanese carriers at especially vulnerable times. With his air power destroyed and his forces not yet concentrated for a fleet battle, Yamamoto maneuvered his remaining forces, still strong on paper, to trap the American forces. He was unable to do so because his initial dispositions had placed his surface combatants too far from Midway, and because Admiral Raymond Spruance prudently withdrew to the east to further defend Midway Island, believing (based on a mistaken submarine report) the Japanese still intended to invade. Not knowing several battleships, including the powerful , were in the Japanese order of battle, he did not comprehend the severe risk of a night surface battle, in which his carriers and cruisers would be at a disadvantage. However, his move to the east avoided that possibility. Correctly perceiving he had lost and could not bring surface forces into action, Yamamoto withdrew. The defeat marked the high tide of Japanese expansion. Yamamoto's plan has been the subject of much criticism. Some historians state it violated the principle of concentration of force and was overly complex. Others point to similarly complex Allied operations, such as Operation MB8, that were successful, and note the extent to which the American intelligence coup derailed the operation before it began. Had Yamamoto's dispositions not denied Nagumo adequate pre-attack reconnaissance assets, both the American cryptanalytic success and the unexpected appearance of the American carriers would have been irrelevant. Actions after Midway The Battle of Midway checked Japanese momentum, but the Japanese Navy was still a powerful force, capable of regaining the initiative. It planned to resume the thrust with Operation FS, aimed at eventually taking Samoa and Fiji to cut the American lifeline to Australia. Yamamoto remained as commander-in-chief, retained at least partly to avoid diminishing the morale of the Combined Fleet. However, he had lost face as a result of the Midway defeat, and the Naval General Staff were disinclined to indulge in further gambles. This reduced Yamamoto to pursuing the classic defensive "decisive battle strategy" he had attempted to avoid. Yamamoto committed Combined Fleet units to a series of small attrition actions across the south and central Pacific that stung the Americans, but in return suffered losses he could ill afford. Three major efforts to beat the Americans moving on Guadalcanal precipitated a pair of carrier battles that Yamamoto commanded personally: the Battles of the Eastern Solomons and Santa Cruz Islands in September and October, respectively, and finally a wild pair of surface engagements in November, all timed to coincide with Japanese Army pushes. The effort was wasted when the Army could not hold up its end of the operation. Yamamoto's naval forces won a few victories and inflicted considerable losses and damage to the American fleet in several battles around Guadalcanal which included the Battles of Savo Island, Cape Esperance, and Tassafaronga, but he could never draw the United States into a decisive fleet action. As a result, Japanese naval strength declined. Death To boost morale following the defeat at Guadalcanal, Yamamoto decided to make an inspection tour throughout the South Pacific. It was during this tour that US officials decided to assassinate him. On April 14, 1943, the United States naval intelligence effort, codenamed "Magic", intercepted and decrypted a message containing specifics of Yamamoto's tour, including arrival and departure times and locations, as well as the number and types of aircraft that would transport and accompany him on the journey. Yamamoto, the itinerary revealed, would be flying from Rabaul to Balalae Airfield, on an island near Bougainville in the Solomon Islands, on the morning of April 18, 1943. President Franklin D. Roosevelt may have authorized Secretary of the Navy Frank Knox to "get Yamamoto," but no official record of such an order exists, and sources disagree whether he did so. Knox essentially let Admiral Chester W. Nimitz make the decision. Nimitz first consulted Admiral William Halsey Jr., Commander, South Pacific, and then authorized the mission on April 17 to intercept and shoot down Yamamoto's flight en route. A squadron of United States Army Air Forces Lockheed P-38 Lightning aircraft were assigned the task as only they possessed sufficient range. Select pilots from three units were informed that they were intercepting an "important high officer", with no specific name given. On the morning of April 18, despite urging by local commanders to cancel the trip for fear of ambush, Yamamoto's two Mitsubishi G4M bombers, used as fast transport aircraft without bombs, left Rabaul as scheduled for the trip. Sixteen P-38s intercepted the flight over Bougainville, and a dogfight ensued between them and the six escorting Mitsubishi A6M Zeroes. First Lieutenant Rex T. Barber engaged the first of the two Japanese transports, which turned out to be T1-323 (Yamamoto's aircraft). He fired on the aircraft until it began to spew smoke from its left engine. Barber turned away to attack the other transport as Yamamoto's plane crashed into the jungle. Yamamoto's body, along with the crash site, was found the next day in the jungle of the island of Bougainville by a Japanese search-and-rescue party, led by army engineer Lieutenant Tsuyoshi Hamasuna. According to Hamasuna, Yamamoto had been thrown clear of the plane's wreckage, his white-gloved hand grasping the hilt of his katana, still upright in his seat under a tree. Hamasuna said Yamamoto was instantly recognizable, head dipped down as if deep in thought. A post-mortem disclosed that Yamamoto had received two 0.50-caliber bullet wounds, one to the back of his left shoulder and another to the left side of his lower jaw that exited above his right eye. The Japanese navy doctor examining the body determined that the head wound had killed Yamamoto. The more violent details of Yamamoto's death were hidden from the Japanese public. The medical report was changed "on orders from above", according to biographer Hiroyuki Agawa.Agawa 2000, p. 364 Yamamoto's staff cremated his remains at Buin, Papua New Guinea, and his ashes were returned to Tokyo aboard the battleship , his last flagship. He was given a full state funeral on June 5, 1943, where he received, posthumously, the title of Marshal Admiral and was awarded the Order of the Chrysanthemum (1st Class). He was also awarded Nazi Germany's Knight's Cross of the Iron Cross with Oak Leaves and Swords. Some of his ashes were buried in the public Tama Cemetery, Tokyo (多摩霊園) and the remainder at his ancestral burial grounds at the temple of Chuko-ji in Nagaoka City. He was succeeded as commander-in-chief of the Combined Fleet by Admiral Mineichi Koga. Personal life Yamamoto practiced calligraphy. He and his wife, Reiko, had four children: two sons and two daughters. Yamamoto was an avid gambler, enjoying Go, shogi, billiards, bridge, mahjong, poker, and other games that tested his wits and sharpened his mind. He frequently made jokes about moving to Monaco and starting his own casino. He enjoyed the company of geisha, and his wife Reiko revealed to the Japanese public in 1954 that Yamamoto was closer to his favorite geisha Kawai Chiyoko than to her, which stirred some controversy. His funeral procession passed by Kawai's quarters on the way to the cemetery. The claim that Yamamoto was a Catholic is likely due to confusion with retired Admiral Shinjiro Stefano Yamamoto, who was a decade older than Isoroku, and died in 1942. Decorations Grand Cordon of the Order of the Chrysanthemum (posthumous appointment, 18 April 1943) Grand Cordon of the Order of the Rising Sun with Paulownia Flowers (4 April 1942) Grand Cordon of the Order of the Rising Sun (29 April 1940) Grand Cordon of the Order of the Sacred Treasure (23 March 1939; Second Class: 31 October 1931) Order of the Golden Kite (1st class: 18 April 1943 (posthumous); Second Class: 4 April 1942) Grand Cross of the Order of the German Eagle (Nazi Germany, 9 February 1940) Knight's Cross of the Iron Cross with Oak Leaves and Swords (Nazi Germany, 27 May 1943 (posthumous)) Dates of rank Midshipman—November 14, 1904 Ensign—August 31, 1905 Sublieutenant—September 28, 1907 Lieutenant—October 11, 1909 Lieutenant Commander—December 13, 1915 Commander—December 1, 1919 Captain—December 1, 1923 Rear
struck Tokyo and surrounding areas, demonstrating the threat posed by American aircraft carriers, and giving Yamamoto an event he could exploit to get his way, and further debate over military strategy came to a quick end. The Naval General Staff agreed to Yamamoto's Midway Island (MI) Operation, subsequent to the first phase of the operations against Australia's link with America, and concurrent with its plan to invade the Aleutian Islands. Yamamoto rushed planning for the Midway and Aleutians missions, while dispatching a force under Vice Admiral Takeo Takagi, including the Fifth Carrier Division (the large new carriers and ), to support the effort to seize the islands of Tulagi and Guadalcanal for seaplane and airplane bases, and the town of Port Moresby on Papua New Guinea's south coast facing Australia. The Port Moresby (MO) Operation proved an unwelcome setback. Although Tulagi and Guadalcanal were taken, the Port Moresby invasion fleet was compelled to turn back when Takagi clashed with an American carrier task force in the Battle of the Coral Sea in early May. Although the Japanese sank the carrier and damaged the , the Americans damaged the carrier Shōkaku so badly that she required dockyard repairs, and the Japanese lost the light carrier . Just as importantly, Japanese operational mishaps and American fighters and anti-aircraft fire devastated the dive bomber and torpedo plane formations of both Shōkakus and Zuikakus air groups. These losses sidelined Zuikaku while she awaited replacement aircraft and aircrews, and saw to tactical integration and training. These two ships would be sorely missed a month later at Midway. Battle of Midway, June 1942 Yamamoto's plan for Midway Island was an extension of his efforts to knock the American Pacific Fleet out of action long enough for Japan to fortify its defensive perimeter in the Pacific island chains. Yamamoto felt it necessary to seek an early, offensive decisive battle. This plan was long believed to have been to draw American attention—and possibly carrier forces—north from Pearl Harbor by sending his Fifth Fleet (one carrier, one light carrier, four battleships, eight cruisers, 25 destroyers, and four transports) against the Aleutians, raiding Dutch Harbor on Unalaska Island and invading the more distant islands of Kiska and Attu. While Fifth Fleet attacked the Aleutians, First Mobile Force (four carriers, two battleships, three cruisers, and 12 destroyers) would attack Midway and destroy its air force. Once this was neutralized, Second Fleet (one light carrier, two battleships, 10 cruisers, 21 destroyers, and 11 transports) would land 5,000 troops to seize the atoll from the United States Marines. The seizure of Midway was expected to draw the American carriers west into a trap where the First Mobile Force would engage and destroy them. Afterwards, First Fleet (one light carrier, three battleships, one light cruiser and nine destroyers), in conjunction with elements of Second Fleet, would mop up remaining US surface forces and complete the destruction of the American Pacific Fleet. To guard against failure, Yamamoto initiated two security measures. The first was an aerial reconnaissance mission (Operation K) over Pearl Harbor to ascertain if the American carriers were there. The second was a picket line of submarines to detect the movement of enemy carriers toward Midway in time for First Mobile Force, First Fleet, and Second Fleet to combine against it. In the event, the first measure was aborted and the second delayed until after the American carriers had already sortied. The plan was a compromise and hastily prepared, apparently so it could be launched in time for the anniversary of the Battle of Tsushima, but appeared well thought out, well organized, and finely timed when viewed from a Japanese viewpoint. Against four carriers, two light carriers, seven battleships, 14 cruisers and 42 destroyers likely to be in the area of the main battle, the United States could field only three carriers, eight cruisers, and 15 destroyers. The disparity appeared crushing. Only in numbers of carrier decks, available aircraft, and submarines was there near parity between the two sides. Despite various mishaps developed in the execution, it appeared that—barring something unforeseen—Yamamoto held all the cards. Unknown to Yamamoto, the Americans had learned of Japanese plans thanks to the code breaking of Japanese naval code D (known to the US as JN-25). As a result, Admiral Chester Nimitz, the Pacific Fleet commander, was able to place his outnumbered forces in a position to conduct their own ambush. By Nimitz's calculation, his three available carrier decks, plus Midway, gave him rough parity with Nagumo's First Mobile Force. Following a nuisance raid by Japanese flying boats in May, Nimitz dispatched a minesweeper to guard the intended refueling point for Operation K near French Frigate Shoals, causing the reconnaissance mission to be aborted and leaving Yamamoto ignorant of whether the Pacific Fleet carriers were still at Pearl Harbor. It remains unclear why Yamamoto permitted the earlier attack, and why his submarines did not sortie sooner, as reconnaissance was essential to success at Midway. Nimitz also dispatched his carriers toward Midway early, and they passed the Japanese submarines en route to their picket line positions. Nimitz's carriers positioned themselves to ambush the Kidō Butai (striking force) when it struck Midway. A token cruiser and destroyer force was sent toward the Aleutians, but otherwise Nimitz ignored them. On June 4, 1942, days before Yamamoto expected them to interfere in the Midway operation, American carrier-based aircraft destroyed the four carriers of the Kidō Butai, catching the Japanese carriers at especially vulnerable times. With his air power destroyed and his forces not yet concentrated for a fleet battle, Yamamoto maneuvered his remaining forces, still strong on paper, to trap the American forces. He was unable to do so because his initial dispositions had placed his surface combatants too far from Midway, and because Admiral Raymond Spruance prudently withdrew to the east to further defend Midway Island, believing (based on a mistaken submarine report) the Japanese still intended to invade. Not knowing several battleships, including the powerful , were in the Japanese order of battle, he did not comprehend the severe risk of a night surface battle, in which his carriers and cruisers would be at a disadvantage. However, his move to the east avoided that possibility. Correctly perceiving he had lost and could not bring surface forces into action, Yamamoto withdrew. The defeat marked the high tide of Japanese expansion. Yamamoto's plan has been the subject of much criticism. Some historians state it violated the principle of concentration of force and was overly complex. Others point to similarly complex Allied operations, such as Operation MB8, that were successful, and note the extent to which the American intelligence coup derailed the operation before it began. Had Yamamoto's dispositions not denied Nagumo adequate pre-attack reconnaissance assets, both the American cryptanalytic success and the unexpected appearance of the American carriers would have been irrelevant. Actions after Midway The Battle of Midway checked Japanese momentum, but the Japanese Navy was still a powerful force, capable of regaining the initiative. It planned to resume the thrust with Operation FS, aimed at eventually taking Samoa and Fiji to cut the American lifeline to Australia. Yamamoto remained as commander-in-chief, retained at least partly to avoid diminishing the morale of the Combined Fleet. However, he had lost face as a result of the Midway defeat, and the Naval General Staff were disinclined to indulge in further gambles. This reduced Yamamoto to pursuing the classic defensive "decisive battle strategy" he had attempted to avoid. Yamamoto committed Combined Fleet units to a series of small attrition actions across the south and central Pacific that stung the Americans, but in return suffered losses he could ill afford. Three major efforts to beat the Americans moving on Guadalcanal precipitated a pair of carrier battles that Yamamoto commanded personally: the Battles of the Eastern Solomons and Santa Cruz Islands in September and October, respectively, and finally a wild pair of surface engagements in November, all timed to coincide with Japanese Army pushes. The effort was wasted when the Army could not hold up its end of the operation. Yamamoto's naval forces won a few victories and inflicted considerable losses and damage to the American fleet in several battles around Guadalcanal which included the Battles of Savo Island, Cape Esperance, and Tassafaronga, but he could never draw the United States into a decisive fleet action. As a result, Japanese naval strength declined. Death To boost morale following the defeat at Guadalcanal, Yamamoto decided to make an inspection tour throughout the South Pacific. It was during this tour that US officials decided to assassinate him. On April 14, 1943, the United States naval intelligence effort, codenamed "Magic", intercepted and decrypted a message containing specifics of Yamamoto's tour, including arrival and departure times and locations, as well as the number and types of aircraft that would transport and accompany him on the journey. Yamamoto, the itinerary revealed, would be flying from Rabaul to Balalae Airfield, on an island near Bougainville in the Solomon Islands, on the morning of April 18, 1943. President Franklin D. Roosevelt may have authorized Secretary of the Navy Frank Knox to "get Yamamoto," but no official record of such an order exists, and sources disagree whether he did so. Knox essentially let Admiral Chester W. Nimitz make the decision. Nimitz first consulted Admiral William Halsey Jr., Commander, South Pacific, and then authorized the mission on April 17 to intercept and shoot down Yamamoto's flight en route. A squadron of United States Army Air Forces Lockheed P-38 Lightning aircraft were assigned the task as only they possessed sufficient range. Select pilots from three units were informed that they were intercepting an "important high officer", with no specific name given. On the morning of April 18, despite urging by local commanders to cancel the trip for fear of ambush, Yamamoto's two Mitsubishi G4M bombers, used as fast transport aircraft without bombs, left Rabaul as scheduled for the trip. Sixteen P-38s intercepted the flight over Bougainville, and a dogfight ensued between them and the six escorting Mitsubishi A6M Zeroes. First Lieutenant Rex T. Barber engaged the first of the two Japanese transports, which turned out to be T1-323 (Yamamoto's aircraft). He fired on the aircraft until it began to spew smoke from its left engine. Barber turned away to attack the other transport as Yamamoto's plane crashed into the jungle. Yamamoto's body, along with the crash site, was found the next day in the jungle of the island of Bougainville by a Japanese search-and-rescue party, led by army engineer Lieutenant Tsuyoshi Hamasuna. According to Hamasuna, Yamamoto had been thrown clear of the plane's wreckage, his white-gloved hand grasping the hilt of his katana, still upright in his seat under a tree. Hamasuna said Yamamoto was instantly recognizable, head dipped down as if deep in thought. A post-mortem disclosed that Yamamoto had received two 0.50-caliber bullet wounds, one to the back of his left shoulder and another to the left side of his lower jaw that exited above his right eye. The Japanese navy doctor examining the body determined that the head wound had killed Yamamoto. The more violent details of Yamamoto's death were hidden from the Japanese public. The medical report was changed "on orders from above", according to biographer Hiroyuki Agawa.Agawa 2000, p. 364 Yamamoto's staff cremated his remains at Buin, Papua New Guinea, and his ashes were returned to Tokyo aboard the battleship , his last flagship. He was given a full state funeral on June 5, 1943, where he received, posthumously, the title of Marshal Admiral and was awarded the Order of the Chrysanthemum (1st Class). He was also awarded Nazi Germany's Knight's Cross of the Iron Cross with Oak Leaves and Swords. Some of his ashes were buried in the public Tama Cemetery, Tokyo (多摩霊園) and the remainder at his ancestral burial grounds at the temple of Chuko-ji in Nagaoka City. He was succeeded as commander-in-chief of the Combined Fleet by Admiral Mineichi Koga. Personal life Yamamoto practiced calligraphy. He and his wife, Reiko, had four children: two sons and two daughters. Yamamoto was an avid gambler, enjoying Go, shogi, billiards, bridge, mahjong, poker, and other games that tested his wits and sharpened his mind. He frequently made jokes about moving to Monaco and starting his own casino. He enjoyed the company of geisha, and his wife Reiko revealed to the Japanese public in 1954 that Yamamoto was closer to his favorite geisha Kawai Chiyoko than to her, which stirred some controversy. His funeral procession passed by Kawai's quarters on the way to the cemetery. The claim that Yamamoto was a Catholic is likely due to confusion with retired Admiral Shinjiro Stefano Yamamoto, who was a decade older than Isoroku, and died in 1942. Decorations Grand Cordon of the Order of the Chrysanthemum (posthumous appointment, 18 April 1943) Grand Cordon of the Order of the Rising Sun with Paulownia Flowers (4 April 1942) Grand Cordon of the Order of the Rising Sun (29 April 1940) Grand Cordon of the Order of the Sacred Treasure (23 March 1939; Second Class: 31 October 1931) Order of the Golden Kite (1st class: 18 April 1943 (posthumous); Second Class: 4 April 1942) Grand Cross of the Order of the German Eagle (Nazi Germany, 9 February 1940) Knight's Cross of the Iron Cross with Oak Leaves and Swords (Nazi Germany, 27 May 1943 (posthumous)) Dates of rank Midshipman—November 14, 1904 Ensign—August 31, 1905 Sublieutenant—September 28, 1907 Lieutenant—October 11, 1909 Lieutenant Commander—December 13, 1915 Commander—December 1, 1919 Captain—December 1, 1923 Rear Admiral—November 30, 1929 Vice Admiral—November 15, 1934 Admiral—November 15, 1940 Marshal-Admiral—April 18, 1943 (posthumous) In popular culture Since the end of the Second World War, a number of Japanese and American films have depicted the character of Isoroku Yamamoto. One of the most notable films is the 1970 movie Tora! Tora! Tora!, which stars Japanese actor Sô Yamamura as Yamamoto, who states after the attack on Pearl Harbor: The first film to feature Yamamoto was Toho's 1953 film Taiheiyô no washi, (later released in the United States as Eagle of the Pacific), in which Yamamoto was portrayed by Denjirô Ôkôchi. The 1960 film The Gallant Hours depicts the battle of wits between Vice-Admiral William Halsey, Jr. and Yamamoto from the start of the Guadalcanal Campaign in August 1942 to Yamamoto's death in April 1943. The film, however, portrays Yamamoto's death as occurring in November 1942, the day after the Naval Battle of Guadalcanal, and the P-38 aircraft that killed him as coming from Guadalcanal. In Daiei Studios's 1969 film Aa, kaigun (later released in the United States as Gateway to Glory), Yamamoto was portrayed by Shôgo Shimada.Gateway to Glory (1970). Turner Classic Movies. Professional wrestler Harold Watanabe adopted the villainous Japanese gimmick of Tojo Yamamoto in reference to both Yamamoto and Hideki Tojo Award-winning Japanese actor Toshiro Mifune (star of The Seven Samurai) portrayed Yamamoto in three films: Rengō Kantai Shirei Chōkan: Yamamoto Isoroku (1968, later released in Canada and the United States as Admiral Yamamoto), Gekido no showashi 'Gunbatsu' (1970, lit. "Turning Point of Showa History: The Militarists"), and Midway (1976, where all of the Japanese scenes had English dialogue). A fictionalized version of Yamamoto's death was portrayed in the Baa Baa Black Sheep episode "The Hawk Flies on Sunday", though only photos of Yamamoto were shown. In this episode, set much later in the war than in real life, the Black Sheep, a Marine Corsair squadron, joins an army squadron of P-51 Mustangs. The Marines intercepted fighter cover while the army shot down Yamamoto. In Shūe Matsubayashi's 1981 film Rengō kantai (lit. "Combined Fleet", later released in the United States as The Imperial Navy), Yamamoto was portrayed by Keiju Kobayashi. In the 1993 OVA series Konpeki no Kantai (lit. Deep Blue Fleet), instead of dying in the plane crash, Yamamoto blacks out and suddenly wakes up as his younger self, Isoroku Takano, after the Battle of Tsushima in 1905. His memory from the original timeline intact, Yamamoto uses his knowledge of the future to help Japan become a stronger military power, eventually launching a coup d'état against Hideki Tōjō's government. In the subsequent Pacific War, Japan's technologically advanced navy decisively defeats the United States, and grants all of the former European and American colonies in Asia full independence. Later on, Yamamoto convinces Japan to join forces with the United States and Britain to defeat Nazi Germany. The series was criticized outside Japan as a whitewash of Imperial Japan’s intentions towards its neighbors, and distancing itself from the wartime alliance with Nazi Germany. In Neal Stephenson's 1999 book Cryptonomicon, Yamamoto's final moments are depicted, with him realizing that Japan's naval codes have been broken and that he must inform headquarters. In the 2001 film Pearl Harbor, Yamamoto was portrayed by Oscar-nominated Japanese-born American actor Mako Iwamatsu. Like Tora! Tora! Tora!, this film also features a version of the sleeping giant quote. In the 2004 anime series Zipang, Yamamoto (voiced by Bunmei Tobayama) works to develop the uneasy partnership with the crew of the JMSDF Mirai, which has been transported back sixty years through time to the year 1942. In the Axis of Time trilogy by author John Birmingham, after a naval task force from the year 2021 is accidentally transported back through time to 1942, Yamamoto assumes a leadership role in the dramatic alteration of Japan's war strategy. In The West Wing episode "We Killed Yamamoto", the Chairman of the Joint Chiefs of Staff uses the assassination of Yamamoto to advocate for another assassination. In Douglas Niles' 2007 book MacArthur's War: A Novel of the Invasion of Japan (written with Michael Dobson), which focuses on General Douglas MacArthur and an alternate history of the Pacific War (following a considerably different outcome of the Battle of Midway), Yamamoto is portrayed sympathetically, with much of the action in the Japanese government seen through his eyes, though he could not change the major decisions of Japan in World War II. In Toei's 2011 war film Rengō Kantai Shirei Chōkan: Yamamoto Isoroku (Blu-Ray titles:- English "The Admiral"; German "Der Admiral"), Yamamoto was portrayed by Kōji Yakusho. The film portrays his career from Pearl Harbor to his death in Operation Vengeance. In Robert Conroy's 2011 book Rising Sun, Yamamoto directs the IJN to launch a series of attacks on the American West Coast, in the hope the United States can be convinced to sue for peace and securing Japan's place as a world power; but cannot escape his lingering fear the war will ultimately doom Japan. In the 2019 motion picture Midway, Yamamoto is portrayed by Etsushi Toyokawa. Notes Sources Agawa, Hiroyuki; Bester, John (trans.). The Reluctant Admiral. New York: Kodansha, 1979. . A definitive biography of Yamamoto in English. This book explains much of the political structure and events within Japan that led to the war. - Total pages: 994 Davis, Donald A. Lightning Strike: The Secret Mission to Kill Admiral Yamamoto and Avenge Pearl Harbor. New York: St. Martin's Press, 2005. . Dull, Paul S. A Battle History of the Imperial Japanese Navy, 1941–1945. Annapolis, Maryland: Naval Institute Press, 1978. . Evans, David C. and Mark R. Peattie. Kaigun: Strategy, Tactics, and Technology in the Imperial Japanese Navy 1887–1941. Annapolis, Maryland: Naval Institute Press, 1997. . Glines, Carroll V. Attack on Yamamoto (1st edition). New York: Crown, 1990. . Glines documents both the mission to shoot down Yamamoto and the subsequent controversies with thorough research, including personal interviews with all surviving participants and researchers who examined the crash site. Lundstrom, John B. The First Team: Pacific Naval Air Combat from Pearl Harbor to Midway. Annapolis, Maryland: Naval Institute Press, 1984. . Miller, Edward S. War Plan Orange: The U.S. Strategy to Defeat Japan, 1897–1945. Annapolis, Maryland: Naval Institute Press, 1991. . Peattie, Mark R. Sunburst: The Rise of Japanese Naval Air Power, 1909–1941. Annapolis, Maryland: Naval Institute Press, 2002. . Prados, John. Combined Fleet Decoded: The Secret History of American Intelligence and the Japanese Navy in World War II. Annapolis, Maryland: Naval Institute Press, 2001. . Prange,
the simplest distortions of the molecule, from the ground state with vibrational quantum number v = 0 to the first excited state with vibrational quantum number v = 1. In some cases, overtone bands are observed. An overtone band arises from the absorption of a photon leading to a direct transition from the ground state to the second excited vibrational state (v = 2). Such a band appears at approximately twice the energy of the fundamental band for the same normal mode. Some excitations, so-called combination modes, involve simultaneous excitation of more than one normal mode. The phenomenon of Fermi resonance can arise when two modes are similar in energy; Fermi resonance results in an unexpected shift in energy and intensity of the bands etc. Practical IR spectroscopy The infrared spectrum of a sample is recorded by passing a beam of infrared light through the sample. When the frequency of the IR is the same as the vibrational frequency of a bond or collection of bonds, absorption occurs. Examination of the transmitted light reveals how much energy was absorbed at each frequency (or wavelength). This measurement can be achieved by scanning the wavelength range using a monochromator. Alternatively, the entire wavelength range is measured using a Fourier transform instrument and then a transmittance or absorbance spectrum is generated using a dedicated procedure. This technique is commonly used for analyzing samples with covalent bonds. Simple spectra are obtained from samples with few IR active bonds and high levels of purity. More complex molecular structures lead to more absorption bands and more complex spectra. Sample preparation Gas samples Gaseous samples require a sample cell with a long pathlength to compensate for the diluteness. The pathlength of the sample cell depends on the concentration of the compound of interest. A simple glass tube with length of 5 to 10 cm equipped with infrared-transparent windows at both ends of the tube can be used for concentrations down to several hundred ppm. Sample gas concentrations well below ppm can be measured with a White's cell in which the infrared light is guided with mirrors to travel through the gas. White's cells are available with optical pathlength starting from 0.5 m up to hundred meters. Liquid samples Liquid samples can be sandwiched between two plates of a salt (commonly sodium chloride, or common salt, although a number of other salts such as potassium bromide or calcium fluoride are also used). The plates are transparent to the infrared light and do not introduce any lines onto the spectra. Solid samples Solid samples can be prepared in a variety of ways. One common method is to crush the sample with an oily mulling agent (usually mineral oil Nujol). A thin film of the mull is applied onto salt plates and measured. The second method is to grind a quantity of the sample with a specially purified salt (usually potassium bromide) finely (to remove scattering effects from large crystals). This powder mixture is then pressed in a mechanical press to form a translucent pellet through which the beam of the spectrometer can pass. A third technique is the "cast film" technique, which is used mainly for polymeric materials. The sample is first dissolved in a suitable, non-hygroscopic solvent. A drop of this solution is deposited on surface of KBr or NaCl cell. The solution is then evaporated to dryness and the film formed on the cell is analysed directly. Care is important to ensure that the film is not too thick otherwise light cannot pass through. This technique is suitable for qualitative analysis. The final method is to use microtomy to cut a thin (20–100 μm) film from a solid sample. This is one of the most important ways of analysing failed plastic products for example because the integrity of the solid is preserved. In photoacoustic spectroscopy the need for sample treatment is minimal. The sample, liquid or solid, is placed into the sample cup which is inserted into the photoacoustic cell which is then sealed for the measurement. The sample may be one solid piece, powder or basically in any form for the measurement. For example, a piece of rock can be inserted into the sample cup and the spectrum measured from it. Comparing to a reference It is typical to record spectrum of both the sample and a "reference". This step controls for a number of variables, e.g. infrared detector, which may affect the spectrum. The reference measurement makes it possible to eliminate the instrument influence. The appropriate "reference" depends on the measurement and its goal. The simplest reference measurement is to simply remove the sample (replacing it by air). However, sometimes a different reference is more useful. For example, if the sample is a dilute solute dissolved in water in a beaker, then a good reference measurement might be to measure pure water in the same beaker. Then the reference measurement would cancel out not only all the instrumental properties (like what light source is used), but also the light-absorbing and light-reflecting properties of the water and beaker, and the final result would just show the properties of the solute (at least approximately). A common way to compare to a reference is sequentially: first measure the reference, then replace the reference by the sample and measure the sample. This technique is not perfectly reliable; if the infrared lamp is a bit brighter during the reference measurement, then a bit dimmer during the sample measurement, the measurement will be distorted. More elaborate methods, such as a "two-beam" setup (see figure), can correct for these types of effects to give very accurate results. The Standard addition method can be used to statistically cancel these errors. Nevertheless, among different absorption based techniques which are used for gaseous species detection, Cavity ring-down spectroscopy (CRDS) can be used as a calibration free method. The fact that CRDS is based on the measurements of photon life-times (and not the laser intensity) makes it needless for any calibration and comparison with a reference FTIR Fourier transform infrared (FTIR) spectroscopy is a measurement technique that allows one to record infrared spectra. Infrared light is guided through an interferometer and then through the sample (or vice versa). A moving mirror inside the apparatus alters the distribution of infrared light that passes through the interferometer. The signal directly recorded, called an "interferogram", represents light output as a function of mirror position. A data-processing technique called Fourier transform turns this raw data into the desired result (the sample's spectrum): Light output as a function of infrared wavelength (or equivalently, wavenumber). As described above, the sample's spectrum is always compared to a reference. An alternate method for acquiring spectra is the "dispersive" or "scanning monochromator" method. In this approach, the sample is irradiated sequentially with various single wavelengths. The dispersive method is more common in UV-Vis spectroscopy, but is less practical in the infrared than the FTIR method. One reason that FTIR is favored is called "Fellgett's advantage" or the "multiplex advantage": The information at all frequencies is collected simultaneously, improving both speed and signal-to-noise ratio. Another is called "Jacquinot's Throughput Advantage": A dispersive measurement requires detecting much lower light levels than an FTIR measurement. There are other advantages, as well as some disadvantages, but virtually all modern infrared spectrometers are FTIR instruments. Infrared microscopy Various forms of infrared microscopy exist. These include IR versions of sub-diffraction microscopy such as IR NSOM, photothermal microspectroscopy, Nano-FTIR and atomic force microscope based infrared spectroscopy (AFM-IR). Other methods in molecular vibrational spectroscopy Infrared spectroscopy is not the only method of studying molecular vibrational spectra. Raman spectroscopy involves an inelastic scattering process in which only part of the energy of an incident photon is absorbed by the molecule, and the remaining part is scattered and detected. The energy difference corresponds to absorbed vibrational energy. The selection rules for infrared and for Raman spectroscopy are different at least for some molecular symmetries, so that the two methods are complementary in that they observe vibrations of different symmetries. Another method is electron energy loss spectroscopy (EELS), in which the energy absorbed is provided by an inelastically scattered electron rather than a photon. This method is useful for studying vibrations of molecules adsorbed on a solid surface. Recently, high-resolution EELS (HREELS) has emerged as a technique for performing vibrational spectroscopy in a transmission
film from a solid sample. This is one of the most important ways of analysing failed plastic products for example because the integrity of the solid is preserved. In photoacoustic spectroscopy the need for sample treatment is minimal. The sample, liquid or solid, is placed into the sample cup which is inserted into the photoacoustic cell which is then sealed for the measurement. The sample may be one solid piece, powder or basically in any form for the measurement. For example, a piece of rock can be inserted into the sample cup and the spectrum measured from it. Comparing to a reference It is typical to record spectrum of both the sample and a "reference". This step controls for a number of variables, e.g. infrared detector, which may affect the spectrum. The reference measurement makes it possible to eliminate the instrument influence. The appropriate "reference" depends on the measurement and its goal. The simplest reference measurement is to simply remove the sample (replacing it by air). However, sometimes a different reference is more useful. For example, if the sample is a dilute solute dissolved in water in a beaker, then a good reference measurement might be to measure pure water in the same beaker. Then the reference measurement would cancel out not only all the instrumental properties (like what light source is used), but also the light-absorbing and light-reflecting properties of the water and beaker, and the final result would just show the properties of the solute (at least approximately). A common way to compare to a reference is sequentially: first measure the reference, then replace the reference by the sample and measure the sample. This technique is not perfectly reliable; if the infrared lamp is a bit brighter during the reference measurement, then a bit dimmer during the sample measurement, the measurement will be distorted. More elaborate methods, such as a "two-beam" setup (see figure), can correct for these types of effects to give very accurate results. The Standard addition method can be used to statistically cancel these errors. Nevertheless, among different absorption based techniques which are used for gaseous species detection, Cavity ring-down spectroscopy (CRDS) can be used as a calibration free method. The fact that CRDS is based on the measurements of photon life-times (and not the laser intensity) makes it needless for any calibration and comparison with a reference FTIR Fourier transform infrared (FTIR) spectroscopy is a measurement technique that allows one to record infrared spectra. Infrared light is guided through an interferometer and then through the sample (or vice versa). A moving mirror inside the apparatus alters the distribution of infrared light that passes through the interferometer. The signal directly recorded, called an "interferogram", represents light output as a function of mirror position. A data-processing technique called Fourier transform turns this raw data into the desired result (the sample's spectrum): Light output as a function of infrared wavelength (or equivalently, wavenumber). As described above, the sample's spectrum is always compared to a reference. An alternate method for acquiring spectra is the "dispersive" or "scanning monochromator" method. In this approach, the sample is irradiated sequentially with various single wavelengths. The dispersive method is more common in UV-Vis spectroscopy, but is less practical in the infrared than the FTIR method. One reason that FTIR is favored is called "Fellgett's advantage" or the "multiplex advantage": The information at all frequencies is collected simultaneously, improving both speed and signal-to-noise ratio. Another is called "Jacquinot's Throughput Advantage": A dispersive measurement requires detecting much lower light levels than an FTIR measurement. There are other advantages, as well as some disadvantages, but virtually all modern infrared spectrometers are FTIR instruments. Infrared microscopy Various forms of infrared microscopy exist. These include IR versions of sub-diffraction microscopy such as IR NSOM, photothermal microspectroscopy, Nano-FTIR and atomic force microscope based infrared spectroscopy (AFM-IR). Other methods in molecular vibrational spectroscopy Infrared spectroscopy is not the only method of studying molecular vibrational spectra. Raman spectroscopy involves an inelastic scattering process in which only part of the energy of an incident photon is absorbed by the molecule, and the remaining part is scattered and detected. The energy difference corresponds to absorbed vibrational energy. The selection rules for infrared and for Raman spectroscopy are different at least for some molecular symmetries, so that the two methods are complementary in that they observe vibrations of different symmetries. Another method is electron energy loss spectroscopy (EELS), in which the energy absorbed is provided by an inelastically scattered electron rather than a photon. This method is useful for studying vibrations of molecules adsorbed on a solid surface. Recently, high-resolution EELS (HREELS) has emerged as a technique for performing vibrational spectroscopy in a transmission electron microscope (TEM). In combination with the high spatial resolution of the TEM, unprecedented experiments have been performed, such as nano-scale temperature measurements, mapping of isotopically labeled molecules, mapping of phonon modes in position- and momentum-space, vibrational surface and bulk mode mapping on nanocubes, and investigations of polariton modes in van der Waals crystals. Analysis of vibrational modes that are IR-inactive but appear in inelastic neutron scattering is also possible at high spatial resolution using EELS. Although the spatial resolution of HREELs is very high, the bands are extremely broad compared to other techniques. Computational infrared microscopy By using computer simulations and normal mode analysis it is possible to calculate theoretical frequencies of molecules. Absorption bands IR spectroscopy is often used to identify structures because functional groups give rise to characteristic bands both in terms of intensity and position (frequency). The positions of these bands are summarized in correlation tables as shown below. Regions A spectrograph is often interpreted as having two regions. functional group region In the functional region there are one to a few troughs per functional group. fingerprint region In the fingerprint region there are many troughs which form an intricate pattern which can be used like a fingerprint to determine the compound. Badger's rule For many kinds of samples, the assignments are known, i.e. which bond deformation(s) are associated with which frequency. In such cases further information can be gleaned about the strength on a bond, relying on the empirical guideline called Badger's Rule. Originally published by Richard McLean Badger in 1934, this rule states that the strength of a bond (in terms of force constant) correlates with the bond length. That is, increase in bond strength leads to corresponding bond shortening and vice versa. Uses and applications Infrared spectroscopy is a simple and reliable technique widely used in both organic and inorganic chemistry, in research and industry. In catalysis research it is a very useful tool to characterize the catalyst, as well as to detect intermediates and products during the catalytic reaction. It is used in quality control, dynamic measurement, and monitoring applications such as the long-term unattended measurement of CO2 concentrations in greenhouses and growth chambers by infrared gas analyzers. It is also used in forensic analysis in both criminal and civil cases, for example in identifying polymer degradation. It can be used in determining the blood alcohol content of a suspected drunk driver. IR-spectroscopy has been successfully used in analysis and identification of pigments in paintings and other art objects such as illuminated
proved the orthodox faith, current in those churches, to be true. Theology and contrast with Gnosticism The central point of Irenaeus's theology is the unity and the goodness of God, in opposition to the Gnostics' theory of God; a number of divine emanations (Aeons) along with a distinction between the Monad and the Demiurge. Irenaeus uses the Logos theology he inherited from Justin Martyr. Irenaeus was a student of Polycarp, who was said to have been tutored by John the Apostle. (John had used Logos terminology in the Gospel of John and the letter of 1 John). Irenaeus often spoke of the Son and the Spirit as the "hands of God," though he also spoke of the Son as the "Logos." Unity of salvation history Irenaeus's emphasis on the unity of God is reflected in his corresponding emphasis on the unity of salvation history. Irenaeus repeatedly insists that God began the world and has been overseeing it ever since this creative act; everything that has happened is part of his plan for humanity. The essence of this plan is a process of maturation: Irenaeus believes that humanity was created immature, and God intended his creatures to take a long time to grow into or assume the divine likeness. Everything that has happened since has therefore been planned by God to help humanity overcome this initial mishap and achieve spiritual maturity. The world has been intentionally designed by God as a difficult place, where human beings are forced to make moral decisions, as only in this way can they mature as moral agents. Irenaeus likens death to the big fish that swallowed Jonah: it was only in the depths of the whale's belly that Jonah could turn to God and act according to the divine will. Similarly, death and suffering appear as evils, but without them we could never come to know God. According to Irenaeus, the high point in salvation history is the advent of Jesus. For Irenaeus, the Incarnation of Christ was intended by God before he determined that humanity would be created. Irenaeus develops this idea based on Rom. 5:14, saying "Forinasmuch as He had a pre-existence as a saving Being, it was necessary that what might be saved should also be called into existence, in order that the Being who saves should not exist in vain." Some theologians maintain that Irenaeus believed that Incarnation would have occurred even if humanity had never sinned; but the fact that they did sin determined his role as the savior. Irenaeus sees Christ as the new Adam, who systematically undoes what Adam did: thus, where Adam was disobedient concerning God's edict concerning the fruit of the Tree of Knowledge of Good and Evil, Christ was obedient even to death on the wood of a tree. Irenaeus is the first to draw comparisons between Eve and Mary, contrasting the faithlessness of the former with the faithfulness of the latter. In addition to reversing the wrongs done by Adam, Irenaeus thinks of Christ as "recapitulating" or "summing up" human life. Irenaeus conceives of our salvation as essentially coming about through the incarnation of God as a man. He characterizes the penalty for sin as death and corruption. God, however, is immortal and incorruptible, and simply by becoming united to human nature in Christ he conveys those qualities to us: they spread, as it were, like a benign infection. Irenaeus emphasizes that salvation occurs through Christ's Incarnation, which bestows incorruptibility on humanity, rather than emphasizing His Redemptive death in the crucifixion, although the latter event is an integral part of the former. Christ's life Part of the process of recapitulation is for Christ to go through every stage of human life, from infancy to old age, and simply by living it, sanctify it with his divinity. Although it is sometimes claimed that Irenaeus believed Christ did not die until he was older than is conventionally portrayed, the bishop of Lyon simply pointed out that because Jesus turned the permissible age for becoming a rabbi (30 years old and above), he recapitulated and sanctified the period between 30 and 50 years old, as per the Jewish custom of periodization on life, and so touches the beginning of old age when one becomes 50 years old. (see Adversus Haereses, book II, chapter 22). In the passage of Adversus Haereses under consideration, Irenaeus is clear that after receiving baptism at the age of thirty, citing Luke 3:23, Gnostics then falsely assert that "He [Jesus] preached only one year reckoning from His baptism," and also, "On completing His thirtieth year He [Jesus] suffered, being in fact still a young man, and who had by no means attained to advanced age." Irenaeus argues against the Gnostics by using scripture to add several years after his baptism by referencing 3 distinctly separate visits to Jerusalem. The first is when Jesus makes wine out of water, he goes up to the Paschal feast-day, after which he withdraws and is found in Samaria. The second is when Jesus goes up to Jerusalem for Passover and cures the paralytic, after which he withdraws over the sea of Tiberias. The third mention is when he travels to Jerusalem, eats the Passover, and suffers on the following day. Irenaeus quotes scripture (John 8:57), to suggest that Jesus ministers while in his 40s. In this passage, Jesus's opponents want to argue that Jesus has not seen Abraham, because Jesus is too young. Jesus's opponents argue that Jesus was not yet 50 years old. Irenaeus argues that if Jesus were in his thirties, his opponents would have argued that he was not yet 40 years old, since that would make him even younger. Irenaeus's argument is that they would not weaken their own argument by adding years to Jesus's age. Irenaeus also writes: "The Elders witness to this, who in Asia conferred with John the Lord's disciple, to the effect that John had delivered these things unto them: for he abode with them until the times of Trajan. And some of them saw not only John, but others also of the Apostles, and had this same account from them, and witness to the aforesaid relation." In Demonstration (74) Irenaeus notes "For Pontius Pilate was governor of Judæa, and he had at that time resentful enmity against Herod the king of the Jews. But then, when Christ was brought to him bound, Pilate sent Him to Herod, giving command to enquire of him, that he might know of a certainty what he should desire concerning Him; making Christ a convenient occasion of reconciliation with the king." Pilate was the prefect of the Roman province of Judaea from AD 26–36. He served under Emperor Tiberius Claudius Nero. Herod Antipas was tetrarch of Galilee and Perea, a client state of the Roman Empire. He ruled from 4 BC to 39 AD. In refuting Gnostic claims that Jesus preached for only one year after his baptism, Irenaeus used the "recapitulation" approach to demonstrate that by living beyond the age of thirty Christ sanctified even old age. Use of Paul's Epistles Many aspects of Irenaeus's presentation of salvation history depend on Paul's Epistles. Irenaeus's conception of salvation relies heavily on the understanding found in Paul's letters. Irenaeus first brings up the theme of victory over sin and evil that is afforded by Jesus's death. God's intervention has saved humanity from the Fall of Adam and the wickedness of Satan. Human nature has become joined with God's in the person of Jesus, thus allowing human nature to have victory over sin. Paul writes on the same theme, that Christ has come so that a new order is formed, and being under the Law, is being under the sin of Adam. Reconciliation is also a theme of Paul's that Irenaeus stresses in his teachings on Salvation. Irenaeus believes Jesus coming in flesh and blood sanctified humanity so that it might again reflect the perfection associated with the likeness of the Divine. This perfection leads to a new life, in the lineage of God, which is forever striving for eternal life and unity with the Father. This is a carryover from Paul, who attributes this reconciliation to the actions of Christ: "For since death came through a human being, the resurrection of the dead has also come through a human being; for as all die in Adam, so all will be made alive in Christ". A third theme in both Paul's and Irenaeus's conceptions of salvation is the sacrifice of Christ being necessary for the new life given to humanity in the triumph over evil. It is in this obedient sacrifice that Jesus is victor and reconciler, thus erasing the marks that Adam left on human nature. To argue against the Gnostics on this point, Irenaeus uses Colossians in showing that the debt which came by a tree has been paid for us in another tree. Furthermore, the first chapter of Ephesians is picked up in Irenaeus's discussion of the topic when he asserts, "By His own blood He redeemed us, as also His apostle declares, 'In whom we have redemption through His blood, even the remission of sins.'" The frequencies of quotations and allusions to the Pauline Epistles in Against Heresies are: Christ as the New Adam To counter his Gnostic opponents, Irenaeus significantly develops Paul's presentation of Christ as the Last Adam. Irenaeus's presentation of Christ as the New Adam is based on Paul's Christ-Adam parallel in . Irenaeus uses this parallel to demonstrate that Christ truly took human flesh. Irenaeus considered it important to emphasize this point because he understands the failure to recognize Christ's full humanity the bond linking the various strains of Gnosticism together, as seen in his statement that "according to the opinion of no one of the heretics was the Word of God made flesh." Irenaeus believes that unless the Word became flesh, humans were not fully redeemed. He explains that by becoming man, Christ restored humanity to being in the image and likeness of God, which they had lost in the Fall of man. Just as Adam was the original head of humanity through whom all sinned, Christ is the new head of humanity who fulfills Adam's role in the Economy of Salvation. Irenaeus calls this process of restoring humanity recapitulation. For Irenaeus, Paul's presentation of the Old Law (the Mosaic covenant) in this passage indicates that the Old Law revealed humanity's sinfulness but could not save them. He explains that "For as the law was spiritual, it merely made sin to stand out in relief, but did not destroy it. For sin had no dominion over the spirit, but over man." Since humans have a physical nature, they cannot be saved by a spiritual law. Instead, they need a human Savior. This is why it was necessary for Christ to take human flesh. Irenaeus summarizes how Christ's taking human flesh saves humanity with a statement that closely resembles , "For as by the disobedience of the one man who was originally moulded from virgin soil, the many were made sinners, and forfeited life; so was it necessary that, by the obedience of one man, who was originally born from a virgin, many should
of John. The Gospel of Matthew was the most popular overall. Irenaeus asserted that four Gospels, Matthew, Mark, Luke, and John, were canonical scripture. Thus Irenaeus provides the earliest witness to the assertion of the four canonical Gospels, possibly in reaction to Marcion's edited version of the Gospel of Luke, which Marcion asserted was the one and only true gospel. Based on the arguments Irenaeus made in support of only four authentic gospels, some interpreters deduce that the fourfold Gospel must have still been a novelty in Irenaeus's time. Against Heresies 3.11.7 acknowledges that many heterodox Christians use only one gospel while 3.11.9 acknowledges that some use more than four. The success of Tatian's Diatessaron in about the same time period is "... a powerful indication that the fourfold Gospel contemporaneously sponsored by Irenaeus was not broadly, let alone universally, recognized." (The apologist and ascetic Tatian had previously harmonized the four gospels into a single narrative, the Diatesseron circa 150–160) Irenaeus is also the earliest attestation that the Gospel of John was written by John the Apostle, and that the Gospel of Luke was written by Luke, the companion of Paul. Scholars contend that Irenaeus quotes from 21 of the 27 New Testament books, such as: Matthew 3:16 Mark 3:10 Luke 3:14 John 3:11 Acts of the Apostles 3:14 Romans 3:16 1 Corinthians 1:3 2 Corinthians 3:7 Galatians 3:22 Ephesians 5:2 Philippians 4:18 Colossians 1:3 1 Thessalonians 5:6 2 Thessalonians 5:25 1 Timothy (Preface) 2 Timothy 3:14 Titus 3:3 1 Peter 4:9 1 John 3:16 2 John 1:16 Revelation 4:20 He may refer to Hebrews 2:30 and James 4:16 and maybe even 2 Peter 5:28, but does not cite Philemon. Irenaeus cited the New Testament approximately 1,000 times. About one third of his citations are made to Paul's letters. Irenaeus considered all 13 letters belonging to the Pauline corpus to have been written by Paul himself. Apostolic authority In his writing against the Gnostics, who claimed to possess a secret oral tradition from Jesus himself, Irenaeus maintained that the bishops in different cities are known as far back as the Apostles and that the oral tradition he lists from the Apostles is a safe guide to the interpretation of Scripture. In a passage that became a locus classicus of Catholic-Protestant polemics, he cited the Roman church as an example of the unbroken chain of authority, which text Catholic polemics would use to assert the primacy of Rome over Eastern churches by virtue of its preeminent authority.The succession of bishops and presbyters was important to establish a chain of custody for orthodoxy. Irenaeus's point when refuting the Gnostics was that all of the Apostolic churches had preserved the same traditions and teachings in many independent streams. It was the unanimous agreement between these many independent streams of transmission that proved the orthodox faith, current in those churches, to be true. Theology and contrast with Gnosticism The central point of Irenaeus's theology is the unity and the goodness of God, in opposition to the Gnostics' theory of God; a number of divine emanations (Aeons) along with a distinction between the Monad and the Demiurge. Irenaeus uses the Logos theology he inherited from Justin Martyr. Irenaeus was a student of Polycarp, who was said to have been tutored by John the Apostle. (John had used Logos terminology in the Gospel of John and the letter of 1 John). Irenaeus often spoke of the Son and the Spirit as the "hands of God," though he also spoke of the Son as the "Logos." Unity of salvation history Irenaeus's emphasis on the unity of God is reflected in his corresponding emphasis on the unity of salvation history. Irenaeus repeatedly insists that God began the world and has been overseeing it ever since this creative act; everything that has happened is part of his plan for humanity. The essence of this plan is a process of maturation: Irenaeus believes that humanity was created immature, and God intended his creatures to take a long time to grow into or assume the divine likeness. Everything that has happened since has therefore been planned by God to help humanity overcome this initial mishap and achieve spiritual maturity. The world has been intentionally designed by God as a difficult place, where human beings are forced to make moral decisions, as only in this way can they mature as moral agents. Irenaeus likens death to the big fish that swallowed Jonah: it was only in the depths of the whale's belly that Jonah could turn to God and act according to the divine will. Similarly, death and suffering appear as evils, but without them we could never come to know God. According to Irenaeus, the high point in salvation history is the advent of Jesus. For Irenaeus, the Incarnation of Christ was intended by God before he determined that humanity would be created. Irenaeus develops this idea based on Rom. 5:14, saying "Forinasmuch as He had a pre-existence as a saving Being, it was necessary that what might be saved should also be called into existence, in order that the Being who saves should not exist in vain." Some theologians maintain that Irenaeus believed that Incarnation would have occurred even if humanity had never sinned; but the fact that they did sin determined his role as the savior. Irenaeus sees Christ as the new Adam, who systematically undoes what Adam did: thus, where Adam was disobedient concerning God's edict concerning the fruit of the Tree of Knowledge of Good and Evil, Christ was obedient even to death on the wood of a tree. Irenaeus is the first to draw comparisons between Eve and Mary, contrasting the faithlessness of the former with the faithfulness of the latter. In addition to reversing the wrongs done by Adam, Irenaeus thinks of Christ as "recapitulating" or "summing up" human life. Irenaeus conceives of our salvation as essentially coming about through the incarnation of God as a man. He characterizes the penalty for sin as death and corruption. God, however, is immortal and incorruptible, and simply by becoming united to human nature in Christ he conveys those qualities to us: they spread, as it were, like a benign infection. Irenaeus emphasizes that salvation occurs through Christ's Incarnation, which bestows incorruptibility on humanity, rather than emphasizing His Redemptive death in the crucifixion, although the latter event is an integral part of the former. Christ's life Part of the process of recapitulation is for Christ to go through every stage of human life, from infancy to old age, and simply by living it, sanctify it with his divinity. Although it is sometimes claimed that Irenaeus believed Christ did not die until he was older than is conventionally portrayed, the bishop of Lyon simply pointed out that because Jesus turned the permissible age for becoming a rabbi (30 years old and above), he recapitulated and sanctified the period between 30 and 50 years old, as per the Jewish custom of periodization on life, and so touches the beginning of old age when one becomes 50 years old. (see Adversus Haereses, book II, chapter 22). In the passage of Adversus Haereses under consideration, Irenaeus is clear that after receiving baptism at the age of thirty, citing Luke 3:23, Gnostics then falsely assert that "He [Jesus] preached only one year reckoning from His baptism," and also, "On completing His thirtieth year He [Jesus] suffered, being in fact still a young man, and who had by no means attained to advanced age." Irenaeus argues against the Gnostics by using scripture to add several years after his baptism by referencing 3 distinctly separate visits to Jerusalem. The first is when Jesus makes wine out of water, he goes up to the Paschal feast-day, after which he withdraws and is found in Samaria. The second is when Jesus goes up to Jerusalem for Passover and cures the paralytic, after which he withdraws over the sea of Tiberias. The third mention is when he travels to Jerusalem, eats the Passover, and suffers on the following day. Irenaeus quotes scripture (John 8:57), to suggest that Jesus ministers while in his 40s. In this passage, Jesus's opponents want to argue that Jesus has not seen Abraham, because Jesus is too young. Jesus's opponents argue that Jesus was not yet 50 years old. Irenaeus argues that if Jesus were in his thirties, his opponents would have argued that he was not yet 40 years old, since that would make him even younger. Irenaeus's argument is that they would not weaken their own argument by adding years to Jesus's age. Irenaeus also writes: "The Elders witness to this, who in Asia conferred with John the Lord's disciple, to the effect that John had delivered these things unto them: for he abode with them until the times of Trajan. And some of them saw not only John, but others also of the Apostles, and had this same account from them, and witness to the aforesaid relation." In Demonstration (74) Irenaeus notes "For Pontius Pilate was governor of Judæa, and he had at that time resentful enmity against Herod the king of the Jews. But then, when Christ was brought to him bound, Pilate sent Him to Herod, giving command to enquire of him, that he might know of a certainty what he should desire concerning Him; making Christ a convenient occasion of reconciliation with the king." Pilate was the prefect of the Roman province of Judaea from AD 26–36. He served under Emperor Tiberius Claudius Nero. Herod Antipas was tetrarch of Galilee and Perea, a client state of the Roman Empire. He ruled from 4 BC to 39 AD. In refuting Gnostic claims that Jesus preached for only one year after his baptism, Irenaeus used the "recapitulation" approach to demonstrate that by living beyond the age of thirty Christ sanctified even old age. Use of Paul's Epistles Many aspects of Irenaeus's presentation of salvation history depend on Paul's Epistles. Irenaeus's conception of salvation relies heavily on the understanding found in Paul's letters. Irenaeus first brings up the theme of victory over sin and evil that is afforded by Jesus's death. God's intervention has saved humanity from the Fall of Adam and the wickedness of Satan. Human nature has become joined with God's in the person of Jesus, thus allowing human nature to have victory over sin. Paul writes on the same theme, that Christ has come so that a new order is formed, and being under the Law, is being under the sin of Adam. Reconciliation is also a theme of Paul's that Irenaeus stresses in his teachings on Salvation. Irenaeus believes Jesus coming in flesh and blood sanctified humanity so that it might again reflect the perfection associated with the likeness of the Divine. This perfection leads to a new life, in the lineage of God, which is forever striving for eternal life and unity with the Father. This is a carryover from Paul, who attributes this reconciliation to the actions of Christ: "For since death came through a human being, the resurrection of the dead has also come through a human being; for as all die in Adam, so all will be made alive in Christ". A third theme in both Paul's and Irenaeus's conceptions of salvation is the sacrifice of Christ being necessary for the new life given to humanity in the triumph over evil. It is in this obedient sacrifice that Jesus is victor and reconciler, thus erasing the marks that Adam left on human nature. To argue against the Gnostics on this point, Irenaeus uses Colossians in showing that the debt which came by a tree has been paid for us in another tree. Furthermore, the first chapter of Ephesians is picked up in Irenaeus's discussion of the topic when he asserts, "By His own blood He redeemed us, as also His apostle declares, 'In whom we have redemption through His blood, even the remission of sins.'" The frequencies of quotations and allusions to the Pauline Epistles in Against Heresies are: Christ as the New Adam To counter his Gnostic opponents, Irenaeus significantly develops Paul's presentation of Christ as the Last Adam. Irenaeus's presentation of Christ as the New Adam is based on Paul's Christ-Adam parallel in . Irenaeus uses this parallel to demonstrate that Christ truly took human flesh. Irenaeus considered it important to emphasize this point because he understands the failure to recognize Christ's full humanity the bond linking the various strains of Gnosticism together, as seen in his statement that "according to the opinion of no one of the heretics was the Word of God made flesh." Irenaeus believes that unless the Word became flesh, humans were not fully redeemed. He explains that by becoming man, Christ restored humanity to being in the image and likeness of God, which they had lost in the Fall of man. Just as Adam was the original head of humanity through whom all sinned, Christ is the new head of humanity who fulfills Adam's role in the Economy of Salvation. Irenaeus calls this process of restoring humanity recapitulation. For Irenaeus, Paul's presentation of the Old Law (the Mosaic covenant) in this passage indicates that the Old Law revealed humanity's sinfulness but could not save them. He explains that "For as the law was spiritual, it merely made sin to stand out in relief, but did not destroy it. For sin had no dominion over the spirit, but over man." Since humans have a physical nature, they cannot be saved by a spiritual law. Instead, they need a human Savior. This is why it was necessary for Christ to take human flesh. Irenaeus summarizes how Christ's taking human flesh saves humanity with a statement that closely resembles , "For as by the disobedience of the one man who was originally moulded from virgin soil, the many
The UN runs programs in some countries to assist in this process. Criticism The dangers of institutions were chronicled and criticized by reformers almost since their foundation. Charles Dickens was an outspoken and high-profile early critic, and several of his novels, in particular Oliver Twist and Hard Times demonstrate his insight into the damage that institutions can do to human beings. Enoch Powell, when Minister for Health in the early 1960s, was a later opponent who was appalled by what he witnessed on his visits to the asylums, and his famous "water tower" speech in 1961 called for the closure of all NHS asylums and their replacement by wards in general hospitals: "There they stand, isolated, majestic, imperious, brooded over by the gigantic water-tower and chimney combined, rising unmistakable and daunting out of the countryside - the asylums which our forefathers built with such immense solidity to express the notions of their day. Do not for a moment underestimate their powers of resistance to our assault. Let me describe some of the defenses which we have to storm." Scandal after scandal followed, with many high-profile public inquiries. These involved the exposure of abuses such as unscientific surgical techniques such as lobotomy and the widespread neglect and abuse of vulnerable patients in the US and Europe. The growing anti-psychiatry movement in the 1960s and 1970s led in Italy to the first successful legislative challenge to the authority of the mental institutions, culminating in their closure. During the 1970s and 1990s the hospital population started to fall rapidly, mainly because of the deaths of long-term inmates. Significant efforts were made to re-house large numbers of former residents in a variety of suitable or otherwise alternative accommodation. The first 1,000+ bed hospital to close was Darenth Park Hospital in Kent, swiftly followed by many more across the UK. The haste of these closures, driven by the Conservative governments led by Margaret Thatcher and John Major, led to considerable criticism in the press, as some individuals slipped through the net into homelessness or were discharged to poor quality private sector mini-institutions. Wrongful involuntary commitment Mental health professionals have, on occasion, wrongfully deemed individuals to have symptoms of a mental disorder, and thereby commit the individual for treatment in a psychiatric hospital. Claims of wrongful commitment are a common theme in the anti-psychiatry movement. In 1860, the case of Elizabeth Packard, who was wrongfully committed that year and filed a lawsuit and won thereafter, highlighted the issue of wrongful involuntary commitment. In 1887, investigative journalist Nellie Bly went undercover at an asylum in New York City to expose the terrible conditions that mental patients at the time had to deal with. She published her findings and experiences as articles in New York World, and later made the articles into one book called Ten Days in a Mad-House. In the first half of the twentieth century there were a few high-profile cases of wrongful commitment based on racism or punishment for political dissenters. In the former Soviet Union, psychiatric hospitals were used as prisons to isolate political prisoners from the rest of society. British playwright Tom Stoppard wrote Every Good Boy Deserves Favour about the relationship between a patient and his doctor in one of these hospitals. Stoppard was inspired by a meeting with a Russian exile. In 1927, after the execution of Sacco and Vanzetti in the United States, demonstrator Aurora D'Angelo was sent to a mental health facility for psychiatric evaluation after she participated in a rally in support of the anarchists. Throughout the 1940s and 1950s in Canada, 20,000 Canadian children, called the Duplessis orphans, were wrongfully certified as being mentally ill and as a result were wrongfully committed to psychiatric institutions where they were forced to take psychiatric medication that they did not need, and were abused. They were named after Maurice Duplessis, the premier of Quebec at the time, who deliberately committed these children to in order to misappropriate additional subsidies from the federal government. Decades later in the 1990s, several of the orphans sued Quebec and the Catholic Church for the abuse and wrongdoing. In 1958, black pastor and activist Clennon Washington King Jr. tried enrolling at the University of Mississippi, which at the time was white, for summer classes; the local police secretly arrested and involuntarily committed him to a mental hospital for 12 days. Patients are able to sue if they believe that they have been wrongfully committed. In one instance, Junius Wilson, an African American man, was committed to Cherry Hospital in Goldsboro, North Carolina in 1925 for an alleged crime without a trial or conviction. He was castrated. He continued to be held at Cherry Hospital for the next 67 years of his life. It turned out he was deaf rather than mentally ill. In many American states sex offenders who have completed a period of incarceration can be civilly committed to a mental institution based on a finding of dangerousness due to a mental disorder. Although the United States Supreme Court determined that this practice does not constitute double jeopardy, organizations such as the American Psychiatric Association (APA) strongly oppose the practice. The Task Force on Sexually Dangerous Offenders, a component of APA's Council on Psychiatry and Law, reported that "in the opinion of the task force, sexual predator commitment laws represent a serious assault on the integrity of psychiatry, particularly with regard to defining mental illness and the clinical conditions for
administration of psychoactive drugs, including involuntary administration. In many jurisdictions, people diagnosed with mental health disorders can also be forced to undergo treatment while in the community; this is sometimes referred to as outpatient commitment and shares legal processes with commitment. Criteria for civil commitment are established by laws which vary between nations. Commitment proceedings often follow a period of emergency hospitalization, during which an individual with acute psychiatric symptoms is confined for a relatively short duration (e.g. 72 hours) in a treatment facility for evaluation and stabilization by mental health professionals who may then determine whether further civil commitment is appropriate or necessary. Civil commitment procedures may take place in a court or only involve physicians. If commitment does not involve a court there is normally an appeal process that does involve the judiciary in some capacity, though potentially through a specialist court. Historically, until the mid-1960s in most jurisdictions in the United States, all committals to public psychiatric facilities and most committals to private ones were involuntary. Since then, there have been alternating trends towards the abolition or substantial reduction of involuntary commitment, a trend known as "deinstitutionalisation". In many currents, individuals can voluntarily admit themselves to a mental health hospital and may have more rights than those who are involuntarily committed. This practice is referred to as voluntary commitment. In the United States, an indefinite form of commitment is applied to people convicted of some sexual offences. Purpose For most jurisdictions, involuntary commitment is applied to individuals believed to be experiencing a mental illness that impairs their ability to reason to such an extent that the agents of the law, state, or courts determine that decisions will be made for the individual under a legal framework. In some jurisdictions, this is a proceeding distinct from being found incompetent. Involuntary commitment is used in some degree for each of the following although different jurisdictions have different criteria. Some jurisdictions limit involuntary treatment to individuals who meet statutory criteria for presenting a danger to self or others. Other jurisdictions have broader criteria. The legal process by which commitment takes place varies between jurisdictions. Some jurisdictions have a formal court hearing where testimony and other evidence may also be submitted where subject of the hearing is typically entitled to legal counsel and may challenge a commitment order through habeas corpus. Other jurisdictions have delegated these power to physicians, though may provide an appeal process that involves the judiciary but may also involve physicians. For example in the UK a mental health tribunal consists of a judge, a medical member, and a lay representative. First aid Training is gradually becoming available in mental health first aid to equip community members such as teachers, school administrators, police officers, and medical workers with training in recognizing, and authority in managing, situations where involuntary evaluations of behavior are applicable under law. The extension of first aid training to cover mental health problems and crises is a quite recent development. A mental health first aid training course was developed in Australia in 2001 and has been found to improve assistance provided to persons with an alleged mental illness or mental health crisis. This form of training has now spread to a number of other countries (Canada, Finland, Hong Kong, Ireland, Singapore, Scotland, England, Wales, and the United States). Mental health triage may be used in an emergency room to make a determination about potential risk and apply treatment protocols. Observation Observation is sometimes used to determine whether a person warrants involuntary commitment. It is not always clear on a relatively brief examination whether a person should be committed. Containment of danger Austria, Belgium, Germany, Israel, the Netherlands, Northern Ireland, Russia, Taiwan, Ontario (Canada), and the United States have adopted commitment criteria based on the presumed danger of the defendant to self or to others. People with suicidal thoughts may act on these impulses and harm or kill themselves. People with psychosis are occasionally driven by their delusions or hallucinations to harm themselves or others. Research has found that those who suffer from schizophrenia are between 3.4 and 7.4 times more likely to engage in violent behaviour than members of the general public. However, because other confounding factors such as childhood adversity and poverty are correlated with both schizophrenia and violence it can be difficult to determine whether this effect is due to schizophrenia or other factors. In an attempt to avoid these confounding factors, researchers have tried comparing the rates of violence amongst people diagnosed with schizophrenia to their siblings in a similar manner to twin studies. In these studies people with schizophrenia are found to be between 1.3 and 1.8 times more likely to engage in violent behaviour. People with certain types of personality disorders can occasionally present a danger to themselves or others. This concern has found expression in the standards for involuntary commitment in every US state and in other countries as the danger to self or others standard, sometimes supplemented by the requirement that the danger be imminent. In some jurisdictions, the danger to self or others standard has
to intramolecular forces – the forces which hold a molecule together. For example, the covalent bond, involving sharing electron pairs between atoms, is much stronger than the forces present between neighboring molecules. Both sets of forces are essential parts of force fields frequently used in molecular mechanics. The investigation of intermolecular forces starts from macroscopic observations which indicate the existence and action of forces at a molecular level. These observations include non-ideal-gas thermodynamic behavior reflected by virial coefficients, vapor pressure, viscosity, superficial tension, and absorption data. The first reference to the nature of microscopic forces is found in Alexis Clairaut's work Théorie de la figure de la Terre, published in Paris in 1743. Other scientists who have contributed to the investigation of microscopic forces include: Laplace, Gauss, Maxwell and Boltzmann. Attractive intermolecular forces are categorized into the following types: Hydrogen bonding Ion–induced dipole forces Ion–dipole forces van der Waals forces – Keesom force, Debye force, and London dispersion force Information on intermolecular forces is obtained by macroscopic measurements of properties like viscosity, pressure, volume, temperature (PVT) data. The link to microscopic aspects is given by virial coefficients and Lennard-Jones potentials. Hydrogen bonding A hydrogen bond is an extreme form of dipole-dipole bonding, referring to the attraction between a hydrogen atom that is bonded to an element with high electronegativity, usually nitrogen, oxygen, or fluorine and another of these same elements. The hydrogen bond is often described as a strong electrostatic dipole–dipole interaction. However, it also has some features of covalent bonding: it is directional, stronger than a van der Waals force interaction, produces interatomic distances shorter than the sum of their van der Waals radii, and usually involves a limited number of interaction partners, which can be interpreted as a kind of valence. The number of Hydrogen bonds formed between molecules is equal to the number of active pairs. The molecule which donates its hydrogen is termed the donor molecule, while the molecule containing lone pair participating in H bonding is termed the acceptor molecule. The number of active pairs is equal to the common number between number of hydrogens the donor has and the number of lone pairs the acceptor has. Though both not depicted in the diagram, water molecules have two active pairs, as the oxygen atom can interact with two hydrogens to form two hydrogen bonds. Intermolecular hydrogen bonding is responsible for the high boiling point of water (100 °C) compared to the other group 16 hydrides, which have little capability to hydrogen bond. Intramolecular hydrogen bonding is partly responsible for the secondary, tertiary, and quaternary structures of proteins and nucleic acids. It also plays an important role in the structure of polymers, both synthetic and natural. Ionic bonding The attraction between cationic and anionic sites is a noncovalent, or intermolecular interaction which is usually referred to as ion pairing or salt bridge. It is essentially due to electrostatic forces, although in aqueous medium the association is driven by entropy and often even endothermic. Most salts form crystals with characteristic distances between the ions; in contrast to many other noncovalent interactions, salt bridges are not directional and show in the solid state usually contact determined only by the van der Waals radii of the ions. Inorganic as well as organic ions display in water at moderate ionic strength I similar salt bridge as association ΔG values around 5 to 6 kJ/mol for a 1:1 combination of anion and cation, almost independent of the nature (size, polarizability, etc.) of the ions. The ΔG values are additive and approximately a linear function of the charges, the interaction of e.g. a doubly charged phosphate anion with a single charged ammonium cation accounts for about 2x5 = 10 kJ/mol. The ΔG values depend on the ionic strength I of the solution, as described by the Debye-Hückel equation, at zero ionic strength one observes ΔG = 8 kJ/mol. Dipole–dipole and similar interactions Regular dipole Dipole–dipole interactions are electrostatic interactions between molecules which have permanent dipoles. This interaction is stronger than the London forces but is weaker than ion-ion interaction because only partial charges are involved. These interactions tend to align the molecules to increase attraction (reducing potential energy). An example of a dipole–dipole interaction can be seen in hydrogen chloride (HCl): the positive end of a polar molecule will attract the negative end of the other molecule and influence its position. Polar molecules have a net attraction between them. Examples of polar molecules include hydrogen chloride (HCl) and chloroform (CHCl3). Often molecules contain dipolar groups of atoms, but have no overall dipole moment on the molecule as a whole. This occurs if
like viscosity, pressure, volume, temperature (PVT) data. The link to microscopic aspects is given by virial coefficients and Lennard-Jones potentials. Hydrogen bonding A hydrogen bond is an extreme form of dipole-dipole bonding, referring to the attraction between a hydrogen atom that is bonded to an element with high electronegativity, usually nitrogen, oxygen, or fluorine and another of these same elements. The hydrogen bond is often described as a strong electrostatic dipole–dipole interaction. However, it also has some features of covalent bonding: it is directional, stronger than a van der Waals force interaction, produces interatomic distances shorter than the sum of their van der Waals radii, and usually involves a limited number of interaction partners, which can be interpreted as a kind of valence. The number of Hydrogen bonds formed between molecules is equal to the number of active pairs. The molecule which donates its hydrogen is termed the donor molecule, while the molecule containing lone pair participating in H bonding is termed the acceptor molecule. The number of active pairs is equal to the common number between number of hydrogens the donor has and the number of lone pairs the acceptor has. Though both not depicted in the diagram, water molecules have two active pairs, as the oxygen atom can interact with two hydrogens to form two hydrogen bonds. Intermolecular hydrogen bonding is responsible for the high boiling point of water (100 °C) compared to the other group 16 hydrides, which have little capability to hydrogen bond. Intramolecular hydrogen bonding is partly responsible for the secondary, tertiary, and quaternary structures of proteins and nucleic acids. It also plays an important role in the structure of polymers, both synthetic and natural. Ionic bonding The attraction between cationic and anionic sites is a noncovalent, or intermolecular interaction which is usually referred to as ion pairing or salt bridge. It is essentially due to electrostatic forces, although in aqueous medium the association is driven by entropy and often even endothermic. Most salts form crystals with characteristic distances between the ions; in contrast to many other noncovalent interactions, salt bridges are not directional and show in the solid state usually contact determined only by the van der Waals radii of the ions. Inorganic as well as organic ions display in water at moderate ionic strength I similar salt bridge as association ΔG values around 5 to 6 kJ/mol for a 1:1 combination of anion and cation, almost independent of the nature (size, polarizability, etc.) of the ions. The ΔG values are additive and approximately a linear function of the charges, the interaction of e.g. a doubly charged phosphate anion with a single charged ammonium cation accounts for about 2x5 = 10 kJ/mol. The ΔG values depend on the ionic strength I of the solution, as described by the Debye-Hückel equation, at zero ionic strength one observes ΔG = 8 kJ/mol. Dipole–dipole and similar interactions Regular dipole Dipole–dipole interactions are electrostatic interactions between molecules which have permanent dipoles. This interaction is stronger than the London forces but is weaker than ion-ion interaction because only partial charges are involved. These interactions tend to align the molecules to increase attraction (reducing potential energy). An example of a dipole–dipole interaction can be seen in hydrogen chloride (HCl): the positive end of a polar molecule will attract the negative end of the other molecule and influence its position. Polar molecules have a net attraction between them. Examples of polar molecules include hydrogen chloride (HCl) and chloroform (CHCl3). Often molecules contain dipolar groups of atoms, but have no overall dipole moment on the molecule as a whole. This occurs if there is symmetry within the molecule that causes the dipoles to cancel each other out. This occurs in molecules such as tetrachloromethane and carbon dioxide. The dipole–dipole interaction between two individual atoms is usually zero, since atoms rarely carry a permanent dipole. These forces are discussed further in the section about the Keesom interaction, below. Ion–dipole and ion–induced dipole forces Ion–dipole and ion–induced dipole forces are similar to dipole–dipole and dipole–induced dipole interactions but involve ions, instead of only polar and non-polar molecules. Ion–dipole and ion–induced dipole forces are stronger than dipole–dipole interactions because the charge of any ion is much greater than the charge of a dipole moment. Ion–dipole bonding is stronger than hydrogen bonding. An ion–dipole force consists of an ion and a polar molecule interacting. They align so that the positive and negative groups are next to one another, allowing maximum attraction. An important example of this interaction is hydration of ions in water which give rise to hydration enthalpy. The polar water molecules surround themselves around ions in water and the energy released during the process is known as hydration enthalpy. The interaction has its immense importance in justifying the stability of various ions (like Cu2+) in water. An ion–induced dipole force consists of an ion and a non-polar molecule interacting. Like a dipole–induced dipole force, the charge of the ion causes distortion of the electron cloud on the non-polar molecule. Van der Waals forces The van der Waals forces arise from interaction between uncharged atoms or molecules, leading not only to such phenomena as the cohesion of condensed phases and physical absorption of gases, but also to a universal force of attraction between macroscopic bodies. Keesom force The first contribution to van der Waals forces is due to electrostatic interactions between rotating permanent dipoles, quadrupoles (all molecules
country code) Qeshm Air (ICAO
Interrupt request, a computer hardware signal Iraq (ISO
IDN: support for internationalized domain names (IDN) DNSSEC: presence of DS records for Domain Name System Security Extensions Internationalized brand top-level domains Special-Use Domains ICANN/IANA has created some Special-Use domain names which are meant for special technical purposes. ICANN/IANA owns all of the Special-Use domain names. Non-IANA domains Besides the TLDs managed (or at least tracked) by IANA or ICANN, other independent groups have created, or had attempted to create, their own TLDs with varying technical specifications, functions, and outcomes. Blockchain-registered Blockchain-based domains are registered and exchanged using a public blockchain like Ethereum. Often times, these domains serve specific functions such as creating human-readable references to smart contract addresses used in DApps or personal wallet addresses. Generally, these non-standard domains are unreachable through the normal DNS resolution process and instead require clients to use some sort of transparent web proxy or gateway to access them Alternate roots In the case of alternative DNS roots, organizations or projects make use of the same mechanisms of the DNS but instead take on the role of ICANN in managing and administering an entirely separate root zone, thus having the ability to create new TLDs independently. However, this doesn't make these domains any less isolated from the rest of the internet, though the ability for clients to resolve them theoretically only requires switching to a recursive DNS resolver that recognizes and serves records underneath the alternate root zone. See also Country code top-level domain Generic top-level domain IDN Test TLDs ISO 3166-1 alpha-2,
generic-restricted top-level domains (grTLD) sponsored top-level domains (sTLD) country code top-level domains (ccTLD) test top-level domains (tTLD) Original top-level domains Seven generic top-level domains were created early in the development of the Internet, and predate the creation of ICANN in 1998. Name: DNS names Entity: intended use Notes: general remarks IDN: support for internationalized domain names (IDN) DNSSEC: presence of DS records for Domain Name System Security Extensions Infrastructure top-level domain Country code top-level domains As of 20 May 2017, there were 255 country-code top-level domains, purely in the Latin alphabet, using two-character codes. , this number is 316, with the addition of internationalized domains. Proposed internationalized ccTLDs Internationalised domain names have been proposed for Japan and Libya. ICANN-era generic top-level domains Name: DNS name Target market: intended use Restrictions: restrictions, if any, on who can register, and how the domain can be used Operator: entity the registry has been delegated to IDN: support for internationalized domain names (IDN) DNSSEC: presence of DS records for Domain Name System Security Extensions English A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Chinese French German Hindi Italian Portuguese Spanish Internationalized generic top-level domains All of these TLDs are internationalized domain names (IDN) and support second-level IDNs. Notes: general remarks and intended use DNSSEC: presence of DS records for Domain Name System Security Extensions Arabic script Chinese characters Cyrillic script Japanese characters Other script Geographic top-level domains Name: DNS name Entity: Target geographic area Notes: general remarks IDN: support for internationalized domain names (IDN) DNSSEC: presence of DS records for Domain Name System Security Extensions Africa Asia Europe North America Oceania South America Internationalized geographic top-level domains Brand top-level domains Name: DNS name Entity: company and/or brand Notes: general remarks IDN: support for internationalized domain names (IDN) DNSSEC: presence of DS records for Domain Name System Security Extensions Internationalized brand top-level domains Special-Use Domains ICANN/IANA has created some Special-Use domain names which are meant for special technical purposes. ICANN/IANA owns all of the
Hermann Lotze offers a theory of the "world ground" in which all things find their unity: it has been widely accepted by Protestant theologians. Several modern religious movements, for example the organizations within the New Thought Movement and the Unity Church, may be said to have a particularly idealist orientation. The theology of Christian Science includes a form of idealism: it teaches that all that truly exists is God and God's ideas; that the world as it appears to the senses is a distortion of the underlying spiritual reality, a distortion that may be corrected (both conceptually and in terms of human experience) through a reorientation (spiritualization) of thought. Chinese philosophy Wang Yangming, a Ming Chinese neo-Confucian philosopher, official, educationist, calligraphist and general, held that objects do not exist entirely apart from the mind because the mind shapes them. It is not the world that shapes the mind but the mind that gives reason to the world, so the mind alone is the source of all reason, having an inner light, an innate moral goodness and understanding of what is good. Idealism in Vedic and Buddhist thought There are currents of idealism throughout Indian philosophy, ancient and modern. Hindu idealism often takes the form of monism or non-dualism, espousing the view that a unitary consciousness is the essence or meaning of the phenomenal reality and plurality. Buddhist idealism on the other hand is more epistemic and is not a metaphysical monism, which Buddhists consider eternalistic and hence not the middle way between extremes espoused by the Buddha. The oldest reference to Idealism in Vedic texts is in Purusha Sukta of the Rig Veda. This Sukta espouses panentheism by presenting cosmic being Purusha as both pervading all universe and yet being transcendent to it. Absolute idealism can be seen in Chāndogya Upaniṣad, where things of the objective world like the five elements and the subjective world such as will, hope, memory etc. are seen to be emanations from the Self. Indian philosophy Idealist notions have been propounded by the Vedanta schools of thought, which use the Vedas, especially the Upanishads as their key texts. Idealism was opposed by dualists Samkhya, the atomists Vaisheshika, the logicians Nyaya, the linguists Mimamsa and the materialists Cārvāka. There are various sub schools of Vedanta, like Advaita Vedanta (non-dual), Vishishtadvaita and Bhedabheda Vedanta (difference and non-difference). The schools of Vedanta all attempt to explain the nature and relationship of Brahman (universal soul or Self) and Atman (individual self), which they see as the central topic of the Vedas. One of the earliest attempts at this was Bādarāyaņa's Brahma Sutras, which is canonical for all Vedanta sub-schools. Advaita Vedanta is a major sub school of Vedanta which holds a non-dual Idealistic metaphysics. According to Advaita thinkers like Adi Shankara (788–820) and his contemporary Maṇḍana Miśra, Brahman, the single unitary consciousness or absolute awareness, appears as the diversity of the world because of maya or illusion, and hence perception of plurality is mithya, error. The world and all beings or souls in it have no separate existence from Brahman, universal consciousness, and the seemingly independent soul (jiva) is identical to Brahman. These doctrines are represented in verses such as brahma satyam jagan mithya; jīvo brahmaiva na aparah (Brahman is alone True, and this world of plurality is an error; the individual self is not different from Brahman). Other forms of Vedanta like the Vishishtadvaita of Ramanuja and the Bhedabheda of Bhāskara are not as radical in their non-dualism, accepting that there is a certain difference between individual souls and Brahman. Dvaita school of Vedanta by Madhvacharya maintains the opposing view that the world is real and eternal. It also argues that real atman fully depends and reflection of independent brahman. The Tantric tradition of Kashmir Shaivism has also been categorized by scholars as a form of Idealism. The key thinker of this tradition is the Kashmirian Abhinavagupta (975–1025 CE). Modern Vedic Idealism was defended by the influential Indian philosopher Sarvepalli Radhakrishnan in his 1932 An Idealist View of Life and other works, which espouse Advaita Vedanta. The essence of Hindu Idealism is captured by such modern writers as Sri Nisargadatta Maharaj, Sri Aurobindo, P. R. Sarkar, and Sohail Inayatullah. Buddhist philosophy Buddhist views which can be said to be similar to Idealism appear in Mahayana Buddhist texts such as the Samdhinirmocana sutra, Laṅkāvatāra Sūtra, Dashabhumika sutra, etc. These were later expanded upon by Indian Buddhist philosophers of the influential Yogacara school, like Vasubandhu, Asaṅga, Dharmakīrti, and Śāntarakṣita. Yogacara thought was also promoted in China by Chinese philosophers and translators like Xuanzang. There is a modern scholarly disagreement about whether Yogacara Buddhism can be said to be a form of idealism. As Saam Trivedi notes: "on one side of the debate, writers such as Jay Garfield, Jeffrey Hopkins, Paul Williams, and others maintain the idealism label, while on the other side, Stefan Anacker, Dan Lusthaus, Richard King, Thomas Kochumuttom, Alex Wayman, Janice Dean Willis, and others have argued that Yogacara is not idealist." The central point of issue is what Buddhist philosophers like Vasubandhu who used the term vijñapti-matra ("representation-only" or "cognition-only") and formulated arguments to refute external objects actually meant to say. Vasubandhu's works include a refutation of external objects or externality itself and argues that the true nature of reality is beyond subject-object distinctions. He views ordinary consciousness experience as deluded in its perceptions of an external world separate from itself and instead argues that all there is Vijñapti (representation or conceptualization). Hence Vasubandhu begins his Vimsatika with the verse: All this is consciousness-only, because of the appearance of non-existent objects, just as someone with an optical disorder may see non-existent nets of hair. Likewise, the Buddhist philosopher Dharmakirti's view of the apparent existence of external objects is summed up by him in the Pramānaṿārttika ('Commentary on Logic and Epistemology'): Cognition experiences itself, and nothing else whatsoever. Even the particular objects of perception, are by nature just consciousness itself. While some writers like Jay Garfield hold that Vasubandhu is a metaphysical idealist, others see him as closer to an epistemic idealist like Kant who holds that our knowledge of the world is simply knowledge of our own concepts and perceptions of a transcendental world. Sean Butler upholding that Yogacara is a form of idealism, albeit its own unique type, notes the similarity of Kant's categories and Yogacara's Vāsanās, both of which are simply phenomenal tools with which the mind interprets the noumenal realm. Unlike Kant however who holds that the noumenon or thing-in-itself is unknowable to us, Vasubandhu holds that ultimate reality is knowable, but only through non-conceptual yogic perception of a highly trained meditative mind. Writers like Dan Lusthaus who hold that Yogacara is not a metaphysical idealism point out, for example, that Yogācāra thinkers did not focus on consciousness to assert it as ontologically real, but simply to analyze how our experiences and thus our suffering is created. As Lusthaus notes: "no Indian Yogācāra text ever claims that the world is created by mind. What they do claim is that we mistake our projected interpretations of the world for the world itself, i.e. we take our own mental constructions to be the world." Lusthaus notes that there are similarities to Western epistemic idealists like Kant and Husserl, enough so that Yogacara can be seen as a form of epistemological idealism. However he also notes key differences like the concepts of karma and nirvana. Saam Trivedi meanwhile notes the similarities between epistemic idealism and Yogacara, but adds that Yogacara Buddhism is in a sense its own theory. Similarly, Thomas Kochumuttom sees Yogacara as "an explanation of experience, rather than a system of ontology" and Stefan Anacker sees Vasubandhu's philosophy as a form of psychology and as a mainly therapeutic enterprise. Subjective idealism Subjective idealism (also known as immaterialism) describes a relationship between experience and the world in which objects are no more than collections or bundles of sense data in the perceiver. Proponents include Berkeley, Bishop of Cloyne, an Anglo-Irish philosopher who advanced a theory he called "immaterialism," later referred to as "subjective idealism", contending that individuals can only know sensations and ideas of objects directly, not abstractions such as "matter", and that ideas also depend upon being perceived for their very existence - esse est percipi; "to be is to be perceived". Arthur Collier published similar assertions though there seems to have been no influence between the two contemporary writers. The only knowable reality is the represented image of an external object. Matter as a cause of that image, is unthinkable and therefore nothing to us. An external world as absolute matter unrelated to an observer does not exist as far as we are concerned. The universe cannot exist as it appears if there is no perceiving mind. Collier was influenced by An Essay Towards the Theory of the Ideal or Intelligible World by Cambridge Platonist John Norris (1701). Bertrand Russell's popular book The Problems of Philosophy highlights Berkeley's tautological premise for advancing idealism; "If we say that the things known must be in the mind, we are either unduly limiting the mind's power of knowing, or we are uttering a mere tautology. We are uttering a mere tautology if we mean by 'in the mind' the same as by 'before the mind', i.e. if we mean merely being apprehended by the mind. But if we mean this, we shall have to admit that what, in this sense, is in the mind, may nevertheless be not mental. Thus when we realize the nature of knowledge, Berkeley's argument is seen to be wrong in substance as well as in form, and his grounds for supposing that 'ideas'-i.e. the objects apprehended-must be mental, are found to have no validity whatever. Hence his grounds in favour of the idealism may be dismissed." The Australian philosopher David Stove harshly criticized philosophical idealism, arguing that it rests on what he called "the worst argument in the world". Stove claims that Berkeley tried to derive a non-tautological conclusion from tautological reasoning. He argued that in Berkeley's case the fallacy is not obvious and this is because one premise is ambiguous between one meaning which is tautological and another which, Stove argues, is logically equivalent to the conclusion. Alan Musgrave argues that conceptual idealists compound their mistakes with use/mention confusions; Santa Claus the person does not exist. "Santa Claus" the name/concept/fairy tale does exist because adults tell children this every Christmas season (the distinction is highlighted by using quotation-marks when referring only to the name and not the object) and proliferation of hyphenated entities such as "thing-in-itself" (Immanuel Kant), "things-as-interacted-by-us" (Arthur Fine), "table-of-commonsense" and "table-of-physics" (Arthur Eddington) which are "warning signs" for conceptual idealism according to Musgrave because they allegedly do not exist but only highlight the numerous ways in which people come to know the world. This argument does not take into account the issues pertaining to hermeneutics, especially at the backdrop of analytic philosophy. Musgrave criticized Richard Rorty and postmodernist philosophy in general for confusion of use and mention. A. A. Luce and John Foster are other subjectivists. Luce, in Sense without Matter (1954), attempts to bring Berkeley up to date by modernizing his vocabulary and putting the issues he faced in modern terms, and treats the Biblical account of matter and the psychology of perception and nature. Foster's The Case for Idealism argues that the physical world is the logical creation of natural, non-logical constraints on human sense-experience. Foster's latest defense of his views (phenomenalistic idealism) is in his book A World for Us: The Case for Phenomenalistic Idealism. Paul Brunton, a British philosopher, mystic, traveler, and guru, taught a type of idealism called "mentalism," similar to that of Bishop Berkeley, proposing a master world-image, projected or manifested by a world-mind, and an infinite number of individual minds participating. A tree does not cease to exist if nobody sees it because the world-mind is projecting the idea of the tree to all minds John Searle, criticizing some versions of idealism, summarizes two important arguments for subjective idealism. The first is based on our perception of reality: (1) All we have access to in perception are the contents of our own experience and (2) The only epistemic basis for claims about the external world are our perceptual experiences therefore; (3) The only reality we can meaningfully speak of is that of perceptual experience Whilst agreeing with (2) Searle argues that (1) is false and points out that (3) does not follow from (1) and (2). The second argument runs as follows;Premise: Any cognitive state occurs as part of a set of cognitive states and within a cognitive systemConclusion 1: It is impossible to get outside all cognitive states and systems to survey the relationships between them and the reality they cognizeConclusion 2: There is no cognition of any reality that exists independently of cognition Searle contends that Conclusion 2 does not follow from the premises. Epistemological idealism is a subjectivist position in epistemology that holds that what one knows about an object exists only in one's mind. Proponents include Brand Blanshard. Transcendental idealism Transcendental idealism, founded by Immanuel Kant in the eighteenth century, maintains that the mind shapes the world we perceive into the form of space-and-time. The 2nd edition (1787) contained a Refutation of Idealism to distinguish his transcendental idealism from Descartes's Sceptical Idealism and Berkeley's anti-realist strain of Subjective Idealism. The section Paralogisms of Pure Reason is an implicit critique of Descartes' idealism. Kant says that it is not possible to infer the 'I' as an object (Descartes' cogito ergo sum) purely from "the spontaneity of thought". Kant focused on ideas drawn from British philosophers such as Locke, Berkeley and Hume but distinguished his transcendental or critical idealism from previous varieties; Kant distinguished between things as they appear to an observer and things in themselves, "that is, things considered without regard to whether and how they may be given to us". We cannot approach the noumenon, the "thing in Itself" () without our own mental world. He added that the mind is not a blank slate, tabula rasa but rather comes equipped with categories for organising our sense impressions. In the first volume of his Parerga and Paralipomena, Schopenhauer wrote his "Sketch of a History of the Doctrine of the Ideal and the Real". He defined the ideal as being mental pictures that constitute subjective knowledge. The ideal, for him, is what can be attributed to our own minds. The images in our head are what comprise the ideal. Schopenhauer emphasized that we are restricted to our own consciousness. The world that appears is only a representation or mental picture of objects. We directly and immediately know only representations. All objects that are external to the mind are known indirectly through the mediation of our mind. He offered a history of the concept of the "ideal" as "ideational" or "existing in the mind as an image". Charles Bernard Renouvier was the first Frenchman after Nicolas Malebranche to formulate a complete idealistic system, and had a vast influence on the development of French thought. His system is based on Immanuel Kant's, as his chosen term "néo-criticisme" indicates; but it is a transformation rather than a continuation of Kantianism. Friedrich Nietzsche argued that Kant commits an agnostic tautology and does not offer a satisfactory answer as to the source of a philosophical right to such-or-other metaphysical claims; he ridicules his pride in tackling "the most difficult thing that could ever be undertaken on behalf of metaphysics." The famous "thing-in-itself" was called a product of philosophical habit, which seeks to introduce a grammatical subject: because wherever there is cognition, there must be a thing that is cognized and allegedly it must be added to ontology as a being (whereas, to Nietzsche, only the world as ever changing appearances can be assumed). Yet he attacks the idealism of Schopenhauer and Descartes with an argument similar to Kant's critique of the latter (see above). Objective idealism Objective idealism asserts that the reality of experiencing combines and transcends the realities of the object experienced and of the mind of the observer. Proponents include Thomas Hill Green, Josiah Royce, Benedetto Croce and Charles Sanders Peirce. Absolute idealism Schelling (1775–1854) claimed that the Fichte's "I" needs the Not-I, because there is no subject without object, and vice versa. So there is no difference between the subjective and the objective, that is, the ideal and the real. This is Schelling's "absolute identity": the ideas or mental images in the mind are identical to the extended objects which are external to the mind. Absolute idealism is G. W. F. Hegel's account of how existence is comprehensible as an all-inclusive whole. Hegel called his philosophy "absolute" idealism in contrast to the "subjective idealism" of Berkeley and the "transcendental idealism" of Kant and Fichte, which were not based on a critique of the finite and a dialectical philosophy of history as Hegel's idealism was. The exercise of reason and intellect enables the philosopher to know ultimate historical reality, the phenomenological constitution of self-determination, the dialectical development of self-awareness and personality in the realm of History. In his Science of Logic (1812–1814) Hegel argues that finite qualities are not fully "real" because they depend on other finite qualities to determine them. Qualitative infinity, on the other hand, would be more self-determining and hence more fully real. Similarly finite natural things are less "real"—because they are less self-determining—than spiritual things like morally responsible people, ethical communities and God. So any doctrine, such as materialism, that asserts that finite qualities or natural objects are fully real is mistaken. Hegel certainly intends to preserve what he takes to be true of German idealism, in particular Kant's insistence that ethical reason can and does go beyond finite inclinations. For Hegel there must be some identity of thought and being for the "subject" (any human observer) to be able to know any observed "object" (any external entity, possibly even another human) at all. Under Hegel's concept of "subject-object identity," subject and object both have Spirit (Hegel's ersatz, redefined, nonsupernatural "God") as their conceptual (not metaphysical) inner reality—and in that sense are identical. But until Spirit's "self-realization" occurs and Spirit graduates from Spirit to Absolute Spirit status, subject (a human mind) mistakenly thinks every "object" it observes is something "alien," meaning something separate or apart from "subject." In Hegel's words, "The object is revealed to it [to "subject"] by [as] something alien, and it does not recognize itself." Self-realization occurs when Hegel (part of Spirit's nonsupernatural Mind, which is the collective mind of all humans) arrives on the scene and realizes that every "object" is himself, because both subject and object are essentially Spirit. When self-realization occurs and Spirit becomes Absolute Spirit, the "finite" (man, human) becomes the "infinite" ("God," divine), replacing the imaginary or "picture-thinking" supernatural God of theism: man becomes God. Tucker puts it this way: "Hegelianism . . . is a religion of self-worship whose fundamental theme is given in Hegel's image of the man who aspires to be God himself, who demands 'something more, namely infinity.'" The picture Hegel presents is "a picture of a self-glorifying humanity striving compulsively, and at the end successfully, to rise to divinity." Kierkegaard criticized Hegel's idealist philosophy in several of his works, particularly his claim to a comprehensive system that could explain the whole of reality. Where Hegel argues that an ultimate understanding of the logical structure of the world is an understanding of the logical structure of God's mind, Kierkegaard asserts that for God reality can be a system but it cannot be so for any human individual because both reality and humans are incomplete and all philosophical systems imply completeness. For Hegel, a logical system is possible but an existential system is not: "What is rational is actual; and what is actual is rational". Hegel's absolute idealism blurs the distinction between existence and thought: our mortal nature places limits on our understanding of reality; So-called systems have often been characterized and challenged in the assertion that they abrogate the distinction between good and evil, and destroy freedom. Perhaps one would express oneself quite as definitely, if one said that every such system fantastically dissipates the concept existence. ... Being an individual man is a thing that has been abolished, and every speculative philosopher confuses himself with humanity at large; whereby he becomes something infinitely great, and at the same time nothing at all. A major concern of Hegel's Phenomenology of Spirit (1807) and of the philosophy of Spirit that he lays out in his Encyclopedia of the Philosophical Sciences (1817–1830) is the interrelation between individual humans, which he conceives in terms of "mutual recognition." However, what Climacus means by the aforementioned statement, is that Hegel, in the Philosophy of Right, believed the best solution was to surrender one's individuality to the customs of the State, identifying right and wrong in view of the prevailing bourgeois morality. Individual human will ought, at the State's highest level of development, to properly coincide with the will of the State. Climacus rejects Hegel's suppression of individuality by pointing out it is impossible to create a valid set of rules or system in any society which can adequately describe existence for any one individual. Submitting one's will to the State denies personal freedom, choice, and responsibility. In addition, Hegel does believe we can know the structure of God's mind, or ultimate reality. Hegel agrees with Kierkegaard that both reality and humans are incomplete, inasmuch as we are in time, and reality develops through time. But the relation between time and eternity is outside time and this is the "logical structure" that Hegel thinks we can know. Kierkegaard disputes this assertion, because it eliminates the clear distinction between ontology and epistemology. Existence and thought are not identical and one cannot possibly think existence. Thought is always a form of abstraction, and thus not only is pure existence impossible to think, but all forms in existence are unthinkable; thought depends on language, which merely abstracts from experience, thus separating us from lived experience and the living essence of all beings. In addition, because we are finite beings, we cannot possibly know or understand anything that is universal or infinite such as God, so we cannot know God exists, since that which transcends time simultaneously transcends human understanding. Bradley saw reality as a monistic whole apprehended through "feeling", a state in which there is no distinction between the perception and the thing perceived. Like Berkeley, Bradley thought that nothing can be
beliefs and values—shape society. Any philosophy that assigns crucial importance to the ideal or spiritual realm in its account of human existence may be termed "idealist". Metaphysical idealism is an ontological doctrine that holds that reality itself is incorporeal or experiential at its core. Beyond this, idealists disagree on which aspects of the mental are more basic. Platonic idealism affirms that abstractions are more basic to reality than the things we perceive, while subjective idealists and phenomenalists tend to privilege sensory experience over abstract reasoning. Epistemological idealism is the view that reality can only be known through ideas, that only psychological experience can be apprehended by the mind. Subjective idealists like George Berkeley are anti-realists in terms of a mind-independent world. However, not all idealists restrict the real or the knowable to our immediate subjective experience. Objective idealists make claims about a transempirical world, but simply deny that this world is essentially divorced from or ontologically prior to the mental. Thus, Plato and Gottfried Leibniz affirm an objective and knowable reality transcending our subjective awareness—a rejection of epistemological idealism—but propose that this reality is grounded in ideal entities, a form of metaphysical idealism. Nor do all metaphysical idealists agree on the nature of the ideal; for Plato, the fundamental entities were non-mental abstract forms, while for Leibniz they were proto-mental and concrete monads. As a rule, transcendental idealists like Kant affirm idealism's epistemic side without committing themselves to whether reality is ultimately mental; objective idealists like Plato affirm reality's metaphysical basis in the mental or abstract without restricting their epistemology to ordinary experience; and subjective idealists like Berkeley affirm both metaphysical and epistemological idealism. Classical idealism Pre-Socratic philosophy Idealism as a form of metaphysical monism holds that consciousness, not matter, is the ground of all being. It is monist because it holds that there is only one type of thing in the universe and idealist because it holds that one thing to be consciousness. Anaxagoras (480 BC) taught that "all things" were created by Nous ("Mind"). He held that Mind held the cosmos together and gave human beings a connection to the cosmos or a pathway to the divine. Platonism and neoplatonism Plato's theory of forms or "ideas" describes ideal forms (for example the platonic solids in geometry or abstracts like Goodness and Justice), as universals existing independently of any particular instance. Arne Grøn calls this doctrine "the classic example of a metaphysical idealism as a transcendent idealism", while Simone Klein calls Plato "the earliest representative of metaphysical objective idealism". Nevertheless, Plato holds that matter is real, though transitory and imperfect, and is perceived by our body and its senses and given existence by the eternal ideas that are perceived directly by our rational soul. Plato was therefore a metaphysical and epistemological dualist, an outlook that modern idealism has striven to avoid: Plato's thought cannot therefore be counted as idealist in the modern sense. With the neoplatonist Plotinus, wrote Nathaniel Alfred Boll "there even appears, probably for the first time in Western philosophy, idealism that had long been current in the East even at that time, for it taught... that the soul has made the world by stepping from eternity into time...". Similarly, in regard to passages from the Enneads, "The only space or place of the world is the soul" and "Time must not be assumed to exist outside the soul". Ludwig Noiré wrote: "For the first time in Western philosophy we find idealism proper in Plotinus". However, Plotinus does not address whether we know external objects, unlike Schopenhauer and other modern philosophers. Christian philosophy Christian theologians have held idealist views, often based on neoplatonism, despite the influence of Aristotelian scholasticism from the 12th century onward. However there is certainly a sense in which the scholastics retained the idealism that came via St. Augustine right back to Plato. Later western theistic idealism such as that of Hermann Lotze offers a theory of the "world ground" in which all things find their unity: it has been widely accepted by Protestant theologians. Several modern religious movements, for example the organizations within the New Thought Movement and the Unity Church, may be said to have a particularly idealist orientation. The theology of Christian Science includes a form of idealism: it teaches that all that truly exists is God and God's ideas; that the world as it appears to the senses is a distortion of the underlying spiritual reality, a distortion that may be corrected (both conceptually and in terms of human experience) through a reorientation (spiritualization) of thought. Chinese philosophy Wang Yangming, a Ming Chinese neo-Confucian philosopher, official, educationist, calligraphist and general, held that objects do not exist entirely apart from the mind because the mind shapes them. It is not the world that shapes the mind but the mind that gives reason to the world, so the mind alone is the source of all reason, having an inner light, an innate moral goodness and understanding of what is good. Idealism in Vedic and Buddhist thought There are currents of idealism throughout Indian philosophy, ancient and modern. Hindu idealism often takes the form of monism or non-dualism, espousing the view that a unitary consciousness is the essence or meaning of the phenomenal reality and plurality. Buddhist idealism on the other hand is more epistemic and is not a metaphysical monism, which Buddhists consider eternalistic and hence not the middle way between extremes espoused by the Buddha. The oldest reference to Idealism in Vedic texts is in Purusha Sukta of the Rig Veda. This Sukta espouses panentheism by presenting cosmic being Purusha as both pervading all universe and yet being transcendent to it. Absolute idealism can be seen in Chāndogya Upaniṣad, where things of the objective world like the five elements and the subjective world such as will, hope, memory etc. are seen to be emanations from the Self. Indian philosophy Idealist notions have been propounded by the Vedanta schools of thought, which use the Vedas, especially the Upanishads as their key texts. Idealism was opposed by dualists Samkhya, the atomists Vaisheshika, the logicians Nyaya, the linguists Mimamsa and the materialists Cārvāka. There are various sub schools of Vedanta, like Advaita Vedanta (non-dual), Vishishtadvaita and Bhedabheda Vedanta (difference and non-difference). The schools of Vedanta all attempt to explain the nature and relationship of Brahman (universal soul or Self) and Atman (individual self), which they see as the central topic of the Vedas. One of the earliest attempts at this was Bādarāyaņa's Brahma Sutras, which is canonical for all Vedanta sub-schools. Advaita Vedanta is a major sub school of Vedanta which holds a non-dual Idealistic metaphysics. According to Advaita thinkers like Adi Shankara (788–820) and his contemporary Maṇḍana Miśra, Brahman, the single unitary consciousness or absolute awareness, appears as the diversity of the world because of maya or illusion, and hence perception of plurality is mithya, error. The world and all beings or souls in it have no separate existence from Brahman, universal consciousness, and the seemingly independent soul (jiva) is identical to Brahman. These doctrines are represented in verses such as brahma satyam jagan mithya; jīvo brahmaiva na aparah (Brahman is alone True, and this world of plurality is an error; the individual self is not different from Brahman). Other forms of Vedanta like the Vishishtadvaita of Ramanuja and the Bhedabheda of Bhāskara are not as radical in their non-dualism, accepting that there is a certain difference between individual souls and Brahman. Dvaita school of Vedanta by Madhvacharya maintains the opposing view that the world is real and eternal. It also argues that real atman fully depends and reflection of independent brahman. The Tantric tradition of Kashmir Shaivism has also been categorized by scholars as a form of Idealism. The key thinker of this tradition is the Kashmirian Abhinavagupta (975–1025 CE). Modern Vedic Idealism was defended by the influential Indian philosopher Sarvepalli Radhakrishnan in his 1932 An Idealist View of Life and other works, which espouse Advaita Vedanta. The essence of Hindu Idealism is captured by such modern writers as Sri Nisargadatta Maharaj, Sri Aurobindo, P. R. Sarkar, and Sohail Inayatullah. Buddhist philosophy Buddhist views which can be said to be similar to Idealism appear in Mahayana Buddhist texts such as the Samdhinirmocana sutra, Laṅkāvatāra Sūtra, Dashabhumika sutra, etc. These were later expanded upon by Indian Buddhist philosophers of the influential Yogacara school, like Vasubandhu, Asaṅga, Dharmakīrti, and Śāntarakṣita. Yogacara thought was also promoted in China by Chinese philosophers and translators like Xuanzang. There is a modern scholarly disagreement about whether Yogacara Buddhism can be said to be a form of idealism. As Saam Trivedi notes: "on one side of the debate, writers such as Jay Garfield, Jeffrey Hopkins, Paul Williams, and others maintain the idealism label, while on the other side, Stefan Anacker, Dan Lusthaus, Richard King, Thomas Kochumuttom, Alex Wayman, Janice Dean Willis, and others have argued that Yogacara is not idealist." The central point of issue is what Buddhist philosophers like Vasubandhu who used the term vijñapti-matra ("representation-only" or "cognition-only") and formulated arguments to refute external objects actually meant to say. Vasubandhu's works include a refutation of external objects or externality itself and argues that the true nature of reality is beyond subject-object distinctions. He views ordinary consciousness experience as deluded in its perceptions of an external world separate from itself and instead argues that all there is Vijñapti (representation or conceptualization). Hence Vasubandhu begins his Vimsatika with the verse: All this is consciousness-only, because of the appearance of non-existent objects, just as someone with an optical disorder may see non-existent nets of hair. Likewise, the Buddhist philosopher Dharmakirti's view of the apparent existence of external objects is summed up by him in the Pramānaṿārttika ('Commentary on Logic and Epistemology'): Cognition experiences itself, and nothing else whatsoever. Even the particular objects of perception, are by nature just consciousness itself. While some writers like Jay Garfield hold that Vasubandhu is a metaphysical idealist, others see him as closer to an epistemic idealist like Kant who holds that our knowledge of the world is simply knowledge of our own concepts and perceptions of a transcendental world. Sean Butler upholding that Yogacara is a form of idealism, albeit its own unique type, notes the similarity of Kant's categories and Yogacara's Vāsanās, both of which are simply phenomenal tools with which the mind interprets the noumenal realm. Unlike Kant however who holds that the noumenon or thing-in-itself is unknowable to us, Vasubandhu holds that ultimate reality is knowable, but only through non-conceptual yogic perception of a highly trained meditative mind. Writers like Dan Lusthaus who hold that Yogacara is not a metaphysical idealism point out, for example, that Yogācāra thinkers did not focus on consciousness to assert it as ontologically real, but simply to analyze how our experiences and thus our suffering is created. As Lusthaus notes: "no Indian Yogācāra text ever claims that the world is created by mind. What they do claim is that we mistake our projected interpretations of the world for the world itself, i.e. we take our own mental constructions to be the world." Lusthaus notes that there are similarities to Western epistemic idealists like Kant and Husserl, enough so that Yogacara can be seen as a form of epistemological idealism. However he also notes key differences like the concepts of karma and nirvana. Saam Trivedi meanwhile notes the similarities between epistemic idealism and Yogacara, but adds that Yogacara Buddhism is in a sense its own theory. Similarly, Thomas Kochumuttom sees Yogacara as "an explanation of experience, rather than a system of ontology" and Stefan Anacker sees Vasubandhu's philosophy as a form of psychology and as a mainly therapeutic enterprise. Subjective idealism Subjective idealism (also known as immaterialism) describes a relationship between experience and the world in which objects are no more than collections or bundles of sense data in the perceiver. Proponents include Berkeley, Bishop of Cloyne, an Anglo-Irish philosopher who advanced a theory he called "immaterialism," later referred to as "subjective idealism", contending that individuals can only know sensations and ideas of objects directly, not abstractions such as "matter", and that ideas also depend upon being perceived for their very existence - esse est percipi; "to be is to be perceived". Arthur Collier published similar assertions though there seems to have been no influence between the two contemporary writers. The only knowable reality is the represented image of an external object. Matter as a cause of that image, is unthinkable and therefore nothing to us. An
pre-Islamic societies that existed in the Arabian Peninsula at the time. Furthermore, the Quran introduced additional heirs that were not entitled to inheritance in pre-Islamic times, mentioning nine relatives specifically of which six were female and three were male. However, the inheritance rights of women remained inferior to those of men because in Islam someone always has a responsibility of looking after a woman's expenses. According to Quran 4:11, for example, a son is entitled to twice as much inheritance as a daughter. The Quran also presented efforts to fix the laws of inheritance, and thus forming a complete legal system. This development was in contrast to pre-Islamic societies where rules of inheritance varied considerably. In addition to the above changes, the Quran imposed restrictions on testamentary powers of a Muslim in disposing his or her property. Three verses of the Quran, 4:11, 4:12 and 4:176, give specific details of inheritance and shares, in addition to few other verses dealing with testamentary. But this information was used as a starting point by Muslim jurists who expounded the laws of inheritance even further using Hadith, as well as methods of juristic reasoning like Qiyas. Nowadays, inheritance is considered an integral part of Sharia law and its application for Muslims is mandatory, though many peoples (see Historical inheritance systems), despite being Muslim, have other inheritance customs. Inequality The distribution of the inherited wealth has varied greatly among different cultures and legal traditions. In nations using civil law, for example, the right of children to inherit wealth from parents in pre-defined ratios is enshrined in law, as far back as the Code of Hammurabi (ca. 1750 BC). In the US State of Louisiana, the only US state where the legal system is derived from the Napoleonic Code, this system is known as "forced heirship" which prohibits disinheritance of adult children except for a few narrowly-defined reasons that a parent is obligated to prove. Other legal traditions, particularly in nations using common law, allow inheritances to be divided however one wishes, or to disinherit any child for any reason. In cases of unequal inheritance, the majority might receive little while only a small number inherit a larger amount. The amount of inheritance is often far less than the value of a business initially given to the son, especially when a son takes over a thriving multimillion-dollar business, yet the daughter is given the balance of the actual inheritance amounting to far less than the value of business that was initially given to the son. This is especially seen in old world cultures, but continues in many families to this day. Arguments for eliminating forced heirship include the right to property and the merit of individual allocation of capital over government wealth confiscation and redistribution, but this does not resolve what some describe as the problem of unequal inheritance. In terms of inheritance inequality, some economists and sociologists focus on the inter generational transmission of income or wealth which is said to have a direct impact on one's mobility (or immobility) and class position in society. Nations differ on the political structure and policy options that govern the transfer of wealth. According to the American federal government statistics compiled by Mark Zandi in 1985, the average US inheritance was $39,000. In subsequent years, the overall amount of total annual inheritance more than doubled, reaching nearly $200 billion. By 2050, there will be an estimated $25 trillion inheritance transmitted across generations. Some researchers have attributed this rise to the baby boomer generation. Historically, the baby boomers were the largest influx of children conceived after WW2. For this reason, Thomas Shapiro suggests that this generation "is in the midst of benefiting from the greatest inheritance of wealth in history". Inherited wealth may help explain why many Americans who have become rich may have had a "substantial head start". In September 2012, according to the Institute for Policy Studies, "over 60 percent" of the Forbes richest 400 Americans "grew up in substantial privilege", and often (but not always) received substantial inheritances. Other research has shown that many inheritances, large or small, are rapidly squandered. Similarly, analysis shows that over two-thirds of high-wealth families lose their wealth within two generations, and almost 80% of high-wealth parents
reasoning like Qiyas. Nowadays, inheritance is considered an integral part of Sharia law and its application for Muslims is mandatory, though many peoples (see Historical inheritance systems), despite being Muslim, have other inheritance customs. Inequality The distribution of the inherited wealth has varied greatly among different cultures and legal traditions. In nations using civil law, for example, the right of children to inherit wealth from parents in pre-defined ratios is enshrined in law, as far back as the Code of Hammurabi (ca. 1750 BC). In the US State of Louisiana, the only US state where the legal system is derived from the Napoleonic Code, this system is known as "forced heirship" which prohibits disinheritance of adult children except for a few narrowly-defined reasons that a parent is obligated to prove. Other legal traditions, particularly in nations using common law, allow inheritances to be divided however one wishes, or to disinherit any child for any reason. In cases of unequal inheritance, the majority might receive little while only a small number inherit a larger amount. The amount of inheritance is often far less than the value of a business initially given to the son, especially when a son takes over a thriving multimillion-dollar business, yet the daughter is given the balance of the actual inheritance amounting to far less than the value of business that was initially given to the son. This is especially seen in old world cultures, but continues in many families to this day. Arguments for eliminating forced heirship include the right to property and the merit of individual allocation of capital over government wealth confiscation and redistribution, but this does not resolve what some describe as the problem of unequal inheritance. In terms of inheritance inequality, some economists and sociologists focus on the inter generational transmission of income or wealth which is said to have a direct impact on one's mobility (or immobility) and class position in society. Nations differ on the political structure and policy options that govern the transfer of wealth. According to the American federal government statistics compiled by Mark Zandi in 1985, the average US inheritance was $39,000. In subsequent years, the overall amount of total annual inheritance more than doubled, reaching nearly $200 billion. By 2050, there will be an estimated $25 trillion inheritance transmitted across generations. Some researchers have attributed this rise to the baby boomer generation. Historically, the baby boomers were the largest influx of children conceived after WW2. For this reason, Thomas Shapiro suggests that this generation "is in the midst of benefiting from the greatest inheritance of wealth in history". Inherited wealth may help explain why many Americans who have become rich may have had a "substantial head start". In September 2012, according to the Institute for Policy Studies, "over 60 percent" of the Forbes richest 400 Americans "grew up in substantial privilege", and often (but not always) received substantial inheritances. Other research has shown that many inheritances, large or small, are rapidly squandered. Similarly, analysis shows that over two-thirds of high-wealth families lose their wealth within two generations, and almost 80% of high-wealth parents "feel the next generation is not financially responsible enough to handle inheritance". Social stratification It has been argued that inheritance plays a significant effect on social stratification. Inheritance is an integral component of family, economic, and legal institutions, and a basic mechanism of class stratification. It also affects the distribution of wealth at the societal level. The total cumulative effect of inheritance on stratification outcomes takes three forms, according to scholars who have examined the subject. The first form of inheritance is the inheritance of cultural capital (i.e. linguistic styles, higher status social circles, and aesthetic preferences). The second form of inheritance is through familial interventions in the form of inter vivos transfers (i.e. gifts between the living), especially at crucial junctures in the life courses. Examples include during a child's milestone stages, such as going to college, getting married, getting a job, and purchasing a home. The third form of inheritance is the transfers of bulk estates at the time of death of the testators, thus resulting in significant economic advantage accruing to children during their adult years. The origin of the stability of inequalities is material (personal possessions one is able to obtain) and is also cultural, rooted either in varying child-rearing practices that are geared to socialization according to social class and economic position. Child-rearing practices among those who inherit wealth may center around favoring some groups at the expense of others at the bottom of the social hierarchy. Sociological and economic effects of inheritance inequality It is further argued that the degree to which economic status and inheritance is transmitted across generations determines one's life chances in society. Although many have linked one's social origins and educational attainment to life chances and opportunities, education cannot serve as the most influential predictor of economic mobility. In fact, children of well-off parents generally receive better schooling and benefit from material, cultural, and genetic inheritances. Likewise, schooling attainment is often persistent across generations and families with higher amounts of inheritance are able to acquire and transmit higher amounts of human capital. Lower amounts of human capital and inheritance can perpetuate inequality in the housing market and higher education. Research reveals that inheritance plays an important role in the accumulation of housing wealth. Those who receive an inheritance are more likely to own a home than those who do not regardless of the size of the inheritance. Often, racial or religious minorities and individuals from socially disadvantaged backgrounds receive less inheritance and wealth. As a result, mixed races might be excluded in inheritance privilege and are more likely to rent homes or live in poorer neighborhoods, as well as achieve lower educational attainment compared with whites in America. Individuals with a substantial amount of wealth and inheritance often intermarry with others of the same social class to protect their wealth and ensure the continuous transmission of inheritance across generations; thus perpetuating a cycle of privilege. Nations with the highest income and wealth inequalities often have the highest rates of homicide and disease (such as obesity, diabetes, and hypertension) which results in high mortality rates. A The New York Times article reveals that the U.S. is the world's wealthiest nation, but "ranks twenty-ninth in life expectancy, right behind Jordan and Bosnia" and "has the second highest mortality rate of the comparable OECD countries". This has been regarded as highly attributed to the significant gap of inheritance inequality in the country, although there are clearly other factors such as the affordability of healthcare. When social and economic inequalities centered on inheritance are perpetuated by major social institutions such as family, education, religion, etc., these differing life opportunities are argued to be transmitted from each generation. As a result, this inequality is believed to become part of the overall social structure. Dynastic wealth Dynastic wealth is monetary inheritance that is passed on to generations that didn't earn it. Dynastic wealth is linked to the term Plutocracy. Much has been written about the rise and influence of dynastic wealth including the bestselling book Capital in the Twenty-First Century by the French economist Thomas Piketty. Bill Gates uses the term in his article "Why Inequality Matters". Soviet response to inheritance As Communism is founded on the Marxist Labor Theory of Value, any money collected in the course of a lifetime
explained by positing that he was not the main purpose of the soldiers' trip, and that the various stops in Asia Minor were for other state business. He suggests that such a scenario would also explain the relative freedom that Ignatius was given to meet with other Christians during the journey. Date of martyrdom Due to the sparse and fragmentary nature of the documentation of Ignatius' life and martyrdom, the date of his death is subject to a significant amount of uncertainty. Tradition places the martyrdom of Ignatius in the reign of Trajan, who was emperor of Rome from 98 to 117 AD. But the earliest source for this Trajanic date is the 4th century church historian Eusebius of Caesarea, who is regarded by some modern scholars as an unreliable source for chronological information regarding the early church. Eusebius had an ideological interest in dating church leaders as early as possible, and ensuring that there were no gaps in succession between the original apostles of Jesus and the leaders of the church in his day. While many scholars accept the traditional dating of Ignatius' martyrdom under Trajan, others have argued for a somewhat later date. Richard Pervo dated Ignatius' death to 135–140 AD. British classicist Timothy Barnes has argued for a date in the 140s AD, on the grounds that Ignatius seems to have quoted a work of the Gnostic Ptolemy in one of his epistles, who only became active in the 130s. Death and aftermath Ignatius himself wrote that he would be thrown to the beasts, and in the fourth century Eusebius reports tradition that this came to pass, which is then repeated by Jerome who is the first to explicitly mention "lions." John Chrysostom is the first to allude to the Colosseum as the place of Ignatius' martyrdom. Contemporary scholars are uncertain that any of these authors had sources other than Ignatius' own writings. According to a medieval Christian text titled Martyrium Ignatii, Ignatius' remains were carried back to Antioch by his companions after his martyrdom. The sixth-century writings of Evagrius Scholasticus state that the reputed remains of Ignatius were moved by the Emperor Theodosius II to the Tychaeum, or Temple of Tyche, which had been converted into a church dedicated to Ignatius. In 637 the relics were transferred to the Basilica di San Clemente in Rome. The Martyrium Ignatii There is a purported eye-witness account of his martyrdom, named the Martyrium Ignatii. It is presented as being an eye-witness account for the church of Antioch, attributed to Ignatius' companions, Philo of Cilicia, deacon at Tarsus, and Rheus Agathopus, a Syrian. Its most reliable manuscript is the 10th-century Codex Colbertinus (Paris), in which the Martyrium closes the collection. The Martyrium presents the confrontation of the bishop Ignatius with Trajan at Antioch, a familiar trope of Acta of the martyrs, and many details of the long, partly overland voyage to Rome. The Synaxarium of the Coptic Orthodox Church of Alexandria says that he was thrown to the wild beasts that devoured him and rent him to pieces. Epistles The following seven epistles preserved under the name of Ignatius are generally considered authentic, since they were mentioned by the historian Eusebius in the first half of the fourth century. Seven original epistles: The Epistle to the Ephesians, The Epistle to the Magnesians, The Epistle to the Trallians, The Epistle to the Romans, The Epistle to the Philadelphians, The Epistle to the Smyrnaeans, The Epistle to Polycarp, a bishop of Smyrna. Recensions The text of these epistles is known in three different recensions, or editions: the Short Recension, found in a Syriac manuscript; the Middle Recension, found only in Greek manuscripts; and the Long Recension, found in Greek and Latin manuscripts. For some time, it was believed that the Long Recension was the only extant version of the Ignatian epistles, but around 1628 a Latin translation of the Middle Recension was discovered by Archbishop James Ussher, who published it in 1646. For around a quarter of a century after this, it was debated which recension represented the original text of the epistles. But ever since John Pearson's strong defense of the authenticity of the Middle Recension in the late 17th century, there has been a scholarly consensus that the Middle Recension is the original version of the text. The Long Recension is the product of a fourth-century Arian Christian, who interpolated the Middle Recension epistles in order posthumously to enlist Ignatius as an unwitting witness in theological disputes of that age. This individual also forged the six spurious epistles attributed to Ignatius (see below). Manuscripts representing the Short Recension of the Ignatian epistles were discovered and published by William Cureton in the mid-19th century. For a brief period, there was a scholarly debate on the question of whether the Short Recension was earlier and more original than the Middle Recension. But by the end of the 19th century, Theodor Zahn and J. B. Lightfoot had established a scholarly consensus that the Short Recension is merely a summary of the text of the Middle Recension, and was therefore composed later. Authenticity Ever since the Protestant Reformation in the 16th century, the authenticity of all the Ignatian epistles has come under intense scrutiny. John Calvin called the epistles "rubbish published under Ignatius’ name." Some Protestants have tended to want to deny the authenticity of all the epistles attributed to Ignatius because they seem to attest to the existence of a monarchical episcopate in the second century. The Roman Catholic Church has long held up the authenticity of the letters from past to present. In 1886, Presbyterian minister and church historian William Dool Killen published an essay extensively arguing that none of the epistles attributed to Ignatius is authentic. Instead, he argued that Callixtus, bishop of Rome, forged the letters around AD 220 to garner support for a monarchical episcopate, modeling the renowned Saint Ignatius after his own life to give precedent for his own authority. Killen contrasted this episcopal polity with the presbyterian polity in the writings of Polycarp. Some doubts about the authenticity of the original letters continued into the 20th century. In the late 1970s and 1980s, the scholars Robert Joly, Reinhard Hübner, Markus Vinzent, and Thomas Lechner argued forcefully that the epistles of the Middle Recension were forgeries written during the reign of Marcus Aurelius (161–180 AD). Around the same time, the scholar Joseph Ruis-Camps published a study arguing that the Middle Recension letters were pseudepigraphically composed based on an original, smaller, authentic corpus of four letters (Romans, Magnesians, Trallians, and Ephesians). In 2009, Otto Zwierlein took up the thesis of a fake, made around 170. These publications stirred up tremendous, heated controversy in the scholarly community at the time, but in 2017, most religious scholars accepted the authenticity of the seven original epistles. However, J. Lookadoo said in 2020 that "the debate has received renewed energy since the late 1990s and shows few signs of slowing." The original texts of six of the seven original letters are found in the Codex Mediceo Laurentianus written in Greek in the 11th century (which also contains the pseudepigraphical letters of the Long Recension, except that to the Philippians), while the letter to the Romans is found in the Codex Colbertinus. Style and structure Ignatius's letters bear signs of being written in great haste and without a proper plan, such as run-on sentences and an unsystematic succession of thought. Ignatius modelled his writings after those allegedly written by Paul, Peter, and John, and even quoted or paraphrased biblical entries by these apostles' works freely, such as when he quoted 1 Corinthians 1:18, in his letter to the Ephesians: Theology Christology Ignatius is known to have taught the deity of Christ: The same section in text of the Long Recension says the following: He stressed the value of the Eucharist, calling it a "medicine of immortality" (Ignatius to the Ephesians 20:2). The very strong desire for bloody martyrdom in the arena, which Ignatius expresses rather graphically in places, may seem quite odd to the modern reader. An examination of his theology of soteriology shows that he regarded salvation as one being free from the powerful fear of death and thus to face martyrdom bravely. Ignatius is claimed to be the first known Christian writer to argue in favor of Christianity's replacement of the Sabbath with the Lord's Day: This pasaste has provoked textual debate since the only Greek
minimize any further dissension among the Antiochene Christians. Christine Trevett has called Davies' suggestion "entirely hypothetical" and concludes that no fully satisfactory solution to the problem can be found, writing, "I tend to take the bishop at his word when he says he is a condemned man. But the question remains, why is he going to Rome? The truth is that we do not know." Route of travel to Rome During the journey to Rome, Ignatius and his entourage of soldiers made a number of lengthy stops in Asia Minor, deviating from the most direct land route from Antioch to Rome. Scholars generally agree on the following reconstruction of Ignatius' route of travel: Ignatius first traveled from Antioch, in the province of Syria, to Asia Minor. It is uncertain whether he traveled by sea or by land. He was then taken to Smyrna, via a route that bypassed the cities of Magnesia, Tralles, and Ephesus, but likely passed through Philadelphia (cf. Ign. Phil. 7). Ignatius then traveled to Troas, where he boarded a ship bound for Neapolis in Macedonia (cf. Ign. Pol. 8). He then passed through the city of Philippi (cf. Pol. Phil. 9). After this, he took some land or sea route to Rome. During the journey, the soldiers allowed Ignatius to meet with entire congregations of Christians while in chains, at least while he was in Philadelphia (cf. Ign. Phil. 7), and numerous Christian visitors and messengers were allowed to meet with him on a one-on-one basis. These messengers allowed Ignatius to send six letters to nearby churches, and one to Polycarp, the bishop of Smyrna. These aspects of Ignatius' martyrdom are also regarded by scholars as unusual. It is generally expected that a prisoner would be transported on the most direct, cost-effective route to their destination. Since travel by land in the Roman Empire was between five and fifty-two times more expensive than travel by sea, and Antioch was a major port city, the most efficient route would likely have been entirely by sea. Steven Davies argues that Ignatius' circuitous route to Rome can only be explained by positing that he was not the main purpose of the soldiers' trip, and that the various stops in Asia Minor were for other state business. He suggests that such a scenario would also explain the relative freedom that Ignatius was given to meet with other Christians during the journey. Date of martyrdom Due to the sparse and fragmentary nature of the documentation of Ignatius' life and martyrdom, the date of his death is subject to a significant amount of uncertainty. Tradition places the martyrdom of Ignatius in the reign of Trajan, who was emperor of Rome from 98 to 117 AD. But the earliest source for this Trajanic date is the 4th century church historian Eusebius of Caesarea, who is regarded by some modern scholars as an unreliable source for chronological information regarding the early church. Eusebius had an ideological interest in dating church leaders as early as possible, and ensuring that there were no gaps in succession between the original apostles of Jesus and the leaders of the church in his day. While many scholars accept the traditional dating of Ignatius' martyrdom under Trajan, others have argued for a somewhat later date. Richard Pervo dated Ignatius' death to 135–140 AD. British classicist Timothy Barnes has argued for a date in the 140s AD, on the grounds that Ignatius seems to have quoted a work of the Gnostic Ptolemy in one of his epistles, who only became active in the 130s. Death and aftermath Ignatius himself wrote that he would be thrown to the beasts, and in the fourth century Eusebius reports tradition that this came to pass, which is then repeated by Jerome who is the first to explicitly mention "lions." John Chrysostom is the first to allude to the Colosseum as the place of Ignatius' martyrdom. Contemporary scholars are uncertain that any of these authors had sources other than Ignatius' own writings. According to a medieval Christian text titled Martyrium Ignatii, Ignatius' remains were carried back to Antioch by his companions after his martyrdom. The sixth-century writings of Evagrius Scholasticus state that the reputed remains of Ignatius were moved by the Emperor Theodosius II to the Tychaeum, or Temple of Tyche, which had been converted into a church dedicated to Ignatius. In 637 the relics were transferred to the Basilica di San Clemente in Rome. The Martyrium Ignatii There is a purported eye-witness account of his martyrdom, named the Martyrium Ignatii. It is presented as being an eye-witness account for the church of Antioch, attributed to Ignatius' companions, Philo of Cilicia, deacon at Tarsus, and Rheus Agathopus, a Syrian. Its most reliable manuscript is the 10th-century Codex Colbertinus (Paris), in which the Martyrium closes the collection. The Martyrium presents the confrontation of the bishop Ignatius with Trajan at Antioch, a familiar trope of Acta of the martyrs, and many details of the long, partly overland
be any number of letters and numerals but each country must only use call signs that begin with the characters allocated for use in that country. With regard to the second and/or third letters in the prefixes in the list below, if the country in question is allocated all callsigns with A to Z in that position, then that country can also use call signs with the digits 0 to 9 in that position. For example, the United States is assigned KA–KZ, and therefore can also use prefixes like KW0 or K1. While ITU prefix rules are adhered to in the context of international broadcasting, including amateur radio, it is rarer for countries to assign broadcast call signs to conventional AM, FM, and television stations with purely domestic reach; the United States, Canada, Mexico, Japan, South Korea, and the Philippines are among those that do. Canada presents one notable exception to the ITU prefix rules: it uses CB for its own Canadian Broadcasting Corporation stations, whereas Chile is officially assigned the CB prefix. Department of Industry's broadcasting rules indicate this is through a "special arrangement", without elaborating. In any case, the two countries are geographically separate enough to prevent confusion; Canada's shortwave broadcasters and amateur radio stations have always used one of its assigned ITU prefixes. Unallocated and
Unavailable: Under present ITU guidelines the following call sign prefixes shall not be allocated. They are sometimes used unofficially – such as amateur radio operators operating in a disputed territory or in a nation state that has no official prefix (e.g. S0 in Western Sahara, station 1A0 at Knights of Malta headquarters in Rome, or station 1L in Liberland). (x represents any letter; n represents any digit from 2–9.) nn, x0, x1, 0x, 1x, Qx. no prefixes beginning with Q are used—they may be confused with Q codes. Note that this applies to prefixes only - suffixes are the responsibility of the allocating country. no prefixes with the digits 1 or 0 are used—they may be confused with the letters I or O. two digit prefixes (nn) are not as yet considered by the ITU. Allocation table See also Call-sign allocation plan Non-ITU prefix Amateur radio call signs Aircraft registration Notes References External links ITU table of international callsigns Call