id
stringlengths
2
8
url
stringlengths
31
139
title
stringlengths
1
87
text
stringlengths
10
247k
embedding
list
15039
https://en.wikipedia.org/wiki/Iona
Iona
Iona (; (IPA:[ˈiːˈxaɫ̪ɯimˈçiʎə]), sometimes simply Ì; ) is a small island in the Inner Hebrides, off the Ross of Mull on the western coast of Scotland. It is mainly known for Iona Abbey, though there are other buildings on the island. Iona Abbey was a centre of Gaelic monasticism for three centuries and is today known for its relative tranquility and natural environment. It is a tourist destination and a place for spiritual retreats. Its modern Scottish Gaelic name means "Iona of (Saint) Columba" (formerly anglicised as "Icolmkill"). In 2019, the island's estimated population was 120. Residents engage in farming, using traditional methods. Other occupations include crofting and tourism-related work; some craftsmen make goods for sale locally, such as pottery, tapestries, jewellery and knitted goods. In March 1980, the Hugh Fraser Foundation donated much of the main island (and its off-lying islands) to the current owner, the National Trust for Scotland. The abbey and some church buildings are owned by the Iona Cathedral Trust. One publication, describing the religious significance of the island, says that the island is "known as the birthplace of Celtic Christianity in Scotland,” and notes that “St Columba came here in the year 563 to establish the Abbey, which still stands". Etymology Because the Hebrides have been successively occupied by speakers of several languages since the Iron Age, many of its islands’ names have more than one possible meaning. Nonetheless, few, if any, have accumulated as many different names over the centuries as the island now known in English as "Iona". The place-name scholar William J. Watson has shown that the earliest recorded names of the island meant something like "yew-place". The element Ivo-, denoting "yew", occurs in inscriptions in the ogham alphabet (Iva-cattos [genitive], Iva-geni [genitive]) and in Gaulish names (Ivo-rix, Ivo-magus); it may also be the basis of early Gaelic names like Eógan (ogham: Ivo-genos). The island's name may also be related to the name of a mythological figure, Fer hÍ mac Eogabail, the foster-son of Manannan, whose forename meaning "man of the yew". Mac an Tàilleir (2003) has analyzed the more recent Gaelic names of Ì, Ì Chaluim Chille and Eilean Idhe. He notes that the name Ì was "generally lengthened to avoid confusion" with Ì Chaluim Chille, which means "Calum's Iona" or "island of Calum's monastery". (“Calum”’s Latinized form is "Columba".) This confusion would have arisen because ì, the original name of the island, would have been confused with the now-obsolete Gaelic noun ì, meaning "island", which was derived from the Old Norse word for island (ey). Eilean Idhe means "the isle of Iona", also known as Ì nam ban bòidheach ("the isle of beautiful women"). The modern English name comes from yet another variant, Ioua, which arose either from Adomnán's 7th-century attempt to make the Gaelic name fit Latin grammar, or spontaneously, as a derivative of Ivova ("yew place"). The change in the island's name from Ioua to Iona, which is attested from c.1274, resulted from a transcription error due to the similarity of "n" and "u" in Insular Minuscule script. Despite the continuity of forms in Gaelic from the pre-Norse to the post-Norse era, Haswell-Smith (2004) speculates that the island’s name may be connected with the Norse word Hiōe, meaning "island of the den of the brown bear". The medieval English-language version of the name was "Icolmkill" (and variants thereof). Folk etymology Murray (1966) claims that the "ancient" Gaelic name was Innis nan Druinich ("the isle of Druidic hermits"), but there is no evidence for the "ancient" use of such a name before the twentieth century, and it probably arises from a misunderstanding of the name Cladh nan Druineach, which means 'burial ground of the embroideresses or artificers' - a cemetery on the east shore of the island. He also repeats a Gaelic story (which he admits is apocryphal) that as Columba's coracle first drew close to the island one of his companions cried out "Chì mi i" meaning "I see her" and that Columba's response was "Henceforth we shall call her Ì". Geology The geology of Iona is quite complex given the island's size and quite distinct from that of nearby Mull. About half of the island's bedrock is Scourian gneiss assigned to the Lewisian complex and dating from the Archaean eon making it some of the oldest rock in Britain and indeed Europe. Closely associated with these gneisses are mylonite and meta-anorthosite and melagabbro. Along the eastern coast facing Mull are steeply dipping Neoproterozoic age metaconglomerates, metasandstones, metamudstones and hornfelsed metasiltstones ascribed to the Iona Group, described traditionally as Torridonian. In the southwest and on parts of the west coast are pelites and semipelites of Archaean to Proterozoic age. There are small outcrops of Silurian age pink granite on southeastern beaches, similar to those of the Ross of Mull pluton cross the sound to the east. Numerous geological faults cross the island, many in a E-W or NW-SE alignment. Devonian aged microdiorite dykes are found in places and some of these are themselves cut by Palaeocene age camptonite and monchiquite dykes ascribed to the 'Iona-Ross of Mull dyke swarm’. More recent sedimentary deposits of Quaternary age include both present day beach deposits and raised marine deposits around Iona as well as some restricted areas of blown sand. Geography Iona lies about from the coast of Mull. It is about wide and long with a resident population of 125. Like other places swept by ocean breezes, there are few trees; most of them are near the parish church. Iona's highest point is Dùn Ì, , an Iron Age hill fort dating from 100 BC – AD 200. Iona's geographical features include the Bay at the Back of the Ocean and Càrn Cùl ri Éirinn (the Hill/Cairn of [turning the] Back to Ireland), said to be adjacent to the beach where St. Columba first landed. The main settlement, located at St. Ronan's Bay on the eastern side of the island, is called Baile Mòr and is also known locally as "The Village". The primary school, post office, the island's two hotels, the Bishop's House and the ruins of the Nunnery are here. The Abbey and MacLeod Centre are a short walk to the north.Murray (1966) pp. 82–83. Port Bàn (white port) beach on the west side of the island is home to the Iona Beach Party. There are numerous offshore islets and skerries: Eilean Annraidh (island of storm) and Eilean Chalbha (calf island) to the north, Rèidh Eilean and Stac MhicMhurchaidh to the west and Eilean Mùsimul (mouse holm island) and Soa Island to the south are amongst the largest. The steamer Cathcart Park carrying a cargo of salt from Runcorn to Wick ran aground on Soa on 15 April 1912, the crew of 11 escaping in two boats.The record is tentative, the press cutting the record refers to identifying "'Sheep Island', one of the Torran Rocks near Iona" but there is no other obvious contender. Subdivision On a map of 1874, the following territorial subdivision is indicated (from north to south): Ceann Tsear (East Head) Sliabh Meanach (Middle Mountain) Machar (Low-lying Grassy Plain) Sliginach (Shelly Area) Sliabh Siar (Rear Mountain) Staonaig (Sloping Ground) History Dál Riata In the early Historic Period Iona lay within the Gaelic kingdom of Dál Riata, in the region controlled by the Cenél Loairn (i.e. Lorn, as it was then). The island was the site of a highly important monastery (see Iona Abbey) during the Early Middle Ages. The monastery was founded in 563 by the monk Columba, also known as Colm Cille, who sailed here from Ireland to live the monastic life. Much later legends (a thousand years later, and without any good evidence) said that he had been exiled from his native Ireland as a result of his involvement in the Battle of Cul Dreimhne. Columba and twelve companions went into exile on Iona and founded a monastery there. The monastery was hugely successful, and may have played a role in the conversion to Christianity of the Picts of present-day Scotland in the late 6th century, and was certainly central to the conversion of the Anglo-Saxon kingdom of Northumbria in 635. Many satellite institutions were founded, and Iona became the centre of one of the most important monastic systems in Great Britain and Ireland. Iona became a renowned centre of learning, and its scriptorium produced highly important documents, probably including the original texts of the Iona Chronicle, thought to be the source for the early Irish annals. The monastery is often associated with the distinctive practices and traditions known as Celtic Christianity. In particular, Iona was a major supporter of the "Celtic" system for calculating the date of Easter at the time of the Easter controversy, which pitted supporters of the Celtic system against those favoring the "Roman" system used elsewhere in Western Christianity. The controversy weakened Iona's ties to Northumbria, which adopted the Roman system at the Synod of Whitby in 664, and to Pictland, which followed suit in the early 8th century. Iona itself did not adopt the Roman system until 715, according to the Anglo-Saxon historian Bede. Iona's prominence was further diminished over the next centuries as a result of Viking raids and the rise of other powerful monasteries in the system, such as the Abbey of Kells. The Book of Kells may have been produced or begun on Iona towards the end of the 8th century.Forbes, Andrew ; Henley, David (2012). Pages from the Book of Kells. Chiang Mai: Cognoscenti Books. ASIN: B00AN4JVI0 Around this time the island's exemplary high crosses were sculpted; these may be the first such crosses to contain the ring around the intersection that became characteristic of the "Celtic cross". The series of Viking raids on Iona began in 794 and, after its treasures had been plundered many times, Columba's relics were removed and divided two ways between Scotland and Ireland in 849 as the monastery was abandoned. Kingdom of the Isles As the Norse domination of the west coast of Scotland advanced, Iona became part of the Kingdom of the Isles. The Norse Rex plurimarum insularum Amlaíb Cuarán died in 980 or 981 whilst in "religious retirement" on Iona.Gregory (1881) pp. 4–6 Nonetheless, the island was sacked twice by his successors, on Christmas night 986 and again in 987. Although Iona was never again important to Ireland, it rose to prominence once more in Scotland following the establishment of the Kingdom of Scotland in the later 9th century; the ruling dynasty of Scotland traced its origin to Iona, and the island thus became an important spiritual centre for the new kingdom, with many of its early kings buried there. However, a campaign by Magnus Barelegs led to the formal acknowledgement of Norwegian control of Argyll, in 1098. Somerled, the brother-in-law of Norway's governor of the region (the King of the Isles), launched a revolt, and made the kingdom independent. A convent for Augustinian nuns was established in about 1208, with Bethóc, Somerled's daughter, as first prioress. The present buildings are of the Benedictine abbey, Iona Abbey, from about 1203, dissolved at the Reformation. On Somerled's death, nominal Norwegian overlordship of the Kingdom was re-established, but de facto control was split between Somerled's sons, and his brother-in-law. Kingdom of Scotland Following the 1266 Treaty of Perth the Hebrides were transferred from Norwegian to Scottish overlordship. At the end of the century, King John Balliol was challenged for the throne by Robert the Bruce. By this point, Somerled's descendants had split into three groups, the MacRory, MacDougalls, and MacDonalds. The MacDougalls backed Balliol, so when he was defeated by de Bruys, the latter exiled the MacDougalls and transferred their island territories to the MacDonalds; by marrying the heir of the MacRorys, the heir of the MacDonalds re-unified most of Somerled's realm, creating the Lordship of the Isles, under nominal Scottish authority. Iona, which had been a MacDougall territory (together with the rest of Lorn), was given to the Campbells, where it remained for half a century. In 1354, though in exile and without control of his ancestral lands, John, the MacDougall heir, quitclaimed any rights he had over Mull and Iona to the Lord of the Isles (though this had no meaningful effect at the time). When Robert's son, David II, became king, he spent some time in English captivity; following his release, in 1357, he restored MacDougall authority over Lorn. The 1354 quitclaim, which seems to have been an attempt to ensure peace in just such an eventuality, took automatic effect, splitting Mull and Iona from Lorn, and making it subject to the Lordship of the Isles. Iona remained part of the Lordship of the Isles for the next century and a half. Following the 1491 Raid on Ross, the Lordship of the Isles was dismantled, and Scotland gained full control of Iona for the second time. The monastery and nunnery continued to be active until the Reformation, when buildings were demolished and all but three of the 360 carved crosses destroyed. The Augustine nunnery now only survives as a number of 13th century ruins, including a church and cloister. By the 1760s little more of the nunnery remained standing than at present, though it is the most complete remnant of a medieval nunnery in Scotland. Post-Union After a visit in 1773, the English writer Samuel Johnson remarked: The island, which was once the metropolis of learning and piety, now has no school for education, nor temple for worship. He estimated the population of the village at 70 families or perhaps 350 inhabitants. In the 19th century green-streaked marble was commercially mined in the south-east of Iona; the quarry and machinery survive, see 'Marble Quarry remains' below. Iona Abbey Iona Abbey, now an ecumenical church, is of particular historical and religious interest to pilgrims and visitors alike. It is the most elaborate and best-preserved ecclesiastical building surviving from the Middle Ages in the Western Isles of Scotland. Though modest in scale in comparison to medieval abbeys elsewhere in Western Europe, it has a wealth of fine architectural detail, and monuments of many periods. The 8th Duke of Argyll presented the sacred buildings and sites of the island to the Iona Cathedral trust in 1899. Historic Environment Scotland also recommends visiting the Augustinian nunnery, "the most complete nunnery complex to survive in Scotland". It was founded at the same time as the Abbey; many ruins from the 14th century are visible. The nunnery declined after the Scottish Reformation but was still used as a burial place for women. In front of the Abbey stands the 9th-century St Martin's Cross, one of the best-preserved Celtic crosses in the British Isles, and a replica of the 8th-century St John's Cross (original fragments in the Abbey museum). The ancient burial ground, called the Rèilig Odhrain (Eng: Oran's "burial place" or "cemetery"), contains the 12th-century chapel of St Odhrán (said to be Columba's uncle), restored at the same time as the Abbey itself. It contains a number of medieval grave monuments. The abbey graveyard is said to contain the graves of many early Scottish Kings, as well as Norse kings from Ireland and Norway. Iona became the burial site for the kings of Dál Riata and their successors. Notable burials there include: Cináed mac Ailpín, king of the Picts (also known today as "Kenneth I of Scotland") Domnall mac Causantín, alternatively "king of the Picts" or "king of Scotland" ("Donald II") Máel Coluim mac Domnaill, king of Scotland ("Malcolm I") Donnchad mac Crínáin, king of Scotland ("Duncan I") Mac Bethad mac Findlaích, king of Scotland ("Macbeth") Domnall mac Donnchada, king of Scotland ("Donald III") John Smith, Labour Party Leader In 1549 an inventory of 48 Scottish, 8 Norwegian and 4 Irish kings was recorded. None of these graves are now identifiable (their inscriptions were reported to have worn away at the end of the 17th century). Saint Baithin and Saint Failbhe may also be buried on the island. The Abbey graveyard is also the final resting place of John Smith, the former Labour Party leader, who loved Iona. His grave is marked with an epitaph quoting Alexander Pope: "An honest man's the noblest work of God". Limited archaeological investigations commissioned by the National Trust for Scotland found some evidence for ancient burials in 2013. The excavations, conducted in the area of Martyrs Bay, revealed burials from the 6th–8th centuries, probably jumbled up and reburied in the 13–15th centuries. Other early Christian and medieval monuments have been removed for preservation to the cloister arcade of the Abbey, and the Abbey museum (in the medieval infirmary). The ancient buildings of Iona Abbey are now cared for by Historic Environment Scotland (there is an entrance charge to visit them). Marble quarry remains The remains of a marble quarrying enterprise can be seen in a small bay on the south-east shore of Iona. The quarry is the source of 'Iona Marble', a beautiful translucent green and white stone, much used in brooches and other jewellery. The stone has been known of for centuries and was credited with healing and other powers. While the quarry had been used in a small way, it was not until around the end of the 18th century when it was opened up on a more industrial scale by the Duke of Argyle. The then difficulties of extracting the hard stone and transporting it meant that the scheme was short lived. Another attempt was started in 1907, this time more successful with considerable quantities of stone extracted and indeed exported, but the First World War put paid to this as well, with little quarrying after 1914 and the operation finally closing in 1919. A painting showing the quarry in operation, The Marble Quarry, Iona (1909) by David Young Cameron, is in the collection of Cartwright Hall art gallery in Bradford. Such is the site's rarity that it has been designated as a Scheduled Ancient Monument. Present day The island, other than the land owned by the Iona Cathedral Trust, was purchased from the Duke of Argyll by Hugh Fraser in 1979 and donated to the National Trust for Scotland. In 2001 Iona's population was 125 and by the time of the 2011 census this had grown to 177 usual residents. During the same period Scottish island populations as a whole grew by 4% to 103,702. The estimated permanent population in 2020 was 120. The island's tourism bureau estimated that roughly 130,000 visitors arrived each year. Many tourists come to visit the Abbey and other ecclesiastical properties and the marble quarry, or to enjoy the nine beaches that are within walking distance of the main area. Iona Community Not to be confused with the local island community, Iona (Abbey) Community is based within Iona Abbey. In 1938 George MacLeod founded the Iona Community, an ecumenical Christian community of men and women from different walks of life and different traditions in the Christian church committed to seeking new ways of living the Gospel of Jesus in today's world. This community is a leading force in the present Celtic Christian revival. The Iona Community runs 3 residential centres on the Isle of Iona and on Mull, where one can live together in community with people of every background from all over the world. Weeks at the centres often follow a programme related to the concerns of the Iona Community. The 8 tonne Fallen Christ sculpture by Ronald Rae was permanently situated outside the MacLeod Centre in February 2008. Transport Visitors can reach Iona by the 10-minute ferry trip across the Sound of Iona from Fionnphort on Mull. The most common route from the mainland is via Oban in Argyll and Bute, where regular ferries connect to Craignure on Mull, from where the scenic road runs to Fionnphort. Tourist coaches and local bus services meet the ferries. Car ownership is lightly regulated, with no requirement for an MOT Certificate or payment of Road Tax for cars kept permanently on the island, but vehicular access is restricted to permanent residents and there are few cars. Visitors are not allowed to bring vehciles onto the island although "blue badge holders with restricted mobility ... may apply for a permit under certain exemptions". Visitors will find the village, the shops, the post office, the cafe, the hotels and the abbey are all within walking distance. Bike hire is available at the pier, and on Mull. Taxi service is also available. Tourism Conde Nast Traveller recommends the island for its "peaceful atmosphere ... a popular place for spiritual retreats" but also recommends the "sandy beaches, cliffs, rocks, fields and bogs ... "wildflowers and birds such as the rare corncrake and puffins" as well as the "abundance of sea life". The Iona Council advises visitors that they can find a campsite (at Cnoc Oran), a hostel (at Lagandorain), family run bed and breakfasts, and two hotels on the island in addition to several self-catering houses. The agency also mentions that distances are short, with the Abbey a mere 10 minutes’ walk from the pier. Tourists can rent bikes or use the local taxi. Iona in Scottish painting The island of Iona has played an important role in Scottish landscape painting, especially during the Twentieth Century. As travel to north and west Scotland became easier from the mid C18 on, artists' visits to the island steadily increased. The Abbey remains in particular became frequently recorded during this early period. Many of the artists are listed and illustrated in the valuable book, Iona Portrayed – The Island through Artists' Eyes 1760–1960''', which lists over 170 artists known to have painted on the island. The C20 however saw the greatest period of influence on landscape painting, in particular through the many paintings of the island produced by F C B Cadell and S J Peploe, two of the ‘Scottish Colourists’. As with many artists, both professional and amateur, they were attracted by the unique quality of light, the white sandy beaches, the aquamarine colours of the sea and the landscape of rich greens and rocky outcrops. While Cadell and Peploe are perhaps best known, many major Scottish painters of the C20 worked on Iona and visited many times – for example George Houston, D Y Cameron, James Shearer, John Duncan and John Maclauchlan Milne, among many. Media and the arts Samuel Johnson wrote "That man is little to be envied whose patriotism would not gain force upon the plains of Marathon, or whose piety would not grow warmer amid the ruins of Iona." In Jules Verne's novel The Green Ray, the heroes visit Iona in chapters 13 to 16. The inspiration is romantic, the ruins of the island are conducive to daydreaming. The young heroine, Helena Campbell, argues that Scotland in general and Iona in particular are the scene of the appearance of goblins and other familiar demons. In Jean Raspail's novel The Fisherman's Ring (1995), his cardinal is one of the last to support the antipope Benedict XIII and his successors. In the novel The Carved Stone (by Guillaume Prévost), the young Samuel Faulkner is projected in time as he searches for his father and lands on Iona in the year 800, then threatened by the Vikings. "Peace of Iona" is a song written by Mike Scott that appears on the studio album Universal Hall and on the live recording Karma to Burn by The Waterboys. Iona is the setting for the song "Oran" on the 1997 Steve McDonald album Stone of Destiny. Kenneth C. Steven published an anthology of poetry entitled Iona: Poems in 2000 inspired by his association with the island and the surrounding area. Iona is featured prominently in the first episode ("By the Skin of Our Teeth") of the celebrated arts series Civilisation: A Personal View by Kenneth Clark (1969). Iona is the setting of Jeanne M. Dams' Dorothy Martin mystery Holy Terror of the Hebrides (1998). The Academy Award–nominated Irish animated film The Secret of Kells is about the creation of the Book of Kells. One of the characters, Brother Aiden, is a master illuminator from Iona Abbey who had helped to illustrate the Book, but had to escape the island with it during a Viking invasion. Frances Macdonald the contemporary Scottish artist based in Crinian, Argyll, regularly paints landscapes on Iona. Neil Gaiman's poem "In Relig Odhrain", published in Trigger Warning: Short Fictions and Disturbances (2015), retells the story of Oran's death, and the creation of the chapel on Iona. This poem was made into a short stop-motion animated film, released in 2019. Gallery See also List of islands of Scotland Bishop's House Iona Clann-an-oistir Dál Riata Statutes of Iona Footnotes References Sources Christian, J & Stiller, C (2000), Iona Portrayed – The Island through Artists' Eyes 1760–1960, The New Iona Press, Inverness, 96pp, numerous illustrations in B&W and colour, with list of artists. Dwelly, Edward (1911). Faclair Gàidhlig gu Beurla le Dealbhan/The Illustrated [Scottish] Gaelic- English Dictionary. Edinburgh. Birlinn. . Gregory, Donald (1881) The History of the Western Highlands and Isles of Scotland 1493–1625. Edinburgh. Birlinn. 2008 reprint – originally published by Thomas D. Morrison. . Hunter, James (2000). Last of the Free: A History of the Highlands and Islands of Scotland. Edinburgh. Mainstream. Johnson, Samuel (1775). A Journey to the Western Islands of Scotland. London: Chapman & Dodd. (1924 edition). Marsden, John (1995). The Illustrated Life of Columba. Edinburgh. Floris Books. . Murray, W. H. (1966). The Hebrides. London. Heinemann. Ó Corráin, Donnchadh (1998) Vikings in Ireland and Scotland in the Ninth Century CELT. Watson, W. J., The History of the Celtic Place-names of Scotland. Reprinted with an introduction by Simon Taylor, Birlinn, Edinburgh, 2004. . Citations Further reading Campbell, George F. (2006). The First and Lost Iona. Glasgow: Candlemas Hill Publishing. (and on Kindle). Herbert, Maire (1996). Iona, Kells and Derry: The History and Hagiography of the Monastic familia of Columba. Dublin: Four Courts Press. MacArthur, E Mairi, Iona, Colin Baxter Island Guide'' (1997) Colin Baxter Photography, Grantown-on-Spey, 128pp. External links Visit Mull & Iona (Official tourism website for the Isles of Mull and Iona) Isle of Iona, Scotland (A visitors guide to the Isle) The Iona Community Computer-generated virtual panorama Summit of Iona Index Photo Gallery of Iona by Enrico Martino National Trust for Scotland property page Burial sites of the Crovan dynasty Burial sites of the Royal House of Northumbria Insular art Extinct volcanoes National Trust for Scotland properties Paleogene volcanism Volcanoes of Scotland Islands of Argyll and Bute Islands of the Inner Hebrides
[ 0.15660232305526733, 0.03665609285235405, 0.2310386449098587, -0.9137358665466309, 0.4570671319961548, 0.05032631754875183, 0.4121590554714203, -0.03465238958597183, -0.6012377142906189, 0.21719743311405182, -0.5126470923423767, -0.017062777653336525, 0.35323387384414673, 0.376163721084594...
15040
https://en.wikipedia.org/wiki/Ido
Ido
Ido () is a constructed language, derived from Reformed Esperanto, created to be a universal second language for speakers of diverse backgrounds. Ido was specifically designed to be grammatically, orthographically, and lexicographically regular, and above all easy to learn and use. In this sense, Ido is classified as a constructed international auxiliary language. It is the most successful of the many Esperanto derivatives, called Esperantidoj. Ido was created in 1907 out of a desire to reform perceived flaws in Esperanto, a language that had been created 20 years earlier to facilitate international communication. The name of the language traces its origin to the Esperanto word , meaning "offspring", since the language is a "descendant" of Esperanto. After its inception, Ido gained support from some in the Esperanto community, but following the sudden death in 1914 of one of its most influential proponents, Louis Couturat, it declined in popularity. There were two reasons for this: first, the emergence of further schisms arising from competing reform projects; and second, a general lack of awareness of Ido as a candidate for an international language. These obstacles weakened the movement and it was not until the rise of the Internet that it began to regain momentum. Ido uses the same 26 letters as the English (Latin) alphabet, with no diacritics. It draws its vocabulary from English, French, German, Italian, Latin, Russian, Spanish and Portuguese, and is largely intelligible to those who have studied Esperanto. Several works of literature have been translated into Ido, including The Little Prince, the Book of Psalms, and the Gospel of Luke. As of the year 2000, there were approximately 100–200 Ido speakers in the world, though more new estimates place the number of speakers closer to 1,000-5,000. In 2020, Ido had 24 native speakers in Finland. History The idea of a universal second language is not new, and constructed languages are not a recent phenomenon. The first known constructed language was Lingua Ignota, created in the 12th century. But the idea did not catch on in large numbers until the language Volapük was created in 1879. Volapük was popular for some time and apparently had a few thousand users, but was later eclipsed by the popularity of Esperanto, which arose in 1887. Several other languages such as Latino sine Flexione and Idiom Neutral had also been put forward. It was during this time that French mathematician Louis Couturat formed the Delegation for the Adoption of an International Auxiliary Language. This delegation made a formal request to the International Association of Academies in Vienna to select and endorse an international language; the request was rejected in May 1907. The Delegation then met as a Committee in Paris in October 1907 to discuss the adoption of a standard international language. Among the languages considered was a new language anonymously submitted at the last moment (and therefore against the Committee rules) under the pen name Ido. In the end the committee, always without plenary sessions and consisting of only 12 members, concluded the last day with 4 votes for and 1 abstention. They concluded that no language was completely acceptable, but that Esperanto could be accepted "on condition of several modifications to be realized by the permanent Commission in the direction defined by the conclusions of the Report of the Secretaries [Louis Couturat and Léopold Leau] and by the Ido project". Esperanto's inventor, L. L. Zamenhof, having heard a number of complaints, had suggested in 1894 a proposal for a Reformed Esperanto with several changes that Ido adopted and made it closer to French: eliminating the accented letters and the accusative case, changing the plural to an Italianesque -i, and replacing the table of correlatives with more Latinate words. However, the Esperanto community voted and rejected Reformed Esperanto, and likewise most rejected the recommendations of the 1907 Committee composed by 12 members. Zamenhof deferred to their judgment, although doubtful. Furthermore, controversy ensued when the "Ido project" was found to have been primarily devised by Louis de Beaufront, whom Zamenhof had chosen to represent Esperanto before the committee, as the committee's rules dictated that the creator of a submitted language could not defend it. The committee's language was French and not everyone could speak in French. When the president of the Committee asked who was the author of Ido's project, Couturat, Beaufront and Leau answered that they were not. Beaufront was the person who presented Ido's project and gave a description as a better, richer version of Esperanto. Couturat, Leau, Beaufront and Jespersen were finally the only members who voted, all of them for Ido's project. A month later, Couturat accidentally put Jespersen in a copy of a letter in which he acknowledged that Beaufront was the author of the Ido project. Jespersen was angered by this and asked for a public confession, which was never forthcoming. It is estimated that some 20% of Esperanto leaders and 3–4% of ordinary Esperantists switched to Ido, which from then on suffered constant modifications seeking to perfect it, but which ultimately had the effect of causing many Ido speakers to give up on trying to learn it. Although it fractured the Esperanto movement, the schism gave the remaining Esperantists the freedom to concentrate on using and promoting their language as it stood. At the same time, it gave the Idists freedom to continue working on their own language for several more years before actively promoting it. The Uniono di la Amiki di la Linguo Internaciona (Union of Friends of the International Language) was established along with an Ido Academy to work out the details of the new language. Couturat, who was the leading proponent of Ido, was killed in an automobile accident in 1914. This, along with World War I, practically suspended the activities of the Ido Academy from 1914 to 1920. In 1928 Ido's major intellectual supporter, the Danish linguist Otto Jespersen, published his own planned language, Novial. His leaving the Ido movement set it back even further. Digital era The language still has active speakers, numbering about 500. The Internet has sparked a renewal of interest in the language in recent years. A sample of 24 Idists on the Yahoo! group Idolisto during November 2005 showed that 57% had begun their studies of the language during the preceding three years, 32% from the mid-1990s to 2002, and 8% had known the language from before. Changes Few changes have been made to Ido since 1922. Camiel de Cock was named secretary of linguistic issues in 1990, succeeding Roger Moureaux. He resigned after the creation of a linguistic committee in 1991. De Cock was succeeded by Robert C. Carnaghan, who held the position from 1992 to 2008. No new words were adopted between 2001 and 2006. Following the 2008–2011 elections of ULI's direction committee, Gonçalo Neves replaced Carnaghan as secretary of linguistic issues in February 2008. Neves resigned in August 2008. A new linguistic committee was formed in 2010. In April 2010, Tiberio Madonna was appointed as secretary of linguistic issues, succeeding Neves. In January 2011, ULI approved eight new words. This was the first addition of words in many years. As of January 2021, the secretary of linguistic issues remains Tiberio Madonna. Phonology Ido has five vowel phonemes. The vowels and are interchangeable depending on speaker preference, as are and . The combinations /au/ and /eu/ become diphthongs in word roots but not when adding affixes. All polysyllabic words are stressed on the second-to-last syllable except for verb infinitives, which are stressed on the last syllableskolo, kafeo and lernas for "school", "coffee" and the present tense of "to learn", but irar, savar and drinkar for "to go", "to know" and "to drink". If an i or u precedes another vowel, the pair is considered part of the same syllable when applying the accent rulethus radio, familio and manuo for "radio", "family" and "hand", unless the two vowels are the only ones in the word, in which case the "i" or "u" is stressed: dio, frua for "day" and "early". Orthography Ido uses the same 26 letters as the English alphabet and ISO Basic Latin alphabet with three digraphs and no ligatures or diacritics. Where the table below lists two pronunciations, either is perfectly acceptable. The digraphs are: Grammar The definite article is "la" and is invariable. The indefinite article (a/an) does not exist in Ido. Each word in the Ido vocabulary is built from a root word. A word consists of a root and a grammatical ending. Other words can be formed from that word by removing the grammatical ending and adding a new one, or by inserting certain affixes between the root and the grammatical ending. Some of the grammatical endings are defined as follows: These are the same as in Esperanto except for -i, -ir, -ar, -or and -ez. Esperanto marks noun plurals by an agglutinative ending -j (so plural nouns end in -oj), uses -i for verb infinitives (Esperanto infinitives are tenseless), and uses -u for the imperative. Verbs in Ido, as in Esperanto, do not conjugate depending on person, number or gender; the -as, -is, and -os endings suffice whether the subject is I, you, he, she, they, or anything else. For the word "to be," Ido allows either "esas" or "es" in the present tense; however, the full forms must be used for the past tense "esis" and future tense "esos." Adjectives and adverbs are compared in Ido by means of the words plu = more, maxim = most, min = less, minim = least, kam = than/as. There exist in Ido three categories of adverbs: the simple, the derived, and the composed. The simple adverbs do not need special endings, for example: tre = very, tro = too, olim = formerly, nun = now, nur = only. The derived and composed adverbs, not being originally adverbs but derived from nouns, adjectives and verbs, have the ending -e. Syntax Ido word order is generally the same as English (subject–verb–object), so the sentence Me havas la blua libro is the same as the English "I have the blue book", both in meaning and word order. There are a few differences, however: Adjectives can precede the noun as in English, or follow the noun as in Spanish. Thus, Me havas la libro blua means the same thing. Ido has the accusative suffix -n. Unlike Esperanto, this suffix is only required when the object of the sentence is not clear, for example, when the subject-verb-object word order is not followed. Thus, La blua libron me havas also means the same thing. Ido generally does not impose rules of grammatical agreement between grammatical categories within a sentence. For example, the verb in a sentence is invariable regardless of the number and person of the subject. Nor must the adjectives be pluralized as well the nounsin Ido the large books would be la granda libri as opposed to the French les grands livres or the Esperanto la grandaj libroj. Negation occurs in Ido by simply adding ne before a verb: Me ne havas libro means "I do not have a book". This as well does not vary, and thus the "I do not", "He does not", "They do not" before a verb are simply Me ne, Il ne, and Li ne. In the same way, past tense and future tense negatives are formed by ne before the conjugated verb. "I will not go" and "I did not go" become Me ne iros and Me ne iris respectively. Yes/no questions are formed by the particle ka in front of the question. "I have a book" (me havas libro) becomes Ka me havas libro? (do I have a book?). Ka can also be placed in front of a noun without a verb to make a simple question, corresponding to the English "is it?" Ka Mark? can mean, "Are you Mark?", "Is it Mark?", "Do you mean Mark?" depending on the context. Pronouns The pronouns of Ido were revised to make them more acoustically distinct than those of Esperanto, which all end in i. Especially the singular and plural first-person pronouns mi and ni may be difficult to distinguish in a noisy environment, so Ido has me and ni instead. Ido also distinguishes between intimate (tu) and formal (vu) second-person singular pronouns as well as plural second-person pronouns (vi) not marked for intimacy. Furthermore, Ido has a pan-gender third-person pronoun lu (it can mean "he", "she", or "it", depending on the context) in addition to its masculine (il), feminine (el), and neuter (ol) third-person pronouns. ci, although technically the familiar form of the word "you" in Esperanto, is seldom used. Esperanto's inventor himself did not include the pronoun in the first book on Esperanto and only later reluctantly; later he recommended against using ci because different cultures have conflicting traditions regarding the use of the familiar and formal forms of "you". ri, iŝi, iĝi and by extension iri are proposed neologisms and are rare, but they are still used albeit seldom. ol, like English it and Esperanto ĝi, is not limited to inanimate objects, but can be used "for entities whose sex is indeterminate: babies, children, humans, youths, elders, people, individuals, horses, [cattle], cats, etc." Lu is often mistakenly labeled an epicene pronoun, that is, one that refers to both masculine and feminine beings, but in fact, lu is more properly a "pan-gender" pronoun, as it is also used for referring to inanimate objects. From Kompleta Gramatiko Detaloza di la Linguo Internaciona Ido by Beaufront: Table of correlatives Ido makes correlatives by combining entire words together and changing the word ending, with some irregularities to show distinction. The initial i can be omitted: ta, to, ti, ta. One can omit the initial a: ultempe, nultempe, ulspeca, nulspeca, ulmaniere, nulmaniere. omnatempe is correct and usable, but sempre is the actual word. Instead of irga quanto, nula quanto and la tota quanto one usually says irgo, nulo and omno. Compound formation Composition in Ido obeys stricter rules than in Esperanto, especially formation of nouns, adjectives and verbs from a radical of a different class. The reversibility principle assumes that for each composition rule (affix addition), the corresponding decomposition rule (affix removal) is valid. Hence, while in Esperanto an adjective (for instance , formed on the noun radical , can mean an attribute ( “paper-made encyclopedia”) and a relation ( “paper-making factory”), Ido will distinguish the attribute (“paper” or “of paper” (not “paper-made” exactly)) from the relation (“paper-making”). Similarly, means in both Esperanto and Ido the noun “crown”; where Esperanto allows formation of “to crown” by simply changing the ending from noun to verb (“crowning” is ), Ido requires an affix so the composition is reversible: (“the act of crowning” is ). According to Claude Piron, some modifications brought by Ido are in practice impossible to use and ruin spontaneous expression: Ido displays, on linguistic level, other drawbacks Esperanto succeeded to avoid, but I don’t have at hand documents which would allow me to go further in detail. For instance, if I remember correctly, where Esperanto only has the suffix *, Ido has several: **, **, **, which match subtleties which were meant to make language clearer, but that, in practice, inhibit natural expression. Vocabulary Vocabulary in Ido is derived from French, Italian, Spanish, English, German, and Russian. Basing the vocabulary on various widespread languages was intended to make Ido as easy as possible for the greatest number of people possible. Early on, the first 5,371 Ido word roots were analyzed compared to the vocabulary of the six source languages, and the following result was found: 2024 roots (38%) belong to 6 languages 942 roots (17%) belong to 5 languages 1111 roots (21%) belong to 4 languages 585 roots (11%) belong to 3 languages 454 roots (8%) belong to 2 languages 255 roots (5%) belong to 1 language Another analysis showed that: 4880 roots (91%) are found in French 4454 roots (83%) are found in Italian 4237 roots (79%) are found in Spanish 4219 roots (79%) are found in English 3302 roots (61%) are found in German 2821 roots (52%) are found in Russian Vocabulary in Ido is often created through a number of official prefixes and suffixes that alter the meaning of the word. This allows a user to take existing words and modify them to create neologisms when necessary, and allows for a wide range of expression without the need to learn new vocabulary each time. Though their number is too large to be included in one article, some examples include: The diminutive suffix -et-. Domo (house) becomes dometo (cottage), and libro (book) becomes libreto (novelette or short story). The pejorative suffix -ach-. Domo becomes domacho (hovel), and libro becomes libracho (a shoddy piece of work, pulp fiction, etc.) The prefix retro-, which implies a reversal. Irar (to go) becomes retroirar (to go back, backward) and venar (to come) becomes retrovenar (to return). New vocabulary is generally created through an analysis of the word, its etymology, and reference to the six source languages. If a word can be created through vocabulary already existing in the language then it will usually be adopted without need for a new radical (such as wikipedio for Wikipedia, which consists of wiki + enciklopedio for encyclopedia), and if not an entirely new word will be created. The word alternatoro for example was adopted in 1926, likely because five of the six source languages used largely the same orthography for the word, and because it was long enough to avoid being mistaken for other words in the existing vocabulary. Adoption of a word is done through consensus, after which the word will be made official by the union. Care must also be taken to avoid homonyms if possible, and usually a new word undergoes some discussion before being adopted. Foreign words that have a restricted sense and are not likely to be used in everyday life (such as the word intifada to refer to the conflict between Israel and Palestine) are left untouched, and often written in italics. Ido, unlike Esperanto, does not assume the male sex by default. For example, Ido does not derive the word for “waitress” by adding a feminine suffix to “waiter”, as Esperanto does. Instead, Ido words are defined as sex-neutral, and two different suffixes derive masculine and feminine words from the root: for a waiter of either sex, for a male waiter, and for a waitress. There are only two exceptions to this rule: First, for “father”, for “mother”, and for “parent”, and second, for “man”, for “woman”, and for “adult”. Sample The Lord's Prayer: Literature and publications Ido has a number of publications that can be subscribed to or downloaded for free in most cases. Kuriero Internaciona is a magazine produced in France every few months with a range of topics. Adavane! is a magazine produced by the Spanish Ido Society every two months that has a range of topics, as well as a few dozen pages of work translated from other languages. Progreso is the official organ of the Ido movement and has been around since the inception of the movement in 1908. Other sites can be found with various stories, fables or proverbs along with a few books of the Bible translated into Ido on a smaller scale. The site publikaji has a few podcasts in Ido along with various songs and other recorded material. Wikipedia includes an Ido-language edition (known in Ido as Wikipedio); in January 2012 it was the 81st most visited Wikipedia. International Ido conventions ULI organises Ido conventions yearly, and the conventions include a mix of tourism and work. 2019: Berlin, Germany, 15 participants from 2 countries (Information) 2018: Provins, France, 11 participants from 5 countries (Information) 2017: České Budějovice, Czech Republic, 8 participants from 5 countries (Information) 2016: Valencia, Spain, 10 participants from 7 countries (Information) 2015: Berlin, Germany, 14 participants (Information) 2014: Paris, France (Information) 2013: Ouroux-en-Morvan, France, 13 participants from 4 countries (Information) 2012: Dessau, Germany, 12 participants (Information) 2011: Echternach, Luxembourg (Information), 24 participants from 11 countries 2010: Tübingen, Germany (Information) 2009: Riga, Latvia, and Tallinn, Estonia, 14 participants from 7 countries (Information) 2008: Wuppertal-Neviges, Germany, 18 participants from 5 countries (Information) 2007: Paris, France, 14 participants from 9 countries (Information, Photos) 2006: Berlin, Germany, approx. 25 participants from 10 countries (Information) 2005: Toulouse, France, 13 participants from 4 countries (Information) 2004: Kyiv, Ukraine, 17 participants from 9 countries (Information) 2003: Großbothen, Germany, participants from 6 countries (Information) 2002: Kraków, Poland, 14 participants from 6 countries (Information) 2001: Nuremberg, Germany, 14 participants from 5 countries (Information) 2000: Nürnberg, Germany 1999: Waldkappel, Germany 1998: Białobrzegi, Poland, 15 participants from 6 countries 1997: Bakkum, Netherlands, 19 participants from 7 countries 1995: Elsnigk, Germany 1991: Ostend, Belgium, 21 participants 1990: Waldkappel, Germany 1989: Zürich-Thalwil, Switzerland 1987: Eschwege, Germany 1985: Antwerp, Belgium 1983: York, England 1981: Jongny, Switzerland 1980: Namur, Belgium, 35 participants 1979: Uppsala, Sweden 1978: Cambridge, England 1977: Berlin-Tegel, Germany 1976: Saint-Nazaire, France 1975: Thun, Switzerland 1974: Kyiv, Ukraine 1973: Cardiff, Wales 1972: Chaux-de-Fonds, Switzerland 1971: Trollhättan, Sweden 1970: Luxembourg City, Luxembourg 1969: Zürich, Switzerland 1968: Berlin, Germany 1967: Bourges, France 1966: Biella, Italy 1965: Lons-le-Saunier, France 1964: Kiel, Germany 1963: Barcelona, Spain 1962: Thun, Switzerland 1961: Zürich, Switzerland, participants 1960: Colmar, France 1959: Freiburg im Breisgau, Germany 1957: Luxembourg City, Luxembourg 1952: Berlin, Germany 1951: Torino, Italy 1950: Colmar, France 1939: St. Gallen, Switzerland 1937: Paris, France 1936: Szombathely, Hungary 1935: Fredericia, Denmark 1934: Oostduinkerke, Belgium 1933: Mondorf, Luxembourg 1931: Lauenburg/Elbe, Germany 1930: Sopron, Hungary 1929: Freiburg im Breisgau, Germany 1928: Zürich, Switzerland 1927: Paris, France 1926: Prague, Czechoslovakia 1925: Torino, Italy 1924: Luxembourg City, Luxembourg 1923: Kassel, Germany 1922: Dessau, Germany 1921: Wien, Austria See also Comparison between Esperanto and Ido Comparison between Ido and Novial Comparison between Ido and Interlingua Interhelpo English false friends in Ido Engelbert Pigal References Additional notes L. Couturat, L. Leau. Delegation pour l'adoption d'une Langue auxiliare internationale (15–24 October 1907). Coulommiers: Imprimerie Paul Brodard, 1907 External links The international language Ido Union for the International Language Ido (in Ido) Ido : a Modern Language The IDO foundation for language research in memory of Hellmut Röhnish Otto Jespersen's history of Ido Henry Jacob's history of Ido Ido for all – English course for learning Ido Online Ido library (in Ido) Examples of Ido Phrases Esperantido Constructed languages International auxiliary languages Constructed languages introduced in the 1900s
[ 0.316337525844574, 0.13255833089351654, -0.26630282402038574, -0.1910606175661087, -0.28482145071029663, 0.3662196099758148, 0.13832446932792664, 0.15781261026859283, 0.030785035341978073, -0.2853891849517822, -0.1560983508825302, 0.3244541585445404, -0.29356059432029724, -0.26017770171165...
15041
https://en.wikipedia.org/wiki/Improvisational%20theatre
Improvisational theatre
Improvisational theatre, often called improvisation or improv, is the form of theatre, often comedy, in which most or all of what is performed is unplanned or unscripted: created spontaneously by the performers. In its purest form, the dialogue, action, story, and characters are created collaboratively by the players as the improvisation unfolds in present time, without use of an already prepared, written script. Improvisational theatre exists in performance as a range of styles of improvisational comedy as well as some non-comedic theatrical performances. It is sometimes used in film and television, both to develop characters and scripts and occasionally as part of the final product. Improvisational techniques are often used extensively in drama programs to train actors for stage, film, and television and can be an important part of the rehearsal process. However, the skills and processes of improvisation are also used outside the context of performing arts. This practice, known as applied improvisation, is used in classrooms as an educational tool and in businesses as a way to develop communication skills, creative problem solving, and supportive team-work abilities that are used by improvisational, ensemble players. It is sometimes used in psychotherapy as a tool to gain insight into a person's thoughts, feelings, and relationships. History The earliest well-documented use of improvisational theatre in Western history is found in the Atellan Farce of 391 BC. From the 16th to the 18th centuries, commedia dell'arte performers improvised based on a broad outline in the streets of Italy. In the 1890s, theatrical theorists and directors such as the Russian Konstantin Stanislavski and the French Jacques Copeau, founders of two major streams of acting theory, both heavily utilized improvisation in acting training and rehearsal. Modern Modern theatrical improvisation games began as drama exercises for children, which were a staple of drama education in the early 20th century thanks in part to the progressive education movement initiated by John Dewey in 1916. Some people credit American Dudley Riggs as the first vaudevillian to use audience suggestions to create improvised sketches on stage. Improvisation exercises were developed further by Viola Spolin in the 1940s, 50s, and 60s, and codified in her book Improvisation For The Theater, the first book that gave specific techniques for learning to do and teach improvisational theater. In 1977, Clive Barker's book Theatre Games (several translations and editions) spread the ideas of improv internationally. British playwright and director Keith Johnstone wrote Impro: Improvisation and the Theatre, a book outlining his ideas on improvisation, and invented Theatresports, which has become a staple of modern improvisational comedy and is the inspiration for the popular television show Whose Line Is It Anyway? Spolin influenced the first generation of modern American improvisers at The Compass Players in Chicago, which led to The Second City. Her son, Paul Sills, along with David Shepherd, started The Compass Players. Following the demise of the Compass Players, Paul Sills began The Second City. They were the first organized troupes in Chicago, and the modern Chicago improvisational comedy movement grew from their success. Many of the current "rules" of comedic improv were first formalized in Chicago in the late 1950s and early 1960s, initially among The Compass Players troupe, which was directed by Paul Sills. From most accounts, David Shepherd provided the philosophical vision of the Compass Players, while Elaine May was central to the development of the premises for its improvisations. Mike Nichols, Ted Flicker, and Del Close were her most frequent collaborators in this regard. When The Second City opened its doors on December 16, 1959, directed by Paul Sills, his mother Viola Spolin began training new improvisers through a series of classes and exercises which became the cornerstone of modern improv training. By the mid-1960s, Viola Spolin's classes were handed over to her protégé, Jo Forsberg, who further developed Spolin's methods into a one-year course, which eventually became The Players Workshop, the first official school of improvisation in the United States. During this time, Forsberg trained many of the performers who went on to star on The Second City stage. Many of the original cast of Saturday Night Live came from The Second City, and the franchise has produced such comedy stars as Mike Myers, Tina Fey, Bob Odenkirk, Amy Sedaris, Stephen Colbert, Eugene Levy, Jack McBrayer, Steve Carell, Chris Farley, Dan Aykroyd, and John Belushi. Simultaneously, Keith Johnstone's group The Theatre Machine, which originated in London, was touring Europe. This work gave birth to Theatresports, at first secretly in Johnstone's workshops, and eventually in public when he moved to Canada. Toronto has been home to a rich improv tradition. In 1984, Dick Chudnow (Kentucky Fried Theater) founded ComedySportz in Milwaukee, WI. Expansion began with the addition of ComedySportz-Madison (WI), in 1985. The first Comedy League of America National Tournament was held in 1988, with 10 teams participating. The league is now known as CSz Worldwide and boasts a roster of 29 international cities. In San Francisco, The Committee theater was active in North Beach during the 1960s. It was founded by alumni of Chicago's Second City, Alan Myerson and his wife Jessica. When The Committee disbanded in 1972, three major companies were formed: The Pitchell Players, The Wing, and Improvisation Inc. The only company that continued to perform Close's Harold was the latter one. Its two former members, Michael Bossier and John Elk, formed Spaghetti Jam in San Francisco's Old Spaghetti Factory in 1976, where shortform improv and Harolds were performed through 1983. Stand-up comedians performing down the street at the Intersection for the Arts would drop by and sit in. In 1979, Elk brought shortform to England, teaching workshops at Jacksons Lane Theatre, and he was the first American to perform at The Comedy Store, London, above a Soho strip club. Modern political improvisation's roots include Jerzy Grotowski's work in Poland during the late 1950s and early 1960s, Peter Brook's "happenings" in England during the late 1960s, Augusto Boal's "Forum Theatre" in South America in the early 1970s, and San Francisco's The Diggers' work in the 1960s. Some of this work led to pure improvisational performance styles, while others simply added to the theatrical vocabulary and were, on the whole, avant-garde experiments. Joan Littlewood, an English actress and director who was active from the 1950s to 1960s, made extensive use of improv in developing plays for performance. However, she was successfully prosecuted twice for allowing her actors to improvise in performance. Until 1968, British law required scripts to be approved by the Lord Chamberlain's Office. The department also sent inspectors to some performances to check that the approved script was performed exactly as approved. In 1987, Annoyance Theatre began as a club in Chicago that emphasizes longform improvisation. The Annoyance Theatre has grown into multiple locations in Chicago and New York City. It is the home of the longest running musical improv show in history at 11 years. In 2012, Lebanese writer and director Lucien Bourjeily used improvisational theater techniques to create a multi-sensory play entitled 66 Minutes in Damascus. This play premiered at the London International Festival of Theater, and is considered one of the most extreme kinds of interactive improvised theater put on stage. The audience play the part of kidnapped tourists in today's Syria in a hyperreal sensory environment. Rob Wittig and Mark C. Marino have developed a form of improv for online theatrical improvisation called netprov. The form relies on social media to engage audiences in the creation of dynamic fictional scenarios that evolve in real-time. Improvisational comedy Modern improvisational comedy, as it is practiced in the West, falls generally into two categories: shortform and longform. Shortform improv consists of short scenes usually constructed from a predetermined game, structure, or idea and driven by an audience suggestion. Many short form exercises were first created by Viola Spolin, who called them theatre games, influenced by her training from recreational games expert Neva Boyd. The short-form improv comedy television series Whose Line Is It Anyway? has familiarized American and British viewers with short-form. Longform improv performers create shows in which short scenes are often interrelated by story, characters, or themes. Longform shows may take the form of an existing type of theatre, for example a full-length play or Broadway-style musical such as Spontaneous Broadway. One of the better-known longform structures is the Harold, developed by ImprovOlympic co-founder Del Close. Many such longform structures now exist. Longform improvisation is especially performed in Chicago, New York City, Los Angeles; has a strong presence in Austin, Boston, Minneapolis, Phoenix, Philadelphia, San Francisco, Seattle, Detroit, Toronto, Vancouver, Washington, D.C.; and is building a growing following in Baltimore, Denver, Kansas City, Montreal, Columbus, New Orleans, Omaha, Rochester, NY, and Hawaii. Outside the United States, longform improv has a growing presence in the United Kingdom, especially in cities such as London, Bristol, and at the Edinburgh Festival Fringe. Non-comedic, experimental, and dramatic, narrative-based improvisational theater Other forms of improvisational theatre training and performance techniques are experimental and avant-garde in nature and not necessarily intended to be comedic. These include Playback Theatre and Theatre of the Oppressed, the Poor Theatre, the Open Theatre, to name only a few. The Open Theatre was founded in New York City by a group of former students of acting teacher Nola Chilton, and joined shortly thereafter by director Joseph Chaikin, formerly of The Living Theatre, and Peter Feldman. This avant-garde theatre group explored political, artistic, and social issues. The company, developing work through an improvisational process drawn from Chilton and Viola Spolin, created well-known exercises, such as "sound and movement" and "transformations", and originated radical forms and techniques that anticipated or were contemporaneous with Jerzy Grotowski's "poor theater" in Poland. During the sixties Chaikin and the Open Theatre developed full theatrical productions with nothing but the actors, a few chairs and a bare stage, creating character, time and place through a series of transformations the actors physicalized and discovered through improvisations. On the west coast, Ruth Zaporah developed Action Theater™, a physically-based improvisation form that treats language, movement and voice equally. Action Theater™ performances have no scripts, no preplanned ideas and create full-length shows or shorter performances. Longform, dramatic, and narrative-based improvisation is well-established on the west coast with companies such as San Francisco's BATS Improv. This format allows for full-length plays and musicals to be created improvisationally. Applying improv principles in life Many people who have studied improv have noted that the guiding principles of improv are useful, not just on stage, but in everyday life. For example, Stephen Colbert in a commencement address said, Tina Fey in her book Bossypants lists several rules of improv that apply in the workplace. There has been much interest in bringing lessons from improv into the corporate world. In a New York Times article titled "Can Executives Learn to Ignore the Script?", Stanford professor and author, Patricia Ryan Madson notes, "executives and engineers and people in transition are looking for support in saying yes to their own voice. Often, the systems we put in place to keep us secure are keeping us from our more creative selves." In film and television Many directors have made use of improvisation in the creation of both mainstream and experimental films. Many silent filmmakers such as Charlie Chaplin and Buster Keaton used improvisation in the making of their films, developing their gags while filming and altering the plot to fit. The Marx Brothers were notorious for deviating from the script they were given, their ad libs often becoming part of the standard routine and making their way into their films. Many people, however, make a distinction between ad-libbing and improvising. The British director Mike Leigh makes extensive use of improvisation in the creation of his films, including improvising important moments in the characters' lives that will not even appear in the film. This Is Spinal Tap and other mockumentary films of director Christopher Guest were created with a mix of scripted and unscripted material. Blue in the Face is a 1995 comedy directed by Wayne Wang and Paul Auster created in part by the improvisations during the filming of Smoke. Some of the best known American film directors who used improvisation in their work with actors are John Cassavetes, Robert Altman, Christopher Guest, and Rob Reiner. Improv comedy techniques have also been used in hit television shows such as HBO's Curb Your Enthusiasm created by Larry David, the UK Channel 4 and ABC television series Whose Line Is It Anyway (and its spinoffs Drew Carey's Green Screen Show and Drew Carey's Improv-A-Ganza), Nick Cannon's improv comedy show Wild 'N Out, and Thank God You're Here. A very early American improv television program was the weekly half-hour What Happens Now? which premiered on New York's WOR-TV on October 15, 1949 and ran for 22 episodes. "The Improvisers" were six actors (including Larry Blyden, Ross Martin, and Jean Alexander – Jean Pugsley at the time) who improvised skits based on situations suggested by viewers. In Canada, the series Train 48 was improvised from scripts which contained a minimal outline of each scene, and the comedy series This Sitcom Is...Not to Be Repeated incorporated dialogue drawn from a hat during the course of an episode. The American show Reno 911! also contained improvised dialogue based on a plot outline. Fast and Loose is an improvisational game show, much like Whose Line Is It Anyway?. The BBC sitcoms Outnumbered and The Thick of It also had some improvised elements in them. Psychology In the field of the psychology of consciousness, Eberhard Scheiffele explored the altered state of consciousness experienced by actors and improvisers in his scholarly paper Acting: an altered state of consciousness. According to G. William Farthing in The Psychology of Consciousness comparative study, actors routinely enter into an altered state of consciousness (ASC). Acting is seen as altering most of the 14 dimensions of changed subjective experience which characterize ASCs according to Farthing, namely: attention, perception, imagery and fantasy, inner speech, memory, higher-level thought processes, meaning or significance of experiences, time experience, emotional feeling and expression, level of arousal, self-control, suggestibility, body image, and sense of personal identity. In the growing field of Drama Therapy, psychodramatic improvisation, along with other techniques developed for Drama Therapy, are used extensively. The "Yes, and" rule has been compared to Milton Erickson's utilization process and to a variety of acceptance-based psychotherapies. Improv training has been recommended for couples therapy and therapist training, and it has been speculated that improv training may be helpful in some cases of social anxiety disorder. Structure and process Improvisational theatre often allows an interactive relationship with the audience. Improv groups frequently solicit suggestions from the audience as a source of inspiration, a way of getting the audience involved, and as a means of proving that the performance is not scripted. That charge is sometimes aimed at the masters of the art, whose performances can seem so detailed that viewers may suspect the scenes are planned. In order for an improvised scene to be successful, the improvisers involved must work together responsively to define the parameters and action of the scene, in a process of co-creation. With each spoken word or action in the scene, an improviser makes an offer, meaning that he or she defines some element of the reality of the scene. This might include giving another character a name, identifying a relationship, location, or using mime to define the physical environment. These activities are also known as endowment. It is the responsibility of the other improvisers to accept the offers that their fellow performers make; to not do so is known as blocking, negation, or denial, which usually prevents the scene from developing. Some performers may deliberately block (or otherwise break out of character) for comedic effect—this is known as gagging—but this generally prevents the scene from advancing and is frowned upon by many improvisers. Accepting an offer is usually accompanied by adding a new offer, often building on the earlier one; this is a process improvisers refer to as Yes, and... and is considered the cornerstone of improvisational technique. Every new piece of information added helps the improvisers to refine their characters and progress the action of the scene. The Yes, and... rule, however, applies to a scene's early stage since it is in this stage that a "base (or shared) reality" is established in order to be later redefined by applying the "if (this is true), then (what else can also be true)" practice progressing the scene into comedy, as explained in the 2013 manual by the Upright Citizens Brigade members. The unscripted nature of improv also implies no predetermined knowledge about the props that might be useful in a scene. Improv companies may have at their disposal some number of readily accessible props that can be called upon at a moment's notice, but many improvisers eschew props in favor of the infinite possibilities available through mime. In improv, this is more commonly known as 'space object work' or 'space work', rather than 'mime', and the props and locations created by this technique, as 'space objects' created out of 'space substance', developed as a technique by Viola Spolin. As with all improv 'offers', improvisers are encouraged to respect the validity and continuity of the imaginary environment defined by themselves and their fellow performers; this means, for example, taking care not to walk through the table or "miraculously" survive multiple bullet wounds from another improviser's gun. Because improvisers may be required to play a variety of roles without preparation, they need to be able to construct characters quickly with physicality, gestures, accents, voice changes, or other techniques as demanded by the situation. The improviser may be called upon to play a character of a different age or sex. Character motivations are an important part of successful improv scenes, and improvisers must therefore attempt to act according to the objectives that they believe their character seeks. In improv formats with multiple scenes, an agreed-upon signal is used to denote scene changes. Most often, this takes the form of a performer running in front of the scene, known as a "wipe". Tapping a character in or out can also be employed. The performers not currently part of the scene often stand at the side or back of the stage, and can enter or exit the scene by stepping into or out of the stage center. Community Many theatre troupes are devoted to staging improvisational performances and growing the improv community through their training centers. In addition to for-profit theatre troupes, there are many college-based improv groups in the United States and around the world. In Europe the special contribution to the theatre of the abstract, the surreal, the irrational and the subconscious have been part of the stage tradition for centuries. From the 1990s onwards a growing number of European Improv groups have been set up specifically to explore the possibilities offered by the use of the abstract in improvised performance, including dance, movement, sound, music, mask work, lighting, and so on. These groups are not especially interested in comedy, either as a technique or as an effect, but rather in expanding the improv genre so as to incorporate techniques and approaches that have long been a legitimate part of European theatre. Notable contributors to the field The Brave New Workshop Comedy Theater (BNW), is a sketch and improvisational comedy theater based in Minneapolis, Minnesota. Started by Dudley Riggs in 1958, the artists of the BNW have been writing, performing and producing live sketch comedy and improvisation performances for 62 years – longer than any other theater in the nation. Notable alumni of the BNW include Louie Anderson, Mo Collins, Tom Davis, Al Franken, Penn Jillette, Carl Lumbly, Paul Menzel, Pat Proft, Annie Reirson, Taylor Nikolai, Nancy Steen, Peter Tolan, Linda Wallem, Lizz Winstead, Peter MacNicol, Melissa Peterman, and Cedric Yarbrough. Some key figures in the development of improvisational theatre are Viola Spolin and her son Paul Sills, founder of Chicago's famed Second City troupe and originator of Theater Games, and Del Close, founder of ImprovOlympic (along with Charna Halpern) and creator of a popular longform improv format known as The Harold. Others include Keith Johnstone, the British teacher and writer–author of Impro, who founded the Theatre Machine and whose teachings form the foundation of the popular shortform Theatresports format, Dick Chudnow, founder of ComedySportz which evolved its family-friendly show format from Johnstone's Theatersports, and Bill Johnson, creator/director of The Magic Meathands, who pioneered the concept of "Commun-edy Outreach" by tailoring performances to non-traditional audiences, such as the homeless and foster children. David Shepherd, with Paul Sills, founded The Compass Players in Chicago. Shepherd was intent on developing a true "people's Theatre", and hoped to bring political drama to the stockyards. The Compass went on to play in numerous forms and companies, in a number of cities including New York and Hyannis, after the founding of The Second City. A number of Compass members were also founding members of The Second City. In the 1970s, Shepherd began experimenting with group-created videos. He is the author of That Movie In Your Head, about these efforts. In the 1970s, David Shepherd and Howard Jerome created the Improvisational Olympics, a format for competition based improv. The Improv Olympics were first demonstrated at Toronto's Homemade Theatre in 1976 and have been continued on as the Canadian Improv Games. In the United States, the Improv Olympics were later produced by Charna Halpern under the name "ImprovOlympic" and now as "IO"; IO operates training centers and theaters in Chicago and Los Angeles. At IO, Halpern combined Shepherd's "Time Dash" game with Del Close's "Harold" game; the revised format for the Harold became the fundamental structure for the development of modern longform improvisation. In 1975 Jonathan Fox founded Playback Theatre, a form of improvised community theatre which is often not comedic and replays stories as shared by members of the audience. The Groundlings is a popular and influential improv theatre and training center in Los Angeles, California. The late Gary Austin, founder of The Groundlings, taught improvisation around the country, focusing especially in Los Angeles. He was widely acclaimed as one of the greatest acting teachers in America. His work was grounded in the lessons he learned as an improviser at The Committee with Del Close, as well as in his experiences as founding director of The Groundlings. The Groundlings is often seen as the Los Angeles training ground for the "second generation" of improv performers and troupes. Stan Wells developed the "Clap-In" style of longform improvisation here, later using this as the basis for his own theatre, The Empty Stage which in turn bred multiple troupes utilizing this style. In the late 1990s, Matt Besser, Amy Poehler, Ian Roberts, and Matt Walsh founded the Upright Citizens Brigade Theatre in New York and later they founded one in Los Angeles, each with an accompanying improv/sketch comedy school. In September 2011 the UCB opened a third theatre in New York City's East Village, known as UCBeast. Hoopla Impro are the founders of the UK and London's first improv theatre. They also run an annual UK improv festival and improv marathon. In 2015, The Free Association opened in London as a counterpart to American improv schools. Gunter Lösel compared the existing improvisational theater theories (including Moreno, Spolin, Johnstone, and Close), structured them and wrote a general theory of improvisational theater. Alan Alda's book If I Understood You, Would I Have This Look on My Face? investigates the way in which improvisation improves communication in the sciences. The book is based on his work at Alan Alda Center for Communicating Science at Stony Brook University. The book has many examples of how improvisational theater games can increase communication skills and develop empathy. See also Busking Guerrilla theater Improvisation List of improvisational theatre companies List of improvisational theater festivals Playback Theatre Notes References Further reading Abbott, John. 2007. The Improvisation Book. London: Nick Hern Books. . Besser, Matt; Ian Roberts, Matt Walsh. 2013. The Upright Citizens Brigade Comedy Improvisation Manual, Comedy Council of Nicea, Charna Halpern, Del Close, Kim Howard Johnson. 1994. The Truth in Comedy - The Manual for Improvisation Meriwether Pub Ltd. Coleman, Janet. 1991. The Compass: The Improvisational Theatre that Revolutionized American Comedy. Chicago: University Of Chicago Press. Dudeck, Theresa Robbins. 2013. "Keith Johnstone: A Critical Biography." London: Bloomsbury. . Hauck, Ben. 2012. Long-Form Improv: The Complete Guide to Creating Characters, Sustaining Scenes, and Performing Extraordinary Harolds. New York: Allworth Press, 2012. . Johnstone, Keith. 1981. Impro: Improvisation and the Theatre Rev. ed. London: Methuen, 2007. . Koppett, Kat. 2011. "Training to imagine practical improvisational theatre techniques to enhance creativity, teamwork, leadership, and learn." Stylus Publishing. Lösel, Gunter. 2013. Das Spiel mit dem Chaos - Zur Performativität des Improvisationstheaters transcript. Ryan Madson, Patricia. 2005. "Improv Wisdom: Don't Prepare, Just Show Up" New York: Bell Tower. Spolin, Viola. 1967. Improvisation for the Theater. Third rev. ed. Evanston, Il.: Northwestern University Press, 1999. . External links Collection of improv games The Ultimate Guide to Improv: 101 Improv Tips How to improvise stand-up comedy, Wired UK, 11 April 2014 How To Be A Better Improviser, an essay by Daniel Gray Goldstein that lays out a foundation for improvising. Improvisation: the Original Survival Tool, an essay by Brad Fortier linking evolution of humanity with ethics of improvisation. Wiki about improvisational theatre (exercises and games) Fundamental Improv Principles. Improv Comedy for Anxiety. Group Mind and Intuition with Improv. Applied Improv Network - annual global conference on using improv off-stage, in business, education, and life Academic Literature Review of Theatrical Improvisation Training in the Workplace Acting techniques Comedy Theatrical genres
[ 0.41002026200294495, -0.04538898915052414, -0.1702449470758438, -0.19585615396499634, -0.02993517369031906, 0.21027520298957825, 0.535864531993866, 0.4182806611061096, -0.2043801099061966, -0.5547387003898621, -0.5869397521018982, 0.49722304940223694, -0.19516479969024658, 0.00032225649920...
15043
https://en.wikipedia.org/wiki/International%20Space%20Station
International Space Station
The International Space Station (ISS) is a modular space station (habitable artificial satellite) in low Earth orbit. It is a multinational collaborative project involving five participating space agencies: NASA (United States), Roscosmos (Russia), JAXA (Japan), ESA (Europe), and CSA (Canada). The ownership and use of the space station is established by intergovernmental treaties and agreements. The station serves as a microgravity and space environment research laboratory in which scientific research is conducted in astrobiology, astronomy, meteorology, physics, and other fields. The ISS is suited for testing the spacecraft systems and equipment required for possible future long-duration missions to the Moon and Mars. The ISS programme evolved from the Space Station Freedom, an American proposal which was conceived in 1984 to construct a permanently manned Earth-orbiting station, and the contemporaneous Soviet/Russian Mir-2 proposal from 1976 with similar aims. The ISS is the ninth space station to be inhabited by crews, following the Soviet and later Russian Salyut, Almaz, and Mir stations and the American Skylab. It is the largest artificial object in space and the largest satellite in low Earth orbit, regularly visible to the naked eye from Earth's surface. It maintains an orbit with an average altitude of by means of reboost manoeuvres using the engines of the Zvezda Service Module or visiting spacecraft. The ISS circles the Earth in roughly 93 minutes, completing orbits per day. The station is divided into two sections: the Russian Orbital Segment (ROS) is operated by Russia, while the United States Orbital Segment (USOS) is run by the United States as well as by the other states. The Russian segment includes six modules. The US segment includes ten modules, whose support services are distributed 76.6% for NASA, 12.8% for JAXA, 8.3% for ESA and 2.3% for CSA. Roscosmos has endorsed the continued operation of ROS through 2024, having previously proposed using elements of the segment to construct a new Russian space station called OPSEK. The first ISS component was launched in 1998, and the first long-term residents arrived on 2 November 2000 after being launched from the Baikonur Cosmodrome on 31 October 2000. The station has since been continuously occupied for , the longest continuous human presence in low Earth orbit, having surpassed the previous record of held by the Mir space station. The latest major pressurised module, Nauka, was fitted in 2021, a little over ten years after the previous major addition, Leonardo in 2011. Development and assembly of the station continues, with an experimental inflatable space habitat added in 2016, and several major new Russian elements scheduled for launch starting in 2021. In January 2022, the station's operation authorization was extended to 2030, with funding secured through that year. There have been calls to privatize ISS operations after that point to pursue future Moon and Mars missions, with former NASA Administrator Jim Bridenstine stating: "given our current budget constraints, if we want to go to the moon and we want to go to Mars, we need to commercialize low Earth orbit and go on to the next step." The ISS consists of pressurised habitation modules, structural trusses, photovoltaic solar arrays, thermal radiators, docking ports, experiment bays and robotic arms. Major ISS modules have been launched by Russian Proton and Soyuz rockets and US Space Shuttles. The station is serviced by a variety of visiting spacecraft: the Russian Soyuz and Progress, the SpaceX Dragon 2, and the Northrop Grumman Space Systems Cygnus, and formerly the European Automated Transfer Vehicle (ATV), the Japanese H-II Transfer Vehicle, and SpaceX Dragon 1. The Dragon spacecraft allows the return of pressurised cargo to Earth, which is used, for example, to repatriate scientific experiments for further analysis. , 251 astronauts, cosmonauts, and space tourists from 19 different nations have visited the space station, many of them multiple times; this includes 155 Americans, 52 Russians, 11 Japanese, 8 Canadians, 5 Italians, 4 French, 4 Germans, 1 Belgian, 1 Dutch, 1 Swede, 1 Brazilian, 1 Dane, 1 Kazakhstani, 1 Spaniard, 1 Briton, 1 Malaysian, 1 South African, 1 South Korean and 1 Emirati. History Purpose The ISS was originally intended to be a laboratory, observatory, and factory while providing transportation, maintenance, and a low Earth orbit staging base for possible future missions to the Moon, Mars, and asteroids. However, not all of the uses envisioned in the initial memorandum of understanding between NASA and Roscosmos have been realised. In the 2010 United States National Space Policy, the ISS was given additional roles of serving commercial, diplomatic, and educational purposes. Scientific research The ISS provides a platform to conduct scientific research, with power, data, cooling, and crew available to support experiments. Small uncrewed spacecraft can also provide platforms for experiments, especially those involving zero gravity and exposure to space, but space stations offer a long-term environment where studies can be performed potentially for decades, combined with ready access by human researchers. The ISS simplifies individual experiments by allowing groups of experiments to share the same launches and crew time. Research is conducted in a wide variety of fields, including astrobiology, astronomy, physical sciences, materials science, space weather, meteorology, and human research including space medicine and the life sciences. Scientists on Earth have timely access to the data and can suggest experimental modifications to the crew. If follow-on experiments are necessary, the routinely scheduled launches of resupply craft allows new hardware to be launched with relative ease. Crews fly expeditions of several months' duration, providing approximately 160 person-hours per week of labour with a crew of six. However, a considerable amount of crew time is taken up by station maintenance. Perhaps the most notable ISS experiment is the Alpha Magnetic Spectrometer (AMS), which is intended to detect dark matter and answer other fundamental questions about our universe and is as important as the Hubble Space Telescope according to NASA. Currently docked on station, it could not have been easily accommodated on a free flying satellite platform because of its power and bandwidth needs. On 3 April 2013, scientists reported that hints of dark matter may have been detected by the AMS. According to the scientists, "The first results from the space-borne Alpha Magnetic Spectrometer confirm an unexplained excess of high-energy positrons in Earth-bound cosmic rays". The space environment is hostile to life. Unprotected presence in space is characterised by an intense radiation field (consisting primarily of protons and other subatomic charged particles from the solar wind, in addition to cosmic rays), high vacuum, extreme temperatures, and microgravity. Some simple forms of life called extremophiles, as well as small invertebrates called tardigrades can survive in this environment in an extremely dry state through desiccation. Medical research improves knowledge about the effects of long-term space exposure on the human body, including muscle atrophy, bone loss, and fluid shift. These data will be used to determine whether high duration human spaceflight and space colonisation are feasible. In 2006, data on bone loss and muscular atrophy suggested that there would be a significant risk of fractures and movement problems if astronauts landed on a planet after a lengthy interplanetary cruise, such as the six-month interval required to travel to Mars. Medical studies are conducted aboard the ISS on behalf of the National Space Biomedical Research Institute (NSBRI). Prominent among these is the Advanced Diagnostic Ultrasound in Microgravity study in which astronauts perform ultrasound scans under the guidance of remote experts. The study considers the diagnosis and treatment of medical conditions in space. Usually, there is no physician on board the ISS and diagnosis of medical conditions is a challenge. It is anticipated that remotely guided ultrasound scans will have application on Earth in emergency and rural care situations where access to a trained physician is difficult. In August 2020, scientists reported that bacteria from Earth, particularly Deinococcus radiodurans bacteria, which is highly resistant to environmental hazards, were found to survive for three years in outer space, based on studies conducted on the International Space Station. These findings supported the notion of panspermia, the hypothesis that life exists throughout the Universe, distributed in various ways, including space dust, meteoroids, asteroids, comets, planetoids or contaminated spacecraft. Remote sensing of the Earth, astronomy, and deep space research on the ISS have dramatically increased during the 2010s after the completion of the US Orbital Segment in 2011. Throughout the more than 20 years of the ISS program researchers aboard the ISS and on the ground have examined aerosols, ozone, lightning, and oxides in Earth's atmosphere, as well as the Sun, cosmic rays, cosmic dust, antimatter, and dark matter in the universe. Examples of Earth-viewing remote sensing experiments that have flown on the ISS are the Orbiting Carbon Observatory 3, ISS-RapidScat, ECOSTRESS, the Global Ecosystem Dynamics Investigation, and the Cloud Aerosol Transport System. ISS-based astronomy telescopes and experiments include SOLAR, the Neutron Star Interior Composition Explorer, the Calorimetric Electron Telescope, the Monitor of All-sky X-ray Image (MAXI), and the Alpha Magnetic Spectrometer. Freefall Gravity at the altitude of the ISS is approximately 90% as strong as at Earth's surface, but objects in orbit are in a continuous state of freefall, resulting in an apparent state of weightlessness. This perceived weightlessness is disturbed by five effects: Drag from the residual atmosphere. Vibration from the movements of mechanical systems and the crew. Actuation of the on-board attitude control moment gyroscopes. Thruster firings for attitude or orbital changes. Gravity-gradient effects, also known as tidal effects. Items at different locations within the ISS would, if not attached to the station, follow slightly different orbits. Being mechanically connected these items experience small forces that keep the station moving as a rigid body. Researchers are investigating the effect of the station's near-weightless environment on the evolution, development, growth and internal processes of plants and animals. In response to some of the data, NASA wants to investigate microgravity's effects on the growth of three-dimensional, human-like tissues and the unusual protein crystals that can be formed in space. Investigating the physics of fluids in microgravity will provide better models of the behaviour of fluids. Because fluids can be almost completely combined in microgravity, physicists investigate fluids that do not mix well on Earth. Examining reactions that are slowed by low gravity and low temperatures will improve our understanding of superconductivity. The study of materials science is an important ISS research activity, with the objective of reaping economic benefits through the improvement of techniques used on the ground. Other areas of interest include the effect of low gravity on combustion, through the study of the efficiency of burning and control of emissions and pollutants. These findings may improve knowledge about energy production and lead to economic and environmental benefits. Exploration The ISS provides a location in the relative safety of low Earth orbit to test spacecraft systems that will be required for long-duration missions to the Moon and Mars. This provides experience in operations, maintenance as well as repair and replacement activities on-orbit. This will help develop essential skills in operating spacecraft farther from Earth, reduce mission risks, and advance the capabilities of interplanetary spacecraft. Referring to the MARS-500 experiment, a crew isolation experiment conducted on Earth, ESA states that "Whereas the ISS is essential for answering questions concerning the possible impact of weightlessness, radiation and other space-specific factors, aspects such as the effect of long-term isolation and confinement can be more appropriately addressed via ground-based simulations". Sergey Krasnov, the head of human space flight programmes for Russia's space agency, Roscosmos, in 2011 suggested a "shorter version" of MARS-500 may be carried out on the ISS. In 2009, noting the value of the partnership framework itself, Sergey Krasnov wrote, "When compared with partners acting separately, partners developing complementary abilities and resources could give us much more assurance of the success and safety of space exploration. The ISS is helping further advance near-Earth space exploration and realisation of prospective programmes of research and exploration of the Solar system, including the Moon and Mars." A crewed mission to Mars may be a multinational effort involving space agencies and countries outside the current ISS partnership. In 2010, ESA Director-General Jean-Jacques Dordain stated his agency was ready to propose to the other four partners that China, India and South Korea be invited to join the ISS partnership. NASA chief Charles Bolden stated in February 2011, "Any mission to Mars is likely to be a global effort". Currently, US federal legislation prevents NASA co-operation with China on space projects. Education and cultural outreach The ISS crew provides opportunities for students on Earth by running student-developed experiments, making educational demonstrations, allowing for student participation in classroom versions of ISS experiments, and directly engaging students using radio, videolink, and email. ESA offers a wide range of free teaching materials that can be downloaded for use in classrooms. In one lesson, students can navigate a 3D model of the interior and exterior of the ISS, and face spontaneous challenges to solve in real time. The Japanese Aerospace Exploration Agency (JAXA) aims to inspire children to "pursue craftsmanship" and to heighten their "awareness of the importance of life and their responsibilities in society". Through a series of education guides, students develop a deeper understanding of the past and near-term future of crewed space flight, as well as that of Earth and life. In the JAXA "Seeds in Space" experiments, the mutation effects of spaceflight on plant seeds aboard the ISS are explored by growing sunflower seeds that have flown on the ISS for about nine months. In the first phase of Kibō utilisation from 2008 to mid-2010, researchers from more than a dozen Japanese universities conducted experiments in diverse fields. Cultural activities are another major objective of the ISS programme. Tetsuo Tanaka, the director of JAXA's Space Environment and Utilization Center, has said: "There is something about space that touches even people who are not interested in science." Amateur Radio on the ISS (ARISS) is a volunteer programme that encourages students worldwide to pursue careers in science, technology, engineering, and mathematics, through amateur radio communications opportunities with the ISS crew. ARISS is an international working group, consisting of delegations from nine countries including several in Europe, as well as Japan, Russia, Canada, and the United States. In areas where radio equipment cannot be used, speakerphones connect students to ground stations which then connect the calls to the space station. First Orbit is a 2011 feature-length documentary film about Vostok 1, the first crewed space flight around the Earth. By matching the orbit of the ISS to that of Vostok 1 as closely as possible, in terms of ground path and time of day, documentary filmmaker Christopher Riley and ESA astronaut Paolo Nespoli were able to film the view that Yuri Gagarin saw on his pioneering orbital space flight. This new footage was cut together with the original Vostok 1 mission audio recordings sourced from the Russian State Archive. Nespoli is credited as the director of photography for this documentary film, as he recorded the majority of the footage himself during Expedition 26/27. The film was streamed in a global YouTube premiere in 2011 under a free licence through the website firstorbit.org. In May 2013, commander Chris Hadfield shot a music video of David Bowie's "Space Oddity" on board the station, which was released on YouTube. It was the first music video ever to be filmed in space. In November 2017, while participating in Expedition 52/53 on the ISS, Paolo Nespoli made two recordings of his spoken voice (one in English and the other in his native Italian), for use on Wikipedia articles. These were the first content made in space specifically for Wikipedia. In November 2021, a virtual reality exhibit called The Infinite featuring life aboard the ISS was announced. Construction Manufacturing Since the International Space Station is a multi-national collaborative project, the components for in-orbit assembly were manufactured in various countries around the world. Beginning in the mid 1990s, the U.S. components Destiny, Unity, the Integrated Truss Structure, and the solar arrays were fabricated at the Marshall Space Flight Center and the Michoud Assembly Facility. These modules were delivered to the Operations and Checkout Building and the Space Station Processing Facility (SSPF) for final assembly and processing for launch. The Russian modules, including Zarya and Zvezda, were manufactured at the Khrunichev State Research and Production Space Center in Moscow. Zvezda was initially manufactured in 1985 as a component for Mir-2, but was never launched and instead became the ISS Service Module. The European Space Agency (ESA) Columbus module was manufactured at the EADS Astrium Space Transportation facilities in Bremen, Germany, along with many other contractors throughout Europe. The other ESA-built modulesHarmony, Tranquility, the Leonardo MPLM, and the Cupolawere initially manufactured at the Thales Alenia Space factory in Turin, Italy. The structural steel hulls of the modules were transported by aircraft to the Kennedy Space Center SSPF for launch processing. The Japanese Experiment Module Kibō, was fabricated in various technology manufacturing facilities in Japan, at the NASDA (now JAXA) Tsukuba Space Center, and the Institute of Space and Astronautical Science. The Kibo module was transported by ship and flown by aircraft to the SSPF. The Mobile Servicing System, consisting of the Canadarm2 and the Dextre grapple fixture, was manufactured at various factories in Canada (such as the David Florida Laboratory) and the United States, under contract by the Canadian Space Agency. The mobile base system, a connecting framework for Canadarm2 mounted on rails, was built by Northrop Grumman. Assembly The assembly of the International Space Station, a major endeavour in space architecture, began in November 1998. Russian modules launched and docked robotically, with the exception of Rassvet. All other modules were delivered by the Space Shuttle, which required installation by ISS and Shuttle crewmembers using the Canadarm2 (SSRMS) and extra-vehicular activities (EVAs); by 5 June 2011, they had added 159 components during more than 1,000 hours of EVA. 127 of these spacewalks originated from the station, and the remaining 32 were launched from the airlocks of docked Space Shuttles. The beta angle of the station had to be considered at all times during construction. The first module of the ISS, Zarya, was launched on 20 November 1998 on an autonomous Russian Proton rocket. It provided propulsion, attitude control, communications, and electrical power, but lacked long-term life support functions. A passive NASA module, Unity, was launched two weeks later aboard Space Shuttle flight STS-88 and attached to Zarya by astronauts during EVAs. The Unity module has two Pressurised Mating Adapters (PMAs): one connects permanently to Zarya and the other allowed the Space Shuttle to dock to the space station. At that time, the Russian (Soviet) station Mir was still inhabited, and the ISS remained uncrewed for two years. On 12 July 2000, the Zvezda module was launched into orbit. Onboard preprogrammed commands deployed its solar arrays and communications antenna. Zvezda then became the passive target for a rendezvous with Zarya and Unity, maintaining a station-keeping orbit while the Zarya–Unity vehicle performed the rendezvous and docking via ground control and the Russian automated rendezvous and docking system. Zarya computer transferred control of the station to Zvezda computer soon after docking. Zvezda added sleeping quarters, a toilet, kitchen, CO2 scrubbers, dehumidifier, oxygen generators, and exercise equipment, plus data, voice and television communications with mission control, enabling permanent habitation of the station. The first resident crew, Expedition 1, arrived in November 2000 on Soyuz TM-31. At the end of the first day on the station, astronaut Bill Shepherd requested the use of the radio call sign "Alpha", which he and cosmonaut Sergei Krikalev preferred to the more cumbersome "International Space Station". The name "Alpha" had previously been used for the station in the early 1990s, and its use was authorised for the whole of Expedition 1. Shepherd had been advocating the use of a new name to project managers for some time. Referencing a naval tradition in a pre-launch news conference he had said: "For thousands of years, humans have been going to sea in ships. People have designed and built these vessels, launched them with a good feeling that a name will bring good fortune to the crew and success to their voyage." Yuri Semenov, the President of Russian Space Corporation Energia at the time, disapproved of the name "Alpha" as he felt that Mir was the first modular space station, so the names "Beta" or "Mir 2" for the ISS would have been more fitting. Expedition 1 arrived midway between the Space Shuttle flights of missions STS-92 and STS-97. These two flights each added segments of the station's Integrated Truss Structure, which provided the station with Ku-band communication for US television, additional attitude support needed for the additional mass of the USOS, and substantial solar arrays to supplement the station's four existing arrays. Over the next two years, the station continued to expand. A Soyuz-U rocket delivered the Pirs docking compartment. The Space Shuttles Discovery, Atlantis, and Endeavour delivered the Destiny laboratory and Quest airlock, in addition to the station's main robot arm, the Canadarm2, and several more segments of the Integrated Truss Structure. The expansion schedule was interrupted in 2003 by the Space Shuttle Columbia disaster and a resulting hiatus in flights. The Space Shuttle was grounded until 2005 with STS-114 flown by Discovery. Assembly resumed in 2006 with the arrival of STS-115 with Atlantis, which delivered the station's second set of solar arrays. Several more truss segments and a third set of arrays were delivered on STS-116, STS-117, and STS-118. As a result of the major expansion of the station's power-generating capabilities, more pressurised modules could be accommodated, and the Harmony node and Columbus European laboratory were added. These were soon followed by the first two components of Kibō. In March 2009, STS-119 completed the Integrated Truss Structure with the installation of the fourth and final set of solar arrays. The final section of Kibō was delivered in July 2009 on STS-127, followed by the Russian Poisk module. The third node, Tranquility, was delivered in February 2010 during STS-130 by the Space Shuttle Endeavour, alongside the Cupola, followed by the penultimate Russian module, Rassvet, in May 2010. Rassvet was delivered by Space Shuttle Atlantis on STS-132 in exchange for the Russian Proton delivery of the US-funded Zarya module in 1998. The last pressurised module of the USOS, Leonardo, was brought to the station in February 2011 on the final flight of Discovery, STS-133. The Alpha Magnetic Spectrometer was delivered by Endeavour on STS-134 the same year. By June 2011, the station consisted of 15 pressurised modules and the Integrated Truss Structure. Three modules are still to be launched, including the Prichal module, and two power modules called NEM-1 and NEM-2. Russia's latest primary research module Nauka docked in July 2021, along with the European Robotic Arm which will be able to relocate itself to different parts of the Russian modules of the station. The gross mass of the station changes over time. The total launch mass of the modules on orbit is about (). The mass of experiments, spare parts, personal effects, crew, foodstuff, clothing, propellants, water supplies, gas supplies, docked spacecraft, and other items add to the total mass of the station. Hydrogen gas is constantly vented overboard by the oxygen generators. Structure The ISS is a modular space station. Modular stations can allow modules to be added to or removed from the existing structure, allowing greater flexibility. Below is a diagram of major station components. The blue areas are pressurised sections accessible by the crew without using spacesuits. The station's unpressurised superstructure is indicated in red. Planned components are shown in white and former ones in gray. Other unpressurised components are yellow. The Unity node joins directly to the Destiny laboratory. For clarity, they are shown apart. Similar cases are also seen in other parts of the structure. Pressurised modules Zarya Zarya (), also known as the Functional Cargo Block or FGB (from the or ФГБ), is the first module of the ISS to have been launched. The FGB provided electrical power, storage, propulsion, and guidance to the ISS during the initial stage of assembly. With the launch and assembly in orbit of other modules with more specialized functionality, Zarya is now primarily used for storage, both inside the pressurized section and in the externally mounted fuel tanks. The Zarya is a descendant of the TKS spacecraft designed for the Russian Salyut program. The name Zarya ("Dawn") was given to the FGB because it signified the dawn of a new era of international cooperation in space. Although it was built by a Russian company, it is owned by the United States. Unity The Unity connecting module, also known as Node 1, is the first U.S.-built component of the ISS. It connects the Russian and U.S. segments of the station, and is where crew eat meals together. The module is cylindrical in shape, with six berthing locations (forward, aft, port, starboard, zenith, and nadir) facilitating connections to other modules. Unity measures in diameter, is long, made of steel, and was built for NASA by Boeing in a manufacturing facility at the Marshall Space Flight Center in Huntsville, Alabama. Unity is the first of the three connecting modules; the other two are Harmony and Tranquility. Zvezda Zvezda (, meaning "star"), Salyut DOS-8, also known as the Zvezda Service Module, is a module of the ISS. It was the third module launched to the station, and provides all of the station's life support systems, some of which are supplemented in the USOS, as well as living quarters for two crew members. It is the structural and functional center of the Russian Orbital Segment, which is the Russian part of the ISS. Crew assemble here to deal with emergencies on the station. The module was manufactured by RKK Energia, with major sub-contracting work by GKNPTs Khrunichev. Zvezda was launched on a Proton rocket on 12 July 2000, and docked with the Zarya module on 26 July 2000. Destiny The Destiny module, also known as the U.S. Lab, is the primary operating facility for U.S. research payloads aboard the ISS. It was berthed to the Unity module and activated over a period of five days in February 2001. Destiny is NASA's first permanent operating orbital research station since Skylab was vacated in February 1974. The Boeing Company began construction of the research laboratory in 1995 at the Michoud Assembly Facility and then the Marshall Space Flight Center in Huntsville, Alabama. Destiny was shipped to the Kennedy Space Center in Florida in 1998, and was turned over to NASA for pre-launch preparations in August 2000. It launched on 7 February 2001, aboard the Space Shuttle Atlantis on STS-98. Astronauts work inside the pressurized facility to conduct research in numerous scientific fields. Scientists throughout the world would use the results to enhance their studies in medicine, engineering, biotechnology, physics, materials science, and Earth science. Quest The Joint Airlock (also known as "Quest") is provided by the U.S. and provides the capability for ISS-based Extravehicular Activity (EVA) using either a U.S. Extravehicular Mobility Unit (EMU) or Russian Orlan EVA suits. Before the launch of this airlock, EVAs were performed from either the U.S. Space Shuttle (while docked) or from the Transfer Chamber on the Service Module. Due to a variety of system and design differences, only U.S. space suits could be used from the Shuttle and only Russian suits could be used from the Service Module. The Joint Airlock alleviates this short-term problem by allowing either (or both) spacesuit systems to be used. The Joint Airlock was launched on ISS-7A / STS-104 in July 2001 and was attached to the right hand docking port of Node 1. The Joint Airlock is 20 ft. long, 13 ft. in diameter, and weighs 6.5 tons. The Joint Airlock was built by Boeing at Marshall Space Flight Center. The Joint Airlock was launched with the High Pressure Gas Assembly. The High Pressure Gas Assembly was mounted on the external surface of the Joint Airlock and will support EVAs operations with breathing gases and augments the Service Module's gas resupply system. The Joint Airlock has two main components: a crew airlock from which astronauts and cosmonauts exit the ISS and an equipment airlock designed for storing EVA gear and for so-called overnight "campouts" wherein Nitrogen is purged from astronaut's bodies overnight as pressure is dropped in preparation for spacewalks the following day. This alleviates the bends as the astronauts are repressurized after their EVA. The crew airlock was derived from the Space Shuttle's external airlock. It is equipped with lighting, external handrails, and an Umbilical Interface Assembly (UIA). The UIA is located on one wall of the crew airlock and provides a water supply line, a wastewater return line, and an oxygen supply line. The UIA also provides communication gear and spacesuit power interfaces and can support two spacesuits simultaneously. This can be either two American EMU spacesuits, two Russian ORLAN spacesuits, or one of each design. Poisk Poisk () was launched on 10 November 2009 attached to a modified Progress spacecraft, called Progress M-MIM2, on a Soyuz-U rocket from Launch Pad 1 at the Baikonur Cosmodrome in Kazakhstan. Poisk is used as the Russian airlock module, containing two identical EVA hatches. An outward-opening hatch on the Mir space station failed after it swung open too fast after unlatching, because of a small amount of air pressure remaining in the airlock. All EVA hatches on the ISS open inwards and are pressure-sealing. Poisk is used to store, service, and refurbish Russian Orlan suits and provides contingency entry for crew using the slightly bulkier American suits. The outermost docking port on the module allows docking of Soyuz and Progress spacecraft, and the automatic transfer of propellants to and from storage on the ROS. Since the departure of the identical Pirs module on July 26, 2021, Poisk has served as the only airlock on the ROS. Harmony Harmony, also known as Node 2, is the "utility hub" of the ISS. It connects the laboratory modules of the United States, Europe and Japan, as well as providing electrical power and electronic data. Sleeping cabins for four of the crew are housed here. Harmony was successfully launched into space aboard Space Shuttle flight STS-120 on 23 October 2007. After temporarily being attached to the port side of the Unity node, it was moved to its permanent location on the forward end of the Destiny laboratory on 14 November 2007. Harmony added to the station's living volume, an increase of almost 20 percent, from . Its successful installation meant that from NASA's perspective, the station was considered to be "U.S. Core Complete". Tranquility Tranquility, also known as Node 3, is a module of the ISS. It contains environmental control systems, life support systems, a toilet, exercise equipment, and an observation cupola. The European Space Agency and the Italian Space Agency had Tranquility manufactured by Thales Alenia Space. A ceremony on 20 November 2009 transferred ownership of the module to NASA. On 8 February 2010, NASA launched the module on the Space Shuttle's STS-130 mission. Columbus Columbus is a science laboratory that is part of the ISS and is the largest single contribution to the station made by the European Space Agency. Like the Harmony and Tranquility modules, the Columbus laboratory was constructed in Turin, Italy by Thales Alenia Space. The functional equipment and software of the lab was designed by EADS in Bremen, Germany. It was also integrated in Bremen before being flown to the Kennedy Space Center in Florida in an Airbus Beluga. It was launched aboard Space Shuttle Atlantis on 7 February 2008, on flight STS-122. It is designed for ten years of operation. The module is controlled by the Columbus Control Centre, located at the German Space Operations Center, part of the German Aerospace Center in Oberpfaffenhofen near Munich, Germany. The European Space Agency has spent €1.4 billion (about US$2 billion) on building Columbus, including the experiments it carries and the ground control infrastructure necessary to operate them. Kibō The Japanese Experiment Module (JEM), nicknamed , is a Japanese science module for the International Space Station (ISS) developed by JAXA. It is the largest single ISS module, and is attached to the Harmony module. The first two pieces of the module were launched on Space Shuttle missions STS-123 and STS-124. The third and final components were launched on STS-127. Cupola The Cupola is an ESA-built observatory module of the ISS. Its name derives from the Italian word , which means "dome". Its seven windows are used to conduct experiments, dockings and observations of Earth. It was launched aboard Space Shuttle mission STS-130 on 8 February 2010 and attached to the Tranquility (Node 3) module. With the Cupola attached, ISS assembly reached 85 percent completion. The Cupola central window has a diameter of . Rassvet Rassvet (; lit. "dawn"), also known as the Mini-Research Module 1 (MRM-1) (, ) and formerly known as the Docking Cargo Module (DCM), is a component of the International Space Station (ISS). The module's design is similar to the Mir Docking Module launched on STS-74 in 1995. Rassvet is primarily used for cargo storage and as a docking port for visiting spacecraft. It was flown to the ISS aboard Space Shuttle Atlantis on the STS-132 mission on 14 May 2010, and was connected to the ISS on 18 May 2010. The hatch connecting Rassvet with the ISS was first opened on 20 May 2010. On 28 June 2010, the Soyuz TMA-19 spacecraft performed the first docking with the module. MLM outfittings In May 2010, equipment for Nauka was launched on STS-132 (as part of an agreement with NASA) and delivered by Space Shuttle Atlantis. Weighing 1.4 metric tons, the equipment was attached to the outside of Rassvet (MRM-1). It included a spare elbow joint for the European Robotic Arm (ERA) (which was launched with Nauka) and an ERA-portable workpost used during EVAs, as well as a heat radiator, internal hardware and an experiment airlock for launching CubeSats to be positioned on the modified passive forward port near the nadir end of the Nauka module. The deployable radiator will be used to add additional cooling capability to Nauka, which will enable the module to host more scientific experiments. The airlock will be used only to pass experiments inside and outside the module, with the aid of ERAvery similar to the Japanese airlock and Nanoracks Bishop Airlock on the U.S. segment of the station. The ERA will be used to remove the radiator and airlock from Rassvet and transfer them over to Nauka. This process is expected to take several months. A portable work platform will also be transferred over, which can attach to the end of the ERA to allow cosmonauts to "ride" on the end of the arm during spacewalks. Leonardo The Leonardo Permanent Multipurpose Module (PMM) is a module of the International Space Station. It was flown into space aboard the Space Shuttle on STS-133 on 24 February 2011 and installed on 1 March. Leonardo is primarily used for storage of spares, supplies and waste on the ISS, which was until then stored in many different places within the space station. It is also the personal hygiene area for the astronauts who live in the US Orbital Segment. The Leonardo PMM was a Multi-Purpose Logistics Module (MPLM) before 2011, but was modified into its current configuration. It was formerly one of two MPLM used for bringing cargo to and from the ISS with the Space Shuttle. The module was named for Italian polymath Leonardo da Vinci. Bigelow Expandable Activity Module The Bigelow Expandable Activity Module (BEAM) is an experimental expandable space station module developed by Bigelow Aerospace, under contract to NASA, for testing as a temporary module on the International Space Station (ISS) from 2016 to at least 2020. It arrived at the ISS on 10 April 2016, was berthed to the station on 16 April at Tranquility Node 3, and was expanded and pressurized on 28 May 2016. International Docking Adapters The International Docking Adapter (IDA) is a spacecraft docking system adapter developed to convert APAS-95 to the NASA Docking System (NDS). An IDA is placed on each of the ISS's two open Pressurized Mating Adapters (PMAs), both of which are connected to the Harmony module. Two International Docking Adapters are currently installed aboard the Station. Originally, IDA-1 was planned to be installed on PMA-2, located at Harmony's forward port, and IDA-2 would be installed on PMA-3 at Harmony's zenith. After IDA 1 was destroyed in a launch incident, IDA-2 was installed on PMA-2 on 19 August 2016, while IDA-3 was later installed on PMA-3 on 21 August 2019. Bishop Airlock Module The NanoRacks Bishop Airlock Module is a commercially funded airlock module launched to the ISS on SpaceX CRS-21 on 6 December 2020. The module was built by NanoRacks, Thales Alenia Space, and Boeing. It will be used to deploy CubeSats, small satellites, and other external payloads for NASA, CASIS, and other commercial and governmental customers. Nauka Nauka (), also known as the Multipurpose Laboratory Module-Upgrade (MLM-U), (Russian: Многоцелевой лабораторный модуль, усоверше́нствованный, or МЛМ-У), is a Roscosmos-funded component of the ISS that was launched on 21 July 2021, 14:58 UTC. In the original ISS plans, Nauka was to use the location of the Docking and Stowage Module (DSM), but the DSM was later replaced by the Rassvet module and moved to Zaryas nadir port. Nauka was successfully docked to Zvezdas nadir port on 29 July 2021, 13:29 UTC, replacing the Pirs module. It had a temporary docking adapter on its nadir port for crewed and uncrewed missions until Prichal arrival, where just before its arrival it was removed by a departuring Progress spacecraft. Prichal Prichal, also known as Uzlovoy Module or UM (), is a ball-shaped module that will provide the Russian segment additional docking ports to receive Soyuz MS and Progress MS spacecraft. UM was launched in November 2021. It was integrated with a special version of the Progress cargo spacecraft and launched by a standard Soyuz rocket, docking to the nadir port of the Nauka module. One port is equipped with an active hybrid docking port, which enables docking with the MLM module. The remaining five ports are passive hybrids, enabling docking of Soyuz and Progress vehicles, as well as heavier modules and future spacecraft with modified docking systems. The node module was intended to serve as the only permanent element of the cancelled Orbital Piloted Assembly and Experiment Complex (OPSEK). Unpressurised elements The ISS has a large number of external components that do not require pressurisation. The largest of these is the Integrated Truss Structure (ITS), to which the station's main solar arrays and thermal radiators are mounted. The ITS consists of ten separate segments forming a structure long. The station was intended to have several smaller external components, such as six robotic arms, three External Stowage Platforms (ESPs) and four ExPRESS Logistics Carriers (ELCs). While these platforms allow experiments (including MISSE, the STP-H3 and the Robotic Refueling Mission) to be deployed and conducted in the vacuum of space by providing electricity and processing experimental data locally, their primary function is to store spare Orbital Replacement Units (ORUs). ORUs are parts that can be replaced when they fail or pass their design life, including pumps, storage tanks, antennas, and battery units. Such units are replaced either by astronauts during EVA or by robotic arms. Several shuttle missions were dedicated to the delivery of ORUs, including STS-129, STS-133 and STS-134. , only one other mode of transportation of ORUs had been utilisedthe Japanese cargo vessel HTV-2which delivered an FHRC and CTC-2 via its Exposed Pallet (EP). There are also smaller exposure facilities mounted directly to laboratory modules; the Kibō Exposed Facility serves as an external "porch" for the Kibō complex, and a facility on the European Columbus laboratory provides power and data connections for experiments such as the European Technology Exposure Facility and the Atomic Clock Ensemble in Space. A remote sensing instrument, SAGE III-ISS, was delivered to the station in February 2017 aboard CRS-10, and the NICER experiment was delivered aboard CRS-11 in June 2017. The largest scientific payload externally mounted to the ISS is the Alpha Magnetic Spectrometer (AMS), a particle physics experiment launched on STS-134 in May 2011, and mounted externally on the ITS. The AMS measures cosmic rays to look for evidence of dark matter and antimatter. The commercial Bartolomeo External Payload Hosting Platform, manufactured by Airbus, was launched on 6 March 2020 aboard CRS-20 and attached to the European Columbus module. It will provide an additional 12 external payload slots, supplementing the eight on the ExPRESS Logistics Carriers, ten on Kibō, and four on Columbus. The system is designed to be robotically serviced and will require no astronaut intervention. It is named after Christopher Columbus's younger brother. Robotic arms and cargo cranes The Integrated Truss Structure serves as a base for the station's primary remote manipulator system, the Mobile Servicing System (MSS), which is composed of three main components: Canadarm2, the largest robotic arm on the ISS, has a mass of and is used to: dock and manipulate spacecraft and modules on the USOS; hold crew members and equipment in place during EVAs; and move Dextre around to perform tasks. Dextre is a robotic manipulator that has two arms and a rotating torso, with power tools, lights, and video for replacing orbital replacement units (ORUs) and performing other tasks requiring fine control. The Mobile Base System (MBS) is a platform that rides on rails along the length of the station's main truss, which serves as a mobile base for Canadarm2 and Dextre, allowing the robotic arms to reach all parts of the USOS. A grapple fixture was added to Zarya on STS-134 to enable Canadarm2 to inchworm itself onto the Russian Orbital Segment. Also installed during STS-134 was the Orbiter Boom Sensor System (OBSS), which had been used to inspect heat shield tiles on Space Shuttle missions and which can be used on the station to increase the reach of the MSS. Staff on Earth or the ISS can operate the MSS components using remote control, performing work outside the station without the need for space walks. Japan's Remote Manipulator System, which services the Kibō Exposed Facility, was launched on STS-124 and is attached to the Kibō Pressurised Module. The arm is similar to the Space Shuttle arm as it is permanently attached at one end and has a latching end effector for standard grapple fixtures at the other. The European Robotic Arm, which will service the Russian Orbital Segment, was launched alongside the Nauka module. The ROS does not require spacecraft or modules to be manipulated, as all spacecraft and modules dock automatically and may be discarded the same way. Crew use the two Strela () cargo cranes during EVAs for moving crew and equipment around the ROS. Each Strela crane has a mass of . Former module Pirs Pirs (Russian: Пирс, lit. 'Pier') was launched on 14 September 2001, as ISS Assembly Mission 4R, on a Russian Soyuz-U rocket, using a modified Progress spacecraft, Progress M-SO1, as an upper stage. Pirs was undocked by Progress MS-16 on 26 July 2021, 10:56 UTC, and deorbited on the same day at 14:51 UTC to make room for Nauka module to be attached to the space station. Prior to its departure, Pirs served as the primary Russian airlock on the station, being used to store and refurbish the Russian Orlan spacesuits. Planned components Axiom segment In January 2020, NASA awarded Axiom Space a contract to build a commercial module for the ISS with a launch date of 2024. The contract is under the NextSTEP2 program. NASA negotiated with Axiom on a firm fixed-price contract basis to build and deliver the module, which will attach to the forward port of the space station's Harmony (Node 2) module. Although NASA has only commissioned one module, Axiom plans to build an entire segment consisting of five modules, including a node module, an orbital research and manufacturing facility, a crew habitat, and a "large-windowed Earth observatory". The Axiom segment is expected to greatly increase the capabilities and value of the space station, allowing for larger crews and private spaceflight by other organisations. Axiom plans to convert the segment into a stand-alone space station once the ISS is decommissioned, with the intention that this would act as a successor to the ISS. Canadarm 2 will also help to berth the Axiom Space Station modules to the ISS and will continue its operations on the Axiom Space Station after the retirement of ISS in late 2020s. Proposed components Xbase Made by Bigelow Aerospace. In August 2016 Bigelow negotiated an agreement with NASA to develop a full-sized ground prototype Deep Space Habitation based on the B330 under the second phase of Next Space Technologies for Exploration Partnerships. The module is called the Expandable Bigelow Advanced Station Enhancement (XBASE), as Bigelow hopes to test the module by attaching it to the International Space Station. Independence-1 Nanoracks, after finalizing its contract with NASA, and after winning NextSTEPs Phase II award, is now developing its concept Independence-1 (previously known as Ixion), which would turn spent rocket tanks into a habitable living area to be tested in space. In Spring 2018, Nanoracks announced that Ixion is now known as the Independence-1, the first 'outpost' in Nanoracks' Space Outpost Program. Nautilus-X Centrifuge Demonstration If produced, this centrifuge will be the first in-space demonstration of sufficient scale centrifuge for artificial partial-g effects. It will be designed to become a sleep module for the ISS crew. Cancelled components Several modules planned for the station were cancelled over the course of the ISS programme. Reasons include budgetary constraints, the modules becoming unnecessary, and station redesigns after the 2003 Columbia disaster. The US Centrifuge Accommodations Module would have hosted science experiments in varying levels of artificial gravity. The US Habitation Module would have served as the station's living quarters. Instead, the living quarters are now spread throughout the station. The US Interim Control Module and ISS Propulsion Module would have replaced the functions of Zvezda in case of a launch failure. Two Russian Research Modules were planned for scientific research. They would have docked to a Russian Universal Docking Module. The Russian Science Power Platform would have supplied power to the Russian Orbital Segment independent of the ITS solar arrays. Science Power Modules 1 and 2 (Repurposed Components) Science Power Module 1 (SPM-1, also known as NEM-1) and Science Power Module 2 (SPM-2, also known as NEM-2) are modules that were originally planned to arrive at the ISS no earlier than 2024, and dock to the Prichal module, which is currently docked to the Nauka module. In April 2021, Roscosmos announced that NEM-1 would be repurposed to function as the core module of the proposed Russian Orbital Service Station (ROSS), launching no earlier than 2025 and docking to the free-flying Nauka module either before or after the ISS has been deorbited. NEM-2 may be converted into another core "base" module, which would be launched in 2028. Onboard systems Life support The critical systems are the atmosphere control system, the water supply system, the food supply facilities, the sanitation and hygiene equipment, and fire detection and suppression equipment. The Russian Orbital Segment's life support systems are contained in the Zvezda service module. Some of these systems are supplemented by equipment in the USOS. The Nauka laboratory has a complete set of life support systems. Atmospheric control systems The atmosphere on board the ISS is similar to that of Earth. Normal air pressure on the ISS is ; the same as at sea level on Earth. An Earth-like atmosphere offers benefits for crew comfort, and is much safer than a pure oxygen atmosphere, because of the increased risk of a fire such as that responsible for the deaths of the Apollo 1 crew. Earth-like atmospheric conditions have been maintained on all Russian and Soviet spacecraft. The Elektron system aboard Zvezda and a similar system in Destiny generate oxygen aboard the station. The crew has a backup option in the form of bottled oxygen and Solid Fuel Oxygen Generation (SFOG) canisters, a chemical oxygen generator system. Carbon dioxide is removed from the air by the Vozdukh system in Zvezda. Other by-products of human metabolism, such as methane from the intestines and ammonia from sweat, are removed by activated charcoal filters. Part of the ROS atmosphere control system is the oxygen supply. Triple-redundancy is provided by the Elektron unit, solid fuel generators, and stored oxygen. The primary supply of oxygen is the Elektron unit which produces and by electrolysis of water and vents overboard. The system uses approximately one litre of water per crew member per day. This water is either brought from Earth or recycled from other systems. Mir was the first spacecraft to use recycled water for oxygen production. The secondary oxygen supply is provided by burning oxygen-producing Vika cartridges (see also ISS ECLSS). Each 'candle' takes 5–20 minutes to decompose at , producing of . This unit is manually operated. The US Orbital Segment has redundant supplies of oxygen, from a pressurised storage tank on the Quest airlock module delivered in 2001, supplemented ten years later by ESA-built Advanced Closed-Loop System (ACLS) in the Tranquility module (Node 3), which produces by electrolysis. Hydrogen produced is combined with carbon dioxide from the cabin atmosphere and converted to water and methane. Power and thermal control Double-sided solar arrays provide electrical power to the ISS. These bifacial cells collect direct sunlight on one side and light reflected off from the Earth on the other, and are more efficient and operate at a lower temperature than single-sided cells commonly used on Earth. The Russian segment of the station, like most spacecraft, uses 28 V low voltage DC from two rotating solar arrays mounted on Zvezda. The USOS uses 130–180 V DC from the USOS PV array, power is stabilised and distributed at 160 V DC and converted to the user-required 124 V DC. The higher distribution voltage allows smaller, lighter conductors, at the expense of crew safety. The two station segments share power with converters. The USOS solar arrays are arranged as four wing pairs, for a total production of 75 to 90 kilowatts. These arrays normally track the Sun to maximise power generation. Each array is about in area and long. In the complete configuration, the solar arrays track the Sun by rotating the alpha gimbal once per orbit; the beta gimbal follows slower changes in the angle of the Sun to the orbital plane. The Night Glider mode aligns the solar arrays parallel to the ground at night to reduce the significant aerodynamic drag at the station's relatively low orbital altitude. The station originally used rechargeable nickel–hydrogen batteries () for continuous power during the 45 minutes of every 90-minute orbit that it is eclipsed by the Earth. The batteries are recharged on the day side of the orbit. They had a 6.5-year lifetime (over 37,000 charge/discharge cycles) and were regularly replaced over the anticipated 20-year life of the station. Starting in 2016, the nickel–hydrogen batteries were replaced by lithium-ion batteries, which are expected to last until the end of the ISS program. The station's large solar panels generate a high potential voltage difference between the station and the ionosphere. This could cause arcing through insulating surfaces and sputtering of conductive surfaces as ions are accelerated by the spacecraft plasma sheath. To mitigate this, plasma contactor units create current paths between the station and the ambient space plasma. The station's systems and experiments consume a large amount of electrical power, almost all of which is converted to heat. To keep the internal temperature within workable limits, a passive thermal control system (PTCS) is made of external surface materials, insulation such as MLI, and heat pipes. If the PTCS cannot keep up with the heat load, an External Active Thermal Control System (EATCS) maintains the temperature. The EATCS consists of an internal, non-toxic, water coolant loop used to cool and dehumidify the atmosphere, which transfers collected heat into an external liquid ammonia loop. From the heat exchangers, ammonia is pumped into external radiators that emit heat as infrared radiation, then back to the station. The EATCS provides cooling for all the US pressurised modules, including Kibō and Columbus, as well as the main power distribution electronics of the S0, S1 and P1 trusses. It can reject up to 70 kW. This is much more than the 14 kW of the Early External Active Thermal Control System (EEATCS) via the Early Ammonia Servicer (EAS), which was launched on STS-105 and installed onto the P6 Truss. Communications and computers Radio communications provide telemetry and scientific data links between the station and mission control centres. Radio links are also used during rendezvous and docking procedures and for audio and video communication between crew members, flight controllers and family members. As a result, the ISS is equipped with internal and external communication systems used for different purposes. The Russian Orbital Segment communicates directly with the ground via the Lira antenna mounted to Zvezda. The Lira antenna also has the capability to use the Luch data relay satellite system. This system fell into disrepair during the 1990s, and so was not used during the early years of the ISS, although two new Luch satellitesLuch-5A and Luch-5Bwere launched in 2011 and 2012 respectively to restore the operational capability of the system. Another Russian communications system is the Voskhod-M, which enables internal telephone communications between Zvezda, Zarya, Pirs, Poisk, and the USOS and provides a VHF radio link to ground control centres via antennas on Zvezda exterior. The US Orbital Segment (USOS) makes use of two separate radio links: S band (audio, telemetry, commanding – located on the P1/S1 truss) and Ku band (audio, video and data – located on the Z1 truss) systems. These transmissions are routed via the United States Tracking and Data Relay Satellite System (TDRSS) in geostationary orbit, allowing for almost continuous real-time communications with Christopher C. Kraft Jr. Mission Control Center (MCC-H) in Houston. Data channels for the Canadarm2, European Columbus laboratory and Japanese Kibō modules were originally also routed via the S band and Ku band systems, with the European Data Relay System and a similar Japanese system intended to eventually complement the TDRSS in this role. Communications between modules are carried on an internal wireless network. UHF radio is used by astronauts and cosmonauts conducting EVAs and other spacecraft that dock to or undock from the station. Automated spacecraft are fitted with their own communications equipment; the ATV uses a laser attached to the spacecraft and the Proximity Communications Equipment attached to Zvezda to accurately dock with the station. The ISS is equipped with about 100 IBM/Lenovo ThinkPad and HP ZBook 15 laptop computers. The laptops have run Windows 95, Windows 2000, Windows XP, Windows 7, Windows 10 and Linux operating systems. Each computer is a commercial off-the-shelf purchase which is then modified for safety and operation including updates to connectors, cooling and power to accommodate the station's 28V DC power system and weightless environment. Heat generated by the laptops does not rise but stagnates around the laptop, so additional forced ventilation is required. Portable Computer System (PCS) laptops connect to the Primary Command & Control computer (C&C MDM) as remote terminals via a USB to 1553 adapter. Station Support Computer (SSC) laptops aboard the ISS are connected to the station's wireless LAN via Wi-Fi and ethernet, which connects to the ground via Ku band. While originally this provided speeds of 10 Mbit/s download and 3 Mbit/s upload from the station, NASA upgraded the system in late August 2019 and increased the speeds to 600 Mbit/s. Laptop hard drives occasionally fail and must be replaced. Other computer hardware failures include instances in 2001, 2007 and 2017; some of these failures have required EVAs to replace computer modules in externally mounted devices. The operating system used for key station functions is the Debian Linux distribution. The migration from Microsoft Windows to Linux was made in May 2013 for reasons of reliability, stability and flexibility. In 2017, an SG100 Cloud Computer was launched to the ISS as part of OA-7 mission. It was manufactured by NCSIST of Taiwan and designed in collaboration with Academia Sinica, and National Central University under contract for NASA. Operations Expeditions Each permanent crew is given an expedition number. Expeditions run up to six months, from launch until undocking, an 'increment' covers the same time period, but includes cargo spacecraft and all activities. Expeditions 1 to 6 consisted of three-person crews. Expeditions 7 to 12 were reduced to the safe minimum of two following the destruction of the NASA Shuttle Columbia. From Expedition 13 the crew gradually increased to six around 2010. With the arrival of crew on US commercial vehicles beginning in 2020, NASA has indicated that expedition size may be increased to seven crew members, the number ISS was originally designed for. Gennady Padalka, member of Expeditions 9, 19/20, 31/32, and 43/44, and Commander of Expedition 11, has spent more time in space than anyone else, a total of 878 days, 11 hours, and 29 minutes. Peggy Whitson has spent the most time in space of any American, totalling 665 days, 22 hours, and 22 minutes during her time on Expeditions 5, 16, and 50/51/52. Private flights Travellers who pay for their own passage into space are termed spaceflight participants by Roscosmos and NASA, and are sometimes referred to as "space tourists", a term they generally dislike. , seven space tourists have visited the ISS; all seven were transported to the ISS on Russian Soyuz spacecraft. When professional crews change over in numbers not divisible by the three seats in a Soyuz, and a short-stay crewmember is not sent, the spare seat is sold by MirCorp through Space Adventures. Space tourism was halted in 2011 when the Space Shuttle was retired and the station's crew size was reduced to six, as the partners relied on Russian transport seats for access to the station. Soyuz flight schedules increased after 2013, allowing five Soyuz flights (15 seats) with only two expeditions (12 seats) required. The remaining seats were to be sold for around US$40 million to members of the public who could pass a medical exam. ESA and NASA criticised private spaceflight at the beginning of the ISS, and NASA initially resisted training Dennis Tito, the first person to pay for his own passage to the ISS. Anousheh Ansari became the first self-funded woman to fly to the ISS as well as the first Iranian in space. Officials reported that her education and experience made her much more than a tourist, and her performance in training had been "excellent." She did Russian and European studies involving medicine and microbiology during her 10-day stay. The 2009 documentary Space Tourists follows her journey to the station, where she fulfilled "an age-old dream of man: to leave our planet as a 'normal person' and travel into outer space." In 2008, spaceflight participant Richard Garriott placed a geocache aboard the ISS during his flight. This is currently the only non-terrestrial geocache in existence. At the same time, the Immortality Drive, an electronic record of eight digitised human DNA sequences, was placed aboard the ISS. Fleet operations A wide variety of crewed and uncrewed spacecraft have supported the station's activities. Flights to the ISS include 37 Space Shuttle missions, 75 Progress resupply spacecraft (including the modified M-MIM2 and M-SO1 module transports), 59 crewed Soyuz spacecraft, 5 European ATVs, 9 Japanese HTVs, 22 SpaceX Dragon and 16 Cygnus missions. There are currently twelve available docking ports for visiting spacecraft: Harmony forward (with PMA 2 / IDA 2) Harmony zenith (with PMA 3 / IDA 3) Harmony nadir Unity nadir Prichal nadir Prichal aft Prichal forward Prichal starboard Prichal port Nauka forward Poisk zenith Rassvet nadir Zvezda aft Crewed , 251 people from 19 countries had visited the space station, many of them multiple times. The United States sent 155 people, Russia sent 52, 11 were Japanese, eight were Canadian, five were Italian, four were French, four were German, and there were one each from Belgium, Brazil, Denmark, Great Britain, Kazakhstan, Malaysia, the Netherlands, South Africa, South Korea, Spain, Sweden and the United Arab Emirates. Uncrewed Uncrewed spaceflights to the ISS are made primarily to deliver cargo, however several Russian modules have also docked to the outpost following uncrewed launches. Resupply missions typically use the Russian Progress spacecraft, European ATVs, Japanese Kounotori vehicles, and the American Dragon and Cygnus spacecraft. The primary docking system for Progress spacecraft is the automated Kurs system, with the manual TORU system as a backup. ATVs also use Kurs, however they are not equipped with TORU. Progress and ATV can remain docked for up to six months. The other spacecraftthe Japanese HTV, the SpaceX Dragon (under CRS phase 1), and the Northrop Grumman Cygnusrendezvous with the station before being grappled using Canadarm2 and berthed at the nadir port of the Harmony or Unity module for one to two months. Under CRS phase 2, Cargo Dragon docks autonomously at IDA-2 or IDA-3. , Progress spacecraft have flown most of the uncrewed missions to the ISS. Currently docked/berthed Modules/ Spacecrafts Pending Relocation Scheduled missions All dates are UTC. Dates are the earliest possible dates and may change. Forward ports are at the front of the station according to its normal direction of travel and orientation (attitude). Aft is at the rear of the station, used by spacecraft boosting the station's orbit. Nadir is closest the Earth, Zenith is on top. Port is to the left if pointing one's feet towards the Earth and looking in the direction of travel; starboard to the right. Docking All Russian spacecraft and self-propelled modules are able to rendezvous and dock to the space station without human intervention using the Kurs radar docking system from over 200 kilometres away. The European ATV uses star sensors and GPS to determine its intercept course. When it catches up it uses laser equipment to optically recognise Zvezda, along with the Kurs system for redundancy. Crew supervise these craft, but do not intervene except to send abort commands in emergencies. Progress and ATV supply craft can remain at the ISS for six months, allowing great flexibility in crew time for loading and unloading of supplies and trash. From the initial station programs, the Russians pursued an automated docking methodology that used the crew in override or monitoring roles. Although the initial development costs were high, the system has become very reliable with standardisations that provide significant cost benefits in repetitive operations. Soyuz spacecraft used for crew rotation also serve as lifeboats for emergency evacuation; they are replaced every six months and were used after the Columbia disaster to return stranded crew from the ISS. The average expedition requires of supplies, and by 9 March 2011, crews had consumed a total of around . Soyuz crew rotation flights and Progress resupply flights visit the station on average two and three times respectively each year. Other vehicles berth instead of docking. The Japanese H-II Transfer Vehicle parked itself in progressively closer orbits to the station, and then awaited 'approach' commands from the crew, until it was close enough for a robotic arm to grapple and berth the vehicle to the USOS. Berthed craft can transfer International Standard Payload Racks. Japanese spacecraft berth for one to two months. The berthing Cygnus and SpaceX Dragon were contracted to fly cargo to the station under phase 1 of the Commercial Resupply Services program. From 26 February 2011 to 7 March 2011 four of the governmental partners (United States, ESA, Japan and Russia) had their spacecraft (NASA Shuttle, ATV, HTV, Progress and Soyuz) docked at the ISS, the only time this has happened to date. On 25 May 2012, SpaceX delivered the first commercial cargo with a Dragon spacecraft. Launch and docking windows Prior to a spacecraft's docking to the ISS, navigation and attitude control (GNC) is handed over to the ground control of the spacecraft's country of origin. GNC is set to allow the station to drift in space, rather than fire its thrusters or turn using gyroscopes. The solar panels of the station are turned edge-on to the incoming spacecraft, so residue from its thrusters does not damage the cells. Before its retirement, Shuttle launches were often given priority over Soyuz, with occasional priority given to Soyuz arrivals carrying crew and time-critical cargoes, such as biological experiment materials. Repairs Orbital Replacement Units (ORUs) are spare parts that can be readily replaced when a unit either passes its design life or fails. Examples of ORUs are pumps, storage tanks, controller boxes, antennas, and battery units. Some units can be replaced using robotic arms. Most are stored outside the station, either on small pallets called ExPRESS Logistics Carriers (ELCs) or share larger platforms called External Stowage Platforms which also hold science experiments. Both kinds of pallets provide electricity for many parts that could be damaged by the cold of space and require heating. The larger logistics carriers also have local area network (LAN) connections for telemetry to connect experiments. A heavy emphasis on stocking the USOS with ORU's occurred around 2011, before the end of the NASA shuttle programme, as its commercial replacements, Cygnus and Dragon, carry one tenth to one quarter the payload. Unexpected problems and failures have impacted the station's assembly time-line and work schedules leading to periods of reduced capabilities and, in some cases, could have forced abandonment of the station for safety reasons. Serious problems include an air leak from the USOS in 2004, the venting of fumes from an Elektron oxygen generator in 2006, and the failure of the computers in the ROS in 2007 during STS-117 that left the station without thruster, Elektron, Vozdukh and other environmental control system operations. In the latter case, the root cause was found to be condensation inside electrical connectors leading to a short circuit. During STS-120 in 2007 and following the relocation of the P6 truss and solar arrays, it was noted during unfurling that the solar array had torn and was not deploying properly. An EVA was carried out by Scott Parazynski, assisted by Douglas Wheelock. Extra precautions were taken to reduce the risk of electric shock, as the repairs were carried out with the solar array exposed to sunlight. The issues with the array were followed in the same year by problems with the starboard Solar Alpha Rotary Joint (SARJ), which rotates the arrays on the starboard side of the station. Excessive vibration and high-current spikes in the array drive motor were noted, resulting in a decision to substantially curtail motion of the starboard SARJ until the cause was understood. Inspections during EVAs on STS-120 and STS-123 showed extensive contamination from metallic shavings and debris in the large drive gear and confirmed damage to the large metallic bearing surfaces, so the joint was locked to prevent further damage. Repairs to the joints were carried out during STS-126 with lubrication and the replacement of 11 out of 12 trundle bearings on the joint. In September 2008, damage to the S1 radiator was first noticed in Soyuz imagery. The problem was initially not thought to be serious. The imagery showed that the surface of one sub-panel has peeled back from the underlying central structure, possibly because of micro-meteoroid or debris impact. On 15 May 2009 the damaged radiator panel's ammonia tubing was mechanically shut off from the rest of the cooling system by the computer-controlled closure of a valve. The same valve was then used to vent the ammonia from the damaged panel, eliminating the possibility of an ammonia leak. It is also known that a Service Module thruster cover struck the S1 radiator after being jettisoned during an EVA in 2008, but its effect, if any, has not been determined. In the early hours of 1 August 2010, a failure in cooling Loop A (starboard side), one of two external cooling loops, left the station with only half of its normal cooling capacity and zero redundancy in some systems. The problem appeared to be in the ammonia pump module that circulates the ammonia cooling fluid. Several subsystems, including two of the four CMGs, were shut down. Planned operations on the ISS were interrupted through a series of EVAs to address the cooling system issue. A first EVA on 7 August 2010, to replace the failed pump module, was not fully completed because of an ammonia leak in one of four quick-disconnects. A second EVA on 11 August successfully removed the failed pump module. A third EVA was required to restore Loop A to normal functionality. The USOS's cooling system is largely built by the US company Boeing, which is also the manufacturer of the failed pump. The four Main Bus Switching Units (MBSUs, located in the S0 truss), control the routing of power from the four solar array wings to the rest of the ISS. Each MBSU has two power channels that feed 160V DC from the arrays to two DC-to-DC power converters (DDCUs) that supply the 124V power used in the station. In late 2011 MBSU-1 ceased responding to commands or sending data confirming its health. While still routing power correctly, it was scheduled to be swapped out at the next available EVA. A spare MBSU was already on board, but a 30 August 2012 EVA failed to be completed when a bolt being tightened to finish installation of the spare unit jammed before the electrical connection was secured. The loss of MBSU-1 limited the station to 75% of its normal power capacity, requiring minor limitations in normal operations until the problem could be addressed. On 5 September 2012, in a second six-hour EVA, astronauts Sunita Williams and Akihiko Hoshide successfully replaced MBSU-1 and restored the ISS to 100% power. On 24 December 2013, astronauts installed a new ammonia pump for the station's cooling system. The faulty cooling system had failed earlier in the month, halting many of the station's science experiments. Astronauts had to brave a "mini blizzard" of ammonia while installing the new pump. It was only the second Christmas Eve spacewalk in NASA history. Mission control centres The components of the ISS are operated and monitored by their respective space agencies at mission control centres across the globe, including RKA Mission Control Center, ATV Control Centre, JEM Control Center and HTV Control Center at Tsukuba Space Center, Christopher C. Kraft Jr. Mission Control Center, Payload Operations and Integration Center, Columbus Control Center and Mobile Servicing System Control. Life aboard Crew activities A typical day for the crew begins with a wake-up at 06:00, followed by post-sleep activities and a morning inspection of the station. The crew then eats breakfast and takes part in a daily planning conference with Mission Control before starting work at around 08:10. The first scheduled exercise of the day follows, after which the crew continues work until 13:05. Following a one-hour lunch break, the afternoon consists of more exercise and work before the crew carries out its pre-sleep activities beginning at 19:30, including dinner and a crew conference. The scheduled sleep period begins at 21:30. In general, the crew works ten hours per day on a weekday, and five hours on Saturdays, with the rest of the time their own for relaxation or work catch-up. The time zone used aboard the ISS is Coordinated Universal Time (UTC). The windows are covered during night hours to give the impression of darkness because the station experiences 16 sunrises and sunsets per day. During visiting Space Shuttle missions, the ISS crew mostly followed the shuttle's Mission Elapsed Time (MET), which was a flexible time zone based on the launch time of the Space Shuttle mission. The station provides crew quarters for each member of the expedition's crew, with two "sleep stations" in the Zvezda, one in Nauka and four more installed in Harmony. The USOS quarters are private, approximately person-sized soundproof booths. The ROS crew quarters in Zvezda include a small window, but provide less ventilation and sound proofing. A crew member can sleep in a crew quarter in a tethered sleeping bag, listen to music, use a laptop, and store personal items in a large drawer or in nets attached to the module's walls. The module also provides a reading lamp, a shelf and a desktop. Visiting crews have no allocated sleep module, and attach a sleeping bag to an available space on a wall. It is possible to sleep floating freely through the station, but this is generally avoided because of the possibility of bumping into sensitive equipment. It is important that crew accommodations be well ventilated; otherwise, astronauts can wake up oxygen-deprived and gasping for air, because a bubble of their own exhaled carbon dioxide has formed around their heads. During various station activities and crew rest times, the lights in the ISS can be dimmed, switched off, and colour temperatures adjusted. Food and personal hygiene On the USOS, most of the food aboard is vacuum sealed in plastic bags; cans are rare because they are heavy and expensive to transport. Preserved food is not highly regarded by the crew and taste is reduced in microgravity, so efforts are taken to make the food more palatable, including using more spices than in regular cooking. The crew looks forward to the arrival of any spacecraft from Earth as they bring fresh fruit and vegetables. Care is taken that foods do not create crumbs, and liquid condiments are preferred over solid to avoid contaminating station equipment. Each crew member has individual food packages and cooks them using the on-board galley. The galley features two food warmers, a refrigerator (added in November 2008), and a water dispenser that provides both heated and unheated water. Drinks are provided as dehydrated powder that is mixed with water before consumption. Drinks and soups are sipped from plastic bags with straws, while solid food is eaten with a knife and fork attached to a tray with magnets to prevent them from floating away. Any food that floats away, including crumbs, must be collected to prevent it from clogging the station's air filters and other equipment. Showers on space stations were introduced in the early 1970s on Skylab and Salyut 3. By Salyut 6, in the early 1980s, the crew complained of the complexity of showering in space, which was a monthly activity. The ISS does not feature a shower; instead, crewmembers wash using a water jet and wet wipes, with soap dispensed from a toothpaste tube-like container. Crews are also provided with rinseless shampoo and edible toothpaste to save water. There are two space toilets on the ISS, both of Russian design, located in Zvezda and Tranquility. These Waste and Hygiene Compartments use a fan-driven suction system similar to the Space Shuttle Waste Collection System. Astronauts first fasten themselves to the toilet seat, which is equipped with spring-loaded restraining bars to ensure a good seal. A lever operates a powerful fan and a suction hole slides open: the air stream carries the waste away. Solid waste is collected in individual bags which are stored in an aluminium container. Full containers are transferred to Progress spacecraft for disposal. Liquid waste is evacuated by a hose connected to the front of the toilet, with anatomically correct "urine funnel adapters" attached to the tube so that men and women can use the same toilet. The diverted urine is collected and transferred to the Water Recovery System, where it is recycled into drinking water. In 2021, the arrival of the Nauka module also brought a third toilet to the ISS. Crew health and safety Overall On 12 April 2019, NASA reported medical results from the Astronaut Twin Study. Astronaut Scott Kelly spent a year in space on the ISS, while his twin spent the year on Earth. Several long-lasting changes were observed, including those related to alterations in DNA and cognition, when one twin was compared with the other. In November 2019, researchers reported that astronauts experienced serious blood flow and clot problems while on board the ISS, based on a six-month study of 11 healthy astronauts. The results may influence long-term spaceflight, including a mission to the planet Mars, according to the researchers. Radiation The ISS is partially protected from the space environment by Earth's magnetic field. From an average distance of about from the Earth's surface, depending on Solar activity, the magnetosphere begins to deflect solar wind around Earth and the space station. Solar flares are still a hazard to the crew, who may receive only a few minutes warning. In 2005, during the initial "proton storm" of an X-3 class solar flare, the crew of Expedition 10 took shelter in a more heavily shielded part of the ROS designed for this purpose. Subatomic charged particles, primarily protons from cosmic rays and solar wind, are normally absorbed by Earth's atmosphere. When they interact in sufficient quantity, their effect is visible to the naked eye in a phenomenon called an aurora. Outside Earth's atmosphere, ISS crews are exposed to approximately one millisievert each day (about a year's worth of natural exposure on Earth), resulting in a higher risk of cancer. Radiation can penetrate living tissue and damage the DNA and chromosomes of lymphocytes; being central to the immune system, any damage to these cells could contribute to the lower immunity experienced by astronauts. Radiation has also been linked to a higher incidence of cataracts in astronauts. Protective shielding and medications may lower the risks to an acceptable level. Radiation levels on the ISS are about five times greater than those experienced by airline passengers and crew, as Earth's electromagnetic field provides almost the same level of protection against solar and other types of radiation in low Earth orbit as in the stratosphere. For example, on a 12-hour flight, an airline passenger would experience 0.1 millisieverts of radiation, or a rate of 0.2 millisieverts per day; this is only one fifth the rate experienced by an astronaut in LEO. Additionally, airline passengers experience this level of radiation for a few hours of flight, while the ISS crew are exposed for their whole stay on board the station. Stress There is considerable evidence that psychosocial stressors are among the most important impediments to optimal crew morale and performance. Cosmonaut Valery Ryumin wrote in his journal during a particularly difficult period on board the Salyut 6 space station: "All the conditions necessary for murder are met if you shut two men in a cabin measuring 18 feet by 20 [5.5 m × 6 m] and leave them together for two months." NASA's interest in psychological stress caused by space travel, initially studied when their crewed missions began, was rekindled when astronauts joined cosmonauts on the Russian space station Mir. Common sources of stress in early US missions included maintaining high performance under public scrutiny and isolation from peers and family. The latter is still often a cause of stress on the ISS, such as when the mother of NASA astronaut Daniel Tani died in a car accident, and when Michael Fincke was forced to miss the birth of his second child. A study of the longest spaceflight concluded that the first three weeks are a critical period where attention is adversely affected because of the demand to adjust to the extreme change of environment. ISS crew flights typically last about five to six months. The ISS working environment includes further stress caused by living and working in cramped conditions with people from very different cultures who speak a different language. First-generation space stations had crews who spoke a single language; second- and third-generation stations have crew from many cultures who speak many languages. Astronauts must speak English and Russian, and knowing additional languages is even better. Due to the lack of gravity, confusion often occurs. Even though there is no up and down in space, some crew members feel like they are oriented upside down. They may also have difficulty measuring distances. This can cause problems like getting lost inside the space station, pulling switches in the wrong direction or misjudging the speed of an approaching vehicle during docking. Medical The physiological effects of long-term weightlessness include muscle atrophy, deterioration of the skeleton (osteopenia), fluid redistribution, a slowing of the cardiovascular system, decreased production of red blood cells, balance disorders, and a weakening of the immune system. Lesser symptoms include loss of body mass, and puffiness of the face. Sleep is regularly disturbed on the ISS because of mission demands, such as incoming or departing spacecraft. Sound levels in the station are unavoidably high. The atmosphere is unable to thermosiphon naturally, so fans are required at all times to process the air which would stagnate in the freefall (zero-G) environment. To prevent some of the adverse effects on the body, the station is equipped with: two TVIS treadmills (including the COLBERT); the ARED (Advanced Resistive Exercise Device), which enables various weightlifting exercises that add muscle without raising (or compensating for) the astronauts' reduced bone density; and a stationary bicycle. Each astronaut spends at least two hours per day exercising on the equipment. Astronauts use bungee cords to strap themselves to the treadmill. Microbiological environmental hazards Hazardous moulds that can foul air and water filters may develop aboard space stations. They can produce acids that degrade metal, glass, and rubber. They can also be harmful to the crew's health. Microbiological hazards have led to a development of the LOCAD-PTS which identifies common bacteria and moulds faster than standard methods of culturing, which may require a sample to be sent back to Earth. Researchers in 2018 reported, after detecting the presence of five Enterobacter bugandensis bacterial strains on the ISS (none of which are pathogenic to humans), that microorganisms on the ISS should be carefully monitored to continue assuring a medically healthy environment for astronauts. Contamination on space stations can be prevented by reduced humidity, and by using paint that contains mould-killing chemicals, as well as the use of antiseptic solutions. All materials used in the ISS are tested for resistance against fungi. In April 2019, NASA reported that a comprehensive study had been conducted into the microorganisms and fungi present on the ISS. The results may be useful in improving the health and safety conditions for astronauts. Noise Space flight is not inherently quiet, with noise levels exceeding acoustic standards as far back as the Apollo missions. For this reason, NASA and the International Space Station international partners have developed noise control and hearing loss prevention goals as part of the health program for crew members. Specifically, these goals have been the primary focus of the ISS Multilateral Medical Operations Panel (MMOP) Acoustics Subgroup since the first days of ISS assembly and operations. The effort includes contributions from acoustical engineers, audiologists, industrial hygienists, and physicians who comprise the subgroup's membership from NASA, Roscosmos, the European Space Agency (ESA), the Japanese Aerospace Exploration Agency (JAXA), and the Canadian Space Agency (CSA). When compared to terrestrial environments, the noise levels incurred by astronauts and cosmonauts on the ISS may seem insignificant and typically occur at levels that would not be of major concern to the Occupational Safety and Health Administration – rarely reaching 85 dBA. But crew members are exposed to these levels 24 hours a day, seven days a week, with current missions averaging six months in duration. These levels of noise also impose risks to crew health and performance in the form of sleep interference and communication, as well as reduced alarm audibility. Over the 19 plus year history of the ISS, significant efforts have been put forth to limit and reduce noise levels on the ISS. During design and pre-flight activities, members of the Acoustic Subgroup have written acoustic limits and verification requirements, consulted to design and choose quietest available payloads, and then conducted acoustic verification tests prior to launch. During spaceflights, the Acoustics Subgroup has assessed each ISS module's in flight sound levels, produced by a large number of vehicle and science experiment noise sources, to assure compliance with strict acoustic standards. The acoustic environment on ISS changed when additional modules were added during its construction, and as additional spacecraft arrive at the ISS. The Acoustics Subgroup has responded to this dynamic operations schedule by successfully designing and employing acoustic covers, absorptive materials, noise barriers, and vibration isolators to reduce noise levels. Moreover, when pumps, fans, and ventilation systems age and show increased noise levels, this Acoustics Subgroup has guided ISS managers to replace the older, noisier instruments with quiet fan and pump technologies, significantly reducing ambient noise levels. NASA has adopted most-conservative damage risk criteria (based on recommendations from the National Institute for Occupational Safety and Health and the World Health Organization), in order to protect all crew members. The MMOP Acoustics Subgroup has adjusted its approach to managing noise risks in this unique environment by applying, or modifying, terrestrial approaches for hearing loss prevention to set these conservative limits. One innovative approach has been NASA's Noise Exposure Estimation Tool (NEET), in which noise exposures are calculated in a task-based approach to determine the need for hearing protection devices (HPDs). Guidance for use of HPDs, either mandatory use or recommended, is then documented in the Noise Hazard Inventory, and posted for crew reference during their missions. The Acoustics Subgroup also tracks spacecraft noise exceedances, applies engineering controls, and recommends hearing protective devices to reduce crew noise exposures. Finally, hearing thresholds are monitored on-orbit, during missions. There have been no persistent mission-related hearing threshold shifts among US Orbital Segment crewmembers (JAXA, CSA, ESA, NASA) during what is approaching 20 years of ISS mission operations, or nearly 175,000 work hours. In 2020, the MMOP Acoustics Subgroup received the Safe-In-Sound Award for Innovation for their combined efforts to mitigate any health effects of noise. Fire and toxic gases An onboard fire or a toxic gas leak are other potential hazards. Ammonia is used in the external radiators of the station and could potentially leak into the pressurised modules. Orbit Altitude and orbital inclination The ISS is currently maintained in a nearly circular orbit with a minimum mean altitude of and a maximum of , in the centre of the thermosphere, at an inclination of 51.6 degrees to Earth's equator with an eccentricity of 0.007. This orbit was selected because it is the lowest inclination that can be directly reached by Russian Soyuz and Progress spacecraft launched from Baikonur Cosmodrome at 46° N latitude without overflying China or dropping spent rocket stages in inhabited areas. It travels at an average speed of , and completes orbits per day (93 minutes per orbit). The station's altitude was allowed to fall around the time of each NASA shuttle flight to permit heavier loads to be transferred to the station. After the retirement of the shuttle, the nominal orbit of the space station was raised in altitude (from about 350 km to about 400 km). Other, more frequent supply spacecraft do not require this adjustment as they are substantially higher performance vehicles. Atmospheric drag reduces the altitude by about 2 km a month on average. Orbital boosting can be performed by the station's two main engines on the Zvezda service module, or Russian or European spacecraft docked to Zvezda aft port. The Automated Transfer Vehicle is constructed with the possibility of adding a second docking port to its aft end, allowing other craft to dock and boost the station. It takes approximately two orbits (three hours) for the boost to a higher altitude to be completed. Maintaining ISS altitude uses about 7.5 tonnes of chemical fuel per annum at an annual cost of about $210 million. The Russian Orbital Segment contains the Data Management System, which handles Guidance, Navigation and Control (ROS GNC) for the entire station. Initially, Zarya, the first module of the station, controlled the station until a short time after the Russian service module Zvezda docked and was transferred control. Zvezda contains the ESA built DMS-R Data Management System. Using two fault-tolerant computers (FTC), Zvezda computes the station's position and orbital trajectory using redundant Earth horizon sensors, Solar horizon sensors as well as Sun and star trackers. The FTCs each contain three identical processing units working in parallel and provide advanced fault-masking by majority voting. Orientation Zvezda uses gyroscopes (reaction wheels) and thrusters to turn itself around. Gyroscopes do not require propellant; instead they use electricity to 'store' momentum in flywheels by turning in the opposite direction to the station's movement. The USOS has its own computer-controlled gyroscopes to handle its extra mass. When gyroscopes 'saturate', thrusters are used to cancel out the stored momentum. In February 2005, during Expedition 10, an incorrect command was sent to the station's computer, using about 14 kilograms of propellant before the fault was noticed and fixed. When attitude control computers in the ROS and USOS fail to communicate properly, this can result in a rare 'force fight' where the ROS GNC computer must ignore the USOS counterpart, which itself has no thrusters. Docked spacecraft can also be used to maintain station attitude, such as for troubleshooting or during the installation of the S3/S4 truss, which provides electrical power and data interfaces for the station's electronics. Orbital debris threats The low altitudes at which the ISS orbits are also home to a variety of space debris, including spent rocket stages, defunct satellites, explosion fragments (including materials from anti-satellite weapon tests), paint flakes, slag from solid rocket motors, and coolant released by US-A nuclear-powered satellites. These objects, in addition to natural micrometeoroids, are a significant threat. Objects large enough to destroy the station can be tracked, and are not as dangerous as smaller debris. Objects too small to be detected by optical and radar instruments, from approximately 1 cm down to microscopic size, number in the trillions. Despite their small size, some of these objects are a threat because of their kinetic energy and direction in relation to the station. Spacewalking crew in spacesuits are also at risk of suit damage and consequent exposure to vacuum. Ballistic panels, also called micrometeorite shielding, are incorporated into the station to protect pressurised sections and critical systems. The type and thickness of these panels depend on their predicted exposure to damage. The station's shields and structure have different designs on the ROS and the USOS. On the USOS, Whipple Shields are used. The US segment modules consist of an inner layer made from aluminium, a intermediate layers of Kevlar and Nextel (a ceramic fabric), and an outer layer of stainless steel, which causes objects to shatter into a cloud before hitting the hull, thereby spreading the energy of impact. On the ROS, a carbon fibre reinforced polymer honeycomb screen is spaced from the hull, an aluminium honeycomb screen is spaced from that, with a screen-vacuum thermal insulation covering, and glass cloth over the top. Space debris is tracked remotely from the ground, and the station crew can be notified. If necessary, thrusters on the Russian Orbital Segment can alter the station's orbital altitude, avoiding the debris. These Debris Avoidance Manoeuvres (DAMs) are not uncommon, taking place if computational models show the debris will approach within a certain threat distance. Ten DAMs had been performed by the end of 2009. Usually, an increase in orbital velocity of the order of 1 m/s is used to raise the orbit by one or two kilometres. If necessary, the altitude can also be lowered, although such a manoeuvre wastes propellant. If a threat from orbital debris is identified too late for a DAM to be safely conducted, the station crew close all the hatches aboard the station and retreat into their Soyuz spacecraft in order to be able to evacuate in the event the station was seriously damaged by the debris. This partial station evacuation has occurred on 13 March 2009, 28 June 2011, 24 March 2012 and 16 June 2015. In November 2021, a debris cloud from the destruction of Kosmos 1408 by an anti-satellite weapons test threatened the ISS, leading to the announcement of a yellow alert, leading to crew sheltering in the crew capsules. A couple of weeks later, it had to perform an unscheduled maneuver to drop the station by 310 meters to avoid a collision with hazardous space debris. Sightings from Earth Naked-eye visibility The ISS is visible to the naked eye as a slow-moving, bright white dot because of reflected sunlight, and can be seen in the hours after sunset and before sunrise, when the station remains sunlit but the ground and sky are dark. The ISS takes about 10 minutes to pass from one horizon to another, and will only be visible part of that time because of moving into or out of the Earth's shadow. Because of the size of its reflective surface area, the ISS is the brightest artificial object in the sky (excluding other satellite flares), with an approximate maximum magnitude of −4 when overhead (similar to Venus). The ISS, like many satellites including the Iridium constellation, can also produce flares of up to 16 times the brightness of Venus as sunlight glints off reflective surfaces. The ISS is also visible in broad daylight, albeit with a great deal more difficulty. Tools are provided by a number of websites such as Heavens-Above (see Live viewing below) as well as smartphone applications that use orbital data and the observer's longitude and latitude to indicate when the ISS will be visible (weather permitting), where the station will appear to rise, the altitude above the horizon it will reach and the duration of the pass before the station disappears either by setting below the horizon or entering into Earth's shadow. In November 2012 NASA launched its "Spot the Station" service, which sends people text and email alerts when the station is due to fly above their town. The station is visible from 95% of the inhabited land on Earth, but is not visible from extreme northern or southern latitudes. Under specific conditions, the ISS can be observed at night on five consecutive orbits. Those conditions are 1) a mid-latitude observer location, 2) near the time of the solstice with 3) the ISS passing in the direction of the pole from the observer near midnight local time. The three photos show the first, middle and last of the five passes on 5–6 June 2014. Astrophotography Using a telescope-mounted camera to photograph the station is a popular hobby for astronomers, while using a mounted camera to photograph the Earth and stars is a popular hobby for crew. The use of a telescope or binoculars allows viewing of the ISS during daylight hours. Some amateur astronomers also use telescopic lenses to photograph the ISS while it transits the Sun, sometimes doing so during an eclipse (and so the Sun, Moon, and ISS are all positioned approximately in a single line). One example is during the 21 August solar eclipse, where at one location in Wyoming, images of the ISS were captured during the eclipse. Similar images were captured by NASA from a location in Washington. Parisian engineer and astrophotographer Thierry Legault, known for his photos of spaceships transiting the Sun, travelled to Oman in 2011 to photograph the Sun, Moon and space station all lined up. Legault, who received the Marius Jacquemetton award from the Société astronomique de France in 1999, and other hobbyists, use websites that predict when the ISS will transit the Sun or Moon and from what location those passes will be visible. International co-operation Involving five space programs and fifteen countries, the International Space Station is the most politically and legally complex space exploration programme in history. The 1998 Space Station Intergovernmental Agreement sets forth the primary framework for international cooperation among the parties. A series of subsequent agreements govern other aspects of the station, ranging from jurisdictional issues to a code of conduct among visiting astronauts. On 24 February 2022, following to the Russian invasion of Ukraine, continued cooperation between Russia and other countries on the Internation Space Station has been put into question. United Kingdom Prime Minister Boris Johnson commented on the current status of cooperation, saying "I have been broadly in favor of continuing artistic and scientific collaboration, but in the current circumstances it's hard to see how even those can continue as normal." On the same day, Roscosmos Director General Dmitry Rogozin insinuated that Russia could cause the International Space Station to de-orbit, writing in a series of tweets, "If you block co-operation with us, who will save the ISS from an uncontrolled deorbit and fall into the United States or Europe? There is also the option of dropping a 500-ton structure to India and China. Do you want to threaten them with such a prospect?" Participating countries (1997–2007) European Space Agency End of mission According to the Outer Space Treaty, the United States and Russia are legally responsible for all modules they have launched. Several possible disposal options were considered: Natural orbital decay with random reentry (as with Skylab), boosting the station to a higher altitude (which would delay reentry), and a controlled targeted de-orbit to a remote ocean area. In late 2010, the preferred plan was to use a slightly modified Progress spacecraft to de-orbit the ISS. This plan was seen as the simplest, cheapest and with the . OPSEK was previously intended to be constructed of modules from the Russian Orbital Segment after the ISS is decommissioned. The modules under consideration for removal from the current ISS included the Multipurpose Laboratory Module (Nauka), launched in July 2021, and the other new Russian modules that are proposed to be attached to Nauka. These newly launched modules would still be well within their useful lives in 2024. At the end of 2011, the Exploration Gateway Platform concept also proposed using leftover USOS hardware and Zvezda 2 as a refuelling depot and service station located at one of the Earth-Moon Lagrange points. However, the entire USOS was not designed for disassembly and will be discarded. In February 2015, Roscosmos announced that it would remain a part of the ISS programme until 2024. Nine months earlierin response to US sanctions against Russia over the annexation of CrimeaRussian Deputy Prime Minister Dmitry Rogozin had stated that Russia would reject a US request to prolong the orbiting station's use beyond 2020, and would only supply rocket engines to the US for non-military satellite launches. On 28 March 2015, Russian sources announced that Roscosmos and NASA had agreed to collaborate on the development of a replacement for the current ISS. Igor Komarov, the head of Russia's Roscosmos, made the announcement with NASA administrator Charles Bolden at his side. In a statement provided to SpaceNews on 28 March, NASA spokesman David Weaver said the agency appreciated the Russian commitment to extending the ISS, but did not confirm any plans for a future space station. On 30 September 2015, Boeing's contract with NASA as prime contractor for the ISS was extended to 30 September 2020. Part of Boeing's services under the contract will relate to extending the station's primary structural hardware past 2020 to the end of 2028. There have also been suggestions that the station could be converted to commercial operations after it is retired by government entities. In July 2018, the Space Frontier Act of 2018 was intended to extend operations of the ISS to 2030. This bill was unanimously approved in the Senate, but failed to pass in the U.S. House. In September 2018, the Leading Human Spaceflight Act was introduced with the intent to extend operations of the ISS to 2030, and was confirmed in December 2018. In January 2022, NASA announced a planned date of January 2031 to de-orbit the ISS and direct any remnants into a remote area of the South Pacific Ocean. Cost The ISS has been described as the most expensive single item ever constructed. As of 2010, the total cost was US$150 billion. This includes NASA's budget of $58.7 billion ($89.73 billion in 2021 dollars) for the station from 1985 to 2015, Russia's $12 billion, Europe's $5 billion, Japan's $5 billion, Canada's $2 billion, and the cost of 36 shuttle flights to build the station, estimated at $1.4 billion each, or $50.4 billion in total. Assuming 20,000 person-days of use from 2000 to 2015 by two- to six-person crews, each person-day would cost $7.5 million, less than half the inflation-adjusted $19.6 million ($5.5 million before inflation) per person-day of Skylab. See also A Beautiful Planet – 2016 IMAX documentary film showing scenes of Earth, as well as astronaut life aboard the ISS Center for the Advancement of Science in Space – operates the US National Laboratory on the ISS List of commanders of the International Space Station List of space stations List of spacecraft deployed from the International Space Station Science diplomacy Space Station 3D – 2002 Canadian documentary Notes References Further reading O'Sullivan, John. European Missions to the International Space Station: 2013 to 2019 (Springer Nature, 2020). Ruttley, Tara M., Julie A. Robinson, and William H. Gerstenmaier. "The International Space Station: Collaboration, Utilization, and Commercialization." Social Science Quarterly 98.4 (2017): 1160–1174. online External links ISS Location Agency ISS websites  Canadian Space Agency  European Space Agency  Centre national d'études spatiales (National Centre for Space Studies)  German Aerospace Center  Italian Space Agency  Japan Aerospace Exploration Agency  S.P. Korolev Rocket and Space Corporation Energia  Russian Federal Space Agency  National Aeronautics and Space Administration Research NASA: Daily ISS Reports NASA: Station Science ESA: Columbus RSC Energia: Science Research on ISS Russian Segment Live viewing Live ISS webcam by NASA at uStream.tv Live HD ISS webcams by NASA HDEV at uStream.tv Sighting opportunities at NASA.gov Real-time position at Heavens-above.com Real-time tracking and position at uphere.space Multimedia Johnson Space Center image gallery at Flickr.com ISS tour with Sunita Williams by NASA at YouTube.com Journey to the ISS by ESA at YouTube.com The Future of Hope, Kibō module documentary by JAXA at YouTube.com Seán Doran's compiled videos of orbital photography from the ISS: Orbit – Remastered, Orbit: Uncut; The Four Seasons, Nocturne – Earth at Night, Earthbound, The Pearl (see Flickr album for more) Satellites in low Earth orbit Populated places established in 1998 Spacecraft launched in 1998 Articles containing video clips International science experiments Science diplomacy Canada–United States relations Japan–United States relations Russia–United States relations
[ -0.2593538463115692, 0.21839465200901031, 0.2969714105129242, 0.40084096789360046, 0.29752129316329956, 0.23345115780830383, -0.32219597697257996, 0.3976840674877167, -0.4192262291908264, -0.43008771538734436, -0.6820051074028015, 0.1099802702665329, -0.6181815266609192, 0.0438078455626964...
15044
https://en.wikipedia.org/wiki/Irish
Irish
Irish most commonly refers to: Someone or something of, from, or related to: Ireland, an island situated off the north-western coast of continental Europe Éire, Irish language name for the isle Northern Ireland, a constituent unit of the United Kingdom of Great Britain and Northern Ireland Republic of Ireland, a sovereign state Irish language, a Celtic Goidelic language of the Indo-European language family spoken in Ireland Irish people, people of Irish ethnicity, people born in Ireland and people who hold Irish citizenship Irish may also refer to: Places Irish Creek (Kansas), a stream in Kansas Irish Creek (South Dakota), a stream in South Dakota Irish Lake, Watonwan County, Minnesota Irish Sea, the body of water which separates the islands of Ireland and Great Britain Other uses Irish (name), a given name or family name Irish (game), historical tables game that was the predecessor of Backgammon Irish lace Irish nationality law, law determining who can become an Irish citizen Irish whiskey, a beverage originating in Ireland Lace curtain and shanty Irish, terms that were commonly used in the 19th and 20th centuries to categorize Irish people by social class Irish reunification Irish (Junior Cert), a subject of the Junior Cycle examination in secondary schools in the Republic of Ireland See also List of Ireland-related topics The Luck of the Irish (disambiguation) Language and nationality disambiguation pages
[ 0.20222069323062897, 0.2655739486217499, -0.48926010727882385, -0.2875286340713501, 0.3370129466056824, 0.4235469698905945, 0.820795476436615, 1.156873106956482, -0.49006104469299316, -0.5006155371665955, -0.5312106013298035, 0.3342677652835846, -0.007069968618452549, 0.04571903496980667, ...
15045
https://en.wikipedia.org/wiki/Cosmicomics
Cosmicomics
Cosmicomics () is a collection of twelve short stories by Italo Calvino first published in Italian in 1965 and in English in 1968. The stories were originally published between 1964 and 1965 in the Italian periodicals Il Caffè and Il Giorno. Each story takes a scientific "fact" (though sometimes a falsehood by today's understanding), and builds an imaginative story around it. An always-extant being called Qfwfq narrates all of the stories save two. Every story is a memory of an event in the history of the universe. Qfwfq also narrates some stories in Calvino's t zero. All of the stories in Cosmicomics, together with those from t zero and other sources, are now available in a single volume collection, The Complete Cosmicomics (Penguin UK, 2009). The first U.S. edition, translated by William Weaver, won the National Book Award in the Translation category. Contents The Distance of the Moon, the first and probably the best known story. Calvino takes the fact that the Moon used to be much closer to the Earth, and builds a story about a love triangle among people who used to jump between the Earth and the Moon, in which lovers drift apart as the Moon recedes. At Daybreak – Life before matter condenses. A Sign in Space – The idea that the galaxy slowly revolves becomes a story about a being who is desperate to leave behind some unique sign of his existence. This story also is a direct illustration of one of the tenets of postmodern theory – that the sign is not the thing it signifies, nor can one claim to fully or properly describe a thing or an idea with a word or other symbol. All at One Point – The fact that all matter and creation used to exist in a single point. "Naturally, we were all there—old Qfwfq said—where else could we have been? Nobody knew then that there could be space. Or time either: what use did we have for time, packed in there like sardines?" Without Colors – Before there was an atmosphere, everything was the same shade of gray. As the atmosphere appears, so do colors. The novelty scares off Ayl, Qfwfq's love interest. Games Without End – A galactic game of marbles back before the universe had formed much more than particles. The Aquatic Uncle – A tale on the fact that at one stage in evolution animals left the sea and came to live on land. The story is about a family living on land that is a bit ashamed of their old uncle who still lives in the sea, refusing to come ashore like "civilized" people. How Much Shall We Bet – A story about betting on the long term evolution of mankind. The Dinosaurs – How some dinosaurs lived after most of them had become extinct, and how it felt to be that last existing dinosaur in an age where all the current mammals feared his kind as demons. The Form of Space – As the unnamed narrator "falls" through space, he cannot help but notice that his trajectory is parallel to that of a beautiful woman, Ursula H'x, and that of lieutenant Fenimore, who is also in love with Ursula. The narrator dreams of the shape of space changing, so that he may touch Ursula (or fight with Fenimore). The Light Years – The unnamed narrator looking at other galaxies, and spotting one with a sign pointed right at him saying "I saw you." Given that there's a gulf of 100,000,000 light years, he checks his diary to find out what he had been doing that day, and finds out that it was something he wished to hide. Then he starts to worry. The Spiral – A story about life as a mollusc, and the nature of love and writing. All of the stories feature non-human characters which have been heavily anthropomorphized. See also Head over Heels Patema Inverted Upside Down Notes References External links Italo Calvino’s Science Fiction Masterpiece, essay on Cosmicomics at The Millions, 25 July 2014 1965 short story collections Postmodern books Science fiction short story collections Short story collections by Italo Calvino
[ -0.15631233155727386, 0.1226203665137291, -0.2661493718624115, 0.16693510115146637, 0.21674929559230804, 0.3098486065864563, -0.3983849883079529, 0.0032820370979607105, 0.036751776933670044, -0.452300101518631, -0.5957646369934082, 0.2683655619621277, -0.39018717408180237, -0.0911346450448...
15046
https://en.wikipedia.org/wiki/IA-32
IA-32
IA-32 (short for "Intel Architecture, 32-bit", sometimes also called i386) is the 32-bit version of the x86 instruction set architecture, designed by Intel and first implemented in the 80386 microprocessor in 1985. IA-32 is the first incarnation of x86 that supports 32-bit computing; as a result, the "IA-32" term may be used as a metonym to refer to all x86 versions that support 32-bit computing. Within various programming language directives, IA-32 is still sometimes referred to as the "i386" architecture. In some other contexts, certain iterations of the IA-32 ISA are sometimes labelled i486, i586 and i686, referring to the instruction supersets offered by the 80486, the P5 and the P6 microarchitectures respectively. These updates offered numerous additions alongside the base IA-32 set, i.e. floating-point capabilities and the MMX extensions. Intel was historically the largest manufacturer of IA-32 processors, with the second biggest supplier having been AMD. During the 1990s, VIA, Transmeta and other chip manufacturers also produced IA-32 compatible processors (e.g. WinChip). In the modern era, Intel still produces IA-32 processors under the Intel Quark microcontroller platform; however, since the 2000s, the majority of manufacturers (Intel included) moved almost exclusively to implementing CPUs based on the 64-bit variant of x86, x86-64. x86-64, by specification, offers legacy operating modes that operate on the IA-32 ISA for backwards compatibility. Even given the contemporary prevalence of x86-64, as of 2018, IA-32 protected mode versions of many modern operating systems are still maintained, e.g. Microsoft Windows (until Windows 10; Windows 11 requires x86-64-compatible processor for x86 versions) and the Debian Linux distribution. In spite of IA-32's name (and causing some potential confusion), the 64-bit evolution of x86 that originated out of AMD would not be known as "IA-64", that name instead belonging to Intel's Itanium architecture. Architectural features The primary defining characteristic of IA-32 is the availability of 32-bit general-purpose processor registers (for example, EAX and EBX), 32-bit integer arithmetic and logical operations, 32-bit offsets within a segment in protected mode, and the translation of segmented addresses to 32-bit linear addresses. The designers took the opportunity to make other improvements as well. Some of the most significant changes (relative to the 16-bit 286 instruction set) are described below. 32-bit integer capability All general-purpose registers (GPRs) are expanded from 16 bits to 32 bits, and all arithmetic and logical operations, memory-to-register and register-to-memory operations, etc., can operate directly on 32-bit integers. Pushes and pops on the stack default to 4-byte strides, and non-segmented pointers are 4 bytes wide. More general addressing modes Any GPR can be used as a base register, and any GPR other than ESP can be used as an index register, in a memory reference. The index register value can be multiplied by 1, 2, 4, or 8 before being added to the base register value and displacement. Additional segment registers Two additional segment registers, FS and GS, are provided. Larger virtual address space The IA-32 architecture defines a 48-bit segmented address format, with a 16-bit segment number and a 32-bit offset within the segment. Segmented addresses are mapped to 32-bit linear addresses. Demand paging 32-bit linear addresses are virtual addresses rather than physical addresses; they are translated to physical addresses through a page table. In the 80386, 80486, and the original Pentium processors, the physical address was 32 bits; in the Pentium Pro and later processors, the Physical Address Extension allowed 36-bit physical addresses, although the linear address size was still 32 bits. Operating modes See also x86-64 IA-64 List of former IA-32 compatible processor manufacturers References Computer-related introductions in 1985 X86 architecture 32-bit computers
[ -0.2752659022808075, 0.4017469584941864, -0.13872210681438446, 0.0019886165391653776, -0.14063595235347748, 0.1527138352394104, 0.04251737892627716, 0.03420914709568024, 0.013863093219697475, 0.09945331513881683, -0.006132242735475302, 0.6962198615074158, -0.7474703788757324, -0.2247984111...
15047
https://en.wikipedia.org/wiki/Internalism%20and%20externalism
Internalism and externalism
Internalism and externalism are two opposing ways of explaining various subjects in several areas of philosophy. These include human motivation, knowledge, justification, meaning, and truth. The distinction arises in many areas of debate with similar but distinct meanings. Internalism is the thesis that no fact about the world can provide reasons for action independently of desires and beliefs. Externalism is the thesis that reasons are to be identified with objective features of the world. Moral philosophy Motivation In contemporary moral philosophy, motivational internalism (or moral internalism) is the view that moral convictions (which are not necessarily beliefs, e.g. feelings of moral approval or disapproval) are intrinsically motivating. That is, the motivational internalist believes that there is an internal, necessary connection between one's conviction that X ought to be done and one's motivation to do X. Conversely, the motivational externalist (or moral externalist) claims that there is no necessary internal connection between moral convictions and moral motives. That is, there is no necessary connection between the conviction that X is wrong and the motivational drive not to do X. (The use of these terms has roots in W.D. Falk's (1947) paper "'Ought' and Motivation"). These views in moral psychology have various implications. In particular, if motivational internalism is true, then an amoralist is unintelligible (and metaphysically impossible). An amoralist is not simply someone who is immoral, rather it is someone who knows what the moral things to do are, yet is not motivated to do them. Such an agent is unintelligible to the motivational internalist, because moral judgments about the right thing to do have built into them corresponding motivations to do those things that are judged by the agent to be the moral things to do. On the other hand, an amoralist is entirely intelligible to the motivational externalist, because the motivational externalist thinks that moral judgments about the right thing to do not necessitate some motivation to do those things that are judged to be the right thing to do; rather, an independent desire—such as the desire to do the right thing—is required (Brink, 2003), (Rosati, 2006). Reasons There is also a distinction in ethics and action theory, largely made popular by Bernard Williams (1979, reprinted in 1981), concerning internal and external reasons for an action. An internal reason is, roughly, something that one has in light of one's own "subjective motivational set"—one's own commitments, desires (or wants), goals, etc. On the other hand, an external reason is something that one has independent of one's subjective motivational set. For example, suppose that Sally is going to drink a glass of poison, because she wants to commit suicide and believes that she can do so by drinking the poison. Sally has an internal reason to drink the poison, because she wants to commit suicide. However, one might say that she has an external reason not to drink the poison because, even though she wants to die, one ought not kill oneself no matter what—regardless of whether one wants to die. Some philosophers embrace the existence of both kinds of reason, while others deny the existence of one or the other. For example, Bernard Williams (1981) argues that there are really only internal reasons for action. Such a view is called internalism about reasons (or reasons internalism). Externalism about reasons (or reasons externalism) is the denial of reasons internalism. It is the view that there are external reasons for action; that is, there are reasons for action that one can have even if the action is not part of one's subjective motivational set. Consider the following situation. Suppose that it's against the moral law to steal from the poor, and Sasha knows this. However, Sasha doesn't desire to follow the moral law, and there is currently a poor person next to him. Is it intelligible to say that Sasha has a reason to follow the moral law right now (to not steal from the poor person next to him), even though he doesn't care to do so? The reasons externalist answers in the affirmative ("Yes, Sasha has a reason not to steal from that poor person."), since he believes that one can have reasons for action even if one does not have the relevant desire. Conversely, the reasons internalist answers the question in the negative ("No, Sasha does not have a reason not to steal from that poor person, though others might."). The reasons internalist claims that external reasons are unintelligible; one has a reason for action only if one has the relevant desire (that is, only internal reasons can be reasons for action). The reasons internalist claims the following: the moral facts are a reason for Sasha's action not to steal from the poor person next to him only if he currently wants to follow the moral law (or if not stealing from the poor person is a way to satisfy his other current goals—that is, part of what Williams calls his "subjective motivational set"). In short, the reasoning behind reasons internalism, according to Williams, is that reasons for action must be able to explain one's action; and only internal reasons can do this. Epistemology Justification Internalism Two main varieties of epistemic internalism about justification are access internalism and ontological internalism. Access internalists require that a believer must have internal access to the justifier(s) of her belief p in order to be justified in believing p. For the access internalist, justification amounts to something like the believer being aware (or capable of being aware) of certain facts that make her belief in p rational, or her being able to give reasons for her belief in p. At minimum, access internalism requires that the believer have some kind of reflective access or awareness to whatever justifies her belief. Ontological internalism is the view that justification for a belief is established by one's mental states. Ontological internalism can be distinct from access internalism, but the two are often thought to go together since we are generally considered to be capable of having reflective access to mental states. One popular argument for internalism is known as the 'new evil demon problem'. The new evil demon problem indirectly supports internalism by challenging externalist views of justification, particularly reliabilism. The argument asks us to imagine a subject with beliefs and experiences identical to ours, but the subject is being systematically deceived by a malicious Cartesian demon so that all their beliefs turn out false. In spite of the subject's unfortunate deception, the argument goes, we do not think this subject ceases to be rational in taking things to be as they appear as we do. After all, it is possible that we could be radically deceived in the same way, yet we are still justified in holding most of our beliefs in spite of this possibility. Since reliabilism maintains that one's beliefs are justified via reliable belief-forming processes (where reliable means yielding true beliefs), the subject in the evil demon scenario would not likely have any justified beliefs according to reliabilism because all of their beliefs would be false. Since this result is supposed to clash with our intuitions that the subject is justified in their beliefs in spite of being systematically deceived, some take the new evil demon problem as a reason for rejecting externalist views of justification. Externalism Externalist views of justification emerged in epistemology during the late 20th century. Externalist conceptions of justification assert that facts external to the believer can serve as the justification for a belief. According to the externalist, a believer need not have any internal access or cognitive grasp of any reasons or facts which make their belief justified. The externalist's assessment of justification can be contrasted with access internalism, which demands that the believer have internal reflective access to reasons or facts which corroborate their belief in order to be justified in holding it. Externalism, on the other hand, maintains that the justification for someone's belief can come from facts that are entirely external to the agent's subjective awareness. Alvin Goldman, one of the most well-known proponents of externalism in epistemology, is known for developing a popular form of externalism called reliabilism. In his paper, “What is Justified Belief?” Goldman characterizes the reliabilist conception of justification as such: "If S’s believing p at t results from a reliable cognitive belief-forming process (or set of processes), then S’s belief in p at t is justified.” Goldman notes that a reliable belief-forming process is one which generally produces true beliefs. A unique consequence of reliabilism (and other forms of externalism) is that one can have a justified belief without knowing one is justified (this is not possible under most forms of epistemic internalism). In addition, we do not yet know which cognitive processes are in fact reliable, so anyone who embraces reliabilism must concede that we do not always know whether some of our beliefs are justified (even though there is a fact of the matter). As a response to skepticism In responding to skepticism, Hilary Putnam (1982) claims that semantic externalism yields "an argument we can give that shows we are not brains in a vat (BIV). (See also DeRose, 1999.) If semantic externalism is true, then the meaning of a word or sentence is not wholly determined by what individuals think those words mean. For example, semantic externalists maintain that the word "water" referred to the substance whose chemical composition is H2O even before scientists had discovered that chemical composition. The fact that the substance out in the world we were calling "water" actually had that composition at least partially determined the meaning of the word. One way to use this in a response to skepticism is to apply the same strategy to the terms used in a skeptical argument in the following way (DeRose, 1999): To clarify how this argument is supposed to work: Imagine that there is brain in a vat, and a whole world is being simulated for it. Call the individual who is being deceived "Steve." When Steve is given an experience of walking through a park, semantic externalism allows for his thought, "I am walking through a park" to be true so long as the simulated reality is one in which he is walking through a park. Similarly, what it takes for his thought, "I am a brain in a vat," to be true is for the simulated reality to be one where he is a brain in a vat. But in the simulated reality, he is not a brain in a vat. Apart from disputes over the success of the argument or the plausibility of the specific type of semantic externalism required for it to work, there is question as to what is gained by defeating the skeptical worry with this strategy. Skeptics can give new skeptical cases that wouldn't be subject to the same response (e.g., one where the person was very recently turned into a brain in a vat, so that their words "brain" and "vat" still pick out real brains and vats, rather than simulated ones). Further, if even brains in vats can correctly believe "I am not a brain in a vat," then the skeptic can still press us on how we know we are not in that situation (though the externalist will point out that it may be difficult for the skeptic to describe that situation). Another attempt to use externalism to refute skepticism is done by Brueckner and Warfield. It involves the claim that our thoughts are about things, unlike a BIV's thoughts, which cannot be about things (DeRose, 1999). Semantics Semantic externalism comes in two varieties, depending on whether meaning is construed cognitively or linguistically. On a cognitive construal, externalism is the thesis that what concepts (or contents) are available to a thinker is determined by their environment, or their relation to their environment. On a linguistic construal, externalism is the thesis that the meaning of a word is environmentally determined. Likewise, one can construe semantic internalism in two ways, as a denial of either of these two theses. Externalism and internalism in semantics is closely tied to the distinction in philosophy of mind concerning mental content, since the contents of one's thoughts (specifically, intentional mental states) are usually taken to be semantic objects that are truth-evaluable. See also: Linguistic turn and cognitive turn for more about the two construals of meaning Swamp man thought experiment Twin Earth thought experiment Philosophy of mind Within the context of the philosophy of mind, externalism is the theory that the contents of at least some of one's mental states are dependent in part on their relationship to the external world or one's environment. The traditional discussion on externalism was centered around the semantic aspect of mental content. This is by no means the only meaning of externalism now. Externalism is now a broad collection of philosophical views considering all aspects of mental content and activity. There are various forms of externalism that consider either the content or the vehicles of the mind or both. Furthermore, externalism could be limited to cognition, or it could address broader issues of consciousness. As to the traditional discussion on semantic externalism (often dubbed content externalism), some mental states, such as believing that water is wet, and fearing that the Queen has been insulted, have contents we can capture using 'that' clauses. The content externalist often appeal to observations found as early as Hilary Putnam's seminal essay, "The Meaning of 'Meaning'," (1975). Putnam stated that we can easily imagine pairs of individuals that are microphysical duplicates embedded in different surroundings who use the same words but mean different things when using them. For example, suppose that Ike and Tina's mothers are identical twins and that Ike and Tina are raised in isolation from one another in indistinguishable environments. When Ike says, "I want my mommy," he expresses a want satisfied only if he is brought to his mommy. If we brought Tina's mommy, Ike might not notice the difference, but he doesn't get what he wants. It seems that what he wants and what he says when he says, "I want my mommy," will be different from what Tina wants and what she says she wants when she says, "I want my mommy." Externalists say that if we assume competent speakers know what they think, and say what they think, the difference in what these two speakers mean corresponds to a difference in the thoughts of the two speakers that is not (necessarily) reflected by a difference in the internal make up of the speakers or thinkers. They urge us to move from externalism about meaning of the sort Putnam defended to externalism about contentful states of mind. The example pertains to singular terms, but has been extended to cover kind terms as well such as natural kinds (e.g., 'water') and for kinds of artifacts (e.g., 'espresso maker'). There is no general agreement amongst content externalists as to the scope of the thesis. Philosophers now tend to distinguish between wide content (externalist mental content) and narrow content (anti-externalist mental content). Some, then, align themselves as endorsing one view of content exclusively, or both. For example, Jerry Fodor (1980) argues for narrow content (although he comes to reject that view in his 1995), while David Chalmers (2002) argues for a two dimensional semantics according to which the contents of mental states can have both wide and narrow content. Critics of the view have questioned the original thought experiments saying that the lessons that Putnam and later writers such as Tyler Burge (1979, 1982) have urged us to draw can be resisted. Frank Jackson and John Searle, for example, have defended internalist accounts of thought content according to which the contents of our thoughts are fixed by descriptions that pick out the individuals and kinds that our thoughts intuitively pertain to the sorts of things that we take them to. In the Ike/Tina example, one might agree that Ike's thoughts pertain to Ike's mother and that Tina's thoughts pertain to Tina's but insist that this is because Ike thinks of that woman as his mother and we can capture this by saying that he thinks of her as 'the mother of the speaker'. This descriptive phrase will pick out one unique woman. Externalists claim this is implausible, as we would have to ascribe to Ike knowledge he wouldn't need to successfully think about or refer to his mother. Critics have also claimed that content externalists are committed to epistemological absurdities. Suppose that a speaker can have the concept of water we do only if the speaker lives in a world that contains H2O. It seems this speaker could know a priori that they think that water is wet. This is the thesis of privileged access. It also seems that they could know on the basis of simple thought experiments that they can only think that water is wet if they live in a world that contains water. What would prevent her from putting these together and coming to know a priori that the world contains water? If we should say that no one could possibly know whether water exists a priori, it seems either we cannot know content externalism to be true on the basis of thought experiments or we cannot know what we are thinking without first looking into the world to see what it is like. As mentioned, content externalism (limited to the semantic aspects) is only one among many other options offered by externalism by and large. See also: Twin Earth thought experiment Extended cognition Historiography of science Internalism in the historiography of science claims that science is completely distinct from social influences and pure natural science can exist in any society and at any time given the intellectual capacity. Imre Lakatos is a notable proponent of historiographical internalism. Externalism in the historiography of science is the view that the history of science is due to its social context – the socio-political climate and the surrounding economy determines scientific progress. Thomas Kuhn is a notable proponent of historiographical externalism. See also Anti-psychologism Dream argument Emic and etic Foundationalism Relativism Self-awareness Simulated reality References Further reading Brink, David (1989) "Moral Realism and the Foundations of Ethics", New York: Cambridge University Press, Ch. 3, pp. 37–80. Brown, Curtis (2007) "Narrow Mental Content", The Stanford Encyclopedia of Philosophy (Spring 2007 Edition), Edward N. Zalta (ed.). (link) Burge, Tyler (1979) "Individualism and the Mental", in French, Uehling, and Wettstein (eds.) Midwest Studies in Philosophy IV, Minneapolis: University of Minnesota Press, pp. 73–121. Burge, Tyler (1982) "Other Bodies", in Woodfield, Andrew, ed., Thought and Object. New York: Oxford. Chalmers, David (2002) "The Components of Content", in Chalmers (ed.) Philosophy of Mind: Classical and Contemporary Readings, Oxford: Oxford University Press. Preprint available online Cohen, Stewart (1984) "Justification and Truth", Philosophical Studies 46, pp. 279–296. DeRose, Keith (1999) "Responding to Skepticism", Skepticism: A Contemporary Reader. Falk, W. D. (1947) "'Ought' and Motivation", Proceedings of the Aristotelian Society, 48: 492–510 Finlay, Stephen & Schroeder, Mark (2008). "Reasons for Action: Internal vs. External". The Stanford Encyclopedia of Philosophy, Edward N. Zalta (ed.). (link) Fodor, Jerry (1980) "Methodological Solipsism Considered as a Research Strategy in Cognitive Psychology", Behavioral and Brain Sciences 3:1. Fodor, Jerry (1995) The Elm and the Expert: Mentalese and its Semantics, Cambridge: MIT Press. Kornblith, Hilary (ed.) (2001) Epistemology: Internalism and Externalism, Blackwell Press. Lau, Joe (2004) "Externalism About Mental Content", The Stanford Encyclopedia of Philosophy (Fall 2004 Edition), Edward N. Zalta (ed.). (link) Le Morvan, Pierre (2005) "A Metaphilosophical Dilemma for Epistemic Externalism", Metaphilosophy 36(5), pp. 688–707. Pappas, George (2005) "Internalist vs. Externalist Conceptions of Epistemic Justification", The Stanford Encyclopedia of Philosophy (Spring 2005 Edition), Edward N. Zalta (ed.). (link) Putnam, Hilary (1975) "The Meaning of 'Meaning'", in Keith Gunderson (ed.) Language, Mind and Knowledge, Minneapolis: University of Minnesota Press, pp. 131–93 (reprinted in Putnam (1975), Mind, Language and Reality: Philosophical Papers Volume 2, Cambridge: Cambridge University Press). (link) Putnam, Hilary (1982) "Brains in a Vat", in Reason, Truth, and History, Cambridge University Press. (link) Rosati, Connie S. (2006). "Moral Motivation", The Stanford Encyclopedia of Philosophy Edward N. Zalta (ed.). (link) Smith, Basil (2013). "Internalism and Externalism in the Philosophy of Mind and Language," 'The Internet Encyclopedia of Philosophy,' P. Saka (ed.). (link) Sosa, Ernest (1991) "Reliabilism and Intellectual Virtue," in E. Sosa, Knowledge In Perspective, Cambridge Press, pp. 131–145. Williams, Bernard (1981) "Internal and External Reasons", in Williams's Moral Luck, Cambridge: Cambridge University Press, pp. 101–13. External links Internalism and Externalism – (draft) by Alberto Voltolini. Internalist Explorations of Meaning reading group at Harvard University, autumn 2007. Epistemological theories Justification (epistemology) Meta-ethics Ethical theories Semantics Theory of mind
[ 0.18428674340248108, 0.22915518283843994, -0.841671347618103, -0.09437686204910278, -0.37863656878471375, 0.5441502332687378, 0.5298613905906677, -0.17420083284378052, 0.1773882955312729, -0.5432498455047607, -0.2622016370296478, 0.8061830997467041, -0.19810351729393005, 0.2054200172424316...
15048
https://en.wikipedia.org/wiki/Isolationism
Isolationism
Isolationism is a political philosophy advocating a national foreign policy that opposes involvement in the political affairs, and especially the wars, of other countries. Thus, isolationism fundamentally advocates neutrality and opposes entanglement in military alliances and mutual defense pacts. In its purest form, isolationism opposes all commitments to foreign countries including treaties and trade agreements. This distinguishes isolationism from non-interventionism, which also advocates military neutrality but does not necessarily oppose international commitments and treaties in general. Introduction Isolationism has been defined as: By country Albania Bhutan Before 1999, Bhutan had banned television and the Internet in order to preserve its culture, environment, and identity. Eventually, Jigme Singye Wangchuck lifted the ban on television and the Internet. His son, Jigme Khesar Namgyel Wangchuck, was elected Druk Gyalpo of Bhutan, which helped forge the Bhutanese democracy. Bhutan has subsequently undergone a transition from an absolute monarchy to a constitutional monarchy multi-party democracy. The development of Bhutanese democracy has been marked by the active encouragement and participation of the reigning Bhutanese monarchs since the 1950s, beginning with legal reforms, and culminating in the enactment of Bhutan's Constitution. Cambodia From 1431 to 1863, the Kingdom of Cambodia enforced a isolationist policy. The policy prohibited foreign contact with most outside countries. China After Zheng He's voyages in the 15th century, the foreign policy of the Ming dynasty in China became increasingly isolationist. The Hongwu Emperor was not the first to propose the policy to ban all maritime shipping in 1390. The Qing dynasty that came after the Ming dynasty often continued the Ming dynasty's isolationist policies. Wokou, which literally translates to "Japanese pirates" or "dwarf pirates", were pirates who raided the coastlines of China, Japan, and Korea, and were one of the key primary concerns, although the maritime ban was not without some control. Since the division of the territory following the Chinese Civil War in 1949, China is divided into two regimes with the People's Republic of China solidified control on mainland China while the existing Republic of China was confined to the island of Taiwan as both governments lay claim to each other's sovereignty. While the PRC is recognized by the United Nations, European Union, and the majority of the world's states, the ROC remains diplomatically isolated although 15 states recognize it as "China" with some countries maintain unofficial diplomatic relations through trade offices. Japan From 1641 to 1853, the Tokugawa shogunate of Japan enforced a policy called kaikin. The policy prohibited foreign contact with most outside countries. The commonly held idea that Japan was entirely closed, however, is misleading. In fact, Japan maintained limited-scale trade and diplomatic relations with China, Korea and Ryukyu Islands, as well as the Dutch Republic as the only Western trading partner of Japan for much of the period. The culture of Japan developed with limited influence from the outside world and had one of the longest stretches of peace in history. During this period, Japan developed thriving cities, castle towns, increasing commodification of agriculture and domestic trade, wage labor, increasing literacy and concomitant print culture, laying the groundwork for modernization even as the shogunate itself grew weak. Korea In 1863, Emperor Gojong took the throne of the Joseon Dynasty when he was a child. His father, Regent Heungseon Daewongun, ruled for him until Gojong reached adulthood. During the mid-1860s he was the main proponent of isolationism and the principal instrument of the persecution of both native and foreign Catholics. Following the division of the peninsula after independence from Japan in 1945–48, Kim Il-sung inaugurated an isolationist nationalist regime in the North, which has been continued by his son and grandson following his death in 1994. Paraguay In 1814, three years after it gained its independence on May 14, 1811, Paraguay was taken over by the dictator José Gaspar Rodríguez de Francia. During his rule which lasted from 1814 until his death in 1840, he closed Paraguay's borders and prohibited trade or any relationship between Paraguay and the outside world. The Spanish settlers who had arrived in Paraguay just before it gained its independence were required to marry old colonists or the native Guarani in order to create a single Paraguayan people. Francia had a particular dislike of foreigners, and those foreigners who came to Paraguay during his rule, which was very difficult, were not allowed to leave the country for the rest of their lives. An independent character, he hated European influences and the Catholic Church and in order to try to keep foreigners at bay, he turned church courtyards into artillery parks and turned confession boxes into border sentry posts. United States The cultural roots of isolationism, such as German and Irish ethnicity, have interested scholars. Some scholars, such as Robert J. Art, believe that the United States had an isolationist history, but other scholars dispute that claim by describing the United States as following a strategy of unilateralism or non-interventionism rather than a strategy of isolationism. Robert Art makes his argument in A Grand Strategy for America (2003). Books that have made the argument that the United States followed unilaterism instead of isolationism include Walter A. McDougall's Promised Land, Crusader State (1997), John Lewis Gaddis's Surprise, Security, and the American Experience (2004), and Bradley F. Podliska's Acting Alone (2010). Both sides claim policy prescriptions from George Washington's Farewell Address as evidence for their argument. Bear F. Braumoeller argues that even the best case for isolationism, the United States in the interwar period, has been widely misunderstood and that Americans proved willing to fight as soon as they believed a genuine threat existed. Warren F. Kuehl and Gary B. Ostrower argue: Events during and after the Revolution related to the treaty of alliance with France, as well as difficulties arising over the neutrality policy pursued during the French revolutionary wars and the Napoleonic wars, encouraged another perspective. A desire for separateness and unilateral freedom of action merged with national pride and a sense of continental safety to foster the policy of isolation. Although the United States maintained diplomatic relations and economic contacts abroad, it sought to restrict these as narrowly as possible in order to retain its independence. The Department of State continually rejected proposals for joint cooperation, a policy made explicit in the Monroe Doctrine's emphasis on unilateral action. Not until 1863 did an American delegate attend an international conference. Criticism Isolationism has been criticized for the lack of aiding nations with major troubles. One notable example is that of American isolationism, which Benjamin Schwartz described as a "tragedy" inspired by Puritanism. See also Autarky Cordon Sanitaire Economic nationalism Imperium Indigenous peoples in voluntary isolation International isolation Monroe Doctrine Non-interventionism Sakoku Isolation (disambiguation) Splendid isolation United States non-interventionism Unilateralism in the United States Works cited References Barry, Tom. "A Global Affairs Commentary: The Terms of Power," Foreign Policy in Focus, November 6, 2002, University Press. Berry, Mary Elizabeth. (2006). Japan in Print: Information and Nation in the Early Modern Period. Berkeley: University of California Press. ; Chalberg, John C. (1995). Isolationism: Opposing Viewpoints. San Diego: Greenhaven Press. ; Craig, Albert. (1961). Chōshū in the Meiji Restoration. Cambridge: Harvard University Press. ; Glahn, Richard Von. (1996). Fountain of Fortune: Money and Monetary Policy in China, 1000–1700. Berkeley: University of California Press. ; Graebner, Norman A. (1956). The New Isolationism; a Study in Politics and Foreign Policy Since 1950. New York: Ronald Press. Jansen, Marius B. (1961). Sakamoto Ryoma and the Meiji Restoration. Princeton: Princeton University Press. Nichols, Christopher McKnight (2011). "Promise and Peril: America at the Dawn of a Global Age." Cambridge, Massachusetts: Harvard University Press, 2011. Nordlinger, Eric A. (1995). Isolationism Reconfigured: American Foreign Policy for a New Century. Princeton: Princeton University Press. ; Smith, Thomas C. (1959). The Agrarian Origins of Modern Japan. Stanford: Stanford University Press. Sullivan, Michael P. "Isolationism." World Book Deluxe 2001. CD-ROM. Toby, Ronald P. (1984). State and Diplomacy in Early Modern Japan: Asia in the Development of the Tokugawa Bakufu. Princeton: Princeton University Press. ; Washington, George "Washington's Farewell Address 1796." Yale Law School Avalon Project, 2008. Web. 12 Sept 2013. International relations theory
[ 0.18173585832118988, 0.09169129282236099, -0.7901555299758911, 0.08940064907073975, -0.2381020486354828, 0.1320221722126007, 0.4253709018230438, 0.58656907081604, 0.14793549478054047, -0.32030266523361206, -0.47933608293533325, 0.06803752481937408, -0.8024888038635254, 0.8487786650657654, ...
15049
https://en.wikipedia.org/wiki/Indianapolis%20Colts
Indianapolis Colts
The Indianapolis Colts are a professional American football team based in Indianapolis. The Colts compete in the National Football League (NFL) as a member club of the league's American Football Conference (AFC) South division. Since the 2008 season, the Colts have played their games in Lucas Oil Stadium. Previously, the team had played for over two decades (1984–2007) at the RCA Dome. Since 1987, the Colts have served as the host team for the NFL Scouting Combine. The Colts have competed as a member club of the NFL since their founding in Baltimore in 1953 after then-owner Carroll Rosenbloom purchased the assets of the NFL's last founding Ohio League member Dayton Triangles-Dallas Texans franchise. They were one of three NFL teams to join those of the American Football League (AFL) to form the AFC following the 1970 merger. While in Baltimore, the team advanced to the playoffs 10 times and won three NFL Championship games in 1958, 1959, and 1968. The Colts played in two Super Bowl games while they were based in Baltimore, losing to the New York Jets in Super Bowl III and defeating the Dallas Cowboys in Super Bowl V. The Colts relocated to Indianapolis in 1984 and have since appeared in the playoffs 16 times, won two conference championships, and won one Super Bowl, in which they defeated the Chicago Bears in Super Bowl XLI. Franchise history 1953–1983: the Baltimore era Following World War II, a competing professional football league was organized known as the All America Football Conference which began to play in the 1946 season. In its second year, the franchise assigned to the Miami Seahawks was relocated to Maryland's major commercial and manufacturing city of Baltimore. After a fan contest, the team was renamed the Baltimore Colts and used the team colors of silver and green. The Colts played for the next three seasons in the old AAFC. until they agreed to merge with the old National Football League (of 1920–1922 to 1950) when the NFL was reorganized. The Baltimore Colts were one of the three former AAFC powerhouse teams to merge with the NFL at that time, the others being the San Francisco 49ers and the Cleveland Browns. This Colts team, now in the "big league" of professional American football for the first time, although with shaky financing and ownership, played only in the 1950 season of the NFL, and was later disbanded. In 1953, a new Baltimore-based group, heavily supported by the city's municipal government and with a large subscription-base of fan-purchased season tickets, led by local owner Carroll Rosenbloom won the rights to a new Baltimore NFL franchise. Rosenbloom was awarded the remains of the former Dallas Texans team, who themselves had a long and winding history, with a small part of the franchise starting as the Boston Yanks in 1944, merging later with the Brooklyn Tigers, a franchise that had a far more deep and rich history, being previously known as the Dayton Triangles, one of the original old NFL teams established even before the League itself, in 1913. That team later became the New York Yanks in 1950, and many of the players from the New York Yankees of the former competing All-America Football Conference (1946–49) were added to the team to begin playing in the newly merged League for the 1950 season. The Yanks then moved to Dallas in Texas after the 1951 season having competed for two seasons, but played their final two "home" games of the 1952 season as a so-called "road team" at the Rubber Bowl football stadium in Akron, Ohio. The NFL considers the Texans and Colts to be separate teams, although many of the earlier teams shared the same colors of blue and white. Thus, the Indianapolis Colts are legally considered to be a 1953 expansion team. The current version of the Colts football team played their first season in Baltimore in 1953, where the team compiled a 3–9 record under first-year head coach Keith Molesworth. The franchise struggled during the first few years in Baltimore, with the team not achieving their first winning record until the 1957 season. However, under head coach Weeb Ewbank and the leadership of quarterback Johnny Unitas, the Colts went on to a 9–3 record during the 1958 season and reached the NFL Championship Game for the first time in their history by winning the NFL Western Conference. The Colts faced the New York Giants in the 1958 NFL Championship Game, which is considered to be among the greatest contests in professional football history. The Colts defeated the Giants 23–17 in the first game ever to utilize the overtime rule, a game seen by 45 million people. Following the Colts first NFL championship, the team posted a 9–3 record during the 1959 season and once again defeated the Giants in the NFL Championship Game to claim their second title in back to back fashion. Following the two championships in 1958 and 1959, the Colts did not return to the NFL Championship for four seasons and replaced the head coach Ewbank with the young Don Shula in 1963. In Shula's second season the Colts compiled a 12–2 record, but lost to the Cleveland Browns in the NFL Championship. However, in 1968 the Colts returned with the continued leadership of Unitas and Shula and went on to win the Colts' third NFL Championship and made an appearance in Super Bowl III. Leading up to the Super Bowl and following the 34–0 trouncing of the Cleveland Browns in the NFL Championship, many were calling the 1968 Colts team one of the "greatest pro football teams of all time" and were favored by 18 points against their counterparts from the American Football League, the New York Jets. The Colts, however, were stunned by the Jets, who won the game 16–7 in the first Super Bowl victory for the young AFL. The result of the game surprised many in the sports media as Joe Namath and Matt Snell led the Jets to the Super Bowl victory under head coach Weeb Ewbank, who had previously won two NFL Championships with the Colts. Rosenbloom of the Colts, Art Modell of the Browns, and Art Rooney of the Pittsburgh Steelers agreed to have their teams join the ten AFL teams in the American Football Conference as part of the AFL–NFL merger in 1970. The Colts immediately went on a rampage in the new league, as new head coach Don McCafferty led the 1970 team to an 11–2–1 regular-season record, winning the AFC East title. In the first round of the NFL Playoffs, the Colts beat the Cincinnati Bengals 17–0; one week later in the first-ever AFC Championship Game, they beat the Oakland Raiders 27–17. Baltimore went on to win the first post-merger Super Bowl (Super Bowl V), defeating the National Football Conference's Dallas Cowboys 16–13 on a Jim O'Brien field goal with five seconds left to play. The victory gave the Colts their fourth NFL championship and first Super Bowl victory. Following the championship, the Colts returned to the playoffs in 1971 and defeated the Cleveland Browns in the first round, but lost to the Miami Dolphins in the AFC Championship. Citing friction with the City of Baltimore and the local press, Rosenbloom traded the Colts franchise to Robert Irsay on July 13, 1972 and received the Los Angeles Rams in return. Under the new ownership, the Colts did not reach the postseason for three consecutive seasons after 1971, and after the 1972 season, starting quarterback and legend Johnny Unitas was traded to the San Diego Chargers. Following Unitas' departure, the Colts made the playoffs three consecutive seasons from 1975 to 1977, losing in the divisional round each time. The Colts' 1977 playoff loss in double overtime against the Oakland Raiders was famous for the fact that it was the last playoff game for the Colts in Baltimore and is also known for the Ghost to the Post play. These consecutive championship teams featured 1976 NFL Most Valuable Player Bert Jones at quarterback and an outstanding defensive line, nicknamed the "Sack Pack." Following the 1970s success, the team endured nine consecutive losing seasons beginning in 1978. In 1981, the Colts defense allowed an NFL-record 533 points, set an all-time record for fewest sacks (13), and also set a modern record for fewest punt returns (12). The following year, the offense collapsed, including a game against the Buffalo Bills where the Colts' offense did not cross mid-field the entire game. The Colts finished 0–8–1 in the strike-shortened 1982 season, thereby earning the right to select Stanford quarterback John Elway with the first overall pick. Elway, however, refused to play for Baltimore, and using leverage as a draftee of the New York Yankees baseball club, forced a trade to Denver. Behind an improved defense the team finished 7–9 in 1983, but that would be their last season in Baltimore. Relocation to Indianapolis The Baltimore Colts played their final home game in Baltimore on December 18, 1983, against the then Houston Oilers. Irsay continued to request upgrades to Memorial Stadium or construction of a new stadium. As a result of the poor performance on the field and the stadium issues, fan attendance and team revenue continued to dwindle. City officials were precluded from using tax-payer funds for the building of a new stadium, and the modest proposals that were offered by the city were not acceptable to either the Colts or the city's MLB franchise the Orioles. However, all sides continued to negotiate. Relations between Irsay and the city of Baltimore deteriorated. Although Irsay assured fans that his ultimate desire was to stay in Baltimore, he nevertheless began discussions with several other cities willing to build new football stadiums, eventually narrowing the list of cities to two: Phoenix and Indianapolis. Under the administration of mayors Richard Lugar and then William Hudnut, Indianapolis had undertaken an ambitious effort to reinvent itself into a 'Great American City'. The Hoosier Dome, which was later renamed the RCA Dome, had been built specifically for, and was ready to host, an NFL expansion team. Meanwhile, in Baltimore, the situation worsened. The Maryland General Assembly intervened when a bill was introduced to give the city of Baltimore the right to seize ownership of the team by eminent domain. As a result, Irsay began serious negotiations with Indianapolis Mayor William Hudnut in order to move the team before the Maryland legislature could pass the law. Indianapolis offered loans as well as the Hoosier Dome and a training complex. After the deal was reached, moving vans from Indianapolis-based Mayflower Transit were dispatched overnight to the team's Maryland training complex, arriving on the morning of March 29, 1984. Once in Maryland, workers loaded all of the team's belongings, and by midday the trucks departed for Indianapolis, leaving nothing of the Colts organization that could be seized by Baltimore. The Baltimore Colts' Marching Band had to scramble to retrieve their equipment and uniforms before they were shipped to Indianapolis as well. The move triggered a flurry of legal activity that ended when representatives of the city of Baltimore and the Colts organization reached a settlement in March 1986. Under the agreement, all lawsuits regarding the relocation were dismissed, and the Colts agreed to endorse a new NFL team for Baltimore. 1984–1997: Initial struggles in Indianapolis Upon the Colts' arrival in Indianapolis over 143,000 requests for season tickets were received in just two weeks. The move to Indianapolis, however, did not change the recent fortune of the Colts, with the team appearing in the postseason only once in the first 11 seasons in Indianapolis. During the 1984 season, the first in Indianapolis, the team went 4–12 and accounted for the lowest offensive yardage in the league that season. The 1985 and 1986 teams combined for only eight wins, including an 0–13 start in 1986 which prompted the firing of head coach Rod Dowhower, who was replaced by Ron Meyer. The Colts, however, did receive eventual Hall of Fame running back Eric Dickerson as a result of a trade during the 1987 season, and went on to compile a 9–6 record, thereby winning the AFC East and advancing to the postseason for the first time in Indianapolis; they lost that game to the Cleveland Browns. Following 1987, the Colts did not see any real success for quite some time, with the team missing the postseason for seven consecutive seasons. The struggles came to a climax in 1991 when the team went 1–15 and was just one point away from the first "imperfect" season in the history of a 16-game schedule. The season resulted in the firing of head coach Ron Meyer and the return of former head coach Ted Marchibroda to the organization in 1992; he had coached the team from 1975 to 1979. The team continued to struggle under Marchibroda and Jim Irsay, son of Robert Irsay and general manager at the time. It was in 1994 that Robert Irsay brought in Bill Tobin to become the general manager of the Indianapolis Colts. Under Tobin, the Colts drafted running back Marshall Faulk with the second overall pick in the 1994 and acquired quarterback Jim Harbaugh as well. These moves along with others saw the Colts begin to turn their fortunes around with playoff appearances in 1995 and 1996. The Colts won their first postseason game as the Indianapolis Colts in 1995 and advanced to the AFC Championship Game against the Pittsburgh Steelers, coming just a Hail Mary pass reception away from a trip to Super Bowl XXX. Marchibroda retired following the 1995 season and was replaced by Lindy Infante in 1996. After two consecutive playoff appearances, the Colts regressed and went 3–13 during the 1997 season. Along with the disappointing season, the principal owner and man who moved the team to Indianapolis, Robert Irsay, died in January 1997 after years of declining health. Jim Irsay, Robert Irsay's son, entered the role of principal owner following his father's death and quickly began to change the organization. Irsay replaced general manager Tobin with Bill Polian in 1997 as the team decided to build through their number one overall pick in the 1998 draft. 1998–2011: the Peyton Manning era Jim Irsay began to shape the Colts one year after assuming control from his father by firing head coach Lindy Infante and hiring Bill Polian as the general manager of the organization. Polian in turn hired Jim Mora to become the next head coach of the team and drafted Tennessee Volunteer quarterback Peyton Manning, the son of New Orleans Saints legend Archie Manning, with the first overall pick in the 1998 NFL Draft. The team and Manning struggled during the 1998 season, winning only three games; Manning threw a league high 28 interceptions. However, Manning did pass for 3,739 yards and threw 26 touchdown passes and was named to the NFL All-Rookie First Team. The Colts began to improve towards the end of the 1998 season and showed continued growth in 1999. Indianapolis drafted Edgerrin James in 1999 and continued to improve their roster heading into the upcoming season. The Colts went 13–3 in 1999 and finished first in the AFC East, their first division title since 1987. Indianapolis lost to the eventual AFC champion Tennessee Titans in the divisional playoffs. The 2000 and 2001 Colts teams were considerably less successful compared to the 1999 team, and pressure began to mount on team administration and the coaching staff following a 6–10 season in 2001. Head coach Jim Mora was fired at the end of the season and was replaced by former Tampa Bay Buccaneers head coach Tony Dungy. Dungy and the team quickly changed the atmosphere of the organization and returned to the playoffs in 2002 with a 10–6 record. The Colts also returned to the playoffs in 2003 and 2004 with 12–4 records and AFC South championships. The Colts lost to the New England Patriots and Tom Brady in the 2003 AFC Championship Game and in the 2004 divisional playoffs, thereby beginning a rivalry between the two teams, and between Manning and Brady. Following two consecutive playoff losses to the Patriots, the Colts began the 2005 season with a 13–0 record, including a regular season victory over the Patriots, the first in the Manning era. During the season Manning and Marvin Harrison broke the NFL record for touchdowns by a quarterback and receiver tandem. Indianapolis finished the 2005 season with a 14–2 record, the best record in the league that year and the best in a 16 games season for the franchise, but lost to the Pittsburgh Steelers in the divisional round, a disappointing end to the season. Indianapolis entered the 2006 season with a veteran quarterback, receivers, and defenders, and chose running back Joseph Addai in the 2006 draft. As in the previous season, the Colts began the season undefeated and went 9–0 before losing their first game against the Dallas Cowboys. Indianapolis finished the season with a 12–4 record and entered the playoffs for the fifth consecutive year, this time as the number three seed in the AFC. The Colts won their first two playoff games against the Kansas City Chiefs and the Baltimore Ravens to return to the AFC Championship Game for the first time since the 2003 playoffs, where they faced their rivals, the New England Patriots. In a classic game, the Colts overcame a 21–3 first-half deficit to win the game 38–34 and earned a trip to Super Bowl XLI, the franchise's first Super Bowl appearance since 1970 and for the first as Indianapolis. The Colts faced the Chicago Bears in the Super Bowl, winning the game 29–17 and giving Manning, Polian, Irsay, and Dungy, as well as the city of Indianapolis, their first Super Bowl title. Following their Super Bowl championship, the Colts compiled a 13–3 record during the 2007 season; they lost to the San Diego Chargers in the divisional playoffs, in what was the final game the Colts played at the RCA Dome before moving into Lucas Oil Stadium in 2008. The 2008 season began with Manning being sidelined for most of the pre-season due to surgery. Indianapolis began the season with a 3–4 record, but then won nine consecutive games to end the season at 12–4 and make in into the playoffs as a wild card team, eventually losing to the Chargers in the wild card round. Following the season, Tony Dungy announced his retirement after seven seasons as head coach, having compiled an overall record of 92–33 with the team. Jim Caldwell was hired as head coach of the team following Dungy, and led the team during the 2009 season. The Colts went 14–0 during the season to finish with an overall record of 14–2 after controversially benching their starters during the last two games. The Colts for the second time in the Manning era entered the playoffs with the best record in the AFC. The Colts managed victories over the Baltimore Ravens and New York Jets to advance to Super Bowl XLIV against the New Orleans Saints, but lost to the Saints 31–17 to end the season in disappointment. At the completion of the 2009 season, the Colts had finished the first decade of the 2000s (2000–2009) with the most regular-season wins (115) and highest winning percentage (.719) of any team in the NFL during that span. The 2010 team compiled a 10–6 record, the first time the Colts did not win 12 games since 2002, and lost to the New York Jets in the wild card round of the playoffs. The loss to the Jets was the last game for Peyton Manning as a Colt. After missing the preseason, Manning was ruled out for the Colts' opening game in Houston and eventually the entire 2011 season. Taking over as starter was veteran quarterback Kerry Collins, who had been signed to the team after dissatisfaction with backup quarterback Curtis Painter and Dan Orlovsky. However, even with a veteran quarterback, the Colts lost their first 13 games and finished the season with a 2–14 record, enough to receive the first overall pick in the 2012 draft. Immediately following the season, team president Bill Polian was fired, ending his 14-year tenure with the team. The change built the anticipation of the organization's decision regarding Manning's future with the team. The Peyton Manning era came to an end on March 8, 2012 when Jim Irsay announced that Manning was being released from the roster after 13 seasons. 2012–2019: the Andrew Luck era During the 2012 off-season owner Jim Irsay hired Ryan Grigson to be the General Manager. Grigson decided to let head coach Jim Caldwell go and Chuck Pagano was hired as the new head coach shortly thereafter. The Colts also began to release some higher paid and oft-injured veteran players, including Joseph Addai, Dallas Clark, and Gary Brackett. The Colts used their number one overall draft pick in 2012 to draft Stanford Cardinal quarterback Andrew Luck and also drafted his teammate Coby Fleener in the second round. The team also switched to a 3–4 defensive scheme. With productive seasons from both Luck and veteran receiver Reggie Wayne, the Colts rebounded from the 2–14 season of 2011 with a 2012 season record of 11–5. The franchise, team, and fan base rallied behind head coach Chuck Pagano during his fight with leukemia. Clinching an unexpected playoff spot in the 2012–13 NFL playoffs, the 14th playoff berth for the club since 1995. The season ended in a 24–9 playoff loss to the eventual Super Bowl Champion Baltimore Ravens. Two weeks into the 2013 season, the Colts traded their first-round selection in the 2014 NFL Draft to the Cleveland Browns for running back Trent Richardson. In Week 7, Luck led the Colts to a 39–33 win over his predecessor, Peyton Manning, and the undefeated Broncos. Luck went on to lead the Colts to a 15th division championship later that season. In the first round of the 2013 NFL playoffs, Andrew Luck led the Colts to a 45–44 victory over Kansas City, outscoring the Chiefs 35–13 in the second half in the 2nd biggest comeback in NFL playoff history. During the 2014 season, Luck led the Colts to the AFC Championship game for the first time in his career after breaking the Colts' single-season passing yardage record previously held by Manning. After the Colts finished 8–8 in both the 2015 and 2016 seasons and missed the playoffs in back-to-back seasons for the first time since 1997–98, Grigson was fired as general manager. Just three of his previous 18 draft picks remained on the team at the time of his firing. On January 30, 2017 the team hired Chris Ballard, who served as the Kansas City Chiefs Director of Football Operations, to replace Grigson. On December 31, 2017, after winning the final game of the season and a final record of 4-12, the Colts parted ways with Pagano. Luck, who had suffered multiple injuries and missed nine games during the 2015 season, sat out the entire 2017 season recovering from shoulder surgery. In the weeks following the end of the 2017 season, after two interviews, it was widely reported that the Colts would hire Josh McDaniels, offensive coordinator of the New England Patriots, to replace Pagano, after McDaniels fulfilled his obligations to the Patriots in Super Bowl LII. On February 8, 2018, the Colts announced McDaniels as their new head coach. Hours later, however, McDaniels rescinded his decision to be the head coach, and he returned to the Patriots. On February 11, 2018, the Colts announced Frank Reich, then offensive coordinator of the Philadelphia Eagles, as their new head coach. In Reich's first season as head coach, Andrew Luck's return to the field got off to a shaky start, as the Colts began the 2018 season 1–5. However, they would surge back to win nine of their last ten games to secure a 10–6 record and a playoff berth. They would win a Wild-Card game against their division rival Houston Texans before falling to the Kansas City Chiefs in the Divisional Round. Luck, benefiting from the Colts' best offensive line of his career, was named the 2018 Comeback Player of the Year. Colts General Manager Chris Ballard achieved a historic feat in 2018 when two players he had drafted that year, guard Quenton Nelson and linebacker Darius Leonard were both named First-Team All-Pro. This was the first time two rookies from the same team received that honor since Hall-of-Famers Dick Butkus and Gale Sayers achieved the feat in 1965. On August 24, 2019, Luck informed the Colts that he would be retiring from the NFL after not attending training camp. He cited an unfulfilling cycle of injury and rehab as his primary reason for leaving football. 2019–present: After Luck On November 17, 2019, the Colts defeated the Jacksonville Jaguars for the team's 300th win in the Indianapolis era, with a record of 300–267. Despite a promising 5–2 start and strong seasons from Leonard, Nelson, and newly acquired defensive end Justin Houston, the Colts struggled in the second half of the 2019 season with new starting quarterback Jacoby Brissett at the helm and finished the year with a 7–9 record. On March 17, 2020, the Colts signed longtime Los Angeles Chargers quarterback and eight-time Pro Bowler Philip Rivers to a one-year deal worth $25 million. Rivers led the Colts to an 11-5 record and a playoff berth, where they then lost to the Buffalo Bills in the NFL's first expanded playoffs. On March 17, 2021, the Colts traded a 2021 third-round pick and a 2022 second-round conditional pick for former Eagles QB Carson Wentz. Logos and uniforms The Colts' helmets in 1953 were white with a blue stripe. In 1954–55 they were blue with a white stripe and a pair of horseshoes at the rear of the helmet. For 1956, the colors were reversed, white helmet, blue stripe and horseshoes at the rear. In 1957 the horseshoes moved to their current location, one on each side of the helmet. The blue jerseys have white shoulder stripes and the white jerseys have blue stripes. The team also wears white pants with blue stripes down the sides. Both designs originally had sleeve stripes, but by 1957, the uniforms changed to its current form, which evolved as materials changed. For much of the team's history, the Colts wore blue socks, accenting them with two or three white stripes for much of their history in Baltimore and during the 2004 and 2005 seasons. From 1982 to 1987, the blue socks featured gray stripes. For a period lasting 1955 to 1958 and again from 1988 to 1992, the Colts wore white socks with either two or three blue stripes. From 1982 through 1986, the Colts wore gray pants with their blue jerseys. The gray pants featured a horseshoe on the top of the sides with the player's number inside the horseshoe. The Colts continued to wear white pants with their white jerseys throughout this period, and in 1987, the gray pants were retired. The Colts wore blue pants with their white jerseys for the first three games of the 1995 season (pairing them with white socks), but then returned to white pants with both the blue and white jerseys. The team made some minor uniform adjustments before the start of the 2004 season, including reverting from blue to the traditional gray face masks, darkening their blue colors from a royal blue to speed blue, as well as adding two white stripes to the socks. In 2006, the stripes were removed from the socks. In 2002, the Colts made a minor striping pattern change on their jerseys, having the stripes only on top of the shoulders then stop completely. Previously, the stripes used to go around to underneath the jersey sleeves. This was done because the Colts, like many other football teams, were beginning to manufacture the jerseys to be tighter to reduce holding calls and reduce the size of the sleeves. Although the white jerseys of the Minnesota Vikings at the time also had a similar striping pattern and continued as such (as well as the throwbacks the New England Patriots wore in the Thanksgiving game against the Detroit Lions in 2002, though the Patriots later wore the same throwbacks in 2009 with truncated stripes and in 2010 became their official alternate uniform), the Colts and most college teams with this striping pattern did not make this adjustment. In 2017, the Colts brought back the blue pants but paired them with the blue jerseys as part of the NFL Color Rush program. The club officially revealed an updated wordmark logo, as well as updated numeral fonts, on April 13, 2020. While blue and white remained the team's core colors, they added black as a tertiary color, with its usage restricted to the embroidered Nike swoosh on the white uniforms. Despite the wordmark change, the previous wordmarks are still painted on the Lucas Oil Stadium end zones. Lucas Oil Stadium After 24 years of playing at the RCA Dome, the Colts moved to their new home Lucas Oil Stadium in the fall of 2008. In December 2004, the City of Indianapolis and Jim Irsay agreed to a new stadium deal at an estimated cost of $1 billion (including the Indiana Convention Center upgrades). In a deal estimated at $122 million, Lucas Oil Products won the naming rights to the stadium for 20 years. Lucas Oil Stadium is a seven-level stadium that seats 63,000 for football. It can be reconfigured to seat 70,000 or more for NCAA basketball and football and concerts. It covers . The stadium features a retractable roof allowing the Colts to play home games outdoors for the first time since arriving in Indianapolis. Using FieldTurf, the playing surface is roughly below ground level. In addition to being larger than the RCA Dome, the new stadium features: 58 permanent concession stands, 90 portable concession stands, 13 escalators, 11 passenger elevators, 800 restrooms, HD video displays from Daktronics and replay monitors and 142 luxury suites. The stadium also features a retractable roof, with electrification technology developed by VAHLE, Inc. Other than being the home of the Colts, the stadium will host games in both the Men's and Women's NCAA Basketball Tournaments and will serve as the back up host for all NCAA Final Four Tournaments. The stadium hosted the Super Bowl for the 2011 season (Super Bowl XLVI) and has a potential economic impact estimated at $286 million. Lucas Oil Stadium has also hosted the Drum Corps International World Championships since 2009. Rivalries AFC South rivalries As a transplant from the AFC East into the AFC South upon the realignment of the NFL's divisions in , the Colts merely share loose rivalries with the other three teams in its division, namely the Houston Texans, Jacksonville Jaguars, and Tennessee Titans. They have dominated the AFC South for much of the division's history under quarterbacks Peyton Manning and Andrew Luck, but have faced competition for divisional supremacy in recent years from the Texans. New England Patriots The rivalry between the Indianapolis Colts and New England Patriots is one of the NFL's newest rivalries. The rivalry is fueled by the quarterback comparison between Peyton Manning and Tom Brady. The Patriots owned the beginning of the series, defeating the Colts in six consecutive contests including the 2003 AFC Championship game and a 2004 AFC Divisional game. The Colts won the next three matches, notching two regular-season victories and a win in the 2006 AFC Championship game on the way to their win in Super Bowl XLI. On November 4, 2007, the Patriots defeated the Colts 24–20; in the next matchup on November 2, 2008, the Colts won 18–15 in a game that was one of the reasons the Patriots failed to make the playoffs; in the 2009 meeting, the Colts staged a spirited comeback to beat the Patriots 35–34; in 2010 the Colts almost staged another comeback, pulling within 31–28 after trailing 31–14 in the fourth quarter, but fell short due to a Patriots interception of a Manning pass late in the game; it turned out to be Manning's final meeting against the Patriots as a member of the Colts. After a dismal 2011 season that included a 31–24 loss to the Patriots, the Colts drafted Andrew Luck and in November of 2012 the two teams met with identical 6–3 records; the Patriots erased a 14–7 gap to win 59–24. The nature of this rivalry is ironic because the Colts and Patriots were division rivals from 1970 to 2001, but it did not become prominent in league circles until after Indianapolis was relocated to the AFC South. On November 16, 2014, the New England Patriots traveled at 7–2 to play the 6–3 Colts at Lucas Oil Stadium. After a stellar four-touchdown performance by New England running back Jonas Gray, the Patriots defeated the Colts 42–20. The Patriots followed up with a 45–7 defeat of the Colts in the 2014 AFC Championship Game. Earliest rivalries In the years 1953–66, the Colts played in the NFL Western Conference (also known as division), but did not have significant rivalries with other franchises in that alignment, as they were the easternmost team and the rest of the division included the Great Lakes franchises Green Bay, Detroit Lions, Chicago Bears, and after 1961, the Minnesota Vikings, along with the league's two West Coast teams in San Francisco and Los Angeles. The closest team to Baltimore was the Washington Redskins, but they were not in the same division and not very competitive during most years at that time. New York Giants In 1958, Baltimore played its first NFL Championship Game against the 10–3 New York Giants. The Giants qualified for the championship after a tie-breaking playoff against the Cleveland Browns. Having already been defeated by the Giants in the regular season, Baltimore was not favored to win, yet proceeded to take the title in sudden death overtime. The Colts then repeated the feat by posting an identical record and routing the Giants in the 1959 final. Up until the Colts' back-to-back titles, the Giants had been the premier club in the NFL, and continued to be post-season stalwarts the next decade, losing three straight finals. The situation was reversed by the end of the decade, with Baltimore winning the 1968 NFL title and New York compiling less impressive results. In recent years, the Colts and Giants featured brothers as their starting quarterbacks (Peyton and Eli Manning respectively), leading to their occasional match-up being referred to as the "Manning Bowl". New York Jets Super Bowl III became the most famous upset in professional sports history as the American Football League's New York Jets won 16–7 over the overwhelmingly favored Colts. With the merger of the AFL and NFL the Colts and Jets were placed in the new AFC East. The two teams met twice a year (interrupted in 1982 by a player strike) 1970–2001; with the move of the Colts to the AFC South the two teams' rivalry actually escalated, as they met three times in the playoffs in the South's first nine seasons of existence; the Jets crushed the Colts 41–0 in the 2002 Wild Card playoff round; the Colts then defeated the Jets 30–17 in the 2009 AFC Championship Game; but the next year in the Wild Card round the Jets pulled off another playoff upset of the Colts, winning 17–16; it was Peyton Manning's final game with the Colts. The Jets defeated the Colts 35–9 in 2012 in Andrew Luck's debut season; after two straight losses Luck led a 45–10 rout of the Jets in 2016. Joe Namath and Johnny Unitas were the focal point of the rivalry at its beginning, but they did not meet for a full game until September 24, 1972. Namath erupted with six touchdowns and 496 passing yards despite only 28 throws and 15 completions. Unitas threw for 376 yards and two scores but was sacked six times as the Jets won 44–34; the game was considered one of the top ten passing duels in NFL history. Miami Dolphins Baltimore's post NFL-AFL merger passage to the AFC saw them thrust into a new environment with little in common with its fellow divisional teams: the Jets, Miami Dolphins, Buffalo Bills, and Boston Patriots. One angle where the two clubs did have something in common, however, came in new Miami coach Don Shula. Shula had coached the Colts the previous seven pre-merger seasons (1963–69) and was signed by Joe Robbie after the merger was consummated; because the signing came after the merger the NFL's rules on tampering came into play, and the Dolphins had to give up their first-round pick to the Colts. Powered by QB Earl Morrall Baltimore was the first non-AFL franchise to win a division title in the conference, outlasting the Miami Dolphins by one game, and leading the division since Week 3 of 1970. The two franchises were denied a playoff confrontation by Miami's first-round defeat to the Oakland Raiders, whereas Baltimore won its first Super Bowl title that year. Yet in 1971, the teams were engaged in a heated race that went down to the final week of the season, where Miami won its first division title with a 10–3–1 title compared to the 10–4 Baltimore record after the Colts won the Week 13 matchup between them at home, but proceeded to lose the last game of the season to Boston. In the playoffs, Baltimore advanced to the AFC title game after a 20–3 victory over the Cleveland Browns, while Miami won in double overtime against the Kansas City Chiefs. This set up a title game that was favored for the defending league champion Colts. Yet Miami won the AFC championship with a 21–0 shutout and advanced to lose Super Bowl VI to Dallas. In 1975 Baltimore and Miami tied with 10–4 records, yet the Colts advanced to the playoffs based on a head-to-head sweep of their series. In 1977 Baltimore tied for first for the third straight year (in 1976 they tied with the now-New England Patriots) with Miami, and this time advanced to the playoffs on even slimmer pretenses, with a conference record of 9–3 compared to Miami's 8–4, as they had split the season series. The rivalry in the following years was virtually negated by very poor play of the Colts; the Colts won just 117 games in the twenty-one seasons (1978–98) that bracketed their 1977 playoff loss to the Oakland Raiders and the 1999 trade of star running back Marshall Faulk; this included a 0–8–1 record during the NFL's strike-shortened 1982 season. In 1995, now as Indianapolis, the two both posted borderline 9–7 records to tie for second against Buffalo, yet the Colts once again reached the post-season having swept the season series. The following season they edged out Miami by posting a 9–7 record and winning the ordinarily meaningless 3rd-place position, but qualifying for the wild card. The two clubs' 1999 meetings were dramatic affairs between Hall Of Fame-bound Dan Marino and up-and-coming star Peyton Manning. Marino led a 25-point fourth-quarter comeback for a 34–31 Dolphins win at the RCA Dome, and then in Miami Marino led another comeback to tie the game 34–34 with 36 seconds remaining; Manning, however, drove the Colts in range for a 53-yard field goal as time expired (37–34 Colts win). The last truly meaningful matchup between the two franchises was in the 2000 season, when Miami edged out Indianapolis with an 11–5 record for the division championship. The two then met in the wild-card round where the Dolphins won 23–17 before being blown out by Oakland 27–0 (the Colts themselves had suffered a bitter loss to the Raiders in Week 2 of the season when the Raiders erased a 24–7 gap to win 38–31). In 2002 the Colts moved to the newly created AFC South division; the two clubs met at the RCA Dome on September 15 where the Dolphins edged the Colts 21–13 after stopping a late Colts drive. The rivalry was effectively retired after this; the two clubs did meet in a memorable Monday Night Football matchup in 2009 where the Colts, despite having the ball for only 15 minutes, defeated the Dolphins 27–23. The rivalry saw a rekindling after the 2012 NFL Draft brought new quarterbacks to both teams in Ryan Tannehill and Luck. The two met during the 2012 season with Luck breaking the rookie record for passing yards in a game in a 23–20 win over the Dolphins, but Tannehill and the Dolphins beat the Colts 24–20 the next season. The Dolphins win began a slump for Luck and the Colts against AFC East teams (eight straight losses by the Colts) that ended in December 2016 against the Jets, when they defeated them by a score of 41–10. Players of note Current roster Retired numbers Pro Football Hall of Famers Ring of Honor The Ring of Honor was established on September 23, 1996. There have been 15 inductees. First-round draft picks Coaches Head coaches Current staff Statistics and records Season-by-season record This is a partial list of the Colts' last five completed seasons. For the full season-by-season franchise results, see List of Indianapolis Colts seasons. Note: The Finish, Wins, Losses, and Ties columns list regular season results and exclude any postseason play. Records Radio and television coverage The Colts' flagship radio stations since 2007 are WFNI (1070 AM, later adding repeater signals at 93.5 FM and 107.5 FM) and WLHK 97.1 FM. The 1070 AM frequency, then known as WIBC, had also been the flagship from 1984 to 1992 and from 1995 to 1997. Matt Taylor is the team's play-by-play announcer, succeeding Bob Lamey in 2018. Lamey held the job from 1984 to 1991 and again from 1995 to 2018. Former Colts backup quarterback Jim Sorgi serves as the "color commentator". Mike Jansen serves as the public address announcer at all Colts home games. Jansen has been the public address announcer since the 1998 season. The team's local TV carriage rights were shaken up in mid-2014 when WTTV's owner Tribune Media came to terms with CBS to become the network's Indianapolis affiliate as of January 1, 2015, replacing WISH-TV. With the deal, both Tribune Media stations, including WXIN (channel 59) carry the bulk of the team's regular-season games starting with the 2015 NFL season. Also as of the 2015 season, WTTV and WXIN became the official Colts stations and air the team's preseason games, along with official team programming and coach's shows, and have a signage presence along the fascia of Lucas Oil Stadium. WISH's sister station WNDY-TV aired preseason games from 2011 to 2014, having replaced WTTV at that time. Radio station affiliates Indiana Illinois Kentucky Indianapolis Colts Radio Affiliates U.S. national anthem protest Before the third regular season game of 2017, against the Cleveland Browns, more than ten Indianapolis Colts players kneeled on one knee as opposed to the tradition of standing during the playing of "The Star-Spangled Banner", while thousands of fans booed and others posted responses to social media. The following day, then Colts head coach Chuck Pagano commented, "I’m proud of our players and their commitment and their compassion toward the game and the [horse] shoe and each community. We are a unified group," and former head coach, Tony Dungy was quoted saying "A group of our family got attacked, and called names ... and said they should be fired for what we feel is demonstrating our first amendment right". Before the fourth regular season game of 2017, against the Seattle Seahawks, the Colts stood during "The Star-Spangled Banner", however the entire team, including quarterback Andrew Luck locked arms in protest, instead of the customary holding of the right hand over the heart. Ratings for this NBC Sunday Night Football game was down five percent from the prior week's game in the same time slot. Before the fifth regular season game of 2017, against the San Francisco 49ers, the entire Colts team as in the Week 4 game, stood during "The Star-Spangled Banner", however with locking of arms, instead of the customary holding of the right hand over the heart. In addition to the Colts response, more than 20 members of the opposing team, the San Francisco 49ers, kneeled for "The Star-Spangled Banner". In attendance within the stadium, was then Vice President of the United States and former Governor of Indiana, Mike Pence who responded to these protests by leaving the stadium. This was a heavily attended home game for the halftime retirement of the #18 jersey of former quarterback and 2-time Super Bowl winner, Peyton Manning. During warmups prior to the sixth regular game of the 2017 season, a Monday Night Football game between the Colts and the Tennessee Titans, the Colts wore black T-shirts with the words "We will" on the front and "Stand for equality, justice, unity, respect, dialogue, opportunity" on the back for the third straight week. The Colts players stood with their arms locked during the playing of "The Star-Spangled Banner" instead of the customary holding of the right hand over the heart. References External links Indianapolis Colts at the National Football League official website National Football League teams Sports clubs established in 1953 1953 establishments in Maryland
[ -0.19911499321460724, 0.07339227199554443, -0.6950411200523376, -0.006866364274173975, 0.28448042273521423, 0.17786654829978943, -0.2271650731563568, 0.5276346206665039, -0.31995493173599243, -0.7372501492500305, 0.04690805822610855, 0.8787498474121094, -0.5935893654823303, 0.2261052876710...
15051
https://en.wikipedia.org/wiki/Immigration%20to%20the%20United%20States
Immigration to the United States
Immigration to the United States is the international movement of individuals who are not natives or do not possess citizenship in order to settle, reside, study, or work in the country. Immigration has been a major source of population growth and cultural change throughout much of United States history. All Americans, except for Native Americans, can trace their ancestry to immigrants from other nations around the world. In absolute numbers, the United States has a larger immigrant population than any other country, with 47 million immigrants as of 2015. This represents 19.1% of the 244 million international migrants worldwide, and 14.4% of the United States population. Some other countries have larger proportions of immigrants, such as Australia with 30% and Canada with 21.9%. According to the 2016 Yearbook of Immigration Statistics, the United States admitted a total of 1.18 million legal immigrants (618k new arrivals, 565k status adjustments) in 2016. Of these, 48% were the immediate relatives of United States citizens, 20% were family-sponsored, 13% were refugees or asylum seekers, 12% were employment-based preferences, 4.2% were part of the Diversity Immigrant Visa program, 1.4% were victims of a crime (U1) or their family members were (U2 to U5), and 1.0% who were granted the Special Immigrant Visa (SIV) for Iraqis and Afghans employed by the United States Government. The remaining 0.4% included small numbers from several other categories, including 0.2% who were granted suspension of deportation as an immediate relative of a citizen (Z13); persons admitted under the Nicaraguan and Central American Relief Act; children born after the issuance of a parent's visa; and certain parolees from the former Soviet Union, Cambodia, Laos, and Vietnam who were denied refugee status. The economic, social, and political aspects of immigration have caused controversy regarding such issues as maintaining ethnic homogeneity, workers for employers versus jobs for non-immigrants, settlement patterns, impact on upward social mobility, crime, and voting behavior. Between 1921 and 1965, policies such as the national origins formula limited immigration and naturalization opportunities for people from areas outside Western Europe. Exclusion laws enacted as early as the 1880s generally prohibited or severely restricted immigration from Asia, and quota laws enacted in the 1920s curtailed Eastern European immigration. The civil rights movement led to the replacement of these ethnic quotas with per-country limits for family-sponsored and employment-based preference visas. Since then, the number of first-generation immigrants living in the United States has quadrupled. The total immigrant population has stalled in recent years, especially since the election of Donald Trump and the Covid-19 pandemic. Census estimates show 45.3 million foreign born residents in March 2018 and 45.4 million in September 2021; the lowest 3 year increase in decades. Research suggests that immigration to the United States is beneficial to the United States economy. With few exceptions, the evidence suggests that on average, immigration has positive economic effects on the native population, but it is mixed as to whether low-skilled immigration adversely affects low-skilled natives. Studies also show that immigrants have lower crime rates than natives in the United States. History American immigration history can be viewed in four epochs: the colonial period, the mid-19th century, the start of the 20th century, and post-1965. Each period brought distinct national groups, races and ethnicities to the United States. Colonial period During the 17th century, approximately 400,000 English people migrated to Colonial America. However, only half stayed permanently. They comprised 85–90% of white immigrants. From 1700 to 1775, between 350,000 and 500,000 Europeans immigrated: estimates vary in sources. Only 52,000 English reportedly immigrated in the period 1701 to 1775, a figure questioned as too low. 400,000–450,000 were Scots, Scots-Irish from Ulster, Germans, Swiss, French Huguenots, and 300,000 involuntarily transported Africans. Over half of all European immigrants to Colonial America during the 17th and 18th centuries arrived as indentured servants. They numbered 350,000. From 1770 to 1775 (the latter year being when the American Revolutionary War began), 7,000 English, 15,000 Scots, 13,200 Scots-Irish, 5,200 Germans, and 3,900 Irish Catholics arrived. Fully half of the English immigrants were young, single men who were well-skilled, trained artisans, like the Huguenots. The European populations of the Middle Colonies of New York, New Jersey, Pennsylvania, and Delaware were ethnically very mixed, the English constituting only 30% in Pennsylvania, 40–45% in New Jersey, to 18% in New York. Historians estimate that fewer than one million immigrants moved to the United States from Europe between 1600 and 1799. By comparison, in the first federal census, in 1790, the population of the United States was enumerated to be 3,929,214. Early United States era The Naturalization Act of 1790 limited naturalization to "free white persons"; it was expanded to include black people in the 1860s and Asian people in the 1950s. This made the United States an outlier, since laws that made racial distinctions were uncommon in the world in the 18th century. In the early years of the United States, immigration (not counting the enslaved, who were treated as merchandise rather than people) was fewer than 8,000 people a year, including French refugees from the slave revolt in Haiti. Legal importation of enslaved African was prohibited after 1808, though many were smuggled in to sell. After 1820, immigration gradually increased. From 1836 to 1914, over 30 million Europeans migrated to the United States. The death rate on these transatlantic voyages was high, during which one in seven travelers died. In 1875, the nation passed its first immigration law, the Page Act of 1875. After an initial wave of immigration from China following the California Gold Rush, Congress passed a series of laws culminating in the Chinese Exclusion Act of 1882, banning virtually all immigration from China until the law's repeal in 1943. In the late 1800s, immigration from other Asian countries, especially to the West Coast, became more common. 20th century The peak year of European immigration was in 1907, when 1,285,349 persons entered the country. By 1910, 13.5 million immigrants were living in the United States. While the Chinese Exclusion Act of 1882 had already excluded immigrants from China, the immigration of people from Asian countries in addition to China was banned by the Immigration Act of 1917, also known as the Asiatic Barred Zone Act, which also banned homosexuals, people with intellectual disability, and people with an anarchist worldview. The Emergency Quota Act was enacted in 1921, followed by the Immigration Act of 1924. The 1924 Act was aimed at further restricting immigrants from Southern and Eastern Europe, particularly Jewish, Italian, and Slavic people, who had begun to enter the country in large numbers beginning in the 1890s, and consolidated the prohibition of Asian immigration. Immigration patterns of the 1930s were affected by the Great Depression. In the final prosperous year, 1929, there were 279,678 immigrants recorded, but in 1933, only 23,068 moved to the U.S. In the early 1930s, more people emigrated from the United States than to it. The U.S. government sponsored a Mexican Repatriation program which was intended to encourage people to voluntarily move to Mexico, but thousands were deported against their will. Altogether, approximately 400,000 Mexicans were repatriated; half of them were US citizens. Most of the Jewish refugees fleeing the Nazis and World War II were barred from coming to the United States. In the post-war era, the Justice Department launched Operation Wetback, under which 1,075,168 Mexicans were deported in 1954. Since 1965 The Immigration and Nationality Act of 1965, also known as the Hart-Cellar Act, abolished the system of national-origin quotas. By equalizing immigration policies, the act resulted in new immigration from non-European nations, which changed the ethnic demographics of the United States. In 1970, 60% of immigrants were from Europe; this decreased to 15% by 2000. In 1990, George H. W. Bush signed the Immigration Act of 1990, which increased legal immigration to the United States by 40%. In 1991, Bush signed the Armed Forces Immigration Adjustment Act 1991, allowing foreign service members who had served 12 or more years in the US Armed Forces to qualify for permanent residency and, in some cases, citizenship. In November 1994, California voters passed Proposition 187 amending the state constitution, denying state financial aid to illegal immigrants. The federal courts voided this change, ruling that it violated the federal constitution. Appointed by Bill Clinton, the U.S. Commission on Immigration Reform recommended reducing legal immigration from about 800,000 people per year to approximately 550,000. While an influx of new residents from different cultures presents some challenges, "the United States has always been energized by its immigrant populations", said President Bill Clinton in 1998. "America has constantly drawn strength and spirit from wave after wave of immigrants... They have proved to be the most restless, the most adventurous, the most innovative, the most industrious of people." In 2001, President George W. Bush discussed an accord with Mexican President Vincente Fox. Due to the September 11 attacks, the possible accord did not occur. From 2005 to 2013, the US Congress discussed various ways of controlling immigration. The Senate and House were unable to reach an agreement. Nearly 14 million immigrants entered the United States from 2000 to 2010, and over one million persons were naturalized as U.S. citizens in 2008. The per-country limit applies the same maximum on the number of visas to all countries regardless of their population and has therefore had the effect of significantly restricting immigration of persons born in populous nations such as Mexico, China, India, and the Philippines—the leading countries of origin for legally admitted immigrants to the United States in 2013; nevertheless, China, India, and Mexico were the leading countries of origin for immigrants overall to the United States in 2013, regardless of legal status, according to a U.S. Census Bureau study. Nearly 8 million people immigrated to the United States from 2000 to 2005; 3.7 million of them entered without papers. In 1986 president Ronald Reagan signed immigration reform that gave amnesty to 3 million undocumented immigrants in the country. Hispanic immigrants suffered job losses during the late-2000s recession, but since the recession's end in June 2009, immigrants posted a net gain of 656,000 jobs. Over 1 million immigrants were granted legal residence in 2011. For those who enter the US illegally across the Mexico–United States border and elsewhere, migration is difficult, expensive and dangerous. Virtually all undocumented immigrants have no avenues for legal entry to the United States due to the restrictive legal limits on green cards, and lack of immigrant visas for low-skilled workers. Participants in debates on immigration in the early twenty-first century called for increasing enforcement of existing laws governing illegal immigration to the United States, building a barrier along some or all of the Mexico-U.S. border, or creating a new guest worker program. Through much of 2006 the country and Congress was engaged in a debate about these proposals. few of these proposals had become law, though a partial border fence had been approved and subsequently canceled. Modern reform attempts Beginning with Ronald Reagan in the 1980s, presidents from both political parties have steadily increased the number of border patrol agents and instituted harsher punitive measures for immigration violations. Examples of these policies include Ronald Reagan’s Immigration Reform and Control Act of 1986 and the Clinton-era Prevention Through Deterrence strategy. The sociologist Douglas Massey has argued that these policies have succeeded at producing a perception of border enforcement but have largely failed at preventing emigration from Latin America. Notably, rather than curtailing illegal immigration, the increase in border patrol agents decreased circular migration across the U.S.–Mexico border, thus increasing the population of Hispanics in the U.S. Presidents from both parties have employed anti-immigrant rhetoric to appeal to their political base or to garner bi-partisan support for their policies. While Republicans like Reagan and Donald Trump have led the way in framing Hispanic immigrants as criminals, Douglas Massey points out that "the current moment of open racism and xenophobia could not have happened with Democratic acquiescence". For example, while lobbying for his 1986 immigration bill, Reagan framed unauthorized immigration as a "national security" issue and warned that "terrorists and subversives are just two days' driving time" from the border. Later presidents, including Democrats Bill Clinton and Barack Obama, used similar "security" rhetoric in their efforts to court Republican support for comprehensive immigration reform. In his 2013 State of the Union Address, Obama said "real reform means strong border security, and we can build on the progress my administration has already madeputting more boots on the southern border than at any time in our history". Trump administration policies ICE reports that it removed 240,255 immigrants in fiscal year 2016, as well as 226,119 in FY2017 and 256,085 in FY2018. Citizens of Central American countries (including Mexico) made up over 90% of removals in FY2017 and over 80% in FY2018. In January 2017, U.S. President Donald Trump signed an executive order temporarily suspending entry to the United States by nationals of seven Muslim-majority countries. It was replaced by another executive order in March 2017 and by a presidential proclamation in September 2017, with various changes to the list of countries and exemptions. The orders were temporarily suspended by federal courts but later allowed to proceed by the Supreme Court, pending a definite ruling on their legality. Another executive order called for the immediate construction of a wall across the U.S.–Mexico border, the hiring of 5,000 new border patrol agents and 10,000 new immigration officers, and federal funding penalties for sanctuary cities. The "zero-tolerance" policy was put in place in 2018, which legally allows children to be separated from adults unlawfully entering the United States. This is justified by labeling all adults that enter unlawfully as criminals, thus subjecting them to criminal prosecution. The Trump Administration also argued that its policy had precedent under the Obama Administration, which had opened family detention centers in response to migrants increasingly using children as a way to get adults into the country. However, the Obama Administration detained families together in administrative, rather than criminal, detention. Other policies focused on what it means for an asylum seeker to claim credible fear. To further decrease the amount of asylum seekers into the United States, Attorney Jeff Sessions released a decision that restricts those fleeing gang violence and domestic abuse as "private crime", therefore making their claims ineligible for asylum. These new policies that have been put in place are putting many lives at risk, to the point that the ACLU has officially sued Jeff Sessions along with other members of the Trump Administration. The ACLU claims that the policies that are currently being put in place by this Presidential Administration is undermining the fundamental human rights of those immigrating into the United States, specifically women. They also claim that these policies violate decades of settle asylum law. In April 2020, President Trump said he will sign an executive order to temporarily suspend immigration to the United States because of the COVID-19 pandemic in the United States. Origins of the U.S. immigrant population, 1960–2016 Note: "Other Latin America" includes Central America, South America and the Caribbean. Refugee numbers According to the Department of State, in the 2016 fiscal year 84,988 refugees were accepted into the US from around the world. In the fiscal year of 2017, 53,691 refugees were accepted to the US. There was a significant decrease after Trump took office; it continued in the fiscal year of 2018 when only 22,405 refugees were accepted into the US. This displays a massive drop in acceptance of refugees since the Trump Administration has been in place. On September 26, 2019, The Trump administration announced it plans to allow only 18,000 refugees to resettle in the United States in the 2020 fiscal year, its lowest level since the modern program began in 1980. In 2020 The Trump administration announces that it plans to slash refugee admissions to U.S. for 2021 to a record low, 15,000 refugees down from a cap of 18,000 for 2020. This is the fourth consecutive year of declining refugee admissions under the Trump term. Contemporary immigration , approximately half of immigrants living in the United States are from Mexico and other Latin American countries. Many Central Americans are fleeing because of desperate social and economic circumstances in their countries. Some believe that the large number of Central American refugees arriving in the United States can be explained as a "blowback" to policies such as United States military interventions and covert operations that installed or maintained in power authoritarian leaders allied with wealthy land owners and multinational corporations who stop family farming and democratic efforts, which have caused drastically sharp social inequality, wide-scale poverty and rampant crime. Economic austerity dictated by neoliberal policies imposed by the International Monetary Fund and its ally, the U.S., has also been cited as a driver of the dire social and economic conditions, as has the U.S. "War on Drugs", which has been understood as fueling murderous gang violence in the region. Another major migration driver from Central America (Guatemala, Honduras, and El Salvador) are crop failures, which are (partly) caused by climate change. "The current debate… is almost totally about what to do about immigrants when they get here. But the 800-pound gorilla that’s missing from the table is what we have been doing there that brings them here, that drives them here", according to Jeff Faux, an economist who is a distinguished fellow at the Economic Policy Institute. Until the 1930s most legal immigrants were male. By the 1990s women accounted for just over half of all legal immigrants. Contemporary immigrants tend to be younger than the native population of the United States, with people between the ages of 15 and 34 substantially overrepresented. Immigrants are also more likely to be married and less likely to be divorced than native-born Americans of the same age. Immigrants are likely to move to and live in areas populated by people with similar backgrounds. This phenomenon has remained true throughout the history of immigration to the United States. Seven out of ten immigrants surveyed by Public Agenda in 2009 said they intended to make the U.S. their permanent home, and 71% said if they could do it over again they would still come to the US. In the same study, 76% of immigrants say the government has become stricter on enforcing immigration laws since the September 11, 2001 attacks ("9/11"), and 24% report that they personally have experienced some or a great deal of discrimination. Public attitudes about immigration in the U.S. were heavily influenced in the aftermath of the 9/11 attacks. After the attacks, 52% of Americans believed that immigration was a good thing overall for the U.S., down from 62% the year before, according to a 2009 Gallup poll. A 2008 Public Agenda survey found that half of Americans said tighter controls on immigration would do "a great deal" to enhance U.S. national security. Harvard political scientist and historian Samuel P. Huntington argued in his 2004 book Who Are We? The Challenges to America's National Identity that a potential future consequence of continuing massive immigration from Latin America, especially Mexico, could lead to the bifurcation of the United States. The estimated population of illegal Mexican immigrants in the US decreased from approximately 7 million in 2007 to 6.1 million in 2011 Commentators link the reversal of the immigration trend to the economic downturn that started in 2008 and which meant fewer available jobs, and to the introduction of tough immigration laws in many states. According to the Pew Hispanic Center, the net immigration of Mexican born persons had stagnated in 2010, and tended toward going into negative figures. More than 80 cities in the United States, including Washington D.C., New York City, Los Angeles, Chicago, San Francisco, San Diego, San Jose, Salt Lake City, Phoenix, Dallas, Fort Worth, Houston, Detroit, Jersey City, Minneapolis, Denver, Baltimore, Seattle, Portland, Oregon and Portland, Maine, have sanctuary policies, which vary locally. Origin countries Source: US Department of Homeland Security, Office of Immigration Statistics Charts Demography Extent and destinations 2010, 2017, 2018 The United States admitted more legal immigrants from 1991 to 2000, between ten and eleven million, than in any previous decade. In the most recent decade, the 10 million legal immigrants that settled in the U.S. represent roughly one third of the annual growth, as the U.S. population increased by 32 million (from 249 million to 281 million). By comparison, the highest previous decade was the 1900s, when 8.8 million people arrived, increasing the total U.S. population by one percent every year. Specifically, "nearly 15% of Americans were foreign-born in 1910, while in 1999, only about 10% were foreign-born". By 1970, immigrants accounted for 4.7 percent of the US population and rising to 6.2 percent in 1980, with an estimated 12.5 percent in 2009. , 25% of US residents under age 18 were first- or second-generation immigrants. Eight percent of all babies born in the U.S. in 2008 belonged to illegal immigrant parents, according to a recent analysis of U.S. Census Bureau data by the Pew Hispanic Center. Legal immigration to the U.S. increased from 250,000 in the 1930s, to 2.5 million in the 1950s, to 4.5 million in the 1970s, and to 7.3 million in the 1980s, before becoming stable at about 10 million in the 1990s. Since 2000, legal immigrants to the United States number approximately 1,000,000 per year, of whom about 600,000 are Change of Status who already are in the U.S. Legal immigrants to the United States now are at their highest level ever, at just over 37,000,000 legal immigrants. In reports in 2005–2006, estimates of illegal immigration ranged from 700,000 to 1,500,000 per year. Immigration led to a 57.4% increase in foreign-born population from 1990 to 2000. Foreign-born immigration has caused the U.S. population to continue its rapid increase with the foreign-born population doubling from almost 20 million in 1990 to over 47 million in 2015. In 2018, there were almost 90 million immigrants and U.S.-born children of immigrants (second-generation Americans) in the United States, accounting for 28% of the overall U.S. population. While immigration has increased drastically over the 20th century, the foreign-born share of the population is, at 13.4, only somewhat below what it was at its peak in 1910 at 14.7%. A number of factors may be attributed to the decrease in the representation of foreign-born residents in the United States. Most significant has been the change in the composition of immigrants; prior to 1890, 82% of immigrants came from North and Western Europe. From 1891 to 1920, that number decreased to 25%, with a rise in immigrants from East, Central, and South Europe, summing up to 64%. Animosity towards these different and foreign immigrants increased in the United States, resulting in much legislation to limit immigration. Contemporary immigrants settle predominantly in seven states, California, New York, Florida, Texas, Pennsylvania, New Jersey and Illinois, comprising about 44% of the U.S. population as a whole. The combined total immigrant population of these seven states was 70% of the total foreign-born population in 2000. Origin Foreign-born population in the United States in 2019 by country of birth Effects of immigration Demographics The Census Bureau estimates the US population will increase from 317 million in 2014 to 417 million in 2060 with immigration, when nearly 20% will be foreign-born. A 2015 report from the Pew Research Center projects that by 2065, non-Hispanic white people will account for 46% of the population, down from the 2005 figure of 67%. Non-Hispanic white people made up 85% of the population in 1960. It also foresees the population of Hispanic people increasing from 17% in 2014 to 29% by 2060. The population of Asian people is expected to nearly double in 2060. Overall, the Pew Report predicts the population of the United States will rise from 296 million in 2005 to 441 million in 2065, but only to 338 million with no immigration. In 35 of the country's 50 largest cities, non-Hispanic white people were predicted to be in the minority at the last census, or are already. In California, non-Hispanic white people decreased from 80% of the state's population in 1970 to 42% in 2001 and 39% in 2013. Immigrant segregation declined in the first half of the 20th century, but has been increasing over the past few decades. This has caused questioning of the correctness of describing the United States as a melting pot. One explanation is that groups with lower socioeconomic status concentrate in more densely-populated areas that have access to public transit while groups with higher socioeconomic status move to suburban areas. Another is that some recent immigrant groups are more culturally and linguistically different from earlier groups and prefer to live together due to factors such as communication costs. Another explanation for increased segregation is white flight. Country of birth for the foreign-born population in the United States Source: 1990, 2000 and 2010 decennial Censuses and 2019 American Community Survey Economic A survey of leading economists shows a consensus for the view that high-skilled immigration makes the average American better off. A survey of the same economists also shows strong support for the notion that low-skilled immigration makes the average American better off. According to David Card, Christian Dustmann, and Ian Preston, "most existing studies of the economic impacts of immigration suggest these impacts are small, and on average benefit the native population". In a survey of the existing literature, Örn B Bodvarsson and Hendrik Van den Berg wrote, "a comparison of the evidence from all the studies ... makes it clear that, with very few exceptions, there is no strong statistical support for the view held by many members of the public, namely that immigration has an adverse effect on native-born workers in the destination country". Overall economic prosperity Whereas the impact on the average native tends to be small and positive, studies show more mixed results for low-skilled natives, but whether the effects are positive or negative, they tend to be small either way. Immigrants may often do types of work that natives are largely unwilling to do, contributing to greater economic prosperity for the economy as a whole: for instance, Mexican migrant workers taking up manual farm work in the United States has close to zero effect on native employment in that occupation, which means that the effect of Mexican workers on U.S. employment outside farm work was therefore most likely positive, since they raised overall economic productivity. Research indicates that immigrants are more likely to work in risky jobs than U.S.-born workers, partly due to differences in average characteristics, such as immigrants' lower English language ability and educational attainment. Further, some studies indicate that higher ethnic concentration in metropolitan areas is positively related to the probability of self-employment of immigrants. Research also suggests that diversity has a net positive effect on productivity and economic prosperity. A study by Nathan Nunn, Nancy Qian and Sandra Sequeira found that the Age of Mass Migration (1850–1920) has had substantially beneficial long-term effects on U.S. economic prosperity: "locations with more historical immigration today have higher incomes, less poverty, less unemployment, higher rates of urbanization, and greater educational attainment. The long-run effects appear to arise from the persistence of sizeable short-run benefits, including earlier and more intensive industrialization, increased agricultural productivity, and more innovation." The authors also found that the immigration had short-term benefits: "that there is no evidence that these long-run benefits come at short-run costs. In fact, immigration immediately led to economic benefits that took the form of higher incomes, higher productivity, more innovation, and more industrialization". Research has also found that migration leads to greater trade in goods and services. Using 130 years of data on historical migrations to the United States, one study found "that a doubling of the number of residents with ancestry from a given foreign country relative to the mean increases by 4.2 percentage points the probability that at least one local firm invests in that country, and increases by 31% the number of employees at domestic recipients of FDI from that country. The size of these effects increases with the ethnic diversity of the local population, the geographic distance to the origin country, and the ethno-linguistic fractionalization of the origin country." Some research suggests that immigration can offset some of the adverse effects of automation on native labor outcomes in the United States. By increasing overall demand, immigrants could push natives out of low-skilled manual labor into better-paying occupations. A 2018 study in the American Economic Review found that the Bracero program (which allowed almost half a million Mexican workers to do seasonal farm labor in the United States) did not have any adverse impact on the labor market outcomes of American-born farm workers. Fiscal effects A 2011 literature review of the economic impacts of immigration found that the net fiscal impact of migrants varies across studies but that the most credible analyses typically find small and positive fiscal effects on average. According to the authors, "the net social impact of an immigrant over his or her lifetime depends substantially and in predictable ways on the immigrant's age at arrival, education, reason for migration, and similar". A 2016 report by the National Academies of Sciences, Engineering, and Medicine concluded that over a 75-year time horizon, "the fiscal impacts of immigrants are generally positive at the federal level and generally negative at the state and local level". The reason for the costs to state and local governments is that the cost of educating the immigrants' children is paid by state and local governments. According to a 2007 literature review by the Congressional Budget Office, "Over the past two decades, most efforts to estimate the fiscal impact of immigration in the United States have concluded that, in aggregate and over the long-term, tax revenues of all types generated by immigrants—both legal and unauthorized—exceed the cost of the services they use." According to James Smith, a senior economist at Santa Monica-based RAND Corporation and lead author of the United States National Research Council's study "The New Americans: Economic, Demographic, and Fiscal Effects of Immigration", immigrants contribute as much as $10 billion to the U.S. economy each year. The NRC report found that although immigrants, especially those from Latin America, caused a net loss in terms of taxes paid versus social services received, immigration can provide an overall gain to the domestic economy due to an increase in pay for higher-skilled workers, lower prices for goods and services produced by immigrant labor, and more efficiency and lower wages for some owners of capital. The report also notes that although immigrant workers compete with domestic workers for low-skilled jobs, some immigrants specialize in activities that otherwise would not exist in an area, and thus can be beneficial for all domestic residents. Immigration and foreign labor documentation fees increased over 80% in 2007, with over 90% of funding for USCIS derived from immigration application fees, creating many USCIS jobs involving immigration to the US, such as immigration interview officials, fingerprint processors, Department of Homeland Security, etc. Inequality Overall immigration has not had much effect on native wage inequality but low-skill immigration has been linked to greater income inequality in the native population. Impact of undocumented immigrants Research on the economic effects of undocumented immigrants is scant but existing peer-reviewed studies suggest that the effects are positive for the native population and public coffers. A 2015 study shows that "increasing deportation rates and tightening border control weakens low-skilled labor markets, increasing unemployment of native low-skilled workers. Legalization, instead, decreases the unemployment rate of low-skilled natives and increases income per native." Studies show that legalization of undocumented immigrants would boost the U.S. economy; a 2013 study found that granting legal status to undocumented immigrants would raise their incomes by a quarter (increasing U.S. GDP by approximately $1.4 trillion over a ten-year period), and 2016 study found that "legalization would increase the economic contribution of the unauthorized population by about 20%, to 3.6% of private-sector GDP." A 2007 literature by the Congressional Budget Office found that estimating the fiscal effects of undocumented immigrants has proven difficult: "currently available estimates have significant limitations; therefore, using them to determine an aggregate effect across all states would be difficult and prone to considerable error". The impact of undocumented immigrants differs on federal levels than state and local levels, with research suggesting modest fiscal costs at the state and local levels but with substantial fiscal gains at the federal level. In 2009, a study by the Cato Institute, a free market think tank, found that legalization of low-skilled illegal resident workers in the US would result in a net increase in US GDP of $180 billion over ten years. The Cato Institute study did not examine the impact on per capita income for most Americans. Jason Riley notes that because of progressive income taxation, in which the top 1% of earners pay 37% of federal income taxes (even though they actually pay a lower tax percentage based on their income), 60% of Americans collect more in government services than they pay in, which also reflects on immigrants. In any event, the typical immigrant and their children will pay a net $80,000 more in their lifetime than they collect in government services according to the NAS. Legal immigration policy is set to maximize net taxation. Illegal immigrants even after an amnesty tend to be recipients of more services than they pay in taxes. In 2010, an econometrics study by a Rutgers economist found that immigration helped increase bilateral trade when the incoming people were connected via networks to their country of origin, particularly boosting trade of final goods as opposed to intermediate goods, but that the trade benefit weakened when the immigrants became assimilated into American culture. According to NPR in 2005, about 3% of illegal immigrants were working in agriculture. The H-2A visa allows U.S. employers to bring foreign nationals to the United States to fill temporary agricultural jobs. The passing of tough immigration laws in several states from around 2009 provides a number of practical case studies. The state of Georgia passed immigration law HB 87 in 2011; this led, according to the coalition of top Kansas businesses, to 50% of its agricultural produce being left to rot in the fields, at a cost to the state of more than $400 million. Overall losses caused by the act were $1 billion; it was estimated that the figure would become over $20 billion if all the estimated 325,000 unauthorized workers left Georgia. The cost to Alabama of its crackdown in June 2011 has been estimated at almost $11 billion, with up to 80,000 unauthorized immigrant workers leaving the state. Impact of refugees Studies of refugees' impact on native welfare are scant but the existing literature shows a positive fiscal impact and mixed results (negative, positive and no significant effects) on native welfare. A 2017 paper by Evans and Fitzgerald found that refugees to the United States pay "$21,000 more in taxes than they receive in benefits over their first 20 years in the U.S." An internal study by the Department of Health and Human Services under the Trump administration, which was suppressed and not shown to the public, found that refugees to the United States brought in $63 billion more in government revenues than they cost the government. According to labor economist Giovanni Peri, the existing literature suggests that there are no economic reasons why the American labor market could not easily absorb 100,000 Syrian refugees in a year. Refugees integrate more slowly into host countries' labor markets than labor migrants, in part due to the loss and depreciation of human capital and credentials during the asylum procedure. Innovation and entrepreneurship According to one survey of the existing economic literature, "much of the existing research points towards positive net contributions by immigrant entrepreneurs". Areas where immigrants are more prevalent in the United States have substantially more innovation (as measured by patenting and citations). Immigrants to the United States start businesses at higher rates than natives. According to a 2018 paper, "first-generation immigrants create about 25% of new firms in the United States, but this share exceeds 40% in some states". Another 2018 paper links H-1B visa holders to innovation. Immigrants have been linked to greater invention and innovation in the US. According to one report, "immigrants have started more than half (44 of 87) of America's startup companies valued at $1 billion or more and are key members of management or product development teams in over 70 percent (62 of 87) of these companies". Foreign doctoral students are a major source of innovation in the American economy. In the United States, immigrant workers hold a disproportionate share of jobs in science, technology, engineering, and math (STEM): "In 2013, foreign-born workers accounted for 19.2 percent of STEM workers with a bachelor's degree, 40.7 percent of those with a master's degree, and more than half—54.5 percent—of those with a Ph.D." The Kauffman Foundation's index of entrepreneurial activity is nearly 40% higher for immigrants than for natives. Immigrants were involved in the founding of many prominent American high-tech companies, such as Google, Yahoo, YouTube, Sun Microsystems, and eBay. Social Discrimination Irish immigration was opposed in the 1850s by the nativist Know Nothing movement, originating in New York in 1843. It was engendered by popular fears that the country was being overwhelmed by Irish Catholic immigrants. On March 14, 1891, a lynch mob stormed a local jail and lynched several Italians following the acquittal of several Sicilian immigrants alleged to be involved in the murder of New Orleans police chief David Hennessy. The Congress passed the Emergency Quota Act in 1921, followed by the Immigration Act of 1924. The Immigration Act of 1924 was aimed at limiting immigration overall, and making sure that the nationalities of new arrivals matched the overall national profile. Business A 2014 meta-analysis of racial discrimination in product markets found extensive evidence of minority applicants being quoted higher prices for products. A 1995 study found that car dealers "quoted significantly lower prices to white males than to black or female test buyers using identical, scripted bargaining strategies". A 2013 study found that eBay sellers of iPods received 21 percent more offers if a white hand held the iPod in the photo than a black hand. Criminal justice system Research suggests that police practices, such as racial profiling, over-policing in areas populated by minorities and in-group bias may result in disproportionately high numbers of racial minorities among crime suspects. Research also suggests that there may be possible discrimination by the judicial system, which contributes to a higher number of convictions for racial minorities. A 2012 study found that "(i) juries formed from all-white jury pools convict black defendants significantly (16 percentage points) more often than white defendants, and (ii) this gap in conviction rates is entirely eliminated when the jury pool includes at least one black member." Research has found evidence of in-group bias, where "black (white) juveniles who are randomly assigned to black (white) judges are more likely to get incarcerated (as opposed to being placed on probation), and they receive longer sentences". In-group bias has also been observed when it comes to traffic citations, as black and white police officers are more likely to cite out-groups. Education A 2015 study using correspondence tests "found that when considering requests from prospective students seeking mentoring in the future, faculty were significantly more responsive to white males than to all other categories of students, collectively, particularly in higher-paying disciplines and private institutions". Through affirmative action, there is reason to believe that elite colleges favor minority applicants. Housing A 2014 meta-analysis found extensive evidence of racial discrimination in the American housing market. Minority applicants for housing needed to make many more enquiries to view properties. Geographical steering of African-Americans in US housing remained significant. A 2003 study finds "evidence that agents interpret an initial housing request as an indication of a customer's preferences, but also are more likely to withhold a house from all customers when it is in an integrated suburban neighborhood (redlining). Moreover, agents' marketing efforts increase with asking price for white, but not for black, customers; blacks are more likely than whites to see houses in suburban, integrated areas (steering); and the houses agents show are more likely to deviate from the initial request when the customer is black than when the customer is white. These three findings are consistent with the possibility that agents act upon the belief that some types of transactions are relatively unlikely for black customers (statistical discrimination)." A report by the federal Department of Housing and Urban Development where the department sent African-American people and white people to look at apartments found that African-American people were shown fewer apartments to rent and houses for sale. Labor market Several meta-analyses find extensive evidence of ethnic and racial discrimination in hiring in the American labor market. A 2016 meta-analysis of 738 correspondence tests—tests where identical CVs for stereotypically black and white names were sent to employers—in 43 separate studies conducted in OECD countries between 1990 and 2015 found that there is extensive racial discrimination in hiring decisions in Europe and North-America. These correspondence tests showed that equivalent minority candidates need to send around 50% more applications to be invited for an interview than majority candidates. A study that examined the job applications of actual people provided with identical résumés and similar interview training showed that African-American applicants with no criminal record were offered jobs at a rate as low as white applicants who had criminal records. Discrimination between minority groups Racist thinking among and between minority groups does occur; examples of this are conflicts between black people and Korean immigrants, notably in the 1992 Los Angeles Riots, and between African Americans and non-white Latino immigrants. There has been a long running racial tension between African American and Mexican prison gangs, as well as significant riots in California prisons where they have targeted each other, for ethnic reasons. There have been reports of racially-motivated attacks against African Americans who have moved into neighborhoods occupied mostly by people of Mexican origin, and vice versa. There has also been an increase in violence between non-Hispanic white people and Latino immigrants, and between African immigrants and African Americans. Assimilation A 2018 study in the American Sociological Review found that within racial groups, most immigrants to the United States had fully assimilated within a span of 20 years. Immigrants arriving in the United States after 1994 assimilate more rapidly than immigrants who arrived in previous periods. Measuring assimilation can be difficult due to "ethnic attrition", which refers to when descendants of migrants cease to self-identify with the nationality or ethnicity of their ancestors. This means that successful cases of assimilation will be underestimated. Research shows that ethnic attrition is sizable in Hispanic and Asian immigrant groups in the United States. By taking ethnic attrition into account, the assimilation rate of Hispanics in the United States improves significantly. A 2016 paper challenges the view that cultural differences are necessarily an obstacle to long-run economic performance of migrants. It finds that "first generation migrants seem to be less likely to success the more culturally distant they are, but this effect vanishes as time spent in the US increases". A 2020 study found that recent immigrants to the United States assimilated at a similar pace as historical immigrants. Religious diversity Immigration from South Asia and elsewhere has contributed to enlarging the religious composition of the United States. Islam in the United States is growing mainly due to immigration. Hinduism in the United States, Buddhism in the United States, and Sikhism in the United States are other examples. Whereas non-Christians together constitute only 4% of the U.S. population, they made up 20% of the 2003 cohort of new immigrants. Since 1992, an estimated 1.7 million Muslims, approximately 1 million Hindus, and approximately 1 million Buddhists have immigrated legally to the United States. Conversely, non-religious people are underrepresented in the immigrant populations. Although "other" non-Christian religions are also slightly more common among immigrants than among U.S. adults—1.9% compared with 1.0%—those professing no religion are slightly under-represented among new immigrants. Whereas 12% of immigrants said they had no religion, the figure was 15% for adult Americans. This lack of representation for non-religious people could be related to stigmas around atheists and agnostics or could relate to the need for identity when entering a new country. Labor unions The American Federation of Labor (AFL), a coalition of labor unions formed in the 1880s, vigorously opposed unrestricted immigration from Europe for moral, cultural, and racial reasons. The issue unified the workers who feared that an influx of new workers would flood the labor market and lower wages. Nativism was not a factor because upwards of half the union members were themselves immigrants or the sons of immigrants from Ireland, Germany and Britain. However, nativism was a factor when the AFL even more strenuously opposed all immigration from Asia because it represented (to its Euro-American members) an alien culture that could not be assimilated into American society. The AFL intensified its opposition after 1906 and was instrumental in passing immigration restriction bills from the 1890s to the 1920s, such as the 1921 Emergency Quota Act and the Immigration Act of 1924, and seeing that they were strictly enforced. Mink (1986) concluded that the AFL and the Democratic Party were linked partly on the basis of immigration issues, noting the large corporations, which supported the Republicans, wanted more immigration to augment their labor force. United Farm Workers during Cesar Chavez tenure was committed to restricting immigration. Chavez and Dolores Huerta, cofounder and president of the UFW, fought the Bracero Program that existed from 1942 to 1964. Their opposition stemmed from their belief that the program undermined U.S. workers and exploited the migrant workers. Since the Bracero Program ensured a constant supply of cheap immigrant labor for growers, immigrants could not protest any infringement of their rights, lest they be fired and replaced. Their efforts contributed to Congress ending the Bracero Program in 1964. In 1973, the UFW was one of the first labor unions to oppose proposed employer sanctions that would have prohibited hiring illegal immigrants. On a few occasions, concerns that illegal immigrant labor would undermine UFW strike campaigns led to a number of controversial events, which the UFW describes as anti-strikebreaking events, but which have also been interpreted as being anti-immigrant. In 1973, Chavez and members of the UFW marched through the Imperial and Coachella Valleys to the border of Mexico to protest growers' use of illegal immigrants as strikebreakers. Joining him on the march were Reverend Ralph Abernathy and U.S. Senator Walter Mondale. In its early years, the UFW and Chavez went so far as to report illegal immigrants who served as strikebreaking replacement workers (as well as those who refused to unionize) to the Immigration and Naturalization Service. In 1973, the United Farm Workers set up a "wet line" along the United States–Mexico border to prevent Mexican immigrants from entering the United States illegally and potentially undermining the UFW's unionization efforts. During one such event, in which Chavez was not involved, some UFW members, under the guidance of Chavez's cousin Manuel, physically attacked the strikebreakers after peaceful attempts to persuade them not to cross the border failed. In 1979, Chavez used a forum of a U.S. Senate committee hearing to denounce the federal immigration service, in which he said the U.S. Immigration and Naturalization Service purportedly refused to arrest illegal Mexican immigrants who Chavez claims are being used to break the union's strike. Political A Boston Globe article attributed Barack Obama's win in the 2008 U.S. presidential election to a marked reduction over the preceding decades in the percentage of white people in the American electorate, attributing this demographic change to the Immigration Act of 1965. The article quoted Simon Rosenberg, president and founder of the New Democrat Network, as having said that the Act is "the most important piece of legislation that no one's ever heard of", and that it "set America on a very different demographic course than the previous 300 years". Immigrants differ on their political views; however, the Democratic Party is considered to be in a far stronger position among immigrants overall. Research shows that religious affiliation can also significantly impact both the social values and voting patterns of immigrants, as well as the broader American population. Hispanic evangelicals, for example, are more strongly conservative than non-Hispanic evangelicals. This trend is often similar for Hispanics or others strongly identifying with the Catholic Church, a religion that strongly opposes abortion and gay marriage. The key interests groups that lobby on immigration are religious, ethnic and business groups, together with some liberals and some conservative public policy organizations. Both the pro- and anti- groups affect policy. Studies have suggested that some special interest groups lobby for less immigration for their own group and more immigration for other groups since they see effects of immigration, such as increased labor competition, as detrimental when affecting their own group but beneficial when affecting other groups. A 2011 paper found that both pro- and anti-immigration special interest groups play a role in migration policy. "Barriers to migration are lower in sectors in which business lobbies incur larger lobbying expenditures and higher in sectors where labor unions are more important." A 2011 study examining the voting of US representatives on migration policy suggests that "representatives from more skilled labor abundant districts are more likely to support an open immigration policy towards the unskilled, whereas the opposite is true for representatives from more unskilled labor abundant districts". After the 2010 election, Gary Segura of Latino Decisions stated that Hispanic voters influenced the outcome and "may have saved the Senate for Democrats". Several ethnic lobbies support immigration reforms that would allow illegal immigrants that have succeeded in entering to gain citizenship. They may also lobby for special arrangements for their own group. The Chairman for the Irish Lobby for Immigration Reform has stated that "the Irish Lobby will push for any special arrangement it can get—'as will every other ethnic group in the country. The irredentist and ethnic separatist movements for Reconquista and Aztlán see immigration from Mexico as strengthening their cause. The book Ethnic Lobbies and US Foreign Policy (2009) states that several ethnic special interest groups are involved in pro-immigration lobbying. Ethnic lobbies also influence foreign policy. The authors wrote that "Increasingly, ethnic tensions surface in electoral races, with House, Senate, and gubernatorial contests serving as proxy battlegrounds for antagonistic ethnoracial groups and communities. In addition, ethnic politics affect party politics as well, as groups compete for relative political power within a party". However, the authors argued that ethnic interest groups, in general, do not currently have too much power in foreign policy and can balance other special interest groups. In a 2012 news story, Reuters reported, "Strong support from Hispanics, the fastest-growing demographic in the United States, helped tip President Barack Obama's fortunes as he secured a second term in the White House, according to Election Day polling." Lately, there is talk among several Republican leaders, such as governors Bobby Jindal and Susana Martinez, of taking a new, friendlier approach to immigration. Former US Secretary of Commerce Carlos Gutierrez is promoting the creation of Republicans for Immigration Reform. Bernie Sanders opposes guest worker programs and is also skeptical about skilled immigrant (H-1B) visas, saying, "Last year, the top 10 employers of H-1B guest workers were all offshore outsourcing companies. These firms are responsible for shipping large numbers of American information technology jobs to India and other countries." In an interview with Vox he stated his opposition to an open borders immigration policy, describing it as: In April 2018, then-president Trump called for National Guard at the border to secure the ongoing attempts at a border wall along the United States–Mexico border. According to the Los Angeles Times, "Defense Secretary James N. Mattis has signed an order to send up to 4,000 National Guard troops to the U.S.–Mexico border but barred them from interacting with migrants detained by the Border Patrol in most circumstances". The caravan of migrants from Central America have reached the United States to seek asylum. The last of the caravan have arrived and are processing as of May 4, 2018. Remarks by Attorney General Sessions have expressed hesitation with asylum seekers. Sessions has stated, "The system is being gamed; there's no doubt about it". This statement implied asylum seekers were attempting to immigrate to the United States for work or various other reasons rather than seeking refuge. Health A 2020 study found no evidence that immigration was associated with adverse health impacts for native-born Americans. To the contrary, the study found that "the presence of low‐skilled immigrants may improve the health of low‐skilled U.S.‐born individuals", possibly by moving low-skilled Americans from physically dangerous and risky jobs toward occupations that require more communication and interactive ability. On average, per capita health care spending is lower for immigrants than it is for native-born Americans. The non-emergency use of emergency rooms ostensibly indicates an incapacity to pay, yet some studies allege disproportionately lower access to unpaid healthcare by immigrants. For this and other reasons, there have been various disputes about how much immigration is costing the United States public health system. University of Maryland economist and Cato Institute scholar Julian Lincoln Simon concluded in 1995 that while immigrants probably pay more into the health system than they take out, this is not the case for elderly immigrants and refugees, who are more dependent on public services for survival. Immigration itself may impact women's health. A 2017 study found that Latino women suffer higher rates of intimate partner violence (IPV) than native US women. Migration may worsen IPV rates and outcomes. Migration itself may not cause IPV, but it may make it more difficult for women to get help. According to Kim et al., the IPV is usually the result of unequal family structures rather than the process of migration. Immigration from areas of high incidences of disease is thought to have been one of the causes of the resurgence of tuberculosis (TB), chagas, and hepatitis in areas of low incidence. According to Centers for Disease Control and Prevention (CDC), TB cases among foreign-born individuals remain disproportionately high, at nearly nine times the rate of U.S.-born persons. To reduce the risk of diseases in low-incidence areas, the main countermeasure has been the screening of immigrants on arrival. HIV/AIDS entered the United States in around 1969, likely through a single infected immigrant from Haiti. Conversely, many new HIV infections in Mexico can be traced back to the United States. People infected with HIV were banned from entering the United States in 1987 by executive order, but the 1993 statute supporting the ban was lifted in 2009. The executive branch is expected to administratively remove HIV from the list of infectious diseases barring immigration, but immigrants generally would need to show that they would not be a burden on public welfare. Researchers have also found what is known as the "healthy immigrant effect", in which immigrants in general tend to be healthier than individuals born in the U.S. Immigrants are more likely than native-born Americans to have a medical visit labeled uncompensated care. Crime There is no empirical evidence that either legal or illegal immigration increases crime in the United States. In fact, a majority of studies in the U.S. have found lower crime rates among immigrants than among non-immigrants, and that higher concentrations of immigrants are associated with lower crime rates. Explanations proposed to account for this relationship have included ethnic enclaves, self-selection, and the hypothesis that immigrants revitalize communities to which they emigrate. Some research even suggests that increases in immigration may partly explain the reduction in the U.S. crime rate. A 2005 study showed that immigration to large U.S. metropolitan areas does not increase, and in some cases decreases, crime rates there. A 2009 study found that recent immigration was not associated with homicide in Austin, Texas. The low crime-rates of immigrants to the United States despite having lower levels of education, lower levels of income and residing in urban areas (factors that should lead to higher crime-rates) may be due to lower rates of antisocial behavior among immigrants. A 2015 study found that Mexican immigration to the United States was associated with an increase in aggravated assaults and a decrease in property crimes. A 2016 study finds no link between immigrant populations and violent crime, although there is a small but significant association between undocumented immigrants and drug-related crime. A 2018 study found that undocumented immigration to the United States did not increase violent crime. Research finds that Secure Communities, an immigration enforcement program which led to a quarter of a million of detentions (when the study was published; November 2014), had no observable impact on the crime rate. A 2015 study found that the 1986 Immigration Reform and Control Act, which legalized almost 3 million immigrants, led to "decreases in crime of 3–5 percent, primarily due to decline in property crimes, equivalent to 120,000–180,000 fewer violent and property crimes committed each year due to legalization". According to one study, sanctuary cities—which adopt policies designed to not prosecute people solely for being an illegal immigrant—have no statistically meaningful effect on crime. One of the first political analyses in the U.S. of the relationship between immigration and crime was performed in the beginning of the 20th century by the Dillingham Commission, which found a relationship especially for immigrants from non-Northern European countries, resulting in the sweeping 1920s immigration reduction acts, including the Emergency Quota Act of 1921, which favored immigration from northern and western Europe. Recent research is skeptical of the conclusion drawn by the Dillingham Commission. One study finds that "major government commissions on immigration and crime in the early twentieth century relied on evidence that suffered from aggregation bias and the absence of accurate population data, which led them to present partial and sometimes misleading views of the immigrant-native criminality comparison. With improved data and methods, we find that in 1904, prison commitment rates for more serious crimes were quite similar by nativity for all ages except ages 18 and 19, for which the commitment rate for immigrants was higher than for the native-born. By 1930, immigrants were less likely than natives to be committed to prisons at all ages 20 and older, but this advantage disappears when one looks at commitments for violent offenses." For the early twentieth century, one study found that immigrants had "quite similar" imprisonment rates for major crimes as natives in 1904 but lower for major crimes (except violent offenses; the rate was similar) in 1930. Contemporary commissions used dubious data and interpreted it in questionable ways. Research suggests that police practices, such as racial profiling, over-policing in areas populated by minorities and in-group bias may result in disproportionately high numbers of immigrants among crime suspects. Research also suggests that there may be possible discrimination by the judicial system, which contributes to a higher number of convictions for immigrants. Crimmigration Crimmigration has emerged as a field in which critical immigration scholars conceptualize the current immigration law enforcement system. Crimmigration is broadly defined as the convergence of the criminal justice system and immigration enforcement, where immigration law enforcement has adopted the "criminal" law enforcement approach. This frames undocumented immigrants as "criminal" deviants and security risks. Crime and migration control have become completely intertwined, so much so that both undocumented and documented individuals suspected of being a noncitizen may be targeted. Using a "crimmigration" point of thought, César Cuauhtémoc García Hernández explains the criminalization of undocumented immigrants began in the aftermath of the civil rights movement. Michelle Alexander explores how the U.S. criminal justice system is made of "colorblind" policies and law enforcement practices that have shaped the mass incarceration of people of color into an era of "The New Jim Crow". As Alexander and García Hernández state, overt racism and racist laws became culturally scorned, and covert racism became the norm. This new form of racism focuses on penalizing criminal activity and promoting "neutral" rhetoric. "Crimmigration" recognizes how laws and policies throughout different states contribute to the convergence of criminal law enforcement and immigration law. For example, states are implementing a variety of immigration-related criminal offenses that are punishable by imprisonment. California, Oregon, and Wyoming criminalize the use of fraudulent immigration or citizenship documents. Arizona allows judges to confine witnesses in certain "criminal" cases if they are suspected of being in the U.S. without documentation. The most common violations of immigration law on the federal level are unauthorized entry (a federal misdemeanor) and unauthorized reentry (a federal felony). These "offenses" deemed as "crimes" under immigration law set the tone of "crimmigration" and for what García Hernández refers to as the "removal pipeline" of immigrants. Some scholars focus on the organization of "crimmigration" as it relates to the mass removal of certain immigrants. Jennifer Chacón finds that immigration law enforcement is being decentralized. Customs and Border Patrol (CBP), Immigration and Customs Enforcement (ICE), and the Department of Homeland Security (DHS) are the central law enforcement agencies in control of enforcing immigration law. However, other federal, state and local law enforcement agencies, such as sheriff's offices, municipal police departments, the Federal Bureau of Investigation (FBI), and the Drug and Enforcement Agency (DEA), aid in immigrant removal. In 1996, Congress expanded power to state and local law enforcement agencies to enforce federal immigration law. These agencies keep people locked up in jails or prison when they receive an "immigration detainer" from ICE, and therefore aid in interior enforcement. In addition, some agencies participate in the State Criminal Alien Assistance Program ("SCAAP"), which gives these agencies financial incentives to cooperate with ICE in identifying immigrants in their custody. Education Scientific laboratories and startup Internet opportunities have been a significant factor in immigration to the United States. By 2000, 23% of scientists with a PhD in the U.S. were immigrants, including 40% of those in engineering and computers. Roughly a third of the United States' college and universities graduate students in STEM fields are foreign nationals—in some states it is well over half of their graduate students. On Ash Wednesday, March 5, 2014, the presidents of 28 Catholic and Jesuit colleges and universities joined the "Fast for Families" movement. The "Fast for Families" movement reignited the immigration debate in the autumn of 2013 when the movement's leaders, supported by many members of Congress and the President, fasted for twenty-two days on the National Mall in Washington, D.C. A study on public schools in California found that white enrollment declined in response to increases in the number of Spanish-speaking Limited English Proficient and Hispanic students. This white flight was greater for schools with relatively larger proportions of Spanish-speaking Limited English Proficient. A North Carolina study found that the presence of Latin American children in schools had no significant negative effects on peers, but that students with limited English skills had slight negative effects on peers. Science and engineering In the United States, a significant proportion of scientists and engineers are foreign-born, as well as students in science and engineering programs. However, this is not unique to the US since foreigners make up significant amounts of scientists and engineers in other countries. As of 2011, 28% of graduate students in science, engineering, and health are foreign. The number of science and engineering (S&E) bachelor's degrees has increased steadily over the past 15 years, reaching a new peak of about half a million in 2009. Since 2000, foreign-born students in the United States have consistently earned a small share (3–4%) of S&E degrees at the bachelor's level. Foreign students make up a much higher proportion of S&E master's degree recipients than of bachelor's or associate degree recipients. In 2009, foreign students earned 27% of S&E master's degrees and 33% in doctorate degrees. Significant numbers of foreign-born students in science and engineering are not unique to America, since foreign students now account for nearly 60% of graduate students in mathematics, computer sciences, and engineering globally. In Switzerland and the United Kingdom, more than 40% of doctoral students are foreign. A number of other countries, including Austria, Australia, Belgium, Canada, New Zealand, and the United States, have relatively high percentages (more than 20%) of doctoral students who are foreign. Foreign student enrollment in the United Kingdom has been increasing. In 2008, foreign students made up 47% of all graduate students studying S&E in the United Kingdom (an increase from 32% in 1998). Top destinations for international students include the United Kingdom (12%), Germany (9%), and France (9%). Together with the U.S., these countries receive more than half of all internationally mobile students worldwide. Although the United States continues to attract the largest number and fraction of foreign students worldwide, its share of foreign students has decreased in recent years. 55% of Ph.D. students in engineering in the United States are foreign-born (2004). Between 1980 and 2000, the percentage of Ph.D. scientists and engineers employed in the United States who were born abroad increased from 24% to 37%. 45% of Ph.D. physicists working in the United States were foreign-born in 2004. 80% of total post-doctoral chemical and materials engineering in the United States were foreign-born in 1988. At the undergraduate level, US-born engineering students constitute upwards of 90–95% of the student population (most foreign-born candidates for engineering graduate schools are trained in their home countries). However, the pool of BS engineering graduates with US citizenship is much larger than the number who apply to engineering graduate schools. The proportion of foreign-born engineers among assistant professors younger than 35 years increased from 10% in 1972 to 50–55% in 1983–1985, illustrating a dramatic increase on US dependence on foreign-born students in the US college system. The increase in non-citizen assistant professors of engineering is the result of the fact that, in recent years, foreign-born engineers received close to 50 percent of newly awarded engineering doctorates (naturalized citizens accounted for about 4 percent) and, furthermore, they entered academe in disproportionately large numbers. 33% of all U.S. Ph.D.s in science and engineering were awarded to foreign-born graduate students as of 2004. In 1982, foreign-born engineers constituted about 3.6% of all engineers employed in the United States, 13.9% of which were naturalized; and foreign-born Ph.D.s in Engineering constituted 15% and 20% were naturalized. In 1985, foreign-born Ph.D.s represented almost 33% of the engineering post-doctorate researchers in US universities. Foreign-born Ph.D. engineers often accept postdoctoral positions because other employment is unavailable until a green card is obtained. A system that further incentivising replacement of US citizens in the upper echelons of academic and private sector engineering firms due to higher educational attainment relative to native-born engineer who for the most part do train beyond undergraduate level. In recent years, the number of applicants for faculty openings at research universities have increased dramatically. Numbers of 50 to 200 applications for a single faculty opening have become typical, yet even with such high numbers of applicants, the foreign-born component is in excess of 50%. 60% of the top science students and 65 percent of the top math students in the United States are the children of immigrants. In addition, foreign-born high school students make up 50 percent of the 2004 U.S.Math Olympiad's top scorers, 38 percent of the U.S. Physics Team, and 25 percent of the Intel Science Talent Search finalists—the United States' most prestigious awards for young scientists and mathematicians. Among 1985 foreign-born engineering doctorate holders, about 40% expected to work in the United States after graduating. An additional 17 percent planned to stay on as post-doctorates, and most of these are likely to remain permanently in the United States. Thus, almost 60% of foreign-born engineering doctorate holders are likely to become part of the US engineering labor force within a few years after graduating. The other approximately 40% of foreign born engineering PhDs mostly likely find employment working for multinational corporations outside of the US. In the 2004 Intel Science Talent Search, more children (18) have parents who entered the country on H-1B (professional) visas than parents born in the United States (16). New H-1B visa holders each year represent less than 0.04 percent of the U.S. population. Foreign born faculty now account for over 50% of faculty in engineering (1994). 27 out the 87 (more than 30%) American Nobel Prize winners in Medicine and Physiology between 1901 and 2005 were born outside the US. 1993 median salaries of U.S. recipients of Ph.D.s in Science and Engineering foreign-born vs. native-born were as follows: Lobbying Major American corporations spent $345 million lobbying for just three pro-immigration bills between 2006 and 2008. The two most prominent groups lobbying for more restrictive immigration policies for the United States are NumbersUSA and the Federation for American Immigration Reform (FAIR); additionally, the Center for Immigration Studies think tank produces policy analysis supportive of a more restrictive stance. Public opinion The ambivalent feeling of Americans toward immigrants is shown by a positive attitude toward groups that have been visible for a century or more, and much more negative attitude toward recent arrivals. For example, a 1982 national poll by the Roper Center at the University of Connecticut showed respondents a card listing a number of groups and asked, "Thinking both of what they have contributed to this country and have gotten from this country, for each one tell me whether you think, on balance, they've been a good or a bad thing for this country", which produced the results shown in the table. "By high margins, Americans are telling pollsters it was a very good thing that Poles, Italians, and Jews immigrated to America. Once again, it's the newcomers who are viewed with suspicion. This time, it's the Mexicans, the Filipinos, and the people from the Caribbean who make Americans nervous." In a 2002 study, which took place soon after the September 11 attacks, 55% of Americans favored decreasing legal immigration, 27% favored keeping it at the same level, and 15% favored increasing it. In 2006, the immigration-reduction advocacy think tank the Center for Immigration Studies released a poll that found that 68% of Americans think U.S. immigration levels are too high, and just 2% said they are too low. They also found that 70% said they are less likely to vote for candidates that favor increasing legal immigration. In 2004, 55% of Americans believed legal immigration should remain at the current level or increased and 41% said it should be decreased. The less contact a native-born American has with immigrants, the more likely they would have a negative view of immigrants. One of the most important factors regarding public opinion about immigration is the level of unemployment; anti-immigrant sentiment is where unemployment is highest, and vice versa. Surveys indicate that the U.S. public consistently makes a sharp distinction between legal and illegal immigrants, and generally views those perceived as "playing by the rules" with more sympathy than immigrants who have entered the country illegally. According to a Gallup poll in July 2015, immigration is the fourth most important problem facing the United States and seven percent of Americans said it was the most important problem facing America today. In March 2015, another Gallup poll provided insight into American public opinion on immigration; the poll revealed that 39% of people worried about immigration "a great deal". A January poll showed that only 33% of Americans were satisfied with the current state of immigration in America. Before 2012, a majority of Americans supported securing United States borders compared to dealing with illegal immigrants in the United States. In 2013, that trend has reversed and 55% of people polled by Gallup revealed that they would choose "developing a plan to deal with immigrants who are currently in the U.S. illegally". Changes regarding border control are consistent across party lines, with the percentage of Republicans saying that "securing U.S. borders to halt flow of illegal immigrants" is extremely important decreasing from 68% in 2011 to 56% in 2014. Meanwhile, Democrats who chose extremely important shifted from 42% in 2011 to 31% in 2014. In July 2013, 87% of Americans said they would vote in support of a law that would "allow immigrants already in the country to become U.S. citizens if they meet certain requirements including paying taxes, having a criminal background check and learning English". However, in the same survey, 83% also said they would support the tightening of U.S. border security. Donald Trump's campaign for presidency focused on a rhetoric of reducing illegal immigration and toughening border security. In July 2015, 48% of Americans thought that Donald Trump would do a poor job of handling immigration problems. In November 2016, 55% of Trump's voters thought that he would do the right thing regarding illegal immigration. In general, Trump supporters are not united upon how to handle immigration. In December 2016, Trump voters were polled and 60% said that "undocumented immigrants in the U.S. who meet certain requirements should be allowed to stay legally". American opinion regarding how immigrants affect the country and how the government should respond to illegal immigration have changed over time. In 2006, out of all U.S. adults surveyed, 28% declared that they believed the growing number of immigrants helped American workers and 55% believed that it hurt American workers. In 2016, those views had changed, with 42% believing that they helped and 45% believing that they hurt. The PRRI 2015 American Values Atlas showed that between 46% and 53% of Americans believed that "the growing number of newcomers from other countries ... strengthens American society". In the same year, between 57% and 66% of Americans chose that the U.S. should "allow [immigrants living in the U.S. illegally] a way to become citizens provided they meet certain requirements". In February 2017, the American Enterprise Institute released a report on recent surveys about immigration issues. In July 2016, 63% of Americans favored the temporary bans of immigrants from areas with high levels of terrorism and 53% said the U.S. should allow fewer refugees to enter the country. In November 2016, 55% of Americans were opposed to building a border wall with Mexico. Since 1994, Pew Research center has tracked a change from 63% of Americans saying that immigrants are a burden on the country to 27%. The Trump administraton's zero-tolerance policy was reacted to negatively by the public. One of the main concerns was how detained children of illegal immigrants were treated. Due to very poor conditions, a campaign was begun called "Close the Camps". Detainment facilities were compared to concentration and internment camps. After the 2021 evacuation from Afghanistan in August 2021, an NPR/Ipsos poll (±4.6%) found 69% of Americans supported resettling in the United States Afghans who had worked with the U.S., with 65% support for Afghans who "fear repression or persecution from the Taliban". There was lower support for other refugees: 59% for those "fleeing from civil strife and violence in Africa", 56% for those "fleeing from violence in Syria and Libya", and 56% for "Central Americans fleeing violence and poverty". 57% supported the Trump-era Remain in Mexico policy, and 55% supported legalizing the status of those illegally brought to the U.S. as children (as proposed in the DREAM Act). Religious responses Religious figures in the United States have stated their views on the topic of immigration as informed by their religious traditions. Catholicism – In 2018, Catholic leaders stated that asylum-limiting laws proposed by the Trump administration were immoral. Some bishops considered imposing sanctions (known as "canonical penalties") on church members who have participated in enforcing such policies. Judaism – American Jewish rabbis from various denominations have stated that their understanding of Judaism is that immigrants and refugees should be welcomed, and even assisted. The exception would be if there is significant economic hardship or security issues faced by the host country or community, in which case immigration may be limited, discouraged or even prohibited altogether. Some liberal denominations place more emphasis on the welcoming of immigrants, while Conservative, Orthodox and Independent rabbis also consider economic and security concerns. Some provide moral arguments for both the right of country to enforce immigration standards as well as for providing some sort of amnesty for illegal migrants. Legal issues Laws concerning immigration and naturalization Laws concerning immigration and naturalization include: the Immigration Act of 1990 (IMMACT), which limits the annual number of immigrants to 700,000. It emphasizes that family reunification is the main immigration criterion, in addition to employment-related immigration. the Antiterrorism and Effective Death Penalty Act (AEDPA) the Illegal Immigration Reform and Immigrant Responsibility Act (IIRIRA) The Naturlization Act of 1790 The Alien and Sedition Acts of 1798 The Chinese Act of 1882, which banned the immigration of Chinese people. The Johsnon-Reed Act of 1924 which limited the number of immigrants. AEDPA and IIRARA exemplify many categories of criminal activity for which immigrants, including green card holders, can be deported and have imposed mandatory detention for certain types of cases. Asylum for refugees In contrast to economic migrants, who generally do not gain legal admission, refugees, as defined by international law, can gain legal status through a process of seeking and receiving asylum, either by being designated a refugee while abroad, or by physically entering the United States and requesting asylum status thereafter. A specified number of legally-defined refugees, who either apply for asylum overseas or after arriving in the U.S., are admitted annually. Refugees compose about one-tenth of the total annual immigration to the United States, though some large refugee populations are very prominent. In 2014, the number of asylum seekers accepted into the U.S. was about 120,000. By comparison, about 31,000 were accepted in the UK and 13,500 in Canada. Since 1975, more than 1.3 million refugees from Asia have been resettled in the United States. Since 2000 the main refugee-sending regions have been Somalia, Liberia, Sudan, and Ethiopia. The limit for refugee resettlement for fiscal year 2008 was 80,000 refugees. The United States expected to admit a minimum of 17,000 Iraqi refugees during fiscal year 2009. The U.S. has resettled more than 42,000 Bhutanese refugees from Nepal since 2008. In fiscal year 2008, the Office of Refugee Resettlement (ORR) appropriated over $655 million for long-term services provided to refugees after their arrival in the US. The Obama administration has kept to about the same level. A common problem in the current system for asylum seekers is the lack of resources. Asylum offices in the United States receive more applications for asylum than they can process every month and every year. These continuous applications cause a significant backlog. The U.S. plans to resettle up to 30,000 Afghan SIV applicants into the United States. Miscellaneous documented immigration In removal proceedings in front of an immigration judge, cancellation of removal is a form of relief that is available for certain long-time residents of the United States. It allows a person being faced with the threat of removal to obtain permanent residence if that person has been physically present in the U.S. for at least ten years, has had good moral character during that period, has not been convicted of certain crimes, and can show that removal would result in exceptional and extremely unusual hardship to their U.S. citizen or permanent resident spouse, children, or parent. This form of relief is only available when a person is served with a Notice to Appear to appear in the proceedings in the court. Members of Congress may submit private bills granting residency to specific named individuals. A special committee vets the requests, which require extensive documentation. The Central Intelligence Agency has the statutory authority to admit up to one hundred people a year outside of normal immigration procedures, and to provide for their settlement and support. The program is called "PL110", named after the legislation that created the agency, Public Law 110, the Central Intelligence Agency Act. Illegal immigration The illegal immigrant population of the United States is estimated to be between 11 and 12 million. The population of unauthorized immigrants peaked in 2007 and has declined since that time. The majority of the U.S. unauthorized immigrants are from Mexico, but "their numbers (and share of the total) have been declining" and as of 2016 Mexicans no longer make up a clear majority of unauthorized immigrants, as they did in the past. Unauthorized immigrants made up about 5% of the total U.S. civilian labor force in 2014. By the 2010s, an increasing share of U.S. unauthorized immigrants were long-term residents; in 2015, 66% of adult unauthorized residents had lived in the country for at least ten years, while only 14% had lived in the U.S. for less than five years. In June 2012, President Obama issued a memorandum instructing officers of the federal government to defer deporting young undocumented immigrants who were brought to the U.S. as children as part of the Deferred Action for Childhood Arrivals (DACA) program. Under the program, eligible recipients who applied and were granted DACA status were granted a two-year deferral from deportation and temporary eligibility to work legally in the country. Among other criteria, to be eligible a youth applicant must (1) be between age 15 and 31; (2) have come to the United States before the age of 16; (3) have lived in the U.S. continuously for at least five years; (4) be a current student, or have earned a high school diploma or equivalent, or have received an honorable discharge from the U.S. armed services; and (5) must not "have not been convicted of a felony, significant misdemeanor, or three or more misdemeanors, and [does] not otherwise pose a threat to public safety or national security". The Migration Policy Institution estimated that as of 2016, about 1.3 million unauthorized young adults ages 15 and older were "immediately eligible for DACA"; of this eligible population, 63% had applied as of March 2016. Children of legal migrants will not qualify as Dreamers under DACA protection because they entered the country legally. This is highlighted as the biggest contradiction in US immigration policy by many advocates of legal immigrants. In 2014, President Obama announced a set of executive actions, the Deferred Action for Parents of Americans and Lawful Permanent Residents. Under this program, "unauthorized immigrants who are parents of U.S. citizens or lawful permanent residents (LPRs) would qualify for deferred action for three years if they meet certain other requirements". A February 2016 Migration Policy Institute/Urban Institute report found that about 3.6 million people were potentially eligible for DAPA and "more than 10 million people live in households with at least one potentially DAPA-eligible adult, including some 4.3 million children under age 18an estimated 85 percent of whom are U.S. citizens". The report also found that "the potentially DAPA eligible are well settled with strong U.S. roots, with 69 percent having lived in the United States ten years or more, and 25 percent at least 20 years". Although not without precedent under prior presidents, President Obama's authority to create DAPA and expand DACA were challenged in the federal courts by Texas and 25 other states. In November 2015, the U.S. Court of Appeals for the Fifth Circuit, in a 2–1 decision in United States v. Texas, upheld a preliminary injunction blocking the programs from going forward. The case was heard by the U.S. Supreme Court, which in June 2016 deadlocked 4–4, thus affirming the ruling of the Fifth Circuit but setting no nationally-binding precedent. Military immigration On November 15, 2013, the United States Citizenship and Immigration Services announced that they would be issuing a new policy memorandum called "parole in place". Parole in place would offer green cards to immigrant parents, spouses and children of active military duty personnel. Prior to this law, relatives of military personnelexcluding husbands and wiveswere forced to leave the United States and apply for green cards in their home countries. The law allows for family members to avoid the possible ten-year bar from the United States and remain in the United States while applying for lawful permanent residence. The parole status, given in one year terms, will be subject to the family member being "absent a criminal conviction or other serious adverse factors". Military children born in foreign countries are considered American from birth, assuming both parents were American citizens at the time of birth. Children born to American citizens will have to process Conciliary Reports of Birth Abroad. This report of birth abroad is the equivalent of a birth certificate and the child will use the report in place of a birth certificate for documentation. However, children born in foreign countries to United States servicemembers before they have gained citizenship could only gain citizenship through the naturalization process. Treatment as civil proceedings Most immigration proceedings are civil matters, including deportation proceedings, asylum cases, employment without authorization, and visa overstay. People who evade border enforcement (such as by crossing outside any official border checkpoint), who commit fraud to gain entry, or who commit identity theft to gain employment, may face criminal charges. People entering illegally were seldom charged with this crime until Operation Streamline in 2005. Conviction of this crime generally leads to a prison term, after which the person is deported if they are not eligible to remain in the country. The guarantees under the Sixth Amendment to the United States Constitution, such as the right to counsel, and the right to a jury trial, have not been held to apply to civil immigration proceedings. As a result, people generally represent themselves in asylum and deportation cases unless they can afford an immigration lawyer or receive assistance from a legal charity. In contrast, the Due Process Clause of the Fifth Amendment has been applied to immigration proceedings. Because the right to confrontation in the Sixth Amendment does not apply, people can be ordered deported in absentiawithout being present at the immigration proceeding. Removal proceedings are considered administrative proceedings under the authority of the United States Attorney General, acting through the Executive Office for Immigration Review, part of the Justice Department. Immigration judges are employees of the Justice Department, and thus part of the executive branch rather than the judicial branch of government. Appeals are heard within the EOIR by the Board of Immigration Appeals, and the Attorney General may intervene in individual cases, within the bounds of due process. After various actions by Attorney General Jeff Sessions pressuring judges to speed up deportations, the National Association of Immigration Judges and The Boston Globe editorial board called for moving immigration courts to the judicial branch, to prevent abuse by strengthening separation of powers. Detention policy Whether people who are awaiting a decision on their deportation are detained or released to live in the United States in the meantime (possibly paying bail) is a matter of both law and discretion of the Justice Department. The policy has varied over time and differs for those with crimes (including entry outside an official checkpoint) versus civil infractions. The 2001 Supreme Court case Zadvydas v. Davis held that immigrants who cannot be deported because no country will accept them cannot be detained indefinitely. Immigration in popular culture The history of immigration to the United States is the history of the country itself, and the journey from beyond the sea is an element found in American folklore, appearing in many works, such as The Godfather, Gangs of New York, "The Song of Myself", Neil Diamond's "America", and the animated feature An American Tail. From the 1880s to the 1910s, vaudeville dominated the popular image of immigrants, with very popular caricature portrayals of ethnic groups. The specific features of these caricatures became widely accepted as accurate portrayals. In The Melting Pot (1908), playwright Israel Zangwill (1864–1926) explored issues that dominated Progressive Era debates about immigration policies. Zangwill's theme of the positive benefits of the American melting pot resonated widely in popular culture and literary and academic circles in the 20th century; his cultural symbolismin which he situated immigration issueslikewise informed American cultural imagining of immigrants for decades, as exemplified by Hollywood films. The popular culture's image of ethnic celebrities often includes stereotypes about immigrant groups. For example, Frank Sinatra's public image as a superstar contained important elements of the American Dream while simultaneously incorporating stereotypes about Italian Americans that were based in nativist and Progressive responses to immigration. The process of assimilation has been a common theme of popular culture. For example, "lace-curtain Irish" refers to middle-class Irish Americans desiring assimilation into mainstream society in counterpoint to the older, more raffish "shanty Irish". The occasional malapropisms and social blunders of these upward mobiles were lampooned in vaudeville, popular song, and the comic strips of the day such as Bringing Up Father, starring Maggie and Jiggs, which ran in daily newspapers for 87 years (1913 to 2000). In The Departed (2006), Staff Sergeant Dignam regularly points out the dichotomy between the lace-curtain Irish lifestyle Billy Costigan enjoyed with his mother, and the shanty Irish lifestyle of Costigan's father. In recent years, the popular culture has paid special attention to Mexican immigration; the film Spanglish (2004) tells of a friendship of a Mexican housemaid (played by Paz Vega) and her boss (played by Adam Sandler). Immigration in literature Novelists and writers have captured much of the color and challenge in their immigrant lives through their writings. Regarding Irish women in the 19th century, there were numerous novels and short stories by Harvey O'Higgins, Peter McCorry, Bernard O'Reilly and Sarah Orne Jewett that emphasize emancipation from Old World controls, new opportunities and expansiveness of the immigrant experience. Hladnik studies three popular novels of the late 19th century that warned Slovenes not to immigrate to the dangerous new world of the United States. Jewish American writer Anzia Yezierska wrote her novel Bread Givers (1925) to explore such themes as Russian-Jewish immigration in the early 20th century, the tension between Old and New World Yiddish culture, and women's experience of immigration. A well established author Yezierska focused on the Jewish struggle to escape the ghetto and enter middle- and upper-class America. In the novel, the heroine, Sara Smolinsky, escapes from New York City's "down-town ghetto" by breaking tradition. She quits her job at the family store and soon becomes engaged to a rich real-estate magnate. She graduates college and takes a high-prestige job teaching public school. Finally Sara restores her broken links to family and religion. The Swedish author Vilhelm Moberg, in the mid-20th century, wrote a series of four novels describing one Swedish family's migration from Småland to Minnesota in the late 19th century, a destiny shared by almost one million people. The author emphasizes the authenticity of the experiences as depicted (although he did change names). These novels have been translated into English (The Emigrants, 1951, Unto a Good Land, 1954, The Settlers, 1961, The Last Letter Home, 1961). The musical Kristina från Duvemåla by ex-ABBA members Björn Ulvaeus and Benny Andersson is based on this story. The Immigrant is a musical by Steven Alper, Sarah Knapp, and Mark Harelik. The show is based on the story of Harelik's grandparents, Matleh and Haskell Harelik, who traveled to Galveston, Texas in 1909. Documentary films In their documentary How Democracy Works Now: Twelve Stories, filmmakers Shari Robertson and Michael Camerini examine the American political system through the lens of immigration reform from 2001 to 2007. Since the debut of the first five films, the series has become an important resource for advocates, policy-makers and educators. That film series premiered nearly a decade after the filmmakers' landmark documentary film Well-Founded Fear which provided a behind-the-scenes look at the process for seeking asylum in the United States. That film still marks the only time that a film-crew was privy to the private proceedings at the U.S. Immigration and Naturalization Service (INS), where individual asylum officers ponder the often life-or-death fate of immigrants seeking asylum. In the documentary "Trafficked with Mariana van Zeller", it was argued that weapons smuggling from the United States contributed to insecurity in Latin America, itself triggering more migration to the United States. Overall approach to regulation University of North Carolina law professor Hiroshi Motomura has identified three approaches the United States has taken to the legal status of immigrants in his book Americans in Waiting: The Lost Story of Immigration and Citizenship in the United States. The first, dominant in the 19th century, treated immigrants as in transition; in other words, as prospective citizens. As soon as people declared their intention to become citizens, they received multiple low-cost benefits, including the eligibility for free homesteads in the Homestead Act of 1869, and in many states, the right to vote. The goal was to make the country more attractive, so large numbers of farmers and skilled craftsmen would settle new lands. By the 1880s, a second approach took over, treating newcomers as "immigrants by contract". An implicit deal existed where immigrants who were literate and could earn their own living were permitted in restricted numbers. Once in the United States, they would have limited legal rights, but were not allowed to vote until they became citizens, and would not be eligible for the New Deal government benefits available in the 1930s. The third and more recent policy is "immigration by affiliation", which Motomura argues is the treatment which depends on how deeply rooted people have become in the country. An immigrant who applies for citizenship as soon as permitted, has a long history of working in the United States, and has significant family ties, is more deeply affiliated and can expect better treatment. The American Dream is the belief that through hard work and determination, any United States immigrant can achieve a better life, usually in terms of financial prosperity and enhanced personal freedom of choice. According to historians, the rapid economic and industrial expansion of the U.S. is not simply a function of being a resource rich, hard working, and inventive country, but the belief that anybody could get a share of the country's wealth if he or she was willing to work hard. This dream has been a major factor in attracting immigrants to the United States. See also Demographics of the United States Emigration from the United States European colonization of the Americas History of laws concerning immigration and naturalization in the United States How Democracy Works Now: Twelve Stories Illegal immigration to the United States Immigration policies of American labor unions Inequality within immigrant families (United States) Nativism (politics), opposition to immigration Opposition to immigration United States immigration statistics Immigrant benefits urban legend, a hoax regarding benefits comparison References {{Reflist|30em|refs= <ref name="interdisciplinary50">Espenshade, Thomas J. and Belanger, Maryanne (1998) "Immigration and Public Opinion." In Marcelo M. Suarez-Orozco, ed. Crossings: Mexican Immigration in Interdisciplinary Perspectives. Cambridge, Mass.: David Rockefeller Center for Latin American Studies and Harvard University Press, pp. 365–403</ref> }} Further reading Surveys Anbinder, Tyler. City of Dreams: The 400-Year Epic History of Immigrant New York (Houghton Mifflin Harcourt, 2016). 766 pp. Archdeacon, Thomas J. Becoming American: An Ethnic History (1984) Bankston, Carl L. III and Danielle Antoinette Hidalgo, eds. Immigration in U.S. History Salem Press, (2006) short scholarly biographies With bibliographies; 448 pp. Bodnar, John. The Transplanted: A History of Immigrants in Urban America Indiana University Press, (1985) Daniels, Roger. Asian America: Chinese and Japanese in the United States since 1850 University of Washington Press, (1988) Daniels, Roger. Coming to America 2nd ed. (2005) Daniels, Roger. Guarding the Golden Door : American Immigration Policy and Immigrants since 1882 (2005) Diner, Hasia. The Jews of the United States, 1654 to 2000 (2004) Dinnerstein, Leonard, and David M. Reimers. Ethnic Americans: a history of immigration (1999) online Gerber, David A. American Immigration: A Very Short Introduction (2011). Gjerde, Jon, ed. Major Problems in American Immigration and Ethnic History (1998). Glazier, Michael, ed. The Encyclopedia of the Irish in America (1999). Jones, Maldwyn A. American immigration (1960) online Joselit, Jenna Weissman. Immigration and American religion (2001) online Parker, Kunal M. Making Foreigners: Immigration and Citizenship Law in America, 1600–2000. New York: Cambridge University Press, 2015. Sowell, Thomas. Ethnic America: A History (1981). Thernstrom, Stephan, ed. Harvard Encyclopedia of American Ethnic Groups (1980). Before 1920 Alexander, June Granatir. Daily Life in Immigrant America, 1870–1920: How the Second Great Wave of Immigrants Made Their Way in America (Chicago: Ivan R. Dee, 2007. xvi, 332 pp.) Berthoff, Rowland Tappan. British Immigrants in Industrial America, 1790–1950 (1953). Briggs, John. An Italian Passage: Immigrants to Three American Cities, 1890–1930 Yale University Press, (1978). Diner, Hasia. Hungering for America: Italian, Irish, and Jewish Foodways in the Age of Migration (2003). Dudley, William, ed. Illegal immigration: opposing viewpoints (2002) online Eltis, David; Coerced and Free Migration: Global Perspectives (2002) emphasis on migration to Americas before 1800. Greene, Victor R. A Singing Ambivalence: American Immigrants Between Old World and New, 1830–1930 (2004), covering musical traditions. Isaac Aaronovich Hourwich. Immigration and Labor: The Economic Aspects of European Immigration to the United States (1912) (full text online) Joseph, Samuel; Jewish Immigration to the United States from 1881 to 1910 Columbia University Press, (1914). Kulikoff, Allan; From British Peasants to Colonial American Farmers (2000), details on colonial immigration. Meagher, Timothy J. The Columbia Guide to Irish American History. (2005). Miller, Kerby M. Emigrants and Exiles (1985), influential scholarly interpretation of Irish immigration Motomura, Hiroshi. Americans in Waiting: The Lost Story of Immigration and Citizenship in the United States (2006), legal history. Pochmann, Henry A. and Arthur R. Schultz; German Culture in America, 1600–1900: Philosophical and Literary Influences (1957). Waters, Tony. Crime and Immigrant Youth Sage Publications (1999), a sociological analysis. U.S. Immigration Commission, Abstracts of Reports, 2 vols. (1911); the full 42-volume report is summarized (with additional information) in Jeremiah W. Jenks and W. Jett Lauck, The Immigrant Problem (1912; 6th ed. 1926) Wittke, Carl. We Who Built America: The Saga of the Immigrant (1939), covers all major groups Yans-McLaughlin, Virginia ed. Immigration Reconsidered: History, Sociology, and Politics Oxford University Press. (1990) Recent: post 1965 Beasley, Vanessa B. ed. Who Belongs in America?: Presidents, Rhetoric, And Immigration (2006) Bogen, Elizabeth. Immigration in New York (1987) Bommes, Michael and Andrew Geddes. Immigration and Welfare: Challenging the Borders of the Welfare State (2000) Borjas, George J. ed. Issues in the Economics of Immigration (National Bureau of Economic Research Conference Report) (2000). Borjas, George. Friends or Strangers (1990) Briggs, Vernon M., Jr. Immigration Policy and the America Labor Force. Baltimore, MD: Johns Hopkins University Press, 1984. Briggs, Vernon M., Jr. Mass Immigration and the National Interest (1992) Cafaro, Philip. How Many Is Too Many? The Progressive Argument for Reducing Immigration into the United States. University of Chicago Press, 2015. Cooper, Mark A. Moving to the United States of America and Immigration. 2008. Egendorf, Laura K., ed. Illegal immigration : an opposing viewpoints guide (2007) online Fawcett, James T., and Benjamin V. Carino. Pacific Bridges: The New Immigration from Asia and the Pacific Islands. New York: Center for Migration Studies, 1987. Foner, Nancy. In A New Land: A Comparative View Of Immigration (2005) Garland, Libby. After They Closed the Gate: Jewish Illegal Immigration to the United States, 1921–1965. Chicago: University of Chicago Press, 2014. Levinson, David and Melvin Ember, eds. American Immigrant Cultures 2 vol (1997). Lowe, Lisa. Immigrant Acts: On Asian American Cultural Politics (1996) Meier, Matt S. and Gutierrez, Margo, eds. The Mexican American Experience : An Encyclopedia (2003) () Mohl, Raymond A. "Latinization in the Heart of Dixie: Hispanics in Late-twentieth-century Alabama" Alabama Review 2002 55(4): 243–74. Portes, Alejandro, and Robert L. Bach. Latin Journey: Cuban and Mexican Immigrants in the United States. Berkeley, CA: University of California Press, 1985. Portes, Alejandro, and Rubén Rumbaut. Immigrant America. Berkeley, CA: University of California Press, 1990. Reimers, David. Still the Golden Door: The Third World Comes to America. New York: Columbia University Press, (1985). Smith, James P., and Barry Edmonston, eds. The Immigration Debate: Studies on the Economic, Demographic, and Fiscal Effects of Immigration (1998), online version Waters, Tony. Crime and Immigrant Youth Thousand Oaks: Sage 1999. Zhou, Min and Carl L. Bankston III. Growing Up American: How Vietnamese Children Adapt to Life in the United States Russell Sage Foundation. (1998) Borjas, George J. Heaven's Door: Immigration Policy and the American Economy. Princeton, N.J.: Princeton University Press, 1999. xvii, 263 pp. Lamm, Richard D., and Gary Imhoff. The Immigration Time Bomb: the Fragmenting of America, in series, Truman Talley Books''. First ed. New York: E.P. Dutton, 1985. xiii, 271 pp. External links History Immigrant Servants Database Asian-Nation: Early Asian Immigration to the U.S. Irish Catholic Immigration to America Scotch-Irish Immigration to Colonial America Immigration Archives of Historical Documents, Articles, and Immigrants Maurer, Elizabeth. "New Beginnings: Immigrant Women and the American Experience". National Women's History Museum. 2014. Immigration policy Immigration policy reports from the Brookings Institution Immigration policy reports from the Urban Institute Permanent Legal Immigration to the United States: Policy Overview Congressional Research Service (May 2018) A Primer on U.S. Immigration Policy Congressional Research Service (November 2017) Current immigration U.S. Citizenship and Immigration Services U.S. Immigration and Customs Enforcement Cornell University's Legal Information Institute: Immigration Yearbook of Immigration Statistics – United States Department of Homeland Security, Office of Immigration Statistics 2004, 2005 editions available. "Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2005" M. Hoefer, N. Rytina, C. Campbell (2006) "Population Estimates (August). U.S. Department of Homeland Security, Office of Immigration Statistics. Economic impact American culture Demographics of the United States Articles containing video clips
[ 0.42680680751800537, 0.06028218939900398, -0.09197726100683212, 0.03317483514547348, 0.8758316040039062, 0.3412330746650696, 0.3890238106250763, 0.4359721541404724, -0.8218373656272888, -0.32019633054733276, -0.36032599210739136, -0.09113550931215286, -0.6463332176208496, 0.694742560386657...
15052
https://en.wikipedia.org/wiki/Image%20and%20Scanner%20Interface%20Specification
Image and Scanner Interface Specification
Image and Scanner Interface Specification (ISIS) is an industry standard interface for image scanning technologies, developed by Pixel Translations in 1990 (which became EMC Corporation's Captiva Software and later acquired by OpenText). ISIS is an open standard for scanner control and a complete image-processing framework. It is currently supported by a number of application and scanner vendors. Functions The modular design allows the scanner to be accessed both directly or with built-in routines to handle most situations automatically. A message-based interface with tags is used so that features, operations, and formats not yet supported by ISIS can be added as desired without waiting for a new version of the specification. The standard addresses all of the issues that an application using a scanner needs to be concerned with. Functions include but are not limited to selecting, installing, and configuring a new scanner; setting scanner-specific parameters; scanning, reading and writing files, and fast image scaling, rotating, displaying, and printing. Drivers have been written to dynamically process data for operations such as converting grayscale to binary image data. An ISIS interface can run scanners at or above their rated speed by linking drivers together in a pipe so that data flows from a scanner driver to compression driver, to packaging driver, to a file, viewer, or printer in a continuous stream, usually without the need to buffer more than a small portion of the full image. As a result of using the piping method, each driver can be optimised to perform one function well. Drivers are typically small and modular in order to make it simple to add new functionality to an existing application. See also Scanner Access Now Easy TWAIN Windows Image Acquisition External links EMC Captiva Official portal for ISIS developers Image scanning Standards
[ 0.13837185502052307, 0.03582942485809326, 0.6244331002235413, 0.05040707811713219, -0.26376309990882874, 0.178513303399086, -0.45800474286079407, -0.3312976062297821, 0.045860908925533295, -0.542661190032959, -0.0002479305840097368, 0.5951860547065735, -0.4678869843482971, -0.0820699930191...
15053
https://en.wikipedia.org/wiki/Ivo%20Caprino
Ivo Caprino
Ivo Caprino (17 February 1920 – 8 February 2001) was a Norwegian film director and writer, best known for his puppet films. His most noted film, Flåklypa Grand Prix ("Pinchcliffe Grand Prix"), was made in 1975. Early life Caprino was born 17 February 1920 in Oslo, the son of Italian furniture designer Mario Caprino and the artist, Ingeborg "Ingse" Caprino nee Gude, who was a granddaughter of the painter Hans Gude. Ingse Gude was a watercolorist, illustrator, puppet maker, and author, born in Oybin, Saxony. The Caprinos divorced around 1927, and Ingse married the painter Bernhard Folkestad. After his death, she lived with the painter and art critic, Pola Gauguin. Early career In the mid-1940s, Caprino helped his mother design puppets for a puppet theatre, which inspired him to try making a film using his mother's designs. Ivo used the surplus puppets as inspiration for his first animated film, Tim and Tøffe (1948), the result of their collaboration. The eight minute film, however, was not released until 1949. Several other films followed, including two 15-minute shorts that are still shown regularly in Norway, Veslefrikk med Fela (Little Freddy and his Fiddle), based on a Norwegian folk tale; and Karius og Baktus, a story by Thorbjørn Egner of two little trolls—representing caries and bacterium—living in a boy's teeth. Gude made the puppets for these films as well. Work with Ingse Caprino Following the success of Tim og Tøffe, Gude was involved in all of her son's films until 1963. Gude made some puppets for a production by Frithjof Tidemand-Johannessen. Caprino had set up a film studio in the manor house, and Gude started working full-time on new puppets, which often had luscious proportions. The film, Veslefrikk med Fela, was awarded the best children's film at the 13th Venice International Film Festival in 1952. The commissioned production, Den steadhaftige tinnsoldat (The Steadfast Tin Soldier), won several international awards. Gude filled the role of cinematographer on the last film collaboration with her son. The puppet's voice role being played by Liv Strømsted. Gude died 9 December 1963 at Snarøya. The production of puppets was afterwards taken over by her granddaughter Ivonne Caprino. Innovations When making Tim og Tøffe, Caprino invented a method for controlling the puppet's movements in real time. The technique can be described as a primitive, mechanical version of animatronics. Caprino's films received good reviews, and he quickly became a celebrity in Norway. When he switched to traditional stop motion film-making, Caprino tried to maintain the impression that he was still using some kind of "magic" technology to make the puppets move, even though all his later films were made with traditional stop motion techniques. Another innovative method used by the team, was the use of condoms for the creation of the puppets' facial skin. In addition to the short films, Caprino produced dozens of advertising films with puppets. In 1959, he directed a live action feature film, Ugler i Mosen, which also contained stop motion sequences. He then made a feature film about Peter Christen Asbjørnsen, who had travelled around Norway in the 19th century collecting traditional folk tales. The plan was to use live action for the sequences showing Asbjørnsen, and then to realise the folk tales using stop motion. Unfortunately, Caprino was unable to secure funding for the project, so he ended up making the planned folk tale sequences as separate 16-minute puppet films, book-ended by live action sequences showing Asbjørnsen. The Pinchcliffe Grand Prix In 1970, Caprino and his small team of collaborators, started work on a 25-minute TV special, which eventually became The Pinchcliffe Grand Prix. Based on a series of books by Norwegian cartoonist and author, Kjell Aukrust, it featured a group of eccentric characters all living in the small village of Pinchcliffe. The TV special was a collection of sketches based on Aukrust's books, with no real story line. After 1.5 years of work, it was decided that it didn't really work as a whole, so production on the TV special was stopped (except for some very short clips, no material from it has ever been seen by the public), and Caprino and Aukrust instead wrote a screenplay for a feature film using the characters and environments that had already been built. The result was The Pinchcliffe Grand Prix, which stars Theodore Rimspoke (No. Reodor Felgen) and his two assistants, Sonny Duckworth (No. Solan Gundersen), a cheerful and optimistic bird, and Lambert (No. Ludvig), a nervous, pessimistic and melancholic hedgehog. Theodore works as a bicycle repairman, though he spends most of his time inventing weird Rube Goldberg-like contraptions. One day, the trio discover that one of Theodore's former assistants, Rudolph Gore-Slimey (), has stolen his design for a race car engine, and has become a world champion Formula One driver. Sonny secures funding from an Arab oil sheik who happens to be vacationing in Pinchcliffe, and the trio then build a gigantic racing car, Il Tempo Gigante—a fabulous construction with two engines, radar, and its own blood bank. Theodore then enters a race, and ends up winning, beating Gore-Slimey despite his attempts at sabotage. The film was made in 3.5 years by a team of five people. Caprino directed and animated. Bjarne Sandemose (Caprino's principal collaborator throughout his career) built the sets and the cars, and was in charge of the technical side. Ingeborg Riiser modeled the puppets and Gerd Alfsen made the costumes and props. When it came out in 1975, The movie was a large success in Norway, selling one million tickets in its first year of release. It remains the biggest box office hit of all time in Norway. Caprino Studios claims it has sold 5.5 million tickets to date. To help promote the film abroad, Caprino and Sandemose built a full-scale replica of Il Tempo Gigante that is legal for public roads, but is usually exhibited at Hunderfossen Familiepark. Later career Except for some TV work in the late 1970s, Caprino made no more puppet films, focusing instead on creating attractions for the Hunderfossen theme park outside Lillehammer based on his folk tale movies, and making tourist films using a custom built multi camera setup of his own design that shoots 280 degrees panorama movies. Death and afterwards Caprino was born and died in Oslo, but lived all of his life at Snarøya, Bærum. He died in 2001 after having lived several years with cancer. Since Caprino's death, his son Remo has had great success developing a computer game based on Flåklypa Grand Prix. Filmography 1975 – Flåklypa Grand Prix 1967 – Gutten som kappåt med trollet 1966 – Sjuende far i huset 1963 – Papirdragen 1962 – Reveenka 1961 – Askeladden og de gode hjelperne 1959 – Ugler i mosen 1958 – Et hundeliv med meg 1955 – Den standhaftige tinnsoldat 1955 – Klatremus i knipe 1954 – Karius og Baktus 1952 – Veslefrikk med fela 1950 – Musikk på loftet/En dukkedrøm 1949 – Tim og Tøffe See also Ivo Caprinos Supervideograf References External links Caprino Studios – Official page 1920 births 2001 deaths Deaths from cancer in Norway Stop motion animators Norwegian animated film directors Norwegian film editors Norwegian animators Norwegian puppeteers Norwegian people of Italian descent People from Bærum
[ -0.3140714168548584, 0.3284589946269989, -0.03667684644460678, 0.31830522418022156, 0.1097520962357521, 0.694359302520752, -0.056282684206962585, -0.1176578551530838, -0.6016346216201782, 0.27745169401168823, -0.25843071937561035, -0.035392314195632935, -0.1605665385723114, 0.3125559389591...
15054
https://en.wikipedia.org/wiki/Intel%2080286
Intel 80286
The Intel 80286 (also marketed as the iAPX 286 and often called Intel 286) is a 16-bit microprocessor that was introduced on February 1, 1982. It was the first 8086-based CPU with separate, non-multiplexed address and data buses and also the first with memory management and wide protection abilities. The 80286 used approximately 134,000 transistors in its original nMOS (HMOS) incarnation and, just like the contemporary 80186, it could correctly execute most software written for the earlier Intel 8086 and 8088 processors. The 80286 was employed for the IBM PC/AT, introduced in 1984, and then widely used in most PC/AT compatible computers until the early 1990s. History and performance Intel's first 80286 chips were specified for a maximum clockrate of 5, 6 or 8 MHz and later releases for 12.5 MHz. AMD and Harris later produced 16 MHz, 20 MHz and 25 MHz parts, respectively. Intersil and Fujitsu also designed fully static CMOS versions of Intel's original depletion-load nMOS implementation, largely aimed at battery-powered devices. On average, the 80286 was reportedly measured to have a speed of about 0.21 instructions per clock on "typical" programs, although it could be significantly faster on optimized code and in tight loops, as many instructions could execute in 2 clock cycles each. The 6 MHz, 10 MHz, and 12 MHz models were reportedly measured to operate at 0.9 MIPS, 1.5 MIPS, and 2.66 MIPS respectively. The later E-stepping level of the 80286 was free of the several significant errata that caused problems for programmers and operating-system writers in the earlier B-step and C-step CPUs (common in the AT and AT clones). This E-2 stepping part may have been available in later 1986. Intel second sourced this microprocessor to Fujitsu Limited around 1985. Variants Architecture Intel did not expect personal computers to use the 286. The CPU was designed for multi-user systems with multitasking applications, including communications (such as automated PBXs) and real-time process control. It had 134,000 transistors and consisted of four independent units: the address unit, bus unit, instruction unit, and execution unit, organized into a loosely coupled (buffered) pipeline, just as in the 8086. It was produced in a 68-pin package, including PLCC (plastic leaded chip carrier), LCC (leadless chip carrier) and PGA (pin grid array) packages. The performance increase of the 80286 over the 8086 (or 8088) could be more than 100% per clock cycle in many programs (i.e., a doubled performance at the same clock speed). This was a large increase, fully comparable to the speed improvements seven years later when the i486 (1989) or the original Pentium (1993) were introduced. This was partly due to the non-multiplexed address and data buses, but mainly to the fact that address calculations (such as base+index) were less expensive. They were performed by a dedicated unit in the 80286, while the older 8086 had to do effective address computation using its general ALU, consuming several extra clock cycles in many cases. Also, the 80286 was more efficient in the prefetch of instructions, buffering, execution of jumps, and in complex microcoded numerical operations such as MUL/DIV than its predecessor. The 80286 included, in addition to all of the 8086 instructions, all of the new instructions of the 80186: ENTER, LEAVE, BOUND, INS, OUTS, PUSHA, POPA, PUSH immediate, IMUL immediate, and immediate shifts and rotates. The 80286 also added new instructions for protected mode: ARPL, CLTS, LAR, LGDT, LIDT, LLDT, LMSW, LSL, LTR, SGDT, SIDT, SLDT, SMSW, STR, VERR, and VERW. Some of the instructions for protected mode can (or must) be used in real mode to set up and switch to protected mode, and a few (such as SMSW and LMSW) are useful for real mode itself. The Intel 80286 had a 24-bit address bus and was able to address up to 16 MB of RAM, compared to the 1 MB addressability of its predecessor. However, memory cost and the initial rarity of software using the memory above 1 MB meant that 80286 computers were rarely shipped with more than one megabyte of RAM. Additionally, there was a performance penalty involved in accessing extended memory from real mode (in which DOS, the dominant PC operating system until the mid-1990s, ran), as noted below. Features Protected mode The 286 was the first of the x86 CPU family to support protected virtual-address mode, commonly called "protected mode". In addition, it was the first commercially available microprocessor with on-chip MMU capabilities (systems using the contemporaneous Motorola 68010 and NS320xx could be equipped with an optional MMU controller). This would allow IBM compatibles to have advanced multitasking OSes for the first time and compete in the Unix-dominated server/workstation market. Several additional instructions were introduced in the protected mode of 80286, which are helpful for multitasking operating systems. Another important feature of 80286 is the prevention of unauthorized access. This is achieved by: Forming different segments for data, code, and stack, and preventing their overlapping. Assigning privilege levels to each segment. Segments with lower privilege levels cannot access segments with higher privilege levels. In 80286 (and in its co-processor Intel 80287), arithmetic operations can be performed on the following different types of numbers: unsigned packed decimal, unsigned binary, unsigned unpacked decimal, signed binary, floating-point numbers (only with an 80287). By design, the 286 could not revert from protected mode to the basic 8086-compatible real address mode ("real mode") without a hardware-initiated reset. In the PC/AT introduced in 1984, IBM added external circuitry, as well as specialized code in the ROM BIOS and the 8042 peripheral microcontroller to enable software to cause the reset, allowing real-mode reentry while retaining active memory and returning control to the program that initiated the reset. (The BIOS is necessarily involved because it obtains control directly whenever the CPU resets.) Though it worked correctly, the method imposed a huge performance penalty. In theory, real-mode applications could be directly executed in 16-bit protected mode if certain rules (newly proposed with the introduction of the 80286) were followed; however, as many DOS programs did not conform to those rules, protected mode was not widely used until the appearance of its successor, the 32-bit Intel 80386, which was designed to go back and forth between modes easily and to provide an emulation of real mode within protected mode. When Intel designed the 286, it was not designed to be able to multitask real-mode applications; real mode was intended to be a simple way for a bootstrap loader to prepare the system and then switch to protected mode; essentially, in protected mode the 80286 was designed to be a new processor with many similarities to its predecessors, while real mode on the 80286 was offered for smaller-scale systems that could benefit from a more advanced version of the 80186 CPU core, with advantages such as higher clock rates, faster instruction execution (measured in clock cycles), and unmultiplexed buses, but not the 24-bit (16 MB) memory space. To support protected mode, new instructions have been added: ARPL, VERR, VERW, LAR, LSL, SMSW, SGDT, SIDT, SLDT, STR, LMSW, LGDT, LIDT, LLDT, LTR, CLTS. There are also new exceptions (internal interrupts): invalid opcode, coprocessor not available, double fault, coprocessor segment overrun, stack fault, segment overrun/general protection fault, and others only for protected mode. OS support The protected mode of the 80286 was not routinely utilized in PC applications until many years after its release, in part because of the high cost of adding extended memory to a PC, but also because of the need for software to support the large user base of 8086 PCs. For example, in 1986 the only program that made use of it was VDISK, a RAM disk driver included with PC DOS 3.0 and 3.1. A DOS could utilize the additional RAM available in protected mode (extended memory) either via a BIOS call (INT 15h, AH=87h), as a RAM disk, or as emulation of expanded memory. The difficulty lay in the incompatibility of older real-mode DOS programs with protected mode. They simply could not natively run in this new mode without significant modification. In protected mode, memory management and interrupt handling were done differently than in real mode. In addition, DOS programs typically would directly access data and code segments that did not belong to them, as real mode allowed them to do without restriction; in contrast, the design intent of protected mode was to prevent programs from accessing any segments other than their own unless special access was explicitly allowed. While it was possible to set up a protected-mode environment that allowed all programs access to all segments (by putting all segment descriptors into the GDT and assigning them all the same privilege level), this undermined nearly all of the advantages of protected mode except the extended (24-bit) address space. The choice that OS developers faced was either to start from scratch and create an OS that would not run the vast majority of the old programs, or to come up with a version of DOS that was slow and ugly (i.e., ugly from an internal technical viewpoint) but would still run a majority of the old programs. Protected mode also did not provide a significant enough performance advantage over the 8086-compatible real mode to justify supporting its capabilities; actually, except for task switches when multitasking, it actually yielded only a performance disadvantage, by slowing down many instructions through a litany of added privilege checks. In protected mode, registers were still 16-bit, and the programmer was still forced to use a memory map composed of 64 kB segments, just like in real mode. In January 1985, Digital Research previewed the Concurrent DOS 286 1.0 operating system developed in cooperation with Intel. The product would function strictly as an 80286 native-mode (i.e. protected-mode) operating system, allowing users to take full advantage of the protected mode to perform multi-user, multitasking operations while running 8086 emulation. This worked on the B-1 prototype step of the chip, but Digital Research discovered problems with the emulation on the production level C-1 step in May, which would not allow Concurrent DOS 286 to run 8086 software in protected mode. The release of Concurrent DOS 286 was delayed until Intel would develop a new version of the chip. In August, after extensive testing on E-1 step samples of the 80286, Digital Research acknowledged that Intel corrected all documented 286 errata, but said that there were still undocumented chip performance problems with the prerelease version of Concurrent DOS 286 running on the E-1 step. Intel said that the approach Digital Research wished to take in emulating 8086 software in protected mode differed from the original specifications. Nevertheless, in the E-2 step, they implemented minor changes in the microcode that would allow Digital Research to run emulation mode much faster. Named IBM 4680 OS, IBM originally chose DR Concurrent DOS 286 as the basis of their IBM 4680 computer for IBM Plant System products and point-of-sale terminals in 1986. Digital Research's FlexOS 286 version 1.3, a derivation of Concurrent DOS 286, was developed in 1986, introduced in January 1987, and later adopted by IBM for their IBM 4690 OS, but the same limitations affected it. The problems led to Bill Gates famously referring to the 80286 as a "brain-dead chip", since it was clear that the new Microsoft Windows environment would not be able to run multiple MS-DOS applications with the 286. It was arguably responsible for the split between Microsoft and IBM, since IBM insisted that OS/2, originally a joint venture between IBM and Microsoft, would run on a 286 (and in text mode). Other operating systems that used the protected mode of the 286 were Microsoft Xenix (around 1984), Coherent, and Minix. These were less hindered by the limitations of the 80286 protected mode because they did not aim to run MS-DOS applications or other real-mode programs. In its successor 80386 chip, Intel enhanced the protected mode to address more memory and also added the separate virtual 8086 mode, a mode within protected mode with much better MS-DOS compatibility, in order to satisfy the diverging needs of the market. Support components This list of bus interface components that connects to Intel 80286 microprocessor. 82258 Advanced Direct Memory Access Controller – Transfer rate of 8MB per second, supports up to 32 subchannels, mask and compare, verify, translation, and assembly/disassembly operation that are being processed simultaneously. It also support 16MB addressing range. This were available for USD $170 in quantities of 100. 82C284 Clock Generator and Driver - Intel second sourced this 82284 version to Fujitsu Limited around 1985. 82288 Bus Controller 82289 Bus Arbiter See also U80601 – Almost identical copy of the 80286 manufactured 1989/1990 in East Germany. In the Soviet Union a clone of the 80286 was designated KR1847VM286 (). iAPX, for the iAPX name LOADALL – Undocumented 80286/80386 instruction that could be used to gain access to all available memory in real mode. Windows/286 References External links Intel Datasheets Intel 80286 and 80287 Programmer's Reference Manual at bitsavers.org Intel 80286 Programmer's Reference Manual 1987 (txt). Hint: use e.g. Hebrew (IBM-862) encoding. Linux on 286 laptops and notebooks Intel 80286 images and descriptions at cpu-collection.de CPU-INFO: 80286, in-depth processor history Overview of all 286 compatible chips Intel 80286 CPU Information, including chip errata and undocumented behaviour Intel 80286 Hardware Reference Manual 16-bit microprocessors Computer-related introductions in 1982 80286
[ 0.06639929860830307, 0.48711100220680237, 0.3185291886329651, 0.09792272001504898, -0.20387941598892212, 0.1565907597541809, 0.11049269884824753, 0.5000801682472229, -0.03658440336585045, -0.1288268268108368, 0.040057651698589325, 0.8838290572166443, -0.6574286818504333, -0.186841681599617...
15055
https://en.wikipedia.org/wiki/Ivanhoe
Ivanhoe
Ivanhoe: A Romance () by Walter Scott is a historical novel published in three volumes, in 1819, as one of the Waverley novels. At the time it was written, the novel represented a shift by Scott away from writing novels set in Scotland in the fairly recent past to England in the Middle Ages. Ivanhoe proved to be one of the best-known and most influential of Scott's novels. Set in 12th-century England, with colourful descriptions of a tournament, outlaws, a witch trial, and divisions between Jews and Christians, Ivanhoe is credited for increased interest in chivalric romance and medievalism. John Henry Newman claimed that Scott "had first turned men's minds in the direction of the Middle Ages", while Thomas Carlyle and John Ruskin likewise asserted Scott's great influence upon the revival of interest in the medieval period, primarily based upon the publication of the novel Ivanhoe. Moreover, Ivanhoe much influenced popular perceptions of Richard the Lionheart, King John, and Robin Hood. Composition and sources In June 1819, Walter Scott still suffered from the severe stomach pains that had forced him to dictate the last part of The Bride of Lammermoor, and also most of A Legend of the Wars of Montrose, which he finished at the end of May. By the beginning of July, at the latest, Scott had started dictating his new novel Ivanhoe, again with John Ballantyne and William Laidlaw as amanuenses. For the second half of the manuscript, Scott was able to take up the pen, and completed Ivanhoe: A Romance in early November 1819. For detailed information about the Middle Ages Scott drew on three works by the antiquarian Joseph Strutt: Horda Angel-cynnan or a Compleat View of the Manners, Customs, Arms, Habits etc. of the Inhabitants of England (1775–76), Dress and Habits of the People of England (1796–99), and Sports and Pastimes of the People of England (1801). Two historians gave him a solid grounding in the period: Robert Henry with The History of Great Britain (1771–93), and Sharon Turner with The History of the Anglo-Saxons from the Earliest Period to the Norman Conquest (1799–1805). His clearest debt to an original medieval source involved the Templar Rule, reproduced in The Theatre of Honour and Knight-Hood (1623) translated from the French of André Favine. Scott was happy to introduce details from the later Middle Ages, and Chaucer was particularly helpful, as (in a different way) was the fourteenth-century romance Richard Coeur de Lion. Editions Ivanhoe was published by Archibald Constable in Edinburgh. All first editions carry the date of 1820, but it was released on 20 December 1819 and issued in London on the 29th by Hurst, Robinson and Co.. As with all of the Waverley novels before 1827, publication was anonymous. The print run was 10,000 copies, and the cost was £1 10s (£1.50, equivalent in purchasing power to £149 in 2021). It is possible that Scott was involved in minor changes to the text during the early 1820s but his main revision was carried out in 1829 for the 'Magnum' edition where the novel appeared in Volumes 16 and 17 in September and October 1830. The standard modern edition, by Graham Tulloch, appeared as Volume 8 of the Edinburgh Edition of the Waverley Novels in 1998: this is based on the first edition with emendations principally from Scott's manuscript in the second half of the work; the new Magnum material is included in Volume 25b. Plot introduction Ivanhoe is the story of one of the remaining Anglo-Saxon noble families at a time when the nobility in England was overwhelmingly Norman. It follows the Saxon protagonist, Sir Wilfred of Ivanhoe, who is out of favour with his father for his allegiance to the Norman king Richard the Lionheart. The story is set in 1194, after the failure of the Third Crusade, when many of the Crusaders were still returning to their homes in Europe. King Richard, who had been captured by Leopold of Austria on his return journey to England, was believed to still be in captivity. Plot summary Opening Protagonist Wilfred of Ivanhoe is disinherited by his father Cedric of Rotherwood for supporting the Norman King Richard and for falling in love with the Lady Rowena, a ward of Cedric and descendant of the Saxon Kings of England. Cedric planned to have Rowena marry the powerful Lord Athelstane, a pretender to the Crown of England by his descent from the last Saxon King, Harold Godwinson. Ivanhoe accompanies King Richard on the Third Crusade, where he is said to have played a notable role in the Siege of Acre; and tends to Louis of Thuringia, who suffers from malaria. The book opens with a scene of Norman knights and prelates seeking the hospitality of Cedric. They are guided there by a pilgrim, known at that time as a palmer. Also returning from the Holy Land that same night, Isaac of York, a Jewish moneylender, seeks refuge at Rotherwood. Following the night's meal, the palmer observes one of the Normans, the Templar Brian de Bois-Guilbert, issue orders to his Saracen soldiers to capture Isaac. The palmer then assists in Isaac's escape from Rotherwood, with the additional aid of the swineherd Gurth. Isaac of York offers to repay his debt to the palmer with a suit of armour and a war horse to participate in the tournament at Ashby-de-la-Zouch Castle, on his inference that the palmer was secretly a knight. The palmer is taken by surprise, but accepts the offer. The tournament The tournament is presided over by Prince John. Also in attendance are Cedric, Athelstane, Lady Rowena, Isaac of York, his daughter Rebecca, Robin of Locksley and his men, Prince John's advisor Waldemar Fitzurse, and numerous Norman knights. On the first day of the tournament, in a bout of individual jousting, a mysterious knight, identifying himself only as "Desdichado" (described in the book as Spanish, taken by the Saxons to mean Disinherited), defeats Bois-Guilbert. The masked knight declines to reveal himself despite Prince John's request, but is nevertheless declared the champion of the day and is permitted to choose the Queen of the Tournament. He bestows this honour upon Lady Rowena. On the second day, at a melee, Desdichado is the leader of one party, opposed by his former adversaries. Desdichado's side is soon hard-pressed and he himself beset by multiple foes until rescued by a knight nicknamed Le Noir Faineant ('the Black Sluggard'), who thereafter departs in secret. When forced to unmask himself to receive his coronet (the sign of championship), Desdichado is identified as Wilfred of Ivanhoe, returned from the Crusades. This causes much consternation to Prince John and his court who now fear the imminent return of King Richard. Ivanhoe is severely wounded in the competition yet his father does not move quickly to tend to him. Instead, Rebecca, a skilled healer, tends to him while they are lodged near the tournament and then convinces her father to take Ivanhoe with them to their home in York when he is fit for that trip. The conclusion of the tournament includes feats of archery by Locksley, such as splitting a willow reed with his arrow. Prince John's dinner for the local Saxons ends in insults. Capture and rescue In the forests between Ashby and York, Isaac, Rebecca and the wounded Ivanhoe are abandoned by their guards, who fear bandits and take all of Isaac's horses. Cedric, Athelstane and the Lady Rowena meet them and agree to travel together. The party is captured by de Bracy and his companions and taken to Torquilstone, the castle of Front-de-Boeuf. The swineherd Gurth and Wamba the jester manage to escape, and then encounter Locksley, who plans a rescue. The Black Knight, having taken refuge for the night in the hut of local friar, the Holy Clerk of Copmanhurst, volunteers his assistance on learning about the captives from Robin of Locksley. They then besiege the Castle of Torquilstone with Robin's own men, including the friar and assorted Saxon yeomen. Inside Torquilstone, de Bracy expresses his love for the Lady Rowena but is refused. Brian de Bois-Guilbert tries to seduce Rebecca and is rebuffed. Front-de-Boeuf tries to wring a hefty ransom from Isaac of York, but Isaac refuses to pay unless his daughter is freed. When the besiegers deliver a note to yield up the captives, their Norman captors demand a priest to administer the Final Sacrament to Cedric; whereupon Cedric's jester Wamba slips in disguised as a priest, and takes the place of Cedric, who escapes and brings important information to the besiegers on the strength of the garrison and its layout. The besiegers storm the castle. The castle is set aflame during the assault by Ulrica, the daughter of the original lord of the castle, Lord Torquilstone, as revenge for her father's death. Front-de-Boeuf is killed in the fire while de Bracy surrenders to the Black Knight, who identifies himself as King Richard and releases de Bracy. Bois-Guilbert escapes with Rebecca while Isaac is rescued by the Clerk of Copmanhurst. The Lady Rowena is saved by Cedric, while the still-wounded Ivanhoe is rescued from the burning castle by King Richard. In the fighting, Athelstane is wounded and presumed dead while attempting to rescue Rebecca, whom he mistakes for Rowena. Rebecca's trial and Ivanhoe's reconciliation Following the battle, Locksley plays host to King Richard. Word is conveyed by de Bracy to Prince John of the King's return and the fall of Torquilstone. In the meantime, Bois-Guilbert rushes with his captive to the nearest Templar Preceptory, where Lucas de Beaumanoir, the Grand Master of the Templars, takes umbrage at Bois-Guilbert's infatuation and subjects Rebecca to a trial for witchcraft. At Bois-Guilbert's secret request, she claims the right to trial by combat; and Bois-Guilbert, who had hoped for the position, is devastated when the Grand-Master orders him to fight against Rebecca's champion. Rebecca then writes to her father to procure a champion for her. Cedric organises Athelstane's funeral at Coningsburgh, in the midst of which the Black Knight arrives with a companion. Cedric, who had not been present at Locksley's carousal, is ill-disposed towards the knight upon learning his true identity; but Richard calms Cedric and reconciles him with his son. During this conversation, Athelstane emerges – not dead, but laid in his coffin alive by monks desirous of the funeral money. Over Cedric's renewed protests, Athelstane pledges his homage to the Norman King Richard and urges Cedric to marry Rowena to Ivanhoe, to which Cedric finally agrees. Soon after this reconciliation, Ivanhoe receives word from Isaac beseeching him to fight on Rebecca's behalf. Ivanhoe, riding day and night, arrives in time for the trial by combat; however, both horse and man are exhausted, with little chance of victory. The two knights make one charge at each other with lances, Bois-Guilbert appearing to have the advantage. However, Bois-Guilbert, a man trying to have it all without offering to marry Rebecca, dies of natural causes in the saddle before the combat can continue. Ivanhoe and Rowena marry and live a long and happy life together. Fearing further persecution, Rebecca and her father plan to quit England for Granada. Before leaving, Rebecca comes to Rowena shortly after the wedding to bid her a solemn farewell. Ivanhoe's military service ends with the death of King Richard five years later. Characters (principal characters in bold) Cedric the Saxon, of Rotherwood Wilfred of Ivanhoe, his son Rowena, his ward Athelstane, his kinsman Gurth, his swineherd Wamba, his jester Oswald, his cup-bearer Elgitha, Rowena's waiting-woman Albert Malvoisin, Preceptor of Templestowe Philip Malvoisin, his brother Hubert, Philip's forester The Prior of Aymer, Abbot of Jorvaulx Ambrose, a monk attending him Brian de Bois-Guilbert, a Templar Baldwin, his squire Isaac of York, a Jewish money-lender Rebecca, his daughter Nathan, a rabbi and physician King Richard ('the Black Knight') Prince John, his brother Locksley, alias Robin Hood, an outlaw Reginald Front-de-Bœuf Maurice de Bracy, a Free Companion (mercenary) Waldemar Fitzurse, Prince John's advisor - a fictional son of Reginald Fitzurse, a murderer of Archbishop Becket. Hugh de Grantmesnil Ralph de Vipont, a Hospitaller Friar Tuck, of Copmanhurst Ulrica, of Torquilstone, alias Urfried Lucas de Beaumanoir, grand-master of the Templars Conrade Mountfitchet, his attendant knight Higg, a peasant Kirjath Jairam of Leicester, a rich Jew Alan-a-Dale, a minstrel Chapter summary Dedicatory Epistle: An imaginary letter to the Rev. Dr Dryasdust from Laurence Templeton who has found the materials for the following tale mostly in the Anglo-Norman Wardour Manuscript. He wishes to provide an English counterpart to the preceding Waverley novels, in spite of various difficulties arising from the chronologically remote setting made necessary by the earlier progress of civilisation south of the Border. Volume One Ch. 1: Historical sketch. Gurth the swineherd and Wamba the jester discuss life under Norman rule. Ch. 2: Wamba and Gurth wilfully misdirect a group of horsemen headed by Prior Aymer and Brian de Bois-Guilbert seeking shelter at Cedric's Rotherwood. Aymer and Bois-Guilbert discuss the beauty of Cedric's ward Rowena and are redirected, this time correctly, by a palmer [Ivanhoe in disguise]. Ch. 3: Cedric anxiously awaits the return of Gurth and the pigs. Aymer and Bois-Guilbert arrive. Ch. 4: Bois-Guilbert admires Rowena as she enters for the evening feast. Ch. 5: During the feast: Isaac enters and is befriended by the palmer; Cedric laments the decay of the Saxon language; the palmer refutes Bois-Guilbert's assertion of Templar supremacy with an account of a tournament in Palestine, where Ivanhoe defeated him; the palmer and Rowena give a pledge for a return match; and Isaac is thunderstruck by Bois-Guilbert's denial of his assertion of poverty. Ch. 6: Next day the palmer tells Rowena that Ivanhoe will soon be home. He offers to protect Isaac from Bois-Guilbert, whom he has overheard giving instructions for his capture. On the road to Sheffield Isaac mentions a source of horse and armour of which he guesses the palmer has need. Ch. 7: As the audience for a tournament at Ashby assembles, Prince John amuses himself by making fun of Athelstane and Isaac. Ch. 8: After a series of Saxon defeats in the tournament the 'Disinherited Knight' [Ivanhoe] triumphs over Bois-Guilbert and the other Norman challengers. Ch. 9: The Disinherited Knight nominates Rowena as Queen of the Tournament. Ch. 10: The Disinherited Knight refuses to ransom Bois-Guilbert's armour, declaring that their business is not concluded. He instructs his attendant, Gurth in disguise, to convey money to Isaac to repay him for arranging the provision of his horse and armour. Gurth does so, but Rebecca secretly refunds the money. Ch. 11: Gurth is assailed by a band of outlaws, but they spare him on hearing his story and after he has defeated one of their number, a miller, at quarter-staves. Ch. 12: The Disinherited Knight's party triumph at the tournament, with the aid of a knight in black [Richard in disguise]; he is revealed as Ivanhoe and faints as a result of the wounds he has incurred. Ch. 13: John encourages De Bracy to court Rowena and receives a warning from France that Richard has escaped. Locksley [Robin Hood] triumphs in an archery contest. Ch. 14: At the tournament banquet Cedric continues to disown his son (who has been associating with the Normans) but drinks to the health of Richard, rather than John, as the noblest of that race. Volume Two Ch. 1 (15): De Bracy (disguised as a forester) tells Fitzurse of his plan to capture Rowena and then 'rescue' her in his own person. Ch. 2 (16): The Black Knight is entertained by a hermit [Friar Tuck] at Copmanhurst. Ch. 3 (17): The Black Knight and the hermit exchange songs. Ch. 4 (18): (Retrospect: Before going to the banquet Cedric learned that Ivanhoe had been removed by unknown carers; Gurth was recognised and captured by Cedric's cupbearer Oswald.) Cedric finds Athelstane unresponsive to his attempts to interest him in Rowena, who is herself only attracted by Ivanhoe. Ch. 5 (19): Rowena persuades Cedric to escort Isaac and Rebecca, who have been abandoned (along with a sick man [Ivanhoe] in their care) by their hired protectors. Wamba helps Gurth to escape again. De Bracy mounts his attack, during which Wamba escapes. He meets up with Gurth and they encounter Locksley who, after investigation, advises against a counter-attack, the captives not being in immediate danger. Ch. 6 (20): Locksley sends two of his men to watch De Bracy. At Copmanhurst he meets the Black Knight who agrees to join in the rescue. Ch. 7 (21): De Bracy tells Bois-Guilbert he has decided to abandon his 'rescue' plan, mistrusting his companion though the Templar says it is Rebecca he is interested in. On arrival at Torquilstone castle Cedric laments its decline. Ch. 8 (22): Under threat of torture Isaac agrees to pay Front-de-Bœuf a thousand pounds, but only if Rebecca is released. Ch. 9 (23): De Bracy uses Ivanhoe's danger from Front-de-Bœuf to put pressure on Rowena, but he is moved by her resulting distress. The narrator refers the reader to historical instances of baronial oppression in medieval England. Ch. 10 (24): A hag Urfried [Ulrica] warns Rebecca of her forthcoming fate. Rebecca impresses Bois-Guilbert by her spirited resistance to his advances. Ch. 11 (25): Front-de-Bœuf rejects a written challenge from Gurth and Wamba. Wamba offers to spy out the castle posing as a confessor. Ch. 12 (26): Entering the castle, Wamba exchanges clothes with Cedric who encounters Rebecca and Urfried. Ch. 13 (27): Urfried recognises Cedric as a Saxon and, revealing herself as Ulrica, tells her story which involves Front-de-Bœuf murdering his father, who had killed her father and seven brothers when taking the castle, and had become her detested lover. She says she will give a signal when the time is ripe for storming the castle. Front-de-Bœuf sends the presumed friar with a message to summon reinforcements. Athelstane defies him, claiming that Rowena is his fiancée. The monk Ambrose arrives seeking help for Aymer who has been captured by Locksley's men. Ch. 14 (28): (Retrospective chapter detailing Rebecca's care for Ivanhoe from the tournament to the assault on Torquilstone.) Ch. 15 (29): Rebecca describes the assault on Torquilstone to the wounded Ivanhoe, disagreeing with his exalted view of chivalry. Ch. 16 (30): Front-de-Bœuf being mortally wounded, Bois-Guilbert and De Bracy discuss how best to repel the besiegers. Ulrica sets fire to the castle and exults over Front-de-Bœuf who perishes in the flames. Volume Three Ch. 1 (31): (The chapter opens with a retrospective account of the attackers' plans and the taking of the barbican.) The Black Knight defeats De Bracy, making himself known to him as Richard, and rescues Ivanhoe. Bois-Guilbert rescues Rebecca, striking down Athelstane who thinks she is Rowena. Ulrica perishes in the flames after singing a wild pagan hymn. Ch. 2 (32): Locksley supervises the orderly division of the spoil. Friar Tuck brings Isaac whom he has made captive, and engages in good-natured buffeting with the Black Knight. Ch. 3 (33): Locksley arranges ransom terms for Isaac and Aymer. Ch. 4 (34): De Bracy informs John that Richard is in England. Together with Fitzurse he threatens to desert John, but the prince responds cunningly. Ch. 5 (35): At York, Nathan is horrified by Isaac's determination to seek Rebecca at Templestowe. At the priory the Grand-Master Beaumanoir tells Conrade Mountfitchet that he intends to take a hard line with Templar irregularities. Arriving, Isaac shows him a letter from Aymer to Bois-Guilbert referring to Rebecca whom Beaumanoir regards as a witch. Ch. 6 (36): Beaumanoir tells Preceptor Albert Malvoisin of his outrage at Rebecca's presence in the preceptory. Albert insists to Bois-Guilbert that her trial for sorcery must proceed. Mountfichet says he will seek evidence against her. Ch. 7 (37): Rebecca is tried and found guilty. At Bois-Guilbert's secret prompting she demands that a champion defend her in trial by combat. Ch. 8 (38): Rebecca's demand is accepted, Bois-Guilbert being appointed champion for the prosecution. Bearing a message to her father, the peasant Higg meets him and Nathan on their way to the preceptory, and Isaac goes in search of Ivanhoe. Ch. 9 (39): Rebecca rejects Bois-Guilbert's offer to fail to appear for the combat in return for her love. Albert persuades him that it is in his interest to appear. Ch. 10 (40): The Black Knight leaves Ivanhoe to travel to Coningsburgh castle for Athelstane's funeral, and Ivanhoe follows him the next day. The Black Knight is rescued by Locksley from an attack carried out by Fitzurse on John's orders, and reveals his identity as Richard to his companions, prompting Locksley to identify himself as Robin Hood. Ch. 11 (41): Richard talks to Ivanhoe and dines with the outlaws before Robin arranges a false alarm to put an end to the delay. The party arrive at Coningsburgh. Ch. 12 (42): Richard procures Ivanhoe's pardon from his father. Athelstane appears, not dead, giving his allegiance to Richard and surrendering Rowena to Ivanhoe. Ch. 13 (43): Ivanhoe appears as Rebecca's champion, and as they charge Bois-Guilbert dies the victim of his contending passions. Ch. 14 (44): Beaumanoir and his Templars leave Richard defiantly. Cedric agrees to the marriage of Ivanhoe and Rowena. Rebecca takes her leave of Rowena before her father and she quit England to make a new life under the tolerant King of Grenada. Style Critics of the novel have treated it as a romance intended mainly to entertain boys. Ivanhoe maintains many of the elements of the Romance genre, including the quest, a chivalric setting, and the overthrowing of a corrupt social order to bring on a time of happiness. Other critics assert that the novel creates a realistic and vibrant story, idealising neither the past nor its main character. Themes Scott treats themes similar to those of some of his earlier novels, like Rob Roy and The Heart of Midlothian, examining the conflict between heroic ideals and modern society. In the latter novels, industrial society becomes the centre of this conflict as the backward Scottish nationalists and the "advanced" English have to arise from chaos to create unity. Similarly, the Normans in Ivanhoe, who represent a more sophisticated culture, and the Saxons, who are poor, disenfranchised, and resentful of Norman rule, band together and begin to mould themselves into one people. The conflict between the Saxons and Normans focuses on the losses both groups must experience before they can be reconciled and thus forge a united England. The particular loss is in the extremes of their own cultural values, which must be disavowed in order for the society to function. For the Saxons, this value is the final admission of the hopelessness of the Saxon cause. The Normans must learn to overcome the materialism and violence in their own codes of chivalry. Ivanhoe and Richard represent the hope of reconciliation for a unified future. Ivanhoe, though of a more noble lineage than some of the other characters, represents a middling individual in the medieval class system who is not exceptionally outstanding in his abilities, as is expected of other quasi-historical fictional characters, such as the Greek heroes. Critic György Lukács points to middling main characters like Ivanhoe in Walter Scott's other novels as one of the primary reasons Scott's historical novels depart from previous historical works, and better explore social and cultural history. Allusions to real history and geography The location of the novel is centred upon southern Yorkshire, north-west Leicestershire and northern Nottinghamshire in England. Castles mentioned within the story include Ashby de la Zouch Castle (now a ruin in the care of English Heritage), York (though the mention of Clifford's Tower, likewise an extant English Heritage property, is anachronistic, it not having been called that until later after various rebuilds) and 'Coningsburgh', which is based upon Conisbrough Castle, in the ancient town of Conisbrough near Doncaster (the castle also being a popular English Heritage site). Reference is made within the story to York Minster, where the climactic wedding takes place, and to the Bishop of Sheffield, although the Diocese of Sheffield did not exist at either the time of the novel or the time Scott wrote the novel and was not founded until 1914. Such references suggest that Robin Hood lived or travelled in the region. Conisbrough is so dedicated to the story of Ivanhoe that many of its streets, schools, and public buildings are named after characters from the book. Sir Walter Scott took the title of his novel, the name of its hero, from the village of Ivinghoe. "The name of Ivanhoe," he says in his 1830 Introduction to the Magnum edition, "was suggested by an old rhyme. Tring, Wing, and Ivanhoe, For striking of a blow, Hampden did forego, And glad he could escape so." Ivanhoe is an alternate name for Ivinghoe first recorded in 1665. Older rural people in the Ivinghoe area most probably pronounced the name the same as Ivanhoe, according to Prof. Paul Kerswill of the University of York, a Fellow of the British Academy (FBA). It is most probable Scott had direct knowledge of Ivinghoe and did some research before using it as the title for his novel, as he did for the other places mentioned in the novel. The presence of Sir Walter Scott was recorded in Berkhamsted that is just 8 miles away from Ivinghoe. In the novel he speaks also of "the rich fief of Ivanhoe". The Manor of Ivanhoe is listed in the largest 20% of settlements recorded in Domesday. Lasting influence on the Robin Hood legend The modern conception of Robin Hood as a cheerful, decent, patriotic rebel owes much to Ivanhoe. "Locksley" becomes Robin Hood's title in the Scott novel, and it has been used ever since to refer to the legendary outlaw. Scott appears to have taken the name from an anonymous manuscript – written in 1600 – that employs "Locksley" as an epithet for Robin Hood. Owing to Scott's decision to make use of the manuscript, Robin Hood from Locksley has been transformed for all time into "Robin of Locksley", alias Robin Hood. (There is, incidentally, a village called Loxley in Yorkshire.) Scott makes the 12th-century's Saxon-Norman conflict a major theme in his novel. The original medieval stories about Robin Hood did not mention any conflict between Saxons and Normans; it was Scott who introduced this theme into the legend. The characters in Ivanhoe refer to Prince John and King Richard I as "Normans"; contemporary medieval documents from this period do not refer to either of these two rulers as Normans. Recent re-tellings of the story retain Scott's emphasis on the Norman-Saxon conflict. Scott also shunned the late 16th-century depiction of Robin as a dispossessed nobleman (the Earl of Huntingdon). This, however, has not prevented Scott from making an important contribution to the noble-hero strand of the legend, too, because some subsequent motion picture treatments of Robin Hood's adventures give Robin traits that are characteristic of Ivanhoe as well. The most notable Robin Hood films are the lavish Douglas Fairbanks 1922 silent film, the 1938 triple Academy Award-winning Adventures of Robin Hood with Errol Flynn as Robin (which contemporary reviewer Frank Nugent links specifically with Ivanhoe), and the 1991 box-office success Robin Hood: Prince of Thieves with Kevin Costner). There is also the Mel Brooks spoof Robin Hood: Men in Tights. In most versions of Robin Hood, both Ivanhoe and Robin, for instance, are returning Crusaders. They have quarrelled with their respective fathers, they are proud to be Saxons, they display a highly evolved sense of justice, they support the rightful king even though he is of Norman-French ancestry, they are adept with weapons, and they each fall in love with a "fair maid" (Rowena and Marian, respectively). This particular time-frame was popularised by Scott. He borrowed it from the writings of the 16th-century chronicler John Mair or a 17th-century ballad presumably to make the plot of his novel more gripping. Medieval balladeers had generally placed Robin about two centuries later in the reign of Edward I, II or III. Robin's familiar feat of splitting his competitor's arrow in an archery contest appears for the first time in Ivanhoe. Historical accuracy The general political events depicted in the novel are relatively accurate; the novel tells of the period just after King Richard's imprisonment in Austria following the Crusade and of his return to England after a ransom is paid. Yet the story is also heavily fictionalised. Scott himself acknowledged that he had taken liberties with history in his "Dedicatory Epistle" to Ivanhoe. Modern readers are cautioned to understand that Scott's aim was to create a compelling novel set in a historical period, not to provide a book of history. There has been criticism of Scott's portrayal of the bitter extent of the "enmity of Saxon and Norman, represented as persisting in the days of Richard" as "unsupported by the evidence of contemporary records that forms the basis of the story." Historian E. A. Freeman criticised Scott's novel, stating its depiction of a Saxon–Norman conflict in late twelfth-century England was unhistorical. Freeman cited medieval writer Walter Map, who claimed that tension between the Saxons and Normans had declined by the reign of Henry I. Freeman also cited the late twelfth-century book Dialogus de Scaccario by Richard FitzNeal. This book claimed that the Saxons and Normans had so merged through intermarriage and cultural assimilation that (outside the aristocracy) it was impossible to tell "one from the other." Finally, Freeman ended his critique of Scott by saying that by the end of the twelfth century, the descendants of both Saxons and Normans in England referred to themselves as "English", not "Saxon" or "Norman". However, Scott may have intended to suggest parallels between the Norman conquest of England, about 130 years previously, and the prevailing situation in Scott's native Scotland (Scotland's union with England in 1707 – about the same length of time had elapsed before Scott's writing and the resurgence in his time of Scottish nationalism evidenced by the cult of Robert Burns, the famous poet who deliberately chose to work in Scots vernacular though he was an educated man and spoke modern English eloquently). Indeed, some experts suggest that Scott deliberately used Ivanhoe to illustrate his own combination of Scottish patriotism and pro-British Unionism. The novel generated a new name in English – Cedric. The original Saxon name had been Cerdic but Scott misspelled it – an example of metathesis. "It is not a name but a misspelling" said satirist H. H. Munro. In England in 1194, it would have been unlikely for Rebecca to face the threat of being burned at the stake on charges of witchcraft. It is thought that it was shortly afterwards, from the 1250s, that the Church began to undertake the finding and punishment of witches and death did not become the usual penalty until the 15th century. Even then, the form of execution used for witches in England was hanging, burning being reserved for those also convicted of treason. There are various minor errors, e.g. the description of the tournament at Ashby owes more to the 14th century, most of the coins mentioned by Scott are exotic, William Rufus is said to have been John Lackland's grandfather, but he was actually his great-great-uncle, and Wamba (disguised as a monk) says "I am a poor brother of the Order of St Francis", but St. Francis of Assisi only began his preaching ten years after the death of Richard I. "For a writer whose early novels were prized for their historical accuracy, Scott was remarkably loose with the facts when he wrote Ivanhoe... But it is crucial to remember that Ivanhoe, unlike the Waverly books, is entirely a romance. It is meant to please, not to instruct, and is more an act of imagination than one of research. Despite this fancifulness, however, Ivanhoe does make some prescient historical points. The novel is occasionally quite critical of King Richard, who seems to love adventure more than he loves the well-being of his subjects. This criticism did not match the typical idealised, romantic view of Richard the Lion-Hearted that was popular when Scott wrote the book, and yet it accurately echoes the way King Richard is often judged by historians today." Reception Most of the original reviewers gave Ivanhoe an enthusiastic or broadly favourable reception. As usual, Scott's descriptive powers and his ability to present the matters of the past were generally praised. More than one reviewer found the work notably poetic. Several of them found themselves transported imaginatively to the remote period of the novel, although some problems were recognised: the combining of features from the high and late Middle Ages; an awkwardly created language for the dialogue; and antiquarian overload. The author's excursion into England was generally judged a success, the forest outlaws and the creation of 'merry England' attracting particular praise. Rebecca was almost unanimously admired, especially in her farewell scene. The plot was either criticised for its weakness, or just regarded as of less importance than the scenes and characters. The scenes at Torquilstone were judged horrible by several critics, with special focus on Ulrica. Athelstane's resurrection found no favour, the kindest response being that of Francis Jeffrey in The Edinburgh Review who suggested (writing anonymously, like all the reviewers) that it was 'introduced out of the very wantonness of merriment'. The Eglinton Tournament of 1839 held by the 13th Earl of Eglinton at Eglinton Castle in Ayrshire was inspired by and modelled on Ivanhoe. On November 5, 2019, the BBC News listed Ivanhoe on its list of the 100 most influential novels. Sequels In 1850, novelist William Makepeace Thackeray wrote a spoof sequel to Ivanhoe called Rebecca and Rowena. Edward Eager's book Knight's Castle (1956) magically transports four children into the story of Ivanhoe. Simon Hawke uses the story as the basis for The Ivanhoe Gambit (1984) the first novel in his time travel adventure series TimeWars. Pierre Efratas wrote a sequel called Le Destin d'Ivanhoe (2003), published by Éditions Charles Corlet. Christopher Vogler wrote a sequel called Ravenskull (2006), published by Seven Seas Publishing. Film, TV or theatrical adaptations Movies The novel has been the basis for several motion pictures: Ivanhoe, United States 1911, directed by J. Stuart Blackton Ivanhoe United States 1913, directed by Herbert Brenon; with King Baggot, Leah Baird, and Brenon. Filmed on location in England Ivanhoe, Wales 1913, directed by Leedham Bantock, filmed at Chepstow Castle Ye Olden Days United States 1933, directed by Burt Gillett Ivanhoe, 1952, directed by Richard Thorpe, starring Robert Taylor, Elizabeth Taylor, Joan Fontaine and George Sanders; nominated for three Oscars. The Revenge of Ivanhoe (1965) starred Rik Battaglia (an Italian peplum) Ivanhoe, the Norman Swordsman (1971) aka La spada normanna, directed by Roberto Mauri (an Italian peplum) The Ballad of the Valiant Knight Ivanhoe (Баллада о доблестном рыцаре Айвенго), USSR 1983, directed by Sergey Tarasov, with songs of Vladimir Vysotsky, starring Peteris Gaudins as Ivanhoe. Television There have also been many television adaptations of the novel, including: 1958: A television series based on the character of Ivanhoe starring Roger Moore as Ivanhoe 1970: A TV miniseries starring Eric Flynn as Ivanhoe. 1975: Children's Animated Classics Ivanhoe 1982: Ivanhoe, a television movie starring Anthony Andrews as Ivanhoe. 1986: Ivanhoe, a 1986 animated telemovie produced by Burbank Films in Australia. 1995: Young Ivanhoe, a 1995 television movie directed by Ralph L. Thomas and starring Kristen Holden-Ried as Ivanhoe, Rachel Blanchard as Rowena, Stacy Keach as Pembrooke, Margot Kidder as Lady Margarite, Nick Mancuso as Bourget, and Matthew Daniels as Tuck. 1997: Ivanhoe the King's Knight a televised cartoon series produced by CINAR and France Animation. General retelling of classic tale. 1997: Ivanhoe, a 6-part, 5-hour TV miniseries, a co-production of A&E and the BBC. It stars Steven Waddington as Ivanhoe, Ciarán Hinds as Bois-Guilbert, Susan Lynch as Rebecca, Ralph Brown as Prince John and Victoria Smurfit as Rowena. 1999: The Legend of Ivanhoe, a Columbia TriStar International Television production dubbed into English starring John Haverson as Ivanhoe and Rita Shaver as Rowena. 2000-2002: Dark Knight, a New Zealand/British series, starring Ben Pullen as Ivanhoe and Charlotte Comer as Rebecca. Operas Victor Sieg's dramatic cantata Ivanhoé won the Prix de Rome in 1864 and premiered in Paris the same year. Ivanhoe was the grand opera by Arthur Sullivan and Julian Sturgis (Sturgis was recommended by Sullivan's oft-time partner W.S. Gilbert). It debuted in 1891, and ran for 155 consecutive performances. Other operas based on the novel have been composed by Gioachino Rossini (Ivanhoé), Thomas Sari (Ivanhoé), Bartolomeo Pisani (Rebecca), A. Castagnier (Rébecca), Otto Nicolai (Il Templario), and Heinrich Marschner (Der Templer und die Jüdin). Rossini's opera is a pasticcio (an opera in which the music for a new text is chosen from pre-existent music by one or more composers). Scott attended a performance of it and recorded in his journal, "It was an opera, and, of course, the story sadly mangled and the dialogue, in part nonsense." Rail line The railway running through Ashby-de-la-Zouch was known as the Ivanhoe line between 1993 and 2005, in reference to the book's setting in the locality. See also Norman yoke Trysting Tree – several references are made to these trees as agreed gathering places. References External links Online text on Wikisource Page on Ivanhoe at the Walter Scott Digital Archive 1819 British novels Fictional knights British historical novels Novels by Walter Scott Novels set during the Crusades Robin Hood characters Robin Hood books British novels adapted into films Novels adapted into comics Novels adapted into operas British novels adapted into television shows Fiction set in the 1190s Novels set in the 12th century Cultural depictions of Richard I of England Cultural depictions of John, King of England Novels set in Leicestershire Novels set in Yorkshire Waverley Novels
[ -1.099800944328308, 0.015075518749654293, 0.5371671915054321, -0.6501136422157288, 0.18246901035308838, 0.3052078187465668, 1.1209118366241455, -0.3411308825016022, -0.3352193534374237, 0.35980287194252014, -0.22392825782299042, -0.3041036128997803, -0.4585486054420471, -0.0783074796199798...
15056
https://en.wikipedia.org/wiki/Isoelectric%20point
Isoelectric point
The isoelectric point (pI, pH(I), IEP), is the pH at which a molecule carries no net electrical charge or is electrically neutral in the statistical mean. The standard nomenclature to represent the isoelectric point is pH(I). However, pI is also used. For brevity, this article uses pI. The net charge on the molecule is affected by pH of its surrounding environment and can become more positively or negatively charged due to the gain or loss, respectively, of protons (H+). Surfaces naturally charge to form a double layer. In the common case when the surface charge-determining ions are H+/HO−, the net surface charge is affected by the pH of the liquid in which the solid is submerged. The pI value can affect the solubility of a molecule at a given pH. Such molecules have minimum solubility in water or salt solutions at the pH that corresponds to their pI and often precipitate out of solution. Biological amphoteric molecules such as proteins contain both acidic and basic functional groups. Amino acids that make up proteins may be positive, negative, neutral, or polar in nature, and together give a protein its overall charge. At a pH below their pI, proteins carry a net positive charge; above their pI they carry a net negative charge. Proteins can, thus, be separated by net charge in a polyacrylamide gel using either preparative gel electrophoresis, which uses a constant pH to separate proteins or isoelectric focusing, which uses a pH gradient to separate proteins. Isoelectric focusing is also the first step in 2-D gel polyacrylamide gel electrophoresis. In biomolecules, proteins can be separated by ion exchange chromatography. Biological proteins are made up of zwitterionic amino acid compounds; the net charge of these proteins can be positive or negative depending on the pH of the environment. The specific pI of the target protein can be used to model the process around and the compound can then be purified from the rest of the mixture. Buffers of various pH can be used for this purification process to change the pH of the environment. When a mixture containing a target protein is loaded into an ion exchanger, the stationary matrix can be either positively-charged (for mobile anions) or negatively-charged (for mobile cations). At low pH values, the net charge of most proteins in the mixture is positive - in cation exchangers, these positively-charged proteins bind to the negatively-charged matrix. At high pH values, the net charge of most proteins is negative, where they bind to the positively-charged matrix in anion exchangers. When the environment is at a pH value equal to the protein's pI, the net charge is zero, and the protein is not bound to any exchanger, and therefore, can be eluted out. Calculating pI values For an amino acid with only one amine and one carboxyl group, the pI can be calculated from the mean of the pKas of this molecule. The pH of an electrophoretic gel is determined by the buffer used for that gel. If the pH of the buffer is above the pI of the protein being run, the protein will migrate to the positive pole (negative charge is attracted to a positive pole). If the pH of the buffer is below the pI of the protein being run, the protein will migrate to the negative pole of the gel (positive charge is attracted to the negative pole). If the protein is run with a buffer pH that is equal to the pI, it will not migrate at all. This is also true for individual amino acids. Examples In the two examples (on the right) the isoelectric point is shown by the green vertical line. In glycine the pK values are separated by nearly 7 units. Thus in the gas phase, the concentration of the neutral species, glycine (GlyH), is effectively 100% of the analytical glycine concentration. Glycine may exist as a zwitterion at the isoelectric point, but the equilibrium constant for the isomerization reaction in solution H2NCH2CO2H H3N+CH2CO2− is not known. The other example, adenosine monophosphate is shown to illustrate the fact that a third species may, in principle, be involved. In fact the concentration of (AMP)H32+ is negligible at the isoelectric point in this case. If the pI is greater than the pH, the molecule will have a positive charge. Isoelectric point of peptides and proteins A number of algorithms for estimating isoelectric points of peptides and proteins have been developed. Most of them use Henderson–Hasselbalch equation with different pK values. For instance, within the model proposed by Bjellqvist and co-workers the pK's were determined between closely related immobilines, by focusing the same sample in overlapping pH gradients. Some improvements in the methodology (especially in the determination of the pK values for modified amino acids) have been also proposed. More advanced methods take into account the effect of adjacent amino acids ±3 residues away from a charged aspartic or glutamic acid, the effects on free C terminus, as well as they apply a correction term to the corresponding pK values using genetic algorithm. Other recent approaches are based on a support vector machine algorithm and pKa optimization against experimentally known protein/peptide isoelectric points. Moreover, experimentally measured isoelectric point of proteins were aggregated into the databases. Recently, a database of isoelectric points for all proteins predicted using most of the available methods had been also developed. Ceramic materials The isoelectric points (IEP) of metal oxide ceramics are used extensively in material science in various aqueous processing steps (synthesis, modification, etc.). In the absence of chemisorbed or physisorbed species particle surfaces in aqueous suspension are generally assumed to be covered with surface hydroxyl species, M-OH (where M is a metal such as Al, Si, etc.). At pH values above the IEP, the predominate surface species is M-O−, while at pH values below the IEP, M-OH2+ species predominate. Some approximate values of common ceramics are listed below: Note: The following list gives the isoelectric point at 25 °C for selected materials in water. The exact value can vary widely, depending on material factors such as purity and phase as well as physical parameters such as temperature. Moreover, the precise measurement of isoelectric points can be difficult, thus many sources often cite differing values for isoelectric points of these materials. Mixed oxides may exhibit isoelectric point values that are intermediate to those of the corresponding pure oxides. For example, a synthetically prepared amorphous aluminosilicate (Al2O3-SiO2) was initially measured as having IEP of 4.5 (the electrokinetic behavior of the surface was dominated by surface Si-OH species, thus explaining the relatively low IEP value). Significantly higher IEP values (pH 6 to 8) have been reported for 3Al2O3-2SiO2 by others. Similarly, also IEP of barium titanate, BaTiO3 was reported in the range 5-6 while others got a value of 3. Mixtures of titania (TiO2) and zirconia (ZrO2) were studied and found to have an isoelectric point between 5.3-6.9, varying non-linearly with %(ZrO2). The surface charge of the mixed oxides was correlated with acidity. Greater titania content led to increased Lewis acidity, whereas zirconia-rich oxides displayed Br::onsted acidity. The different types of acidities produced differences in ion adsorption rates and capacities. Isoelectric point versus point of zero charge The terms isoelectric point (IEP) and point of zero charge (PZC) are often used interchangeably, although under certain circumstances, it may be productive to make the distinction. In systems in which H+/OH− are the interface potential-determining ions, the point of zero charge is given in terms of pH. The pH at which the surface exhibits a neutral net electrical charge is the point of zero charge at the surface. Electrokinetic phenomena generally measure zeta potential, and a zero zeta potential is interpreted as the point of zero net charge at the shear plane. This is termed the isoelectric point. Thus, the isoelectric point is the value of pH at which the colloidal particle remains stationary in an electrical field. The isoelectric point is expected to be somewhat different from the point of zero charge at the particle surface, but this difference is often ignored in practice for so-called pristine surfaces, i.e., surfaces with no specifically adsorbed positive or negative charges. In this context, specific adsorption is understood as adsorption occurring in a Stern layer or chemisorption. Thus, point of zero charge at the surface is taken as equal to isoelectric point in the absence of specific adsorption on that surface. According to Jolivet, in the absence of positive or negative charges, the surface is best described by the point of zero charge. If positive and negative charges are both present in equal amounts, then this is the isoelectric point. Thus, the PZC refers to the absence of any type of surface charge, while the IEP refers to a state of neutral net surface charge. The difference between the two, therefore, is the quantity of charged sites at the point of net zero charge. Jolivet uses the intrinsic surface equilibrium constants, pK− and pK+ to define the two conditions in terms of the relative number of charged sites: For large ΔpK (>4 according to Jolivet), the predominant species is MOH while there are relatively few charged species - so the PZC is relevant. For small values of ΔpK, there are many charged species in approximately equal numbers, so one speaks of the IEP. See also Henderson-Hasselbalch equation Isoelectric focusing Zeta potential Electrophoretic deposition Isoionic point pK acid dissociation constant QPNC-PAGE References Further reading Nelson DL, Cox MM (2004). Lehninger Principles of Biochemistry. W. H. Freeman; 4th edition (Hardcover). Kosmulski M. (2009). Surface Charging and Points of Zero Charge. CRC Press; 1st edition (Hardcover). External links IPC – Isoelectric Point Calculator — calculate protein isoelectric point using over 15 methods prot pi - protein isoelectric point — an online program for calculating pI of proteins (include multiple subunits and posttranslational modifications) CurTiPot — a suite of spreadsheets for computing acid-base equilibria (charge versus pH plot of amphoteric molecules e.g., amino acids) pICalculax — Isoelectric point (pI) predictor for chemically modified peptides and proteins SWISS-2DPAGE — a database of isoelectric points coming from two-dimensional polyacrylamide gel electrophoresis (~ 2,000 proteins) PIP-DB — a Protein Isoelectric Point database (~ 5,000 proteins) Proteome-pI — a proteome isoelectric point database (predicted isoelectric point for all proteins) Ions Molecular biology
[ 0.08401983231306076, 0.005234592594206333, 0.4652049243450165, 0.2194492220878601, -0.0973542109131813, -0.18991298973560333, -0.32215964794158936, -0.2685491144657135, 0.21847988665103912, -0.6419001221656799, -0.00880165584385395, -0.07401180267333984, -0.7412383556365967, 0.422303110361...
15058
https://en.wikipedia.org/wiki/International%20reply%20coupon
International reply coupon
An international reply coupon (IRC) is a coupon that can be exchanged for one or more postage stamps representing the minimum postage for an unregistered priority airmail letter of up to twenty grams sent to another Universal Postal Union (UPU) member country. IRCs are accepted by all UPU member countries. UPU member postal services are obliged to exchange an IRC for postage, but are not obliged to sell them. The purpose of the IRC is to allow a person to send someone in another country a letter, along with the cost of postage for a reply. If the addressee is within the same country, there is no need for an IRC because a self-addressed stamped envelope (SASE) or return postcard will suffice; but if the addressee is in another country an IRC removes the necessity of acquiring foreign postage or sending appropriate currency. Description International reply coupons (in French, Coupons-Reponse Internationaux) are printed in blue ink on paper that has the letters "UPU" in large characters in the watermark. The front of each coupon is printed in French. The reverse side of the coupon, which has text relating to its use, is printed in German, English, Arabic, Chinese, Spanish, and Russian. Under Universal Postal Union regulations, participating member countries are not required to place a control stamp or postmark on the international reply coupons that they sell. Therefore, some foreign issue reply coupons that are tendered for redemption may bear the name of the issuing country (generally in French) rather than the optional control stamp or postmark. The Nairobi Model was an international reply coupon printed by the Universal Postal Union which is approximately 3.75 inches by 6 inches and had an expiration date of 31 December 2013. This model was designed by Rob Van Goor, a graphic artist from the Luxembourg Post. It was selected from among 10 designs presented by Universal Postal Union member countries. Van Goor interpreted the theme of the contest – "The Postage Stamp: A Vehicle for Exchange" – by depicting the world being cradled by a hand and the perforated outline of a postage stamp. The Doha Model is named for the 25th UPU congress held in Doha, Qatar, in 2012. The Doha model, designed by Czech artist and graphic designer Michal Sindelar, shows cupped hands catching a stream of water, to celebrate the theme of Water for Life. It expires after 31 December 2017. The Istanbul Model was designed by graphic artist Nguyen Du (Viet Nam)and features a pair of hands and a dove against an Arctic backdrop representing sustainable development in the postal sector. Ten countries participated in the competition which was held 7 October 2016, during the UPU congress in Istanbul, Turkey. It expires after 31 December 2021. The Abidjan Model was designed by graphic artist Valeryia Tsimakhavets (Belarus)and features a Tree with New Leaves and Birds which represent the Eco-System and Climate Protection. Congress held in Abidjan, (Cote d'Ivorie) - Ivory Coast on 9th to 27th August 2021. It expires after 31 December 2025. History The IRC was introduced in 1906 at a Universal Postal Union congress in Rome. At the time an IRC could be exchanged for a single-rate, ordinary postage stamp for surface delivery to a foreign country, as this was before the introduction of airmail services. An IRC is exchangeable in a UPU member country for the minimum postage of a priority or unregistered airmail letter to a foreign country. The current IRC, which features the theme "the Post and sustainable development", was designed by Vietnamese artist Nguyen Du for 2017-2021 and was adopted in Istanbul in 2016, it is known also as the "Istanbul model" for this reason. The previous design, "Water for Life" by Czech artist and graphic designer Michal Sindelar, was issued in 2013 and was valid until 31 December 2017. IRCs are ordered from the UPU headquarters in Bern, Switzerland by postal authorities. They are generally available at large post offices; in the U.S., they were requisitioned along with regular domestic stamps by any post office that had sufficient demand for them. Prices for IRCs vary by country. In the United States in November 2012, the purchase price was $2.20 USD; however, the US Postal Service discontinued sales of IRCs on 27 January 2013 due to declining demand. Britain's Royal Mail also stopped selling IRCs on 18 February 2012, citing minimal sales and claiming that the average post office sold less than one IRC per year. IRCs purchased in foreign countries may be used in the United States toward the purchase of postage stamps and embossed stamped envelopes at the current one-ounce First Class International rate (US$1.20 as of November 2020) per coupon. IRCs are often used by amateur radio operators sending QSL cards to each other; it has traditionally been considered good practice and common courtesy to include an IRC when writing to a foreign operator and expecting a reply by mail. If the operator's home country does not sell IRCs, then a foreign IRC may be used. Previous editions of the IRC, the "Beijing" model and all subsequent versions, bear an expiration date. Consequently, a new IRC will be issued every four years. Current usage in various countries Australia Australia Post sells IRC for 4.15 AUD as of 2021. France La Poste sells IRC for 1.5 EUR as of 2021. Germany Deutsche Post sells IRC for 2 EUR as of 2021. Hong Kong International reply coupons are sold by the HongKong Post for 19 HKD as of 2018-10-19. Italy Poste Italiane is slowly phasing out the sales of IRC. The last series, named "Istanbul", was issued in 2017 in only 10,000 pieces, which will expire at the end of 2021. Japan The Japan Post sells an IRC for 150 JPY, and exchanges a valid IRC for 130 JPY worth of stamps. 130 JPY is enough to deliver a letter all over the world by airmail (90 JPY by shipmail). Switzerland International reply coupons are sold by the Swiss Post in packs of 10 for 25 CHF. Thailand Thailand Post currently sells IRC for 53 THB as of 2020. Turkey Turkish Post sells an IRC for 13.30 TRY, and exchanges a valid IRC for 10 TRY worth of stamps as of 2021. 10 TRY is not enough to deliver a letter all over the world. (E.g. a postcard to Japan requires 21 TRY.) United Kingdom The Royal Mail stopped selling IRCs on 31 December 2011 due to a lack of demand. United States The United States Postal Service stopped selling international reply coupons on 27 January 2013. The Ponzi scheme In 1920, Charles Ponzi made use of the idea that profit could be made by taking advantage of the differing postal rates in different countries to buy IRCs cheaply in one country and exchange them for stamps of a higher value in another country. His attempts to raise money for this venture became instead the fraudulent Ponzi scheme. In practice, the overhead on buying and selling large numbers of the very low-value IRCs precluded any profitability. The selling price and exchange value in stamps in each country have been adjusted to some extent to remove some of the potential for profit, but ongoing fluctuations in currency value and exchange rates make it impossible to achieve this completely, as long as stamps represent a specific currency value, instead of acting as vouchers granting specific postal services, devoid of currency nomination. See also Heys Collection References External links UPU IRC info UPU list of countries selling IRCs IRC info Some IRC illustrations and exchange guidelines International Reply Coupons and Ham Radio Universal Postal Union Postal stationery Philatelic terminology
[ 0.165679469704628, -0.07995118945837021, 0.44427022337913513, 0.1809171438217163, -0.12925954163074493, 0.10098371654748917, -0.5005422234535217, 0.0656958669424057, -0.3565230965614319, 0.1835642158985138, -0.603356122970581, 0.24454191327095032, -0.4635627269744873, -0.0804256945848465, ...
15059
https://en.wikipedia.org/wiki/Isaac%20Bonewits
Isaac Bonewits
Phillip Emmons Isaac Bonewits (October 1, 1949 – August 12, 2010) was an American Neo-Druid who published a number of books on the subject of Neopaganism and magic. He was a public speaker, liturgist, singer and songwriter, and founder of the Neopagan organizations Ár nDraíocht Féin and the Aquarian Anti-Defamation League. Born in Royal Oak, Michigan, Bonewits had been heavily involved in occultism since the 1960s. Early life and education Bonewits was born on October 1, 1949, in Royal Oak, Michigan, as the fourth of five children. His mother and father were Roman Catholics. Spending much of his childhood in Ferndale, he was moved at age 12 to San Clemente, California, where he spent a short time in a Catholic high school before he went back to public school to graduate from high school a year early. He enrolled at UC Berkeley in 1966; he graduated from the university in 1970 with a Bachelor of Arts in magic, perhaps becoming the first and only person known to have ever received any kind of academic degree in magic from an accredited university. Career Early years In 1966, while enrolled at UC Berkeley, Bonewits joined the Reformed Druids of North America (RDNA). Bonewits was ordained as a Neo-druid priest in 1969. During this period, the 18-year-old Bonewits was also recruited by the Church of Satan, but left due to political and philosophical conflicts with Anton LaVey. During his stint in the Church of Satan, Bonewits appeared in some scenes of the 1970 documentary Satanis: The Devil's Mass. Bonewits, in his article "My Satanic Adventure", asserts that the rituals in Satanis were staged for the movie at the behest of the filmmakers and were not authentic ceremonies. 1970s: author and editor His first book, Real Magic, was published in 1972. Between 1973 and 1975 Bonewits was employed as the editor of Gnostica magazine in Minnesota (published by Llewellyn Publications). He established an offshoot group of the Reformed Druids of North America (RDNA) called the Schismatic Druids of North America, and helped create a group called the Hasidic Druids of North America (despite, in his words, his "lifelong status as a gentile"). He also founded the short-lived Aquarian Anti-Defamation League (AADL), an early Pagan civil rights group. In 1976, Bonewits moved back to Berkeley and rejoined his original grove there, now part of the New Reformed Druids of North America (NRDNA). He was later elected Archdruid of the Berkeley Grove. 1980s: founding of Ár nDraíocht Féin Throughout his life Bonewits had varying degrees of involvement with occult groups including Gardnerian Wicca and the New Reformed Orthodox Order of the Golden Dawn (a Wiccan organization not to be confused with the Hermetic Order of the Golden Dawn). Bonewits was a regular presenter at Neopagan conferences and festivals all over the US, as well as attending gaming conventions in the Bay Area. He promoted his book Authentic Thaumaturgy to gamers as a way of organizing Dungeons and Dragons games and to give a background to games of Magic: the Gathering. In 1983, Bonewits founded Ár nDraíocht Féin (also known as "A Druid Fellowship" or ADF), which was incorporated in 1990 in the state of Delaware as a U.S. 501(c)3 non-profit organization. Although illness curtailed many of his activities and travels for a time, he remained Archdruid of ADF until 1996. In that year, he resigned from the position of Archdruid but retained the lifelong title of ADF Archdruid Emeritus. Musician and activist A songwriter, singer, and recording artist, he produced two CDs of pagan music and numerous recorded lectures and panel discussions, produced and distributed by the Association for Consciousness Exploration. He lived in Rockland County, New York, and was a member of the Covenant of Unitarian Universalist Pagans (CUUPS). Bonewits encouraged charity programs to help Neopagan seniors, and in January 2006 was the keynote speaker at the Conference On Current Pagan Studies at the Claremont Graduate University in Claremont, CA. Personal life Bonewits was married five times. He was married to Rusty Elliot from 1973 to 1976. His second wife was Selene Kumin Vega, followed by marriage to Sally Eaton (1980 to 1985). His fourth wife was author Deborah Lipp, from 1988 to 1998. On July 23, 2004, he was married in a handfasting ceremony to a former vice-president of the Covenant of Unitarian Universalist Pagans, Phaedra Heyman Bonewits. At the time of the handfasting, the marriage was not yet legal because he had not yet been legally divorced from Lipp, although they had been separated for several years. Paperwork and legalities caught up on December 31, 2007, making them legally married. Bonewits' only child, Arthur Shaffrey Lipp-Bonewits, was born to Deborah Lipp in 1990. Illness and death In 1990, Bonewits was diagnosed with eosinophilia-myalgia syndrome. The illness was a factor in his eventual resignation from the position of Archdruid of the ADF. On October 25, 2009, Bonewits was diagnosed with a rare form of colon cancer, for which he underwent treatment. He died at home, on August 12, 2010, surrounded by his family. Contributions to Neopaganism In his book Real Magic (1971), Bonewits proposed his "Laws of Magic". These "laws" are synthesized from a multitude of belief systems from around the world to explain and categorize magical beliefs within a cohesive framework. Many interrelationships exist, and some belief systems are subsets of others. This work was chosen by Dennis Wheatley in the 1970s to be part of his publishing project Library of the Occult. Bonewits also coined much of the modern terminology used to articulate the themes and issues that affect the North American Neopagan community. Pioneered the modern usage of the terms "thealogy", "Paleo-Paganism", "Meso-Paganism", and numerous other retronyms. Possibly coined the term "Pagan Reconstructionism", though the communities in question would later diverge from his initial meaning. Founded Ar nDraiocht Fein, which was incorporated in 1990 in the state of Delaware as a U.S. 501(c)3 non-profit organization. Developed the Advanced Bonewits Cult Danger Evaluation Frame (ABCDEF). Coined the phrase "Never Again the Burning". Critiqued the Burning Times / Old Religion Murray thesis (in Bonewits's Essential Guide to Witchcraft and Wicca). In his book Real Magic (1971), Bonewits proposed his hypothesis on the Laws of Magic, which were then elaborated in his RPG supplement Authentic Thaumaturgy. The book makes it clear it is an adaptation of the ideas from Real Magic to gaming with the Laws presented being abbreviated from those in Real Magic. Bibliography Real Magic: An Introductory Treatise on the Basic Principles of Yellow Magic. (1972, 1979, 1989) Weiser Books The Druid Chronicles (Evolved). (1976 Drunemeton Press, 2005 Drynemetum Press) (With Selene Kumin Vega, Rusty Elliot, and Arlynde d'Loughlan) Authentic Thaumaturgy. (With others) (1978 Chaosium, 1998 Steve Jackson Games) Rites of Worship: A Neopagan Approach. (2003) Earth Religions Press OP Witchcraft: A Concise Guide or Which Witch Is Which?. (2003) Earth Religions Press The Pagan Man: Priests, Warriors, Hunters, and Drummers. (2005) Citadel , Bonewits's Essential Guide to Witchcraft and Wicca. (2006) Citadel , Bonewits's Essential Guide to Druidism. (2006) Citadel , Real Energy: Systems, Spirits, And Substances to Heal, Change, And Grow. (2007) New Leaf , . Co-authored with Phaedra Bonewits. Neopagan Rites: A Guide to Creating Public Rituals that Work. (2007) Llewellyn , Discography Music Be Pagan Once Again! – Isaac Bonewits & Friends (including Ian Corrigan, Victoria Ganger, and Todd Alan) (CD) (ACE/ADF) Avalon is Rising! – Real Magic (CD)(ACE/ADF) Spoken word The Structure of Craft Ritual (ACE) A Magician Prepares (ACE) Programming Magical Ritual: Top-Down Liturgical Design (ACE) Druidism: Ancient & Modern (ACE) How Does Magic Work? (ACE) Rituals That Work (ACE) Sexual Magic & Magical Sex (with Deborah Lipp) (ACE) Making Fun of Religion (with Deborah Lipp) (ACE) Panel discussions The Magickal Movement: Present & Future (with Margot Adler, Selena Fox, and Robert Anton Wilson) (ACE) Magick Changing the World, the World Changing Magick (with AmyLee, Selena Fox, Jeff Rosenbaum and Robert Anton Wilson) (ACE) References Further reading External links Neopagan Net (formerly "Isaac Bonewits' Homepage") The laws A Reformed Druid Anthology includes The Druid Chronicles (Evolved) "An Open Letter to Selena Fox" Advanced Bonewits Cult Danger Evaluation Frame 1949 births 2010 deaths American occult writers American Wiccans Writers from California Writers from Michigan Neo-druids Founders of Modern Pagan movements Writers from New York (state) Cultural anthropologists Deaths from colorectal cancer Former Roman Catholics Deaths from cancer in New York (state) People from Valley Cottage, New York People from Royal Oak, Michigan People from Ferndale, Michigan University of California, Berkeley alumni
[ 0.14167405664920807, 0.7429980635643005, -0.7132869958877563, 0.03179772570729256, -0.2918986976146698, 0.029604531824588776, 1.7232128381729126, -0.37944135069847107, 0.11269496381282806, 0.30811837315559387, -0.12804895639419556, 0.31623023748397827, -0.21729913353919983, 0.2688940763473...
15062
https://en.wikipedia.org/wiki/Intel%208080
Intel 8080
The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel. It first appeared in April 1974 and is an extended and enhanced variant of the earlier 8008 design, although without binary compatibility. The initial specified clock rate or frequency limit was 2 MHz, with common instructions using 4, 5, 7, 10, or 11 cycles. As a result, the processor is able to execute several hundred thousand instructions per second. Two faster variants, the 8080A-1 (sometimes referred to as the 8080B) and 8080A-2, became available later with clock frequency limits of 3.125 MHz and 2.63 MHz respectively. The 8080 needs two support chips to function in most applications: the i8224 clock generator/driver and the i8228 bus controller. It is implemented in N-type metal-oxide-semiconductor logic (NMOS) using non-saturated enhancement mode transistors as loads thus demanding a +12 V and a −5 V voltage in addition to the main transistor–transistor logic (TTL) compatible +5 V. Although earlier microprocessors were commonly used in mass-produced devices such as calculators, cash registers, computer terminals, industrial robots, and other applications, the 8080 saw greater success in a wider set of applications, and is largely credited with starting the microcomputer industry. Several factors contributed to its popularity: its 40-pin package made it easier to interface than the 18-pin 8008, and also made its data bus more efficient; its NMOS implementation gave it faster transistors than those of the P-type metal-oxide-semiconductor logic (PMOS) 8008, while also simplifying interfacing by making it TTL-compatible; a wider variety of support chips were available; its instruction set was enhanced over the 8008; and its full 16-bit address bus (versus the 14-bit one of the 8008) enabled it to access 64 KB of memory, four times more than the 8008's range of 16 KB. It was used in the Altair 8800 and subsequent S-100 bus personal computers until it was replaced by the Z80 in this role, and was the original target CPU for CP/M operating systems developed by Gary Kildall. The 8080 directly influenced the later x86 architecture. Intel designed the 8086 to have its assembly language be similar enough to the 8080, with most instructions mapping directly onto each other, that transpiled 8080 assembly code could be executed on the 8086. History Microprocessor customers were reluctant to adopt the 8008 because of limitations such as the single addressing mode, low clock speed, low pin count, and small on-chip stack, which restricted the scale and complexity of software. There were several proposed designs for the 8080, ranging from simply adding stack instructions to the 8008 to a complete departure from all previous Intel architectures. The final design was a compromise between the proposals. Federico Faggin, the originator of the 8080 architecture in early 1972, proposed the chip to Intel's management and pushed for its implementation. He finally got the permission to develop it six months later. Faggin hired Masatoshi Shima, who helped design the 4004 with him, from Japan in November 1972. Shima did the detailed design under Faggin's direction, using the design methodology for random logic with silicon gate that Faggin had created for the 4000 family. The 8080 was explicitly designed to be a general-purpose microprocessor for a larger number of customers. Much of the development effort was spent trying to integrate the functionalities of the 8008's supplemental chips into one package. It was decided early in development that the 8080 was not to be binary-compatible with the 8008, instead opting for source compatibility once run through a transpiler, to allow new software to not be subject to the same restrictions as the 8008. For the same reason, as well as the expand the capabilities of stack-based routines and interrupts, the stack was moved to external memory. Noting the specialized use of general-purpose registers by programmers in mainframe systems, Stanley Mazor, the chip architect, decided the 8080's registers would be specialized, with register pairs having a different set of uses. This also allowed the engineers to more effectively use transistors for other purposes. Shima finished the layout in August 1973. After the regulation of NMOS fabrication, a prototype of the 8080 was completed in January 1974. It had a flaw, in that driving with standard TTL devices increased the ground voltage because high current flowed into the narrow line. Intel had already produced 40,000 units of the 8080 at the direction of the sales section before Shima characterized the prototype. It was released as requiring Low-power Schottky TTL (LS TTL) devices. The 8080A fixed this flaw. Intel offered an instruction set simulator for the 8080 named INTERP/80 to run compiled PL/M programs. It was written by Gary Kildall while he worked as a consultant for Intel. Description Programming model The Intel 8080 is the successor to the 8008. It uses the same basic instruction set and register model as the 8008, although it is neither source code compatible nor binary code compatible with its predecessor. Every instruction in the 8008 has an equivalent instruction in the 8080. The 8080 also adds 16-bit operations in its instruction set. Whereas the 8008 required the use of the HL register pair to indirectly access its 14-bit memory space, the 8080 added addressing modes to allow direct access to its full 16-bit memory space. The internal 7-level push-down call stack of the 8008 was replaced by a dedicated 16-bit stack-pointer (SP) register. The 8080's 40-pin DIP packaging permits it to provide a 16-bit address bus and an 8-bit data bus, enabling access to 64 KiB (216 bytes) of memory. Registers The processor has seven 8-bit registers (A, B, C, D, E, H, and L), where A is the primary 8-bit accumulator. The other six registers can be used as either individual 8-bit registers or in three 16-bit register pairs (BC, DE, and HL, referred to as B, D and H in Intel documents) depending on the particular instruction. Some instructions also enable the HL register pair to be used as a (limited) 16-bit accumulator. A pseudo-register M, which refers to the dereferenced memory location pointed to by HL, can be used almost anywhere other registers can be used. The 8080 has a 16-bit stack pointer to memory, replacing the 8008's internal stack, and a 16-bit program counter. Flags The processor maintains internal flag bits (a status register), which indicate the results of arithmetic and logical instructions. Only certain instructions affect the flags. The flags are: Sign (S), set if the result is negative. Zero (Z), set if the result is zero. Parity (P), set if the number of 1 bits in the result is even. Carry (C), set if the last addition operation resulted in a carry or if the last subtraction operation required a borrow Auxiliary carry (AC or H), used for binary-coded decimal arithmetic (BCD). The carry bit can be set or complemented by specific instructions. Conditional-branch instructions test the various flag status bits. The flags can be copied as a group to the accumulator. The A accumulator and the flags together are called the PSW register, or program status word. Commands, instructions As with many other 8-bit processors, all instructions are encoded in one byte (including register numbers, but excluding immediate data), for simplicity. Some can be followed by one or two bytes of data, which can be an immediate operand, a memory address, or a port number. Like more advanced processors, it has automatic CALL and RET instructions for multi-level procedure calls and returns (which can even be conditionally executed, like jumps) and instructions to save and restore any 16-bit register pair on the machine stack. Eight one-byte call instructions () for subroutines exist at the fixed addresses 00h, 08h, 10h, ..., 38h. These are intended to be supplied by external hardware in order to invoke a corresponding interrupt service routine, but are also often employed as fast system calls. The instruction that executes slowest is , which is used for exchanging the register pair HL with the value stored at the address indicated by the stack pointer. 8-bit instructions All 8-bit operations with two operands can only be performed on the 8-bit accumulator (the A register). The other operand can be either an immediate value, another 8-bit register, or a memory byte addressed by the 16-bit register pair HL. Increments and decrements can be performed on any 8 bit register or an HL-addressed memory byte. Direct copying is supported between any two 8-bit registers and between any 8-bit register and an HL-addressed memory byte. Due to the regular encoding of the instruction (using a quarter of available opcode space), there are redundant codes to copy a register into itself (, for instance), which are of little use, except for delays. However, the systematic opcode for is instead used to encode the halt () instruction, halting execution until an external reset or interrupt occurs. 16-bit operations Although the 8080 is generally an 8-bit processor, it has limited abilities to perform 16-bit operations. Any of the three 16-bit register pairs (BC, DE, or HL, referred to as B, D, H in Intel documents) or SP can be loaded with an immediate 16-bit value (using ), incremented or decremented (using and ), or added to HL (using ). By adding HL to itself, it is possible to achieve the same result as a 16-bit arithmetical left shift with one instruction. The only 16-bit instructions that affect any flag is , which sets the CY (carry) flag in order to allow for programmed 24-bit or 32-bit arithmetic (or larger), needed to implement floating-point arithmetic. A stack frame can be allocated using and . A branch to a computed pointer can be executed with . loads HL from directly addressed memory and stores HL likewise. The instruction exchanges the values of the HL and DE register pairs. exchanges last item pushed on stack with HL. Input/output scheme Input output port space The 8080 supports up to 256 input/output (I/O) ports, accessed via dedicated I/O instructions taking port addresses as operands. This I/O mapping scheme is regarded as an advantage, as it frees up the processor's limited address space. Many CPU architectures instead use so-called memory-mapped I/O (MMIO), in which a common address space is used for both RAM and peripheral chips. This removes the need for dedicated I/O instructions, although a drawback in such designs may be that special hardware must be used to insert wait states, as peripherals are often slower than memory. However, in some simple 8080 computers, I/O is indeed addressed as if they were memory cells, "memory-mapped", leaving the I/O commands unused. I/O addressing can also sometimes employ the fact that the processor outputs the same 8-bit port address to both the lower and the higher address byte (i.e., would put the address 0505h on the 16-bit address bus). Similar I/O-port schemes are used in the backward-compatible Zilog Z80 and Intel 8085, and the closely related x86 microprocessor families. Separate stack space One of the bits in the processor state word (see below) indicates that the processor is accessing data from the stack. Using this signal, it is possible to implement a separate stack memory space. This feature is seldom used. The internal state word For more advanced systems, during one phase of its working loop, the processor set its "internal state byte" on the data bus. This byte contains flags that determine whether the memory or I/O port is accessed and whether it is necessary to handle an interrupt. The interrupt system state (enabled or disabled) is also output on a separate pin. For simple systems, where the interrupts are not used, it is possible to find cases where this pin is used as an additional single-bit output port (the popular Radio-86RK computer made in the Soviet Union, for instance). Example code The following 8080/8085 assembler source code is for a subroutine named that copies a block of data bytes of a given size from one location to another. The data block is copied one byte at a time, and the data movement and looping logic utilizes 16-bit operations. Pin use The address bus has its own 16 pins, and the data bus has 8 pins that are usable without any multiplexing. Using the two additional pins (read and write signals), it is possible to assemble simple microprocessor devices very easily. Only the separate IO space, interrupts, and DMA need added chips to decode the processor pin signals. However, the pin load capacity is limited; even simple computers often require bus amplifiers. The processor needs three power sources (−5, +5, and +12 V) and two non-overlapping high-amplitude synchronizing signals. However, at least the late Soviet version КР580ВМ80А was able to work with a single +5 V power source, the +12 V pin being connected to +5 V and the −5 V pin to ground. The pin-out table, from the chip's accompanying documentation, describes the pins as follows: Support chips A key factor in the success of the 8080 was the broad range of support chips available, providing serial communications, counter/timing, input/output, direct memory access, and programmable interrupt control amongst other functions: 8238 – System controller and bus driver 8251 – Communication controller 8253 – Programmable interval timer 8255 – Programmable peripheral interface 8257 – DMA controller 8259 – Programmable interrupt controller Physical implementation The 8080 integrated circuit uses non-saturated enhancement-load nMOS gates, demanding extra voltages (for the load-gate bias). It was manufactured in a silicon gate process using a minimal feature size of 6 µm. A single layer of metal is used to interconnect the approximately 4,500 transistors in the design, but the higher resistance polysilicon layer, which required higher voltage for some interconnects, is implemented with transistor gates. The die size is approximately 20 mm2. The industrial impact Applications and successors The 8080 is used in many early microcomputers, such as the MITS Altair 8800 Computer, Processor Technology SOL-20 Terminal Computer and IMSAI 8080 Microcomputer, forming the basis for machines running the CP/M operating system (the later, almost fully compatible and more able, Zilog Z80 processor would capitalize on this, with Z80 & CP/M becoming the dominant CPU and OS combination of the period circa 1976 to 1983 much as did the x86 & DOS for the PC a decade later). In 1979, even after the introduction of the Z80 and 8085 processors, five manufacturers of the 8080 were selling an estimated 500,000 units per month at a price around $3 to $4 each. The first single-board microcomputers, such as MYCRO-1 and the dyna-micro / MMD-1 (see: Single-board computer) were based on the Intel 8080. One of the early uses of the 8080 was made in the late 1970s by Cubic-Western Data of San Diego, CA in its Automated Fare Collection Systems custom designed for mass transit systems around the world. An early industrial use of the 8080 is as the "brain" of the DatagraphiX Auto-COM (Computer Output Microfiche) line of products which takes large amounts of user data from reel-to-reel tape and images it onto microfiche. The Auto-COM instruments also include an entire automated film cutting, processing, washing, and drying sub-system. Several early video arcade games were built around the 8080 microprocessor, including Space Invaders, one of the most popular arcade games ever made. Zilog introduced the Z80, which has a compatible machine language instruction set and initially used the same assembly language as the 8080, but for legal reasons, Zilog developed a syntactically-different (but code compatible) alternative assembly language for the Z80. At Intel, the 8080 was followed by the compatible and electrically more elegant 8085. Later, Intel issued the assembly-language compatible (but not binary-compatible) 16-bit 8086 and then the 8/16-bit 8088, which was selected by IBM for its new PC to be launched in 1981. Later NEC made the NEC V20 (an 8088 clone with Intel 80186 instruction set compatibility) which also supports an 8080 emulation mode. This is also supported by NEC's V30 (a similarly enhanced 8086 clone). Thus, the 8080, via its instruction set architecture (ISA), made a lasting impact on computer history. A number of processors compatible with the Intel 8080A were manufactured in the Eastern Bloc: the KR580VM80A (initially marked as KP580ИK80) in the Soviet Union, the MCY7880 made by Unitra CEMI in Poland, the MHB8080A made by TESLA in Czechoslovakia, the 8080APC made by Tungsram / MEV in Hungary, and the MMN8080 made by Microelectronica Bucharest in Romania. , the 8080 is still in production at Lansdale Semiconductors. Industry change The 8080 also changed how computers were created. When the 8080 was introduced, computer systems were usually created by computer manufacturers such as Digital Equipment Corporation, Hewlett Packard, or IBM. A manufacturer would produce the whole computer, including processor, terminals, and system software such as compilers and operating system. The 8080 was designed for almost any application except a complete computer system. Hewlett Packard developed the HP 2640 series of smart terminals around the 8080. The HP 2647 is a terminal which runs the programming language BASIC on the 8080. Microsoft's founding product, Microsoft BASIC, was originally programmed for the 8080. The 8080 and 8085 gave rise to the 8086, which was designed as a source code compatible, albeit not binary compatible, extension of the 8080. This design, in turn, later spawned the x86 family of chips, which continue to be Intel's primary line of processors. Many of the 8080's core machine instructions and concepts survive in the widespread x86 platform. Examples include the registers named A, B, C, and D and many of the flags used to control conditional jumps. 8080 assembly code can still be directly translated into x86 instructions, for all of its core elements are still present. Cultural impact Asteroid 8080 Intel is named as a pun and praise on the name of Intel 8080. Microsoft's published phone number, 425-882-8080, was chosen because much early work was on this chip. Many of Intel's main phone numbers also take a similar form: xxx-xxx-8080 See also CP/M – operating system S-100 bus MPT8080 References Further reading ; 495 pages ; 332 pages ; 466 pages ; 180 pages External links Intel and other manufacturers' 8080 CPU images and descriptions at cpu-collection.de Scan of the Intel 8080 data book at DataSheetArchive.com Microcomputer Design, Second Edition, 1976 8080 Emulator written in JavaScript Intel 8080/KR580VM80A emulator in JavaScript Intel 8080 Microcomputer Systems User's Manual (September 1975, 262 pages) Intel 8080 Microcomputer Systems User's Manual (September 1975, 234 pages) Intel 8080/8085 Instruction Reference Card Computer-related introductions in 1974 8-bit microprocessors
[ -0.3213096261024475, -0.17772190272808075, 0.13522139191627502, -0.09091192483901978, -0.004099844489246607, 0.41484829783439636, -0.0445859432220459, 0.3671504557132721, 0.018676983192563057, -0.28832846879959106, -0.20530632138252258, 0.6069394946098328, -0.4065779745578766, -0.148098289...
15063
https://en.wikipedia.org/wiki/Intel%208086
Intel 8086
The 8086 (also called iAPX 86) is a 16-bit microprocessor chip designed by Intel between early 1976 and June 8, 1978, when it was released. The Intel 8088, released July 1, 1979, is a slightly modified chip with an external 8-bit data bus (allowing the use of cheaper and fewer supporting ICs), and is notable as the processor used in the original IBM PC design. The 8086 gave rise to the x86 architecture, which eventually became Intel's most successful line of processors. On June 5, 2018, Intel released a limited-edition CPU celebrating the 40th anniversary of the Intel 8086, called the Intel Core i7-8086K. History Background In 1972, Intel launched the 8008, the first 8-bit microprocessor. It implemented an instruction set designed by Datapoint Corporation with programmable CRT terminals in mind, which also proved to be fairly general-purpose. The device needed several additional ICs to produce a functional computer, in part due to it being packaged in a small 18-pin "memory package", which ruled out the use of a separate address bus (Intel was primarily a DRAM manufacturer at the time). Two years later, Intel launched the 8080, employing the new 40-pin DIL packages originally developed for calculator ICs to enable a separate address bus. It has an extended instruction set that is source-compatible (not binary compatible) with the 8008 and also includes some 16-bit instructions to make programming easier. The 8080 device was eventually replaced by the depletion-load-based 8085 (1977), which sufficed with a single +5 V power supply instead of the three different operating voltages of earlier chips. Other well known 8-bit microprocessors that emerged during these years are Motorola 6800 (1974), General Instrument PIC16X (1975), MOS Technology 6502 (1975), Zilog Z80 (1976), and Motorola 6809 (1978). The first x86 design The 8086 project started in May 1976 and was originally intended as a temporary substitute for the ambitious and delayed iAPX 432 project. It was an attempt to draw attention from the less-delayed 16-bit and 32-bit processors of other manufacturers — Motorola, Zilog, and National Semiconductor. Whereas the 8086 was a 16-bit microprocessor, it used the same microarchitecture as Intel's 8-bit microprocessors (8008, 8080, and 8085). This allowed assembly language programs written in 8-bit to seamlessly migrate. New instructions and features — such as signed integers, base+offset addressing, and self-repeating operations — were added. Instructions were added to assist source code compilation of nested functions in the ALGOL-family of languages, including Pascal and PL/M. According to principal architect Stephen P. Morse, this was a result of a more software-centric approach. Other enhancements included microcode instructions for the multiply and divide assembly language instructions. Designers also anticipated coprocessors, such as 8087 and 8089, so the bus structure was designed to be flexible. The first revision of the instruction set and high level architecture was ready after about three months, and as almost no CAD tools were used, four engineers and 12 layout people were simultaneously working on the chip. The 8086 took a little more than two years from idea to working product, which was considered rather fast for a complex design in 1976–1978. The 8086 was sequenced using a mixture of random logic and microcode and was implemented using depletion-load nMOS circuitry with approximately 20,000 active transistors (29,000 counting all ROM and PLA sites). It was soon moved to a new refined nMOS manufacturing process called HMOS (for High performance MOS) that Intel originally developed for manufacturing of fast static RAM products. This was followed by HMOS-II, HMOS-III versions, and, eventually, a fully static CMOS version for battery powered devices, manufactured using Intel's CHMOS processes. The original chip measured 33 mm² and minimum feature size was 3.2 μm. The architecture was defined by Stephen P. Morse with some help from Bruce Ravenel (the architect of the 8087) in refining the final revisions. Logic designer Jim McKevitt and John Bayliss were the lead engineers of the hardware-level development team and Bill Pohlman the manager for the project. The legacy of the 8086 is enduring in the basic instruction set of today's personal computers and servers; the 8086 also lent its last two digits to later extended versions of the design, such as the Intel 286 and the Intel 386, all of which eventually became known as the x86 family. (Another reference is that the PCI Vendor ID for Intel devices is 8086h.) Details Buses and operation All internal registers, as well as internal and external data buses, are 16 bits wide, which firmly established the "16-bit microprocessor" identity of the 8086. A 20-bit external address bus provides a 1 MB physical address space (220 = 1,048,576 x 1 byte). This address space is addressed by means of internal memory "segmentation". The data bus is multiplexed with the address bus in order to fit all of the control lines into a standard 40-pin dual in-line package. It provides a 16-bit I/O address bus, supporting 64 KB of separate I/O space. The maximum linear address space is limited to 64 KB, simply because internal address/index registers are only 16 bits wide. Programming over 64 KB memory boundaries involves adjusting the segment registers (see below); this difficulty existed until the 80386 architecture introduced wider (32-bit) registers (the memory management hardware in the 80286 did not help in this regard, as its registers are still only 16 bits wide). Hardware modes Some of the control pins, which carry essential signals for all external operations, have more than one function depending upon whether the device is operated in min or max mode. The former mode is intended for small single-processor systems, while the latter is for medium or large systems using more than one processor (a kind of multiprocessor mode). Maximum mode is required when using an 8087 or 8089 coprocessor. The voltage on pin 33 (MN/) determines the mode. Changing the state of pin 33 changes the function of certain other pins, most of which have to do with how the CPU handles the (local) bus. The mode is usually hardwired into the circuit and therefore cannot be changed by software. The workings of these modes are described in terms of timing diagrams in Intel datasheets and manuals. In minimum mode, all control signals are generated by the 8086 itself. Registers and instructions The 8086 has eight more or less general 16-bit registers (including the stack pointer but excluding the instruction pointer, flag register and segment registers). Four of them, AX, BX, CX, DX, can also be accessed as twice as many 8-bit registers (see figure) while the other four, SI, DI, BP, SP, are 16-bit only. Due to a compact encoding inspired by 8-bit processors, most instructions are one-address or two-address operations, which means that the result is stored in one of the operands. At most one of the operands can be in memory, but this memory operand can also be the destination, while the other operand, the source, can be either register or immediate. A single memory location can also often be used as both source and destination which, among other factors, further contributes to a code density comparable to (and often better than) most eight-bit machines at the time. The degree of generality of most registers is much greater than in the 8080 or 8085. However, 8086 registers were more specialized than in most contemporary minicomputers and are also used implicitly by some instructions. While perfectly sensible for the assembly programmer, this makes register allocation for compilers more complicated compared to more orthogonal 16-bit and 32-bit processors of the time such as the PDP-11, VAX, 68000, 32016, etc. On the other hand, being more regular than the rather minimalistic but ubiquitous 8-bit microprocessors such as the 6502, 6800, 6809, 8085, MCS-48, 8051, and other contemporary accumulator-based machines, it is significantly easier to construct an efficient code generator for the 8086 architecture. Another factor for this is that the 8086 also introduced some new instructions (not present in the 8080 and 8085) to better support stack-based high-level programming languages such as Pascal and PL/M; some of the more useful instructions are push mem-op, and ret size, supporting the "Pascal calling convention" directly. (Several others, such as push immed and enter, were added in the subsequent 80186, 80286, and 80386 processors.) A 64 KB (one segment) stack growing towards lower addresses is supported in hardware; 16-bit words are pushed onto the stack, and the top of the stack is pointed to by SS:SP. There are 256 interrupts, which can be invoked by both hardware and software. The interrupts can cascade, using the stack to store the return addresses. The 8086 has 64 K of 8-bit (or alternatively 32 K of 16-bit word) I/O port space. Flags The 8086 has a 16-bit flags register. Nine of these condition code flags are active, and indicate the current state of the processor: Carry flag (CF), Parity flag (PF), Auxiliary carry flag (AF), Zero flag (ZF), Sign flag (SF), Trap flag (TF), Interrupt flag (IF), Direction flag (DF), and Overflow flag (OF). Also referred to as the status word, the layout of the flags register is as follows: Segmentation There are also four 16-bit segment registers (see figure) that allow the 8086 CPU to access one megabyte of memory in an unusual way. Rather than concatenating the segment register with the address register, as in most processors whose address space exceeds their register size, the 8086 shifts the 16-bit segment only four bits left before adding it to the 16-bit offset (16×segment + offset), therefore producing a 20-bit external (or effective or physical) address from the 32-bit segment:offset pair. As a result, each external address can be referred to by 212 = 4096 different segment:offset pairs. Although considered complicated and cumbersome by many programmers, this scheme also has advantages; a small program (less than 64 KB) can be loaded starting at a fixed offset (such as 0000) in its own segment, avoiding the need for relocation, with at most 15 bytes of alignment waste. Compilers for the 8086 family commonly support two types of pointer, near and far. Near pointers are 16-bit offsets implicitly associated with the program's code or data segment and so can be used only within parts of a program small enough to fit in one segment. Far pointers are 32-bit segment:offset pairs resolving to 20-bit external addresses. Some compilers also support huge pointers, which are like far pointers except that pointer arithmetic on a huge pointer treats it as a linear 20-bit pointer, while pointer arithmetic on a far pointer wraps around within its 16-bit offset without touching the segment part of the address. To avoid the need to specify near and far on numerous pointers, data structures, and functions, compilers also support "memory models" which specify default pointer sizes. The tiny (max 64K), small (max 128K), compact (data > 64K), medium (code > 64K), large (code,data > 64K), and huge (individual arrays > 64K) models cover practical combinations of near, far, and huge pointers for code and data. The tiny model means that code and data are shared in a single segment, just as in most 8-bit based processors, and can be used to build .com files for instance. Precompiled libraries often come in several versions compiled for different memory models. According to Morse et al.,. the designers actually contemplated using an 8-bit shift (instead of 4-bit), in order to create a 16 MB physical address space. However, as this would have forced segments to begin on 256-byte boundaries, and 1 MB was considered very large for a microprocessor around 1976, the idea was dismissed. Also, there were not enough pins available on a low cost 40-pin package for the additional four address bus pins. In principle, the address space of the x86 series could have been extended in later processors by increasing the shift value, as long as applications obtained their segments from the operating system and did not make assumptions about the equivalence of different segment:offset pairs. In practice the use of "huge" pointers and similar mechanisms was widespread and the flat 32-bit addressing made possible with the 32-bit offset registers in the 80386 eventually extended the limited addressing range in a more general way. The instruction stream is fetched from memory as words and is addressed internally by the processor to the byte level as necessary. An instruction stream queuing mechanism allows up to 6 bytes of the instruction stream to be queued while waiting for decoding and execution. The queue acts as a First-In-First-Out (FIFO) buffer, from which the Execution Unit (EU) extracts instruction bytes as required. Whenever there is space for at least two bytes in the queue, the BIU will attempt a word fetch memory cycle. If the queue is empty (following a branch instruction, for example), the first byte into the queue immediately becomes available to the EU. Porting older software Small programs could ignore the segmentation and just use plain 16-bit addressing. This allows 8-bit software to be quite easily ported to the 8086. The authors of most DOS implementations took advantage of this by providing an Application Programming Interface very similar to CP/M as well as including the simple .com executable file format, identical to CP/M. This was important when the 8086 and MS-DOS were new, because it allowed many existing CP/M (and other) applications to be quickly made available, greatly easing acceptance of the new platform. Example code The following 8086/8088 assembler source code is for a subroutine named _memcpy that copies a block of data bytes of a given size from one location to another. The data block is copied one byte at a time, and the data movement and looping logic utilizes 16-bit operations. The code above uses the BP (base pointer) register to establish a call frame, an area on the stack that contains all of the parameters and local variables for the execution of the subroutine. This kind of calling convention supports reentrant and recursive code, and has been used by most ALGOL-like languages since the late 1950s. The above routine is a rather cumbersome way to copy blocks of data. The 8086 provides dedicated instructions for copying strings of bytes. These instructions assume that the source data is stored at DS:SI, the destination data is stored at ES:DI, and that the number of elements to copy is stored in CX. The above routine requires the source and the destination block to be in the same segment, therefore DS is copied to ES. The loop section of the above can be replaced by: This copies the block of data one byte at a time. The REP instruction causes the following MOVSB to repeat until CX is zero, automatically incrementing SI and DI and decrementing CX as it repeats. Alternatively the MOVSW instruction can be used to copy 16-bit words (double bytes) at a time (in which case CX counts the number of words copied instead of the number of bytes). Most assemblers will properly recognize the REP instruction if used as an in-line prefix to the MOVSB instruction, as in REP MOVSB. This routine will operate correctly if interrupted, because the program counter will continue to point to the REP instruction until the block copy is completed. The copy will therefore continue from where it left off when the interrupt service routine returns control. Performance Although partly shadowed by other design choices in this particular chip, the multiplexed address and data buses limit performance slightly; transfers of 16-bit or 8-bit quantities are done in a four-clock memory access cycle, which is faster on 16-bit, although slower on 8-bit quantities, compared to many contemporary 8-bit based CPUs. As instructions vary from one to six bytes, fetch and execution are made concurrent and decoupled into separate units (as it remains in today's x86 processors): The bus interface unit feeds the instruction stream to the execution unit through a 6-byte prefetch queue (a form of loosely coupled pipelining), speeding up operations on registers and immediates, while memory operations became slower (four years later, this performance problem was fixed with the 80186 and 80286). However, the full (instead of partial) 16-bit architecture with a full width ALU meant that 16-bit arithmetic instructions could now be performed with a single ALU cycle (instead of two, via internal carry, as in the 8080 and 8085), speeding up such instructions considerably. Combined with orthogonalizations of operations versus operand types and addressing modes, as well as other enhancements, this made the performance gain over the 8080 or 8085 fairly significant, despite cases where the older chips may be faster (see below). EA = time to compute effective address, ranging from 5 to 12 cycles. Timings are best case, depending on prefetch status, instruction alignment, and other factors. As can be seen from these tables, operations on registers and immediates were fast (between 2 and 4 cycles), while memory-operand instructions and jumps were quite slow; jumps took more cycles than on the simple 8080 and 8085, and the 8088 (used in the IBM PC) was additionally hampered by its narrower bus. The reasons why most memory related instructions were slow were threefold: Loosely coupled fetch and execution units are efficient for instruction prefetch, but not for jumps and random data access (without special measures). No dedicated address calculation adder was afforded; the microcode routines had to use the main ALU for this (although there was a dedicated segment + offset adder). The address and data buses were multiplexed, forcing a slightly longer (33~50%) bus cycle than in typical contemporary 8-bit processors. However, memory access performance was drastically enhanced with Intel's next generation of 8086 family CPUs. The 80186 and 80286 both had dedicated address calculation hardware, saving many cycles, and the 80286 also had separate (non-multiplexed) address and data buses. Floating point The 8086/8088 could be connected to a mathematical coprocessor to add hardware/microcode-based floating-point performance. The Intel 8087 was the standard math coprocessor for the 8086 and 8088, operating on 80-bit numbers. Manufacturers like Cyrix (8087-compatible) and Weitek (not 8087-compatible) eventually came up with high-performance floating-point coprocessors that competed with the 8087. Chip versions The clock frequency was originally limited to 5 MHz, but the last versions in HMOS were specified for 10 MHz. HMOS-III and CMOS versions were manufactured for a long time (at least a while into the 1990s) for embedded systems, although its successor, the 80186/80188 (which includes some on-chip peripherals), has been more popular for embedded use. The 80C86, the CMOS version of the 8086, was used in the GRiDPad, Toshiba T1200, HP 110, and finally the 1998–1999 Lunar Prospector. For the packaging, the Intel 8086 was available both in ceramic and plastic DIP packages. List of Intel 8086 Derivatives and clones Compatible—and, in many cases, enhanced—versions were manufactured by Fujitsu, Harris/Intersil, OKI, Siemens, Texas Instruments, NEC, Mitsubishi, and AMD. For example, the NEC V20 and NEC V30 pair were hardware-compatible with the 8088 and 8086 even though NEC made original Intel clones μPD8088D and μPD8086D respectively, but incorporated the instruction set of the 80186 along with some (but not all) of the 80186 speed enhancements, providing a drop-in capability to upgrade both instruction set and processing speed without manufacturers having to modify their designs. Such relatively simple and low-power 8086-compatible processors in CMOS are still used in embedded systems. The electronics industry of the Soviet Union was able to replicate the 8086 through . The resulting chip, K1810VM86, was binary and pin-compatible with the 8086. i8086 and i8088 were respectively the cores of the Soviet-made PC-compatible EC1831 and EC1832 desktops. (EC1831 is the EC identification of IZOT 1036C and EC1832 is the EC identification of IZOT 1037C, developed and manufactured in Bulgaria. EC stands for Единая Система.) However, the EC1831 computer (IZOT 1036C) had significant hardware differences from the IBM PC prototype. The EC1831 was the first PC-compatible computer with dynamic bus sizing (US Pat. No 4,831,514). Later some of the EC1831 principles were adopted in PS/2 (US Pat. No 5,548,786) and some other machines (UK Patent Application, Publication No. GB-A-2211325, Published June 28, 1989). Support chips Intel 8237: direct memory access (DMA) controller Intel 8251: universal synchronous/asynchronous receiver/transmitter at 19.2 kbit/s Intel 8253: programmable interval timer, 3x 16-bit max 10 MHz Intel 8255: programmable peripheral interface, 3x 8-bit I/O pins used for printer connection etc. Intel 8259: programmable interrupt controller Intel 8279: keyboard/display controller, scans a keyboard matrix and display matrix like 7-seg Intel 8282/8283: 8-bit latch Intel 8284: clock generator Intel 8286/8287: bidirectional 8-bit driver. In 1980 both Intel I8286/I8287 (industrial grade) version were available for US$16.25 in quantities of 100. Intel 8288: bus controller Intel 8289: bus arbiter NEC µPD765 or Intel 8272A: floppy controller Microcomputers using the 8086 The Intel Multibus-compatible single-board computer ISBC 86/12 was announced in 1978. The Xerox NoteTaker was one of the earliest portable computer designs in 1978 and used three 8086 chips (as CPU, graphics processor, and I/O processor), but never entered commercial production. Seattle Computer Products shipped S-100 bus based 8086 systems (SCP200B) as early as November 1979. The Norwegian Mycron 2000, introduced in 1980. One of the most influential microcomputers of all, the IBM PC, used the Intel 8088, a version of the 8086 with an 8-bit data bus (as mentioned above). The first Compaq Deskpro used an 8086 running at 7.16 MHz, but was compatible with add-in cards designed for the 4.77 MHz IBM PC XT and could switch the CPU down to the lower speed (which also switched in a memory bus buffer to simulate the 8088's slower access) to avoid software timing issues. An 8 MHz 8086-2 was used in the AT&T 6300 PC (built by Olivetti, and known globally under several brands and model numbers), an IBM PC-compatible desktop microcomputer. The M24 / PC 6300 has IBM PC/XT compatible 8-bit expansion slots, but some of them have a proprietary extension providing the full 16-bit data bus of the 8086 CPU (similar in concept to the 16-bit slots of the IBM PC AT, but different in the design details, and physically incompatible), and all system peripherals including the onboard video system also enjoy 16-bit data transfers. The later Olivetti M24SP featured an 8086-2 running at the full maximum 10 MHz. The IBM PS/2 models 25 and 30 were built with an 8 MHz 8086. The Amstrad PC1512, PC1640, PC2086, PC3086 and PC5086 all used 8086 CPUs at 8 MHz. The NEC PC-9801. The Tandy 1000 SL-series and RL machines used 9.47 MHz 8086 CPUs. The IBM Displaywriter word processing machine and the Wang Professional Computer, manufactured by Wang Laboratories, also used the 8086. NASA used original 8086 CPUs on equipment for ground-based maintenance of the Space Shuttle Discovery until the end of the space shuttle program in 2011. This decision was made to prevent software regression that might result from upgrading or from switching to imperfect clones. KAMAN Process and Area Radiation Monitors See also Transistor count iAPX, for the iAPX name Notes References External links Intel datasheets List of 8086 CPUs and their clones at CPUworld.com 8086 Pinouts Maximum Mode Interface The 8086 User's manual October 1979 INTEL Corporation (PDF document) 8086 program codes using emu8086 (Version 4.08) Emulator Intel 8086/80186 emulator written in C, this file is part of a larger PC emulator Computer-related introductions in 1978 80086 16-bit microprocessors
[ -0.07985196262598038, 0.2947022020816803, 0.24138791859149933, 0.21772460639476776, -0.0157700814306736, 0.25716468691825867, 0.06026241555809975, 0.35962358117103577, -0.013893990777432919, -0.04015851020812988, -0.006775374058634043, 0.7393139600753784, -0.5061988830566406, -0.1136633828...
15064
https://en.wikipedia.org/wiki/Intel%208088
Intel 8088
The Intel 8088 ("eighty-eighty-eight", also called iAPX 88) microprocessor is a variant of the Intel 8086. Introduced on June 1, 1979, the 8088 has an eight-bit external data bus instead of the 16-bit bus of the 8086. The 16-bit registers and the one megabyte address range are unchanged, however. In fact, according to the Intel documentation, the 8086 and 8088 have the same execution unit (EU)—only the bus interface unit (BIU) is different. The original IBM PC is based on the 8088, as are its clones. History and description The 8088 was designed at Intel's laboratory in Haifa, Israel, as were a large number of Intel's processors. The 8088 was targeted at economical systems by allowing the use of an eight-bit data path and eight-bit support and peripheral chips; complex circuit boards were still fairly cumbersome and expensive when it was released. The prefetch queue of the 8088 was shortened to four bytes, from the 8086's six bytes, and the prefetch algorithm was slightly modified to adapt to the narrower bus. These modifications of the basic 8086 design were one of the first jobs assigned to Intel's new design office and laboratory in Haifa. Variants of the 8088 with more than 5 MHz maximal clock frequency include the 8088–2, which was fabricated using Intel's new enhanced nMOS process called HMOS and specified for a maximal frequency of 8 MHz. Later followed the 80C88, a fully static CHMOS design, which could operate with clock speeds from 0 to 8 MHz. There were also several other, more or less similar, variants from other manufacturers. For instance, the NEC V20 was a pin-compatible and slightly faster (at the same clock frequency) variant of the 8088, designed and manufactured by NEC. Successive NEC 8088 compatible processors would run at up to 16 MHz. In 1984, Commodore International signed a deal to manufacture the 8088 for use in a licensed Dynalogic Hyperion clone, in a move that was regarded as signaling a major new direction for the company. The available CMOS version was outsourced to Oki Electronic Industry Co., Ltd. When announced, the list price of the 8088 was US$124.80. The plastic package version was introduced on July 1981 for USD $14.10 per 100 in quantities. Intel second sourced this microprocessor to Fujitsu Limited. Differences from the 8086 The 8088 is architecturally very similar to the 8086. The main difference is that there are only eight data lines instead of the 8086's 16 lines. All of the other pins of the device perform the same function as they do with the 8086 with two exceptions. First, pin 34 is no longer (this is the high-order byte select on the 8086—the 8088 does not have a high-order byte on its eight-bit data bus). Instead it outputs a maximum mode status, . Combined with the IO/ and DT/ signals, the bus cycles can be decoded (it generally indicates when a write operation or an interrupt is in progress). The second change is the pin that signals whether a memory access or input/output access is being made has had it sense reversed. The pin on the 8088 is IO/. On the 8086 part it is /M. The reason for the reversal is that it makes the 8088 compatible with the 8085. Performance Depending on the clock frequency, the number of memory wait states, as well as on the characteristics of the particular application program, the average performance for the Intel 8088 ranged approximately from 0.33 to 1 million instructions per second. Meanwhile, the mov reg,reg and ALU reg,reg instructions, taking two and three cycles respectively, yielded an absolute peak performance of between and  MIPS per MHz, that is, somewhere in the range 3–5 MIPS at 10 MHz. The speed of the execution unit (EU) and the bus of the 8086 CPU was well balanced; with a typical instruction mix, an 8086 could execute instructions out of the prefetch queue a good bit of the time. Cutting down the bus to eight bits made it a serious bottleneck in the 8088. With the speed of instruction fetch reduced by 50% in the 8088 as compared to the 8086, a sequence of fast instructions can quickly drain the four-byte prefetch queue. When the queue is empty, instructions take as long to complete as they take to fetch. Both the 8086 and 8088 take four clock cycles to complete a bus cycle; whereas for the 8086 this means four clocks to transfer two bytes, on the 8088 it is four clocks per byte. Therefore, for example, a two-byte shift or rotate instruction, which takes the EU only two clock cycles to execute, actually takes eight clock cycles to complete if it is not in the prefetch queue. A sequence of such fast instructions prevents the queue from being filled as fast as it is drained, and in general, because so many basic instructions execute in fewer than four clocks per instruction byte—including almost all the ALU and data-movement instructions on register operands and some of these on memory operands—it is practically impossible to avoid idling the EU in the 8088 at least of the time while executing useful real-world programs, and it is not hard to idle it half the time. In short, an 8088 typically runs about half as fast as 8086 clocked at the same rate, because of the bus bottleneck (the only major difference). A side effect of the 8088 design, with the slow bus and the small prefetch queue, is that the speed of code execution can be very dependent on instruction order. When programming the 8088, for CPU efficiency, it is vital to interleave long-running instructions with short ones whenever possible. For example, a repeated string operation or a shift by three or more will take long enough to allow time for the 4-byte prefetch queue to completely fill. If short instructions (i.e. ones totaling few bytes) are placed between slower instructions like these, the short ones can execute at full speed out of the queue. If, on the other hand, the slow instructions are executed sequentially, back to back, then after the first of them the bus unit will be forced to idle because the queue will already be full, with the consequence that later more of the faster instructions will suffer fetch delays that might have been avoidable. As some instructions, such as single-bit-position shifts and rotates, take literally 4 times as long to fetch as to execute, the overall effect can be a slowdown by a factor of two or more. If those code segments are the bodies of loops, the difference in execution time may be very noticeable on the human timescale. The 8088 is also (like the 8086) slow at accessing memory. The same ALU that is used to execute arithmetic and logic instructions is also used to calculate effective addresses. There is a separate adder for adding a shifted segment register to the offset address, but the offset EA itself is always calculated entirely in the main ALU. Furthermore, the loose coupling of the EU and BIU (bus unit) inserts communication overhead between the units, and the four-clock period bus transfer cycle is not particularly streamlined. Contrast this with the two-clock period bus cycle of the 6502 CPU and the 80286's three-clock period bus cycle with pipelining down to two cycles for most transfers. Most 8088 instructions that can operate on either registers or memory, including common ALU and data-movement operations, are at least four times slower for memory operands than for only register operands. Therefore, efficient 8088 (and 8086) programs avoid repeated access of memory operands when possible, loading operands from memory into registers to work with them there and storing back only the finished results. The relatively large general register set of the 8088 compared to its contemporaries assists this strategy. When there are not enough registers for all variables that are needed at once, saving registers by pushing them onto the stack and popping them back to restore them is the fastest way to use memory to augment the registers, as the stack PUSH and POP instructions are the fastest memory operations. The same is probably not true on the 80286 and later; they have dedicated address ALUs and perform memory accesses much faster than the 8088 and 8086. Finally, because calls, jumps, and interrupts reset the prefetch queue, and because loading the IP register requires communication between the EU and the BIU (since the IP register is in the BIU, not in the EU, where the general registers are), these operations are costly. All jumps and calls take at least 15 clock cycles. Any conditional jump requires four clock cycles if not taken, but if taken, it requires 16 cycles in addition to resetting the prefetch queue; therefore, conditional jumps should be arranged to be not taken most of the time, especially inside loops. In some cases, a sequence of logic and movement operations is faster than a conditional jump that skips over one or two instructions to achieve the same result. Intel datasheets for the 8086 and 8088 advertised the dedicated multiply and divide instructions (MUL, IMUL, DIV, and IDIV), but they are very slow, on the order of 100–200 clock cycles each. Many simple multiplications by small constants (besides powers of 2, for which shifts can be used) can be done much faster using dedicated short subroutines. The 80286 and 80386 each greatly increase the execution speed of these multiply and divide instructions. Selection for use in the IBM PC The original IBM PC is the most influential microcomputer to use the 8088. It has a clock frequency of 4.77 MHz (4/3 the NTSC colorburst frequency). Some of IBM's engineers and other employees wanted to use the IBM 801 processor, some preferred the new Motorola 68000, and others argued for a small and simple microprocessor, such as the MOS Technology 6502 or Zilog Z80, which are in earlier personal computers. However, IBM already had a history of using Intel chips in its products and had also acquired the rights to manufacture the 8086 family. IBM chose the 8088 over the 8086 because Intel offered a better price for the former and could supply more units. Another factor was that the 8088 allowed the computer to be based on a modified 8085 design, as it could easily interface with most nMOS chips with 8-bit databuses. These were mature, and therefore economical, components. This included ICs originally intended for support and peripheral functions around the 8085 and similar processors (not exclusively Intel's), which were already well known by many engineers, further reducing cost. The descendants of the 8088 include the 80188, 80186, 80286, 80386, 80486, and later software-compatible processors, including the Intel Core processors, which are popular today. Gallery Peripherals Intel 8282/8283: 8-bit latch Intel 8284: clock generator Intel 8286/8287: bidirectional 8-bit driver. Both Intel I8286/I8287 (industrial grade) version were available for US$16.25 in quantities of 100. Intel 8288: bus controller Intel 8289: bus arbiter Intel 8087: Math Co-Processor See also x86 architecture IBM Personal Computer Motorola 68008 Maximum mode Minimum mode iAPX for the iAPX designation Professional Graphics Controller Transistor count Notes References External links chipdb.org - Intel datasheet for 8088 PCJS: Original IBM PC simulation that runs in your web browser Computer-related introductions in 1979 80088 Israeli inventions 16-bit microprocessors es:Intel 8086 y 8088#Pines del 8088
[ -0.2253689467906952, 0.09477069973945618, -0.034775279462337494, -0.028220465406775475, -0.022932816296815872, 0.1392875611782074, 0.07044514268636703, 0.11271534115076065, 0.05479345843195915, -0.164053812623024, -0.008734326809644699, 0.5000540614128113, -0.39100900292396545, -0.14985474...
15066
https://en.wikipedia.org/wiki/Insulator%20%28electricity%29
Insulator (electricity)
An electrical insulator is a material in which electric current does not flow freely. The atoms of the insulator have tightly bound electrons which cannot readily move. Other materials—semiconductors and conductors—conduct electric current more easily. The property that distinguishes an insulator is its resistivity; insulators have higher resistivity than semiconductors or conductors. The most common examples are non-metals. A perfect insulator does not exist because even insulators contain small numbers of mobile charges (charge carriers) which can carry current. In addition, all insulators become electrically conductive when a sufficiently large voltage is applied that the electric field tears electrons away from the atoms. This is known as the breakdown voltage of an insulator. Some materials such as glass, paper and PTFE, which have high resistivity, are very good electrical insulators. A much larger class of materials, even though they may have lower bulk resistivity, are still good enough to prevent significant current from flowing at normally used voltages, and thus are employed as insulation for electrical wiring and cables. Examples include rubber-like polymers and most plastics which can be thermoset or thermoplastic in nature. Insulators are used in electrical equipment to support and separate electrical conductors without allowing current through themselves. An insulating material used in bulk to wrap electrical cables or other equipment is called insulation. The term insulator is also used more specifically to refer to insulating supports used to attach electric power distribution or transmission lines to utility poles and transmission towers. They support the weight of the suspended wires without allowing the current to flow through the tower to ground. Physics of conduction in solids Electrical insulation is the absence of electrical conduction. Electronic band theory (a branch of physics) dictates that a charge flows if states are available into which electrons can be excited. This allows electrons to gain energy and thereby move through a conductor such as a metal. If no such states are available, the material is an insulator. Most (though not all, see Mott insulator) insulators have a large band gap. This occurs because the "valence" band containing the highest energy electrons is full, and a large energy gap separates this band from the next band above it. There is always some voltage (called the breakdown voltage) that gives electrons enough energy to be excited into this band. Once this voltage is exceeded the material ceases being an insulator, and charge begins to pass through it. However, it is usually accompanied by physical or chemical changes that permanently degrade the material's insulating properties. Materials that lack electron conduction are insulators if they lack other mobile charges as well. For example, if a liquid or gas contains ions, then the ions can be made to flow as an electric current, and the material is a conductor. Electrolytes and plasmas contain ions and act as conductors whether or not electron flow is involved. Breakdown When subjected to a high enough voltage, insulators suffer from the phenomenon of electrical breakdown. When the electric field applied across an insulating substance exceeds in any location the threshold breakdown field for that substance, the insulator suddenly becomes a conductor, causing a large increase in current, an electric arc through the substance. Electrical breakdown occurs when the electric field in the material is strong enough to accelerate free charge carriers (electrons and ions, which are always present at low concentrations) to a high enough velocity to knock electrons from atoms when they strike them, ionizing the atoms. These freed electrons and ions are in turn accelerated and strike other atoms, creating more charge carriers, in a chain reaction. Rapidly the insulator becomes filled with mobile charge carriers, and its resistance drops to a low level. In a solid, the breakdown voltage is proportional to the band gap energy. When corona discharge occurs, the air in a region around a high-voltage conductor can break down and ionise without a catastrophic increase in current. However, if the region of air breakdown extends to another conductor at a different voltage it creates a conductive path between them, and a large current flows through the air, creating an electric arc. Even a vacuum can suffer a sort of breakdown, but in this case the breakdown or vacuum arc involves charges ejected from the surface of metal electrodes rather than produced by the vacuum itself. In addition, all insulators become conductors at very high temperatures as the thermal energy of the valence electrons is sufficient to put them in the conduction band. In certain capacitors, shorts between electrodes formed due to dielectric breakdown can disappear when the applied electric field is reduced. Uses A very flexible coating of an insulator is often applied to electric wire and cable; this assembly is called insulated wire. Wires sometimes don't use an insulating coating, just air, since a solid (e.g. plastic) coating may be impractical. However, wires that touch each other produce cross connections, short circuits, and fire hazards. In coaxial cable the center conductor must be supported precisely in the middle of the hollow shield to prevent EM wave reflections. Finally, wires that expose voltages higher than 60 V can cause human shock and electrocution hazards. Insulating coatings help to prevent all of these problems. Some wires have a mechanical covering with no voltage rating—e.g.: service-drop, welding, doorbell, thermostat wire. An insulated wire or cable has a voltage rating and a maximum conductor temperature rating. It may not have an ampacity (current-carrying capacity) rating, since this is dependent upon the surrounding environment (e.g. ambient temperature). In electronic systems, printed circuit boards are made from epoxy plastic and fibreglass. The nonconductive boards support layers of copper foil conductors. In electronic devices, the tiny and delicate active components are embedded within nonconductive epoxy or phenolic plastics, or within baked glass or ceramic coatings. In microelectronic components such as transistors and ICs, the silicon material is normally a conductor because of doping, but it can easily be selectively transformed into a good insulator by the application of heat and oxygen. Oxidised silicon is quartz, i.e. silicon dioxide, the primary component of glass. In high voltage systems containing transformers and capacitors, liquid insulator oil is the typical method used for preventing arcs. The oil replaces air in spaces that must support significant voltage without electrical breakdown. Other high voltage system insulation materials include ceramic or glass wire holders, gas, vacuum, and simply placing wires far enough apart to use air as insulation. Insulation in electrical apparatus The most important insulation material is air. A variety of solid, liquid, and gaseous insulators are also used in electrical apparatus. In smaller transformers, generators, and electric motors, insulation on the wire coils consists of up to four thin layers of polymer varnish film. Film-insulated magnet wire permits a manufacturer to obtain the maximum number of turns within the available space. Windings that use thicker conductors are often wrapped with supplemental fiberglass insulating tape. Windings may also be impregnated with insulating varnishes to prevent electrical corona and reduce magnetically induced wire vibration. Large power transformer windings are still mostly insulated with paper, wood, varnish, and mineral oil; although these materials have been used for more than 100 years, they still provide a good balance of economy and adequate performance. Busbars and circuit breakers in switchgear may be insulated with glass-reinforced plastic insulation, treated to have low flame spread and to prevent tracking of current across the material. In older apparatus made up to the early 1970s, boards made of compressed asbestos may be found; while this is an adequate insulator at power frequencies, handling or repairs to asbestos material can release dangerous fibers into the air and must be carried out cautiously. Wire insulated with felted asbestos was used in high-temperature and rugged applications from the 1920s. Wire of this type was sold by General Electric under the trade name "Deltabeston." Live-front switchboards up to the early part of the 20th century were made of slate or marble. Some high voltage equipment is designed to operate within a high pressure insulating gas such as sulfur hexafluoride. Insulation materials that perform well at power and low frequencies may be unsatisfactory at radio frequency, due to heating from excessive dielectric dissipation. Electrical wires may be insulated with polyethylene, crosslinked polyethylene (either through electron beam processing or chemical crosslinking), PVC, Kapton, rubber-like polymers, oil impregnated paper, Teflon, silicone, or modified ethylene tetrafluoroethylene (ETFE). Larger power cables may use compressed inorganic powder, depending on the application. Flexible insulating materials such as PVC (polyvinyl chloride) are used to insulate the circuit and prevent human contact with a 'live' wire – one having voltage of 600 volts or less. Alternative materials are likely to become increasingly used due to EU safety and environmental legislation making PVC less economic. In electrical apparatus such as motors, generators, and transformers, various insulation systems are used, classified by their maximum recommended working temperature to achieve acceptable operating life. Materials range from upgraded types of paper to inorganic compounds. Class I and Class II insulation All portable or hand-held electrical devices are insulated to protect their user from harmful shock. Class I insulation requires that the metal body and other exposed metal parts of the device be connected to earth via a grounding wire that is earthed at the main service panel—but only needs basic insulation on the conductors. This equipment needs an extra pin on the power plug for the grounding connection. Class II insulation means that the device is double insulated. This is used on some appliances such as electric shavers, hair dryers and portable power tools. Double insulation requires that the devices have both basic and supplementary insulation, each of which is sufficient to prevent electric shock. All internal electrically energized components are totally enclosed within an insulated body that prevents any contact with "live" parts. In the EU, double insulated appliances all are marked with a symbol of two squares, one inside the other. Telegraph and power transmission insulators Overhead conductors for high-voltage electric power transmission are bare, and are insulated by the surrounding air. Conductors for lower voltages in distribution may have some insulation but are often bare as well. Insulating supports called insulators are required at the points where they are supported by utility poles or transmission towers. Insulators are also required where the wire enters buildings or electrical devices, such as transformers or circuit breakers, to insulate the wire from the case. These hollow insulators with a conductor inside them are called bushings. Material Insulators used for high-voltage power transmission are made from glass, porcelain or composite polymer materials. Porcelain insulators are made from clay, quartz or alumina and feldspar, and are covered with a smooth glaze to shed water. Insulators made from porcelain rich in alumina are used where high mechanical strength is a criterion. Porcelain has a dielectric strength of about 4–10 kV/mm. Glass has a higher dielectric strength, but it attracts condensation and the thick irregular shapes needed for insulators are difficult to cast without internal strains. Some insulator manufacturers stopped making glass insulators in the late 1960s, switching to ceramic materials. Recently, some electric utilities have begun converting to polymer composite materials for some types of insulators. These are typically composed of a central rod made of fibre reinforced plastic and an outer weathershed made of silicone rubber or ethylene propylene diene monomer rubber (EPDM). Composite insulators are less costly, lighter in weight, and have excellent hydrophobic capability. This combination makes them ideal for service in polluted areas. However, these materials do not yet have the long-term proven service life of glass and porcelain. Design The electrical breakdown of an insulator due to excessive voltage can occur in one of two ways: A puncture arc is a breakdown and conduction of the material of the insulator, causing an electric arc through the interior of the insulator. The heat resulting from the arc usually damages the insulator irreparably. Puncture voltage is the voltage across the insulator (when installed in its normal manner) that causes a puncture arc. A flashover arc is a breakdown and conduction of the air around or along the surface of the insulator, causing an arc along the outside of the insulator. Insulators are usually designed to withstand flashover without damage. Flashover voltage is the voltage that causes a flash-over arc. Most high voltage insulators are designed with a lower flashover voltage than puncture voltage, so they flash over before they puncture, to avoid damage. Dirt, pollution, salt, and particularly water on the surface of a high voltage insulator can create a conductive path across it, causing leakage currents and flashovers. The flashover voltage can be reduced by more than 50% when the insulator is wet. High voltage insulators for outdoor use are shaped to maximise the length of the leakage path along the surface from one end to the other, called the creepage length, to minimise these leakage currents. To accomplish this the surface is moulded into a series of corrugations or concentric disc shapes. These usually include one or more sheds; downward facing cup-shaped surfaces that act as umbrellas to ensure that the part of the surface leakage path under the 'cup' stays dry in wet weather. Minimum creepage distances are 20–25 mm/kV, but must be increased in high pollution or airborne sea-salt areas. Types of insulators These are the common classes of insulators: Pin insulator - As the name suggests, the pin type insulator is mounted on a pin on the cross-arm on the pole. There is a groove on the upper end of the insulator. The conductor passes through this groove and is tied to the insulator with annealed wire of the same material as the conductor. Pin type insulators are used for transmission and distribution of communications, and electric power at voltages up to 33 kV. Insulators made for operating voltages between 33 kV and 69 kV tend to be very bulky and have become uneconomical in recent years. Post insulator - A type of insulator in the 1930s that is more compact than traditional pin-type insulators and which has rapidly replaced many pin-type insulators on lines up to 69 kV and in some configurations, can be made for operation at up to 115 kV. Suspension insulator - For voltages greater than 33 kV, it is a usual practice to use suspension type insulators, consisting of a number of glass or porcelain discs connected in series by metal links in the form of a string. The conductor is suspended at the bottom end of this string while the top end is secured to the cross-arm of the tower. The number of disc units used depends on the voltage. Strain insulator - A dead end or anchor pole or tower is used where a straight section of line ends, or angles off in another direction. These poles must withstand the lateral (horizontal) tension of the long straight section of wire. To support this lateral load, strain insulators are used. For low voltage lines (less than 11 kV), shackle insulators are used as strain insulators. However, for high voltage transmission lines, strings of cap-and-pin (suspension) insulators are used, attached to the crossarm in a horizontal direction. When the tension load in lines is exceedingly high, such as at long river spans, two or more strings are used in parallel. Shackle insulator - In early days, the shackle insulators were used as strain insulators. But nowaday, they are frequently used for low voltage distribution lines. Such insulators can be used either in a horizontal position or in a vertical position. They can be directly fixed to the pole with a bolt or to the cross arm. Bushing - enables one or several conductors to pass through a partition such as a wall or a tank, and insulates the conductors from it. Line post insulator Station post insulator Cut-out Sheath insulator An insulator that protects a full length of bottom-contact third rail. Suspension insulators Pin-type insulators are unsuitable for voltages greater than about 69 kV line-to-line. Higher transmission voltages use suspension insulator strings, which can be made for any practical transmission voltage by adding insulator elements to the string. Higher voltage transmission lines usually use modular suspension insulator designs. The wires are suspended from a 'string' of identical disc-shaped insulators that attach to each other with metal clevis pin or ball-and-socket links. The advantage of this design is that insulator strings with different breakdown voltages, for use with different line voltages, can be constructed by using different numbers of the basic units. Also, if one of the insulator units in the string breaks, it can be replaced without discarding the entire string. Each unit is constructed of a ceramic or glass disc with a metal cap and pin cemented to opposite sides. To make defective units obvious, glass units are designed so that an overvoltage causes a puncture arc through the glass instead of a flashover. The glass is heat-treated so it shatters, making the damaged unit visible. However the mechanical strength of the unit is unchanged, so the insulator string stays together. Standard suspension disc insulator units are in diameter and long, can support a load of , have a dry flashover voltage of about 72 kV, and are rated at an operating voltage of 10–12 kV. However, the flashover voltage of a string is less than the sum of its component discs, because the electric field is not distributed evenly across the string but is strongest at the disc nearest to the conductor, which flashes over first. Metal grading rings are sometimes added around the disc at the high voltage end, to reduce the electric field across that disc and improve flashover voltage. In very high voltage lines the insulator may be surrounded by corona rings. These typically consist of toruses of aluminium (most commonly) or copper tubing attached to the line. They are designed to reduce the electric field at the point where the insulator is attached to the line, to prevent corona discharge, which results in power losses. History The first electrical systems to make use of insulators were telegraph lines; direct attachment of wires to wooden poles was found to give very poor results, especially during damp weather. The first glass insulators used in large quantities had an unthreaded pinhole. These pieces of glass were positioned on a tapered wooden pin, vertically extending upwards from the pole's crossarm (commonly only two insulators to a pole and maybe one on top of the pole itself). Natural contraction and expansion of the wires tied to these "threadless insulators" resulted in insulators unseating from their pins, requiring manual reseating. Amongst the first to produce ceramic insulators were companies in the United Kingdom, with Stiff and Doulton using stoneware from the mid-1840s, Joseph Bourne (later renamed Denby) producing them from around 1860 and Bullers from 1868. Utility patent number 48,906 was granted to Louis A. Cauvet on 25 July 1865 for a process to produce insulators with a threaded pinhole: pin-type insulators still have threaded pinholes. The invention of suspension-type insulators made high-voltage power transmission possible. As transmission line voltages reached and passed 60,000 volts, the insulators required become very large and heavy, with insulators made for a safety margin of 88,000 volts being about the practical limit for manufacturing and installation. Suspension insulators, on the other hand, can be connected into strings as long as required for the line's voltage. A large variety of telephone, telegraph and power insulators have been made; some people collect them, both for their historic interest and for the aesthetic quality of many insulator designs and finishes. One collectors organisation is the US National Insulator Association, which has over 9,000 members. Insulation of antennas Often a broadcasting radio antenna is built as a mast radiator, which means that the entire mast structure is energised with high voltage and must be insulated from the ground. Steatite mountings are used. They have to withstand not only the voltage of the mast radiator to ground, which can reach values up to 400 kV at some antennas, but also the weight of the mast construction and dynamic forces. Arcing horns and lightning arresters are necessary because lightning strikes to the mast are common. Guy wires supporting antenna masts usually have strain insulators inserted in the cable run, to keep the high voltages on the antenna from short circuiting to ground or creating a shock hazard. Often guy cables have several insulators, placed to break up the cable into lengths that prevent unwanted electrical resonances in the guy. These insulators are usually ceramic and cylindrical or egg-shaped (see picture). This construction has the advantage that the ceramic is under compression rather than tension, so it can withstand greater load, and that if the insulator breaks, the cable ends are still linked. These insulators also have to be equipped with overvoltage protection equipment. For the dimensions of the guy insulation, static charges on guys have to be considered. For high masts, these can be much higher than the voltage caused by the transmitter, requiring guys divided by insulators in multiple sections on the highest masts. In this case, guys which are grounded at the anchor basements via a coil - or if possible, directly - are the better choice. Feedlines attaching antennas to radio equipment, particularly twin lead type, often must be kept at a distance from metal structures. The insulated supports used for this purpose are called standoff insulators. See also Dielectric material Electrical conductivity Notes References Function of Grading rings to Composite Insulator General Overview on Glass Insulators Materials Electrical resistance and conductance
[ 0.3381938934326172, 0.06009620800614357, 0.4281386733055115, 0.14323081076145172, -0.08160817623138428, -0.15450796484947205, -0.0016457756282761693, 0.024738475680351257, -0.11793652176856995, -0.43581292033195496, -0.43760251998901367, 0.338422566652298, -0.5597905516624451, 0.1981017738...
15067
https://en.wikipedia.org/wiki/Internetworking
Internetworking
Internetworking is the practice of interconnecting multiple computer networks, such that any pair of hosts in the connected networks can exchange messages irrespective of their hardware-level networking technology. The resulting system of interconnected networks are called an internetwork, or simply an internet. The most notable example of internetworking is the Internet, a network of networks based on many underlying hardware technologies. The Internet is defined by a unified global addressing system, packet format, and routing methods provided by the Internet Protocol. The term internetworking is a combination of the components inter (between) and networking. An earlier term for an internetwork is catenet, a short-form of (con)catenating networks. Interconnection of networks Internetworking started as a way to connect disparate types of networking technology, but it became widespread through the developing need to connect two or more local area networks via some sort of wide area network. The first two interconnected networks were the ARPANET and the NPL network via Peter Kirstein's group at University College London. The network elements used to connect individual networks in the ARPANET, the predecessor of the Internet, were originally called gateways, but the term has been deprecated in this context, because of possible confusion with functionally different devices. By 1973-4, researchers in the United States, the United Kingdom and France had worked out an approach to internetworking where the differences between network protocols were hidden by using a common internetwork protocol, and instead of the network being responsible for reliability, as in the ARPANET, the hosts became responsible, as demonstrated in the CYCLADES network. Research by Donald Davies' team at NPL confirmed establishing a common host protocol would be more reliable and efficient. Today the interconnecting gateways are called routers. The definition of an internetwork today includes the connection of other types of computer networks such as personal area networks. To build an internetwork, the following are needed: A standardized scheme to address packets to any host on any participating network; a standardized protocol defining format and handling of transmitted packets; components interconnecting the participating networks by routing packets to their destinations based on standardized addresses. Another type of interconnection of networks often occurs within enterprises at the link layer of the networking model, i.e. at the hardware-centric layer below the level of the TCP/IP logical interfaces. Such interconnection is accomplished with network bridges and network switches. This is sometimes incorrectly termed internetworking, but the resulting system is simply a larger, single subnetwork, and no internetworking protocol, such as Internet Protocol, is required to traverse these devices. However, a single computer network may be converted into an internetwork by dividing the network into segments and logically dividing the segment traffic with routers and having an internetworking software layer that applications employ. The Internet Protocol is designed to provide an unreliable (not guaranteed) packet service across the network. The architecture avoids intermediate network elements maintaining any state of the network. Instead, this function is assigned to the endpoints of each communication session. To transfer data reliably, applications must utilize an appropriate transport layer protocol, such as Transmission Control Protocol (TCP), which provides a reliable stream. Some applications use a simpler, connection-less transport protocol, User Datagram Protocol (UDP), for tasks which do not require reliable delivery of data or that require real-time service, such as video streaming or voice chat. Catenet Catenet is an obsolete term for a system of packet-switched communication networks interconnected via gateways. The term was coined by Louis Pouzin in October 1973 in a note circulated to the International Networking Working Group, later published in a 1974 paper "A Proposal for Interconnecting Packet Switching Networks". Pouzin was a pioneer in packet-switching technology and founder of the CYCLADES network, at a time when network meant what is now called a local area network. Catenet was the concept of linking these networks into a network of networks with specifications for compatibility of addressing and routing. The term catenet was gradually displaced by the short-form of the term internetwork, internet (lower-case i), when the Internet Protocol replaced earlier protocols on the ARPANET. Networking models Two architectural models are commonly used to describe the protocols and methods used in internetworking. The Open System Interconnection (OSI) reference model was developed under the auspices of the International Organization for Standardization (ISO) and provides a rigorous description for layering protocol functions from the underlying hardware to the software interface concepts in user applications. Internetworking is implemented in the Network Layer (Layer 3) of the model. The Internet Protocol Suite, also known as the TCP/IP model, was not designed to conform to the OSI model and does not refer to it in any of the normative specifications in Request for Comments and Internet standards. Despite similar appearance as a layered model, it has a much less rigorous, loosely defined architecture that concerns itself only with the aspects of the style of networking in its own historical provenance. It assumes the availability of any suitable hardware infrastructure, without discussing hardware-specific low-level interfaces, and that a host has access to this local network to which it is connected via a link layer interface. For a period in the late 1980s and early 1990s, the network engineering community was polarized over the implementation of competing protocol suites, commonly known as the Protocol Wars. It was unclear which of the OSI model and the Internet protocol suite would result in the best and most robust computer networks. See also History of the Internet References Network architecture
[ 0.26571521162986755, 0.25653910636901855, 0.010659401305019855, 0.19709955155849457, 0.19372177124023438, -0.2386714369058609, 0.012494992464780807, 0.4812915623188019, -0.5370342135429382, -0.9223181009292603, -0.38974860310554504, 0.19468256831169128, -0.6402677893638611, 0.0567990280687...
15068
https://en.wikipedia.org/wiki/Infantry
Infantry
Infantry is an army specialization whose personnel engage in military combat, usually against other enemy ground forces, as part of ground forces. They operate weapons and equipment to engage and destroy enemy ground forces. Infantry generally consists of light infantry, mountain infantry, motorized infantry, marine infantry, mechanized infantry or airborne infantry. It is considered to be one of the most physically demanding and psychologically stressful military jobs. Infantry have much greater local situational awareness than other military forces, due to their inherent intimate contact with the battlefield ("boots on the ground"); this is vital for engaging and infiltrating enemy positions, holding and defending ground (any military objectives), securing battlefield victories, maintaining military area control and security both at and behind the front lines, for capturing ordnance or materiel, taking prisoners, and military occupation. Infantry can more easily recognise, adapt and respond to local conditions, weather, and changing enemy weapons or tactics. They can operate in a wide range of terrain inaccessible to military vehicles, and can operate with a lower logistical burden. Infantry are the most easily delivered forces to ground combat areas, by simple and reliable marching, or by trucks, sea or air transport; they can also be inserted directly into combat by amphibious landing, by air drop with parachute (airborne infantry) or via air assault by helicopters (airmobile infantry). They can be augmented with a variety of crew-served weapons, armoured personnel carriers, and infantry fighting vehicles. Etymology and terminology In English, use of the term infantry began about the 1570s, describing soldiers who march and fight on foot. The word derives from Middle French infanterie, from older Italian (also Spanish) infanteria (foot soldiers too inexperienced for cavalry), from Latin īnfāns (without speech, newborn, foolish), from which English also gets infant. The individual-soldier term infantryman was not coined until 1837. In modern usage, foot soldiers of any era are now considered infantry and infantrymen. From the mid-18th century until 1881 the British Army named its infantry as numbered regiments "of Foot" to distinguish them from cavalry and dragoon regiments (see List of Regiments of Foot). Infantry equipped with special weapons were often named after that weapon, such as grenadiers for their grenades, or fusiliers for their fusils. These names can persist long after the weapon speciality; examples of infantry units that retained such names are the Royal Irish Fusiliers and the Grenadier Guards. More commonly in modern times, infantry with special tactics are named for their roles, such as commandos, rangers, snipers, marines, (who all have additional training) and militia (who have limited training); they are still infantry due to their expectation to fight as infantry when they enter combat. Dragoons were created as mounted infantry, with horses for travel between battles; they were still considered infantry since they dismounted before combat. However, if light cavalry was lacking in an army, any available dragoons might be assigned their duties; this practise increased over time, and dragoons eventually received all the weapons and training as both infantry and cavalry, and could be classified as both. Conversely, starting about the mid-19th century, regular cavalry have been forced to spend more of their time dismounted in combat due to the ever-increasing effectiveness of enemy infantry firearms. Thus most cavalry transitioned to mounted infantry. As with grenadiers, the dragoon and cavalry designations can be retained long after their horses, such as in the Royal Dragoon Guards, Royal Lancers, and King's Royal Hussars. Similarly, motorised infantry have trucks and other unarmed vehicles for non-combat movement, but are still infantry since they leave their vehicles for any combat. Most modern infantry have vehicle transport, to the point where infantry being motorised is generally assumed, and the few exceptions might be identified as modern light infantry, or "leg infantry" colloquially. Mechanised infantry go beyond motorised, having transport vehicles with combat abilities, armoured personnel carriers (APCs), providing at least some options for combat without leaving their vehicles. In modern infantry, some APCs have evolved to be infantry fighting vehicles (IFVs), which are transport vehicles with more substantial combat abilities, approaching those of light tanks. Some well-equipped mechanised infantry can be designated as armoured infantry. Given that infantry forces typically also have some tanks, and given that most armoured forces have more mechanised infantry units than tank units in their organisation, the distinction between mechanised infantry and armour forces has blurred. The terms infantry, armour, and cavalry used in the official names for military units like divisions, brigades, or regiments might be better understood as a description of their expected balance of defensive, offensive, and mobility roles, rather than just use of vehicles. Some modern mechanised infantry units are termed cavalry or armoured cavalry, even though they never had horses, to emphasise their combat mobility. In the modern US Army, about 15% of soldiers are officially Infantry. The basic training for all new US Army soldiers includes basic use of infantry used weapons and basic tactics, even for tank crews, artillery crews, and base and logistical personnel. However, no other MOS receives the same detailed rigorous training and standards in which every infantry soldier endures on a regular basis. History The first military forces in history were infantry. In antiquity, infantry were armed with early melee weapons such as a spear, axe, or sword, or an early ranged weapon like a javelin, sling, or bow, with a few infantrymen being expected to use both a melee and a ranged weapon. With the development of gunpowder, infantry began converting to primarily firearms. By the time of Napoleonic warfare, infantry, cavalry and artillery formed a basic triad of ground forces, though infantry usually remained the most numerous. With armoured warfare, armoured fighting vehicles have replaced the horses of cavalry, and airpower has added a new dimension to ground combat, but infantry remains pivotal to all modern combined arms operations. The first warriors, adopting hunting weapons or improvised melee weapons, before the existence of any organised military, likely started essentially as loose groups without any organisation or formation. But this changed sometime before recorded history; the first ancient empires (2500–1500 BC) are shown to have some soldiers with standardised military equipment, and the training and discipline required for battlefield formations and manoeuvres: regular infantry. Though the main force of the army, these forces were usually kept small due to their cost of training and upkeep, and might be supplemented by local short-term mass-conscript forces using the older irregular infantry weapons and tactics; this remained a common practice almost up to modern times. Before the adoption of the chariot to create the first mobile fighting forces , all armies were pure infantry. Even after, with a few exceptions like the Mongol Empire, infantry has been the largest component of most armies in history. In the Western world, from Classical Antiquity through the Middle Ages ( 8th century BC to 15th century AD), infantry are categorised as either heavy infantry or light infantry. Heavy infantry, such as Greek hoplites, Macedonian phalangites, and Roman legionaries, specialised in dense, solid formations driving into the main enemy lines, using weight of numbers to achieve a decisive victory, and were usually equipped with heavier weapons and armour to fit their role. Light infantry, such as Greek peltasts, Balearic slingers, and Roman velites, using open formations and greater manoeuvrability, took on most other combat roles: scouting, screening the army on the march, skirmishing to delay, disrupt, or weaken the enemy to prepare for the main forces' battlefield attack, protecting them from flanking manoeuvers, and then afterwards either pursuing the fleeing enemy or covering their army's retreat. After the fall of Rome, the quality of heavy infantry declined, and warfare was dominated by heavy cavalry, such as knights, forming small elite units for decisive shock combat, supported by peasant infantry militias and assorted light infantry from the lower classes. Towards the end of Middle Ages, this began to change, where more professional and better trained light infantry could be effective against knights, such as the English longbowmen in the Hundred Years' War. By the start of the Renaissance, the infantry began to return to dominance, with Swiss pikemen and German Landsknechts filling the role of heavy infantry again, using dense formations of pikes to drive off any cavalry. Dense formations are vulnerable to ranged weapons. Technological developments allowed the raising of large numbers of light infantry units armed with ranged weapons, without the years of training expected for traditional high-skilled archers and slingers. This started slowly, first with crossbowmen, then hand cannoneers and arquebusiers, each with increasing effectiveness, marking the beginning of early modern warfare, when firearms rendered the use of heavy infantry obsolete. The introduction of musketeers using bayonets in the mid 17th century began replacement of the pike with the infantry square replacing the pike square. To maximise their firepower, musketeer infantry were trained to fight in wide lines facing the enemy, creating line infantry. These fulfilled the central battlefield role of earlier heavy infantry, using ranged weapons instead of melee weapons. To support these lines, smaller infantry formations using dispersed skirmish lines were created, called light infantry, fulfilling the same multiple roles as earlier light infantry. Their arms were no lighter than line infantry; they were distinguished by their skirmish formation and flexible tactics. The modern rifleman infantry became the primary force for taking and holding ground on battlefields worldwide, a vital element of combined arms combat. As firepower continued to increase, use of infantry lines diminished, until all infantry became light infantry in practice. Modern classifications of infantry have expanded to reflect modern equipment and tactics, such as motorised infantry, mechanised or armoured infantry, mountain infantry, marine infantry, and airborne infantry. Equipment An infantryman's equipment is of vital concern both for the man and the military. The needs of the infantryman to maintain fitness and effectiveness must be constantly balanced against being overburdened. While soldiers in other military branches can use their mount or vehicle for carrying equipment, and tend to operate together as crews serving their vehicle or ordnance, infantrymen must operate more independently; each infantryman usually having much more personal equipment to use and carry. This encourages searching for ingenious combinations of effective, rugged, serviceable and adaptable, yet light, compact, and handy infantry equipment. Beyond their main arms and armour, each infantryman's "military kit" includes combat boots, battledress or combat uniform, camping gear, heavy weather gear, survival gear, secondary weapons and ammunition, weapon service and repair kits, health and hygiene items, mess kit, rations, filled water canteen, and all other consumables each infantryman needs for the expected duration of time operating away from their unit's base, plus any special mission-specific equipment. One of the most valuable pieces of gear is the entrenching tool—basically a folding spade—which can be employed not only to dig important defences, but also in a variety of other daily tasks, and even sometimes as a weapon. Infantry typically have shared equipment on top of this, like tents or heavy weapons, where the carrying burden is spread across several infantrymen. In all, this can reach for each soldier on the march. Such heavy infantry burdens have changed little over centuries of warfare; in the late Roman Republic, legionaries were nicknamed Marius' mules as their main activity seemed to be carrying the weight of their legion around on their backs. When combat is expected, infantry typically switch to "packing light", meaning reducing their equipment to weapons, ammo, and bare essentials, and leaving the rest with their transport or baggage train, at camp or rally point, in temporary hidden caches, or even (in emergencies) discarding whatever may slow them down. Additional specialised equipment may be required, depending on the mission or to the particular terrain or environment, including satchel charges, demolition tools, mines, barbed wire, carried by the infantry or attached specialists. Historically, infantry have suffered high casualty rates from disease, exposure, exhaustion and privation — often in excess of the casualties suffered from enemy attacks. Better infantry equipment to support their health, energy, and protect from environmental factors greatly reduces these rates of loss, and increase their level of effective action. Health, energy, and morale are greatly influenced by how the soldier is fed, so militaries often standardised field rations, starting from hardtack, to US K-rations, to modern MREs. Communications gear has become a necessity, as it allows effective command of infantry units over greater distances, and communication with artillery and other support units. Modern infantry can have GPS, encrypted individual communications equipment, surveillance and night vision equipment, advanced intelligence and other high-tech mission-unique aids. Armies have sought to improve and standardise infantry gear to reduce fatigue for extended carrying, increase freedom of movement, accessibility, and compatibility with other carried gear, such as the US All-purpose Lightweight Individual Carrying Equipment (ALICE). Weapons Infantrymen are defined by their primary arms – the personal weapons and body armour for their own individual use. The available technology, resources, history, and society can produce quite different weapons for each military and era, but common infantry weapons can be distinguished in a few basic categories. Ranged combat weapons: javelins, slings, blowguns, bows, crossbows, hand cannons, arquebuses, muskets, grenades, flamethrowers. Close combat weapons: bludgeoning weapons like clubs, flails and maces; bladed weapons like swords, daggers, and axes; pole weapons like spears, halberds, naginata, and pikes. Both ranged and close weapons: the bayonet fixed to a firearm allows infantrymen to use the same weapon for both ranged combat and close combat. This started with muskets and continued with rifles to automatic firearms. Use of the bayonet has declined with modern automatic firearms, but still generally kept as a weapon of last resort. Infantrymen often carry secondary or back-up weapons, sometimes called a sidearm or ancillary weapons in modern terminology, either issued officially as an addition to the soldier's standard arms, or acquired unofficially by any other means as an individual preference. Such weapons are used when the primary weapon is no longer effective, such it becoming damaged, running out of ammunition, malfunction, or in a change of tactical situation where another weapon is preferred, such as going from ranged to close combat. Infantry with ranged or pole weapons often carried a sword or dagger for possible hand-to-hand combat. The pilum was a javelin the Roman legionaries threw just before drawing their primary weapon, the gladius (short sword), and closing with the enemy line. Modern infantrymen now treat the bayonet as a backup weapon, but may also have handguns or pistols. They may also deploy anti-personnel mines, booby traps, incendiary or explosive devices defensively before combat. Some non-weapon equipment are designed for close combat shock effects, to get and psychological edge before melee, such as battle flags, war drums, brilliant uniforms, fierce body paint or tattoos, and even battle cries. These have become mostly only ceremonial since the decline of close combat military tactics. Protection Infantry have employed many different methods of protection from enemy attacks, including various kinds of armour and other gear, and tactical procedures. The most basic is personal armour. This includes shields, helmets and many types of armour – padded linen, leather, lamellar, mail, plate, and kevlar. Initially, armour was used to defend both from ranged and close combat; even a fairly light shield could help defend against most slings and javelins, though high-strength bows and crossbows might penetrate common armour at very close range. Infantry armour had to compromise between protection and coverage, as a full suit of attack-proof armour would be too heavy to wear in combat. As firearms improved, armour for ranged defence had to be thicker and stronger. With the introduction of the heavy arquebus designed to pierce standard steel armour, it was proven easier to make heavier firearms than heavier armour; armour transitioned to be only for close combat purposes. Pikemen armour tended to be just steel helmets and breastplates, and gunners little or no armour. By the time of the musket, the dominance of firepower shifted militaries away from any close combat, and use of armour decreased, until infantry typically went without any armour. Helmets were added back during World War I as artillery began to dominate the battlefield, to protect against their fragmentation and other blast effects beyond a direct hit. Modern developments in bullet-proof composite materials like kevlar have started a return to body armour for infantry, though the extra weight is a notable burden. In modern times, infantrymen must also often carry protective measures against chemical and biological attack, including military gas masks, counter-agents, and protective suits. All of these protective measures add to the weight an infantryman must carry, and may decrease combat efficiency. Modern militaries are struggling to balance the value of personal body protection versus the weight burden and ability to function under such weight. Infantry-served weapons Early crew-served weapons were siege weapons, like the ballista, trebuchet, and battering ram. Modern versions include machine guns, anti-tank missiles, and infantry mortars. Formations Beginning with the development the first regular military forces, close-combat regular infantry fought less as unorganised groups of individuals and more in coordinated units, maintaining a defined tactical formation during combat, for increased battlefield effectiveness; such infantry formations and the arms they used developed together, starting with the spear and the shield. A spear has decent attack abilities with the additional advantage keeping opponents at distance; this advantage can be increased by using longer spears, but this could allow the opponent to side-step the point of the spear and close for hand-to-hand combat where the longer spear is near useless. This can be avoided when each spearman stays side by side with the others in close formation, each covering the ones next to him, presenting a solid wall of spears to the enemy that they cannot get around. Similarly, a shield has decent defence abilities, but is literally hit-or-miss; an attack from an unexpected angle can bypass it completely. Larger shields can cover more, but are also heavier and less manoeuvrable, making unexpected attacks even more of a problem. This can be avoided by having shield-armed soldiers stand close together, side-by-side, each protecting both themselves and their immediate comrades, presenting a solid shield wall to the enemy. The opponents for these first formations, the close-combat infantry of more tribal societies, or any military without regular infantry (so called "barbarians") used arms that focused on the individual – weapons using personal strength and force, such as larger swinging swords, axes, and clubs. These take more room and individual freedom to swing and wield, necessitating a more loose organisation. While this may allow for a fierce running attack (an initial shock advantage) the tighter formation of the heavy spear and shield infantry gave them a local manpower advantage where several might be able to fight each opponent. Thus tight formations heightened advantages of heavy arms, and gave greater local numbers in melee. To also increase their staying power, multiple rows of heavy infantrymen were added. This also increased their shock combat effect; individual opponents saw themselves literally lined-up against several heavy infantryman each, with seemingly no chance of defeating all of them. Heavy infantry developed into huge solid block formations, up to a hundred meters wide and a dozen rows deep. Maintaining the advantages of heavy infantry meant maintaining formation; this became even more important when two forces with heavy infantry met in battle; the solidity of the formation became the deciding factor. Intense discipline and training became paramount. Empires formed around their military. Organization The organization of military forces into regular military units is first noted in Egyptian records of the Battle of Kadesh (). Soldiers were grouped into units of 50, which were in turn grouped into larger units of 250, then 1,000, and finally into units of up to 5,000 – the largest independent command. Several of these Egyptian "divisions" made up an army, but operated independently, both on the march and tactically, demonstrating sufficient military command and control organisation for basic battlefield manoeuvres. Similar hierarchical organizations have been noted in other ancient armies, typically with approximately 10 to 100 to 1,000 ratios (even where base 10 was not common), similar to modern sections (squads), companies, and regiments. Training The training of the infantry has differed drastically over time and from place to place. The cost of maintaining an army in fighting order and the seasonal nature of warfare precluded large permanent armies. The antiquity saw everything from the well-trained and motivated citizen armies of Greek and Rome, the tribal host assembled from farmers and hunters with only passing acquaintance with warfare and masses of lightly armed and ill-trained militia put up as a last ditch effort. Kushite king Taharqa enjoyed military success in the Near East as a result of his efforts to strengthen the army through daily training in long distance running. In medieval times the foot soldiers varied from peasant levies to semi-permanent companies of mercenaries, foremost among them the Swiss, English, Aragonese and German, to men-at-arms who went into battle as well-armoured as knights, the latter of which at times also fought on foot. The creation of standing armies—permanently assembled for war or defence—saw increase in training and experience. The increased use of firearms and the need for drill to handle them efficiently. The introduction of national and mass armies saw an establishment of minimum requirements and the introduction of special troops (first of them the engineers going back to medieval times, but also different kinds of infantry adopted to specific terrain, bicycle, motorcycle, motorised and mechanised troops) culminating with the introduction of highly trained special forces during the first and second World War. Operations Attack operations Attack operations are the most basic role of the infantry, and along with defence, form the main stances of the infantry on the battlefield. Traditionally, in an open battle, or meeting engagement, two armies would manoeuvre to contact, at which point they would form up their infantry and other units opposite each other. Then one or both would advance and attempt to defeat the enemy force. The goal of an attack remains the same: to advance into an enemy-held objective, most frequently a hill, river crossing, city or other dominant terrain feature, and dislodge the enemy, thereby establishing control of the objective. Attacks are often feared by the infantry conducting them because of the high number of casualties suffered while advancing to close with and destroy the enemy while under enemy fire. In mechanised infantry the armoured personnel carrier (APC) is considered the assaulting position. These APCs can deliver infantrymen through the front lines to the battle and—in the case of infantry fighting vehicles—contribute supporting firepower to engage the enemy. Successful attacks rely on sufficient force, preparative reconnaissance and battlefield preparation with bomb assets. Retention of discipline and cohesion throughout the attack is paramount to success. A subcategory of attacks is the ambush, where infantrymen lie in wait for enemy forces before attacking at a vulnerable moment. This gives the ambushing infantrymen the combat advantage of surprise, concealment and superior firing positions, and causes confusion. The ambushed unit does not know what it is up against, or where they are attacking from. Patrol operations Patrolling is the most common infantry mission. Full-scale attacks and defensive efforts are occasional, but patrols are constant. Patrols consist of small groups of infantry moving about in areas of possible enemy activity to locate the enemy and destroy them when found. Patrols are used not only on the front-lines, but in rear areas where enemy infiltration or insurgencies are possible. Pursuit operations Pursuit is a role that the infantry often assumes. The objective of pursuit operations is the destruction of withdrawing enemy forces which are not capable of effectively engaging friendly units, before they can build their strength to the point where they are effective. Infantry traditionally have been the main force to overrun these units in the past, and in modern combat are used to pursue enemy forces in constricted terrain (urban areas in particular), where faster forces, such as armoured vehicles are incapable of going or would be exposed to ambush. Defence operations Defence operations are the natural counter to attacks, in which the mission is to hold an objective and defeat enemy forces attempting to dislodge the defender. Defensive posture offers many advantages to the infantry, including the ability to use terrain and constructed fortifications to advantage; these reduce exposure to enemy fire compared with advancing forces. Effective defence relies on minimising losses to enemy fire, breaking the enemy's cohesion before their advance is completed, and preventing enemy penetration of defensive positions. Escort operations Escorting consists of protecting support units from ambush, particularly from hostile infantry forces. Combat support units (a majority of the military) are not as well armed or trained as infantry units and have a different mission. Therefore, they need the protection of the infantry, particularly when on the move. This is one of the most important roles for the modern infantry, particularly when operating alongside armoured vehicles. In this capacity, infantry essentially conducts patrol on the move, scouring terrain which may hide enemy infantry waiting to ambush friendly vehicles, and identifying enemy strong points for attack by the heavier units. Base defence Infantry units are tasked to protect certain areas like command posts or airbases. Units assigned to this job usually have a large number of military police attached to them for control of checkpoints and prisons. Manoeuvring operations Maneouvering consumes much of an infantry unit's time. Infantry, like all combat arms units, are often manoeuvred to meet battlefield needs, and often must do so under enemy attack. The infantry must maintain their cohesion and readiness during the move to ensure their usefulness when they reach their objective. Traditionally, infantry have relied on their own legs for mobility, but mechanised or armoured infantry often uses trucks and armoured vehicles for transport. These units can quickly disembark and transition to light infantry, without vehicles, to access terrain which armoured vehicles can't effectively access. Reconnaissance/intelligence gathering Surveillance operations are often carried out with the employment of small recon units or sniper teams which gather information about the enemy, reporting on characteristics such as size, activity, location, unit and equipment. These infantry units typically are known for their stealth and ability to operate for periods of time within close proximity of the enemy without being detected. They may engage high-profile targets, or be employed to hunt down terrorist cells and insurgents within a given area. These units may also entice the enemy to engage a located recon unit, thus disclosing their location to be destroyed by more powerful friendly forces. Military reserve force Some assignments for infantry units involve deployment behind the front, although patrol and security operations are usually maintained in case of enemy infiltration. This is usually the best time for infantry units to integrate replacements into units and to maintain equipment. Additionally, soldiers can be rested and general readiness should improve. However, the unit must be ready for deployment at any point. Construction/engineering This can be undertaken either in reserve or on the front, but consists of using infantry troops as labor for construction of field positions, roads, bridges, airfields, and all other manner of structures. The infantry is often given this assignment because of the physical quantity of strong men within the unit, although it can lessen a unit's morale and limit the unit's ability to maintain readiness and perform other missions. More often, such jobs are given to specialist engineering corps. Raids/hostage rescue Infantry units are trained to quickly mobilise, infiltrate, enter and neutralise threat forces when appropriate combat intelligence indicates to secure a location, rescue or capture high-profile targets. Urban combat Urban combat poses unique challenges to the combat forces. It is one of the most complicated type of operations an infantry unit will undertake. With many places for the enemy to hide and ambush from, infantry units must be trained in how to enter a city, and systematically clear the buildings, which most likely will be booby trapped, in order to kill or capture enemy personnel within the city. Care must be taken to differentiate innocent civilians who often hide and support the enemy from the non-uniformed armed enemy forces. Civilian and military casualties both are usually very high. Day to day service Because of an infantryman's duties with firearms, explosives, physical and emotional stress, and physical violence, casualties and deaths are not uncommon in both war and in peacetime training or operations. It is a highly dangerous and demanding combat service; in World War II, military doctors concluded that the average American soldier fighting in Italy was psychologically worn out after about 200 days of combat. The physical, mental, and environmental operating demands of the infantryman are high. All of the combat necessities such as ammunition, weapon systems, food, water, clothing, and shelter are carried on the backs of the infantrymen, at least in light role as opposed to mounted/mechanised. Combat loads of over 36 kg (80 lbs) are standard, and greater loads in excess of 45 kg (100 lbs) are very common. These heavy loads, combined with long foot patrols of over a day, in any climate from in temperature, require the infantryman to be in good physical and mental condition. Infantrymen live, fight and die outdoors in all types of brutal climates, often with no physical shelter. Poor climate conditions adds misery to this already demanding existence. Disease epidemics, frostbite, heat stroke, trench foot, insect and wild animal bites are common along with stress disorders and these have sometimes caused more casualties than enemy action. Some infantry units are considered Special Forces. The earliest Special Forces commando units were more highly trained infantrymen, with special weapons, equipment, and missions. Special Forces units recruit heavily from regular infantry units to fill their ranks. Air force and naval infantry Naval infantry, commonly known as marines, are primarily a category of infantry that form part of the naval forces of states and perform roles on land and at sea, including amphibious operations, as well as other, naval roles. They also perform other tasks, including land warfare, separate from naval operations. Air force infantry and base defense forces, such as the Royal Air Force Regiment, Royal Australian Air Force Airfield Defence Guards, and Indonesian Air Force Paskhas Corps are used primarily for ground-based defense of air bases and other air force facilities. They also have a number of other, specialist roles. These include, among others, Chemical, Biological, Radiological and Nuclear (CBRN) defence and training other airmen in basic ground defense tactics. See also Air assault Airborne infantry Armoured infantry Combined arms Foot guards Fusiliers Grenadiers Indonesian Army infantry battalions Infantry Branch (United States) Infantry of the British Army Infantry tactics Line infantry Marines Mechanized infantry Medium infantry Marine (military) Motorised infantry Mountain troops Mounted infantry United States Army Rangers Riflemen Royal Canadian Infantry Corps School of Infantry Special forces Pathfinder (military) Notes References Citations Sources English, John A., Gudmundsson, Bruce I., On Infantry, (Revised edition), The Military Profession series, Praeger Publishers, London, 1994. . The Times, Earl Wavell, Thursday, 19 April 1945 In Praise of Infantry. Tobin, James, Ernie Pyle's War: America's Eyewitness to World War II, Free Press, 1997. Mauldin, Bill, Ambrose, Stephen E., Up Front, W. W. Norton, 2000. Trogdon, Robert W., Ernest Hemingway: A Literary Reference, Da Capo Press, 2002. The New York Times, Maj Gen C T Shortis, British Director of Infantry, 4 February 1985. Heinl, Robert Debs, Dictionary of Military and Naval Quotations, Plautus in The Braggart Captain (3rd century AD), Naval Institute Press, Annapolis, 1978. Nafziger, George, Napoleon's Invasion of Russia, Presidio Press, 1998. McManus, John C. Grunts: inside the American infantry combat experience, World War II through Iraq New York, NY: NAL Caliber. 2010 plus Webcast Author Lecture at the Pritzker Military Library on 29 September 2010. External links Historic films and photos showing Infantries in World War I at europeanfilmgateway.eu In Praise of Infantry, by Field-Marshal Earl Wavell; First published in "The Times," Thursday, 19 April 1945. The Lagunari "Serenissima" Regiment KFOR: KFOR Chronicle. Web Version of U.S. Army Field Manual 3-21.8 – The Infantry Rifle Platoon and Squad. — includes several drawings Combat occupations
[ 0.1646229773759842, -0.025326114147901535, -0.6354285478591919, 0.1938822865486145, -0.30703458189964294, 0.2431492954492569, 0.7650886178016663, -0.04921058192849159, -0.4635058343410492, -0.4073176085948944, -0.8440220952033997, 0.4135230481624603, 0.2665180265903473, -0.3837146162986755...
15069
https://en.wikipedia.org/wiki/Identity%20function
Identity function
In mathematics, an identity function, also called an identity relation, identity map or identity transformation, is a function that always returns the same value that was used as its argument. That is, for being identity, the equality holds for all . Definition Formally, if is a set, the identity function on is defined to be that function with domain and codomain which satisfies   for all elements in . In other words, the function value in (that is, the codomain) is always the same input element of (now considered as the domain). The identity function on is clearly an injective function as well as a surjective function, so it is bijective. The identity function on is often denoted by . In set theory, where a function is defined as a particular kind of binary relation, the identity function is given by the identity relation, or diagonal of . Algebraic properties If is any function, then we have (where "∘" denotes function composition). In particular, is the identity element of the monoid of all functions from to (under function composition). Since the identity element of a monoid is unique, one can alternately define the identity function on to be this identity element. Such a definition generalizes to the concept of an identity morphism in category theory, where the endomorphisms of need not be functions. Properties The identity function is a linear operator when applied to vector spaces. In an -dimensional vector space the identity function is represented by the identity matrix , regardless of the basis chosen for the space. The identity function on the positive integers is a completely multiplicative function (essentially multiplication by 1), considered in number theory. In a metric space the identity function is trivially an isometry. An object without any symmetry has as its symmetry group the trivial group containing only this isometry (symmetry type ). In a topological space, the identity function is always continuous. The identity function is idempotent. See also Identity matrix Inclusion map References Functions and mappings Elementary mathematics Basic concepts in set theory Types of functions 1 (number)
[ -0.45275312662124634, -0.030037928372621536, 0.04641501232981682, 0.14155399799346924, -0.1930098831653595, 0.14881101250648499, -0.3321473300457001, 0.08834318071603775, 0.15415199100971222, -0.29848021268844604, -0.42607375979423523, 0.7753795385360718, -0.410418301820755, -0.08276467770...
15070
https://en.wikipedia.org/wiki/I386
I386
The Intel 386, originally released as 80386 and later renamed i386, is a 32-bit microprocessor introduced in 1985. The first versions had 275,000 transistors and were the CPU of many workstations and high-end personal computers of the time. As the original implementation of the 32-bit extension of the 80286 architecture, the i386 instruction set, programming model, and binary encodings are still the common denominator for all 32-bit x86 processors, which is termed the i386-architecture, x86, or IA-32, depending on context. The 32-bit i386 can correctly execute most code intended for the earlier 16-bit processors such as 8086 and 80286 that were ubiquitous in early PCs. (Following the same tradition, modern 64-bit x86 processors are able to run most programs written for older x86 CPUs, all the way back to the original 16-bit 8086 of 1978.) Over the years, successively newer implementations of the same architecture have become several hundreds of times faster than the original 80386 (and thousands of times faster than the 8086). A 33 MHz 80386 was reportedly measured to operate at about 11.4 MIPS. This was under development on this process technology in 1982 under internal name of P3. The tape-out of the 80386 development was finalized on July 1985. The 80386 was introduced as pre-production samples for software development workstations in October 1985. Manufacturing of the chips in significant quantities commenced in June 1986, along with the first plug-in device that allowed existing 80286-based computers to be upgraded to the 386, the Translator 386 by American Computer and Peripheral. Mainboards for 80386-based computer systems were cumbersome and expensive at first, but manufacturing was justified upon the 80386's mainstream adoption. The first personal computer to make use of the 80386 was designed and manufactured by Compaq and marked the first time a fundamental component in the IBM PC compatible de facto standard was updated by a company other than IBM. In May 2006, Intel announced that i386 production would stop at the end of September 2007. Although it had long been obsolete as a personal computer CPU, Intel and others had continued making the chip for embedded systems. Such systems using an i386 or one of many derivatives are common in aerospace technology and electronic musical instruments, among others. Some mobile phones also used (later fully static CMOS variants of) the i386 processor, such as BlackBerry 950 and Nokia 9000 Communicator. Linux continued to support i386 processors until December 11, 2012; when the kernel cut 386-specific instructions in version 3.8. Architecture The processor was a significant evolution in the x86 architecture, and extended a long line of processors that stretched back to the Intel 8008. The predecessor of the 80386 was the Intel 80286, a 16-bit processor with a segment-based memory management and protection system. The 80386 added a three-stage instruction pipeline which it brings up to total of 6-stage instruction pipeline, extended the architecture from 16-bits to 32-bits, and added an on-chip memory management unit. This paging translation unit made it much easier to implement operating systems that used virtual memory. It also offered support for register debugging. The 80386 featured three operating modes: real mode, protected mode and virtual mode. The protected mode, which debuted in the 286, was extended to allow the 386 to address up to 4 GB of memory. With the addition of segmented addressing system, it can expand up to 64 terabytes of virtual memory. The all new virtual 8086 mode (or VM86) made it possible to run one or more real mode programs in a protected environment, although some programs were not compatible. It features scaled indexing and 64-bit barrel shifter. The ability for a 386 to be set up to act like it had a flat memory model in protected mode despite the fact that it uses a segmented memory model in all modes was arguably the most important feature change for the x86 processor family until AMD released x86-64 in 2003. Several new instructions have been added to 386: BSF, BSR, BT, BTS, BTR, BTC, CDQ, CWDE, LFS, LGS, LSS, MOVSX, MOVZX, SETcc, SHLD, SHRD. Two new segment registers have been added (FS and GS) for general-purpose programs, single Machine Status Word of 286 grew into eight control registers CR0–CR7. Debug registers DR0–DR7 were added for hardware breakpoints. New forms of MOV instruction are used to access them. Chief architect in the development of the 80386 was John H. Crawford. He was responsible for extending the 80286 architecture and instruction set to 32-bit, and then led the microprogram development for the 80386 chip. The i486 and P5 Pentium line of processors were descendants of the i386 design. Data types The following data types are directly supported and thus implemented by one or more i386 machine instructions; these data types are briefly described here.: Bit (boolean value), bit field (group of up to 32 bits) and bit string (up to 4 Gbit in length). 8-bit integer (byte), either signed (range −128..127) or unsigned (range 0..255). 16-bit integer, either signed (range −32,768..32,767) or unsigned (range 0..65,535). 32-bit integer, either signed (range −231..231−1) or unsigned (range 0..232−1). Offset, a 16- or 32-bit displacement referring to a memory location (using any addressing mode). Pointer, a 16-bit selector together with a 16- or 32-bit offset. Character (8-bit character code). String, a sequence of 8-, 16- or 32-bit words (up to 4 Gbit in length). BCD, decimal digits (0..9) represented by unpacked bytes. Packed BCD, two BCD digits in one byte (range 0..99). Example code The following i386 assembly source code is for a subroutine named _strtolower that copies a null-terminated ASCIIZ character string from one location to another, converting all alphabetic characters to lower case. The string is copied one byte (8-bit character) at a time. The example code uses the EBP (base pointer) register to establish a call frame, an area on the stack that contains all of the parameters and local variables for the execution of the subroutine. This kind of calling convention supports reentrant and recursive code and has been used by Algol-like languages since the late 1950s. A flat memory model is assumed, specifically, that the DS and ES segments address the same region of memory. Chip variants 80386SX In 1988, Intel introduced the 80386SX, most often referred to as the 386SX, a cut-down version of the 80386 with a 16-bit data bus, mainly intended for lower-cost PCs aimed at the home, educational, and small-business markets, while the 386DX remained the high-end variant used in workstations, servers, and other demanding tasks. The CPU remained fully 32-bit internally, but the 16-bit bus was intended to simplify circuit-board layout and reduce total cost. The 16-bit bus simplified designs but hampered performance. Only 24 pins were connected to the address bus, therefore limiting addressing to 16 MB, but this was not a critical constraint at the time. Performance differences were due not only to differing data-bus widths, but also due to performance-enhancing cache memories often employed on boards using the original chip. The original 80386 was subsequently renamed i386DX to avoid confusion. However, Intel subsequently used the "DX" suffix to refer to the floating-point capability of the i486DX. The 387SX was an 80387 part that was compatible with the 386SX (i.e. with a 16-bit databus). The 386SX was packaged in a surface-mount QFP and sometimes offered in a socket to allow for an upgrade. 80386SL The 80386SL was introduced as a power-efficient version for laptop computers. The processor offered several power-management options (e.g. SMM), as well as different "sleep" modes to conserve battery power. It also contained support for an external cache of 16 to 64 kB. The extra functions and circuit implementation techniques caused this variant to have over 3 times as many transistors as the i386DX. The i386SL was first available at 20 MHz clock speed, with the 25 MHz model later added. Business importance The first PC based on the Intel 80386 was Compaq Deskpro. By extending the 16/24-bit IBM PC/AT standard into a natively 32-bit computing environment, Compaq became the first company to design and manufacture such a major technical hardware advance on the PC platform. IBM was offered use of the 80386, but had manufacturing rights for the earlier 80286. IBM therefore chose to rely on that processor for a couple more years. The early success of the Compaq Deskpro 386 played an important role in legitimizing the PC "clone" industry and in de-emphasizing IBM's role within it. Prior to the 386, the difficulty of manufacturing microchips and the uncertainty of reliable supply made it desirable that any mass-market semiconductor be multi-sourced, that is, made by two or more manufacturers, the second and subsequent companies manufacturing under license from the originating company. The 386 was for a time (4.7 years) only available from Intel, since Andy Grove, Intel's CEO at the time, made the decision not to encourage other manufacturers to produce the processor as second sources. This decision was ultimately crucial to Intel's success in the market. The 386 was the first significant microprocessor to be single-sourced. Single-sourcing the 386 allowed Intel greater control over its development and substantially greater profits in later years. AMD introduced its compatible Am386 processor in March 1991 after overcoming legal obstacles, thus ending Intel's 4.7-year monopoly on 386-compatible processors. From 1991 IBM also manufactured 386 chips under license for use only in IBM PCs and boards. Compatibles The AMD Am386SX and Am386DX were almost exact clones of the i386SX and i386DX. Legal disputes caused production delays for several years, but AMD's 40 MHz part eventually became very popular with computer enthusiasts as a low-cost and low-power alternative to the 25 MHz 486SX. The power draw was further reduced in the "notebook models" (Am386 DXL/SXL/DXLV/SXLV), which could operate with 3.3 V and were implemented in fully static CMOS circuitry. Chips and Technologies Super386 38600SX and 38600DX were developed using reverse engineering. They sold poorly, due to some technical errors and incompatibilities, as well as their late appearance on the market. They were therefore short-lived products. Cyrix Cx486SLC/Cx486DLC could be (simplistically) described as a kind of 386/486 hybrid chip that included a small amount of on-chip cache. It was popular among computer enthusiasts but did poorly with OEMs. The Cyrix Cx486SLC and Cyrix Cx486DLC processors were pin-compatible with i386SX and i386DX respectively. These processors were also manufactured and sold by Texas Instruments. IBM 386SLC and 486SLC/DLC were variants of Intel's design which contained a large amount of on-chip cache (8 kB, and later 16 kB). The agreement with Intel limited their use to IBM's own line of computers and upgrade boards only, so they were not available on the open market. Early problems Intel originally intended for the 80386 to debut at 16 MHz. However, due to poor yields, it was instead introduced at 12.5 MHz. Early in production, Intel discovered a marginal circuit that could cause a system to return incorrect results from 32-bit multiply operations. Not all of the processors already manufactured were affected, so Intel tested its inventory. Processors that were found to be bug-free were marked with a double sigma (ΣΣ), and affected processors were marked "16 BIT S/W ONLY". These latter processors were sold as good parts, since at the time 32-bit capability was not relevant for most users. Such chips are now extremely rare and became collectible. The i387 math coprocessor was not ready in time for the introduction of the 80386, and so many of the early 80386 motherboards instead provided a socket and hardware logic to make use of an 80287. In this configuration the FPU operated asynchronously to the CPU, usually with a clock rate of 10 MHz. The original Compaq Deskpro 386 is an example of such design. However, this was an annoyance to those who depended on floating-point performance, as the performance advantages of the 80387 over the 80287 were significant. Pin-compatible upgrades Intel later offered a modified version of its 486DX in i386 packaging, branded as the Intel RapidCAD. This provided an upgrade path for users with i386-compatible hardware. The upgrade was a pair of chips that replaced both the i386 and i387. Since the 486DX design contained an FPU, the chip that replaced the i386 contained the floating-point functionality, and the chip that replaced the i387 served very little purpose. However, the latter chip was necessary in order to provide the FERR signal to the mainboard and appear to function as a normal floating-point unit. Third parties offered a wide range of upgrades, for both SX and DX systems. The most popular ones were based on the Cyrix 486DLC/SLC core, which typically offered a substantial speed improvement due to its more efficient instruction pipeline and internal L1 SRAM cache. The cache was usually 1 kB, or sometimes 8 kB in the TI variant. Some of these upgrade chips (such as the 486DRx2/SRx2) were marketed by Cyrix themselves, but they were more commonly found in kits offered by upgrade specialists such as Kingston, Evergreen and Improve-It Technologies. Some of the fastest CPU upgrade modules featured the IBM SLC/DLC family (notable for its 16 kB L1 cache), or even the Intel 486 itself. Many 386 upgrade kits were advertised as being simple drop-in replacements, but often required complicated software to control the cache or clock doubling. Part of the problem was that on most 386 motherboards, the A20 line was controlled entirely by the motherboard with the CPU being unaware, which caused problems on CPUs with internal caches. Overall, it was very difficult to configure upgrades to produce the results advertised on the packaging, and upgrades were often not very stable or not fully compatible. Models and variants Early 5 V models i386DX Original version, released in October 1985. The 16 MHz version was available for 299 USD in quantities of 100. Capable of working with 16- or 32-bit external busses Cache: depends on mainboard Package: PGA-132 or PQFP-132 Process: First types CHMOS III, 1.5 µm, later CHMOS IV, 1 µm Die size: 104 mm2 (ca. 10 mm × 10 mm) in CHMOS III and 39 mm2 (6 mm × 6.5 mm) in CHMOS IV. Transistor count: 275,000 Specified max clock: 12 MHz (early models), later 16, 20, 25 and 33 MHz i386SX RapidCAD A specially packaged Intel 486DX and a dummy floating point unit (FPU) designed as pin-compatible replacements for an i386 processor and i387 FPU. Versions for embedded systems 80376 This was an embedded version of the 80386SX which did not support real mode and paging in the MMU. i386EX, i386EXTB and i386EXTC System and power management and built in peripheral and support functions: Two 82C59A interrupt controllers; Timer, Counter (3 channels); Asynchronous SIO (2 channels); Synchronous SIO (1 channel); Watchdog timer (Hardware/Software); PIO. Usable with 80387SX or i387SL FPUs. Data/address bus: 16 / 26 bits Package: PQFP-132, SQFP-144 and PGA-168 Process: CHMOS V, 0.8 µm Specified max clock: i386EX: 16 MHz @2.7–3.3 volts or 20 MHz @3.0–3.6 volts or 25 MHz @4.5–5.5 volts i386EXTB: 20 MHz @2.7–3.6 volts or 25 MHz @3.0–3.6 volts i386EXTC: 25 MHz @4.5–5.5 volts or 33 MHz @4.5–5.5 volts i386CXSA and i386SXSA (or i386SXTA) Transparent power management mode, integrated MMU and TTL compatible inputs (only 386SXSA). Usable with i387SX or i387SL FPUs. Data/address bus: 16 / 26 bits (24 bits for i386SXSA) Package: BQFP-100 Voltage: 4.5–5.5 volts (25 and 33 MHz); 4.75–5.25 volts (40 MHz) Process: CHMOS V, 0.8 µm Specified max clock: 25, 33, 40 MHz i386CXSB Transparent power management mode and integrated MMU. Usable with i387SX or i387SL FPUs. Data/address bus: 16 / 26 bits Package: BQFP-100 Voltage: 3.0 volts (16 MHz) or 3.3 volts (25 MHz) Process: CHMOS V, 0.8 µm Specified max clock: 16, 25 MHz Obsolescence Windows 95 was the only entry in the Windows 9x series to officially support the 386, requiring at least a 386DX, though a 486 or better was recommended; Windows 98 requires a 486DX or higher. In the Windows NT family, Windows NT 3.51 was the last version with 386 support. Debian GNU/Linux removed 386 support with the release of 3.1 (Sarge) in 2005. Citing the maintenance burden around SMP primitives, the Linux kernel developers cut support from the development codebase in December 2012, later released as kernel version 3.8. Among the BSDs, FreeBSD's 5.x releases were the last to support the 386; support for the 386SX was cut with release 5.2, while the remaining 386 support was removed with the 6.0 release in 2005. OpenBSD removed 386 support with version 4.2 (2007), DragonFly BSD with release 1.12 (2008), and NetBSD with the 5.0 release (2009). See also List of Intel microprocessors Notes and references External links Intel 80386 Programmer's Reference Manual 1986 Intel 80386 processor family Intel 231746-001 Introduction to the 80386 Apr86 (April 1986) and Including the 80386 Data Sheet Intel 231630-002 80386 HIGH PERFORMANCE 32-BIT MICROPROCESSOR WITH INTEGRATED MEMORY MANAGEMENT—Data Sheet for 80386-12 and 80386-16 1988 Intel Microprocessors and Peripheral Handbook Volume 1 Microprocessor including 80386 HIGH PERFORMANCE 32-BIT CHMOS MICROPROCESSOR WITH INTEGRATED MEMORY MANAGEMENT October 1987 Order Number: 231630-004 1989 Intel Microprocessor and Peripheral Handbook Vol 1 Microprocessor including 386™ MICROPROCESSOR HIGH PERFORMANCE 32-BIT CHMOS MICROPROCESSOR WITH INTEGRATED MEMORY MANAGEMENT November 1988 Order Number: 231630-005 Detailed list of early 80386 steppings (revisions) Computer-related introductions in 1985 386 32-bit microprocessors
[ -0.6221627593040466, 0.149161696434021, 0.15684649348258972, 0.4332383871078491, -0.2537335157394409, 0.35323289036750793, -0.02213176153600216, 0.2862268090248108, 0.008580153807997704, -0.09046634286642075, 0.051825471222400665, 0.49713438749313354, -0.41125017404556274, -0.1393701434135...
15072
https://en.wikipedia.org/wiki/Instruction%20register
Instruction register
In computing, the instruction register (IR) or current instruction register (CIR) is the part of a CPU's control unit that holds the instruction currently being executed or decoded. In simple processors, each instruction to be executed is loaded into the instruction register, which holds it while it is decoded, prepared and ultimately executed, which can take several steps. Some of the complicated processors use a pipeline of instruction registers where each stage of the pipeline does part of the decoding, preparation or execution and then passes it to the next stage for its step. Modern processors can even do some of the steps out of order as decoding on several instructions is done in parallel. Decoding the op-code in the instruction register includes determining the instruction, determining where its operands are in memory, retrieving the operands from memory, allocating processor resources to execute the command (in super scalar processors), etc. The output of the IR is available to control circuits, which generate the timing signals that control the various processing elements involved in executing the instruction. In the instruction cycle, the instruction is loaded into the instruction register after the processor fetches it from the memory location pointed to by the program counter. References M. Mano, Computer System Architecture (Prentice Hall, 3rd Ed, 1992) Digital registers pl:Wskaźnik instrukcji
[ -0.15079805254936218, 0.025400865823030472, -0.04680923745036125, 0.3753684461116791, 0.36421698331832886, 0.479972243309021, -0.1938064843416214, -0.0027317178901284933, 0.018367808312177658, -0.3744000196456909, -0.4016628563404083, 0.28460025787353516, -0.10078919678926468, -0.002128626...
15073
https://en.wikipedia.org/wiki/Lists%20of%20islands
Lists of islands
This is a list of the lists of islands in the world grouped by country, by continent, by body of water, and by other classifications. For rank-order lists, see the other lists of islands below. Lists of islands by country Africa Antarctica Asia Europe North America Oceania South America Lists of islands by continent Lists of islands by body of water By ocean: By other bodies of water: List of ancient islands Other lists of islands External links Island Superlatives
[ 0.33290931582450867, 0.15243948996067047, -0.2872166037559509, -0.10375538468360901, -0.28924447298049927, 0.2565423846244812, 0.5631383061408997, 0.47642266750335693, -1.187259316444397, 0.09243950992822647, -0.16453948616981506, -0.19463780522346497, -0.2724989354610443, 0.49959677457809...
15075
https://en.wikipedia.org/wiki/INTERCAL
INTERCAL
The Compiler Language With No Pronounceable Acronym (INTERCAL) is an esoteric programming language that was created as a parody by Don Woods and , two Princeton University students, in 1972. It satirizes aspects of the various programming languages at the time, as well as the proliferation of proposed language constructs and notations in the 1960s. There are two maintained implementations of INTERCAL dialects: C-INTERCAL (created in 1990), maintained by Eric S. Raymond and Alex Smith, and CLC-INTERCAL, maintained by Claudio Calvelli. , both implementations were available in the Debian Software Archive. History According to the original manual by the authors, The original Princeton implementation used punched cards and the EBCDIC character set. To allow INTERCAL to run on computers using ASCII, substitutions for two characters had to be made: $ substituted for ¢ as the mingle operator, "represent[ing] the increasing cost of software in relation to hardware", and ? was substituted for ⊻ as the unary exclusive-or operator to "correctly express the average person's reaction on first encountering exclusive-or". In recent versions of C-INTERCAL, the older operators are supported as alternatives; INTERCAL programs may now be encoded in ASCII, Latin-1, or UTF-8. Version numbers C-INTERCAL swaps the major and minor version numbers, compared to tradition. The HISTORY file shows releases starting at version 0.3 and having progressed to 0.31, but containing 1.26 between 0.26 and 0.27. CLC-INTERCAL version numbering scheme was traditional until version 0.06, when it changed to the scheme documented in the README file, which says: * The term "version" has been replaced by "perversion" for correctness * The perversion number consists of a floating-point number with independent signs for the integer and fractional part. Negative fractions indicate pre-escapes (so 1.-94 means "94 pre-escapes to go before 1.00". Or you can just add the numbers together and get 0.06, which is entirely a coincidence since 0.06 is not being developed) * The fractional part of a perversion number can be integer or floating point, with a similar meaning for the parts. The current pre-escape is 1.-94.-2 which means "2 pre-pre-escapes to go before pre-escape 1.-94". Details INTERCAL was intended to be completely different from all other computer languages. Common operations in other languages have cryptic and redundant syntax in INTERCAL. From the INTERCAL Reference Manual: INTERCAL has many other features designed to make it even more aesthetically unpleasing to the programmer: it uses statements such as "READ OUT", "IGNORE", "FORGET", and modifiers such as "PLEASE". This last keyword provides two reasons for the program's rejection by the compiler: if "PLEASE" does not appear often enough, the program is considered insufficiently polite, and the error message says this; if it appears too often, the program could be rejected as excessively polite. Although this feature existed in the original INTERCAL compiler, it was undocumented. Despite the language's intentionally obtuse and wordy syntax, INTERCAL is nevertheless Turing-complete: given enough memory, INTERCAL can solve any problem that a Universal Turing machine can solve. Most implementations of INTERCAL do this very slowly, however. A Sieve of Eratosthenes benchmark, computing all prime numbers less than 65536, was tested on a Sun SPARCstation 1 in 1992. In C, it took less than half a second; the same program in INTERCAL took over seventeen hours. Documentation The INTERCAL Reference Manual contains many paradoxical, nonsensical, or otherwise humorous instructions: The manual also contains a "tonsil", as explained in this footnote: "4) Since all other reference manuals have appendices, it was decided that the INTERCAL manual should contain some other type of removable organ." The INTERCAL manual gives unusual names to all non-alphanumeric ASCII characters: single and double quotes are "sparks" and "rabbit ears" respectively. (The exception is the ampersand: as the Jargon File states, "what could be sillier?") The assignment operator, represented as an equals sign (INTERCAL's "half mesh") in many other programming languages, is in INTERCAL a left-arrow, <-, made up of an "angle" and a "worm", obviously read as "gets". Syntax Input (using the WRITE IN instruction) and output (using the READ OUT instruction) do not use the usual formats; in INTERCAL-72, WRITE IN inputs a number written out as digits in English (such as SIX FIVE FIVE THREE FIVE), and READ OUT outputs it in "butchered" Roman numerals. More recent versions have their own I/O systems. Comments can be achieved by using the inverted statement identifiers involving NOT or N'T; these cause lines to be initially ABSTAINed so that they have no effect. (A line can be ABSTAINed from even if it doesn't have valid syntax; syntax errors happen at runtime, and only then when the line is un-ABSTAINed.) Data structures INTERCAL-72 (the original version of INTERCAL) had only four data types: the 16-bit integer (represented with a ., called a "spot"), the 32-bit integer (:, a "twospot"), the array of 16-bit integers (,, a "tail"), and the array of 32-bit integers (;, a "hybrid"). There are 65535 available variables of each type, numbered from .1 to .65535 for 16-bit integers, for instance. However, each of these variables has its own stack on which it can be pushed and popped (STASHed and RETRIEVEd, in INTERCAL terminology), increasing the possible complexity of data structures. More modern versions of INTERCAL have by and large kept the same data structures, with appropriate modifications; TriINTERCAL, which modifies the radix with which numbers are represented, can use a 10-trit type rather than a 16-bit type, and CLC-INTERCAL implements many of its own data structures, such as "classes and lectures", by making the basic data types store more information rather than adding new types. Arrays are dimensioned by assigning to them as if they were a scalar variable. Constants can also be used, and are represented by a # ("mesh") followed by the constant itself, written as a decimal number; only integer constants from 0 to 65535 are supported. Operators There are only five operators in INTERCAL-72. Implementations vary in which characters represent which operation, and many accept more than one character, so more than one possibility is given for many of the operators. Contrary to most other languages, AND, OR, and XOR are unary operators, which work on consecutive bits of their argument; the most significant bit of the result is the operator applied to the least significant and most significant bits of the input, the second-most-significant bit of the result is the operator applied to the most and second-most significant bits, the third-most-significant bit of the result is the operator applied to the second-most and third-most bits, and so on. The operator is placed between the punctuation mark specifying a variable name or constant and the number that specifies which variable it is, or just inside grouping marks (i.e. one character later than it would be in programming languages like C.) SELECT and INTERLEAVE (which is also known as MINGLE) are infix binary operators; SELECT takes the bits of its first operand that correspond to "1" bits of its second operand and removes the bits that correspond to "0" bits, shifting towards the least significant bit and padding with zeroes (so 51 (110011 in binary) SELECT 21 (10101 in binary) is 5 (101 in binary)); MINGLE alternates bits from its first and second operands (in such a way that the least significant bit of its second operand is the least significant bit of the result). There is no operator precedence; grouping marks must be used to disambiguate the precedence where it would otherwise be ambiguous (the grouping marks available are ' ("spark"), which matches another spark, and " ("rabbit ears"), which matches another rabbit ears; the programmer is responsible for using these in such a way that they make the expression unambiguous). Control structures INTERCAL statements all start with a "statement identifier"; in INTERCAL-72, this can be DO, PLEASE, or PLEASE DO, all of which mean the same to the program (but using one of these too heavily causes the program to be rejected, an undocumented feature in INTERCAL-72 that was mentioned in the C-INTERCAL manual), or an inverted form (with NOT or N'T appended to the identifier). Backtracking INTERCAL, a modern variant, also allows variants using MAYBE (possibly combined with PLEASE or DO) as a statement identifier, which introduces a choice-point. Before the identifier, an optional line number (an integer enclosed in parentheses) can be given; after the identifier, a percent chance of the line executing can be given in the format %50, which defaults to 100%. In INTERCAL-72, the main control structures are NEXT, RESUME, and FORGET. DO (line) NEXT branches to the line specified, remembering the next line that would be executed if it weren't for the NEXT on a call stack (other identifiers than DO can be used on any statement, DO is given as an example); DO FORGET expression removes expression entries from the top of the call stack (this is useful to avoid the error that otherwise happens when there are more than 80 entries), and DO RESUME expression removes expression entries from the call stack and jumps to the last line remembered. C-INTERCAL also provides the COME FROM instruction, written DO COME FROM (line); CLC-INTERCAL and the most recent C-INTERCAL versions also provide computed COME FROM (DO COME FROM expression) and NEXT FROM, which is like COME FROM but also saves a return address on the NEXT STACK. Alternative ways to affect program flow, originally available in INTERCAL-72, are to use the IGNORE and REMEMBER instructions on variables (which cause writes to the variable to be silently ignored and to take effect again, so that instructions can be disabled by causing them to have no effect), and the ABSTAIN and REINSTATE instructions on lines or on types of statement, causing the lines to have no effect or to have an effect again respectively. Hello, world The traditional "Hello, world!" program demonstrates how different INTERCAL is from standard programming languages. In C, it could read as follows: #include <stdio.h> int main(void) { printf("Hello, world!\n"); return 0; } The equivalent program in C-INTERCAL is longer and harder to read: DO ,1 <- #13 PLEASE DO ,1 SUB #1 <- #238 DO ,1 SUB #2 <- #108 DO ,1 SUB #3 <- #112 DO ,1 SUB #4 <- #0 DO ,1 SUB #5 <- #64 DO ,1 SUB #6 <- #194 DO ,1 SUB #7 <- #48 PLEASE DO ,1 SUB #8 <- #22 DO ,1 SUB #9 <- #248 DO ,1 SUB #10 <- #168 DO ,1 SUB #11 <- #24 DO ,1 SUB #12 <- #16 DO ,1 SUB #13 <- #162 PLEASE READ OUT ,1 PLEASE GIVE UP Dialects The original Woods–Lyon INTERCAL was very limited in its input/output capabilities: the only acceptable input were numbers with the digits spelled out, and the only output was an extended version of Roman numerals. The C-INTERCAL reimplementation, being available on the Internet, has made the language more popular with devotees of esoteric programming languages. The C-INTERCAL dialect has a few differences from original INTERCAL and introduced a few new features, such as a COME FROM statement and a means of doing text I/O based on the Turing Text Model. The authors of C-INTERCAL also created the TriINTERCAL variant, based on the Ternary numeral system and generalizing INTERCAL's set of operators. A more recent variant is Threaded Intercal, which extends the functionality of COME FROM to support multithreading. CLC-INTERCAL has a library called INTERNET for networking functionality including being an INTERCAL server, and also includes features such as Quantum Intercal, which enables multi-value calculations in a way purportedly ready for the first quantum computers. In early 2017 a .NET Implementation targeting the .NET Framework appeared on GitHub. This implementation supports the creation of standalone binary libraries and interop with other programming languages. Impact and discussion In the article "A Box, Darkly: Obfuscation, Weird Languages, and Code Aesthetics", INTERCAL is described under the heading "Abandon all sanity, ye who enter here: INTERCAL". The compiler and commenting strategy are among the "weird" features described: In "Technomasochism", Lev Bratishenko characterizes the INTERCAL compiler as a dominatrix: Popular culture The Nitrome Enjoyment System, a fictional video game console created by British indie game developer Nitrome, has games which are programmed in INTERCAL. References External links Official website of C-INTERCAL INTERCAL Resources on the Web, including several implementations Computerworld Interview with Don Woods on INTERCAL Paper on Abstraction and Modularity in INTERCAL Esoteric programming languages Programming languages created in 1972 Parodies Computer humor
[ 0.3150894045829773, 0.3875626027584076, -0.19922034442424774, 0.19343559443950653, -0.049358248710632324, -0.1517195999622345, 0.22290492057800293, 0.4492187798023224, 0.4725521504878998, 0.1307516098022461, -0.16709497570991516, 0.3120949864387512, -0.746671199798584, -0.05368547514081001...
15076
https://en.wikipedia.org/wiki/International%20Data%20Encryption%20Algorithm
International Data Encryption Algorithm
In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in 1991. The algorithm was intended as a replacement for the Data Encryption Standard (DES). IDEA is a minor revision of an earlier cipher Proposed Encryption Standard (PES). The cipher was designed under a research contract with the Hasler Foundation, which became part of Ascom-Tech AG. The cipher was patented in a number of countries but was freely available for non-commercial use. The name "IDEA" is also a trademark. The last patents expired in 2012, and IDEA is now patent-free and thus completely free for all uses. IDEA was used in Pretty Good Privacy (PGP) v2.0 and was incorporated after the original cipher used in v1.0, BassOmatic, was found to be insecure. IDEA is an optional algorithm in the OpenPGP standard. Operation IDEA operates on 64-bit blocks using a 128-bit key and consists of a series of 8 identical transformations (a round, see the illustration) and an output transformation (the half-round). The processes for encryption and decryption are similar. IDEA derives much of its security by interleaving operations from different groups — modular addition and multiplication, and bitwise eXclusive OR (XOR) — which are algebraically "incompatible" in some sense. In more detail, these operators, which all deal with 16-bit quantities, are: Bitwise XOR (exclusive OR) (denoted with a blue circled plus ). Addition modulo 216 (denoted with a green boxed plus ). Multiplication modulo 216 + 1, where the all-zero word (0x0000) in inputs is interpreted as 216, and 216 in output is interpreted as the all-zero word (0x0000) (denoted by a red circled dot ). After the 8 rounds comes a final “half-round”, the output transformation illustrated below (the swap of the middle two values cancels out the swap at the end of the last round, so that there is no net swap): Structure The overall structure of IDEA follows the Lai–Massey scheme. XOR is used for both subtraction and addition. IDEA uses a key-dependent half-round function. To work with 16-bit words (meaning 4 inputs instead of 2 for the 64-bit block size), IDEA uses the Lai–Massey scheme twice in parallel, with the two parallel round functions being interwoven with each other. To ensure sufficient diffusion, two of the sub-blocks are swapped after each round. Key schedule Each round uses 6 16-bit sub-keys, while the half-round uses 4, a total of 52 for 8.5 rounds. The first 8 sub-keys are extracted directly from the key, with K1 from the first round being the lower 16 bits; further groups of 8 keys are created by rotating the main key left 25 bits between each group of 8. This means that it is rotated less than once per round, on average, for a total of 6 rotations. Decryption Decryption works like encryption, but the order of the round keys is inverted, and the subkeys for the odd rounds are inversed. For instance, the values of subkeys K1–K4 are replaced by the inverse of K49–K52 for the respective group operation, K5 and K6 of each group should be replaced by K47 and K48 for decryption. Security The designers analysed IDEA to measure its strength against differential cryptanalysis and concluded that it is immune under certain assumptions. No successful linear or algebraic weaknesses have been reported. , the best attack applied to all keys could break IDEA reduced to 6 rounds (the full IDEA cipher uses 8.5 rounds). Note that a "break" is any attack that requires less than 2128 operations; the 6-round attack requires 264 known plaintexts and 2126.8 operations. Bruce Schneier thought highly of IDEA in 1996, writing: "In my opinion, it is the best and most secure block algorithm available to the public at this time." (Applied Cryptography, 2nd ed.) However, by 1999 he was no longer recommending IDEA due to the availability of faster algorithms, some progress in its cryptanalysis, and the issue of patents. In 2011 full 8.5-round IDEA was broken using a meet-in-the-middle attack. Independently in 2012, full 8.5-round IDEA was broken using a narrow-bicliques attack, with a reduction of cryptographic strength of about 2 bits, similar to the effect of the previous bicliques attack on AES; however, this attack does not threaten the security of IDEA in practice. Weak keys The very simple key schedule makes IDEA subject to a class of weak keys; some keys containing a large number of 0 bits produce weak encryption. These are of little concern in practice, being sufficiently rare that they are unnecessary to avoid explicitly when generating keys randomly. A simple fix was proposed: XORing each subkey with a 16-bit constant, such as 0x0DAE. Larger classes of weak keys were found in 2002. This is still of negligible probability to be a concern to a randomly chosen key, and some of the problems are fixed by the constant XOR proposed earlier, but the paper is not certain if all of them are. A more comprehensive redesign of the IDEA key schedule may be desirable. Availability A patent application for IDEA was first filed in Switzerland (CH A 1690/90) on May 18, 1990, then an international patent application was filed under the Patent Cooperation Treaty on May 16, 1991. Patents were eventually granted in Austria, France, Germany, Italy, the Netherlands, Spain, Sweden, Switzerland, the United Kingdom, (, filed May 16, 1991, issued June 22, 1994 and expired May 16, 2011), the United States (, issued May 25, 1993 and expired January 7, 2012) and Japan (JP 3225440) (expired May 16, 2011). MediaCrypt AG is now offering a successor to IDEA and focuses on its new cipher (official release on May 2005) IDEA NXT, which was previously called FOX. Literature Hüseyin Demirci, Erkan Türe, Ali Aydin Selçuk, A New Meet in the Middle Attack on The IDEA Block Cipher, 10th Annual Workshop on Selected Areas in Cryptography, 2004. Xuejia Lai and James L. Massey, A Proposal for a New Block Encryption Standard, EUROCRYPT 1990, pp. 389–404 Xuejia Lai and James L. Massey and S. Murphy, Markov ciphers and differential cryptanalysis, Advances in Cryptology — Eurocrypt '91, Springer-Verlag (1992), pp. 17–38. References External links RSA FAQ on Block Ciphers SCAN entry for IDEA IDEA in 448 bytes of 80x86 IDEA Applet Java source code Block ciphers Broken block ciphers
[ -0.41397324204444885, -0.1981508880853653, -0.265491247177124, 0.1508818119764328, 0.38345399498939514, 0.07151373475790024, -0.07985196262598038, -0.19639906287193298, -0.2589150667190552, -0.1834738701581955, -0.35176122188568115, 0.32535624504089355, -0.6533218622207642, -0.296216875314...
15077
https://en.wikipedia.org/wiki/Indoor%20rower
Indoor rower
An indoor rower, or rowing machine, is a machine used to simulate the action of watercraft rowing for the purpose of exercise or training for rowing. Modern indoor rowers are often known as ergometers (colloquially erg or ergo) because they measure work performed by the rower (which can be measured in ergs). Indoor rowing has become established as a sport, drawing a competitive environment from around the world. The term "indoor rower" also refers to a participant in this sport. History Chabrias, an Athenian admiral of the 4th century BC, introduced the first rowing machines as supplemental military training devices. "To train inexperienced oarsmen, Chabrias built wooden rowing frames onshore where beginners could learn technique and timing before they went on board ship." Early rowing machines are known to have existed from the mid-1800s, a US patent being issued to W.B. Curtis in 1872 for a particular hydraulic-based damper design. Machines using linear pneumatic resistance were common around 1900—one of the most popular was the Narragansett hydraulic rower, manufactured in Rhode Island from around 1900–1960. In the 1970s, the Gjessing-Nilson ergometer from Norway used a friction brake mechanism with industrial strapping applied over the broad rim of the flywheel. Weights hanging from the strap ensured that an adjustable and predictable friction could be calculated. The first air resistance ergometers were introduced around 1980 by Repco.In 1981, Peter and Richard Dreissigacker, and Jonathan Williams, filed for U.S. patent protection, as joint inventors of a "Stationary Rowing Unit". The first commercial embodiment of the Concept2 "rowing ergometer" was the Model A, a fixed-frame sliding-seat design using a bicycle wheel with fins attached for air resistance. The Model B, introduced in 1986, introduced a solid cast flywheel and the first digital performance monitor, which proved revolutionary. This machine's capability of accurate calibration combined with easy transportability spawned the sport of competitive indoor rowing, and revolutionised training and selection procedures for watercraft rowing. Later models were the C (1993) and D (2003). In 1995, Casper Rekers, a Dutch engineer, was granted a U.S. patent for a (US 5382210A) "Dynamically Balanced Rowing Simulator". This device differed from the prior art in that the flywheel and footrests are fixed to a carriage, the carriage being free to slide fore and aft on a rail or rails integral to the frame. The seat is also free to slide fore and aft on a rail or rails integral to the frame. Equipment Motion type Modern indoor rowers have their resistance provided by a flywheel. Indoor rowers that utilise flywheel resistance can be categorised into two motion types. In both types, the rowing movement of the user causes the footrests and the seat to move further and closer apart in co-ordination with the user's stroke. The difference between the two types is in the movement, or absence of movement, of the footrests relative to ground. The first type is characterised by the Dreissigacker/Williams device. With this type the flywheel and footrests are fixed to a stationary frame, and the seat is free to slide fore and aft on a rail or rails integral to the stationary frame. Therefore, during use, the seat moves relative to the footrests and also relative to ground, while the flywheel and footrests remain stationary relative to ground. The second type is characterised by the Rekers device. With this type, both the seat and the footrests are free to slide fore and aft on a rail or rails integral to a stationary frame. Therefore, during use, the seat and the footrests move relative to each other, and both also move relative to ground. Damper type Piston resistance comes from hydraulic cylinders that are attached to the handles of the rowing machine. Braked flywheel resistance models comprise magnetic, air, and water resistance rowers. Magnetic resistance models control resistance by means of permanent magnets or electromagnets. Air resistance models use vanes on the flywheel to provide the flywheel braking needed to generate resistance. Water resistance models consist of a paddle revolving in an enclosed tank of water. Slides Sometimes, slides are placed underneath the machine, which allows the machine to move back and forth smoothly as if there were water beneath the rower. The slides can be connected in rows or columns so that rowers are forced to move together on the ergometer, similarly to the way they would match up their rhythm in a boat. Indoor rowers usually also display estimates of rowing boat speed and energy used by the athlete. Use Exercise Rowing is an efficient method of exercise which uses 86% of muscles when done with correct form. Indoor rowing primarily works the cardiovascular systems with typical workouts consisting of steady pieces of 20–40 minutes. The standard measurement of speed on an ergometer is generally known as the "split", or the amount of time in minutes and seconds required to travel at the current pace. Other standard measurements units on the indoor rowing machine include calories and watts. Testing Although ergometer tests are used by rowing coaches to evaluate rowers and are part of athlete selection for many senior and junior national rowing teams, data suggests that: "physiological and performance tests performed on a rowing ergometer are not good indicators of on water performance". Some standard indoor rower ergometer tests include: 250-m ergometer test, 2000-m ergometer test, 5km ergometer test, 16000-m ergometer test and the 30 minute ergometer test. Technique Rowing on an ergometer requires four basic phases to complete one stroke; the catch, the drive, the finish and the recovery. The catch is the initial part of the stroke. The drive is where the power from the rower is generated while the finish is the final part of the stroke. Then, the recovery is the initial phase to begin taking a new stroke. The phases repeat until a time duration or a distance is completed. At each stage of the stroke the back should remain in a neutral, flat position, pivoting at the hips to avoid injury. Catch Knees are bent with the shins in a vertical position. The back should be roughly parallel to the thigh without hyperflexion (leaning forward too far). The arms and shoulders should be extended forward and relaxed. The arms should be level. Drive The drive is initiated by a push and extension of the legs; the body remains in the catch posture at this point of the drive. As the legs continue to full extension, the hip angle opens and the rower engages the core to begin the motion of the body levering backward, adding to the work of the legs. When the legs are fully extended, the rower begins to pull the handle toward the chest with their arms, completing the stroke with the handle half way up the body and the forearms parallel to the ground. Finish (or release) The legs are at full extension and flat. The shoulders are slightly behind the pelvis, and the arms are in full contraction with the elbows bent and hands against the chest below the nipples. The back of the rower is still maintained in an upright posture and wrists should be flat. Recovery The recovery is a slow slide back to the initial part of the stroke, it gives the rower time to recover from the previous stroke. During the recovery the actions are in reverse order of the drive. The recovery is initiated by the extensions of the arms until fully extended in front of the body. The torso is then engaged by pivoting at the hips to move the torso in front of the hips. Weight transfers from the back of the seat to the front of the seat at this time. When the hands come over the knees, the legs are bent at the knees, moving the slide towards the front of the machine. As the back becomes more parallel to the thighs, the recovery is completed when the shins are perpendicular to the ground. At this point the recovery transitions to the catch for the next stroke. Sport The first indoor rowing competition was held in Cambridge, Massachusetts in February 1982 with participation of 96 on-water rowers who called themselves the "Charles River Association of Sculling Has-Beens", hence the acronym, "CRASH-B". The core events for indoor rowing competitions that are currently competed in at the World Rowing Indoor Championships are the individual 500m, individual 2000m, individual 1 hour and 3 minute teams event. Events at other indoor rowing competitions include the mile and the 2500 meter. Most competitions are organised into categories based on sex, age, and weight class. See also Rowbike Rowing Rowing tank References Exercise equipment Rowing equipment
[ 0.4336167871952057, -0.14518611133098602, -0.19781167805194855, 0.07188557833433151, 0.160239115357399, 0.4228070080280304, -0.05583304166793823, 0.09077898412942886, -0.8353292346000671, -0.822419285774231, -0.07604290544986725, 0.42451295256614685, -0.17157725989818573, -0.33111575245857...
15078
https://en.wikipedia.org/wiki/Internetwork%20Packet%20Exchange
Internetwork Packet Exchange
Internetwork Packet Exchange (IPX) is the network layer protocol in the IPX/SPX protocol suite. IPX is derived from Xerox Network Systems' IDP. It also has the ability to act as a transport layer protocol. The IPX/SPX protocol suite was very popular through the late 1980s and mid-1990s because it was used by Novell NetWare, a network operating system. Due to Novell NetWare's popularity, IPX became a prominent protocol for internetworking. A big advantage of IPX was a small memory footprint of the IPX driver, which was vital for DOS and Windows up to Windows 95 due to the limited size at that time of conventional memory. Another IPX advantage is easy configuration of its client computers. However, IPX does not scale well for large networks such as the Internet. As such, IPX usage decreased as the boom of the Internet made TCP/IP nearly universal. Computers and networks can run multiple network protocols, so almost all IPX sites also run TCP/IP, to allow Internet connectivity. It is also possible to run later Novell products without IPX, with the beginning of full support for both IPX and TCP/IP by NetWare version 5 in late 1998. Description A big advantage of IPX protocol is its little or no need for configuration. In the time when protocols for dynamic host configuration did not exist and the BOOTP protocol for centralized assigning of addresses was not common, the IPX network could be configured almost automatically. A client computer uses the MAC address of its network card as the node address and learns what it needs to know about the network topology from the servers or routers – routes are propagated by Routing Information Protocol, services by Service Advertising Protocol. A small IPX network administrator had to care only to assign all servers in the same network the same network number, to assign different network numbers to different frame formats in the same network, to assign different network numbers to different interfaces of servers with multiple network cards (Novell NetWare server with multiple network cards worked automatically as a router), to assign different network numbers to servers in different interconnected networks, to start router process on nodes with multiple network cards in more complex networks. IPX packet structure Each IPX packet begins with a header with the following structure: The Packet Type values are: IPX addressing An IPX address has the following structure: Network number The network number allows to address (and communicate with) the IPX nodes which do not belong to the same network or cabling system. The cabling system is a network in which a data link layer protocol can be used for communication. To allow communication between different networks, they must be connected with IPX routers. A set of interconnected networks is called an internetwork. Any Novell NetWare server may serve as an IPX router. Novell also supplied stand-alone routers. Multiprotocol routers of other vendors often support IPX routing. Using different frame formats in one cabling system is possible, but it works similarly as if separate cabling systems were used (i.e. different network numbers must be used for different frame formats even in the same cabling system and a router must be used to allow communication between nodes using different frame formats in the same cabling system). Logical networks are assigned a unique 32-bit address in the range 0x1 to 0xFFFFFFFE (hexadecimal). Hosts have a 48-bit node address, which is by default set to the last 4 bytes of the network interface card MAC address. The node address is appended to the network number to create a unique network address for the host on the network. Network number 00:00:00:00 means current network. Broadcast network number is FF:FF:FF:FF. Node number The node number is used to address an individual computer (or more exactly, a network interface) in the network. Client stations use its network interface card MAC address as the node number. The value FF:FF:FF:FF:FF:FF may be used as a node number in a destination address to broadcast a packet to "all nodes in the current network". Socket number The socket number serves to select a process or application in the destination node. The presence of a socket number in the IPX address allows the IPX to act as a transport layer protocol, comparable with the User Datagram Protocol (UDP) in the Internet protocol suite. Comparison with IP The IPX network number is conceptually identical to the network part of the IP address (the parts with netmask bits set to 1); the node number has the same meaning as the bits of IP address with netmask bits set to 0. The difference is that the boundary between network and node part of address in IP is variable, while in IPX it is fixed. As the node address is usually identical to the MAC address of the network adapter, the Address Resolution Protocol is not needed in IPX. For routing, the entries in the IPX routing table are similar to IP routing tables; routing is done by network address, and for each network address a network:node of the next router is specified in a similar fashion an IP address/netmask is specified in IP routing tables. There are three routing protocols available for IPX networks. In early IPX networks, a version of Routing Information Protocol (RIP) was the only available protocol to exchange routing information. Unlike RIP for IP, it uses delay time as the main metric, retaining the hop count as a secondary metric. Since NetWare 3, the NetWare Link Services Protocol (NLSP) based on IS-IS is available, which is more suitable for larger networks. Cisco routers implement an IPX version of EIGRP protocol as well. Frame formats IPX can be transmitted over Ethernet using one of the following 4 frame formats or encapsulation types: 802.3 (raw) encapsulation comprises an IEEE 802.3 frame header (destination MAC, source MAC, length) immediately followed by IPX data. It is used in legacy systems, and can be distinguished by the first two bytes of the IPX header always containing a value of 0xFFFF, which cannot be interpreted as valid LLC Destination and Source Service Access Points in this location of the frame. 802.2 (LLC or Novell) comprises an IEEE 802.3 frame header (destination MAC, source MAC, length) followed by an LLC header (DSAP 0xE0, SSAP 0xE0, control 0x03) followed by IPX data. The 0xE0 fields of the LLC header indicate "NetWare". 802.2 (SNAP) comprises an IEEE 802.3 frame header, an LLC header (DSAP 0xAA, SSAP 0xAA, control 0x03), a SNAP header (OUI 0x000000, type 0x8137), and IPX data. The 0xAA fields of the LLC header indicate "SNAP", and the OUI 0x000000 in the SNAP header indicates an encapsulated EtherType. Ethernet II encapsulation comprises an Ethernet II frame header (destination MAC, source MAC, EtherType 0x8137) followed by IPX data. In non-Ethernet networks only 802.2 and SNAP frame types are available. References External links RFC 1132 - A Standard for the Transmission of 802.2 Packets over IPX Networks Ethernet Frame Types: Don Provan's Definitive Answer Novell NetWare Network layer protocols
[ -0.11917818337678909, 0.10044682770967484, 0.21931709349155426, 0.09925054758787155, -0.07357777655124664, -0.26269829273223877, -0.11839906871318817, 0.4002215564250946, -0.525955855846405, -0.8553410172462463, -0.2739338278770447, -0.048778850585222244, -0.6334131360054016, -0.0165897216...
15079
https://en.wikipedia.org/wiki/International%20human%20rights%20instruments
International human rights instruments
International human rights instruments are the treaties and other international texts that serve as legal sources for international human rights law and the protection of human rights in general. There are many varying types, but most can be classified into two broad categories: declarations, adopted by bodies such as the United Nations General Assembly, which are by nature declaratory, so not legally-binding although they may be politically authoritative and very well-respected soft law;, and often express guiding principles; and conventions that are multi-party treaties that are designed to become legally binding, usually include prescriptive and very specific language, and usually are concluded by a long procedure that frequently requires ratification by each states' legislature. Lesser known are some "recommendations" which are similar to conventions in being multilaterally agreed, yet cannot be ratified, and serve to set common standards. There may also be administrative guidelines that are agreed multilaterally by states, as well as the statutes of tribunals or other institutions. A specific prescription or principle from any of these various international instruments can, over time, attain the status of customary international law whether it is specifically accepted by a state or not, just because it is well-recognized and followed over a sufficiently long time. International human rights instruments can be divided further into global instruments, to which any state in the world can be a party, and regional instruments, which are restricted to states in a particular region of the world. Most conventions and recommendations (but few declarations) establish mechanisms for monitoring and establish bodies to oversee their implementation. In some cases these bodies that may have relatively little political authority or legal means, and may be ignored by member states; in other cases these mechanisms have bodies with great political authority and their decisions are almost always implemented. A good example of the latter is the European Court of Human Rights. Monitoring mechanisms also vary as to the degree of individual access to expose cases of abuse and plea for remedies. Under some conventions or recommendations – e.g. the European Convention on Human Rights – individuals or states are permitted, subject to certain conditions, to take individual cases to a full-fledged tribunal at international level. Sometimes, this can be done in national courts because of universal jurisdiction. The Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights, and the International Covenant on Economic, Social and Cultural Rights together with other international human rights instruments are sometimes referred to as the international bill of rights. International human rights instruments are identified by the OHCHR and most are referenced on the OHCHR website. Declarations Global Declaration of the Rights of the Child 1923 Universal Declaration of Human Rights (UN, 1948) Declaration on the Rights of Disabled Persons (UN, 1975) Declaration on the Right to Development (UN, 1986) (UN, 1979) Vienna Declaration and Programme of Action (World Conference on Human Rights, 1993) Beijing Declaration and Platform for Action (The Fourth World Conference on Women, 1995) Declaration of Human Duties and Responsibilities (UNESCO, 1998) Universal Declaration on Cultural Diversity (UNESCO, 2001) Declaration on the Rights of Indigenous Peoples (UN, 2007) UN declaration on sexual orientation and gender identity (UN, 2008) Regional: Americas American Declaration of the Rights and Duties of Man (OAS, 1948) American Declaration on the Rights of Indigenous Peoples (OAS, 2016) Regional: Asia Declaration of the Basic Duties of ASEAN Peoples and Governments (Regional Council of Human Rights in Asia, 1983) ASEAN Human Rights Declaration (ASEAN, 2009) Regional: Middle East Cairo Declaration of Human Rights in Islam (OIC,1990) Conventions Global According to OHCHR, there are 9 or more core international human rights instruments and several optional protocols. Among the well-known instruments are: Convention on the Elimination of All Forms of Racial Discrimination (ICERD, 21 December 1965) International Covenant on Civil and Political Rights (ICCPR, 16 December 1966) International Covenant on Economic, Social, and Cultural Rights (ICESCR, 16 December 1966) Convention on the Elimination of All Forms of Discrimination Against Women (CEDAW, 18 December 1979) Inaugural HURIDOCS Assembly (HURIDOCS, 24 July 1982) SOS-Torture Convention (OMCT, 14 April 1983) Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment (CAT, 10 December 1984) Convention on the Rights of the Child (CRC, 20 November 1989) International Convention on the Protection of the Rights of All Migrant Workers and Members of Their Families (ICMW, 18 December 1990) International Convention for the Protection of All Persons from Enforced Disappearance (CPED, 20 December 2006) Convention on the Rights of Persons with Disabilities (CRPD, 13 December 2006) Several more human rights instruments exist. A few examples: The International Convention on the Suppression and Punishment of the Crime of Apartheid (ICSPCA) International Convention on the Protection of the Rights of All Migrant Workers and Members of Their Families Convention Relating to the Status of Refugees and Protocol Relating to the Status of Refugees Convention on the Reduction of Statelessness Convention on the Prevention and Punishment of the Crime of Genocide Indigenous and Tribal Peoples Convention, 1989 (ILO 169) Regional: Africa African Charter on Human and Peoples' Rights (June, 1981) African Charter on the Rights and Welfare of the Child (1990) Maputo Protocol (11 July 2003) ((African Youth Charter)) (June 30,2006) (C African Disability Protocol (June 30,2019) SADC Gender Protocol (revised version enters into force 2018) Regional: America American Convention on Human Rights Inter-American Convention to Prevent and Punish Torture Inter-American Convention on Forced Disappearance of Persons Inter-American Convention on the Prevention, Punishment, and Eradication of Violence against Women Inter-American Convention on the Elimination of All Forms of Discrimination against Persons with Disabilities Regional: Europe Charter of Fundamental Rights of the European Union Convention on Action against Trafficking in Human Beings European Convention on Nationality European Charter for Regional or Minority Languages (ECRML) European Convention on Human Rights (ECHR) European Convention for the Prevention of Torture and Inhuman or Degrading Treatment or Punishment (CPT) European Social Charter (ESC), and Revised Social Charter Framework Convention for the Protection of National Minorities (FCNM) Regional: Middle East Arab Charter on Human Rights (ACHR) (22 May 2004) See also Universal jurisdiction Rule of Law in Armed Conflicts Project (RULAC) International Criminal Court (established in 2002) International human rights law Human rights treaty bodies List of human rights organizations List of indigenous rights organizations List of international animal welfare conventions Rule of law Rule According to Higher Law References External links International Human Rights Instruments - U.N. list International Justice Resource Center News and resources for international human rights law Human rights instruments Human rights treaties
[ 0.36269429326057434, 0.6254159808158875, -0.15499459207057953, 0.10237355530261993, 0.10355249047279358, -0.09347451478242874, -0.33635714650154114, 0.09593703597784042, -0.13431651890277863, -0.3754511773586273, -0.27099281549453735, 0.9003041982650757, 0.225396990776062, 0.19927906990051...
15080
https://en.wikipedia.org/wiki/Indian%20removal
Indian removal
Indian removal was the United States government policy of forced displacement of self-governing tribes of Native Americans from their ancestral homelands in the eastern United States to lands west of the Mississippi Riverspecifically, to a designated Indian Territory (roughly, present-day Oklahoma). The Indian Removal Act, the key law which authorized the removal of Native tribes, was signed by Andrew Jackson in 1830. Although Jackson took a hard line on Indian removal, the law was enforced primarily during the Martin Van Buren administration. After the passage of the Indian Removal Act in 1830, approximately 60,000 members of the Cherokee, Muscogee (Creek), Seminole, Chickasaw, and Choctaw nations (including thousands of their black slaves) were forcibly removed from their ancestral homelands, with thousands dying during the Trail of Tears. Indian removal, a popular policy among white settlers, was a consequence of actions by European settlers in North America during the colonial period and then by the United States government (and its citizens) until the mid-20th century. The policy traced its origins to the administration of James Monroe, although it addressed conflicts between European and Native Americans which had occurred since the 17th century and were escalating into the early 19th century (as white settlers pushed westward in the cultural belief of manifest destiny). Historical views of Indian removal have been reevaluated since that time. Widespread contemporary acceptance of the policy, due in part to the popular embrace of the concept of manifest destiny, has given way to a more-somber perspective. Historians have described the removal of Native Americans as paternalism, ethnic cleansing, or genocide. Revolutionary background American leaders in the Revolutionary and early US eras debated about whether Native Americans should be treated as individuals or as nations. Declaration of Independence In the indictment section of the Declaration of Independence, the Indigenous inhabitants of the United States are referred to as "merciless Indian Savages", reflecting a commonly held view at the time. Benjamin Franklin In a draft "Proposed Articles of Confederation" presented to the Continental Congress on May 10, 1775, Benjamin Franklin called for a "perpetual Alliance" with the Indians in the nation about to be born, particularly with the six nations of the Iroquois Confederacy: Early congressional acts The Confederation Congress passed the Northwest Ordinance of 1787 (a precedent for U.S. territorial expansion would occur for years to come), calling for the protection of Native American "property, rights, and liberty"; the U.S. Constitution of 1787 (Article I, Section 8) made Congress responsible for regulating commerce with the Indian tribes. In 1790, the new U.S. Congress passed the Indian Nonintercourse Act (renewed and amended in 1793, 1796, 1799, 1802, and 1834) to protect and codify the land rights of recognized tribes. George Washington President George Washington, in his 1790 address to the Seneca Nation which called the pre-Constitutional Indian land-sale difficulties "evils", said that the case was now altered and pledged to uphold Native American "just rights". In March and April 1792, Washington met with 50 tribal chiefs in Philadelphia—including the Iroquois—to discuss strengthening the friendship between them and the United States. Later that year, in his fourth annual message to Congress, Washington stressed the need to build peace, trust, and commerce with Native Americans: In his seventh annual message to Congress in 1795, Washington intimated that if the U.S. government wanted peace with the Indians it must behave peacefully; if the U.S. wanted raids by Indians to stop, raids by American "frontier inhabitants" must also stop. Thomas Jefferson In his Notes on the State of Virginia (1785), Thomas Jefferson defended Native American culture and marvelled at how the tribes of Virginia "never submitted themselves to any laws, any coercive power, any shadow of government" due to their "moral sense of right and wrong". He wrote to the Marquis de Chastellux later that year, "I believe the Indian then to be in body and mind equal to the whiteman". Jefferson's desire, as interpreted by Francis Paul Prucha, was for Native Americans to intermix with European Americans and become one people. To achieve that end as president, Jefferson offered U.S. citizenship to some Indian nations and proposed offering them credit to facilitate trade. By 1803, however, in a letter to William Henry Harrison, Jefferson made it clear he saw the necessity of dispossessing Native Americans of their lands:In this way our settlements will gradually circumbscribe & approach the Indians, & they will in time either incorporate with us as citizens of the US. or remove beyond the Missisipi.The former is certainly the termination of their history most happy for themselves. But in the whole course of this, it is essential to cultivate their love. As to their fear, we presume that our strength & their weakness is now so visible that they must see we have only to shut our hand to crush them. Jeffersonian policy As president, Thomas Jefferson developed a far-reaching Indian policy with two primary goals. He wanted to assure that the Native nations (not foreign nations) were tightly bound to the new United States, as he considered the security of the nation to be paramount. He also wanted to "civilize" them into adopting an agricultural, rather than a hunter-gatherer, lifestyle. These goals would be achieved through treaties and the development of trade. Jefferson initially promoted an American policy which encouraged Native Americans to become assimilated, or "civilized". He made sustained efforts to win the friendship and cooperation of many Native American tribes as president, repeatedly articulating his desire for a united nation of whites and Indians as in his November 3, 1802, letter to Seneca spiritual leader Handsome Lake: When a delegation from the Cherokee Nation's Upper Towns lobbied Jefferson for the full and equal citizenship promised to Indians living in American territory by George Washington, his response indicated that he was willing to grant citizenship to those Indian nations who sought it. In his eighth annual message to Congress on November 8, 1808, he presented a vision of white and Indian unity: As some of Jefferson's other writings illustrate, however, he was ambivalent about Indian assimilation and used the words "exterminate" and "extirpate" about tribes who resisted American expansion and were willing to fight for their lands. Jefferson intended to change Indian lifestyles from hunting and gathering to farming, largely through "the decrease of game rendering their subsistence by hunting insufficient". He expected the change to agriculture to make them dependent on white Americans for goods, and more likely to surrender their land or allow themselves to be moved west of the Mississippi River. In an 1803 letter to William Henry Harrison, Jefferson wrote: In that letter, Jefferson spoke about protecting the Indians from injustices perpetrated by whites: According to the treaty of February 27, 1819, the U.S. government would offer citizenship and of land per family to Cherokees who lived east of the Mississippi. Native American land was sometimes purchased, by treaty or under duress. The idea of land exchange, that Native Americans would give up their land east of the Mississippi in exchange for a similar amount of territory west of the river, was first proposed by Jefferson in 1803 and first incorporated into treaties in 1817 (years after the Jefferson presidency). The Indian Removal Act of 1830 included this concept. John C. Calhoun's plan Under President James Monroe, Secretary of War John C. Calhoun devised the first plans for Indian removal. Monroe approved Calhoun's plans by late 1824 and, in a special message to the Senate on January 27, 1825, requested the creation of the Arkansaw and Indian Territories; the Indians east of the Mississippi would voluntarily exchange their lands for lands west of the river. The Senate accepted Monroe's request, and asked Calhoun to draft a bill which was killed in the House of Representatives by the Georgia delegation. President John Quincy Adams assumed the Calhoun–Monroe policy, and was determined to remove the Indians by non-forceful means; Georgia refused to consent to Adams' request, forcing the president to forge a treaty with the Cherokees granting Georgia the Cherokee lands. On July 26, 1827, the Cherokee Nation adopted a written constitution (modeled on that of the United States) which declared that they were an independent nation with jurisdiction over their own lands. Georgia contended that it would not countenance a sovereign state within its own territory, and asserted its authority over Cherokee territory. When Andrew Jackson became president as the candidate of the newly-organized Democratic Party, he agreed that the Indians should be forced to exchange their eastern lands for western lands (including relocation) and vigorously enforced Indian removal. Opposition to removal from U.S. citizens Although Indian removal was a popular policy, it was also opposed on legal and moral grounds; it also ran counter to the formal, customary diplomatic interaction between the federal government and the Native nations. Ralph Waldo Emerson wrote the widely-published letter "A Protest Against the Removal of the Cherokee Indians from the State of Georgia" in 1838, shortly before the Cherokee removal. Emerson criticizes the government and its removal policy, saying that the removal treaty was illegitimate; it was a "sham treaty", which the U.S. government should not uphold. He describes removal as "such a dereliction of all faith and virtues, such a denial of justice…in the dealing of a nation with its own allies and wards since the earth was made…a general expression of despondency, of disbelief, that any goodwill accrues from a remonstrance on an act of fraud ad robbery, appeared in those men to whom we naturally turn for aid and counsel". Emerson concludes his letter by saying that it should not be a political issue, urging President Martin Van Buren to prevent the enforcement of Cherokee removal. Other people and social organizations throughout the country also opposed removal. Native American response to removal Native groups reshaped their governments, made constitutions and legal codes, and sent delegates to Washington to negotiate policies and treaties to uphold their autonomy and ensure federally-promised protection from white states. They thought that acclimating, as the U.S. wanted them to, would stem removal policy and create a better relationship with the federal government and surrounding states. Native American nations had differing views about removal. Although most wanted to remain on their native lands and do anything possible to ensure that, others believed that removal to a nonwhite area was their only option to maintain their autonomy and culture. The U.S. used this division to forge removal treaties with (often) minority groups who became convinced that removal was the best option for their people. These treaties were often not acknowledged by most of a nation's people. When Congress ratified the removal treaty, the federal government could use military force to remove Native nations if they had moved (or had begun moving) by the date stipulated in the treaty. Indian Removal Act When Andrew Jackson became president of the United States in 1829, his government took a hard line on Indian removal; Jackson abandoned his predecessors' policy of treating Indian tribes as separate nations, aggressively pursuing all Indians east of the Mississippi who claimed constitutional sovereignty and independence from state laws. They were to be removed to reservations in Indian Territory, west of the Mississippi (present-day Oklahoma), where they could exist without state interference. At Jackson's request, Congress began a debate on an Indian-removal bill. After fierce disagreement, the Senate passed the bill by a 28–19 vote; the House had narrowly passed it, 102–97. Jackson signed the Indian Removal Act into law on May 30, 1830. That year, most of the Five Civilized Tribes—the Chickasaw, Choctaw, Creek, Seminole, and Cherokee—lived east of the Mississippi. The Indian Removal Act implemented federal-government policy towards its Indian populations, moving Native American tribes east of the Mississippi to lands west of the river. Although the act did not authorize the forced removal of indigenous tribes, it enabled the president to negotiate land-exchange treaties. Choctaw On September 27, 1830, the Choctaw signed the Treaty of Dancing Rabbit Creek and became the first Native American tribe to be removed. The agreement was one of the largest transfers of land between the U.S. government and Native Americans which was not the result of war. The Choctaw signed away their remaining traditional homelands, opening them up for European-American settlement in Mississippi Territory. When the tribe reached Little Rock, a chief called its trek a "trail of tears and death". In 1831, French historian and political scientist Alexis de Tocqueville witnessed an exhausted group of Choctaw men, women and children emerging from the forest during an exceptionally cold winter near Memphis, Tennessee, on their way to the Mississippi to be loaded onto a steamboat. He wrote, Cherokee While the Indian Removal Act made the move of the tribes voluntary, it was often abused by government officials. The best-known example is the Treaty of New Echota, which was signed by a small faction of twenty Cherokee tribal members (not the tribal leadership) on December 29, 1835. Most of the Cherokee later blamed the faction and the treaty for the tribe's forced relocation in 1838. An estimated 4,000 Cherokee died in the march, which is known as the Trail of Tears. Missionary organizer Jeremiah Evarts urged the Cherokee Nation to take its case to the U.S. Supreme Court. The Marshall court heard the case in Cherokee Nation v. Georgia (1831), but declined to rule on its merits; the court declaring that the Native American tribes were not sovereign nations, and could not "maintain an action" in U.S. courts. In an opinion written by Chief Justice Marshall in Worcester v. Georgia (1832), individual states had no authority in American Indian affairs. The state of Georgia defied the Supreme Court ruling, and the desire of white settlers and land speculators for Indian lands continued unabated; some whites claimed that Indians threatened peace and security. The Georgia legislature passed a law forbidding whites from living on Indian territory after March 31, 1831, without a license from the state; this excluded white missionaries who opposed Indian removal. Seminole The Seminole refused to leave their Florida lands in 1835, leading to the Second Seminole War. Osceola was a Seminole leader of the people's fight against removal. Based in the Everglades, Osceola and his band used surprise attacks to defeat the U.S. Army in a number of battles. In 1837, Osceola was duplicitously captured by order of U.S. General Thomas Jesup when Osceola came under a flag of truce to negotiate peace near Fort Peyton. Osceola died in prison of illness; the war resulted in over 1,500 U.S. deaths, and cost the government $20 million. Some Seminole traveled deeper into the Everglades, and others moved west. The removal continued, and a number of wars broke out over land. Muskogee (Creek) In the aftermath of the Treaties of Fort Jackson and the Washington, the Muscogee were confined to a small strip of land in present-day east central Alabama. The Creek national council signed the Treaty of Cusseta in 1832, ceding their remaining lands east of the Mississippi to the U.S. and accepting relocation to the Indian Territory. Most Muscogee were removed to the territory during the Trail of Tears in 1834, although some remained behind. Although the Creek War of 1836 ended government attempts to convince the Creek population to leave voluntarily, Creeks who had not participated in the war were not forced west (as others were). The Creek population was placed into camps and told that they would be relocated soon. Many Creek leaders were surprised by the quick departure, but could do little to challenge it. The 16,000 Creeks were organized into five detachments who were to be sent to Fort Gibson. The Creek leaders did their best to negotiate better conditions, and succeeded in obtaining wagons and medicine. To prepare for the relocation, Creeks began to deconstruct their spiritual lives; they burned piles of lightwood over their ancestors' graves to honor their memories, and polished the sacred plates which would travel at the front of each group. They also prepared financially, selling what they could not bring. Many were swindled by local merchants out of valuable possessions (including land), and the military had to intervene. The detachments began moving west in September 1836, facing harsh conditions. Despite their preparations, the detachments faced bad roads, worse weather, and a lack of drinkable water. When all five detachments reached their destination, they recorded their death toll. The first detachment, with 2,318 Creeks, had 78 deaths; the second had 3,095 Creeks, with 37 deaths. The third had 2,818 Creeks, and 12 deaths; the fourth, 2,330 Creeks and 36 deaths. The fifth detachment, with 2,087 Creeks, had 25 deaths. Chickasaw Unlike other tribes, who exchanged lands, the Chickasaw were to receive financial compensation of $3 million from the United States for their lands east of the Mississippi River. They reached an agreement to purchase of land from the previously-removed Choctaw in 1836 after a bitter five-year debate, paying the Chocktaw $530,000 for the westernmost Choctaw land. Most of the Chickasaw moved in 1837 and 1838. The $3 million owed to the Chickasaw by the U.S. went unpaid for nearly 30 years. Aftermath The Five Civilized Tribes were resettled in the new Indian Territory. The Cherokee occupied the northeast corner of the territory and a strip of land in Kansas on its border with the territory. Some indigenous nations resisted the forced migration more strongly. The few who stayed behind eventually formed tribal groups, including the Eastern Band of Cherokee (based in North Carolina), the Mississippi Band of Choctaw Indians, the Seminole Tribe of Florida, and the Creeks in Alabama (including the Poarch Band). Removals North Tribes in the Old Northwest were smaller and more fragmented than the Five Civilized Tribes, so the treaty and emigration process was more piecemeal. Following the Northwest Indian War, most of the modern state of Ohio was taken from native nations in the 1795 Treaty of Greenville. Tribes such as the already-displaced Lenape (Delaware tribe), Kickapoo and Shawnee, were removed from Indiana, Michigan, and Ohio during the 1820s. The Potawatomi were forced out of Wisconsin and Michigan in late 1838, and were resettled in Kansas Territory. Communities remaining in present-day Ohio were forced to move to Louisiana, which was then controlled by Spain. Bands of Shawnee, Ottawa, Potawatomi, Sauk, and Meskwaki (Fox) signed treaties and relocated to the Indian Territory. In 1832, the Sauk leader Black Hawk led a band of Sauk and Fox back to their lands in Illinois; the U.S. Army and Illinois militia defeated Black Hawk and his warriors in the Black Hawk War, and the Sauk and Fox were relocated to present-day Iowa. The Miami were split, with many of the tribe resettled west of the Mississippi River during the 1840s. In the Second Treaty of Buffalo Creek (1838), the Senecas transferred all their land in New York (except for one small reservation) in exchange for of land in Indian Territory. The federal government would be responsible for the removal of the Senecas who opted to go west, and the Ogden Land Company would acquire their New York lands. The lands were sold by government officials, however, and the proceeds were deposited in the U.S. Treasury. Maris Bryant Pierce, a "young chief" served as a lawyer representing four territories of the Seneca tribe, starting in 1838. The Senecas asserted that they had been defrauded, and sued for redress in the Court of Claims. The case was not resolved until 1898, when the United States awarded $1,998,714.46 in compensation to "the New York Indians". The U.S. signed treaties with the Senecas and the Tonawanda Senecas in 1842 and 1857, respectively. Under the treaty of 1857, the Tonawandas renounced all claim to lands west of the Mississippi in exchange for the right to buy back the Tonawanda Reservation from the Ogden Land Company. Over a century later, the Senecas purchased a plot (part of their original reservation) in downtown Buffalo to build the Seneca Buffalo Creek Casino. South Changed perspective Historical views of Indian removal have been reevaluated since that time. Widespread contemporary acceptance of the policy, due in part to the popular embrace of the concept of manifest destiny, has given way to a more-somber perspective. The removals have been described by historians to paternalism, ethnic cleansing, or genocide. Historian David Stannard has called it genocide. Jackson's reputation Andrew Jackson's reputation has been negatively impacted by his treatment of the Indians. Historians who admire Jackson's strong presidential leadership, such as Arthur M. Schlesinger, Jr., would gloss over the Indian Removal in a footnote. In 1969, Francis Paul Prucha wrote that Jackson's removal of the Five Civilized Tribes from the hostile white environment of the Old South to Oklahoma probably saved them. Jackson was sharply attacked by political scientist Michael Rogin and historian Howard Zinn during the 1970s, primarily on this issue; Zinn called him an "exterminator of Indians". According to historians Paul R. Bartrop and Steven L. Jacobs, however, Jackson's policies do not meet the criteria for physical or cultural genocide. See also Act for the Protection of the People of Indian Territory (Curtis Act), 1898 Forced Fee Patenting Act (Burke Act), 1906 Wheeler–Howard Act Nelson Act of 1889, Minnesota's version of the Dawes Act Cultural assimilation of Native Americans Aboriginal title in the United States Competency Commission Land run Diminishment Great Māhele Land Buy-Back Program for Tribal Nations Checkerboarding (land) Dawes Act Citations and notes Further reading Black, Jason Edward (2006). US Governmental and Native Voices in the Nineteenth Century: Rhetoric in the Removal and Allotment of American Indians. (PhD dissertation), College Park, MD: University of Maryland. See, for instance, the bibliography on pp. 571–615. Ehle, John (1988). Trail of Tears: The Rise and Fall of the Cherokee Nation. New York: Doubleday. . Jahoda, Gloria (1975). The Trail of Tears: The Story of the American Indian Removals 1813–1855. New York: Holt, Rinehart and Winston. . Strickland, William M. "The rhetoric of removal and the trail of tears: Cherokee speaking against Jackson's Indian removal policy, 1828–1832" Southern Speech Communication Journal (1982). 47#3: 292–309. Young, Mary E. "Indian removal and land allotment: The civilized tribes and Jacksonian justice." American Historical Review 64.1 (1958): 31–45. online Primary sources Martinez, Donna, ed. Documents of American Indian Removal (2018) excerpt External links PBS article on Indian Removal Critical Resources: Text of the Removal Act and other documents. Indian Removal from Digital History by S. Mintz 19th-century colonization of the Americas Aboriginal title in the United States Andrew Jackson Cherokee Nation (1794–1907) Ethnic cleansing in the United States Forced migrations of Native Americans in the United States Historical migrations History of United States expansionism Indian Territory Legal history of the United States Native American genocide Racism in the United States United States federal Indian policy
[ -0.3235469162464142, -0.021271737292408943, -1.0601723194122314, 0.06477376073598862, 0.11921171844005585, 0.7137795686721802, 0.8057172894477844, 0.18536949157714844, -0.06569825112819672, -0.3559080958366394, -0.323766827583313, 0.0792536586523056, -0.678436815738678, 0.907862663269043, ...
15081
https://en.wikipedia.org/wiki/Green%20Party%20%28Ireland%29
Green Party (Ireland)
The Green Party () is a green political party that operates in the Republic of Ireland and Northern Ireland. As other like-minded Green parties, it has eco-socialist/green left and more moderate, pragmatic factions. It holds a pro-European stance. It was founded as the Ecology Party of Ireland in 1981 by Dublin teacher Christopher Fettes. The party became the Green Alliance in 1983 and adopted its current English language name in 1987 while the Irish name was kept unchanged. , its leader is Eamon Ryan, its deputy leader is Catherine Martin and its Cathoirleach (Chairperson) is Pauline O'Reilly. Green Party candidates have been elected to most levels of representation: local government (in both the Republic and Northern Ireland), Dáil Éireann, the Northern Ireland Assembly, and the European Parliament. The Green Party first entered the Dáil in 1989. It has participated in the Irish government twice, from 2007 to 2011 as junior partner in a coalition with Fianna Fáil, and since June 2020 in a coalition with Fianna Fáil and Fine Gael. Following the first period in government, the party suffered a wipeout in the February 2011 election, losing all six of its TDs. In the February 2016 election, it returned to the Dáil with two seats. Following this, Grace O'Sullivan was elected to the Seanad on 26 April that year of 2016 and Joe O'Brien was elected to Dáil Éireann in the 2019 Dublin Fingal by-election. In the 2020 general election, the party had its best result ever, securing 12 TDs and becoming the fourth largest party in Ireland. History Early years and first rise The Green Party began life as the Ecology Party in 1981, with Christopher Fettes serving as the party's first chairperson. The party's first public appearance was modest: the event announced that they would be contesting the November 1982 general election, and was attended by their 7 election candidates, 20 party supporters, and one singular journalist. Fettes had opened the meeting by noting the party didn't expect to win any seats. Willy Clingan, the journalist present, recalled that "The Ecology Party introduced its seven election candidates at the nicest and most endearingly honest press conference of the whole campaign". The Ecology party took 0.2% of the vote that year. Following a name change to the Green Alliance, it contested the 1984 European elections, with party founder Roger Garland winning 1.9% in the Dublin constituency. The following year, it won its first election when Marcus Counihan was elected to Killarney Urban District Council at the 1985 local elections, buoyed by winning 5,200 first preference votes as a European candidate in Dublin the previous year. The party nationally ran 34 candidates and won 0.6% of the vote. The party continued to struggle until the 1989 general election when the Green Party (as it was now named) won its first seat in Dáil Éireann, when Roger Garland was elected in Dublin South. Garland lost his seat at the 1992 general election, while Trevor Sargent gained a seat in Dublin North. In the 1994 European election, Patricia McKenna topped the poll in the Dublin constituency and Nuala Ahern won a seat in Leinster. They retained their European Parliament seats in the 1999 European election, although the party lost five councillors in local elections held that year despite an increase in its vote. At the 1997 general election, the party gained a seat when John Gormley won a Dáil seat in Dublin South-East. At the 2002 general election the party made a breakthrough, getting six Teachtaí Dála (TDs) elected to the Dáil with 4% of the national vote. However, in the 2004 European election, the party lost both of its European Parliament seats. In the 2004 local elections, it increased its number of councillors at county level from 8 to 18 (out of 883) and at town council level from 5 to 14 (out of 744). The party gained its first representation in the Northern Ireland Assembly in 2007, the Green Party in Northern Ireland having become a regional branch of the party the previous year. First term in government The Green Party entered government for the first time after the 2007 general election, held on 24 May. Although its share of first-preference votes increased at the election, the party failed to increase the number of TDs returned. Mary White won a seat for the first time in Carlow–Kilkenny; however, Dan Boyle lost his seat in Cork South-Central. The party had approached the 2007 general election on an independent platform, not ruling aany out coalition partners while expressing its preference for an alternative to the outgoing coalition of Fianna Fáil and the Progressive Democrats. Neither the outgoing government nor an alternative of Fine Gael, Labour and the Green Party had sufficient seats to form a majority. Fine Gael ruled out a coalition arrangement with Sinn Féin, opening the way for Green Party negotiations with Fianna Fáil. Before the negotiations began, Ciarán Cuffe TD wrote on his blog that "a deal with Fianna Fáil would be a deal with the devil… and [the Green Party would be] decimated as a Party". After protracted negotiations, a draft programme for government was agreed to between the Greens and Fianna Fáil. On 13 June 2007, Green members at the Mansion House in Dublin voted 86% in favour (441 to 67; with 2 spoilt votes) of entering coalition with Fianna Fáil. The following day, the six Green Party TDs voted for the re-election of Bertie Ahern as Taoiseach. New party leader John Gormley was appointed as Minister for the Environment, Heritage and Local Government and Eamon Ryan was appointed as Minister for Communications, Energy and Natural Resources. Trevor Sargent was appointed as Minister of State at the Department of Agriculture, Fisheries and Food with responsibility for Food and Horticulture. Before its entry into government, the Green Party had been a vocal supporter of the Shell to Sea movement, the campaign to reroute the M3 motorway away from Tara and (to a lesser extent) the campaign to end United States military use of Shannon Airport. After the party entered government there were no substantive changes in government policy on these issues, which meant that Eamon Ryan oversaw the Corrib gas project while he was in office. The Green Party had, at its last annual conference, made an inquiry into the irregularities surrounding the project (see Corrib gas controversy) a precondition of entering government but changed its stance during post-election negotiations with Fianna Fáil. The 2008 budget did not include a carbon levy on fuels such as petrol, diesel and home heating oil, which the Green Party had sought before the election. A carbon levy was, however, introduced in the 2010 Budget. The 2008 budget did include a separate carbon budget announced by Gormley, which introduced new energy efficiency tax credit, a ban on incandescent bulbs from January 2009, a tax scheme incentivising commuters' purchases of bicycles and a new scale of vehicle registration tax based on carbon emissions. At a special convention on whether to support the Treaty of Lisbon on 19 January 2008, the party voted 63.5% in favour of supporting the Treaty; this fell short of the party's two-thirds majority requirement for policy issues. As a result, the Green Party did not have an official campaign in the first Lisbon Treaty referendum, although individual members were involved on different sides. The referendum did not pass in 2008, and following the Irish government's negotiation with EU member states of additional legal guarantees and assurances, the Green Party held another special convention meeting in Dublin on 18 July 2009 to decide its position on the second Lisbon referendum. Precisely two-thirds of party members present voted to campaign for a 'Yes' in the referendum. This was the first time in the party's history that it had campaigned in favour of a European treaty. The government's response to the post-2008 banking crisis significantly affected the party's support, and it suffered at the 2009 local elections, returning with only three County Council seats in total and losing its entire traditional Dublin base, with the exception of a Town Council seat in Balbriggan. Déirdre de Búrca, one of two Green Senators nominated by Taoiseach Bertie Ahern in 2007, resigned from the party and her seat in 2010, in part owing to the party's inability to secure her a job in the European Commission. On 23 February 2010, Trevor Sargent resigned as Minister of State for Food and Horticulture owing to allegations over contacting Gardaí about a criminal case involving a constituent, with Ciarán Cuffe being appointed as his replacement the following March. The Green Party supported the passage of legislation for EC–ECB–IMF financial support for Ireland's bank bailout. On 19 January, the party derailed Taoiseach Brian Cowen's plans to reshuffle his cabinet when it refused to endorse Cowen's intended replacement ministers, forcing Cowen to redistribute the vacant portfolios among incumbent ministers. The Greens were angered at not having been consulted about this effort, and went as far as to threaten to pull out of the coalition unless Cowen set a firm date for an election due that spring. He ultimately set the date for 11 March. On 23 January 2011, the Green Party met with Cowen following his resignation as leader of senior coalition partner Fianna Fáil the previous afternoon. The Green Party then announced it was breaking off the coalition and going into opposition with immediate effect. Ministers Gormley and Ryan resigned as cabinet ministers, and Cuffe and White resigned as Ministers of State. Green Party leader John Gormley said at a press conference announcing the withdrawal: In almost four years in Government, from 2007 to 2011, the Green Party contributed to the passage of civil partnership for same-sex couples, the introduction of major planning reform, a major increase in renewable energy output, progressive budgets, and a nationwide scheme of home insulation retrofitting. Wipeout, recovery, and second government term The party suffered a wipeout at the 2011 general election, with all of its six TDs losing their seats, including those of former Ministers John Gormley and Eamon Ryan. Three of their six incumbent TDs lost their deposits. The party's share of the vote fell below 2%, meaning that they could not reclaim election expenses, and their lack of parliamentary representation led to the ending of state funding for the party. The party candidates in the 2011 election to the Seanad were Dan Boyle and Niall Ó Brolcháin; neither was elected, and as a result, for the first time since 1989 the Green Party had no representatives in the Oireachtas. In the aftermath of the wipeout Eamon Ryan was elected as party leader on 27 May 2011, succeeding John Gormley, while Catherine Martin was later appointed the deputy leader of the party. At the 2016 general election Ryan and Martin gained two seats in the Dáil while Grace O'Sullivan picked up a seat in the Seanad. In doing so the Green party became the first Irish political party to lose all their seats in a general election but come back and win seats in a subsequent election. The Greens continued to pick up momentum in 2019, performing quite well in May during the concurrent 2019 local elections and 2019 European Parliament election while in November that same year the party saw Pippa Hackett capture a seat in the Seanad and Joe O'Brien bring home the party's first ever by-election win as a result of the 2019 Dublin Fingal by-election. In the 2020 general election, the party had its best result ever, winning 7.1% of the first-preference votes and returning 12 TDs, an increase of ten from the last election. It became the fourth-largest party in the Dáil and entered government in coalition with Fianna Fáil and Fine Gael. Ryan, Martin and Roderic O'Gorman were appointed as cabinet ministers, with four Green Ministers of State. Clare Bailey, the leader of the Green Party in Northern Ireland, was amongst a number of Green members who stood against the coalition. She said it proposed the "most fiscally conservative arrangements in a generation" and that "the economic and finances behind this deal will really lead to some of the most vulnerable being hit the hardest", as well as it not doing enough on climate and social justice. She also said the deal "fails to deliver on our promise to tackle homelessness and provide better healthcare", "represents an unjust recovery" and "sets out an inadequate and vague pathway towards climate action". In the 2020 Seanad election the party returned two senators. A further two senators were nominated by Taoiseach, Micheál Martin bringing the total party representation in the Oireachtas to 16. In July 2020, Eamon Ryan retained his leadership of the party with a narrow leadership election victory over Catherine Martin in the 2020 Green Party leadership election by 994 votes to 946, a margin of 48 votes. Despite the success at the general election, the party found itself dogged by infighting and resignations afterwards. Prominent member Saoirse McMugh, a candidate in the 2019 European elections, 2020 general election and the 2020 Seanad election, resigned from the party upon the Greens entering government with Fine Gael and Fianna Fáil, parties she believed would damage public enthusiasm for environmentalist policies by pairing them with "socially regressive" policies. Over the course of 2020, 4 councillors as well as both the leader of the Young Greens and the leader of the Queer Greens would also depart from the party, all citing either bullying within the party or dissatisfaction with the coalition and it's policies as the cause. Amongst the resignations were councillors Lorna Bogue and Liam Sinclair, who subsequently formed a new left-wing green party called An Rabharta Glas – Green Left in June 2021. Ideology and policies The Green Party has seven "founding principles". Broadly, these founding principles reflect the "four pillars" of green politics observed by the majority of Green Parties internationally: ecological wisdom, social justice, grassroots democracy, and nonviolence. They also reflect the six guiding principles of the Global Greens, which also includes a respect for diversity as a principle. While strongly associated with environmentalist policies, the party also has policies covering all other key areas. These include protection of the Irish language, lowering the voting age in Ireland to 16, a directly elected Seanad, support for universal healthcare, and a constitutional amendment which guarantees that the water of Ireland will never be privatised. The party also advocates that terminally ill people should have the right to legally choose assisted dying, stating "provisions should apply only to those with a terminal illness which is likely to result in death within six months". It also states that "such a right would only apply where the person has a clear and settled intention to end their own life which is proved by making, and signing, a written declaration to that effect. Such a declaration must be countersigned by two qualified doctors". Internal factions In parallel to other Green Parties in Europe, the 1980s and 1990s saw a division within the Irish Green Party between two factions; the "Realists" (nicknamed the "Realos") and the "Fundamentalists (nicknamed the "Fundies"). The Realists advocated taking a pragmatic approach to politics, which would mean having to accept some compromises on policy in order to get party members elected and into government in order to enact change. The Fundamentalists advocated more radical policies and rejected appeals for pragmatism, citing that the looming effects of Climate Change would leave no time for compromise. Following a national convention in 1998 which saw a realist majority of members defeat a minority of fundamentalist members on a number of votes, and the party subsequently enter government for the first time in 2007, the factionalism of the Realists vs the Fundamentalists was seen to have wilted away with the Realists becoming the ascendent faction. However, in some respects, the division only laid dormant. With the end of the Greens' first term in government and subsequent wipeout in terms of elected representatives, a long rebuilding process left no room for factionalism. However, upon the second rise of the party in the late 2010s, what some would see as a second generation of the Realist vs Fundamentalist division emerged. Following the 2019 local elections and the 2020 general election, the party had more elected representatives than ever before as well as its highest ever membership. This surge in members brought with it a more diverse political outlook of the membership than the party had seen in two decades. Many of the new members of the party were more radical in outlook than their more longstanding peers. On 22 July 2020, several prominent members of the party formed the "Just Transition Greens", an affiliate group within the party with a green left/eco-socialist outlook, who have the objective of moving the party towards policies based on the concept of a "Just Transition". During the 2020 Green Party leadership election, a significant aspect of the candidacy of Catherine Martin was that it was suggested that Martin could better represent the views of radicals within the party than the incumbent Eamon Ryan. Organisation The National Executive Committee is the organising committee of the party. It comprises the party leader Eamon Ryan, the deputy leader Catherine Martin, the Cathaoirleach Pauline O'Reilly, the National Coordinator, the General Secretary (in a non-voting role), a Young Greens representative, the Treasurer and ten members elected annually at the party convention. Leadership Party leader Deputy leader Leadership Organisation The party did not have a national leader until 2001. At a special "Leadership Convention" in Kilkenny on 6 October 2001, Trevor Sargent was elected the first official leader of the Green Party while Mary White was elected deputy leader. Sargent was re-elected to his position in 2003 and again in 2005. The party's constitution requires that a leadership election be held within six months of a general election. Sargent resigned the leadership in the wake of the 2007 general election to the 30th Dáil. During the campaign, Sargent had promised that he would not lead the party into Government with Fianna Fáil. At the election the party retained six Dáil seats, making it the most likely partner for Fianna Fáil. Sargent and the party negotiated a coalition government; at the 12 June 2007 membership meeting to approve the agreement, he announced his resignation as leader. In the subsequent leadership election, John Gormley became the new leader on 17 July 2007, defeating Patricia McKenna by 478 votes to 263. Mary White was subsequently re-elected as the deputy Leader. Gormley served as Minister for the Environment, Heritage and Local Government from July 2007 until the Green Party's decision to exit government in December 2010. Following the election defeats of 2011, Gormley announced his intention not to seek another term as Green Party leader. Eamon Ryan was elected as the new party leader, over party colleagues Phil Kearney and Cllr Malcolm Noonan in a postal ballot election of party members in May 2011. Monaghan-based former councillor Catherine Martin defeated Down-based Dr John Barry and former Senator Mark Dearey to the post of deputy leader on 11 June 2011 during the party's annual convention. Roderic O'Gorman was elected party chairperson. The Green Party lost all its Dáil seats in the 2011 general election. Party Chairman Dan Boyle and Déirdre de Búrca were nominated by the Taoiseach to Seanad Éireann after the formation of the Fianna Fáil–Progressive Democrats–Green Party government in 2007, and Niall Ó Brolcháin was elected in December 2009. De Búrca resigned in February 2010, and was replaced by Mark Dearey. Neither Boyle nor O'Brolchain was re-elected to Seanad Éireann in the Seanad election of 2011, leaving the Green Party without Oireachtas representation until the 2016 general election, in which it regained two Dáil seats. Ryan's leadership was challenged by deputy leader Catherine Martin in 2020 after the 2020 government formation; he narrowly won a poll of party members, 994 votes (51.2%) to 946. Irish and European politics The Green Party is organised throughout the island of Ireland, with regional structures in both the Republic of Ireland and Northern Ireland. The Green Party in Northern Ireland voted to become a regional partner of the Green Party in Ireland in 2005 at its annual convention, and again in a postal ballot in March 2006. Brian Wilson, formerly a councillor for the Alliance Party, won the Green Party's first seat in the Northern Ireland Assembly in the 2007 election. Steven Agnew held that seat in the 2011 election. Election results Dáil Éireann City and county council local elections Devolved Northern Ireland legislatures Westminster European Parliament See also List of environmental organisations References External links Green Party 2007 election manifesto (from the Wayback Machine) Green parties in Europe Political parties established in 1981 Political parties in the Republic of Ireland European Green Party Global Greens member parties All-Ireland political parties
[ 0.17349599301815033, -0.10840832442045212, -0.07477954030036926, -0.90555739402771, -0.23351718485355377, -0.25305235385894775, 0.10089778155088425, 0.698635995388031, -0.9497645497322083, -0.20192015171051025, -0.856478214263916, 0.08128547668457031, -0.6780701279640198, -0.26073676347732...
15085
https://en.wikipedia.org/wiki/Iconoclasm
Iconoclasm
Iconoclasm (from Greek: + ) is the social belief in the importance of the destruction of icons and other images or monuments, most frequently for religious or political reasons. People who engage in or support iconoclasm are called iconoclasts, a term that has come to be figuratively applied to any individual who challenges "cherished beliefs or venerated institutions on the grounds that they are erroneous or pernicious." Conversely, one who reveres or venerates religious images is called (by iconoclasts) an iconolater; in a Byzantine context, such a person is called an iconodule or iconophile. Iconoclasm does not generally encompass the destruction of the images of a specific ruler after his or her death or overthrow, a practice better known as damnatio memoriae. While iconoclasm may be carried out by adherents of a different religion, it is more commonly the result of sectarian disputes between factions of the same religion. The term originates from the Byzantine Iconoclasm, the struggles between proponents and opponents of religious icons in the Byzantine Empire from 726 to 842 AD. Degrees of iconoclasm vary greatly among religions and their branches, but are strongest in religions which oppose idolatry, including the Abrahamic religions. Outside of the religious context, iconoclasm can refer to movements for widespread destruction in symbols of an ideology or cause, such as the destruction of monarchist symbols during the French Revolution. Early religious iconoclasm Ancient era In the Bronze Age, the most significant episode of iconoclasm occurred in Egypt during the Amarna Period, when Akhenaten, based in his new capital of Akhetaten, instituted a significant shift in Egyptian artistic styles alongside a campaign of intolerance towards the traditional gods and a new emphasis on a state monolatristic tradition focused on the god Aten, the Sun disk—many temples and monuments were destroyed as a result: In rebellion against the old religion and the powerful priests of Amun, Akhenaten ordered the eradication of all of Egypt's traditional gods. He sent royal officials to chisel out and destroy every reference to Amun and the names of other deities on tombs, temple walls, and cartouches to instill in the people that the Aten was the one true god. Public references to Akhenaten were destroyed soon after his death. Comparing the ancient Egyptians with the Israelites, Jan Assmann writes: For Egypt, the greatest horror was the destruction or abduction of the cult images. In the eyes of the Israelites, the erection of images meant the destruction of divine presence; in the eyes of the Egyptians, this same effect was attained by the destruction of images. In Egypt, iconoclasm was the most terrible religious crime; in Israel, the most terrible religious crime was idolatry. In this respect Osarseph alias Akhenaten, the iconoclast, and the Golden Calf, the paragon of idolatry, correspond to each other inversely, and it is strange that Aaron could so easily avoid the role of the religious criminal. It is more than probable that these traditions evolved under mutual influence. In this respect, Moses and Akhenaten became, after all, closely related. Judaism According to the Hebrew Bible, God instructed the Israelites to "destroy all [the] engraved stones, destroy all [the] molded images, and demolish all [the] high places" of the indigenous Canaanite population as soon as they entered the Promised Land. In Judaism, King Hezekiah purged Solomon's Temple in Jerusalem and all figures were also destroyed in the Land of Israel, including the Nehushtan, as recorded in the Second Book of Kings. His reforms were reversed in the reign of his son Manasseh. Iconoclasm in Christian history Scattered expressions of opposition to the use of images have been reported: in 305–306 AD, the Synod of Elvira appeared to endorse iconoclasm; Canon 36 states, "Pictures are not to be placed in churches, so that they do not become objects of worship and adoration." Proscription ceased after the destruction of pagan temples. However, widespread use of Christian iconography only began as Christianity increasingly spread among gentiles after the legalization of Christianity by Roman Emperor Constantine (c. 312 AD). During the process of Christianisation under Constantine, Christian groups destroyed the images and sculptures expressive of the Roman Empire's polytheist state religion. Among early church theologians, iconoclastic tendencies were supported by theologians such as: Tertullian, Clement of Alexandria, Origen,, Lactantius, Justin Martyr, Eusebius and Epiphanus. Byzantine era The period after the reign of Byzantine Emperor Justinian (527–565) evidently saw a huge increase in the use of images, both in volume and quality, and a gathering aniconic reaction. One notable change within the Byzantine Empire came in 695, when Justinian II's government added a full-face image of Christ on the obverse of imperial gold coins. The change caused the Caliph Abd al-Malik to stop his earlier adoption of Byzantine coin types. He started a purely Islamic coinage with lettering only. A letter by the Patriarch Germanus, written before 726 to two iconoclast bishops, says that "now whole towns and multitudes of people are in considerable agitation over this matter," but there is little written evidence of the debate. Government-led iconoclasm began with Byzantine Emperor Leo III, who issued a series of edicts between 726 and 730 against the veneration of images. The religious conflict created political and economic divisions in Byzantine society; iconoclasm was generally supported by the Eastern, poorer, non-Greek peoples of the Empire who had to frequently deal with raids from the new Muslim Empire. On the other hand, the wealthier Greeks of Constantinople and the peoples of the Balkan and Italian provinces strongly opposed iconoclasm. Pre-Reformation Peter of Bruys opposed the usage of religious images, the Strigolniki were also possibly Iconoclastic. Claudius of Turin was the bishop of Turin from 817 until his death. He is most noted for teaching iconoclasm. Reformation era The first iconoclastic wave happened in Wittenberg in the early 1520s under reformers Thomas Müntzer and Andreas Karlstadt, in the absence of Martin Luther, who then, concealed under the pen-name of 'Junker Jörg', intervened to calm things down. Luther argued that the mental picturing of Christ when reading the Scriptures was similar in character to artistic renderings of Christ. In contrast to the Lutherans who favoured certain types of sacred art in their churches and homes, the Reformed (Calvinist) leaders, in particular Andreas Karlstadt, Huldrych Zwingli and John Calvin, encouraged the removal of religious images by invoking the Decalogue's prohibition of idolatry and the manufacture of graven (sculpted) images of God. As a result, individuals attacked statues and images, most famously in the beeldenstorm across the Netherlands in 1566. However, in most cases, civil authorities removed images in an orderly manner in the newly Reformed Protestant cities and territories of Europe. The belief of iconoclasm caused havoc throughout Europe. In 1523, specifically due to the Swiss reformer Huldrych Zwingli, a vast number of his followers viewed themselves as being involved in a spiritual community that in matters of faith should obey neither the visible Church nor lay authorities. According to Peter George Wallace "Zwingli's attack on images, at the first debate, triggered iconoclastic incidents in Zurich and the villages under civic jurisdiction that the reformer was unwilling to condone." Due to this action of protest against authority, "Zwingli responded with a carefully reasoned treatise that men could not live in society without laws and constraint." Significant iconoclastic riots took place in Basel (in 1529), Zurich (1523), Copenhagen (1530), Münster (1534), Geneva (1535), Augsburg (1537), Scotland (1559), Rouen (1560), and Saintes and La Rochelle (1562). Calvinist iconoclasm in Europe "provoked reactive riots by Lutheran mobs" in Germany and "antagonized the neighbouring Eastern Orthodox" in the Baltic region. The Seventeen Provinces (now the Netherlands, Belgium, and parts of Northern France) were disrupted by widespread Calvinist iconoclasm in the summer of 1566. This period, known as the Beeldenstorm, began with the destruction of the statuary of the Monastery of Saint Lawrence in Steenvoorde after a "Hagenpreek," or field sermon, by Sebastiaan Matte on 10 August 1566; by October the wave of furor had gone all through the Spanish Netherlands up to Groningen. Hundreds of other attacks included the sacking of the Monastery of Saint Anthony after a sermon by Jacob de Buysere. The Beeldenstorm marked the start of the revolution against the Spanish forces and the Catholic Church. During the Reformation in England, which started during the reign of Anglican monarch Henry VIII, and was urged on by reformers such as Hugh Latimer and Thomas Cranmer, limited official action was taken against religious images in churches in the late 1530s. Henry's young son, Edward VI, came to the throne in 1547 and, under Cranmer's guidance, issued injunctions for Religious Reforms in the same year and in 1550, an Act of Parliament "for the abolition and putting away of divers books and images." During the English Civil War, Bishop Joseph Hall of Norwich described the events of 1643 when troops and citizens, encouraged by a Parliamentary ordinance against superstition and idolatry, behaved thus: Lord what work was here! What clattering of glasses! What beating down of walls! What tearing up of monuments! What pulling down of seats! What wresting out of irons and brass from the windows! What defacing of arms! What demolishing of curious stonework! What tooting and piping upon organ pipes! And what a hideous triumph in the market-place before all the country, when all the mangled organ pipes, vestments, both copes and surplices, together with the leaden cross which had newly been sawn down from the Green-yard pulpit and the service-books and singing books that could be carried to the fire in the public market-place were heaped together. Protestant Christianity was not uniformly hostile to the use of religious images. Martin Luther taught the "importance of images as tools for instruction and aids to devotion," stating: "If it is not a sin but good to have the image of Christ in my heart, why should it be a sin to have it in my eyes?" Lutheran churches retained ornate church interiors with a prominent crucifix, reflecting their high view of the real presence of Christ in Eucharist. As such, "Lutheran worship became a complex ritual choreography set in a richly furnished church interior." For Lutherans, "the Reformation renewed rather than removed the religious image." Lutheran scholar Jeremiah Ohl writes:Zwingli and others for the sake of saving the Word rejected all plastic art; Luther, with an equal concern for the Word, but far more conservative, would have all the arts to be the servants of the Gospel. "I am not of the opinion" said [Luther], "that through the Gospel all the arts should be banished and driven away, as some zealots want to make us believe; but I wish to see them all, especially music, in the service of Him Who gave and created them." Again he says: "I have myself heard those who oppose pictures, read from my German Bible.… But this contains many pictures of God, of the angels, of men, and of animals, especially in the Revelation of St. John, in the books of Moses, and in the book of Joshua. We therefore kindly beg these fanatics to permit us also to paint these pictures on the wall that they may be remembered and better understood, inasmuch as they can harm as little on the walls as in books. Would to God that I could persuade those who can afford it to paint the whole Bible on their houses, inside and outside, so that all might see; this would indeed be a Christian work. For I am convinced that it is God's will that we should hear and learn what He has done, especially what Christ suffered. But when I hear these things and meditate upon them, I find it impossible not to picture them in my heart. Whether I want to or not, when I hear, of Christ, a human form hanging upon a cross rises up in my heart: just as I see my natural face reflected when I look into water. Now if it is not sinful for me to have Christ's picture in my heart, why should it be sinful to have it before my eyes?The Ottoman Sultan Suleiman the Magnificent, who had pragmatic reasons to support the Dutch Revolt (the rebels, like himself, were fighting against Spain) also completely approved of their act of "destroying idols," which accorded well with Muslim teachings. A bit later in Dutch history, in 1627 the artist Johannes van der Beeck was arrested and tortured, charged with being a religious non-conformist and a blasphemer, heretic, atheist, and Satanist. The 25 January 1628 judgment from five noted advocates of The Hague pronounced him guilty of "blasphemy against God and avowed atheism, at the same time as leading a frightful and pernicious lifestyle. At the court's order his paintings were burned, and only a few of them survive." Other instances From the 16th through the 19th centuries, many of the polytheistic religious deities and texts of pre-colonial Americas, Oceania, and Africa were destroyed by Christian missionaries and their converts, such as during the Spanish conquest of the Aztec Empire and the Spanish conquest of the Inca Empire. Many of the moai of Easter Island were toppled during the 18th century in the iconoclasm of civil wars before any European encounter. Other instances of iconoclasm may have occurred throughout Eastern Polynesia during its conversion to Christianity in the 19th century. After the Second Vatican Council in the late 20th century, some Roman Catholic parish churches discarded much of their traditional imagery, art, and architecture. Muslim iconoclasm Islam has a much stronger tradition of opposing the depictions of figures, especially religious figures, with Sunni Islam being more opposed than Shia Islam. In the history of Islam, the act of removing idols from the Ka'ba in Mecca has great symbolic and historic importance for all believers. In general, Muslim societies have avoided the depiction of living beings (animals and humans) within such sacred spaces as mosques and madrasahs. This opposition to figural representation is based not on the Qur'an, but on traditions contained within the Hadith. The prohibition of figuration has not always been extended to the secular sphere, and a robust tradition of figural representation exists within Muslim art. However, Western authors have tended to perceive "a long, culturally determined, and unchanging tradition of violent iconoclastic acts" within Islamic society. Early Islam in Arabia The first act of Muslim iconoclasm dates to the beginning of Islam, in 630, when the various statues of Arabian deities housed in the Kaaba in Mecca were destroyed. There is a tradition that Muhammad spared a fresco of Mary and Jesus. This act was intended to bring an end to the idolatry which, in the Muslim view, characterized Jahiliyyah. The destruction of the idols of Mecca did not, however, determine the treatment of other religious communities living under Muslim rule after the expansion of the caliphate. Most Christians under Muslim rule, for example, continued to produce icons and to decorate their churches as they wished. A major exception to this pattern of tolerance in early Islamic history was the "Edict of Yazīd", issued by the Umayyad caliph Yazīd II in 722–723. This edict ordered the destruction of crosses and Christian images within the territory of the caliphate. Researchers have discovered evidence that the order was followed, particularly in present-day Jordan, where archaeological evidence shows the removal of images from the mosaic floors of some, although not all, of the churches that stood at this time. But Yazīd's iconoclastic policies were not continued by his successors, and Christian communities of the Levant continued to make icons without significant interruption from the sixth century to the ninth. Egypt Al-Maqrīzī, writing in the 15th century, attributes the missing nose on the Great Sphinx of Giza to iconoclasm by Muhammad Sa'im al-Dahr, a Sufi Muslim in the mid-1300s. He was reportedly outraged by local Muslims making offerings to the Great Sphinx in the hope of controlling the flood cycle, and he was later executed for vandalism. However, whether this was actually the cause of the missing nose has been debated by historians. Mark Lehner, having performed an archaeological study, concluded that it was broken with instruments at an earlier unknown time between the 3rd and 10th centuries. Ottoman conquests Certain conquering Muslim armies have used local temples or houses of worship as mosques. An example is Hagia Sophia in Istanbul (formerly Constantinople), which was converted into a mosque in 1453. Most icons were desecrated and the rest were covered with plaster. In the 1934 the government of Turkey decided to convert the Hagia Sophia into a museum and the restoration of the mosaics was undertaken by the American Byzantine Institute beginning in 1932. Contemporary events Certain Muslim denominations continue to pursue iconoclastic agendas. There has been much controversy within Islam over the recent and apparently on-going destruction of historic sites by Saudi Arabian authorities, prompted by the fear they could become the subject of "idolatry." A recent act of iconoclasm was the 2001 destruction of the giant Buddhas of Bamyan by the then-Taliban government of Afghanistan. The act generated worldwide protests and was not supported by other Muslim governments and organizations. It was widely perceived in the Western media as a result of the Muslim prohibition against figural decoration. Such an account overlooks "the coexistence between the Buddhas and the Muslim population that marveled at them for over a millennium" before their destruction. The Buddhas had twice in the past been attacked by Nadir Shah and Aurengzeb. According to art historian F. B. Flood, analysis of the Taliban's statements regarding the Buddhas suggest that their destruction was motivated more by political than by theological concerns. Taliban spokespeople have given many different explanations of the motives for the destruction. During the Tuareg rebellion of 2012, the radical Islamist militia Ansar Dine destroyed various Sufi shrines from the 15th and 16th centuries in the city of Timbuktu, Mali. In 2016, the International Criminal Court (ICC) sentenced Ahmad al-Faqi al-Mahdi, a former member of Ansar Dine, to nine years in prison for this destruction of cultural world heritage. This was the first time that the ICC convicted a person for such a crime. The short-lived Islamic State of Iraq and the Levant carried out iconoclastic attacks such as the destruction of Shia mosques and shrines. Notable incidents include blowing up the Mosque of the Prophet Yunus (Jonah) and destroying the Shrine to Seth in Mosul. Iconoclasm in India In early Medieval India, there were numerous recorded instances of temple desecration by Indian kings against rival Indian kingdoms, which involved conflicts between devotees of different Hindu deities, as well as conflicts between Hindus, Buddhists, and Jains. In 642, the Pallava king Narasimhavarman I looted a Ganesha temple in the Chalukyan capital of Vatapi. In c. 692, Chalukya armies invaded northern India where they looted temples of Ganga and Yamuna. In the 8th century, Bengali troops from the Buddhist Pala Empire desecrated temples of Vishnu Vaikuṇṭha, the state deity of Lalitaditya's kingdom in Kashmir. In the early 9th century, Indian Hindu kings from Kanchipuram and the Pandyan king Srimara Srivallabha looted Buddhist temples in Sri Lanka. In the early 10th century, the Pratihara king Herambapala looted an image from a temple in the Sahi kingdom of Kangra, which was later looted by the Pratihara king Yasovarman. During the Muslim conquest of Sindh Records from the campaign recorded in the Chach Nama record the destruction of temples during the early 8th century when the Umayyad governor of Damascus, al-Hajjaj ibn Yusuf, mobilized an expedition of 6000 cavalry under Muhammad bin Qasim in 712. Historian Upendra Thakur records the persecution of Hindus and Buddhists: Chola to Paramara dynasty In the early 11th century, the Chola king Rajendra I looted temples in a number of neighbouring kingdoms, including: Durga and Ganesha temples in the Chalukya Kingdom; Bhairava, Bhairavi, and Kali temples in the Kalinga kingdom; a Nandi temple in the Eastern Chalukya kingdom; and a Siva temple in Pala Bengal. In the mid-11th century, the Chola king Rajadhiraja plundered a temple in Kalyani. In the late 11th century, the Hindu king Harsha of Kashmir plundered temples as an institutionalised activity. In the late 12th to early 13th centuries, the Paramara dynasty attacked and plundered Jain temples in Gujarat. The Somnath temple and Mahmud of Ghazni Perhaps the most notorious episode of iconoclasm in India was Mahmud of Ghazni's attack on the Somnath temple from across the Thar Desert. The temple was first raided in 725, when Junayad, the governor of Sind, sent his armies to destroy it. In 1024, during the reign of Bhima I, the prominent Turkic-Muslim ruler Mahmud of Ghazni raided Gujarat, plundering the Somnath temple and breaking its jyotirlinga despite pleas by Brahmins not to break it. He took away a booty of 20 million dinars. The attack may have been inspired by the belief that an idol of the goddess Manat had been secretly transferred to the temple. According to the Ghaznavid court-poet Farrukhi Sistani, who claimed to have accompanied Mahmud on his raid, Somnat (as rendered in Persian) was a garbled version of su-manat referring to the goddess Manat. According to him, as well as a later Ghaznavid historian Abu Sa'id Gardezi, the images of the other goddesses were destroyed in Arabia but the one of Manat was secretly sent away to Kathiawar (in modern Gujarat) for safekeeping. Since the idol of Manat was an aniconic image of black stone, it could have been easily confused with a lingam at Somnath. Mahmud is said to have broken the idol and taken away parts of it as loot and placed so that people would walk on it. In his letters to the Caliphate, Mahmud exaggerated the size, wealth and religious significance of the Somnath temple, receiving grandiose titles from the Caliph in return. The wooden structure was replaced by Kumarapala (r. 1143–72), who rebuilt the temple out of stone. Mamluk dynasty onward Historical records compiled by Muslim historian Maulana Hakim Saiyid Abdul Hai attest to the religious violence during the Mamluk dynasty under Qutb-ud-din Aybak. The first mosque built in Delhi, the "Quwwat al-Islam" was built with demolished parts of 20 Hindu and Jain temples. This pattern of iconoclasm was common during his reign. During the Delhi Sultanate, a Muslim army led by Malik Kafur, a general of Alauddin Khalji, pursued four violent campaigns into south India, between 1309 and 1311, against the Hindu kingdoms of Devgiri (Maharashtra), Warangal (Telangana), Dwarasamudra (Karnataka) and Madurai (Tamil Nadu). Many Temples were plundered; Hoysaleswara Temple and others were ruthlessly destroyed. In Kashmir, Sikandar Shah Miri (1389–1413) began expanding, and unleashed religious violence that earned him the name but-shikan, or 'idol-breaker'. He earned this sobriquet because of the sheer scale of desecration and destruction of Hindu and Buddhist temples, shrines, ashrams, hermitages, and other holy places in what is now known as Kashmir and its neighboring territories. Firishta states, "After the emigration of the Bramins, Sikundur ordered all the temples in Kashmeer to be thrown down." He destroyed vast majority of Hindu and Buddhist temples in his reach in Kashmir region (north and northwest India). In the 1460s, Kapilendra, founder of the Suryavamsi Gajapati dynasty, sacked the Saiva and Vaishnava temples in the Cauvery delta in the course of wars of conquest in the Tamil country. Vijayanagara king Krishnadevaraya looted a Bala Krishna temple in Udayagiri in 1514, and looted a Vittala temple in Pandharpur in 1520. A regional tradition, along with the Hindu text Madala Panji, states that Kalapahad attacked and damaged the Konark Sun Temple in 1568, as well as many others in Orissa. Some of the most dramatic cases of iconoclasm by Muslims are found in parts of India where Hindu and Buddhist temples were razed and mosques erected in their place. Aurangzeb, the 6th Mughal Emperor, destroyed the famous Hindu temples at Varanasi and Mathura, turning back on his ancestor Akbar's policy of religious freedom and establishing Sharia across his empire. In modern India, the most high-profile case of iconoclasm was from 1992. Hindus, led by the Vishva Hindu Parishad and Bajrang Dal, destroyed the 430-year-old Islamic Babri Masjid in Ayodhya. Iconoclasm in East Asia China There have been a number of anti-Buddhist campaigns in Chinese history that led to the destruction of Buddhist temples and images. One of the most notable of these campaigns was the Great Anti-Buddhist Persecution of the Tang dynasty. During and after the 1911 Xinhai Revolution, there was widespread destruction of religious and secular images in China. During the Northern Expedition in Guangxi in 1926, Kuomintang General Bai Chongxi led his troops in destroying Buddhist temples and smashing Buddhist images, turning the temples into schools and Kuomintang party headquarters. It was reported that almost all of the viharas in Guangxi were destroyed and the monks were removed. Bai also led a wave of anti-foreignism in Guangxi, attacking Americans, Europeans, and other foreigners, and generally making the province unsafe for foreigners and missionaries. Westerners fled from the province and some Chinese Christians were also attacked as imperialist agents. The three goals of the movement were anti-foreignism, anti-imperialism and anti-religion. Bai led the anti-religious movement against superstition. Huang Shaohong, also a Kuomintang member of the New Guangxi clique, supported Bai's campaign. The anti-religious campaign was agreed upon by all Guangxi Kuomintang members. There was extensive destruction of religious and secular imagery in Tibet after it was invaded and occupied by China. Many religious and secular images were destroyed during the Cultural Revolution of 1966–1976, ostensibly because they were a holdover from China's traditional past (which the Communist regime led by Mao Zedong reviled). The Cultural Revolution included widespread destruction of historic artworks in public places and private collections, whether religious or secular. Objects in state museums were mostly left intact. South Korea According to an article in Buddhist-Christian Studies:Over the course of the last decade [1990s] a fairly large number of Buddhist temples in South Korea have been destroyed or damaged by fire by Christian fundamentalists. More recently, Buddhist statues have been identified as idols, and attacked and decapitated in the name of Jesus. Arrests are hard to effect, as the arsonists and vandals work by stealth of night. Angkor Beginning around 1243 AD with the death of Indravarman II, the Khmer Empire went through a period of iconoclasm. At the beginning of the reign of the next king, Jayavarman VIII, the Kingdom went back to Hinduism and the worship of Shiva. Many of the Buddhist images were destroyed by Jayavarman VIII, who reestablished previously Hindu shrines that had been converted to Buddhism by his predecessor. Carvings of the Buddha at temples such as Preah Khan were destroyed, and during this period the Bayon Temple was made a temple to Shiva, with the central 3.6 meter tall statue of the Buddha cast to the bottom of a nearby well. Political iconoclasm Damnatio memoriae Revolutions and changes of regime, whether through uprising of the local population, foreign invasion, or a combination of both, are often accompanied by the public destruction of statues and monuments identified with the previous regime. This may also be known as damnatio memoriae, the ancient Roman practice of official obliteration of the memory of a specific individual. Stricter definitions of "iconoclasm" exclude both types of action, reserving the term for religious or more widely cultural destruction. In many cases, such as Revolutionary Russia or Ancient Egypt, this distinction can be hard to make. Among Roman emperors and other political figures subject to decrees of damnatio memoriae were Sejanus, Publius Septimius Geta, and Domitian. Several Emperors, such as Domitian and Commodus had during their reigns erected numerous statues of themselves, which were pulled down and destroyed when they were overthrown. The perception of damnatio memoriae in the Classical world was an act of erasing memory has been challenged by scholars who have argued that it "did not negate historical traces, but created gestures which served to dishonor the record of the person and so, in an oblique way, to confirm memory," and was in effect a spectacular display of "pantomime forgetfulness." Examining cases of political monument destruction in modern Irish history, Guy Beiner has demonstrated that iconoclastic vandalism often entails subtle expressions of ambiguous remembrance and that, rather than effacing memory, such acts of de-commemorating effectively preserve memory in obscure forms. During the French Revolution Throughout the radical phase of the French Revolution, iconoclasm was supported by members of the government as well as the citizenry. Numerous monuments, religious works, and other historically significant pieces were destroyed in an attempt to eradicate any memory of the Old Regime. A statue of King Louis XV in the Paris square which until then bore his name, was pulled down and destroyed. This was a prelude to the guillotining of his successor Louis XVI in the same site, renamed "Place de la Révolution" (at present Place de la Concorde). Later that year, the bodies of many French kings were exhumed from the Basilica of Saint-Denis and dumped in a mass grave. Some episodes of iconoclasm were carried out spontaneously by crowds of citizens, including the destruction of statues of kings during the insurrection of 10 August 1792 in Paris. Some were directly sanctioned by the Republican government, including the Saint-Denis exhumations. Nonetheless, the Republican government also took steps to preserve historic artworks, notably by founding the Louvre museum to house and display the former royal art collection. This allowed the physical objects and national heritage to be preserved while stripping them of their association with the monarchy. Alexandre Lenoir saved many royal monuments by diverting them to preservation in a museum. The statue of Napoleon on the column at Place Vendôme, Paris was also the target of iconoclasm several times: destroyed after the Bourbon Restoration, restored by Louis-Philippe, destroyed during the Paris Commune and restored by Adolphe Thiers. Other examples Other examples of political destruction of images include: There have been several cases of removing symbols of past rulers in Malta's history. Many Hospitaller coats of arms on buildings were defaced during the French occupation of Malta in 1798–1800; a few of these were subsequently replaced by British coats of arms in the early 19th century. Some British symbols were also removed by the government after Malta became a republic in 1974. These include royal cyphers being ground off from post boxes, and British coats of arms such as that on the Main Guard building being temporarily obscured (but not destroyed). With the entry of the Ottoman Empire to the First World War, the Ottoman Army destroyed the Russian victory monument erected in San Stefano (the modern Yeşilköy quarter of Istanbul) to commemorate the Russian victory in the Russo-Turkish War of 1877–1878. The demolition was filmed by former army officer Fuat Uzkınay, producing Ayastefanos'taki Rus Abidesinin Yıkılışı—the oldest known Turkish-made film. In the late 18th century, the Brabant Revolutionaries sacked Brussels' Grand Place, destroying statues of nobility and symbols of Christianity. In the 19th century, the place was renovated and many new statues added. In 1911, a marble commemoration for the Spanish freethinker and educator Francisco Ferrer, executed two years earlier and widely considered a martyr, was erected in the Grand Place. The statue depicted a nude man holding the Torch of Enlightenment. The Imperial German military, which occupied Belgium during the First World War, disliked the monument and destroyed it in 1915. It was restored in 1926 by the International Free Thought Movement. In 1942 the pro-Nazi Vichy Government of France took down and melted Clothilde Roch's statue of the 16th-century dissident intellectual Michael Servetus, who had been burned at the stake in Geneva at the instigation of Calvin. The Vichy authorities disliked the statue, as it was a celebration of freedom of conscience. In 1960, having found the original molds, the municipality of Annemasse had it recast and returned the statue to its previous place. The Battle of Baghdad and the regime of Saddam Hussein symbolically ended with the Firdos Square statue destruction, a U.S. military-staged event on April 9, 2003 where a prominent statue of Saddam Hussein was pulled down. Subsequently, statues and murals of Saddam Hussein all over Iraq were destroyed by US occupation forces as well as Iraqi citizens. In 2016, paintings from the University of Cape Town were burned in student protests as symbols of colonialism. In November 2019 the statue of Swedish footballer Zlatan Ibrahimović was vandalized by Malmö FF supporters after he announced he had become part-owner of Swedish rivals Hammarby. White paint was sprayed on it; threats and hateful messages towards Zlatan were written on the statue, and it was burned. In a second attack the nose was sawed off and the statue was sprinkled with chrome paint. On 5 January 2020 it was finally toppled. On June 4, 2020, Virginia governor Ralph Northam ordered the monument to Robert E. Lee in Richmond to be removed in response to George Floyd protests. It was removed on September 8, 2021. In the Soviet Union During and after the October Revolution, widespread destruction of religious and secular imagery in Russia took place, as well as the destruction of imagery related to the Imperial family. The Revolution was accompanied by destruction of monuments of tsars, as well as the destruction of imperial eagles at various locations throughout Russia. According to Christopher Wharton:In front of a Moscow cathedral, crowds cheered as the enormous statue of Tsar Alexander III was bound with ropes and gradually beaten to the ground. After a considerable amount of time, the statue was decapitated and its remaining parts were broken into rubble.The Soviet Union actively destroyed religious sites, including Russian Orthodox churches and Jewish cemeteries, in order to discourage religious practice and curb the activities of religious groups. During the Hungarian Revolution of 1956 and during the Revolutions of 1989, protesters often attacked and took down sculptures and images of Joseph Stalin, such as the Stalin Monument in Budapest. The fall of Communism in 1989-1991 was also followed by the destruction or removal of statues of Vladimir Lenin and other Communist leaders in the former Soviet Union and in other Eastern Bloc countries. Particularly well-known was the destruction of "Iron Felix", the statue of Felix Dzerzhinsky outside the KGB's headquarters. Another statue of Dzerzhinsky was destroyed in a Warsaw square that was named after him during communist rule, but which is now called Bank Square. In the United States During the American Revolution, the Sons of Liberty pulled down and destroyed the gilded lead statue of George III of the United Kingdom on Bowling Green (New York City), melting it down to be recast as ammunition. Similar acts have accompanied the independence of most ex-colonial territories. Sometimes relatively intact monuments are moved to a collected display in a less prominent place, as in India and also post-Communist countries. In August 2017, a statue of a Confederate soldier dedicated to "the boys who wore the gray" was pulled down from its pedestal in front of Durham County Courthouse in North Carolina by protesters. This followed the events at the 2017 Unite the Right rally in response to growing calls to remove Confederate monuments and memorials across the U.S. 2020 demonstrations During the George Floyd protests of 2020, demonstrators pulled down dozens of statues which they considered symbols of the Confederacy, slavery, segregation, or racism, including the statue of Williams Carter Wickham in Richmond, Virginia Further demonstrations in the wake of the George Floyd protests have resulted in the removal of: the John Breckenridge Castleman monument in Louisville, Kentucky; plaques in Jacksonville, Florida's Hemming Park (renamed in 1899 in honor of Civil War veteran Charles C. Hemming), which were in remembrance of deceased Confederate soldiers; the monumental obelisk of the Confederate Soldiers and Sailors Monument and a statue of Charles Linn in Linn Park, Birmingham, Alabama; a statue of Junípero Serra in Golden Gate Park, San Francisco; a statue of Confederate Gen. Robert E. Lee in Montgomery, Alabama; the Appomattox statue in Alexandria, Virginia, leaving the monument's base empty yet intact. Multiple statues of early European explorers and founders were also vandalized, including those of George Washington and Thomas Jefferson, both founding fathers of the United States, as well as statues of abolitionist Frederick Douglass, a slave-turned-freeman, which was vandalized and found in a nearby river Christopher Columbus was removed in Virginia, Minnesota, Chicago and beheaded in Boston MA. George Washington statue was toppled in Portland, Oregon See also Aniconism Censorship by religion Iconolatry List of destroyed heritage Lost artworks Natural theology Slighting Notes References Further reading (On the conceptual background of Byzantine iconoclasm) —— 2016. Broken Idols of the English Reformation. Cambridge University Press. Barasch, Moshe. 1992. Icon: Studies in the History of an Idea. New York University Press. . Besançon, Alain. 2009. The Forbidden Image: An Intellectual History of Iconoclasm. University of Chicago Press. . Bevan, Robert. 2006. The Destruction of Memory: Architecture at War. Reaktion Books. . Boldrick, Stacy, Leslie Brubaker, and Richard Clay, eds. 2014. Striking Images, Iconoclasms Past and Present. Ashgate. (Scholarly studies of the destruction of images from prehistory to the Taliban.) Calisi, Antonio. 2017. I Difensori Dell'icona: La Partecipazione Dei Vescovi Dell'Italia Meridionale Al Concilio Di Nicea II 787. CreateSpace. . Freedberg, David. 1977. "The Structure of Byzantine and European Iconoclasm." Pp. 165–77 in Iconoclasm: Papers Given at the Ninth Spring Symposium of Byzantine Studies, edited by A. Bryer and J. Herrin. University of Birmingham, Centre for Byzantine Studies. . —— [1985] 1993. "Iconoclasts and their Motives," (Second Horst Gerson Memorial Lecture, University of Groningen). Public 8(Fall). Original print: Maarssen: Gary Schwartz. 1985. . Shourie, Arun, Sita Ram Goel, Harsh Narain, Jay Dubashi, and Ram Swarup. 1990. Hindu Temples - What Happened to Them Vol. I, (A Preliminary Survey). Topper, David R. Idolatry & Infinity: Of Art, Math & God. BrownWalker. . Weeraratna, Senaka ' Repression of Buddhism in Sri Lanka by the Portuguese' (1505 -1658) Teodoro Studita, Contro gli avversari delle icone, Emanuela Fogliadini (Prefazione), Antonio Calisi (Traduttore), Jaca Book, 2022, External links Iconclasm in England, Holy Cross College (UK) Design as Social Agent at the ICA by Kerry Skemp, April 5, 2009 Hindu temples destroyed by Muslim rulers in India Protestant Reformation Religious persecution Christian terminology
[ 0.4526696801185608, 0.9445194005966187, -0.8882586359977722, -0.12391282618045807, -0.8265358209609985, 0.5386515259742737, 1.1573140621185303, 0.8378915786743164, -0.537089467048645, -0.06055126339197159, -0.6611807942390442, 0.19591693580150604, -0.6771556735038757, 0.8634807467460632, ...
15086
https://en.wikipedia.org/wiki/IWW%20%28disambiguation%29
IWW (disambiguation)
IWW, or Industrial Workers of the World (known as the Wobblies), are an international union founded in 1905. IWW may also refer to: Inland waterway, a navigable river, canal, or sound Irish Whip Wrestling, an Irish-owned independent professional wrestling promotion established in 2002 Music It Was Written, the second studio album by American rapper Nas
[ 0.6192691922187805, -0.05995163321495056, -0.6037126779556274, -0.5100646615028381, -0.31720924377441406, 0.12468922883272171, 0.3142063319683075, 0.3736068606376648, -0.43420276045799255, -0.02502148412168026, 0.28776413202285767, 0.22442984580993652, -0.5181986093521118, 0.95359814167022...
15087
https://en.wikipedia.org/wiki/Imbolc
Imbolc
Imbolc or Imbolg (), also called Saint Brigid's Day (; ; ), is a Gaelic traditional festival. It marks the beginning of spring, and for Christians it is the feast day of Saint Brigid, Ireland's matron saint. It is held on 1 February, which is about halfway between the winter solstice and the spring equinox. Historically, its traditions were widely observed throughout Ireland, Scotland and the Isle of Man. It is one of the four Gaelic seasonal festivals, along with: Bealtaine, Lughnasadh and Samhain. Imbolc is mentioned in early Irish literature, and there is evidence suggesting it was also an important date in ancient times. It is believed that Imbolc was originally a pagan festival associated with the goddess Brigid, and that it was Christianized as the feast day of Saint Brigid, who could be a Christianization of the goddess. The festivities on the feast of Saint Brigid did not begin to be recorded in detail until the early modern era. In recent centuries it was marked by the making of Brigid's crosses and a doll-like figure of Brigid (a ) would be paraded from house-to-house by girls, sometimes accompanied by 'strawboys'. Brigid was said to visit one's home on the eve of the festival. To receive her blessings, people would make a bed for Brigid and leave her food and drink, and items of clothing would be left outside for her to bless. Brigid was also evoked to protect homes and livestock. Special feasts were had, holy wells were visited, and it was a time for divination. Although many of its customs died out in the 20th century, it is still observed by Christians as a religious holiday and by some non-Christians as a cultural one, and its customs have been revived in some places. Since the latter 20th century, Celtic neopagans and Wiccans have observed Imbolc as a religious holiday. From 2023, "Imbolc/St Brigid's Day" will be a yearly public holiday in the Republic of Ireland. Origins and etymology Scholars such as historian Ronald Hutton argue that the festival must have pre-Christian origins. Some scholars argue that the date of Imbolc was significant in Ireland since the Neolithic period. A few passage tombs in Ireland are aligned with the sunrise around the times of Imbolc and Samhain. This includes the Mound of the Hostages on the Hill of Tara, and Cairn L at Slieve na Calliagh. Frank Prendergast argues that this alignment is so rare that it is rather a product of chance. The etymology of Imbolc/Imbolg is unclear. The most common explanation is that it comes from the Old Irish (Modern Irish: ), meaning 'in the belly', and refers to the pregnancy of ewes at this time of year. Joseph Vendryes linked it to the Old Irish verb , 'to wash/cleanse oneself'. He suggested that it referred to a ritual cleansing, similar to the ancient Roman festival Februa or Lupercalia, which took place at the same time of year. Eric P. Hamp derives it from a Proto-Indo-European root meaning both 'milk' and 'cleansing'. Professor Alan Ward derives it from the Proto-Celtic , 'budding'. The early 10th century Cormac's Glossary has an entry for , calling it the beginning of spring and deriving it from oí-melg ('ewe milk'), explaining it as "the time that sheep's milk comes". However, linguists believe this is the writer's respelling of the word to give it an understandable etymology. The Táin Bó Cúailnge ('Cattle Raid of Cooley') indicates that Imbolc (spelt imolg) is three months after the 1 November festival of Samhain. Imbolc is mentioned in another Old Irish poem about the Táin in the Metrical Dindshenchas: "", which Edward Gwynn translates "after Candlemas, rough was their herding". Candlemas is the Christian holy day which falls on 2 February and is known in Irish as , 'feast day of Mary of the Candles'. Hutton writes that Imbolc must have been "important enough for its date to be dedicated subsequently to Brigid … the Mother Saint of Ireland". Cogitosus, writing in the late 7th century, first mentions a feast day of Saint Brigid being observed in Kildare on 1 February. Brigid is said to have lived in the 6th century and founded the important monastery of Kildare. She became the focus of a major cult. However, there are few historical facts about her, and her early hagiographies "are mainly anecdotes and miracle stories, some of which are deeply rooted in Irish pagan folklore". It is suggested that Saint Brigid is based on Brigid, a Gaelic goddess. Like the saint, the goddess is associated with wisdom, poetry, healing, protection, blacksmithing and domesticated animals, according to Cormac's Glossary and Lebor Gabála Érenn. It is suggested that the festival, which celebrates the onset of spring, is linked with Brigid in her role as a fertility goddess. According to Hutton, it could be that the goddess Brigid was already linked to Imbolc and this was continued by making it the saint's feast day. Or it could be that Imbolc's association with milk drew the saint to it, because of a legend that she had been the wet-nurse of Christ. Historic customs Imbolc/St Brigid's Day is mentioned in several early Irish manuscripts, but they say very little about its rites and customs. Imbolc (1 February) was treated as one of four seasonal festivals in Gaelic Ireland along with Beltane (1 May), Lughnasadh (1 August) and Samhain (1 November). The tale Tochmarc Emire, which survives in a 10th-century version, names Imbolc as one of the four Gaelic seasonal festivals, and says it is "when the ewes are milked at spring's beginning". This linking of Imbolc with the arrival of lambs and sheep's milk probably reflected farming customs that ensured lambs were born before calves. In late winter/early spring, sheep could survive better than cows on the meager vegetation, and farmers sought to resume milking as soon as possible due to their dwindling stores. The Hibernica Minora includes an Old Irish poem about the four seasonal festivals, translated by Kuno Meyer (1894). It says "Tasting of each food according to order, this is what is proper at Imbolc: washing the hands, the feet, the head". This suggests ritual cleansing. Prominent folklorist Seán Ó Súilleabháin wrote: "The main significance of the Feast of St. Brigid would seem to be that it was a Christianisation of one of the focal points of the agricultural year in Ireland, the starting point of preparations for the spring sowing. Every manifestation of the cult of the saint (or of the deity she replaced) is bound up in some way with food production". From the 18th century to the mid 20th century, many accounts of the festival were recorded by folklorists and other writers. They tell us how it was celebrated then, and shed light on how it may have been celebrated in the past. The festival is observed on 1 February. It has also been argued that originally the timing of the festival was more fluid and based on seasonal changes. It is associated with the onset of the lambing season (which could vary by as much as two weeks before or after 1 February), the beginning of preparations for the spring sowing, and the blooming of blackthorn. In Ireland, a spring cleaning was also customary around the time of St Brigid's Day. Holy wells were visited, as they were during some of the other Gaelic festivals. Visitors to holy wells would pray for health while walking 'sunwise' around the well. They would then leave offerings, typically coins or clooties (see clootie well). Water from the well was used to bless the home, family members, livestock, and fields. Donald Alexander Mackenzie also recorded in the 19th century that offerings were made "to earth and sea". The offering could be milk poured into the ground or porridge poured into the water, as a libation. Saint Brigid As well as being a springtime festival, it is the feast day of Saint Brigid (, modern Irish: , modern Scottish Gaelic: or , anglicised Bridget). On St Brigid's Eve, Brigid was said to visit virtuous households and bless the inhabitants. As Brigid represented the light half of the year, and the power that will bring people from the dark season of winter into spring, her presence was very important at this time of year. Before going to bed, people would leave items of clothing or strips of cloth outside for Brigid to bless. The clothes or strips of cloth would be brought inside, and believed to now have powers of healing and protection. Families would have a special meal or supper on St Brigid's Eve to mark the last night of winter. This typically included food such as colcannon, sowans, dumplings, barmbrack or bannocks. Often, some of the food and drink would be set aside for Brigid. In County Kilkenny graves were decorated on Imbolc with box and laurel flowers (or any other flowers that could be obtained at that time). Additionally a Branch of Virginity was decorated with white ribbons and placed on the grave of a recently deceased maiden on Imbolc. Brigid's bed Brigid would be symbolically invited into the house and a bed would often be made for her. In the north of Ireland, a family member, representing Brigid, would circle the home three times carrying rushes. They would then knock on the door three times, asking to be let in. On the third attempt they are welcomed in, the meal is had, and the rushes are then made into crosses or a bed for Brigid. In 18th century Mann, the custom was to stand at the door with a bundle of rushes and say "Brede, Brede, come to my house tonight. Open the door for Brede and let Brede come in". Similarly, in Donegal, the householder who was sent to fetch the drying russhes knelt on the front step and repeated the following chant three times, "Go on your knees, open your eyes, and let in St. Brigid." Those inside the house answered three times "She's welcome." The rushes were then strewn on the floor as a carpet or bed for Brigid. In the 19th century, some old Manx women would make a bed for Brigid in the barn with food, ale, and a candle on a table. The custom of making Brigid's bed was particularly common in the Hebrides of Scotland, where it was recorded as far back as the 17th century. A bed of hay or a basket-like cradle would be made for Brigid and someone would then call out three times: "" (", come in; thy bed is ready"). A corn dolly called the dealbh Bríde (icon of Brigid) would be laid in the bed and a white wand, usually made of birch, would be laid beside it. It represented the wand that Brigid was said to use to make the vegetation start growing again. Ashes from the fire would be raked smooth and, in the morning, they would look for some kind of mark on the ashes as a sign that Brigid had visited. If there was no mark, they believed bad fortune would come unless they buried a cockerel at the meeting of three streams as an offering and burned incense on their fire that night. Women in some parts of the Hebrides would also dance while holding a large cloth and calling out "" (", come over and make your bed"). Brigid's procession In Ireland and Scotland, a representation of Brigid would be paraded around the community by girls and young women. Usually, it was a doll-like figure known as a (also called a 'Breedhoge' or 'Biddy'). It would be made from rushes or reeds and clad in bits of cloth, flowers, or shells. In the Hebrides of Scotland, a bright shell or crystal called the (guiding star of Brigid) was set on its chest. The girls would carry it in procession while singing a hymn to Brigid. All wore white with their hair unbound as a symbol of purity and youth. They visited every house in the area, where they received either food or more decoration for the . Afterward, they feasted in a house with the set in a place of honour, and put it to bed with lullabies. When the meal was done, the local young men humbly asked for admission, made obeisance to the , and joined the girls in dancing and merrymaking. In many places, only unwed girls could carry the , but in some both boys and girls carried it. In some areas, rather than carrying a , a girl took on the role of Brigid. Escorted by other girls, she went house-to-house wearing 'Brigid's crown' and carrying 'Brigid's shield' and 'Brigid's cross', all of which were made from rushes. The procession in some places included 'strawboys', who wore conical straw hats, masks and played folk music; much like the wrenboys. Up until the mid-20th century, children in Ireland still went house-to-house asking for pennies for "poor Biddy", or money for the poor. In County Kerry, men in white robes went from house to house singing. Brigid's cross In Ireland, Brigid's crosses (pictured on the right) were made on St Brigid's Day. A Brigid's cross usually consists of rushes woven into a four-armed equilateral cross, although there were also three-armed crosses. They were often hung over doors, windows and stables to welcome Brigid and for protection against fire, lightning, illness and evil spirits. The crosses were generally left there until the next St Brigid's Day. In western Connacht, people would make a ('s girdle); a great ring of rushes with a cross woven in the middle. Young boys would carry it around the village, inviting people to step through it and so be blessed. Weather divination The festival was traditionally a time of weather divination, and the old tradition of watching to see if serpents or badgers came from their winter dens may be a forerunner of the North American Groundhog Day. A Scottish Gaelic proverb about the day is: Imbolc was believed to be when the —the divine hag of Gaelic tradition—gathers her firewood for the rest of the winter. Legend has it that if she wishes to make the winter last a good while longer, she will make sure the weather on Imbolc is bright and sunny, so she can gather plenty of firewood. Therefore, people would be relieved if Imbolc is a day of foul weather, as it means the is asleep and winter is almost over. At Imbolc on the Isle of Man, where she is known as , the is said to take the form of a gigantic bird carrying sticks in her beak. Today Today, St Brigid's Day/Imbolc is observed by Christians and non-Christians. Some people still make Brigid's crosses and s or visit holy wells dedicated to St Brigid on 1 February. Brigid's Day parades have been revived in the town of Killorglin, County Kerry, which holds a yearly "Biddy's Day Festival". Men and women wearing elaborate straw hats and masks visit public houses carrying a to ward off evil spirits and bring good luck for the coming year. There are folk music sessions, historical talks, film screenings, drama productions and cross-making workshops. The main event is a torchlight parade of 'Biddy groups' through the town. Since 2009 a yearly "Brigid of Faughart Festival" is held in County Louth. This celebrates Brigid as both saint and goddess, and includes the long-standing pilgrimage to Faughart as well as music, poetry and lectures. The "Imbolc International Music Festival" of folk music is held in Derry at this time of year. In England, the village of Marsden, West Yorkshire holds a biennial "Imbolc Fire Festival" which includes a lantern procession, fire performers, music, fireworks, and a symbolic battle between giant characters representing the Green Man and Jack Frost. More recently, Irish embassies have hosted yearly events on St Brigid's Day to celebrate famous women of the Irish diaspora and showcase the work of Irish female emigrants in the arts. In 2022, Dublin hosted its first "Brigit Festival", celebrating "the contributions of Irish women" past and present through exhibitions, tours, lectures, films and a concert. From 2023, "Imbolc/St Brigid's Day" will be a yearly public holiday in the Republic of Ireland, to mark both the saint's feast day and the seasonal festival. A government statement noted that it will be the first Irish public holiday named after a woman, and "means that all four of the traditional Celtic seasonal festival will now be public holidays". Neopaganism Imbolc or Imbolc-based festivals are held by some Neopagans. As there are many kinds of Neopaganism, their Imbolc celebrations can be very different despite the shared name. Some try to emulate the historic festival as much as possible. Other Neopagans base their celebrations on many sources, with historic accounts of Imbolc being only one of them. Neopagans usually celebrate Imbolc on 1 February in the Northern Hemisphere and 1 August in the Southern Hemisphere. Some Neopagans celebrate it at the astronomical midpoint between the winter solstice and spring equinox (or the full moon nearest this point). In the Northern Hemisphere, this is usually on 3 or 4 February. Other Neopagans celebrate Imbolc when the primroses, dandelions, and other spring flowers emerge. Celtic Reconstructionist Celtic Reconstructionists strive to reconstruct ancient Celtic religion. Their religious practices are based on research and historical accounts, but may be modified slightly to suit modern life. They avoid syncretism (i.e. combining practises from different cultures). They usually celebrate the festival when the first stirrings of spring are felt, or on the full moon nearest this. Many use traditional songs and rites from sources such as The Silver Bough and The Carmina Gadelica. It is a time of honouring the goddess Brigid, and many of her dedicants choose this time of year for rituals to her. Wicca and Neo-Druidry Wiccans and Neo-Druids celebrate Imbolc as one of the eight Sabbats in their Wheel of the Year, following Midwinter and preceding Ostara. In Wicca, Imbolc is commonly associated with the goddess Brigid and as such, it is sometimes seen as a "women's holiday" with specific rites only for female members of a coven. Among Dianic Wiccans, Imbolc is the traditional time for initiations. See also Candlemas Irish calendar Quarter days Vasant Panchami Wheel of the Year (Cross-Quarter days) References Further reading Carmichael, Alexander (1992) Carmina Gadelica: Hymns and Incantations (with illustrative notes onwards, rites, and customs dying and obsolete/ orally collected in the Highlands and Islands of Scotland) Hudson, NY, Lindisfarne Press, Chadwick, Nora (1970) The Celts London, Penguin. Danaher, Kevin (1972) The Year in Ireland. Dublin, Mercier. McNeill, F. Marian (1959) The Silver Bough, Vol. 1–4. William MacLellan, Glasgow Ó Catháin, Séamas (1995) Festival of Brigit August observances Cross-quarter days February observances Gaelic culture Holidays in Scotland Public holidays in the Republic of Ireland Irish mythology Modern Pagan holidays Scottish mythology Winter holidays (Northern Hemisphere)
[ -0.09819664806127548, 0.14297112822532654, 0.16882820427417755, -0.6635158658027649, -0.7009986042976379, -0.238220676779747, 0.5106188058853149, 0.6873942017555237, -0.42302682995796204, -0.25609341263771057, -0.9478796124458313, 0.23801986873149872, -0.12208528816699982, 0.15434792637825...
15088
https://en.wikipedia.org/wiki/Isaiah
Isaiah
Isaiah ( or ; , Yəšaʿyāhū, "God is Salvation") was the 8th-century BC Israelite prophet after whom the Book of Isaiah is named. Within the text of the Book of Isaiah, Isaiah himself is referred to as "the prophet", but the exact relationship between the Book of Isaiah and the actual prophet Isaiah is complicated. The traditional view is that all 66 chapters of the book of Isaiah were written by one man, Isaiah, possibly in two periods between 740 BC and c. 686 BC, separated by approximately 15 years, and that the book includes dramatic prophetic declarations of Cyrus the Great in the Bible, acting to restore the nation of Israel from Babylonian captivity. Another widely held view is that parts of the first half of the book (chapters 1–39) originated with the historical prophet, interspersed with prose commentaries written in the time of King Josiah a hundred years later, and that the remainder of the book dates from immediately before and immediately after the end of the exile in Babylon, almost two centuries after the time of the historical prophet. Biography The first verse of the Book of Isaiah states that Isaiah prophesied during the reigns of Uzziah (or Azariah), Jotham, Ahaz, and Hezekiah, the kings of Judah. Uzziah's reign was 52 years in the middle of the 8th century BC, and Isaiah must have begun his ministry a few years before Uzziah's death, probably in the 740s BC. Isaiah lived until the fourteenth year of the reign of Hezekiah (who died 698 BC). He may have been contemporary for some years with Manasseh. Thus Isaiah may have prophesied for as long as 64 years. According to some modern interpretations, Isaiah's wife was called "the prophetess", either because she was endowed with the prophetic gift, like Deborah and Huldah, or simply because she was the "wife of the prophet". They had two sons, naming the eldest Shear-jashub, meaning "A remnant shall return", and the youngest, Maher-Shalal-Hash-Baz, meaning, "Spoil quickly, plunder speedily." Soon after this, Shalmaneser V determined to subdue the kingdom of Israel, taking over and destroying Samaria (722 BC). So long as Ahaz reigned, the kingdom of Judah was untouched by the Assyrian power. But when Hezekiah gained the throne, he was encouraged to rebel "against the king of Assyria", and entered into an alliance with the king of Egypt. The king of Assyria threatened the king of Judah, and at length invaded the land. Sennacherib (701 BC) led a powerful army into Judah. Hezekiah was reduced to despair, and submitted to the Assyrians. But after a brief interval, war broke out again. Again Sennacherib led an army into Judah, one detachment of which threatened Jerusalem Isaiah on that occasion encouraged Hezekiah to resist the Assyrians, whereupon Sennacherib sent a threatening letter to Hezekiah, which he "spread before the LORD". According to the account in 2 Kings 19 (and its derivative account in 2 Chronicles 32) an angel of God fell on the Assyrian army and 185,000 of its men were killed in one night. "Like Xerxes in Greece, Sennacherib never recovered from the shock of the disaster in Judah. He made no more expeditions against either Southern Palestine or Egypt." The remaining years of Hezekiah's reign were peaceful. Isaiah probably lived to its close, and possibly into the reign of Manasseh. The time and manner of his death are not specified in either the Bible or other primary sources. Later Jewish tradition says that he suffered martyrdom by being sawn in two under the orders of Manasseh. The book of Isaiah, along with the book of Jeremiah, is distinctive in the Hebrew bible for its direct portrayal of the "wrath of the Lord" as presented, for example, in Isaiah 9:19 stating, "Through the wrath of the Lord of hosts is the land darkened, and the people shall be as the fuel of the fire." In Christianity The Ascension of Isaiah, a pseudepigraphical Christian text dated to sometime between the end of the 1st century and the beginning of the 3rd, gives a detailed story of Isaiah confronting an evil false prophet and ending with Isaiah being martyred – none of which is attested in the original Biblical account. Gregory of Nyssa (c. 335–395) believed that the Prophet Isaiah "knew more perfectly than all others the mystery of the religion of the Gospel". Jerome (c. 342–420) also lauds the Prophet Isaiah, saying, "He was more of an Evangelist than a Prophet, because he described all of the Mysteries of the Church of Christ so vividly that you would assume he was not prophesying about the future, but rather was composing a history of past events." Of specific note are the songs of the Suffering Servant, which Christians say are a direct prophetic revelation of the nature, purpose, and detail of the death of Jesus Christ. The Book of Isaiah is quoted many times by New Testament writers. Ten of those references are about the Suffering Servant, how he will suffer and die to save many from their sins, be buried in a rich man's tomb, and be a light to the Gentiles. The Gospel of John says that Isaiah "saw Jesus' glory and spoke about him." The Eastern Orthodox Church celebrates Saint Isaiah the Prophet on May 9. Isaiah is also listed on the page of saints for May 9 in the Roman martyrology of the Roman Catholic Church. Latter Day Saint movement The Book of Mormon quotes Jesus Christ as stating that "great are the words of Isaiah", and that all things prophesied by Isaiah have been and will be fulfilled. The Book of Mormon and Doctrine and Covenants also quote Isaiah more than any other prophet from the Old Testament. Additionally, members of The Church of Jesus Christ of Latter-day Saints consider the founding of the church by Joseph Smith in the 19th century to be a fulfillment of Isaiah 11, the translation of the Book of Mormon to be a fulfillment of Isaiah 29, and the building of Latter-day Saint temples as a fulfillment of Isaiah 2:2. In Islam Isaiah, or his Arabic name أشعياء (transliterated: Ishaʻyā'''), is not mentioned by name in the Quran or the Hadith, but appears frequently as a prophet in Islamic sources, such as Qisas Al-Anbiya and Tafsir. Tabari (310/923) provides the typical accounts for Islamic traditions regarding Isaiah. He is further mentioned and accepted as a prophet by other Islamic scholars such as Ibn Kathir, Al-Tha`labi and Kisa'i and also modern scholars such as Muhammad Asad and Abdullah Yusuf Ali. According to Muslim scholars, Isaiah prophecised the coming of Jesus and Muhammad, although the reference to Muhammad is disputed by other religious scholars. Isaiah's narrative in Islamic literature can be divided into three sections. The first establishes Isaiah as a prophet of Israel during the reign of Hezekiah; the second relates Isaiah's actions during the siege of Jerusalem by Sennacherib; and the third warns the nation of coming doom. Paralleling the Hebrew Bible, Islamic tradition states that Hezekiah was king in Jerusalem during Isaiah's time. Hezekiah heard and obeyed Isaiah's advice, but could not quell the turbulence in Israel. This tradition maintains that Hezekiah was a righteous man and that the turbulence worsened after him. After the death of the king, Isaiah told the people not to forsake God, and warned Israel to cease from its persistent sin and disobedience. Muslim tradition maintains that the unrighteous of Israel in their anger sought to kill Isaiah. In a death that resembles that attributed to Isaiah in Lives of the Prophets, Muslim exegesis recounts that Isaiah was martyred by Israelites by being sawn in two. In the courts of Al-Ma'mun, the seventh Abbasid caliph, Ali al-Ridha, the great grandson of Muhammad and prominent scholar (Imam) of his era, was questioned by the High Jewish Rabbi to prove through the Torah that both Jesus and Muhammad were prophets. Among his several proofs, the Imam references the Book of Isaiah, stating "Sha‘ya (Isaiah), the Prophet, said in the Torah concerning what you and your companions say: ‘I have seen two riders to whom (He) illuminated earth. One of them was on a donkey and the other was on a camel. Who is the rider of the donkey, and who is the rider of the camel?'" The Rabbi was unable to answer with certainty. Al-Ridha goes on to state that "As for the rider of the donkey, he is ‘Isa (Jesus); and as for the rider of the camel, he is Muhammad, may Allah bless him and his family. Do you deny that this (statement) is in the Torah?" The Rabbi responds "No, I do not deny it." In rabbinic literature Allusions in Jewish rabbinic literature to Isaiah contain various expansions, elaborations and inferences that go beyond what is presented in the text of the Bible itself. Origin and calling According to the ancient rabbis, Isaiah was a descendant of Judah and Tamar, and his father Amoz was the brother of King Amaziah. While Isaiah, says the Midrash, was walking up and down in his study he heard God saying, "Whom shall I send?" Then Isaiah said, "Here am I; send me!" Thereupon God said to him," My children are troublesome and sensitive; if you are ready to be insulted and even beaten by them, you may accept My message; if not, you would better renounce it". Isaiah accepted the mission, and was the most forbearing, as well as the most patriotic, among the prophets, always defending Israel and imploring forgiveness for its sins. When Isaiah said, "I dwell in the midst of a people of unclean lips", he was rebuked by God for speaking in such terms of His people. His death It is related in the Talmud that Rabbi Simeon ben Azzai found in Jerusalem an account wherein it was written that King Manasseh killed Isaiah. King Manasseh said to Isaiah, "Moses, your master, said, 'No man may see God and live'; but you have said, 'I saw the Lord seated upon his throne'"; and went on to point out other contradictions—as between Deuteronomy and Isaiah 40; between Exodus 33 and 2 Kings Isaiah thought: "I know that he will not accept my explanations; why should I increase his guilt?" He then uttered the tetragrammaton, a cedar-tree opened, and Isaiah disappeared within it. King Manasseh ordered the cedar to be sawn asunder, and when the saw reached his mouth Isaiah died; thus was he punished for having said, "I dwell in the midst of a people of unclean lips". A somewhat different version of this legend is given in the Jerusalem Talmud. According to that version Isaiah, fearing King Manasseh, hid himself in a cedar-tree, but his presence was betrayed by the fringes of his garment, and King Manasseh caused the tree to be sawn in half. A passage of the Targum to Isaiah quoted by Jolowicz states that when Isaiah fled from his pursuers and took refuge in the tree, and the tree was sawn in half, the prophet's blood spurted forth. The legend of Isaiah's martyrdom spread to the Arabs and to the Christians as, for example, Athanasius the bishop of Alexandria ( 318) wrote, "Isaiah was sawn asunder". According to rabbinic literature, Isaiah was the maternal grandfather of Manasseh of Judah. Archaeology In February 2018, archaeologist Eilat Mazar announced that she and her team had discovered a small seal impression which reads "[belonging] to Isaiah nvy" (could be reconstructed and read as "[belonging] to Isaiah the prophet") during the Ophel excavations, just south of the Temple Mount in Jerusalem. The tiny bulla was found "only 10 feet away" from where an intact bulla bearing the inscription "[belonging] to King Hezekiah of Judah" was discovered in 2015 by the same team. Although the name "Isaiah" in the Paleo-Hebrew alphabet is unmistakable, the damage on the bottom left part of the seal causes difficulties in confirming the word "prophet" or a name "Navi", casting some doubts whether this seal really belongs to the prophet Isaiah. Notes References Further reading Buck, Christopher (1990). The Anatomy of Figuration: Maimonides’ Exegesis of Natural Convulsions in Apocalyptic Texts (Guide II.29). University of Calgary. External links 8th-century BCE Hebrew people 7th-century BCE Jews 8th-century BC births 7th-century BC births 8th-century BC writers 7th-century BC writers Christian saints from the Old Testament Angelic visionaries Davidic line
[ -0.18003685772418976, 0.9842008352279663, -0.7931666374206543, -0.5888130068778992, -0.48191651701927185, 0.6185449361801147, 0.5077019929885864, 0.14132073521614075, 0.11306311190128326, -0.31810516119003296, -0.26664844155311584, -0.005747417453676462, -0.07489990442991257, 0.51900929212...
15095
https://en.wikipedia.org/wiki/Intifada
Intifada
An intifada ( ) is a rebellion or uprising, or a resistance movement. It is a key concept in contemporary Arabic usage referring to a legitimate uprising against oppression. Etymology Intifada is an Arabic word literally meaning, as a noun, "tremor", "shivering", "shuddering". It is derived from an Arabic term nafada meaning "to shake", "shake off", "get rid of", as a dog might shrug off water, or as one might shake off sleep, or dirt from one's sandals. History The concept intifada was first utilized in modern times in 1952 within the Kingdom of Iraq, when socialist and communist parties took to the streets to protest the Hashemite monarchy, with inspiration of the 1952 Egyptian Revolution. The concept was adopted in Western Sahara, with the gradual withdrawal of Spanish forces in the 1970s as the Zemla Intifada, but was essentially rooted into the Western Sahara conflict with the First Sahrawi Intifada – protests by Sahrawi activists in the Western Sahara, south of Morocco (1999–2004), Independence Intifada (Western Sahara) or Second Sahrawi Intifada and finally the Gdeim Izik protests in 2011. In the Palestinian context, the word refers to attempts to "shake off" the Israeli occupation of the West Bank and Gaza Strip in the First and Second Intifadas, where it was originally chosen to connote "aggressive nonviolent resistance", a meaning it bore among Palestinian students in struggles in the 1980s and which they adopted as less confrontational than terms in earlier militant rhetoric since it bore no nuance of violence. List of events named Intifada Intifada may refer to these events: Iraqi Intifada, a series of strikes and riots in Iraq in 1952, aimed against the Hashemite monarchy rule October Revolution, a series of strikes, riots, and demonstrations in Sudan, that ended with the dissolution of the Abbud military regime and the beginning of second civilian rule in 1964 March Intifada, a leftist uprising against the British colonial presence in Bahrain in March 1965 Zemla Intifada, against Spanish colonial rule in then Spanish Sahara, in June 1970 In Lebanese internal conflicts: February 6 Intifada (1984), during the Lebanese Civil War Cedar Revolution or "Intifada of Independence", the events in Lebanon after Rafic Hariri's 2005 assassination In the Israeli–Palestine conflict: First Intifada, a Palestinian uprising against the Israeli occupation lasting from December 1987 to 1993 Second Intifada or the Al-Aqsa Intifada, a period of intensified Israeli-Palestinian violence, which began in late September 2000 and ended around 2005 2014 Jerusalem unrest, a series of violent acts and attacks in Jerusalem in 2014 sometimes referred to as "Intifada" Israeli–Palestinian conflict (2015) – 2015 escalation in Israeli–Palestinian conflict, sometimes referred to as "Al-Quds Intifada" or "Jerusalem Intifada" or "Knife Intifada" 1990s uprising in Bahrain, an uprising demanding a return to democratic rule, also known as the "1990s Intifada" 1991 Iraqi uprisings, an armed uprising against Saddam Hussein in Iraq, also known as "Iraqi Intifada of 1991" In the Western Sahara conflict: First Sahrawi Intifada, protests by Sahrawi activists in the Western Sahara, south of Morocco (1999–2004) Independence Intifada (Western Sahara) or Second Sahrawi Intifada, demonstrations and riots in Western Sahara, south of Morocco, beginning in May 2005 Gdeim Izik protests, also referred as Third Sahrawi Intifada or simply Third Inifada 2005 French riots often referred as "French Intifada" Arab Spring, a revolutionary wave which began on 18 December 2010 in Tunisia, sometimes referred to as "Intifada": Tunisian Revolution, or Tunisian Intifada 2011 Yemeni Revolution, or Yemeni Intifada Egyptian Revolution of 2011, or Egyptian Intifada 2011–2013 Sudanese protests, or Sudanese Intifada 2018–19 Arab protests 2019–20 Lebanese protests, nicknamed the Tax Intifada October 2019 Iraqi protests, nicknamed Iraqi Intifada See also The Electronic Intifada, an online publication which covers the Israeli–Palestinian conflict from a Palestinian perspective References External links Andrew Hussey, book 'The French Intifada: how the Arab banlieues are fighting the French state,' The Guardian 23 February 2014 Social concepts
[ 0.29830610752105713, -0.2345464825630188, -0.8503429889678955, -0.44873031973838806, -0.6467059850692749, -0.19531723856925964, 0.5568749308586121, 0.448581337928772, -0.22300617396831512, -0.32028549909591675, -0.9213871955871582, -0.016884367913007736, -0.6860883831977844, 0.878144562244...
15097
https://en.wikipedia.org/wiki/Ionosphere
Ionosphere
The ionosphere () is the ionized part of Earth's upper atmosphere, from about to altitude, a region that includes the thermosphere and parts of the mesosphere and exosphere. The ionosphere is ionized by solar radiation. It plays an important role in atmospheric electricity and forms the inner edge of the magnetosphere. It has practical importance because, among other functions, it influences radio propagation to distant places on the Earth. History of discovery As early as 1839, the German mathematician and physicist Carl Friedrich Gauss postulated that an electrically conducting region of the atmosphere could account for observed variations of Earth's magnetic field. Sixty years later, Guglielmo Marconi received the first trans-Atlantic radio signal on December 12, 1901, in St. John's, Newfoundland (now in Canada) using a kite-supported antenna for reception. The transmitting station in Poldhu, Cornwall, used a spark-gap transmitter to produce a signal with a frequency of approximately 500 kHz and a power of 100 times more than any radio signal previously produced. The message received was three dits, the Morse code for the letter S. To reach Newfoundland the signal would have to bounce off the ionosphere twice. Dr. Jack Belrose has contested this, however, based on theoretical and experimental work. However, Marconi did achieve transatlantic wireless communications in Glace Bay, Nova Scotia, one year later. In 1902, Oliver Heaviside proposed the existence of the Kennelly–Heaviside layer of the ionosphere which bears his name. Heaviside's proposal included means by which radio signals are transmitted around the Earth's curvature. . Also in 1902, Arthur Edwin Kennelly discovered some of the ionosphere's radio-electrical properties. In 1912, the U.S. Congress imposed the Radio Act of 1912 on amateur radio operators, limiting their operations to frequencies above 1.5 MHz (wavelength 200 meters or smaller). The government thought those frequencies were useless. This led to the discovery of HF radio propagation via the ionosphere in 1923. In 1926, Scottish physicist Robert Watson-Watt introduced the term ionosphere in a letter published only in 1969 in Nature: In the early 1930s, test transmissions of Radio Luxembourg inadvertently provided evidence of the first radio modification of the ionosphere; HAARP ran a series of experiments in 2017 using the eponymous Luxembourg Effect. Edward V. Appleton was awarded a Nobel Prize in 1947 for his confirmation in 1927 of the existence of the ionosphere. Lloyd Berkner first measured the height and density of the ionosphere. This permitted the first complete theory of short-wave radio propagation. Maurice V. Wilkes and J. A. Ratcliffe researched the topic of radio propagation of very long radio waves in the ionosphere. Vitaly Ginzburg has developed a theory of electromagnetic wave propagation in plasmas such as the ionosphere. In 1962, the Canadian satellite Alouette 1 was launched to study the ionosphere. Following its success were Alouette 2 in 1965 and the two ISIS satellites in 1969 and 1971, further AEROS-A and -B in 1972 and 1975, all for measuring the ionosphere. On July 26, 1963 the first operational geosynchronous satellite Syncom 2 was launched. The board radio beacons on this satellite (and its successors) enabled – for the first time – the measurement of total electron content (TEC) variation along a radio beam from geostationary orbit to an earth receiver. (The rotation of the plane of polarization directly measures TEC along the path.) Australian geophysicist Elizabeth Essex-Cohen from 1969 onwards was using this technique to monitor the atmosphere above Australia and Antarctica. Geophysics The ionosphere is a shell of electrons and electrically charged atoms and molecules that surrounds the Earth, stretching from a height of about to more than . It exists primarily due to ultraviolet radiation from the Sun. The lowest part of the Earth's atmosphere, the troposphere extends from the surface to about . Above that is the stratosphere, followed by the mesosphere. In the stratosphere incoming solar radiation creates the ozone layer. At heights of above , in the thermosphere, the atmosphere is so thin that free electrons can exist for short periods of time before they are captured by a nearby positive ion. The number of these free electrons is sufficient to affect radio propagation. This portion of the atmosphere is partially ionized and contains a plasma which is referred to as the ionosphere. Ultraviolet (UV), X-ray and shorter wavelengths of solar radiation are ionizing, since photons at these frequencies contain sufficient energy to dislodge an electron from a neutral gas atom or molecule upon absorption. In this process the light electron obtains a high velocity so that the temperature of the created electronic gas is much higher (of the order of thousand K) than the one of ions and neutrals. The reverse process to ionization is recombination, in which a free electron is "captured" by a positive ion. Recombination occurs spontaneously, and causes the emission of a photon carrying away the energy produced upon recombination. As gas density increases at lower altitudes, the recombination process prevails, since the gas molecules and ions are closer together. The balance between these two processes determines the quantity of ionization present. Ionization depends primarily on the Sun and its activity. The amount of ionization in the ionosphere varies greatly with the amount of radiation received from the Sun. Thus there is a diurnal (time of day) effect and a seasonal effect. The local winter hemisphere is tipped away from the Sun, thus there is less received solar radiation. The activity of the Sun modulates following the solar cycle, with more radiation occurring with more sunspots, with a periodicity of around 11 years. Radiation received also varies with geographical location (polar, auroral zones, mid-latitudes, and equatorial regions). There are also mechanisms that disturb the ionosphere and decrease the ionization. There are disturbances such as solar flares and the associated release of charged particles into the solar wind which reaches the Earth and interacts with its geomagnetic field. Sydney Chapman proposed that the region below the ionosphere be called neutrosphere (the neutral atmosphere). Layers of ionization At night the F layer is the only layer of significant ionization present, while the ionization in the E and D layers is extremely low. During the day, the D and E layers become much more heavily ionized, as does the F layer, which develops an additional, weaker region of ionisation known as the F layer. The F layer persists by day and night and is the main region responsible for the refraction and reflection of radio waves. D layer The D layer is the innermost layer, to above the surface of the Earth. Ionization here is due to Lyman series-alpha hydrogen radiation at a wavelength of 121.6 nanometre (nm) ionizing nitric oxide (NO). In addition, high solar activity can generate hard X-rays (wavelength ) that ionize N and O. Recombination rates are high in the D layer, so there are many more neutral air molecules than ions. Medium frequency (MF) and lower high frequency (HF) radio waves are significantly attenuated within the D layer, as the passing radio waves cause electrons to move, which then collide with the neutral molecules, giving up their energy. Lower frequencies experience greater absorption because they move the electrons farther, leading to greater chance of collisions. This is the main reason for absorption of HF radio waves, particularly at 10 MHz and below, with progressively less absorption at higher frequencies. This effect peaks around noon and is reduced at night due to a decrease in the D layer's thickness; only a small part remains due to cosmic rays. A common example of the D layer in action is the disappearance of distant AM broadcast band stations in the daytime. During solar proton events, ionization can reach unusually high levels in the D-region over high and polar latitudes. Such very rare events are known as Polar Cap Absorption (or PCA) events, because the increased ionization significantly enhances the absorption of radio signals passing through the region. In fact, absorption levels can increase by many tens of dB during intense events, which is enough to absorb most (if not all) transpolar HF radio signal transmissions. Such events typically last less than 24 to 48 hours. E layer The E layer is the middle layer, to above the surface of the Earth. Ionization is due to soft X-ray (1–10 nm) and far ultraviolet (UV) solar radiation ionization of molecular oxygen (O). Normally, at oblique incidence, this layer can only reflect radio waves having frequencies lower than about 10 MHz and may contribute a bit to absorption on frequencies above. However, during intense sporadic E events, the E layer can reflect frequencies up to 50 MHz and higher. The vertical structure of the E layer is primarily determined by the competing effects of ionization and recombination. At night the E layer weakens because the primary source of ionization is no longer present. After sunset an increase in the height of the E layer maximum increases the range to which radio waves can travel by reflection from the layer. This region is also known as the Kennelly–Heaviside layer or simply the Heaviside layer. Its existence was predicted in 1902 independently and almost simultaneously by the American electrical engineer Arthur Edwin Kennelly (1861–1939) and the British physicist Oliver Heaviside (1850–1925). In 1924 its existence was detected by Edward V. Appleton and Miles Barnett. E layer The E layer (sporadic E-layer) is characterized by small, thin clouds of intense ionization, which can support reflection of radio waves, frequently up to 50 MHz and rarely up to 450 MHz. Sporadic-E events may last for just a few minutes to many hours. Sporadic E propagation makes VHF-operating by radio amateurs very exciting when long distance propagation paths that are generally unreachable "open up" to two-way communication. There are multiple causes of sporadic-E that are still being pursued by researchers. This propagation occurs every day during June and July in northern hemisphere mid-latitudes when high signal levels are often reached. The skip distances are generally around . Distances for one hop propagation can be anywhere from to . Multi-hop propagation over is also common, sometimes to distances of or more. F layer The F layer or region, also known as the Appleton–Barnett layer, extends from about to more than above the surface of Earth. It is the layer with the highest electron density, which implies signals penetrating this layer will escape into space. Electron production is dominated by extreme ultraviolet (UV, 10–100 nm) radiation ionizing atomic oxygen. The F layer consists of one layer (F) at night, but during the day, a secondary peak (labelled F) often forms in the electron density profile. Because the F layer remains by day and night, it is responsible for most skywave propagation of radio waves and long distance high frequency (HF, or shortwave) radio communications. Above the F layer, the number of oxygen ions decreases and lighter ions such as hydrogen and helium become dominant. This region above the F layer peak and below the plasmasphere is called the topside ionosphere. From 1972 to 1975 NASA launched the AEROS and AEROS B satellites to study the F region. Ionospheric model An ionospheric model is a mathematical description of the ionosphere as a function of location, altitude, day of year, phase of the sunspot cycle and geomagnetic activity. Geophysically, the state of the ionospheric plasma may be described by four parameters: electron density, electron and ion temperature and, since several species of ions are present, ionic composition. Radio propagation depends uniquely on electron density. Models are usually expressed as computer programs. The model may be based on basic physics of the interactions of the ions and electrons with the neutral atmosphere and sunlight, or it may be a statistical description based on a large number of observations or a combination of physics and observations. One of the most widely used models is the International Reference Ionosphere (IRI), which is based on data and specifies the four parameters just mentioned. The IRI is an international project sponsored by the Committee on Space Research (COSPAR) and the International Union of Radio Science (URSI). The major data sources are the worldwide network of ionosondes, the powerful incoherent scatter radars (Jicamarca, Arecibo, Millstone Hill, Malvern, St Santin), the ISIS and Alouette topside sounders, and in situ instruments on several satellites and rockets. IRI is updated yearly. IRI is more accurate in describing the variation of the electron density from bottom of the ionosphere to the altitude of maximum density than in describing the total electron content (TEC). Since 1999 this model is "International Standard" for the terrestrial ionosphere (standard TS16457). Persistent anomalies to the idealized model Ionograms allow deducing, via computation, the true shape of the different layers. Nonhomogeneous structure of the electron/ion-plasma produces rough echo traces, seen predominantly at night and at higher latitudes, and during disturbed conditions. Winter anomaly At mid-latitudes, the F2 layer daytime ion production is higher in the summer, as expected, since the Sun shines more directly on the Earth. However, there are seasonal changes in the molecular-to-atomic ratio of the neutral atmosphere that cause the summer ion loss rate to be even higher. The result is that the increase in the summertime loss overwhelms the increase in summertime production, and total F2 ionization is actually lower in the local summer months. This effect is known as the winter anomaly. The anomaly is always present in the northern hemisphere, but is usually absent in the southern hemisphere during periods of low solar activity. Equatorial anomaly Within approximately ± 20 degrees of the magnetic equator, is the equatorial anomaly. It is the occurrence of a trough in the ionization in the F2 layer at the equator and crests at about 17 degrees in magnetic latitude. The Earth's magnetic field lines are horizontal at the magnetic equator. Solar heating and tidal oscillations in the lower ionosphere move plasma up and across the magnetic field lines. This sets up a sheet of electric current in the E region which, with the horizontal magnetic field, forces ionization up into the F layer, concentrating at ± 20 degrees from the magnetic equator. This phenomenon is known as the equatorial fountain. Equatorial electrojet The worldwide solar-driven wind results in the so-called Sq (solar quiet) current system in the E region of the Earth's ionosphere (ionospheric dynamo region) ( altitude). Resulting from this current is an electrostatic field directed west–east (dawn–dusk) in the equatorial day side of the ionosphere. At the magnetic dip equator, where the geomagnetic field is horizontal, this electric field results in an enhanced eastward current flow within ± 3 degrees of the magnetic equator, known as the equatorial electrojet. Ephemeral ionospheric perturbations X-rays: sudden ionospheric disturbances (SID) When the Sun is active, strong solar flares can occur that hit the sunlit side of Earth with hard X-rays. The X-rays penetrate to the D-region, releasing electrons that rapidly increase absorption, causing a high frequency (3–30 MHz) radio blackout that can persist for many hours after strong flares. During this time very low frequency (3–30 kHz) signals will be reflected by the D layer instead of the E layer, where the increased atmospheric density will usually increase the absorption of the wave and thus dampen it. As soon as the X-rays end, the sudden ionospheric disturbance (SID) or radio black-out steadily declines as the electrons in the D-region recombine rapidly and propagation gradually returns to pre-flare conditions over minutes to hours depending on the solar flare strength and frequency. Protons: polar cap absorption (PCA) Associated with solar flares is a release of high-energy protons. These particles can hit the Earth within 15 minutes to 2 hours of the solar flare. The protons spiral around and down the magnetic field lines of the Earth and penetrate into the atmosphere near the magnetic poles increasing the ionization of the D and E layers. PCA's typically last anywhere from about an hour to several days, with an average of around 24 to 36 hours. Coronal mass ejections can also release energetic protons that enhance D-region absorption in the polar regions. Geomagnetic storms A geomagnetic storm is a temporary -- sometimes intense -- disturbance of the Earth's magnetosphere. During a geomagnetic storm the F₂ layer will become unstable, fragment, and may even disappear completely. In the Northern and Southern polar regions of the Earth aurorae will be observable in the night sky. Lightning Lightning can cause ionospheric perturbations in the D-region in one of two ways. The first is through VLF (very low frequency) radio waves launched into the magnetosphere. These so-called "whistler" mode waves can interact with radiation belt particles and cause them to precipitate onto the ionosphere, adding ionization to the D-region. These disturbances are called "lightning-induced electron precipitation" (LEP) events. Additional ionization can also occur from direct heating/ionization as a result of huge motions of charge in lightning strikes. These events are called early/fast. In 1925, C. T. R. Wilson proposed a mechanism by which electrical discharge from lightning storms could propagate upwards from clouds to the ionosphere. Around the same time, Robert Watson-Watt, working at the Radio Research Station in Slough, UK, suggested that the ionospheric sporadic E layer (Es) appeared to be enhanced as a result of lightning but that more work was needed. In 2005, C. Davis and C. Johnson, working at the Rutherford Appleton Laboratory in Oxfordshire, UK, demonstrated that the Es layer was indeed enhanced as a result of lightning activity. Their subsequent research has focused on the mechanism by which this process can occur. Applications Radio communication Due to the ability of ionized atmospheric gases to refract high frequency (HF, or shortwave) radio waves, the ionosphere can reflect radio waves directed into the sky back toward the Earth. Radio waves directed at an angle into the sky can return to Earth beyond the horizon. This technique, called "skip" or "skywave" propagation, has been used since the 1920s to communicate at international or intercontinental distances. The returning radio waves can reflect off the Earth's surface into the sky again, allowing greater ranges to be achieved with multiple hops. This communication method is variable and unreliable, with reception over a given path depending on time of day or night, the seasons, weather, and the 11-year sunspot cycle. During the first half of the 20th century it was widely used for transoceanic telephone and telegraph service, and business and diplomatic communication. Due to its relative unreliability, shortwave radio communication has been mostly abandoned by the telecommunications industry, though it remains important for high-latitude communication where satellite-based radio communication is not possible. Some broadcasting stations and automated services still use shortwave radio frequencies, as do radio amateur hobbyists for private recreational contacts. Mechanism of refraction When a radio wave reaches the ionosphere, the electric field in the wave forces the electrons in the ionosphere into oscillation at the same frequency as the radio wave. Some of the radio-frequency energy is given up to this resonant oscillation. The oscillating electrons will then either be lost to recombination or will re-radiate the original wave energy. Total refraction can occur when the collision frequency of the ionosphere is less than the radio frequency, and if the electron density in the ionosphere is great enough. A qualitative understanding of how an electromagnetic wave propagates through the ionosphere can be obtained by recalling geometric optics. Since the ionosphere is a plasma, it can be shown that the refractive index is less than unity. Hence, the electromagnetic "ray" is bent away from the normal rather than toward the normal as would be indicated when the refractive index is greater than unity. It can also be shown that the refractive index of a plasma, and hence the ionosphere, is frequency-dependent, see Dispersion (optics). The critical frequency is the limiting frequency at or below which a radio wave is reflected by an ionospheric layer at vertical incidence. If the transmitted frequency is higher than the plasma frequency of the ionosphere, then the electrons cannot respond fast enough, and they are not able to re-radiate the signal. It is calculated as shown below: where N = electron density per m3 and fcritical is in Hz. The Maximum Usable Frequency (MUF) is defined as the upper frequency limit that can be used for transmission between two points at a specified time. where = angle of attack, the angle of the wave relative to the horizon, and sin is the sine function. The cutoff frequency is the frequency below which a radio wave fails to penetrate a layer of the ionosphere at the incidence angle required for transmission between two specified points by refraction from the layer. GPS/GNSS ionospheric correction There are a number of models used to understand the effects of the ionosphere global navigation satellite systems. The Klobuchar model is currently used to compensate for ionospheric effects in GPS. This model was developed at the US Air Force Geophysical Research Laboratory circa 1974 by John (Jack) Klobuchar. The Galileo navigation system uses the NeQuick model. Other applications The open system electrodynamic tether, which uses the ionosphere, is being researched. The space tether uses plasma contactors and the ionosphere as parts of a circuit to extract energy from the Earth's magnetic field by electromagnetic induction. Measurements Overview Scientists explore the structure of the ionosphere by a wide variety of methods. They include: passive observations of optical and radio emissions generated in the ionosphere bouncing radio waves of different frequencies from it incoherent scatter radars such as the EISCAT, Sondre Stromfjord, Millstone Hill, Arecibo, Advanced Modular Incoherent Scatter Radar (AMISR) and Jicamarca radars coherent scatter radars such as the Super Dual Auroral Radar Network (SuperDARN) radars special receivers to detect how the reflected waves have changed from the transmitted waves. A variety of experiments, such as HAARP (High Frequency Active Auroral Research Program), involve high power radio transmitters to modify the properties of the ionosphere. These investigations focus on studying the properties and behavior of ionospheric plasma, with particular emphasis on being able to understand and use it to enhance communications and surveillance systems for both civilian and military purposes. HAARP was started in 1993 as a proposed twenty-year experiment, and is currently active near Gakona, Alaska. The SuperDARN radar project researches the high- and mid-latitudes using coherent backscatter of radio waves in the 8 to 20 MHz range. Coherent backscatter is similar to Bragg scattering in crystals and involves the constructive interference of scattering from ionospheric density irregularities. The project involves more than 11 different countries and multiple radars in both hemispheres. Scientists are also examining the ionosphere by the changes to radio waves, from satellites and stars, passing through it. The Arecibo Telescope located in Puerto Rico, was originally intended to study Earth's ionosphere. Ionograms Ionograms show the virtual heights and critical frequencies of the ionospheric layers and which are measured by an ionosonde. An ionosonde sweeps a range of frequencies, usually from 0.1 to 30 MHz, transmitting at vertical incidence to the ionosphere. As the frequency increases, each wave is refracted less by the ionization in the layer, and so each penetrates further before it is reflected. Eventually, a frequency is reached that enables the wave to penetrate the layer without being reflected. For ordinary mode waves, this occurs when the transmitted frequency just exceeds the peak plasma, or critical, frequency of the layer. Tracings of the reflected high frequency radio pulses are known as ionograms. Reduction rules are given in: "URSI Handbook of Ionogram Interpretation and Reduction", edited by William Roy Piggott and Karl Rawer, Elsevier Amsterdam, 1961 (translations into Chinese, French, Japanese and Russian are available). Incoherent scatter radars Incoherent scatter radars operate above the critical frequencies. Therefore, the technique allows probing the ionosphere, unlike ionosondes, also above the electron density peaks. The thermal fluctuations of the electron density scattering the transmitted signals lack coherence, which gave the technique its name. Their power spectrum contains information not only on the density, but also on the ion and electron temperatures, ion masses and drift velocities. GNSS radio occultation Radio occultation is a remote sensing technique where a GNSS signal tangentially scrapes the Earth, passing through the atmosphere, and is received by a Low Earth Orbit (LEO) satellite. As the signal passes through the atmosphere, it is refracted, curved and delayed. An LEO satellite samples the total electron content and bending angle of many such signal paths as it watches the GNSS satellite rise or set behind the Earth. Using an Inverse Abel's transform, a radial profile of refractivity at that tangent point on earth can be reconstructed. Major GNSS radio occultation missions include the GRACE, CHAMP, and COSMIC. Indices of the ionosphere In empirical models of the ionosphere such as Nequick, the following indices are used as indirect indicators of the state of the ionosphere. Solar intensity F10.7 and R12 are two indices commonly used in ionospheric modelling. Both are valuable for their long historical records covering multiple solar cycles. F10.7 is a measurement of the intensity of solar radio emissions at a frequency of 2800 MHz made using a ground radio telescope. R12 is a 12 months average of daily sunspot numbers. Both indices have been shown to be correlated to each other. However, both indices are only indirect indicators of solar ultraviolet and X-ray emissions, which are primarily responsible for causing ionization in the Earth's upper atmosphere. We now have data from the GOES spacecraft that measures the background X-ray flux from the Sun, a parameter more closely related to the ionization levels in the ionosphere. Geomagnetic disturbances The A- and K-indices are a measurement of the behavior of the horizontal component of the geomagnetic field. The K-index uses a semi-logarithmic scale from 0 to 9 to measure the strength of the horizontal component of the geomagnetic field. The Boulder K-index is measured at the Boulder Geomagnetic Observatory. The geomagnetic activity levels of the Earth are measured by the fluctuation of the Earth's magnetic field in SI units called teslas (or in non-SI gauss, especially in older literature). The Earth's magnetic field is measured around the planet by many observatories. The data retrieved is processed and turned into measurement indices. Daily measurements for the entire planet are made available through an estimate of the Ap-index, called the planetary A-index (PAI). Ionospheres of other planets and natural satellites Objects in the Solar System that have appreciable atmospheres (i.e., all of the major planets and many of the larger natural satellites) generally produce ionospheres. Planets known to have ionospheres include Venus, Mars, Jupiter, Saturn, Uranus, Neptune and Pluto. The atmosphere of Titan includes an ionosphere that ranges from about to in altitude and contains carbon compounds. Ionospheres have also been observed at Io, Europa, Ganymede, and Triton. See also Aeronomy Geospace Space physics Geophysics International Reference Ionosphere Ionospheric dynamo region Magnetospheric electric convection field Protonosphere Schumann resonances Van Allen radiation belt Radio Earth–ionosphere waveguide Fading Ionospheric absorption Ionospheric scintillation Line-of-sight propagation Sferics Related Canadian Geospace Monitoring High Frequency Active Auroral Research Program Ionospheric heater S4 Index Soft gamma repeater Upper-atmospheric lightning Sura Ionospheric Heating Facility TIMED (Thermosphere Ionosphere Mesosphere Energetics and Dynamics) Notes References J. Lilensten, P.-L. Blelly: Du Soleil à la Terre, Aéronomie et météorologie de l'espace, Collection Grenoble Sciences, Université Joseph Fourier Grenoble I, 2000. . P.-L. Blelly, D. Alcaydé: Ionosphere, in: Y. Kamide, A. Chian, Handbook of the Solar-Terrestrial Environment, Springer-Verlag Berlin Heidelberg, pp. 189–220, 2007. External links Gehred, Paul, and Norm Cohen, SWPC's Radio User's Page. Amsat-Italia project on Ionospheric propagation (ESA SWENET website) NZ4O Solar Space Weather & Geomagnetic Data Archive NZ4O 160 Meter (Medium Frequency)Radio Propagation Theory Notes Layman Level Explanations Of "Seemingly" Mysterious 160 Meter (MF/HF) Propagation Occurrences USGS Geomagnetism Program Encyclopædia Britannica, Ionosphere and magnetosphere Current Space Weather Conditions Current Solar X-Ray Flux Super Dual Auroral Radar Network European Incoherent Scatter radar system Radio frequency propagation
[ 0.37407422065734863, 0.2533031702041626, 0.5827974677085876, 0.09891031682491302, 0.01385479886084795, -0.45438697934150696, 0.05963736027479172, 0.3205646574497223, -0.02724253572523594, -0.7786964774131775, -0.7258890867233276, 0.21075931191444397, -0.7120290398597717, 0.0315927937626838...
15100
https://en.wikipedia.org/wiki/Interlingua
Interlingua
Interlingua (; ISO 639 language codes ia, ina) is an international auxiliary language (IAL) developed between 1937 and 1951 by the American International Auxiliary Language Association (IALA). It ranks among the most widely used IALs and is the most widely used naturalistic IAL – in other words, those IALs whose vocabulary, grammar and other characteristics are derived from natural languages, rather than being centrally planned. Interlingua literature maintains that (written) Interlingua is comprehensible to the hundreds of millions of people who speak Romance languages, though it is actively spoken by only a few hundred. Interlingua was developed to combine a simple, mostly regular grammar with a vocabulary common to the widest possible range of western European languages, making it unusually easy to learn, at least for those whose native languages were sources of Interlingua's vocabulary and grammar. Conversely, it is used as a rapid introduction to many natural languages. The name Interlingua comes from the Latin words , meaning "between", and , meaning "tongue" or "language". These morphemes are the same in Interlingua, thus "Interlingua" would mean "between language". Rationale Interlingua recognises that many European languages share common vocabulary – due to the historical prominence of Latin and Greek – and therefore aims to extract and standardize the most widespread words for a concept. To qualify for inclusion in Interlingua, the presence of words must be shown in the primary control languages (English, French, Italian, Spanish and Portuguese) or secondary control languages (German and Russian). However, words from a diverse range of languages are found in Interlingua, including Japanese (geisha and samurai), Arabic (califa), Guugu Yimithirr (gangurru) (Interlingua: kanguru), and Finnish (sauna). Speakers of other languages can learn to speak and write Interlingua in a relatively short time, due to simple grammar and regular word formation using a small number of roots and affixes. This is particularly true for speakers with a good knowledge of Romance languages and international scientific vocabulary. Research with Swedish students has shown that, after learning Interlingua, they can translate elementary texts from Italian, Portuguese, and Spanish. A 1974 study showed that an Interlingua class could translate a Spanish text that students who had taken 150 hours of Spanish found too difficult to understand. Gopsill has suggested that Interlingua's freedom from irregularities allowed the students to grasp the mechanisms of Romance languages quickly. History The American heiress Alice Vanderbilt Morris (1874–1950) became interested in linguistics and the international auxiliary language movement in the early 1920s. In 1924, Morris and her husband, Dave Hennen Morris, established the non-profit International Auxiliary Language Association (IALA) in New York City. Their aim was to place the study of IALs on a more complex and scientific basis. Morris developed the research program of IALA in consultation with Edward Sapir, William Edward Collinson, and Otto Jespersen. Investigations of the auxiliary language problem were in progress at the International Research Council, the American Council on Education, the American Council of Learned Societies, the British, French, Italian, and American Associations for the advancement of science, and other groups of specialists. Morris created IALA as a continuation of this work. International Auxiliary Language Association The IALA became a major supporter of mainstream American linguistics. Numerous studies by Sapir, Collinson, and Morris Swadesh in the 1930s and 1940s, for example, were funded by IALA. Alice Morris edited several of these studies and provided much of IALA's financial support. For example, Morris herself edited Sapir and Morris Swadesh's 1932 cross-linguistic study of ending-point phenomena, and Collinson's 1937 study of indication. IALA also received support from such prestigious groups as the Carnegie Corporation, the Ford Foundation, the Research Corporation, and the Rockefeller Foundation. In its early years, IALA concerned itself with three tasks: finding other organizations around the world with similar goals; building a library of books about languages and interlinguistics; and comparing extant IALs, including Esperanto, Esperanto II, Ido, Peano's Interlingua (Latino sine flexione), Novial, and Interlingue (Occidental). In pursuit of the last goal, it conducted parallel studies of these languages, with comparative studies of national languages, under the direction of scholars at American and European universities. It also arranged conferences with proponents of these IALs, who debated features and goals of their respective languages. With a "concession rule" that required participants to make a certain number of concessions, early debates at IALA sometimes grew from heated to explosive. At the Second International Interlanguage Congress, held in Geneva in 1931, IALA began to break new ground; 27 recognized linguists signed a testimonial of support for IALA's research program. An additional eight added their signatures at the third congress, convened in Rome in 1933. That same year, Herbert N. Shenton and Edward L. Thorndike became influential in IALA's work by authoring key studies in the interlinguistic field. The first steps towards the finalization of Interlingua were taken in 1937, when a committee of 24 eminent linguists from 19 universities published Some Criteria for an International Language and Commentary. However, the outbreak of World War II in 1939 cut short the intended biannual meetings of the committee. Development of a new language Originally, the association had not intended to create its own language. Its goal was to identify which auxiliary language already available was best suited for international communication, and how to promote it more effectively. However, after ten years of research, many more members of IALA concluded that none of the existing interlanguages were up to the task. By 1937, the members had made the decision to create a new language, to the surprise of the world's interlanguage community. To that point, much of the debate had been equivocal on the decision to use naturalistic (e.g., Peano's Interlingua, Novial and Occidental) or systematic (e.g., Esperanto and Ido) words. During the war years, proponents of a naturalistic interlanguage won out. The first support was Thorndike's paper; the second was a concession by proponents of the systematic languages that thousands of words were already present in many, or even a majority, of the European languages. Their argument was that systematic derivation of words was a Procrustean bed, forcing the learner to unlearn and re-memorize a new derivation scheme when a usable vocabulary was already available. This finally convinced supporters of the systematic languages, and IALA from that point assumed the position that a naturalistic language would be best. IALA's research activities were based in Liverpool, before relocating to New York due to the outbreak of World War II, where E. Clark Stillman established a new research staff. Stillman, with the assistance of Alexander Gode, developed a prototyping technique – an objective methodology for selecting and standardizing vocabulary based on a comparison of control languages. In 1943 Stillman left for war work and Gode became Acting Director of Research. IALA began to develop models of the proposed language, the first of which were presented in Morris's General Report in 1945. From 1946 to 1948, French linguist André Martinet was Director of Research. During this period IALA continued to develop models and conducted polling to determine the optimal form of the final language. In 1946, IALA sent an extensive survey to more than 3,000 language teachers and related professionals on three continents. Four models were canvassed: The results of the survey were striking. The two more schematic models were rejected – K overwhelmingly. Of the two naturalistic models, M received somewhat more support than P. IALA decided on a compromise between P and M, with certain elements of C. Martinet took up a position at Columbia University in 1948, and Gode took on the last phase of Interlingua's development. The vocabulary and grammar of Interlingua were first presented in 1951, when IALA published the finalized Interlingua Grammar and the 27,000-word Interlingua–English Dictionary (IED). In 1954, IALA published an introductory manual entitled Interlingua a Prime Vista ("Interlingua at First Sight"). Interlingua as presented by the IALA is very close to Peano's Interlingua (Latino sine flexione), both in its grammar and especially in its vocabulary. Accordingly, the very name "Interlingua" was kept, yet a distinct abbreviation was adopted: IA instead of IL. The four models Four models were canvassed: Model P and K, plus two new models similar to Model E of 1945. Model P was unchanged from 1945; Model M was relatively modern in comparison to more classical P. Model K was slightly modified in the direction of Ido. The vote total ended up as follows: P 26.6%, M 37.5%, C 20%, and K 15%. The results of the survey were striking. The two more schematic models, C and K, were rejected – K overwhelmingly. Of the two naturalistic models, M attracted somewhat more support than P. Taking national biases into account (for example, the French who were polled disproportionately favored Model M), IALA decided on a compromise between models M and P, with certain elements of C. Finalization When Martinet took up a position at Columbia University in 1948, Gode took on the last phase of Interlingua's development. His task was to combine elements of Model M and Model P; take the flaws seen in both by the polled community and repair them with elements of Model C as needed; and simultaneously develop a vocabulary. The vocabulary and verb conjugations of Interlingua were first presented in 1951, when IALA published the finalized Interlingua Grammar and the 27,000-word Interlingua-English Dictionary (IED). In 1954, IALA published an introductory manual entitled Interlingua a Prime Vista ("Interlingua at First Sight"). Success, decline, and resurgence An early practical application of Interlingua was the scientific newsletter Spectroscopia Molecular, published from 1952 to 1980. In 1954, Interlingua was used at the Second World Cardiological Congress in Washington, D.C. for both written summaries and oral interpretation. Within a few years, it found similar use at nine further medical congresses. Between the mid-1950s and the late 1970s, some thirty scientific and especially medical journals provided article summaries in Interlingua. Science Service, the publisher of Science Newsletter at the time, published a monthly column in Interlingua from the early 1950s until Gode's death in 1970. In 1967, the International Organization for Standardization, which normalizes terminology, voted almost unanimously to adopt Interlingua as the basis for its dictionaries. The IALA closed its doors in 1953 but was not formally dissolved until 1956 or later. Its role in promoting Interlingua was largely taken on by Science Service, which hired Gode as head of its newly formed Interlingua Division. Hugh E. Blair, Gode's close friend and colleague, became his assistant. A successor organization, the Interlingua Institute, was founded in 1970 to promote Interlingua in the US and Canada. The new institute supported the work of other linguistic organizations, made considerable scholarly contributions and produced Interlingua summaries for scholarly and medical publications. One of its largest achievements was two immense volumes on phytopathology produced by the American Phytopathological Society in 1976 and 1977. Interlingua had attracted many former adherents of other international-language projects, notably Occidental and Ido. The former Occidentalist Ric Berger founded The Union Mundial pro Interlingua (UMI) in 1955, and by the late 1950s, interest in Interlingua in Europe had already begun to overtake that in North America. Media coverage at the time, for example, was apparently heaviest in Northern and Eastern Europe. Frequent European coverage has continued to date, joined by media attention in South America in the early 1990s. Beginning in the 1980s, UMI has held international conferences every two years (typical attendance at the earlier meetings was 50 to 100) and launched a publishing programme that eventually produced over 100 volumes. Other Interlingua-language works were published by university presses in Sweden and Italy, and in the 1990s, Brazil and Switzerland. Several Scandinavian schools undertook projects that used Interlingua as a means of teaching the international scientific and intellectual vocabulary. In 2000, the Interlingua Institute was dissolved amid funding disputes with the UMI; the American Interlingua Society, established the following year, succeeded the institute and responded to new interest emerging in Mexico. In the Soviet bloc Interlingua was spoken and promoted in the Soviet bloc, despite attempts to suppress the language. In East Germany, government officials confiscated the letters and magazines that the UMI sent to Walter Rädler, the Interlingua representative there. In Czechoslovakia, Július Tomin published his first article on Interlingua in the Slovak magazine Príroda a spoločnosť (Nature and Society) in 1971, after which he received several anonymous threatening letters. He went on to become the Czech Interlingua representative, teach Interlingua in the school system, and publish a series of articles and books. Interlingua today Interest in Interlingua has expanded from the scientific community to the general public. Individuals, governments, and private companies use Interlingua for learning and instruction, travel, online publishing, and communication across language barriers. Interlingua is promoted internationally by the Union Mundial pro Interlingua. Periodicals and books are produced by many national organizations, such as the Societate American pro Interlingua, the Svenska Sällskapet för Interlingua, and the Union Brazilian pro Interlingua. Panorama In Interlingua is the most prominent of several Interlingua periodicals. It is a 28-page magazine published bimonthly that covers current events, science, editorials, and Interlingua. Thanks to the Internet, Interlingua has seen a resurgence over the last decade, with the number of speakers jumping tenfold by some estimates. Community It is not certain how many people have an active knowledge of Interlingua. As noted above, Interlingua is claimed to be the most widely spoken naturalistic auxiliary language. Interlingua's greatest advantage is that it is the most widely understood international auxiliary language besides Interlingua (IL) de A.p.I. by virtue of its naturalistic (as opposed to schematic) grammar and vocabulary, allowing those familiar with a Romance language, and educated speakers of English, to read and understand it without prior study. Interlingua has active speakers on all continents, especially in South America and in Eastern and Northern Europe, most notably Scandinavia; also in Russia and Ukraine. There are copious Interlingua web pages, including editions of Wikipedia and Wiktionary, and a number of periodicals, including Panorama in Interlingua from the Union Mundial pro Interlingua (UMI) and magazines of the national societies allied with it. There are several active mailing lists, and Interlingua is also in use in certain Usenet newsgroups, particularly in the europa.* hierarchy. Interlingua is presented on CDs, radio, and television. Interlingua is taught in many high schools and universities, sometimes as a means of teaching other languages quickly, presenting interlinguistics, or introducing the international vocabulary. The University of Granada in Spain, for example, offers an Interlingua course in collaboration with the Centro de Formación Continua. Every two years, the UMI organizes an international conference in a different country. In the year between, the Scandinavian Interlingua societies co-organize a conference in Sweden. National organizations such as the Union Brazilian pro Interlingua also organize regular conferences. , Google Keyboard supports Interlingua. Orthography Interlingua has a largely phonemic orthography. Interlingua alphabet Interlingua uses the 26 letters of the ISO basic Latin alphabet with no diacritics. The alphabet, pronunciation in IPA and letter names in Interlingua are: c is pronounced (or optionally ) before e, i, y ch is pronounced /ʃ/ in words of French origin e.g. chef = /ʃef/ meaning "chief" or "chef", /k/ in words of Greek and Italian origin e.g. choro = /koro/ meaning "chorus" and more rarely /t͡ʃ/ in words of English or Spanish origin as in Chile /t͡ʃile/ (the country Chile). Ch may be pronounced either /t͡ʃ/ or /ʃ/ depending on the speaker in many cases e.g. chocolate may be pronounced either /t͡ʃokolate/ or /ʃokolate/. there is no consensus on how to pronounce sc before e, i, y, as in scientia "science", though is common Unlike any of the Romance languages, g is /g/ even before e, i, y but in -age it is /(d)ʒ/ (i.e. like j), as it is in several words of French origin such as orange /oranʒe/ and mangiar /manʒar/ q only appears in the digraph qu, which is pronounced [kw] (but in the conjunction and pronoun que and pronoun qui and in terms derived from them such as anque and proque a single s between vowels is often pronounced like z, but pronunciation is irregular t is generally [t], but ti followed by a vowel, unless stressed or preceded by s, is pronounced the same as c (that is, [t͡sj] or [sj]) Collateral orthography The book Grammar of Interlingua defines in §15 a "collateral orthography" that defines how a word is spelt in Interlingua once assimilated regardless of etymology. Phonology Interlingua is primarily a written language, and the pronunciation is not entirely settled. The sounds in parentheses are not used by all speakers. Pronunciation For the most part, consonants are pronounced as in English, while the vowels are like Spanish. Written double consonants may be geminated as in Italian for extra clarity or pronounced as single as in English or French. Interlingua has five falling diphthongs, , and , although and are rare. Stress The general rule is that stress falls on the vowel before the last consonant (e.g., lingua, 'language', esser, 'to be', requirimento, 'requirement') ignoring the final plural -(e)s (e.g. linguas, the plural of lingua, still has the same stress as the singular), and where that is not possible, on the first vowel (via, 'way', io crea, 'I create'). There are a few exceptions, and the following rules account for most of them: Adjectives and nouns ending in a vowel followed by -le, -ne, or -re are stressed on the third-last syllable (fragile, margine, altere 'other', but illa impone 'she imposes'). Words ending in -ica/-ico, -ide/-ido and -ula/-ulo, are stressed on the third-last syllable (politica, scientifico, rapide, stupido, capitula, seculo 'century'). Words ending in -ic are stressed on the second-last syllable (cubic). Speakers may pronounce all words according to the general rule mentioned above. For example, kilometro is acceptable, although kilometro is more common. Phonotactics Interlingua has no explicitly defined phonotactics. However, the prototyping procedure for determining Interlingua words, which strives for internationality, should in general lead naturally to words that are easy for most learners to pronounce. In the process of forming new words, an ending cannot always be added without a modification of some kind in between. A good example is the plural -s, which is always preceded by a vowel to prevent the occurrence of a hard-to-pronounce consonant cluster at the end. If the singular does not end in a vowel, the final -s becomes -es. Loanwords Unassimilated foreign loanwords, or borrowed words, are spelled as in their language of origin. Their spelling may contain diacritics, or accent marks. If the diacritics do not affect pronunciation, they are removed. Vocabulary Words in Interlingua may be taken from any language, as long as their internationality is verified by their presence in seven control languages: Spanish, Portuguese, Italian, French, and English, with German and Russian acting as secondary controls. These are the most widely spoken Romance, Germanic, and Slavic languages, respectively. Because of their close relationship, Spanish and Portuguese are treated as one unit. The largest number of Interlingua words are of Latin origin, with the Greek and Germanic languages providing the second and third largest number. The remainder of the vocabulary originates in Slavic and non-Indo-European languages. Eligibility A word, that is a form with meaning, is eligible for the Interlingua vocabulary if it is verified by at least three of the four primary control languages. Either secondary control language can substitute for a primary language. Any word of Indo-European origin found in a control language can contribute to the eligibility of an international word. In some cases, the archaic or potential presence of a word can contribute to its eligibility. A word can be potentially present in a language when a derivative is present, but the word itself is not. English proximity, for example, gives support to Interlingua proxime, meaning 'near, close'. This counts as long as one or more control languages actually have this basic root word, which the Romance languages all do. Potentiality also occurs when a concept is represented as a compound or derivative in a control language, the morphemes that make it up are themselves international, and the combination adequately conveys the meaning of the larger word. An example is Italian fiammifero (lit. flamebearer), meaning "match, lucifer", which leads to Interlingua flammifero, or "match". This word is thus said to be potentially present in the other languages although they may represent the meaning with a single morpheme. Words do not enter the Interlingua vocabulary solely because cognates exist in a sufficient number of languages. If their meanings have become different over time, they are considered different words for the purpose of Interlingua eligibility. If they still have one or more meanings in common, however, the word can enter Interlingua with this smaller set of meanings. If this procedure did not produce an international word, the word for a concept was originally taken from Latin (see below). This only occurred with a few grammatical particles. Form The form of an Interlingua word is considered an international prototype with respect to the other words. On the one hand, it should be neutral, free from characteristics peculiar to one language. On the other hand, it should maximally capture the characteristics common to all contributing languages. As a result, it can be transformed into any of the contributing variants using only these language-specific characteristics. If the word has any derivatives that occur in the source languages with appropriate parallel meanings, then their morphological connection must remain intact; for example, the Interlingua word for 'time' is spelled tempore and not *tempus or *tempo in order to match it with its derived adjectives, such as temporal. The language-specific characteristics are closely related to the sound laws of the individual languages; the resulting words are often close or even identical to the most recent form common to the contributing words. This sometimes corresponds with that of Vulgar Latin. At other times, it is much more recent or even contemporary. It is never older than the classical period. An illustration The French œil, Italian occhio, Spanish ojo, and Portuguese olho appear quite different, but they descend from a historical form oculus. German Auge, Dutch oog and English eye (cf. Czech and Polish oko, Russian and Ukrainian око (óko)) are related to this form in that all three descend from Proto-Indo-European *okʷ. In addition, international derivatives like ocular and oculista occur in all of Interlingua's control languages. Each of these forms contributes to the eligibility of the Interlingua word. German and English base words do not influence the form of the Interlingua word, because their Indo-European connection is considered too remote. Instead, the remaining base words and especially the derivatives determine the form oculo found in Interlingua. Free word-building Words can also be included in Interlingua by deriving them using Interlingua words and affixes; a method called free word-building. Thus, in the Interlingua-English Dictionary (IED), Alexander Gode followed the principle that every word listed is accompanied by all of its clear compounds and derivatives, along with the word or words it is derived from. A reader skimming through the IED notices many entries followed by large groups of derived and compound words. A good example is the Interlingua word nation, which is followed by national, nationalismo, nationalista, nationalitate, nationalisar, international, internationalitate, and many other words. Other words in the IED do not have derivatives listed. Gode saw these words as potential word families. Although all derived words in the IED are found in at least one control language, speakers may make free use of Interlingua roots and affixes. For example, jada (jade) can be used to form jadificar, (to jadify, make into jade, make look like jade), jadification, and so on. These word forms would be impermissible in English but would be good Interlingua. Word-building by analogy Gode and Hugh E. Blair explained in the Interlingua Grammar that the basic principle of practical word-building is analogical. If a pattern can be found in the existing international vocabulary, new words can be formed according to that pattern. A meaning of the suffix -ista is person who practices the art or science of.... This suffix allows the derivation of biologista from biologia, physicista from physica, and so on. An Interlingua speaker can freely form saxophonista from saxophone and radiographista from radiographia by following the same pattern. Usefulness and clarity As noted above, the only limits to free word-building in Interlingua are clarity and usefulness. These concepts are touched upon here: Any number of words could be formed by stringing roots and affixes together, but some would be more useful than others. For example, the English word rainer means a person who rains, but most people would be surprised that it is included in English dictionaries. The corresponding Interlingua word pluviator is unlikely to appear in a dictionary because of its lack of utility. Interlingua, like any traditional language, could build up large numbers of these words, but this would be undesirable. Gode stressed the principle of clarity in free word-building. As Gode noted, the noun marinero (mariner) can be formed from the adjective marin, because its meaning is clear. The noun marina meaning navy cannot be formed, because its meaning would not be clear from the adjective and suffix that gave rise to it. Grammar Interlingua has been developed to omit any grammatical feature that is absent from any one primary control language. Thus, Interlingua has no noun–adjective agreement by gender, case, or number (cf. Spanish and Portuguese gatas negras or Italian gatte nere, 'black female cats'), because this is absent from English, and it has no progressive verb tenses (English I am reading), because they are absent from French. Conversely, Interlingua distinguishes singular nouns from plural nouns because all the control languages do. With respect to the secondary control languages, Interlingua has articles, unlike Russian. The definite article le is invariable, as in English. Nouns have no grammatical gender. Plurals are formed by adding -s, or -es after a final consonant. Personal pronouns take one form for the subject and one for the direct object and reflexive. In the third person, the reflexive is always se. Most adverbs are derived regularly from adjectives by adding -mente, or -amente after a -c. An adverb can be formed from any adjective in this way. Verbs take the same form for all persons (io vive, tu vive, illa vive, 'I live', 'you live', 'she lives'). The indicative (pare, 'appear', 'appears') is the same as the imperative (pare! 'appear!'), and there is no subjunctive. Three common verbs usually take short forms in the present tense: es for 'is', 'am', 'are;' ha for 'has', 'have;' and va for 'go', 'goes'. A few irregular verb forms are available, but rarely used. There are four simple tenses (present, past, future, and conditional), three compound tenses (past, future, and conditional), and the passive voice. The compound structures employ an auxiliary plus the infinitive or the past participle (e.g., Ille ha arrivate, 'He has arrived'). Simple and compound tenses can be combined in various ways to express more complex tenses (e.g., Nos haberea morite, 'We would have died'). Word order is subject–verb–object, except that a direct object pronoun or reflexive pronoun comes before the verb (io les vide, 'I see them'). Adjectives may precede or follow the nouns they modify, but they most often follow it. The position of adverbs is flexible, though constrained by common sense. The grammar of Interlingua has been described as similar to that of the Romance languages, but greatly simplified, primarily under the influence of English. More recently, Interlingua's grammar has been likened to the simple grammars of Japanese and particularly Chinese. Reception Critics argue that, being based on a few European languages, Interlingua is suitable only for speakers of European languages. Others contend that Interlingua has spelling irregularities that, while internationally recognizable in written form, increase the time needed to fully learn the language, especially for those unfamiliar with Indo-European languages. Proponents argue that Interlingua's source languages include not only Romance languages but English, German, and Russian as well. Moreover, the source languages are widely spoken, and large numbers of their words also appear in other languages – still more when derivative forms and loan translations are included. Tests had shown that if a larger number of source languages were used, the results would be about the same. Samples From an essay by Alexander Gode: Interlingua has detached itself from the movement for the development and introduction of a universal language for all humanity. Whether or not one believes that a language for all humanity is possible, whether or not one believes that Interlingua will become such a language is totally irrelevant from the point of view of Interlingua itself. The only fact that matters (from the point of view of Interlingua itself) is that Interlingua, thanks to its ambition of reflecting the cultural and thus linguistic homogeneity of the West, is capable of rendering tangible services at this precise moment in the history of the world. It is by its present contributions and not by the promises of its adherents that Interlingua wishes to be judged. Flags and symbols As with Esperanto, there have been proposals for a flag of Interlingua; the proposal by Czech translator Karel Podrazil is recognized by multilingual sites. It consists of a white four-pointed star extending to the edges of the flag and dividing it into an upper blue and lower red half. The star is symbolic of the four cardinal directions, and the two halves symbolize Romance and non-Romance speakers of Interlingua who understand each other. Another symbol of Interlingua is the Blue Marble surrounded by twelve stars on a black or blue background, echoing the twelve stars of the Flag of Europe (because the source languages of Interlingua are purely European). See also Comparisons with other languages Comparison between Esperanto and Interlingua Comparison between Ido and Interlingua Comparison between Interlingue and Interlingua Publications Grammatica de Interlingua Interlingua, Instrumento Moderne de Communication International (course manual) Interlingua dictionaries Vocabulary Classical compound Hybrid word Internationalism (linguistics) List of Greek and Latin roots in English Medical terminology Irregularities and exceptions in Interlingua Willem Jacob Visser References Sources Falk, Julia S. Women, Language and Linguistics: Three American stories from the first half of the twentieth century. Routledge, London & New York: 1999. Gode, Alexander, et al. Interlingua-English: a dictionary of the international language. Storm Publishers, New York, 1951 Gopsill, F.P. Le historia antenatal de Interlingua.. (In Interlingua.) Accessed 28 May 2005. International Auxiliary Language Association (IALA). General Report. IALA, New York: 1945. Pei, Mario. One Language for the World and How To Achieve It. Devin-Adair, New York; 1958. Brian C. Sexton, Karel Wilgenhoff, and F. Peter Gopsill. Supplementary Interlingua-English Dictionary. British Interlingua Society, Sheffield, 1991 Union Mundial pro Interlingua (UMI). Interlingua 2001: communication sin frontieras durante 50 annos (in Interlingua). Accessed 17 August 2006. External links Collection of links to Interlingua resources Word Building, in A Grammar of Interlingua by Alexander Gode and Hugh E. Blair, IALA, 1951. Formation de parolas in Interlingua (PDF), by Ingvar Stenström, Swedish Society for Interlingua. (In Interlingua) International auxiliary languages Constructed languages Fusional languages Constructed languages introduced in the 1950s 1951 introductions Romance languages
[ -0.2917238473892212, 0.02340199239552021, -0.34922781586647034, -0.14759087562561035, -0.21872957050800323, 0.9869400858879089, 0.35515064001083374, 0.7622467875480652, -0.19514763355255127, -0.6349309086799622, 0.2509554624557495, 0.27234703302383423, -0.35033896565437317, -0.004784805700...
15102
https://en.wikipedia.org/wiki/Isle%20of%20Wight
Isle of Wight
The Isle of Wight () is a county and the largest and second-most populous island of England. It is in the English Channel, between two and five miles off the coast of Hampshire, from which it is separated by the Solent. Referred to as 'The Island' by residents. The island has resorts that have been holiday destinations since Victorian times, and is known for its mild climate, coastal scenery, and verdant landscape of fields, downland and chines. The island is historically part of Hampshire, and is designated a UNESCO Biosphere Reserve. The island has been home to the poets Algernon Charles Swinburne and Alfred, Lord Tennyson and to Queen Victoria, who built her much-loved summer residence and final home Osborne House at East Cowes. It has a maritime and industrial tradition including boat-building, sail-making, the manufacture of flying boats, hovercraft, and Britain's space rockets. The island hosts annual music festivals including the Isle of Wight Festival, which in 1970 was the largest rock music event ever held. It has well-conserved wildlife and some of the richest cliffs and quarries for dinosaur fossils in Europe. The island has played an important part in the defence of the ports of Southampton and Portsmouth, and been near the front-line of conflicts through the ages, including the Spanish Armada and the Battle of Britain. Rural for most of its history, its Victorian fashionability and the growing affordability of holidays led to significant urban development during the late 19th and early 20th centuries. Historically part of Southampton, the island became a separate administrative county in 1890. It continued to share the Lord Lieutenant of Hampshire until 1974, when it was made its own ceremonial county. Apart from a shared police force and fire and rescue service, and the island's Anglican churches belonging to the Diocese of Portsmouth (originally Winchester), there is now no administrative link with Hampshire; although a combined local authority with Portsmouth and Southampton was considered, this is now unlikely to proceed. The quickest public transport link to the mainland is the hovercraft (Hovertravel) from Ryde to Southsea; three vehicle ferry and two catamaran services cross the Solent to Southampton, Lymington and Portsmouth via the islands largest ferry operator, Wightlink, and the islands second largest ferry company, Red Funnel. The island is a centre for tourism and attracts over two million visitors every year. Toponymy The oldest records that give a name for the Isle of Wight are from the Roman Empire: it was then called Vectis or Vecta in Latin, Iktis or Ouiktis in Greek. From the Anglo-Saxon period Latin Vecta, Old English Wiht and Old Welsh forms Gueid and Guith are recorded. In Domesday Book it is Wit; the modern Welsh name is Ynys Wyth (ynys = island). These are all variant forms of the same name, possibly Celtic in origin. It may mean "place of the division", because the island divides the two arms of the Solent. History Pre-Bronze Age During Pleistocene glacial periods, sea levels were lower and the present day Solent was part of the valley of the Solent River. The river flowed eastward from Dorset, following the course of the modern Solent strait, before travelling south and southwest towards the major Channel River system. At these times extensive gravel terraces associated with the Solent River and the forerunners of the island's modern rivers were deposited. During warmer interglacial periods silts, beach gravels, clays and muds of marine and estuarine origin were deposited as a result of higher sea levels, similar to those experienced today. The earliest clear evidence of Lower Palaeolithic archaic human occupation on what is now the Isle of Wight is found close to Priory Bay. Here more than 300 acheulean handaxes have been recovered from the beach and cliff slopes, originating from a sequence of Pleistocene gravels dating approximately to MIS 11-MIS 9 (424,000–374,000 years ago). Reworked and abraded artefacts found at the site may be considerably older however and closer to 500,000 years old. The identity of the hominids who produced these tools is unknown, but sites and fossils of the same age range in Europe are often attributed to Homo heidelbergensis or early populations of Neanderthals. A Middle Palaeolithic Mousterian flint assemblage, consisting of 50 handaxes and debitage has been recovered from Great Pan Farm in the Medina Valley near Newport. Gravel sequences at the site have been dated to the MIS3 interstadial, during the last glacial period (c.50,000 years ago). These tools are associated with late Neanderthal occupation, and evidence of late Neanderthal presence is seen across Britain at this time. No major evidence of Upper Palaeolithic activity exists on the Isle of Wight. This period is associated with the expansion and establishment of populations of modern human (Homo sapiens) hunter-gatherers in Europe, beginning c.45,000 years ago. Evidence of late Upper Palaeolithic activity has however been identified at nearby sites on the mainland, notably Hengistbury Head in Dorset, dating to just prior to onset of the Holocene and the end of the last glacial period. A submerged escarpment 11m below sea level off Bouldnor Cliff on the island's northwest coastline is home to an internationally significant mesolithic archaeological site. The site has yielded evidence of seasonal occupation by mesolithic hunter-gatherers dating to c.6050 BC. Finds include flint tools, burnt flint, worked timbers, wooden platforms and pits. The worked wood shows evidence of the splitting of large planks from oak trunks, interpreted as being intended for use as dug-out canoes. DNA analysis of sediments at the site yielded wheat DNA, not found in Britain until the Neolithic 2000 years after the occupation at Bouldnor Cliff. It has been suggested this is evidence of wide-reaching trade in mesolithic Europe, however the contemporaneity of the wheat with the Mesolithic occupation has been contested. When hunter-gatherers used the site it was located on a river bank surrounded by wetland and woodland. As sea levels rose throughout the Holocene the river valley slowly flooded, submerging the site. Evidence of mesolithic occupation on the island is generally found along the river valleys, particularly along the north of the Island, and in the former catchment of the western Yar. Further key sites are found at Newtown Creek, Werrar and Wootton-Quarr. Neolithic occupation on the Isle of Wight is primarily attested to by flint tools and monuments. Unlike the previous mesolithic hunter-gatherer population Neolithic communities on the Isle of Wight were based on farming and linked to a migration of Neolithic populations from France and northwest Europe to Britain c.6000 years ago. The Isle of Wight's most visible Neolithic site is the Longstone at Mottistone, the remains of an early Neolithic long-barrow originally constructed with two standing stones at the entrance. Only one stone remains standing today. A Neolithic mortuary enclosure has been identified on Tennyson Down near Freshwater. Bronze and Iron Age Bronze Age Britain had large reserves of tin in the areas of Cornwall and Devon and tin is necessary to smelt bronze. At that time the sea level was much lower and carts of tin were brought across the Solent at low tide for export, possibly on the Ferriby Boats. Anthony Snodgrass suggests that a shortage of tin, as a part of the Bronze Age Collapse and trade disruptions in the Mediterranean around 1300 BC, forced metalworkers to seek an alternative to bronze. From the 7th century BC, during Iron Age Britain, the Late Iron Age, the Isle of Wight. like the rest of Great Britain, was occupied by the Celtic Britons, in the form of the Durotriges tribe – as attested by finds of their coins, for example, the South Wight Hoard, and the Shalfleet Hoard. The island was known as Ynys Weith in Brittonic Celtic. South eastern Britain experienced significant immigration that is reflected in the genetic makeup of the current residents. As the Iron Age began the value of tin likely dropped sharply and this likely greatly changed the economy of the Isle of Wight. Trade however continued as evidenced by the remarkable local abundance of European Iron Age coins. Roman period Julius Caesar reported that the Belgae took the Isle of Wight in about 85 BC, and recognised the culture of this general region as "Belgic", but made no reference to Vectis. The Roman historian Suetonius mentions that the island was captured by the commander Vespasian. The Romans built no towns on the island, but the remains of at least seven Roman villas have been found, indicating the prosperity of local agriculture. First-century exports were principally hides, slaves, hunting dogs, grain, cattle, silver, gold, and iron. Early Medieval period Starting in AD 449, the 5th and 6th centuries saw groups of Germanic speaking peoples from Northern Europe crossing the English Channel and gradually set about conquering the region. Bede's (731) Historia ecclesiastica gentis Anglorum identifies the Jutes from what is today Denmark as the main settlers of the Isle of Wight, conquering Ynys Weith from the Brittonic Celts in approximately 530 AD. From then onwards, there are indications that the island had wide trading links, with a port at Bouldnor, evidence of Bronze Age tin trading, and finds of Late Iron Age coins. During the Dark Ages the island was settled by Jutes as the pagan kingdom of Wihtwara under King Arwald. In 685 it was invaded by King Cædwalla of Wessex who tried to replace the inhabitants with his own followers. Though in 686 Arwald was defeated and the island became the last part of English lands to be converted to Christianity, Cædwalla was unsuccessful in driving the Jutes from the island. Wight was then added to Wessex and became part of England under King Alfred the Great, included within the shire of Hampshire. It suffered especially from Viking raids, and was often used as a winter base by Viking raiders when they were unable to reach Normandy. Later, both Earl Tostig and his brother Harold Godwinson (who became King Harold II) held manors on the island. Norman Conquest – 19th century The Norman Conquest of 1066 created the position of Lord of the Isle of Wight; the island was given by William the Conqueror to his kinsman William FitzOsbern. Carisbrooke Priory and the fort of Carisbrooke Castle were then founded. Allegiance was sworn to FitzOsbern rather than the king; the Lordship was subsequently granted to the de Redvers family by Henry I, after his succession in 1100. For nearly 200 years the island was a semi-independent feudal fiefdom, with the de Redvers family ruling from Carisbrooke. The final private owner was the Countess Isabella de Fortibus, who, on her deathbed in 1293, was persuaded to sell it to Edward I. Thereafter the island was under control of the English Crown and its Lordship a royal appointment. The island continued to be attacked from the continent: it was raided in 1374 by the fleet of Castile, and in 1377 by French raiders who burned several towns, including Newtown. Under Henry VIII, who developed the Royal Navy and its Portsmouth base, the island was fortified at Yarmouth, Cowes, East Cowes, and Sandown. The French invasion on 21 July 1545 (famous for the sinking of the Mary Rose on the 19th) was repulsed by local militia. During the English Civil War, King Charles I fled to the Isle of Wight, believing he would receive sympathy from the governor Robert Hammond, but Hammond imprisoned the king in Carisbrooke Castle. During the Seven Years' War, the island was used as a staging post for British troops departing on expeditions against the French coast, such as the Raid on Rochefort. During 1759, with a planned French invasion imminent, a large force of soldiers was stationed there. The French called off their invasion following the Battle of Quiberon Bay. 19th century – present In the 1860s, what remains in real terms the most expensive ever government spending project saw fortifications built on the island and in the Solent, as well as elsewhere along the south coast, including the Palmerston Forts, The Needles Batteries and Fort Victoria, because of fears about possible French invasion. The future Queen Victoria spent childhood holidays on the island and became fond of it. When queen she made Osborne House her winter home, and so the island became a fashionable holiday resort, including for Alfred, Lord Tennyson, Julia Margaret Cameron, and Charles Dickens (who wrote much of David Copperfield there), as well as the French painter Berthe Morisot and members of European royalty. Until the queen's example, the island had been rural, with most people employed in farming, fishing or boat-building. The boom in tourism, spurred by growing wealth and leisure time, and by Victoria's presence, led to significant urban development of the island's coastal resorts. As one report summarizes, "The Queen’s regular presence on the island helped put the Isle of Wight 'on the map' as a Victorian holiday and wellness destination ... and her former residence Osborne House is now one of the most visited attractions on the island While on the island, the queen used a bathing machine that could be wheeled into the water on Osborne Beach; inside the small wooden hut she could undress and then bathe, without being visible to others. Her machine had a changing room and a WC with plumbing. The refurbished machine is now displayed at the beach. On 14 January 1878, Alexander Graham Bell demonstrated an early version of the telephone to the queen, placing calls to Cowes, Southampton and London. These were the first publicly-witnessed long distance telephone calls in the UK. The queen tried the device and considered the process to be "quite extraordinary" although the sound was "rather faint". She later asked to buy the equipment that was used, but Bell offered to make "a set of telephones" specifically for her. The world's first radio station was set up by Guglielmo Marconi in 1897, during her reign, at the Needles Battery, at the western tip of the island. A high mast was erected near the Royal Needles Hotel, as part of an experiment of communicating with ships at sea. That location is now the site of the Marconi Monument. In 1898 the first paid wireless telegram (called a "Marconigram") was sent from this station, and the island was for some time the home of the National Wireless Museum, near Ryde. Queen Victoria died at Osborne House on 22 January 1901, at the age of 81. During the Second World War the island was frequently bombed. With its proximity to German-occupied France, the island hosted observation stations and transmitters, as well as the RAF radar station at Ventnor. It was the starting-point for one of the earlier Operation Pluto pipelines to feed fuel to Europe after the Normandy landings. The Needles Battery was used to develop and test the Black Arrow and Black Knight space rockets, which were subsequently launched from Woomera, Australia. The Isle of Wight Festival was a very large rock festival that took place near Afton Down, West Wight in August 1970, following two smaller concerts in 1968 and 1969. The 1970 show was notable both as one of the last public performances by Jimi Hendrix and for the number of attendees, reaching by some estimates 600,000. The festival was revived in 2002 in a different format, and is now an annual event. On 26 October 2020 an oil tanker the Nave Andromeda, suspected to have been hijacked by Nigerian stowaways, was stormed south east of the island by the Special Boat Service. Seven people believed to be Nigerians seeking UK asylum were handed over to Hampshire Police. Governance The island has a single Member of Parliament. The Isle of Wight constituency covers the entire island, with 138,300 permanent residents in 2011, being one of the most populated constituencies in the United Kingdom (more than 50% above the English average). In 2011 following passage of the Parliamentary Voting System and Constituencies Act, the Sixth Periodic Review of Westminster constituencies was to have changed this, but this was deferred to no earlier than October 2022 by the Electoral Registration and Administration Act 2013. Thus the single constituency remained for the 2015, 2017 and 2019 general elections. However, two separate East and West constituencies are proposed for the island under the 2022 review now under way. The Isle of Wight is a ceremonial and non-metropolitan county. Since the abolition of its two borough councils and restructuring of the Isle of Wight County Council into the new Isle of Wight Council in 1995, it has been administered by a single unitary authority. Elections in the constituency have traditionally been a battle between the Conservatives and the Liberal Democrats. Andrew Turner of the Conservative Party gained the seat from Peter Brand of the Lib Dems at the 2001 general election. Since 2009, Turner was embroiled in controversy over his expenses, health, and relationships with colleagues, with local Conservatives having tried but failed to remove him in the runup to the 2015 general election. He stood down prior to the 2017 snap general election, and the new Conservative Party candidate Bob Seely was elected with a majority of 21,069 votes. At the Isle of Wight Council election of 2013, the Conservatives lost the majority which they had held since 2005 to the Island Independents, with Island Independent councillors holding 16 of the 40 seats, and a further five councillors sitting as independents outside the group. The Conservatives regained control, winning 10 more seats and taking their total to 25 at the 2017 local election, before losing 7 seats in 2021. A coalition entitled the Alliance Coalition was formed between independent, Green Party and Our Island councillors, with independent councillor Lora Peacey-Wilcox leading the council since May 2021. There have been small regionalist movements: the Vectis National Party and the Isle of Wight Party; but they have attracted little support at elections. Geography The Isle of Wight is situated between the Solent and the English Channel, is roughly rhomboid in shape, and covers an area of . Slightly more than half, mainly in the west, is designated as the Isle of Wight Area of Outstanding Natural Beauty. The island has of farmland, of developed areas, and of coastline. Its landscapes are diverse, leading to its oft-quoted description as "England in miniature". In June 2019 the whole island was designated a UNESCO Biosphere Reserve, recognising the sustainable relationships between its residents and the local environment. West Wight is predominantly rural, with dramatic coastlines dominated by the chalk downland ridge, running across the whole island and ending in the Needles stacks. The southwestern quarter is commonly referred to as the Back of the Wight, and has a unique character. The highest point on the island is St Boniface Down in the south east, which at is a marilyn. The most notable habitats on the rest of the island are probably the soft cliffs and sea ledges, which are scenic features, important for wildlife, and internationally protected. The island has three principal rivers. The River Medina flows north into the Solent, the Eastern Yar flows roughly northeast to Bembridge Harbour, and the Western Yar flows the short distance from Freshwater Bay to a relatively large estuary at Yarmouth. Without human intervention the sea might well have split the island into three: at the west end where a bank of pebbles separates Freshwater Bay from the marshy backwaters of the Western Yar east of Freshwater, and at the east end where a thin strip of land separates Sandown Bay from the marshy Eastern Yar basin. The Undercliff between St Catherine's Point and Bonchurch is the largest area of landslip morphology in western Europe. The north coast is unusual in having four high tides each day, with a double high tide every twelve and a half hours. This arises because the western Solent is narrower than the eastern; the initial tide of water flowing from the west starts to ebb before the stronger flow around the south of the island returns through the eastern Solent to create a second high water. Geology The Isle of Wight is made up of a variety of rock types dating from early Cretaceous (around 127 million years ago) to the middle of the Palaeogene (around 30 million years ago). The geological structure is dominated by a large monocline which causes a marked change in age of strata from the northern younger Tertiary beds to the older Cretaceous beds of the south. This gives rise to a dip of almost 90 degrees in the chalk beds, seen best at the Needles. The northern half of the island is mainly composed of clays, with the southern half formed of the chalk of the central east–west downs, as well as Upper and Lower Greensands and Wealden strata. These strata continue west from the island across the Solent into Dorset, forming the basin of Poole Harbour (Tertiary) and the Isle of Purbeck (Cretaceous) respectively. The chalky ridges of Wight and Purbeck were a single formation before they were breached by waters from the River Frome during the last ice age, forming the Solent and turning Wight into an island. The Needles, along with Old Harry Rocks on Purbeck, represent the edges of this breach. All the rocks found on the island are sedimentary, such as limestones, mudstones and sandstones. They are rich in fossils; many can be seen exposed on beaches as the cliffs erode. Lignitic coal is present in small quantities within seams, and can be seen on the cliffs and shore at Whitecliff Bay. Fossilised molluscs have been found there, and also on the northern coast along with fossilised crocodiles, turtles and mammal bones; the youngest date back to around 30 million years ago. The island is one of the most important areas in Europe for dinosaur fossils. The eroding cliffs often reveal previously hidden remains, particularly along the Back of the Wight. Dinosaur bones and fossilised footprints can be seen in and on the rocks exposed around the island's beaches, especially at Yaverland and Compton Bay, from the strata of the Wessex Formation. As a result, the island has been nicknamed "Dinosaur Island" and Dinosaur Isle was established in 2001. The area was affected by sea level changes during the repeated Quaternary glaciations. The island probably became separated from the mainland about 125,000 years ago, during the Ipswichian interglacial. Climate Like the rest of the UK, the island has an oceanic climate, but is somewhat milder and sunnier, which makes it a holiday destination. It also has a longer growing season. Lower Ventnor and the neighbouring Undercliff have a particular microclimate, because of their sheltered position south of the downs. The island enjoys 1,800–2,100 hours of sunshine a year. Some years have almost no snow in winter, and only a few days of hard frost. The island is in Hardiness zone 9. Flora and fauna The Isle of Wight is one of the few places in England where the red squirrel is still flourishing; no grey squirrels are to be found. There are occasional sightings of wild deer, and there is a colony of wild goats on Ventnor's downs. Protected species such as the dormouse and rare bats can be found. The Glanville fritillary butterfly's distribution in the United Kingdom is largely restricted to the edges of the island's crumbling cliffs. A competition in 2002 named the pyramidal orchid as the Isle of Wight's county flower. Settlements Newport is the centrally located county town, with a population of about 25,000 and the island's main shopping area. Located next to the River Medina, Newport Quay was a busy port until the mid-19th century. Ryde, the largest town with a population of about 30,000, is in the northeast. It is Victorian with the oldest seaside pier in England and miles of sandy and pebble beaches. Cowes hosts the annual Cowes Week and is an international sailing centre. East Cowes is famous for Osborne House, Norris Castle and as the home from 1929 to 1964 of Saunders-Roe, the historic aircraft, flying boat, rocket and hovercraft company. Sandown is a popular seaside resort. It is home to the Isle of Wight Zoo, the Dinosaur Isle geological museum and one of the island's two 18-hole golf courses. Shanklin, just south of Sandown, attracts tourists with its high summer sunshine levels, sandy beaches, Shanklin Chine and the old village. Ventnor, built on the steep slopes of St Boniface Down on the south coast of the island, leads down to a picturesque bay that attracts many tourists. Ventnor Haven is a small harbour. Economy Socio-economic data The table below shows the regional gross value (in millions of pounds) added by the Isle of Wight economy, at current prices, compiled by the Office for National Statistics. According to the 2011 census, the island's population of 138,625 lives in 61,085 households, giving an average household size of 2.27 people. 41% of households own their home outright and a further 29% own with a mortgage, so in total 70% of households are owned (compared to 68% for South East England). Compared to South East England, the island has fewer children (19% aged 0–17 against 22% for the South East) and more elderly (24% aged 65+ against 16%), giving an average age of 44 years for an island resident compared to 40 in South East England. Industry and agriculture The largest industry is tourism, but the island also has a strong agricultural heritage, including sheep and dairy farming and arable crops. Traditional agricultural commodities are more difficult to market off the island because of transport costs, but local farmers have succeeded in exploiting some specialist markets, with the higher price of such products absorbing the transport costs. One of the most successful agricultural sectors is now the growing of crops under cover, particularly salad crops including tomatoes and cucumbers. The island has a warmer climate and a longer growing season than much of the United Kingdom. Garlic has been successfully grown in Newchurch for many years, and is even exported to France. This has led to the establishment of an annual Garlic Festival at Newchurch, which is one of the largest events of the local calendar. A favourable climate supports two vineyards, including one of the oldest in the British Isles at Adgestone. Lavender is grown for its oil. The largest agricultural sector has been dairying, but due to low milk prices and strict legislation for UK milk producers, the dairy industry has been in decline: there were nearly 150 producers in the mid-1980s, but now just 24. Maritime industries, especially the making of sailcloth and boat building, have long been associated with the island, although this has diminished somewhat in recent years. GKN operates what began as the British Hovercraft Corporation, a subsidiary of (and known latterly as) Westland Aircraft, although they have reduced the extent of plant and workforce and sold the main site. Previously it had been the independent company Saunders-Roe, one of the island's most notable historic firms that produced many flying boats and the world's first hovercraft. Another manufacturing activity is in composite materials, used by boat-builders and the wind turbine manufacturer Vestas, which has a wind turbine blade factory and testing facilities in West Medina Mills and East Cowes. Bembridge Airfield is the home of Britten-Norman, manufacturers of the Islander and Trislander aircraft. This is shortly to become the site of the European assembly line for Cirrus light aircraft. The Norman Aeroplane Company is a smaller aircraft manufacturing company operating in Sandown. There have been three other firms that built planes on the island. In 2005, Northern Petroleum began exploratory drilling for oil at its Sandhills-2 borehole at Porchfield, but ceased operations in October that year after failing to find significant reserves. Breweries There are three breweries on the island. Goddards Brewery in Ryde opened in 1993. David Yates, who was head brewer of the Island Brewery, started brewing as Yates Brewery at the Inn at St Lawrence in 2000. Ventnor Brewery, which closed in 2009, was the last incarnation of Burt's Brewery, brewing since the 1840s in Ventnor. Until the 1960s most pubs were owned by Mews Brewery, situated in Newport near the old railway station, but it closed and the pubs were taken over by Strong's, and then by Whitbread. By some accounts Mews beer was apt to be rather cloudy and dark. In the 19th century they pioneered the use of screw top cans for export to British India. Services Tourism and heritage The island's heritage is a major asset that has for many years supported its tourist economy. Holidays focused on natural heritage, including wildlife and geology, are becoming an alternative to the traditional British seaside holiday, which went into decline in the second half of the 20th century due to the increased affordability of foreign holidays. The island is still an important destination for coach tours from other parts of the United Kingdom. Tourism is still the largest industry, and most island towns and villages offer hotels, hostels and camping sites. In 1999, it hosted 2.7 million visitors, with 1.5 million staying overnight, and 1.2 million day visits; only 150,000 of these were from abroad. Between 1993 and 2000, visits increased at an average rate of 3% per year. At the turn of the 19th century the island had ten pleasure piers, including two at Ryde and a "chain pier" at Seaview. The Victoria Pier in Cowes succeeded the earlier Royal Pier but was itself removed in 1960. The piers at Ryde, Seaview, Sandown, Shanklin and Ventnor originally served a coastal steamer service that operated from Southsea on the mainland. The piers at Seaview, Shanklin, Ventnor and Alum Bay were all destroyed by various storms during the 20th century; only the railway pier at Ryde and the piers at Sandown, Totland Bay (currently closed to the public) and Yarmouth survive. Blackgang Chine is the oldest theme park in Britain, opened in 1843. The skeleton of a dead whale that its founder Alexander Dabell found in 1844 is still on display. As well as its more traditional attractions, the island is often host to walking or cycling holidays through the attractive scenery. An annual walking festival has attracted considerable interest. The Isle of Wight Coastal Path follows the coastline as far as possible, deviating onto roads where the route along the coast is impassable. The tourist board for the island is Visit Isle of Wight, a not for profit company. It is the Destination Management Organisation for the Isle of Wight, a public and private sector partnership led by the private sector, and consists of over 1,200 companies, including the ferry operators, the local bus company, rail operator and tourism providers working together to collectively promote the island. Its income is derived from the Wight BID, a business improvement district levy fund. A major contributor to the local economy is sailing and marine-related tourism. Summer Camp at Camp Beaumont is an attraction at the old Bembridge School site. Media The main local newspaper is the Isle of Wight County Press, published most Fridays. The Island's leading news website, Island Echo, was launched in May 2012 and now publishes in excess of 5,000 news articles a year. Other online news sources for the Isle of Wight include On the Wight. The island has a local commercial radio station and a community radio station: commercial station Isle of Wight Radio has broadcast in the medium-wave band since 1990 and on 107.0 MHz (with three smaller transmitters on 102.0 MHz) FM since 1998, as well as streaming on the Internet. Community station Vectis Radio has broadcast online since 2010, and in 2017 started broadcasting on FM 104.6. The station operates from the Riverside Centre in Newport. The island is also covered by a number of local stations on the mainland, including the BBC station BBC Radio Solent broadcast from Southampton. The island's not-for-profit community radio station Angel Radio opened in 2007. Angel Radio began broadcasting on 91.5 MHz from studios in Cowes and a transmitter near Newport. The island has had community television stations in the past, first TV12 and then Solent TV from 2002 until its closure on 24 May 2007. iWight.tv is a local internet video news channel. The Isle of Wight is part of the BBC South region and the ITV Meridian region. Important broadcasting infrastructure includes Chillerton Down transmitting station with a mast that is the tallest structure on the island, and Rowridge transmitting station, which broadcasts the main television signal both locally and for most of Hampshire and parts of Dorset and West Sussex. Culture Language and dialect The local accent is similar to the traditional dialect of Hampshire, featuring the dropping of some consonants and an emphasis on longer vowels. It is similar to the West Country dialects heard in South West England, but less pronounced. The island has its own local and regional words. Some, such as nipper/nips (a young male person), are still commonly used and are shared with neighbouring areas of the mainland. A few are unique to the island, for example overner and caulkhead (see below). Others are more obscure and now used mainly for comic emphasis, such as mallishag (meaning "caterpillar"), gurt meaning "large", nammit (a mid-morning snack) and gallybagger ("scarecrow", and now the name of a local cheese). [[File:Bonchurch, near Ventnor, Isle of Wight.jpg|thumb|Henry Bates Joel's 1895 artwork 'Bonchurch, near Ventnor, Isle of Wight''' is a depiction of rural life on the island. It is exhibited in the Milntown Estate. ]] Identity There remains occasional confusion between the Isle of Wight as a county and its former position within Hampshire. The island was regarded and administered as a part of Hampshire until 1890, when its distinct identity was recognised with the formation of Isle of Wight County Council (see also Politics of the Isle of Wight). However, it remained a part of Hampshire until the local government reforms of 1974 when it became a full ceremonial county with its own Lord Lieutenant. In January 2009, the first general flag for the county was accepted by the Flag Institute. Island residents are sometimes referred to as "Vectensians", "Vectians" or, if born on the island, "caulkheads". One theory is that this last comes from the once prevalent local industry of caulking or sealing wooden boats; the term became attached to islanders either because they were so employed, or as a derisory term for perceived unintelligent labourers from elsewhere. The term "overner" is used for island residents originating from the mainland (an abbreviated form of "overlander", which is an archaic term for "outsider" still found in parts of Australia). Residents refer to the island as "The Island", as did Jane Austen in Mansfield Park, and sometimes to the UK mainland as "North Island". To promote the island's identity and culture, the High Sheriff Robin Courage founded an Isle of Wight Day; the first was held on Saturday 24 September 2016. Sport Sport plays a key part of culture on the Isle of Wight. Sports include golf, marathon, cycling and sailing. Music The island is home to the Isle of Wight Festival and until 2016, Bestival before it was relocated to Lulworth Estate in Dorset. In 1970, the festival was headlined by Jimi Hendrix attracting an audience of 600,000, some six times the local population at the time. It is the home of the bands The Bees, Trixie's Big Red Motorbike, Level 42, and Wet Leg. Landmarks Transport The Isle of Wight has of roadway. It does not have a motorway, although there is a short stretch of dual carriageway towards the north of Newport near the hospital and prison. A comprehensive bus network operated by Southern Vectis links most settlements, with Newport as its central hub. Journeys away from the island involve a ferry journey. Car ferry and passenger catamaran services are run by Wightlink and Red Funnel, and a hovercraft passenger service (the only such remaining in the world) by Hovertravel. The island formerly had its own railway network of over , but only one line remains in regular use. The Island Line is part of the United Kingdom's National Rail network, running a little under from to , where there is a connecting ferry service to station on the mainland network. The line was opened by the Isle of Wight Railway in 1864, and from 1996 to 2007 was run by the smallest train operating company on the network, Island Line Trains. It is notable for utilising old ex-London Underground rolling stock, due to the small size of its tunnels and unmodernised signalling. Branching off the Island Line at is the heritage Isle of Wight Steam Railway, which runs for to the outskirts of on the former line to Newport. There are two airfields for general aviation, Isle of Wight Airport at Sandown and Bembridge Airport. The island has over of cycleways, many of which can be enjoyed off-road. The principal trails are: The Sunshine Trail, which is a circular route linking Sandown, Shanklin, Godshill, and Wroxall of ; The Red Squirrel Trail, a track between Cowes and Sandown that is in total; The Round the Island Cycle Route of . Prisons The Isle of Wight is near the densely populated south of England, yet separated from the mainland. This position led to it hosting three prisons: Albany, Camp Hill and Parkhurst, all located outside Newport near the main road to Cowes. Albany and Parkhurst were among the few Category A prisons in the UK until they were downgraded in the 1990s. The downgrading of Parkhurst was precipitated by a major escape: three prisoners (two murderers and a blackmailer) escaped from the prison on 3 January 1995 for four days, before being recaptured. Parkhurst enjoyed notoriety as one of the toughest jails in the United Kingdom, and housed many notable inmates including the Yorkshire Ripper Peter Sutcliffe, New Zealand drug lord Terry Clark and the Kray twins. Camp Hill is located adjacent but to the west of Albany and Parkhurst, on the very edge of Parkhurst Forest, having been converted first to a borstal and later to a Category C prison. It was built on the site of an army camp (both Albany and Parkhurst were barracks); there is a small estate of tree-lined roads with the former officers' quarters (now privately owned) to the south and east. Camp Hill closed as a prison in March 2013. The management of all three prisons was merged into a single administration, under HMP Isle of Wight in April 2009. Education There are 69 local education authority-maintained schools on the Isle of Wight, and two independent schools. As a rural community, many of these are small and with fewer pupils than in urban areas. The Isle of Wight College is located on the outskirts of Newport. From September 2010, there was a transition period from the three-tier system of primary, middle and high schools to the two-tier system that is usual in England. Some schools have now closed, such as Chale C.E. Primary. Others have become "federated", such as Brading C.E. Primary and St Helen's Primary. Christ the King College started as two "middle schools", Trinity Middle School and Archbishop King Catholic Middle School, but has now been converted into a dual-faith secondary school and sixth form. Since September 2011 five new secondary schools, with an age range of 11 to 18 years, replaced the island's high schools (as a part of the previous three-tier system). Notable people Notable residents have included: 17th century and earlier King Arwald, last pagan king in England King Charles I of England, who was imprisoned at Carisbrooke Castle Earl Tostig Godwinson, who supported Norwegian king Harald Hardrada's invasion Actor, highwayman and conspirator Cardell "Scum" Goodman Soldier and regicide of Charles I Thomas Harrison, imprisoned at Carisbrooke with John Rogers and Christopher Feake Soldier Peter de Heyno Philosopher and polymath Robert Hooke Murderer Michal Morey 18th century Marine painter Thomas Buttersworth Explorer Anthony Henday Radical journalist John Wilkes 19th century Queen Victoria and Prince Albert (monarch and consort), who built and lived at Osborne House Photographer Julia Margaret Cameron, who lived at Dimbola Lodge Irish Republican Thomas Clarke Naval captain Jeremiah Coghlan CBG, who retired to Ryde Writer Charles Dickens Poet John Keats Inventor and radio pioneer Guglielmo Marconi Poet and hymnwriter Albert Midlane Geologist and engineer John Milne Regency architect John Nash Novelist Miss Harriet Parr Early Hong Kong Government administrator William Pedder New Zealand PM Henry Sewell Poet Algernon Charles Swinburne Poet Alfred Tennyson Philosopher Karl Marx, who stayed at 1, St. Boniface Gardens, Ventnor Performance artist Nigel Rolfe 20th century onwards Scriptwriter Raymond Allen Indie rock group The Bees Concert organist E. Power Biggs Darts player Keegan Brown Singer Helen Clare Singer-songwriter Sarah Close Inventor of the hovercraft Sir Christopher Cockerell Presenter and actor Ray Cokes Actress Bella Emberg Yachtsman Uffa Fox Actor Marius Goring Musician Jack Green Survival expert and Chief Scout Bear Grylls Actress Sheila Hancock Actor Melvyn Hayes Folk-rock musician Robyn Hitchcock Actor Geoffrey Hughes Conspiracy theorist David Icke Actor Jeremy Irons Comedian Phill Jupitus Actor Laura Michelle Kelly Composer Albert Ketèlbey Iranian poet Mimi Khalvati Musician Mark King Radio presenter Allan Lake Yachtswoman Ellen MacArthur BBC Tonight presenter Cliff Michelmore Film director Anthony Minghella Actor David Niven Cyclist Kieran Page Musician Frederick Riddle Heptathlete Kelly Sotherton Gardener and presenter Alan Titchmarsh Novelist Edward Upward The indie band Wet Leg Overseas names The Isle of Wight has given names to many parts of former colonies, most notably Isle of Wight County in Virginia founded by settlers from the island in the 17th century. Its county seat is a town named Isle of Wight. Other notable examples include: Isle of Wight – an island off Maryland, United States Dunnose Head, West Falkland Ventnor, Cowes on Phillip Island, Victoria, Australia Carisbrook, Victoria, Australia Carisbrook, a former stadium in Dunedin, New Zealand Ryde, New South Wales, Australia Shanklin, Sandown, New Hampshire, United States Ventnor City, New Jersey, United States Gardiners Island, New York, United States shown as "Isle of Wight" on some of the older maps. Cultural references Film The film Something to Hide (1972; US title Shattered), starring Peter Finch, was filmed near Cowes, including a scene on the Red Funnel ferry; The British film That'll Be the Day (1973), starring David Essex and Ringo Starr, included scenes shot in Ryde (notably Cross Street), Sandown (school), Shanklin (beach) and Wootton Bridge (fairground); Mrs. Brown (1997), with Dame Judi Dench and Billy Connolly, was filmed at Osborne House and Chale; The film Fragile (2005), starring Calista Flockhart, is based on the Isle of Wight. Victoria and Abdul (2017) starring Dame Judi Dench and Ali Fazal began shooting principal photography at Osborne House in September 2016. Games John Worsley's Commodore 64 game Spirit of the Stones was set on the Isle of Wight. Literature The Isle of Wight was: the setting of Julian Barnes's novel England, England; called The Island in some editions of Thomas Hardy's novels in his fictional Wessex; selected for the development of a new base by the supercomputer "Colossus", in D. F. Jones' novel Colossus (1966); the setting for D.H. Lawrence's book The Trespasser, filmed for TV on location in 1981; the setting of Graham Masterton's book Prey; mentioned in J.K. Rowling's first Harry Potter book, which refers to Uncle Vernon's sister Marge on holiday on the island, who got sick after eating a whelk; a major element in Daniel O'Malley's series The Rook (2012) & its sequel Stiletto (2016). The antagonists try to invade in the 1600s, the effects of which continue to colour perceptions of the Crown's secret supernatural agency, the "Checquy Group"; the refuge of the British monarchy & government in S.M. Stirling's alternative history novel The Protector's War (2005), in which high energy technology ceased to function. After an ensuing holocaust, the island was the base for re-population of Europe, whose populations had mostly perished; one of the destinations to which the British government evacuates in Frank Tayell's post-apocalyptic novel Surviving the Evacuation Book One: London (2013), guided by the mistaken impression that it would be defensible against the zombie hordes; featured in John Wyndham's novel The Day of the Triffids and Simon Clark's sequel The Night of the Triffids. Music The Beatles' song "When I'm Sixty-Four" (1967), credited to Lennon-McCartney and sung by Paul McCartney, refers to renting a cottage on the island; Bob Dylan recorded "Like a Rolling Stone" (1965), "Minstrel Boy", "Quinn the Eskimo (The Mighty Quinn)" (1967), and "She Belongs to Me" (1965) for the album Self Portrait (1970) live on the island; "Wight Is Wight" (1969), a song by French artist Michel Delpech, also spawned an Italian cover by Dik Dik, titled "L'isola di Wight"(IT) (1970). Radio There was a running joke in radio sitcom The Navy Lark involving Sub-Lieutenant Phillips's inability to navigate and subsequently tail the Isle of Wight ferry. Television "Survivors (1975 TV series)", the BBC's 1970s post-apocalyptic sci-fi drama set after a worldwide pandemic kills off most of humanity, features an episode in which 500 survivors holed up in London are to be relocated to the Isle of Wight. Though referred to many times in the Series 2 episode "Lights of London – Part 2", the move itself is not shown (nor any footage of the island). ITV's dramatisation of Dennis Potter's work Blade on the Feather (19 October 1980) was filmed on the island. The 1984 TV miniseries, Annika, was partly filmed in Ryde. A 2002 Top Gear feature showed an Aston Martin being driven around Cowes, East Cowes, and along the Military Road and seawall at Freshwater Bay. The setting for Free Rein was based on the Isle of Wight. Portions of the 2021 drama series It's a Sin'' on Channel 4 were supposedly set in the Isle of Wight, the home of one of the lead characters, although they were actually filmed in Rhos-on-Sea and Bangor in north Wales. See also High Sheriff of the Isle of Wight Isle of Wight gasification facility Isle of Wight NHS Trust Isle of Wight Rifles List of civil parishes on the Isle of Wight List of current places of worship on the Isle of Wight List of Governors of the Isle of Wight List of hills of the Isle of Wight List of places on the Isle of Wight Lord Lieutenant of the Isle of Wight Yaverland Battery Notes References Hansard, Wednesday 14 November 2001 column 850 External links Visit Isle of Wight Official Website Isle of Wight Council website Isleofwight.com Photos Images of the Isle of Wight at the English Heritage Archive Islands of England Islands of the English Channel Isle of Wight Natural regions of England Isle of Wight South East England Isle of Wight Isle of Wight
[ -0.19481632113456726, -0.627055823802948, 0.7705094814300537, -0.5036458969116211, 0.02465473674237728, 0.09698516130447388, 0.13972941040992737, 0.3525902032852173, -0.8034366965293884, 0.01103890873491764, -0.3465484380722046, 0.1596258282661438, -0.24431827664375305, 0.02665591612458229...
15107
https://en.wikipedia.org/wiki/Internet%20Control%20Message%20Protocol
Internet Control Message Protocol
The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information indicating success or failure when communicating with another IP address, for example, when an error is indicated when a requested service is not available or that a host or router could not be reached. ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems, nor is it regularly employed by end-user network applications (with the exception of some diagnostic tools like ping and traceroute). ICMP for IPv4 is defined in RFC 792. A separate ICMPv6, defined by RFC 4443, is used with IPv6. Technical details ICMP is part of the Internet protocol suite as defined in RFC 792. ICMP messages are typically used for diagnostic or control purposes or generated in response to errors in IP operations (as specified in RFC 1122). ICMP errors are directed to the source IP address of the originating packet. For example, every device (such as an intermediate router) forwarding an IP datagram first decrements the time to live (TTL) field in the IP header by one. If the resulting TTL is 0, the packet is discarded and an ICMP time exceeded in transit message is sent to the datagram's source address. Many commonly used network utilities are based on ICMP messages. The traceroute command can be implemented by transmitting IP datagrams with specially set IP TTL header fields, and looking for ICMP time exceeded in transit and Destination unreachable messages generated in response. The related ping utility is implemented using the ICMP echo request and echo reply messages. ICMP uses the basic support of IP as if it were a higher-level protocol, however, ICMP is actually an integral part of IP. Although ICMP messages are contained within standard IP packets, ICMP messages are usually processed as a special case, distinguished from normal IP processing. In many cases, it is necessary to inspect the contents of the ICMP message and deliver the appropriate error message to the application responsible for transmitting the IP packet that prompted the ICMP message to be sent. ICMP is a network-layer protocol. There is no TCP or UDP port number associated with ICMP packets as these numbers are associated with the transport layer above. Datagram structure The ICMP packet is encapsulated in an IPv4 packet. The packet consists of header and data sections. Header The ICMP header starts after the IPv4 header and is identified by IP protocol number '1'. All ICMP packets have an 8-byte header and variable-sized data section. The first 4 bytes of the header have fixed format, while the last 4 bytes depend on the type/code of that ICMP packet. Type ICMP type, see . Code ICMP subtype, see . Checksum Internet checksum (RFC 1071) for error checking, calculated from the ICMP header and data with value 0 substituted for this field. Rest of header Four-byte field, contents vary based on the ICMP type and code. Data ICMP error messages contain a data section that includes a copy of the entire IPv4 header, plus at least the first eight bytes of data from the IPv4 packet that caused the error message. The length of ICMP error messages should not exceed 576 bytes. This data is used by the host to match the message to the appropriate process. If a higher level protocol uses port numbers, they are assumed to be in the first eight bytes of the original datagram's data. The variable size of the ICMP packet data section has been exploited. In the "Ping of death", large or fragmented ICMP packets are used for denial-of-service attacks. ICMP data can also be used to create covert channels for communication. These channels are known as ICMP tunnels. Control messages Control messages are identified by the value in the type field. The code field gives additional context information for the message. Some control messages have been deprecated since the protocol was first introduced. Source quench Source Quench requests that the sender decrease the rate of messages sent to a router or host. This message may be generated if a router or host does not have sufficient buffer space to process the request, or may occur if the router or host buffer is approaching its limit. Data is sent at a very high speed from a host or from several hosts at the same time to a particular router on a network. Although a router has buffering capabilities, the buffering is limited to within a specified range. The router cannot queue any more data than the capacity of the limited buffering space. Thus if the queue gets filled up, incoming data is discarded until the queue is no longer full. But as no acknowledgement mechanism is present in the network layer, the client does not know whether the data has reached the destination successfully. Hence some remedial measures should be taken by the network layer to avoid these kind of situations. These measures are referred to as source quench. In a source quench mechanism, the router sees that the incoming data rate is much faster than the outgoing data rate, and sends an ICMP message to the clients, informing them that they should slow down their data transfer speeds or wait for a certain amount of time before attempting to send more data. When a client receives this message, it will automatically slow down the outgoing data rate or wait for a sufficient amount of time, which enables the router to empty the queue. Thus the source quench ICMP message acts as flow control in the network layer. Since research suggested that "ICMP Source Quench [was] an ineffective (and unfair) antidote for congestion", routers' creation of source quench messages was deprecated in 1995 by RFC 1812. Furthermore, forwarding of and any kind of reaction to (flow control actions) source quench messages was deprecated from 2012 by RFC 6633. Where: Type must be set to 4 Code must be set to 0 IP header and additional data is used by the sender to match the reply with the associated request Redirect Redirect requests data packets be sent on an alternative route. ICMP Redirect is a mechanism for routers to convey routing information to hosts. The message informs a host to update its routing information (to send packets on an alternative route). If a host tries to send data through a router (R1) and R1 sends the data on another router (R2) and a direct path from the host to R2 is available (that is, the host and R2 are on the same subnetwork), then R1 will send a redirect message to inform the host that the best route for the destination is via R2. The host should then change its route information and send packets for that destination directly to R2. The router will still send the original datagram to the intended destination. However, if the datagram contains routing information, this message will not be sent even if a better route is available. RFC 1122 states that redirects should only be sent by gateways and should not be sent by Internet hosts. Where: Type must be set to 5. Code specifies the reason for the redirection, and may be one of the following: {| class="wikitable" |- ! Code ! Description |- ! 0 | Redirect for Network |- ! 1 | Redirect for Host |- ! 2 | Redirect for Type of Service and Network |- ! 3 | Redirect for Type of Service and Host |} IP address is the 32-bit address of the gateway to which the redirection should be sent. IP header and additional data is included to allow the host to match the reply with the request that caused the redirection reply. Time exceeded Time Exceeded is generated by a gateway to inform the source of a discarded datagram due to the time to live field reaching zero. A time exceeded message may also be sent by a host if it fails to reassemble a fragmented datagram within its time limit. Time exceeded messages are used by the traceroute utility to identify gateways on the path between two hosts. Where: Type must be set to 11 Code specifies the reason for the time exceeded message, include the following: {| class="wikitable" ! Code || Description |- ! 0 | Time-to-live exceeded in transit. |- ! 1 | Fragment reassembly time exceeded. |} IP header and first 64 bits of the original payload are used by the source host to match the time exceeded message to the discarded datagram. For higher-level protocols such as UDP and TCP the 64-bit payload will include the source and destination ports of the discarded packet. Timestamp Timestamp is used for time synchronization. The originating timestamp is set to the time (in milliseconds since midnight) the sender last touched the packet. The receive and transmit timestamps are not used. Where: Type must be set to 13 Code must be set to 0 Identifier and Sequence Number can be used by the client to match the timestamp reply with the timestamp request. Originate timestamp is the number of milliseconds since midnight Universal Time (UT). If a UT reference is not available the most-significant bit can be set to indicate a non-standard time value. Timestamp reply Timestamp Reply replies to a Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as well as a receive timestamp indicating when the Timestamp was received and a transmit timestamp indicating when the Timestamp reply was sent. Where: Type must be set to 14 Code must be set to 0 Identifier and Sequence number can be used by the client to match the reply with the request that caused the reply. Originate timestamp is the time the sender last touched the message before sending it. Receive timestamp is the time the echoer first touched it on receipt. Transmit timestamp is the time the echoer last touched the message on sending it. All timestamps are in units of milliseconds since midnight UT. If the time is not available in milliseconds or cannot be provided with respect to midnight UT then any time can be inserted in a timestamp provided the high order bit of the timestamp is also set to indicate this non-standard value. The use of Timestamp and Timestamp Reply messages to synchronize the clocks of Internet nodes has largely been replaced by the UDP-based Network Time Protocol and the Precision Time Protocol. Address mask request Address mask request is normally sent by a host to a router in order to obtain an appropriate subnet mask. Recipients should reply to this message with an Address mask reply message. Where: Type must be set to 17 Code must be set to 0 Address mask can be set to 0 ICMP Address Mask Request may be used as a part of reconnaissance attack to gather information on the target network, therefore ICMP Address Mask Reply is disabled by default on Cisco IOS. Address mask reply Address mask reply is used to reply to an address mask request message with an appropriate subnet mask. Where: Type must be set to 18 Code must be set to 0 Address mask should be set to the subnet mask Destination unreachable Destination unreachable is generated by the host or its inbound gateway to inform the client that the destination is unreachable for some reason. Reasons for this message may include: the physical connection to the host does not exist (distance is infinite); the indicated protocol or port is not active; the data must be fragmented but the 'don't fragment' flag is on. Unreachable TCP ports notably respond with TCP RST rather than a destination unreachable type 3 as might be expected. Destination unreachable is never reported for IP Multicast transmissions. Where: Type field (bits 0-7) must be set to 3 Code field (bits 8-15) is used to specify the type of error, and can be any of the following: {| class="wikitable" ! Code || Description |- ! 0 | Network unreachable error. |- ! 1 | Host unreachable error. |- ! 2 | Protocol unreachable error (the designated transport protocol is not supported). |- ! 3 | Port unreachable error (the designated protocol is unable to inform the host of the incoming message). |- ! 4 | The datagram is too big. Packet fragmentation is required but the 'don't fragment' (DF) flag is on. |- ! 5 | Source route failed error. |- ! 6 | Destination network unknown error. |- ! 7 | Destination host unknown error. |- ! 8 | Source host isolated error. |- ! 9 | The destination network is administratively prohibited. |- ! 10 | The destination host is administratively prohibited. |- ! 11 | The network is unreachable for Type Of Service. |- ! 12 | The host is unreachable for Type Of Service. |- ! 13 | Communication administratively prohibited (administrative filtering prevents packet from being forwarded). |- ! 14 | Host precedence violation (indicates the requested precedence is not permitted for the combination of host or network and port). |- ! 15 | Precedence cutoff in effect (precedence of datagram is below the level set by the network administrators). |} Next-hop MTU field (bits 48-63) contains the MTU of the next-hop network if a code 4 error occurs. IP header and additional data is included to allow the client to match the reply with the request that caused the destination unreachable reply. See also ICMP tunnel ICMP hole punching ICMP Router Discovery Protocol Pathping Path MTU Discovery Smurf attack References RFCs , Internet Control Message Protocol , Internet Standard Subnetting Procedure , Something a Host Could Do with Source Quench: The Source Quench Introduced Delay (SQuID) , Requirements for Internet Hosts – Communication Layers , Towards Requirements for IP Routers , Requirements for IP Version 4 Routers , Extended ICMP to Support Multi-Part Messages External links IANA ICMP parameters IANA protocol numbers Internet protocols Internet Standards Internet layer protocols Network layer protocols
[ -0.35912376642227173, -0.10434804111719131, 0.19246572256088257, 0.45196154713630676, -0.12128723412752151, -0.6345869302749634, -0.19139665365219116, 0.26465079188346863, -0.581200897693634, -0.4293195605278015, -0.2867644131183624, 0.11290349066257477, -0.635563313961029, 0.0671966522932...
15108
https://en.wikipedia.org/wiki/ICMP
ICMP
ICMP may refer to: Science and technology International Collection of Microorganisms from Plants, a culture collection in New Zealand International Congress on Mathematical Physics Internet Control Message Protocol, used in computer networking Ischemic cardiomyopathy, a type of heart disease Other uses The Institute of Contemporary Music Performance, in London, UK International Commission on Missing Persons, an intergovernmental organization
[ 0.4535229504108429, 0.0004725322360172868, -0.512641191482544, 0.4086904227733612, 0.41874054074287415, 0.04774787276983261, 0.02683214098215103, 0.11122050136327744, -0.7487682700157166, -0.0042164926417171955, -0.4742746651172638, -0.09012013673782349, -0.1161893978714943, 0.427487254142...
15109
https://en.wikipedia.org/wiki/Inverse%20limit
Inverse limit
In mathematics, the inverse limit (also called the projective limit) is a construction that allows one to "glue together" several related objects, the precise gluing process being specified by morphisms between the objects. Thus, inverse limits can be defined in any category although their existence depends on the category that is considered. They are a special case of the concept of limit in category theory. By working in the dual category, that is by reverting the arrows, an inverse limit becomes a direct limit or injective limit, and a limit becomes a colimit. Formal definition Algebraic objects We start with the definition of an inverse system (or projective system) of groups and homomorphisms. Let be a directed poset (not all authors require I to be directed). Let (Ai)i∈I be a family of groups and suppose we have a family of homomorphisms for all (note the order) with the following properties: is the identity on , Then the pair is called an inverse system of groups and morphisms over , and the morphisms are called the transition morphisms of the system. We define the inverse limit of the inverse system as a particular subgroup of the direct product of the 's: The inverse limit comes equipped with natural projections  \\ i: → which pick out the ith component of the direct product for each in . The inverse limit and the natural projections satisfy a universal property described in the next section. This same construction may be carried out if the 's are sets, semigroups, topological spaces, rings, modules (over a fixed ring), algebras (over a fixed ring), etc., and the homomorphisms are morphisms in the corresponding category. The inverse limit will also belong to that category. General definition The inverse limit can be defined abstractly in an arbitrary category by means of a universal property. Let be an inverse system of objects and morphisms in a category C (same definition as above). The inverse limit of this system is an object X in C together with morphisms i: X → Xi (called projections) satisfying i = ∘ j for all i ≤ j. The pair (X, i) must be universal in the sense that for any other such pair (Y, ψi) there exists a unique morphism u: Y → X such that the diagram commutes for all i ≤ j. The inverse limit is often denoted with the inverse system being understood. In some categories, the inverse limit of certain inverse systems does not exist. If it does, however, it is unique in a strong sense: given any two inverse limits X and X of an inverse system, there exists a unique isomorphism X′ → X commuting with the projection maps. Inverse systems and inverse limits in a category C admit an alternative description in terms of functors. Any partially ordered set I can be considered as a small category where the morphisms consist of arrows i → j if and only if i ≤ j. An inverse system is then just a contravariant functor I → C. Let be the category of these functors (with natural transformations as morphisms). An object X of C can be considered a trivial inverse system, where all objects are equal to X and all arrow are the identity of X. This defines a "trivial functor" from C to The direct limit, if it exists, is defined as a right adjoint of this trivial functor. Examples The ring of p-adic integers is the inverse limit of the rings (see modular arithmetic) with the index set being the natural numbers with the usual order, and the morphisms being "take remainder". That is, one considers sequences of integers such that each element of the sequence "projects" down to the previous ones, namely, that whenever The natural topology on the p-adic integers is the one implied here, namely the product topology with cylinder sets as the open sets. The p-adic solenoid is the inverse limit of the topological groups with the index set being the natural numbers with the usual order, and the morphisms being "take remainder". That is, one considers sequences of real numbers such that each element of the sequence "projects" down to the previous ones, namely, that whenever The ring of formal power series over a commutative ring R can be thought of as the inverse limit of the rings , indexed by the natural numbers as usually ordered, with the morphisms from to given by the natural projection. Pro-finite groups are defined as inverse limits of (discrete) finite groups. Let the index set I of an inverse system (Xi, ) have a greatest element m. Then the natural projection m: X → Xm is an isomorphism. In the category of sets, every inverse system has an inverse limit, which can be constructed in an elementary manner as a subset of the product of the sets forming the inverse system. The inverse limit of any inverse system of non-empty finite sets is non-empty. This is a generalization of Kőnig's lemma in graph theory and may be proved with Tychonoff's theorem, viewing the finite sets as compact discrete spaces, and then applying the finite intersection property characterization of compactness. In the category of topological spaces, every inverse system has an inverse limit. It is constructed by placing the initial topology on the underlying set-theoretic inverse limit. This is known as the limit topology. The set of infinite strings is the inverse limit of the set of finite strings, and is thus endowed with the limit topology. As the original spaces are discrete, the limit space is totally disconnected. This is one way of realizing the p-adic numbers and the Cantor set (as infinite strings). Derived functors of the inverse limit For an abelian category C, the inverse limit functor is left exact. If I is ordered (not simply partially ordered) and countable, and C is the category Ab of abelian groups, the Mittag-Leffler condition is a condition on the transition morphisms fij that ensures the exactness of . Specifically, Eilenberg constructed a functor (pronounced "lim one") such that if (Ai, fij), (Bi, gij), and (Ci, hij) are three inverse systems of abelian groups, and is a short exact sequence of inverse systems, then is an exact sequence in Ab. Mittag-Leffler condition If the ranges of the morphisms of an inverse system of abelian groups (Ai, fij) are stationary, that is, for every k there exists j ≥ k such that for all i ≥ j : one says that the system satisfies the Mittag-Leffler condition. The name "Mittag-Leffler" for this condition was given by Bourbaki in their chapter on uniform structures for a similar result about inverse limits of complete Hausdorff uniform spaces. Mittag-Leffler used a similar argument in the proof of Mittag-Leffler's theorem. The following situations are examples where the Mittag-Leffler condition is satisfied: a system in which the morphisms fij are surjective a system of finite-dimensional vector spaces or finite abelian groups or modules of finite length or Artinian modules. An example where is non-zero is obtained by taking I to be the non-negative integers, letting Ai = piZ, Bi = Z, and Ci = Bi / Ai = Z/piZ. Then where Zp denotes the p-adic integers. Further results More generally, if C is an arbitrary abelian category that has enough injectives, then so does CI, and the right derived functors of the inverse limit functor can thus be defined. The nth right derived functor is denoted In the case where C satisfies Grothendieck's axiom (AB4*), Jan-Erik Roos generalized the functor lim1 on Ab'''I to series of functors limn such that It was thought for almost 40 years that Roos had proved (in Sur les foncteurs dérivés de lim. Applications. ) that lim1 Ai = 0 for (Ai, fij) an inverse system with surjective transition morphisms and I the set of non-negative integers (such inverse systems are often called "Mittag-Leffler sequences"). However, in 2002, Amnon Neeman and Pierre Deligne constructed an example of such a system in a category satisfying (AB4) (in addition to (AB4*)) with lim1 Ai ≠ 0. Roos has since shown (in "Derived functors of inverse limits revisited") that his result is correct if C has a set of generators (in addition to satisfying (AB3) and (AB4*)). Barry Mitchell has shown (in "The cohomological dimension of a directed set") that if I has cardinality (the dth infinite cardinal), then Rnlim is zero for all n ≥ d + 2. This applies to the I-indexed diagrams in the category of R-modules, with R a commutative ring; it is not necessarily true in an arbitrary abelian category (see Roos' "Derived functors of inverse limits revisited" for examples of abelian categories in which limn, on diagrams indexed by a countable set, is nonzero for n'' > 1). Related concepts and generalizations The categorical dual of an inverse limit is a direct limit (or inductive limit). More general concepts are the limits and colimits of category theory. The terminology is somewhat confusing: inverse limits are a class of limits, while direct limits are a class of colimits. See also Direct, or inductive limit Notes References Section 3.5 of Limits (category theory) Abstract algebra de:Limes (Kategorientheorie)
[ -0.6258314847946167, -0.11520437896251678, -0.21437446773052216, 0.10048357397317886, -0.4024809002876282, 0.05650043860077858, -0.30885446071624756, -0.1394740790128708, 0.09149578958749771, -0.4414580762386322, -0.31289640069007874, 0.30606338381767273, -0.12119497358798981, 0.1065326482...
15111
https://en.wikipedia.org/wiki/Interplanetary%20spaceflight
Interplanetary spaceflight
Interplanetary spaceflight or interplanetary travel is the crewed or uncrewed travel between stars and planets, usually within a single planetary system. In practice, spaceflights of this type are confined to travel between the planets of the Solar System. Uncrewed space probes have flown to all the observed planets in the Solar System as well as to dwarf planets Pluto and Ceres, and several asteroids. Orbiters and landers return more information than fly-by missions. Crewed flights have landed on the Moon and have been planned, from time to time, for Mars and Venus. While many scientists appreciate the knowledge value that uncrewed flights provide, the value of crewed missions is more controversial. Science fiction writers propose a number of benefits, including the mining of asteroids, access to solar power, and room for colonization in the event of an Earth catastrophe. A number of techniques have been developed to make interplanetary flights more economical. Advances in computing and theoretical science have already improved some techniques, while new proposals may lead to improvements in speed, fuel economy, and safety. Travel techniques must take into consideration the velocity changes necessary to travel from one body to another in the Solar System. For orbital flights, an additional adjustment must be made to match the orbital speed of the destination body. Other developments are designed to improve rocket launching and propulsion, as well as the use of non-traditional sources of energy. Using extraterrestrial resources for energy, oxygen, and water would reduce costs and improve life support systems. Any crewed interplanetary flight must include certain design requirements. Life support systems must be capable of supporting human lives for extended periods of time. Preventative measures are needed to reduce exposure to radiation and ensure optimum reliability. Current achievements in interplanetary travel Remotely guided space probes have flown by all of the observed planets of the Solar System from Mercury to Neptune, with the New Horizons probe having flown by the dwarf planet Pluto and the Dawn spacecraft currently orbiting the dwarf planet Ceres. The most distant spacecraft, Voyager 1 and Voyager 2 have left the Solar System as of 8 December 2018 while Pioneer 10, Pioneer 11, and New Horizons are on course to leave it. In general, planetary orbiters and landers return much more detailed and comprehensive information than fly-by missions. Space probes have been placed into orbit around all the five planets known to the ancients: The first being Venus (Venera 7, 1970), Mars (Mariner 9, 1971), Jupiter (Galileo, 1995), Saturn (Cassini/Huygens, 2004), and most recently Mercury (MESSENGER, March 2011), and have returned data about these bodies and their natural satellites. The NEAR Shoemaker mission in 2000 orbited the large near-Earth asteroid 433 Eros, and was even successfully landed there, though it had not been designed with this maneuver in mind. The Japanese ion-drive spacecraft Hayabusa in 2005 also orbited the small near-Earth asteroid 25143 Itokawa, landing on it briefly and returning grains of its surface material to Earth. Another ion-drive mission, Dawn, has orbited the large asteroid Vesta (July 2011 – September 2012) and later moved on to the dwarf planet Ceres, arriving in March 2015. Remotely controlled landers such as Viking, Pathfinder and the two Mars Exploration Rovers have landed on the surface of Mars and several Venera and Vega spacecraft have landed on the surface of Venus. The Huygens probe successfully landed on Saturn's moon, Titan. No crewed missions have been sent to any planet of the Solar System. NASA's Apollo program, however, landed twelve people on the Moon and returned them to Earth. The American Vision for Space Exploration, originally introduced by U.S. President George W. Bush and put into practice through the Constellation program, had as a long-term goal to eventually send human astronauts to Mars. However, on February 1, 2010, President Barack Obama proposed cancelling the program in Fiscal Year 2011. An earlier project which received some significant planning by NASA included a crewed fly-by of Venus in the Manned Venus Flyby mission, but was cancelled when the Apollo Applications Program was terminated due to NASA budget cuts in the late 1960s. Reasons for interplanetary travel The costs and risk of interplanetary travel receive a lot of publicity—spectacular examples include the malfunctions or complete failures of probes without a human crew, such as Mars 96, Deep Space 2, and Beagle 2 (the article List of Solar System probes gives a full list). Many astronomers, geologists and biologists believe that exploration of the Solar System provides knowledge that could not be gained by observations from Earth's surface or from orbit around Earth. But they disagree about whether human-crewed missions make a useful scientific contribution—some think robotic probes are cheaper and safer, while others argue that either astronauts or spacefaring scientists, advised by Earth-based scientists, can respond more flexibly and intelligently to new or unexpected features of the region they are exploring. Those who pay for such missions (primarily in the public sector) are more likely to be interested in benefits for themselves or for the human race as a whole. So far the only benefits of this type have been "spin-off" technologies which were developed for space missions and then were found to be at least as useful in other activities (NASA publicizes spin-offs from its activities). Other practical motivations for interplanetary travel are more speculative, because our current technologies are not yet advanced enough to support test projects. But science fiction writers have a fairly good track record in predicting future technologies—for example geosynchronous communications satellites (Arthur C. Clarke) and many aspects of computer technology (Mack Reynolds). Many science fiction stories feature detailed descriptions of how people could extract minerals from asteroids and energy from sources including orbital solar panels (unhampered by clouds) and the very strong magnetic field of Jupiter. Some point out that such techniques may be the only way to provide rising standards of living without being stopped by pollution or by depletion of Earth's resources (for example peak oil). Finally, colonizing other parts of the Solar System would prevent the whole human species from being exterminated by any one of a number of possible events (see Human extinction). One of these possible events is an asteroid impact like the one which may have resulted in the Cretaceous–Paleogene extinction event. Although various Spaceguard projects monitor the Solar System for objects that might come dangerously close to Earth, current asteroid deflection strategies are crude and untested. To make the task more difficult, carbonaceous chondrites are rather sooty and therefore very hard to detect. Although carbonaceous chondrites are thought to be rare, some are very large and the suspected "dinosaur-killer" may have been a carbonaceous chondrite. Some scientists, including members of the Space Studies Institute, argue that the vast majority of mankind eventually will live in space and will benefit from doing this. Economical travel techniques One of the main challenges in interplanetary travel is producing the very large velocity changes necessary to travel from one body to another in the Solar System. Due to the Sun's gravitational pull, a spacecraft moving farther from the Sun will slow down, while a spacecraft moving closer will speed up. Also, since any two planets are at different distances from the Sun, the planet from which the spacecraft starts is moving around the Sun at a different speed than the planet to which the spacecraft is travelling (in accordance with Kepler's Third Law). Because of these facts, a spacecraft desiring to transfer to a planet closer to the Sun must decrease its speed with respect to the Sun by a large amount in order to intercept it, while a spacecraft traveling to a planet farther out from the Sun must increase its speed substantially. Then, if additionally the spacecraft wishes to enter into orbit around the destination planet (instead of just flying by it), it must match the planet's orbital speed around the Sun, usually requiring another large velocity change. Simply doing this by brute force – accelerating in the shortest route to the destination and then matching the planet's speed – would require an extremely large amount of fuel. And the fuel required for producing these velocity changes has to be launched along with the payload, and therefore even more fuel is needed to put both the spacecraft and the fuel required for its interplanetary journey into orbit. Thus, several techniques have been devised to reduce the fuel requirements of interplanetary travel. As an example of the velocity changes involved, a spacecraft travelling from low Earth orbit to Mars using a simple trajectory must first undergo a change in speed (also known as a delta-v), in this case an increase, of about 3.8 km/s. Then, after intercepting Mars, it must change its speed by another 2.3 km/s in order to match Mars' orbital speed around the Sun and enter an orbit around it. For comparison, launching a spacecraft into low Earth orbit requires a change in speed of about 9.5 km/s. Hohmann transfers For many years economical interplanetary travel meant using the Hohmann transfer orbit. Hohmann demonstrated that the lowest energy route between any two orbits is an elliptical "orbit" which forms a tangent to the starting and destination orbits. Once the spacecraft arrives, a second application of thrust will re-circularize the orbit at the new location. In the case of planetary transfers this means directing the spacecraft, originally in an orbit almost identical to Earth's, so that the aphelion of the transfer orbit is on the far side of the Sun near the orbit of the other planet. A spacecraft traveling from Earth to Mars via this method will arrive near Mars orbit in approximately 8.5 months, but because the orbital velocity is greater when closer to the center of mass (i.e. the Sun) and slower when farther from the center, the spacecraft will be traveling quite slowly and a small application of thrust is all that is needed to put it into a circular orbit around Mars. If the manoeuver is timed properly, Mars will be "arriving" under the spacecraft when this happens. The Hohmann transfer applies to any two orbits, not just those with planets involved. For instance it is the most common way to transfer satellites into geostationary orbit, after first being "parked" in low Earth orbit. However, the Hohmann transfer takes an amount of time similar to ½ of the orbital period of the outer orbit, so in the case of the outer planets this is many years – too long to wait. It is also based on the assumption that the points at both ends are massless, as in the case when transferring between two orbits around Earth for instance. With a planet at the destination end of the transfer, calculations become considerably more difficult. Gravitational slingshot The gravitational slingshot technique uses the gravity of planets and moons to change the speed and direction of a spacecraft without using fuel. In typical example, a spacecraft is sent to a distant planet on a path that is much faster than what the Hohmann transfer would call for. This would typically mean that it would arrive at the planet's orbit and continue past it. However, if there is a planet between the departure point and the target, it can be used to bend the path toward the target, and in many cases the overall travel time is greatly reduced. A prime example of this are the two crafts of the Voyager program, which used slingshot effects to change trajectories several times in the outer Solar System. It is difficult to use this method for journeys in the inner part of the Solar System, although it is possible to use other nearby planets such as Venus or even the Moon as slingshots in journeys to the outer planets. This maneuver can only change an object's velocity relative to a third, uninvolved object, – possibly the “centre of mass” or the Sun. There is no change in the velocities of the two objects involved in the maneuver relative to each other. The Sun cannot be used in a gravitational slingshot because it is stationary compared to rest of the Solar System, which orbits the Sun. It may be used to send a spaceship or probe into the galaxy because the Sun revolves around the center of the Milky Way. Powered slingshot A powered slingshot is the use of a rocket engine at or around closest approach to a body (periapsis). The use at this point multiplies up the effect of the delta-v, and gives a bigger effect than at other times. Fuzzy orbits Computers did not exist when Hohmann transfer orbits were first proposed (1925) and were slow, expensive and unreliable when gravitational slingshots were developed (1959). Recent advances in computing have made it possible to exploit many more features of the gravity fields of astronomical bodies and thus calculate even lower-cost trajectories. Paths have been calculated which link the Lagrange points of the various planets into the so-called Interplanetary Transport Network. Such "fuzzy orbits" use significantly less energy than Hohmann transfers but are much, much slower. They aren't practical for human crewed missions because they generally take years or decades, but may be useful for high-volume transport of low-value commodities if humanity develops a space-based economy. Aerobraking Aerobraking uses the atmosphere of the target planet to slow down. It was first used on the Apollo program where the returning spacecraft did not enter Earth orbit but instead used a S-shaped vertical descent profile (starting with an initially steep descent, followed by a leveling out, followed by a slight climb, followed by a return to a positive rate of descent continuing to splash-down in the ocean) through Earth's atmosphere to reduce its speed until the parachute system could be deployed enabling a safe landing. Aerobraking does not require a thick atmosphere – for example most Mars landers use the technique, and Mars' atmosphere is only about 1% as thick as Earth's. Aerobraking converts the spacecraft's kinetic energy into heat, so it requires a heatshield to prevent the craft from burning up. As a result, aerobraking is only helpful in cases where the fuel needed to transport the heatshield to the planet is less than the fuel that would be required to brake an unshielded craft by firing its engines. This can be addressed by creating heatshields from material available near the target Improved technologies and methodologies Several technologies have been proposed which both save fuel and provide significantly faster travel than the traditional methodology of using Hohmann transfers. Some are still just theoretical, but over time, several of the theoretical approaches have been tested on spaceflight missions. For example, the Deep Space 1 mission was a successful test of an ion drive. These improved technologies typically focus on one or more of: Space propulsion systems with much better fuel economy. Such systems would make it possible to travel much faster while keeping the fuel cost within acceptable limits. Using solar energy and in-situ resource utilization to avoid or minimize the expensive task of shipping components and fuel up from the Earth's surface, against the Earth's gravity (see "Using non-terrestrial resources", below). Novel methodologies of using energy at different locations or in different ways that can shorten transport time or reduce cost per unit mass of space transport Besides making travel faster or cost less, such improvements could also allow greater design "safety margins" by reducing the imperative to make spacecraft lighter. Improved rocket concepts All rocket concepts are limited by the Tsiolkovsky rocket equation, which sets the characteristic velocity available as a function of exhaust velocity and mass ratio, of initial (M0, including fuel) to final (M1, fuel depleted) mass. The main consequence is that mission velocities of more than a few times the velocity of the rocket motor exhaust (with respect to the vehicle) rapidly become impractical, as the dry mass (mass of payload and rocket without fuel) falls to below 10% of the entire rocket's wet mass (mass of rocket with fuel). Nuclear thermal and solar thermal rockets In a nuclear thermal rocket or solar thermal rocket a working fluid, usually hydrogen, is heated to a high temperature, and then expands through a rocket nozzle to create thrust. The energy replaces the chemical energy of the reactive chemicals in a traditional rocket engine. Due to the low molecular mass and hence high thermal velocity of hydrogen these engines are at least twice as fuel efficient as chemical engines, even after including the weight of the reactor. The US Atomic Energy Commission and NASA tested a few designs from 1959 to 1968. The NASA designs were conceived as replacements for the upper stages of the Saturn V launch vehicle, but the tests revealed reliability problems, mainly caused by the vibration and heating involved in running the engines at such high thrust levels. Political and environmental considerations make it unlikely such an engine will be used in the foreseeable future, since nuclear thermal rockets would be most useful at or near the Earth's surface and the consequences of a malfunction could be disastrous. Fission-based thermal rocket concepts produce lower exhaust velocities than the electric and plasma concepts described below, and are therefore less attractive solutions. For applications requiring high thrust-to-weight ratio, such as planetary escape, nuclear thermal is potentially more attractive. Electric propulsion Electric propulsion systems use an external source such as a nuclear reactor or solar cells to generate electricity, which is then used to accelerate a chemically inert propellant to speeds far higher than achieved in a chemical rocket. Such drives produce feeble thrust, and are therefore unsuitable for quick maneuvers or for launching from the surface of a planet. But they are so economical in their use of reaction mass that they can keep firing continuously for days or weeks, while chemical rockets use up reaction mass so quickly that they can only fire for seconds or minutes. Even a trip to the Moon is long enough for an electric propulsion system to outrun a chemical rocket – the Apollo missions took 3 days in each direction. NASA's Deep Space One was a very successful test of a prototype ion drive, which fired for a total of 678 days and enabled the probe to run down Comet Borrelly, a feat which would have been impossible for a chemical rocket. Dawn, the first NASA operational (i.e., non-technology demonstration) mission to use an ion drive for its primary propulsion, successfully orbited the large main-belt asteroids 1 Ceres and 4 Vesta. A more ambitious, nuclear-powered version was intended for a Jupiter mission without human crew, the Jupiter Icy Moons Orbiter (JIMO), originally planned for launch sometime in the next decade. Due to a shift in priorities at NASA that favored human crewed space missions, the project lost funding in 2005. A similar mission is currently under discussion as the US component of a joint NASA/ESA program for the exploration of Europa and Ganymede. A NASA multi-center Technology Applications Assessment Team led from the Johnson Spaceflight Center, has as of January 2011 described "Nautilus-X", a concept study for a multi-mission space exploration vehicle useful for missions beyond low Earth orbit (LEO), of up to 24 months duration for a crew of up to six. Although Nautilus-X is adaptable to a variety of mission-specific propulsion units of various low-thrust, high specific impulse (Isp) designs, nuclear ion-electric drive is shown for illustrative purposes. It is intended for integration and checkout at the International Space Station (ISS), and would be suitable for deep-space missions from the ISS to and beyond the Moon, including Earth/Moon L1, Sun/Earth L2, near-Earth asteroidal, and Mars orbital destinations. It incorporates a reduced-g centrifuge providing artificial gravity for crew health to ameliorate the effects of long-term 0g exposure, and the capability to mitigate the space radiation environment. Fission powered rockets The electric propulsion missions already flown, or currently scheduled, have used solar electric power, limiting their capability to operate far from the Sun, and also limiting their peak acceleration due to the mass of the electric power source. Nuclear-electric or plasma engines, operating for long periods at low thrust and powered by fission reactors, can reach speeds much greater than chemically powered vehicles. Fusion rockets Fusion rockets, powered by nuclear fusion reactions, would "burn" such light element fuels as deuterium, tritium, or 3He. Because fusion yields about 1% of the mass of the nuclear fuel as released energy, it is energetically more favorable than fission, which releases only about 0.1% of the fuel's mass-energy. However, either fission or fusion technologies can in principle achieve velocities far higher than needed for Solar System exploration, and fusion energy still awaits practical demonstration on Earth. One proposal using a fusion rocket was Project Daedalus. Another fairly detailed vehicle system, designed and optimized for crewed Solar System exploration, "Discovery II", based on the D3He reaction but using hydrogen as reaction mass, has been described by a team from NASA's Glenn Research Center. It achieves characteristic velocities of >300 km/s with an acceleration of ~1.7•10−3 g, with a ship initial mass of ~1700 metric tons, and payload fraction above 10%. Fusion rockets are considered to be a likely source of interplanetary transport for a planetary civilization. Exotic propulsion See the spacecraft propulsion article for a discussion of a number of other technologies that could, in the medium to longer term, be the basis of interplanetary missions. Unlike the situation with interstellar travel, the barriers to fast interplanetary travel involve engineering and economics rather than any basic physics. Solar sails Solar sails rely on the fact that light reflected from a surface exerts pressure on the surface. The radiation pressure is small and decreases by the square of the distance from the Sun, but unlike rockets, solar sails require no fuel. Although the thrust is small, it continues as long as the Sun shines and the sail is deployed. The original concept relied only on radiation from the Sun – for example in Arthur C. Clarke's 1965 story "Sunjammer". More recent light sail designs propose to boost the thrust by aiming ground-based lasers or masers at the sail. Ground-based lasers or masers can also help a light-sail spacecraft to decelerate: the sail splits into an outer and inner section, the outer section is pushed forward and its shape is changed mechanically to focus reflected radiation on the inner portion, and the radiation focused on the inner section acts as a brake. Although most articles about light sails focus on interstellar travel, there have been several proposals for their use within the Solar System. Currently, the only spacecraft to use a solar sail as the main method of propulsion is IKAROS which was launched by JAXA on May 21, 2010. It has since been successfully deployed, and shown to be producing acceleration as expected. Many ordinary spacecraft and satellites also use solar collectors, temperature-control panels and Sun shades as light sails, to make minor corrections to their attitude and orbit without using fuel. A few have even had small purpose-built solar sails for this use (for example Eurostar E3000 geostationary communications satellites built by EADS Astrium). Cyclers It is possible to put stations or spacecraft on orbits that cycle between different planets, for example a Mars cycler would synchronously cycle between Mars and Earth, with very little propellant usage to maintain the trajectory. Cyclers are conceptually a good idea, because massive radiation shields, life support and other equipment only need to be put onto the cycler trajectory once. A cycler could combine several roles: habitat (for example it could spin to produce an "artificial gravity" effect); mothership (providing life support for the crews of smaller spacecraft which hitch a ride on it). Cyclers could also possibly make excellent cargo ships for resupply of a colony. Space elevator A space elevator is a theoretical structure that would transport material from a planet's surface into orbit. The idea is that, once the expensive job of building the elevator is complete, an indefinite number of loads can be transported into orbit at minimal cost. Even the simplest designs avoid the vicious circle of rocket launches from the surface, wherein the fuel needed to travel the last 10% of the distance into orbit must be lifted all the way from the surface, requiring even more fuel, and so on. More sophisticated space elevator designs reduce the energy cost per trip by using counterweights, and the most ambitious schemes aim to balance loads going up and down and thus make the energy cost close to zero. Space elevators have also sometimes been referred to as "beanstalks", "space bridges", "space lifts", "space ladders" and "orbital towers". A terrestrial space elevator is beyond our current technology, although a lunar space elevator could theoretically be built using existing materials. Skyhook A skyhook is a theoretical class of orbiting tether propulsion intended to lift payloads to high altitudes and speeds. Proposals for skyhooks include designs that employ tethers spinning at hypersonic speed for catching high speed payloads or high altitude aircraft and placing them in orbit. In addition, it has been suggested that the rotating skyhook is "not engineeringly feasible using presently available materials". Launch vehicle and spacecraft reusability The SpaceX Starship, with maiden launch slated to be no earlier than 2020, is designed to be fully and rapidly reusable, making use of the SpaceX reusable technology that was developed during 2011–2018 for Falcon 9 and Falcon Heavy launch vehicles. SpaceX CEO Elon Musk estimates that the reusability capability alone, on both the launch vehicle and the spacecraft associated with the Starship will reduce overall system costs per tonne delivered to Mars by at least two orders of magnitude over what NASA had previously achieved. Staging propellants When launching interplanetary probes from the surface of Earth, carrying all energy needed for the long-duration mission, payload quantities are necessarily extremely limited, due to the basis mass limitations described theoretically by the rocket equation. One alternative to transport more mass on interplanetary trajectories is to use up nearly all of the upper stage propellant on launch, and then refill propellants in Earth orbit before firing the rocket to escape velocity for a heliocentric trajectory. These propellants could be stored on orbit at a propellant depot, or carried to orbit in a propellant tanker to be directly transferred to the interplanetary spacecraft. For returning mass to Earth, a related option is to mine raw materials from a solar system celestial object, refine, process, and store the reaction products (propellant) on the Solar System body until such time as a vehicle needs to be loaded for launch. On-orbit tanker transfers As of 2019, SpaceX is developing a system in which a reusable first stage vehicle would transport a crewed interplanetary spacecraft to Earth orbit, detach, return to its launch pad where a tanker spacecraft would be mounted atop it, then both fueled, then launched again to rendezvous with the waiting crewed spacecraft. The tanker would then transfer its fuel to the human crewed spacecraft for use on its interplanetary voyage. The SpaceX Starship is a stainless steel-structure spacecraft propelled by six Raptor engines operating on densified methane/oxygen propellants. It is -long, -diameter at its widest point, and is capable of transporting up to of cargo and passengers per trip to Mars, with on-orbit propellant refill before the interplanetary part of the journey. Propellant plant on a celestial body As an example of a funded project currently under development, a key part of the system SpaceX has designed for Mars in order to radically decrease the cost of spaceflight to interplanetary destinations is the placement and operation of a physical plant on Mars to handle production and storage of the propellant components necessary to launch and fly the Starships back to Earth, or perhaps to increase the mass that can be transported onward to destinations in the outer Solar System. The first Starship to Mars will carry a small propellant plant as a part of its cargo load. The plant will be expanded over multiple synods as more equipment arrives, is installed, and placed into mostly-autonomous production. The SpaceX propellant plant will take advantage of the large supplies of carbon dioxide and water resources on Mars, mining the water (H2O) from subsurface ice and collecting CO2 from the atmosphere. A chemical plant will process the raw materials by means of electrolysis and the Sabatier process to produce oxygen (O2) and methane (CH4), and then liquefy it to facilitate long-term storage and ultimate use. Using extraterrestrial resources Current space vehicles attempt to launch with all their fuel (propellants and energy supplies) on board that they will need for their entire journey, and current space structures are lifted from the Earth's surface. Non-terrestrial sources of energy and materials are mostly a lot further away, but most would not require lifting out of a strong gravity field and therefore should be much cheaper to use in space in the long term. The most important non-terrestrial resource is energy, because it can be used to transform non-terrestrial materials into useful forms (some of which may also produce energy). At least two fundamental non-terrestrial energy sources have been proposed: solar-powered energy generation (unhampered by clouds), either directly by solar cells or indirectly by focusing solar radiation on boilers which produce steam to drive generators; and electrodynamic tethers which generate electricity from the powerful magnetic fields of some planets (Jupiter has a very powerful magnetic field). Water ice would be very useful and is widespread on the moons of Jupiter and Saturn: The low gravity of these moons would make them a cheaper source of water for space stations and planetary bases than lifting it up from Earth's surface. Non-terrestrial power supplies could be used to electrolyse water ice into oxygen and hydrogen for use in bipropellant rocket engines. Nuclear thermal rockets or Solar thermal rockets could use it as reaction mass. Hydrogen has also been proposed for use in these engines and would provide much greater specific impulse (thrust per kilogram of reaction mass), but it has been claimed that water will beat hydrogen in cost/performance terms despite its much lower specific impulse by orders of magnitude. A spacecraft with an adequate water supply could carry the water under the hull, which could provide a considerable additional safety margin for the vessel and its occupants: The water would absorb and conduct solar energy, thus acting as a heat shield. A vessel traveling in the inner Solar System could maintain a constant heading relative to the Sun without overheating the side of the spacecraft facing the Sun, provided the water under the hull was constantly circulated to evenly distribute the solar heat throughout the hull; The water would provide some additional protection against ionizing radiation; The water would act as an insulator against the extreme cold assuming it was kept heated, whether by the Sun when traveling in the inner Solar System or by an on board power source when traveling further away from the Sun; The water would provide some additional protection against micrometeoroid impacts, provided the hull was compartmentalized so as to ensure any leak could be isolated to a small section of the hull. Oxygen is a common constituent of the moon's crust, and is probably abundant in most other bodies in the Solar System. Non-terrestrial oxygen would be valuable as a source of water ice only if an adequate source of hydrogen can be found. Possible uses include: In the life support systems of space ships, space stations and planetary bases. In rocket engines. Even if the other propellant has to be lifted from Earth, using non-terrestrial oxygen could reduce propellant launch costs by up to 2/3 for hydrocarbon fuel, or 85% for hydrogen. The savings are so high because oxygen accounts for the majority of the mass in most rocket propellant combinations. Unfortunately hydrogen, along with other volatiles like carbon and nitrogen, are much less abundant than oxygen in the inner Solar System. Scientists expect to find a vast range of organic compounds in some of the planets, moons and comets of the outer Solar System, and the range of possible uses is even wider. For example, methane can be used as a fuel (burned with non-terrestrial oxygen), or as a feedstock for petrochemical processes such as making plastics. And ammonia could be a valuable feedstock for producing fertilizers to be used in the vegetable gardens of orbital and planetary bases, reducing the need to lift food to them from Earth. Even unprocessed rock may be useful as rocket propellant if mass drivers are employed. Design requirements for crewed interplanetary travel Life support Life support systems must be capable of supporting human life for weeks, months or even years. A breathable atmosphere of at least must be maintained, with adequate amounts of oxygen, nitrogen, and controlled levels of carbon dioxide, trace gases and water vapor. In October 2015, the NASA Office of Inspector General issued a health hazards report related to human spaceflight, including a human mission to Mars. Radiation Once a vehicle leaves low Earth orbit and the protection of Earth's magnetosphere, it enters the Van Allen radiation belt, a region of high radiation. Beyond the Van Allen belts, radiation levels generally decrease, but can fluctuate over time. These high energy cosmic rays pose a health threat. Even the minimum levels of radiation during these fluctuations is comparable to the current annual limit for astronauts in low-Earth orbit. Scientists of Russian Academy of Sciences are searching for methods of reducing the risk of radiation-induced cancer in preparation for the mission to Mars. They consider as one of the options a life support system generating drinking water with low content of deuterium (a stable isotope of hydrogen) to be consumed by the crew members. Preliminary investigations have shown that deuterium-depleted water features certain anti-cancer effects. Hence, deuterium-free drinking water is considered to have the potential of lowering the risk of cancer caused by extreme radiation exposure of the Martian crew. In addition, coronal mass ejections from the Sun are highly dangerous, and are fatal within a very short timescale to humans unless they are protected by massive shielding. Reliability Any major failure to a spacecraft en route is likely to be fatal, and even a minor one could have dangerous results if not repaired quickly, something difficult to accomplish in open space. The crew of the Apollo 13 mission survived despite an explosion caused by a faulty oxygen tank (1970). Launch windows For astrodynamics reasons, economic spacecraft travel to other planets is only practical within certain time windows. Outside these windows the planets are essentially inaccessible from Earth with current technology. This constrains flights and limits rescue options in the case of an emergency. See also Space travel in science fiction References Further reading Articles containing video clips Discovery and exploration of the Solar System
[ 0.01970096118748188, 0.2991580665111542, 0.15157447755336761, 0.5198066830635071, 0.3335770070552826, 0.32773175835609436, -0.5189352035522461, 0.8158043622970581, -0.23153434693813324, -0.7485635280609131, -0.6636912822723389, 0.20437735319137573, -0.4893592894077301, 0.6722626686096191, ...
15112
https://en.wikipedia.org/wiki/Wave%20interference
Wave interference
In physics, interference is a phenomenon in which two waves superpose to form a resultant wave of greater, lower, or the same amplitude. Constructive and destructive interference result from the interaction of waves that are correlated or coherent with each other, either because they come from the same source or because they have the same or nearly the same frequency. Interference effects can be observed with all types of waves, for example, light, radio, acoustic, surface water waves, gravity waves, or matter waves. The resulting images or graphs are called interferoplots. Etymology The word interference is derived from the Latin words inter which means "between" and fere which means "hit or strike", and was coined by Thomas Young in 1801. Mechanisms The principle of superposition of waves states that when two or more propagating waves of the same type are incident on the same point, the resultant amplitude at that point is equal to the vector sum of the amplitudes of the individual waves. If a crest of a wave meets a crest of another wave of the same frequency at the same point, then the amplitude is the sum of the individual amplitudes—this is constructive interference. If a crest of one wave meets a trough of another wave, then the amplitude is equal to the difference in the individual amplitudes—this is known as destructive interference. Constructive interference occurs when the phase difference between the waves is an even multiple of (180°), whereas destructive interference occurs when the difference is an odd multiple of . If the difference between the phases is intermediate between these two extremes, then the magnitude of the displacement of the summed waves lies between the minimum and maximum values. Consider, for example, what happens when two identical stones are dropped into a still pool of water at different locations. Each stone generates a circular wave propagating outwards from the point where the stone was dropped. When the two waves overlap, the net displacement at a particular point is the sum of the displacements of the individual waves. At some points, these will be in phase, and will produce a maximum displacement. In other places, the waves will be in anti-phase, and there will be no net displacement at these points. Thus, parts of the surface will be stationary—these are seen in the figure above and to the right as stationary blue-green lines radiating from the centre. Interference of light is a common phenomenon that can be explained classically by the superposition of waves, however a deeper understanding of light interference requires knowledge of wave-particle duality of light which is due to quantum mechanics. Prime examples of light interference are the famous double-slit experiment, laser speckle, anti-reflective coatings and interferometers. Traditionally the classical wave model is taught as a basis for understanding optical interference, based on the Huygens–Fresnel principle. Derivation The above can be demonstrated in one dimension by deriving the formula for the sum of two waves. The equation for the amplitude of a sinusoidal wave traveling to the right along the x-axis is where is the peak amplitude, is the wavenumber and is the angular frequency of the wave. Suppose a second wave of the same frequency and amplitude but with a different phase is also traveling to the right where is the phase difference between the waves in radians. The two waves will superpose and add: the sum of the two waves is Using the trigonometric identity for the sum of two cosines: this can be written This represents a wave at the original frequency, traveling to the right like its components, whose amplitude is proportional to the cosine of . Constructive interference: If the phase difference is an even multiple of : then , so the sum of the two waves is a wave with twice the amplitude Destructive interference: If the phase difference is an odd multiple of : then , so the sum of the two waves is zero Between two plane waves A simple form of interference pattern is obtained if two plane waves of the same frequency intersect at an angle. Interference is essentially an energy redistribution process. The energy which is lost at the destructive interference is regained at the constructive interference. One wave is travelling horizontally, and the other is travelling downwards at an angle θ to the first wave. Assuming that the two waves are in phase at the point B, then the relative phase changes along the x-axis. The phase difference at the point A is given by It can be seen that the two waves are in phase when and are half a cycle out of phase when Constructive interference occurs when the waves are in phase, and destructive interference when they are half a cycle out of phase. Thus, an interference fringe pattern is produced, where the separation of the maxima is and is known as the fringe spacing. The fringe spacing increases with increase in wavelength, and with decreasing angle . The fringes are observed wherever the two waves overlap and the fringe spacing is uniform throughout. Between two spherical waves A point source produces a spherical wave. If the light from two point sources overlaps, the interference pattern maps out the way in which the phase difference between the two waves varies in space. This depends on the wavelength and on the separation of the point sources. The figure to the right shows interference between two spherical waves. The wavelength increases from top to bottom, and the distance between the sources increases from left to right. When the plane of observation is far enough away, the fringe pattern will be a series of almost straight lines, since the waves will then be almost planar. Multiple beams Interference occurs when several waves are added together provided that the phase differences between them remain constant over the observation time. It is sometimes desirable for several waves of the same frequency and amplitude to sum to zero (that is, interfere destructively, cancel). This is the principle behind, for example, 3-phase power and the diffraction grating. In both of these cases, the result is achieved by uniform spacing of the phases. It is easy to see that a set of waves will cancel if they have the same amplitude and their phases are spaced equally in angle. Using phasors, each wave can be represented as for waves from to , where To show that one merely assumes the converse, then multiplies both sides by The Fabry–Pérot interferometer uses interference between multiple reflections. A diffraction grating can be considered to be a multiple-beam interferometer; since the peaks which it produces are generated by interference between the light transmitted by each of the elements in the grating; see interference vs. diffraction for further discussion. Optical interference Because the frequency of light waves (~1014 Hz) is too high to be detected by currently available detectors, it is possible to observe only the intensity of an optical interference pattern. The intensity of the light at a given point is proportional to the square of the average amplitude of the wave. This can be expressed mathematically as follows. The displacement of the two waves at a point is: where represents the magnitude of the displacement, represents the phase and represents the angular frequency. The displacement of the summed waves is The intensity of the light at is given by This can be expressed in terms of the intensities of the individual waves as Thus, the interference pattern maps out the difference in phase between the two waves, with maxima occurring when the phase difference is a multiple of 2. If the two beams are of equal intensity, the maxima are four times as bright as the individual beams, and the minima have zero intensity. The two waves must have the same polarization to give rise to interference fringes since it is not possible for waves of different polarizations to cancel one another out or add together. Instead, when waves of different polarization are added together, they give rise to a wave of a different polarization state. Light source requirements The discussion above assumes that the waves which interfere with one another are monochromatic, i.e. have a single frequency—this requires that they are infinite in time. This is not, however, either practical or necessary. Two identical waves of finite duration whose frequency is fixed over that period will give rise to an interference pattern while they overlap. Two identical waves which consist of a narrow spectrum of frequency waves of finite duration (but shorter than their coherence time), will give a series of fringe patterns of slightly differing spacings, and provided the spread of spacings is significantly less than the average fringe spacing, a fringe pattern will again be observed during the time when the two waves overlap. Conventional light sources emit waves of differing frequencies and at different times from different points in the source. If the light is split into two waves and then re-combined, each individual light wave may generate an interference pattern with its other half, but the individual fringe patterns generated will have different phases and spacings, and normally no overall fringe pattern will be observable. However, single-element light sources, such as sodium- or mercury-vapor lamps have emission lines with quite narrow frequency spectra. When these are spatially and colour filtered, and then split into two waves, they can be superimposed to generate interference fringes. All interferometry prior to the invention of the laser was done using such sources and had a wide range of successful applications. A laser beam generally approximates much more closely to a monochromatic source, and thus it is much more straightforward to generate interference fringes using a laser. The ease with which interference fringes can be observed with a laser beam can sometimes cause problems in that stray reflections may give spurious interference fringes which can result in errors. Normally, a single laser beam is used in interferometry, though interference has been observed using two independent lasers whose frequencies were sufficiently matched to satisfy the phase requirements. This has also been observed for widefield interference between two incoherent laser sources. It is also possible to observe interference fringes using white light. A white light fringe pattern can be considered to be made up of a 'spectrum' of fringe patterns each of slightly different spacing. If all the fringe patterns are in phase in the centre, then the fringes will increase in size as the wavelength decreases and the summed intensity will show three to four fringes of varying colour. Young describes this very elegantly in his discussion of two slit interference. Since white light fringes are obtained only when the two waves have travelled equal distances from the light source, they can be very useful in interferometry, as they allow the zero path difference fringe to be identified. Optical arrangements To generate interference fringes, light from the source has to be divided into two waves which have then to be re-combined. Traditionally, interferometers have been classified as either amplitude-division or wavefront-division systems. In an amplitude-division system, a beam splitter is used to divide the light into two beams travelling in different directions, which are then superimposed to produce the interference pattern. The Michelson interferometer and the Mach–Zehnder interferometer are examples of amplitude-division systems. In wavefront-division systems, the wave is divided in space—examples are Young's double slit interferometer and Lloyd's mirror. Interference can also be seen in everyday phenomena such as iridescence and structural coloration. For example, the colours seen in a soap bubble arise from interference of light reflecting off the front and back surfaces of the thin soap film. Depending on the thickness of the film, different colours interfere constructively and destructively. Applications Beat In acoustics, a beat is an interference pattern between two sounds of slightly different frequencies, perceived as a periodic variation in volume whose rate is the difference of the two frequencies. With tuning instruments that can produce sustained tones, beats can be readily recognized. Tuning two tones to a unison will present a peculiar effect: when the two tones are close in pitch but not identical, the difference in frequency generates the beating. The volume varies like in a tremolo as the sounds alternately interfere constructively and destructively. As the two tones gradually approach unison, the beating slows down and may become so slow as to be imperceptible. As the two tones get further apart, their beat frequency starts to approach the range of human pitch perception, the beating starts to sound like a note, and a combination tone is produced. This combination tone can also be referred to as a missing fundamental, as the beat frequency of any two tones is equivalent to the frequency of their implied fundamental frequency. Optical interferometry Interferometry has played an important role in the advancement of physics, and also has a wide range of applications in physical and engineering measurement. Thomas Young's double slit interferometer in 1803 demonstrated interference fringes when two small holes were illuminated by light from another small hole which was illuminated by sunlight. Young was able to estimate the wavelength of different colours in the spectrum from the spacing of the fringes. The experiment played a major role in the general acceptance of the wave theory of light. In quantum mechanics, this experiment is considered to demonstrate the inseparability of the wave and particle natures of light and other quantum particles (wave–particle duality). Richard Feynman was fond of saying that all of quantum mechanics can be gleaned from carefully thinking through the implications of this single experiment. The results of the Michelson–Morley experiment are generally considered to be the first strong evidence against the theory of a luminiferous aether and in favor of special relativity. Interferometry has been used in defining and calibrating length standards. When the metre was defined as the distance between two marks on a platinum-iridium bar, Michelson and Benoît used interferometry to measure the wavelength of the red cadmium line in the new standard, and also showed that it could be used as a length standard. Sixty years later, in 1960, the metre in the new SI system was defined to be equal to 1,650,763.73 wavelengths of the orange-red emission line in the electromagnetic spectrum of the krypton-86 atom in a vacuum. This definition was replaced in 1983 by defining the metre as the distance travelled by light in vacuum during a specific time interval. Interferometry is still fundamental in establishing the calibration chain in length measurement. Interferometry is used in the calibration of slip gauges (called gauge blocks in the US) and in coordinate-measuring machines. It is also used in the testing of optical components. Radio interferometry In 1946, a technique called astronomical interferometry was developed. Astronomical radio interferometers usually consist either of arrays of parabolic dishes or two-dimensional arrays of omni-directional antennas. All of the telescopes in the array are widely separated and are usually connected together using coaxial cable, waveguide, optical fiber, or other type of transmission line. Interferometry increases the total signal collected, but its primary purpose is to vastly increase the resolution through a process called Aperture synthesis. This technique works by superposing (interfering) the signal waves from the different telescopes on the principle that waves that coincide with the same phase will add to each other while two waves that have opposite phases will cancel each other out. This creates a combined telescope that is equivalent in resolution (though not in sensitivity) to a single antenna whose diameter is equal to the spacing of the antennas farthest apart in the array. Acoustic interferometry An acoustic interferometer is an instrument for measuring the physical characteristics of sound waves in a gas or liquid, such velocity, wavelength, absorption, or impedance. A vibrating crystal creates ultrasonic waves that are radiated into the medium. The waves strike a reflector placed parallel to the crystal, reflected back to the source and measured. Quantum interference Quantum interference is quite different from the classical wave interference described above. Below, an enumeration of the important differences is provided. Quantum interference is, however, similar to optical interference. Let be a wavefunction solution of the Schrödinger equation for a quantum mechanical object. Then the probability of observing the object at position is where * indicates complex conjugation. Quantum interference concerns the issue of this probability when the wavefunction is expressed as a sum or linear superposition of two terms : Usually, and correspond to distinct situations A and B. When this is the case, the equation indicates that the object can be in situation A or situation B. The above equation can then be interpreted as: The probability of finding the object at is the probability of finding the object at when it is in situation A plus the probability of finding the object at when it is in situation B plus an extra term. This extra term, which is called the quantum interference term, is in the above equation. As in the classical wave case above, the quantum interference term can add (constructive interference) or subtract (destructive interference) from in the above equation depending on whether the quantum interference term is positive or negative. If this term is absent for all , then there is no quantum mechanical interference associated with situations A and B. The best known example of quantum interference is the double-slit experiment. In this experiment, electrons, atoms or other quantum mechanical objects approach a barrier with two slits in it. If the quantum object succeeds in passing through the slits, its position is measured with a detection screen a certain distance beyond and behind the barrier. For this system, one lets be that part of the wavefunction that passes through one of the slits and lets be that part of the wavefunction that passes through the other slit. When the object almost reaches the screen, the probability of where it is located is given by the above equation. In this context, the equation says that the probability of finding the object at some point just before it hits the screen is the probability that would be obtained if it went through the first slit plus the probability that would be obtained if it went through the second slit plus the quantum interference term, which has no counterpart in classical physics. The quantum interference term can significantly change the pattern observed on the detection screen. The separation of is particularly clear in the path integral formulation of quantum mechanics in the context of the double-slit experiment. consists of the path integral contributions in which the paths pass through the first slit; consists of the path integral contributions in which they pass through the second slit. Here is a list of some of the differences between classical wave interference and quantum interference: See also Active noise control Beat (acoustics) Coherence (physics) Diffraction Haidinger fringes Interference lithography Interference visibility Interferometer Lloyd's Mirror Moiré pattern Multipath interference Newton's rings Optical path length Thin-film interference Upfade References External links Easy JavaScript Simulation Model of One Dimensional Wave Interference Expressions of position and fringe spacing Java simulation of interference of water waves 1 Java simulation of interference of water waves 2 Flash animations demonstrating interference Wave mechanics ca:Interferència (propagació d'ones)#Interferència òptica
[ 0.21333737671375275, -0.06618908047676086, -0.011085409671068192, 0.08233796805143356, -0.5334447622299194, -0.45589640736579895, 0.34568193554878235, -0.34605228900909424, -0.37264516949653625, -0.436674028635025, -0.24779516458511353, 0.183257594704628, -0.8364360332489014, 0.48563581705...
15114
https://en.wikipedia.org/wiki/Indictable%20offence
Indictable offence
In many common law jurisdictions (e.g. England and Wales, Ireland, Canada, Hong Kong, India, Australia, New Zealand, Malaysia, Singapore), an indictable offence is an offence which can only be tried on an indictment after a preliminary hearing to determine whether there is a prima facie case to answer or by a grand jury (in contrast to a summary offence). In the United States, a crime of similar severity and rules is called a felony, which also requires an indictment. In Scotland, which is a hybrid common law jurisdiction, the procurator fiscal will commence solemn proceedings for serious crimes to be prosecuted on indictment before a jury. Canada In Canada, an indictable offence is a crime that is more serious than a summary offence. Examples of indictable offences include theft over $5,000, breaking and entering, aggravated sexual assault, and murder. Maximum penalties for indictable offences are different depending on the crime and can include life in prison. There are minimum penalties for some indictable offences. England and Wales In relation to England and Wales, the expression indictable offence means an offence which, if committed by an adult, is triable on indictment, whether it is exclusively so triable or triable either way; and the term indictable, in its application to offences, is to be construed accordingly. In this definition, references to the way or ways in which an offence is triable are to be construed without regard to the effect, if any, of section 22 of the Magistrates' Courts Act 1980 on the mode of trial in a particular case. An either-way offence allows the defendant to elect between trial by jury on indictment in the Crown Court and summary trial in a magistrates' court. However, the election may be overruled by the magistrates' court if the facts suggest that the sentencing powers of a magistrates' court would be inadequate to reflect the seriousness of the offence. In relation to some indictable offences, for example criminal damage, only summary trial is available unless the damage caused exceeds £5,000. A youth court has jurisdiction to try all indictable offences with the exception of homicide and certain firearms offences, and will normally do so provided that the available sentencing power of two years' detention is adequate to punish the offender if found guilty. History See section 64 of the Criminal Law Act 1977. Grand juries were abolished in 1933. Offences triable only on indictment Some offences such as murder and rape are considered so serious that they can only be tried on indictment at the Crown Court where the widest range of sentencing powers is available to the judge. The expression indictable-only offence was defined by section 51 of the Crime and Disorder Act 1998, as originally enacted, as an offence triable only on indictment. Sections 51 and 52 of, and Schedule 3 to, that Act abolished committal proceedings for such offences and made other provisions in relation to them. When the accused is charged with an indictable-only offence, he or she will be tried in the Crown Court. The rules are different in England and Wales in respect of those under 18 years of age. See also section 14(a) of the Criminal Law Act 1977. New Zealand Similarly in New Zealand, a rape or murder charge will be tried at the High Court, while less serious offences such as theft will be tried at the District Court. However, the District Court can hold both jury and summary trials. United States In United States penal law, other than a felony, court findings of, or an act of gross negligence can be counted as an indictable offence. See also Federal crime Felony Indictment Summary offence References Common law Crimes Criminal law
[ 0.33359068632125854, 0.21556952595710754, -0.5606338381767273, -0.6079423427581787, -0.3884807825088501, -0.013859562575817108, 0.9653595089912415, 0.48641642928123474, -0.651824951171875, -0.14405252039432526, -0.1345193088054657, 0.009788528084754944, -0.38693320751190186, 0.211707457900...
15116
https://en.wikipedia.org/wiki/Inter%20Milan
Inter Milan
Football Club Internazionale Milano, commonly referred to as Internazionale () or simply Inter, and known as Inter Milan outside Italy, is an Italian professional football club based in Milan, Lombardy. Inter is the only Italian side to have always competed in the top flight of Italian football since its debut in 1909. Founded in 1908 following a schism within the Milan Cricket and Football Club (now AC Milan), Inter won its first championship in 1910. Since its formation, the club has won 32 domestic trophies, including 19 league titles, 7 Coppa Italia and 6 Supercoppa Italiana. From 2006 to 2010, the club won five successive league titles, equalling the all-time record at that time. They have won the Champions League three times: two back-to-back in 1964 and 1965 and then another in 2010. Their latest win completed an unprecedented Italian seasonal treble, with Inter winning the Coppa Italia and the Scudetto the same year. The club has also won three UEFA Cups, two Intercontinental Cups and one FIFA Club World Cup. Inter's home games are played at the San Siro stadium, which they share with city rivals AC Milan. The stadium is the largest in Italian football with a capacity of 75,923. They have long-standing rivalries with AC Milan, with whom they contest the Derby della Madonnina, and Juventus, with whom they contest the Derby d'Italia; their rivalry with the former is one of the most followed derbies in football. , Inter has the highest home game attendance in Italy and the sixth highest attendance in Europe. The club is one of the most valuable in Italian and world football. History Foundation and early years (1908–1960) The club was founded on 9 March 1908 as Football Club Internazionale, following the schism with the Milan Cricket and Football Club (now AC Milan). The name of the club derives from the wish of its founding members to accept foreign players without limits as well as Italians. The club won its first championship in 1910 and its second in 1920. The captain and coach of the first championship winning team was Virgilio Fossati, who was later killed in battle while serving in the Italian army during World War I. In 1922, Inter was at risk of relegation to the second division, but they remained in the top league after winning two play-offs. Six years later, during the Fascist era, the club was forced to merge with the Unione Sportiva Milanese and was renamed Società Sportiva Ambrosiana. During the 1928–29 season, the team wore white jerseys with a red cross emblazoned on it; the jersey's design was inspired by the flag and coat of arms of the city of Milan. In 1929, the new club chairman Oreste Simonotti changed the club's name to Associazione Sportiva Ambrosiana and restored the previous black-and-blue jerseys, however supporters continued to call the team Inter, and in 1931 new chairman Pozzani caved in to shareholder pressure and changed the name to Associazione Sportiva Ambrosiana-Inter. Their first Coppa Italia (Italian Cup) was won in 1938–39, led by the iconic Giuseppe Meazza, after whom the San Siro stadium is officially named. A fifth championship followed in 1940, despite Meazza incurring an injury. After the end of World War II the club regained its original name, winning its sixth championship in 1953 and its seventh in 1954. Grande Inter (1960–1967) In 1960, manager Helenio Herrera joined Inter from Barcelona, bringing with him his midfield general Luis Suárez, who won the European Footballer of the Year in the same year for his role in Barcelona's La Liga/Fairs Cup double. He would transform Inter into one of the greatest teams in Europe. He modified a 5–3–2 tactic known as the "Verrou" ("door bolt") which created greater flexibility for counterattacks. The catenaccio system was invented by an Austrian coach, Karl Rappan. Rappan's original system was implemented with four fixed defenders, playing a strict man-to-man marking system, plus a playmaker in the middle of the field who plays the ball together with two midfield wings. Herrera would modify it by adding a fifth defender, the sweeper or libero behind the two centre backs. The sweeper or libero who acted as the free man would deal with any attackers who went through the two centre backs. Inter finished third in the Serie A in his first season, second the next year and first in his third season. Then followed a back-to-back European Cup victory in 1964 and 1965, earning him the title "il Mago" ("the Wizard"). The core of Herrera's team were the attacking fullbacks Tarcisio Burgnich and Giacinto Facchetti, Armando Picchi the sweeper, Suárez the playmaker, Jair the winger, Mario Corso the left midfielder, and Sandro Mazzola, who played on the inside-right. In 1964, Inter reached the European Cup Final by beating Borussia Dortmund in the semi-final and Partizan in the quarter-final. In the final, they met Real Madrid, a team that had reached seven out of the nine finals to date. Mazzola scored two goals in a 3–1 victory, and then the team won the Intercontinental Cup against Independiente. A year later, Inter repeated the feat by beating two-time winner Benfica in the final held at home, from a Jair goal, and then again beat Independiente in the Intercontinental Cup. In 1967, with Jair gone and Suárez injured, Inter lost the European Cup Final 2–1 to Celtic. During that year the club changed its name to Football Club Internazionale Milano. Subsequent achievements (1967–1991) Following the golden era of the 1960s, Inter managed to win their eleventh league title in 1971 and their twelfth in 1980. Inter were defeated for the second time in five years in the final of the European Cup, going down 0–2 to Johan Cruyff's Ajax in 1972. During the 1970s and the 1980s, Inter also added two to its Coppa Italia tally, in 1977–78 and 1981–82. Hansi Müller (1975-1982 VfB Stuttgart, 1982-1984 Inter Milan) and Karl-Heinz Rummenigge (1974-1984 Bayern Munich, 1984-1987 Inter Milan) played for Inter Milan. Led by the German duo of Andreas Brehme and Lothar Matthäus, and Argentine Ramón Díaz, Inter captured the 1989 Serie A championship. Inter were unable to defend their title despite adding fellow German Jürgen Klinsmann to the squad and winning their first Supercoppa Italiana at the start of the season. Mixed fortunes (1991–2004) The 1990s was a period of disappointment. While their great rivals Milan and Juventus were achieving success both domestically and in Europe, Inter were left behind, with repeated mediocre results in the domestic league standings, their worst coming in 1993–94 when they finished just one point out of the relegation zone. Nevertheless, they achieved some European success with three UEFA Cup victories in 1991, 1994 and 1998. With Massimo Moratti's takeover from Ernesto Pellegrini in 1995, Inter twice broke the world record transfer fee in this period (£19.5 million for Ronaldo from Barcelona in 1997 and £31 million for Christian Vieri from Lazio two years later). However, the 1990s remained the only decade in Inter's history in which they did not win a single Serie A championship. For Inter fans, it was difficult to find who in particular was to blame for the troubled times and this led to some icy relations between them and the chairman, the managers and even some individual players. Moratti later became a target of the fans, especially when he sacked the much-loved coach Luigi Simoni after only a few games into the 1998–99 season, having just received the Italian manager of the year award for 1998 the day before being dismissed. That season, Inter failed to qualify for any European competition for the first time in almost ten years, finishing in eighth place. The following season, Moratti appointed former Juventus manager Marcello Lippi, and signed players such as Angelo Peruzzi and Laurent Blanc together with other former Juventus players Vieri and Vladimir Jugović. The team came close to their first domestic success since 1989 when they reached the Coppa Italia final only to be defeated by Lazio. Inter's misfortunes continued the following season, losing the 2000 Supercoppa Italiana match against Lazio 4–3 after initially taking the lead through new signing Robbie Keane. They were also eliminated in the preliminary round of the Champions League by Swedish club Helsingborgs IF, with Álvaro Recoba missing a crucial late penalty. Lippi was sacked after only a single game of the new season following Inter's first ever Serie A defeat to Reggina. Marco Tardelli, chosen to replace Lippi, failed to improve results, and is remembered by Inter fans as the manager that lost 6–0 in the city derby against Milan. Other members of the Inter "family" during this period that suffered were the likes of Vieri and Fabio Cannavaro, both of whom had their restaurants in Milan vandalised after defeats to the Rossoneri. In 2002, not only did Inter manage to make it to the UEFA Cup semi-finals, but were also only 45 minutes away from capturing the Scudetto when they needed to maintain their one-goal advantage away to Lazio. Inter were 2–1 up after only 24 minutes. Lazio equalised during first half injury time and then scored two more goals in the second half to clinch victory that eventually saw Juventus win the championship. The next season, Inter finished as league runners-up and also managed to make it to the 2002–03 Champions League semi-finals against Milan, losing on the away goals rule. Comeback and unprecedented treble (2004–2011) On 8 July 2004, Inter appointed former Lazio coach Roberto Mancini as its new head coach. In his first season, the team collected 72 points from 18 wins, 18 draws and only two losses, as well as winning the Coppa Italia and later the Supercoppa Italiana. On 11 May 2006, Inter retained their Coppa Italia title once again after defeating Roma with a 4–1 aggregate victory (a 1–1 scoreline in Rome and a 3–1 win at the San Siro). Inter were awarded the 2005–06 Serie A championship retrospectively after title-winning Juventus was relegated and points were stripped from Milan due to the match fixing scandal that year. During the following season, Inter went on a record-breaking run of 17 consecutive victories in Serie A, starting on 25 September 2006 with a 4–1 home victory over Livorno, and ending on 28 February 2007, after a 1–1 draw at home to Udinese. On 22 April 2007, Inter won their second consecutive Scudetto—and first on the field since 1989—when they defeated Siena 2–1 at Stadio Artemio Franchi. Italian World Cup-winning defender Marco Materazzi scored both goals. Inter started the 2007–08 season with the goal of winning both Serie A and Champions League. The team started well in the league, topping the table from the first round of matches, and also managed to qualify for the Champions League knockout stage. However, a late collapse, leading to a 2–0 defeat with ten men away to Liverpool on 19 February in the Champions League, threw into question manager Roberto Mancini's future at Inter while domestic form took a sharp turn of fortune with the team failing to win in the three following Serie A games. After being eliminated by Liverpool in the Champions League, Mancini announced his intention to leave his job immediately only to change his mind the following day. On the final day of the 2007–08 Serie A season, Inter played Parma away, and two goals from Zlatan Ibrahimović sealed their third consecutive championship. Mancini, however, was sacked soon after due to his previous announcement to leave the club. On 2 June 2008, Inter appointed former Porto and Chelsea boss José Mourinho as new head coach. In his first season, the Nerazzurri won a Suppercoppa Italiana and a fourth consecutive title, though falling in the Champions League in the first knockout round for a third-straight year, losing to eventual finalist Manchester United. In winning the league title Inter became the first club in the last 60 years to win the title for the fourth consecutive time and joined Torino and Juventus as the only clubs to accomplish this feat, as well as being the first club based outside Turin. Inter won the 2009–10 Champions League, defeating reigning champions Barcelona in the semi-final before beating Bayern Munich 2–0 in the final with two goals from Diego Milito. Inter also won the 2009–10 Serie A title by two points over Roma, and the 2010 Coppa Italia by defeating the same side 1–0 in the final. This made Inter the first Italian team to win the treble. At the end of the season, Mourinho left the club to manage Real Madrid; he was replaced by Rafael Benítez. On 21 August 2010, Inter defeated Roma 3–1 and won the 2010 Supercoppa Italiana, their fourth trophy of the year. In December 2010, they claimed the FIFA Club World Cup for the first time after a 3–0 win against TP Mazembe in the final. However, after this win, on 23 December 2010, due to their declining performance in Serie A, the team fired Benítez. He was replaced by Leonardo the following day. Leonardo started with 30 points from 12 games, with an average of 2.5 points per game, better than his predecessors Benítez and Mourinho. On 6 March 2011, Leonardo set a new Italian Serie A record by collecting 33 points in 13 games; the previous record was 32 points in 13 games made by Fabio Capello in the 2004–05 season. Leonardo led the club to the quarter-finals of the Champions League before losing to Schalke 04, and lead them to Coppa Italia title. At the end of the season, however, he resigned and was followed by new managers Gian Piero Gasperini, Claudio Ranieri and Andrea Stramaccioni, all hired during the following season. Changes in ownership (2011–2019) On 1 August 2012, the club announced that Moratti was to sell a minority interest of the club to a Chinese consortium led by Kenneth Huang. On the same day, Inter announced an agreement was formed with China Railway Construction Corporation Limited for a new stadium project, however, the deal with the Chinese eventually collapsed. The 2012–13 season was the worst in recent club history with Inter finishing ninth in Serie A and failing to qualify for any European competitions. Walter Mazzarri was appointed to replace Stramaccioni as the manager for 2013–14 season on 24 May 2013, having ended his tenure at Napoli. He guided the club to fifth in Serie A and to 2014–15 UEFA Europa League qualification. On 15 October 2013, an Indonesian consortium (International Sports Capital HK Ltd.) led by Erick Thohir, Handy Soetedjo and Rosan Roeslani, signed an agreement to acquire 70% of Inter shares from Internazionale Holding S.r.l. Immediately after the deal, Moratti's Internazionale Holding S.r.l. still retained 29.5% of the shares of FC Internazionale Milano S.p.A. After the deal, the shares of Inter was owned by a chain of holding companies, namely International Sports Capital S.p.A. of Italy (for 70% stake), International Sports Capital HK Limited and Asian Sports Ventures HK Limited of Hong Kong. Asian Sports Ventures HK Limited, itself another intermediate holding company, was owned by Nusantara Sports Ventures HK Limited (60% stake, a company owned by Thohir), Alke Sports Investment HK Limited (20% stake) and Aksis Sports Capital HK Limited (20% stake). Thohir, whom also co-owned Major League Soccer (MLS) club D.C. United and Indonesia Super League (ISL) club Persib Bandung, announced on 2 December 2013 that Inter and D.C. United had formed strategic partnership. During the Thohir era the club began to modify its financial structure from one reliant on continual owner investment to a more self sustain business model although the club still breached UEFA Financial Fair Play Regulations in 2015. The club was fined and received squad reduction in UEFA competitions, with additional penalties suspended in the probation period. During this time, Roberto Mancini returned as the club manager on 14 November 2014, with Inter finishing eighth. Inter finished 2015–2016 season fourth, failing to return to Champions League. On 6 June 2016, Suning Holdings Group (via a Luxembourg-based subsidiary Great Horizon S.á r.l.) a company owned by Zhang Jindong, co-founder and chairman of Suning Commerce Group, acquired a majority stake of Inter from Thohir's consortium International Sports Capital S.p.A. and from Moratti family's remaining shares in Internazionale Holding S.r.l. According to various filings, the total investment from Suning was €270 million. The deal was approved by an extraordinary general meeting on 28 June 2016, from which Suning Holdings Group had acquired a 68.55% stake in the club. The first season of new ownership, however, started with poor performance in pre-season friendlies. On 8 August 2016, Inter parted company with head coach Roberto Mancini by mutual consent over disagreements regarding the club's direction. He was replaced by Frank de Boer who was sacked on 1 November 2016 after leading Inter to a 4W–2D–5L record in 11 Serie A games as head coach. The successor, Stefano Pioli, didn't save the team from getting the worst group result in UEFA competitions in the club's history. Despite an eight-game winning streak, he and the club parted away before season's end when it became clear they would finish outside the league's top three for the sixth consecutive season. On 9 June 2017, former Roma coach Luciano Spalletti was appointed as Inter manager, signing a two-year contract, and eleven months later Inter clinched a UEFA Champions League group stage spot after going six years without Champions League participation thanks to a 3–2 victory against Lazio in the final game of 2017–18 Serie A. Due to this success, in August the club extended the contract with Spalletti to 2021. On 26 October 2018, Steven Zhang was appointed as new president of the club. On 25 January 2019, the club officially announced that LionRock Capital from Hong Kong reached an agreement with International Sports Capital HK Limited, in order to acquire its 31.05% shares in Inter and to become the club's new minority shareholder. After the 2018–19 Serie A season, despite Inter finishing fourth, Spalletti was sacked. Recent history (2019–present) On 31 May 2019, Inter appointed former Juventus and Italian manager Antonio Conte as their new coach, signing a three-year deal. In September 2019, Steven Zhang was elected to the board of the European Club Association. In the 2019–20 Serie A, Inter Milan finished as runner-up as they won 2–0 against Atalanta on the last matchday. They also reached the 2020 UEFA Europa League Final, ultimately losing 3–2 to Sevilla. Following Atalanta's draw against Sassuolo on 2 May 2021, Internazionale were confirmed as champions for the first time in eleven years, ending Juventus' run of nine consecutive titles. However, despite securing Serie A glory, Conte left the club by mutual consent on 26 May 2021. The departure was reportedly due to disagreements between Conte and the board over player transfers. In June 2021, Simone Inzaghi was appointed as Conte's replacement. On 22 June 2021, Carlo Cottarelli launched the shareholding of the fans of the Inter Milan club with InterSpac project. On 6 July 2021, Achraf Hakimi was sold to Paris Saint-Germain F.C. for 68 million euro. On 8 August 2021, Romelu Lukaku was sold to Chelsea F.C. for 115 million euros, representing the most expensive association football transfer by an Italian football club ever. On 10 August 2021, Inter Milan confirmed they will be terminating Radja Nainggolan's contract. On 12 August 2021, Inter Milan and PSV Eindhoven have reached an agreement for the transfer of Denzel Dumfries. The deal closed for €12.5 million plus a 2.5 million bonus for the Eindhoven club. On 13 August 2021, Inter Milan confirms the acquisition of Edin Džeko who is sold by Roma outright and has signed a contract with the club until 30 June 2023. He will receive an annual salary of 6 million plus bonuses. Colours and badge One of the founders of Inter, a painter named Giorgio Muggiani, was responsible for the design of the first Inter logo in 1908. The first design incorporated the letters "FCIM" in the centre of a series of circles that formed the badge of the club. The basic elements of the design have remained constant even as finer details have been modified over the years. Starting at the 1999–2000 season, the original club crest was reduced in size, to give place for the addition of the club's name and foundation year at the upper and lower part of the logo respectively. In 2007, the logo was returned to the pre-1999–2000 era. It was given a more modern look with a smaller Scudetto star and lighter color scheme. This version was used until July 2014, when the club decided to undertake a rebranding. The most significant difference between the current and the previous logo is the omission of the star from other media except match kits. Since its founding in 1908, Inter have almost always worn black and blue stripes, earning them the nickname Nerazzurri. According to the tradition, the colours were adopted to represent the nocturnal sky: in fact, the club was established on the night of 9 March, at 23:30; moreover, blue was chosen by Giorgio Muggiani because he considered it to be the opposite colour to red, worn by the Milan Cricket and Football Club rivals. During the 1928–29 season, however, Inter were forced to abandon their black and blue uniforms. In 1928, Inter's name and philosophy made the ruling Fascist Party uneasy; as a result, during the same year the 20-year-old club was merged with Unione Sportiva Milanese: the new club was named Società Sportiva Ambrosiana after the patron saint of Milan. The flag of Milan (the red cross on white background) replaced the traditional black and blue. In 1929 the black-and-blue jerseys were restored, and after World War II, when the Fascists had fallen from power, the club reverted to their original name. In 2008, Inter celebrated their centenary with a red cross on their away shirt. The cross is reminiscent of the flag of their city, and they continue to use the pattern on their third kit. In 2014, the club adopted a predominantly black home kit with thin blue pinstripes before returning to a more traditional design the following season. Animals are often used to represent football clubs in Italy – the grass snake, called Biscione, represents Inter. The snake is an important symbol for the city of Milan, appearing often in Milanese heraldry as a coiled viper with a man in its jaws. The symbol is present on the coat of arms of the House of Sforza (which ruled over Italy from Milan during the Renaissance period), the city of Milan, the historical Duchy of Milan (a 400-year state of the Holy Roman Empire) and Insubria (a historical region the city of Milan falls within). For the 2010–11 season, Inter's away kit featured the serpent. Stadium The team's stadium is the 75,923 seat San Siro, officially known as the Stadio Giuseppe Meazza after the former player who represented both Milan and Inter. The more commonly used name, San Siro, is the name of the district where it is located. San Siro has been the home of Milan since 1926, when it was privately built by funding from Milan's chairman at the time, Piero Pirelli. Construction was performed by 120 workers, and took 13 and a half months to complete. The stadium was owned by the club until it was sold to the city in 1935, and since 1947 it has been shared with Inter, when they were accepted as joint tenant. The first game played at the stadium was on 19 September 1926, when Inter beat Milan 6–3 in a friendly match. Milan played its first league game in San Siro on 19 September 1926, losing 1–2 to Sampierdarenese. From an initial capacity of 35,000 spectators, the stadium has undergone several major renovations, most recently in preparation for the 1990 FIFA World Cup when its capacity was set to 85,700, all covered with a polycarbonate roof. In the summer of 2008, its capacity was reduced to 80,018 to meet the new standards set by UEFA. Based on the English model for stadiums, San Siro is specifically designed for football matches, as opposed to many multi-purpose stadiums used in Serie A. It is therefore renowned in Italy for its fantastic atmosphere during matches owing to the closeness of the stands to the pitch. The frequent use of flares by supporters contributes to the atmosphere, but the practice has occasionally also caused problems. Supporters and rivalries Inter is one of the most supported clubs in Italy, according to an August 2007 research by Italian newspaper La Repubblica. Historically, the largest section of Inter fans from the city of Milan were the middle-class bourgeoisie Milanese, while Milan fans were typically working-class. The traditional ultras group of Inter is Boys San; they hold a significant place in the history of the ultras scene in general due to the fact that they are one of the oldest, being founded in 1969. Politically, the ultras of Inter are usually considered right-wing and they have good relationships with the Lazio ultras. As well as the main group of Boys San, there are four more significant groups: Viking, Irriducibili, Ultras, and Brianza Alcoolica. Inter's most vocal fans are known to gather in the Curva Nord, or north curve of the San Siro. This longstanding tradition has led to the Curva Nord being synonymous with the club's most die-hard supporters, who unfurl banners and wave flags in support of their team. Inter have several rivalries, two of which are highly significant in Italian football; firstly, they participate in the intracity Derby della Madonnina with AC Milan; the rivalry has existed ever since Inter splintered off from Milan in 1908. The name of the derby refers to the Blessed Virgin Mary, whose statue atop the Milan Cathedral is one of the city's main attractions. The match usually creates a lively atmosphere, with numerous (often humorous or offensive) banners unfolded before the match. Flares are commonly present, but they also led to the abandonment of the second leg of the 2004–05 Champions League quarter-final matchup between Milan and Inter on 12 April after a flare thrown from the crowd by an Inter supporter struck Milan keeper Dida on the shoulder. The other most significant rivalry is with Juventus; matches between the two clubs are known as the Derby d'Italia. Up until the 2006 Italian football scandal, which saw Juventus relegated, the two were the only Italian clubs to have never played below Serie A. In the 2000s, Inter developed a rivalry with Roma, who finished as runners-up to Inter in all but one of Inter's five Scudetto-winning seasons between 2005–06 and 2009–10. The two sides have also contested in five Coppa Italia finals and four Supercoppa Italiana finals since 2006. Other clubs, like Atalanta and Napoli, are also considered amongst their rivals. Their supporters collectively go by Interisti, or Nerazzurri. Honours Inter have won 32 domestic trophies, including the league 19 times, the Coppa Italia seven times and the Supercoppa Italiana six times. From 2006 to 2010, the club won five successive league titles, equalling the all-time record before 2017, when Juventus won the sixth successive league title. They have won the Champions League three times: two back-to-back in 1964 and 1965 and then another in 2010; the last completed an unprecedented Italian treble with the Coppa Italia and the Scudetto. The club has also won three UEFA Cups, two Intercontinental Cups and one FIFA Club World Cup. Inter has never been relegated from the top flight of Italian football in its entire existence. It is the sole club to have competed in Serie A and its predecessors in every season since its debut in 1909. Club statistics and records Javier Zanetti holds the records for both total appearances and Serie A appearances for Inter, with 858 official games played in total and 618 in Serie A. Giuseppe Meazza is Inter's all-time top goalscorer, with 284 goals in 408 games. Behind him, in second place, is Alessandro Altobelli with 209 goals in 466 games, and Roberto Boninsegna in third place, with 171 goals over 281 games. Helenio Herrera had the longest reign as Inter coach, with nine years (eight consecutive) in charge, and is the most successful coach in Inter history with three Scudetti, two European Cups, and two Intercontinental Cup wins. José Mourinho, who was appointed on 2 June 2008, completed his first season in Italy by winning the Serie A title and the Supercoppa Italiana; in his second season he won the first "treble" in Italian history: the Serie A, Coppa Italia and the UEFA Champions League. Players First-team squad Other players under contract Out on loan Women team Notable players Retired numbers 3 – Giacinto Facchetti, left back, played for Inter 1960–1978 (posthumous honour). The number was retired on 8 September 2006, four days after Facchetti had died from cancer aged 64. The last player to wear the number 3 shirt was Argentinian center back Nicolás Burdisso, who took on the number 16 shirt for the rest of the season. 4 – Javier Zanetti, defensive midfielder, played 858 games for Inter between 1995 and his retirement in the summer of 2014. In June 2014, club chairman Erick Thohir confirmed that Zanetti's number 4 was to be retired out of respect. Technical staff Chairmen and managers Chairmen history Below is a list of Inter chairmen from 1908 until the present day. Managerial history Below is a list of Inter coaches from 1909 until the present day. Corporate FC Internazionale Milano S.p.A. was described as one of the financial "black-holes" among the Italian clubs, which was heavily dependent on the financial contribution from the owner Massimo Moratti. In June 2006, the shirt sponsor and the minority shareholder of the club, Pirelli, sold 15.26% shares of the club to Moratti family, for €13.5 million. The tyre manufacturer retained 4.2%. However, due to several capital increases of Inter, such as a reversed merger with an intermediate holding company, Inter Capital S.r.l. in 2006, which held 89% shares of Inter and €70 million capitals at that time, or issues new shares for €70.8 million in June 2007, €99.9 million in December 2007, €86.6 million in 2008, €70 million in 2009, €40 million in 2010 and 2011, €35 million in 2012 or allowing Thoir subscribed €75 million new shares of Inter in 2013, Pirelli became the third largest shareholders of just 0.5%, . Inter had yet another recapitalization that was reserved for Suning Holdings Group in 2016. In the prospectus of Pirelli's second IPO in 2017, the company also revealed that the value of the remaining shares of Inter that was owned by Pirelli, was write-off to zero in 2016 financial year. Inter also received direct capital contribution from the shareholders to cover loss which was excluded from issuing shares in the past. () Right before the takeover of Thohir, the consolidated balance sheets of "Internazionale Holding S.r.l." showed the whole companies group had a bank debt of €157 million, including the bank debt of a subsidiary "Inter Brand Srl", as well as the club itself, to Istituto per il Credito Sportivo (ICS), for €15.674 million on the balance sheet at end of 2012–13 financial year. In 2006 Inter sold its brand to the new subsidiary, "Inter Brand S.r.l.", a special purpose entity with a shares capital of €40 million, for €158 million (the deal made Internazionale make a net loss of just €31 million in a separate financial statement). At the same time the subsidiary secured a €120 million loan from Banca Antonveneta, which would be repaid in installments until 30 June 2016; La Repubblica described the deal as "doping". In September 2011 Inter secured a loan from ICS by factoring the sponsorship of Pirelli of 2012–13 and 2013–14 season, for €24.8 million, in an interest rate of 3 months Euribor + 1.95% spread. In June 2014 new Inter Group secured €230 million loan from Goldman Sachs and UniCredit at a new interest rate of 3 months Euribor + 5.5% spread, as well as setting up a new subsidiary to be the debt carrier: "Inter Media and Communication S.r.l.". €200 million of which would be utilized in debt refinancing of the group. The €230million loan, €1 million (plus interests) would be due on 30 June 2015, €45 million (plus interests) would be repaid in 15 installments from 30 September 2015 to 31 March 2019, as well as €184 million (plus interests) would be due on 30 June 2019. In ownership side, the Hong Kong-based International Sports Capital HK Limited, had pledged the shares of Italy-based International Sports Capital S.p.A. (the direct holding company of Inter) to CPPIB Credit Investments for €170 million in 2015, at an interest rate of 8% p.a (due March 2018) to 15% p.a. (due March 2020). ISC repaid the notes on 1 July 2016 after they sold part of the shares of Inter to Suning Holdings Group. However, in the late 2016 the shares of ISC S.p.A. was pledged again by ISC HK to private equity funds of OCP Asia for US$80 million. In December 2017, the club also refinanced its debt of €300 million, by issuing corporate bond to the market, via Goldman Sachs as the bookkeeper, for an interest rate of 4.875% p.a. Considering revenue alone, Inter surpassed city rivals in Deloitte Football Money League for the first time, in the 2008–2009 season, to rank in ninth place, one place behind Juventus in eighth place, with Milan in tenth place. In the 2009–10 season, Inter remained in ninth place, surpassing Juventus (10th) but Milan re-took the leading role as the seventh. Inter became the eighth in 2010–2011, but was still one place behind Milan. Since 2011, Inter fell to 11th in 2011–12, 15th in 2012–13, 17th in 2013–14, 19th in 2014–15 and 2015–16 season. In 2016–17 season, Inter was ranked 15th in the Money League. In 2010 Football Money League (2008–09 season), the normalized revenue of €196.5 million were divided up between matchday (14%, €28.2 million), broadcasting (59%, €115.7 million, +7%, +€8 million) and commercial (27%, €52.6 million, +43%). Kit sponsors Nike and Pirelli contributed €18.1 million and €9.3 million respectively to commercial revenues, while broadcasting revenues were boosted €1.6 million (6%) by Champions League distribution. Deloitte expressed the idea that issues in Italian football, particularly matchday revenue issues were holding Inter back compared to other European giants, and developing their own stadia would result in Serie A clubs being more competitive on the world stage. In 2009–10 season the revenue of Inter was boosted by the sales of Ibrahimović, the treble and the release clause of coach José Mourinho. According to the normalized figures by Deloitte in their 2011 Football Money League, in 2009–10 season, the revenue had increased €28.3 million (14%) to €224.8 million. The ratio of matchday, broadcasting and commercial in the adjusted figures was 17%:62%:21%. For the 2010–11 season, Serie A clubs started negotiating club TV rights collectively rather than individually. This was predicted to result in lower broadcasting revenues for big clubs such as Juventus and Inter, with smaller clubs gaining from the loss. Eventually the result included an extraordinary income of €13 million from RAI. In 2012 Football Money League (2010–11 season), the normalized revenue was €211.4 million. The ratio of matchday, broadcasting and commercial in the adjusted figures was 16%:58%:26%. However, combining revenue and cost, in the 2006–07 season they had a net loss of €206 million (€112 million extraordinary basis, due to the abolition of non-standard accounting practice of the special amortization fund), followed by a net loss of €148 million in the 2007–08 season, a net loss of €154 million in 2008–09 season, a net loss of €69 million in the 2009–10 season, a net loss of €87 million in the 2010–11 season, a net loss of €77 million in the 2011–12 season, a net loss of €80 million in 2012–13 season and a net profit of €33 million in 2013–14 season, due to special income from the establishment of subsidiary Inter Media and Communication. All aforementioned figures were in separate financial statement. Figures from consolidated financial statement were announced since 2014–15 season, which were net losses of €140.4 million (2014–15), €59.6 million (2015–16 season, before 2017 restatement) and €24.6 million (2016–17). In 2015 Inter and Roma were the only two Italian clubs that were sanctioned by the UEFA due to their breaking of UEFA Financial Fair Play Regulations, which was followed by AC Milan which was once barred from returning to European competition in 2018. As a probation to avoid further sanction, Inter agreed to have a three-year aggregate break-even from 2015 to 2018, with the 2015–16 season being allowed to have a net loss of a maximum of €30 million, followed by break-even in the 2016–17 season and onwards. Inter was also fined €6 million plus an additional €14 million in probation. Inter also made a financial trick in the transfer market in mid-2015, in which Stevan Jovetić and Miranda were signed by Inter on temporary deals plus an obligation to sign outright in 2017, making their cost less in the loan period. Moreover, despite heavily investing in new signings, namely Geoffrey Kondogbia and Ivan Perišić that potentially increased the cost in amortization, Inter also sold Mateo Kovačić for €29 million, making a windfall profit. In November 2018, documents from Football Leaks further revealed that the loan signings such as Xherdan Shaqiri in January 2015, was in fact had inevitable conditions to trigger the outright purchase. On 21 April 2017, Inter announced that their net loss (FFP adjusted) of 2015–16 season was within the allowable limit of €30 million. However, on the same day UEFA also announced that the reduction of squad size of Inter in European competitions would not be lifted yet, due to partial fulfilment of the targets in the settlement agreement. Same announcement was made by UEFA in June 2018, based on Inter's 2016–17 season financial result. In February 2020, Inter Milan sued Major League Soccer (MLS) for trademark infringement, claiming that the term "Inter" is synonymous with its club and no one else. Kit suppliers and shirt sponsors See also Dynasties in Italian football European Club Association Notes References External links FC Internazionale Milano at Serie A FC Internazionale Milano at UEFA Football clubs in Italy Football clubs in Lombardy Football clubs in Milan Association football clubs established in 1908 Italian football First Division clubs Serie A clubs Serie A winning clubs Coppa Italia winning clubs G-14 clubs 1908 establishments in Italy Unrelegated association football clubs FIFA Club World Cup winning clubs UEFA Champions League winning clubs UEFA Cup winning clubs
[ 0.43216073513031006, -0.7593206763267517, -0.033745694905519485, 0.04820142313838005, 0.04423002526164055, 0.5168623924255371, -0.4791567027568817, 0.5779370665550232, -0.7943384051322937, -0.7774545550346375, 0.18837988376617432, 0.5047553777694702, -0.3926272988319397, 0.378653883934021,...
15120
https://en.wikipedia.org/wiki/Interferon
Interferon
Interferons (IFNs, ) are a group of signaling proteins made and released by host cells in response to the presence of several viruses. In a typical scenario, a virus-infected cell will release interferons causing nearby cells to heighten their anti-viral defenses. IFNs belong to the large class of proteins known as cytokines, molecules used for communication between cells to trigger the protective defenses of the immune system that help eradicate pathogens. Interferons are named for their ability to "interfere" with viral replication by protecting cells from virus infections. However, virus-encoded genetic elements have the ability to antagonize the IFN response contributing to viral pathogenesis and viral diseases. IFNs also have various other functions: they activate immune cells, such as natural killer cells and macrophages, and they increase host defenses by up-regulating antigen presentation by virtue of increasing the expression of major histocompatibility complex (MHC) antigens. Certain symptoms of infections, such as fever, muscle pain and "flu-like symptoms", are also caused by the production of IFNs and other cytokines. More than twenty distinct IFN genes and proteins have been identified in animals, including humans. They are typically divided among three classes: Type I IFN, Type II IFN, and Type III IFN. IFNs belonging to all three classes are important for fighting viral infections and for the regulation of the immune system. Types of interferon Based on the type of receptor through which they signal, human interferons have been classified into three major types. Interferon type I: All type I IFNs bind to a specific cell surface receptor complex known as the IFN-α/β receptor (IFNAR) that consists of IFNAR1 and IFNAR2 chains. The type I interferons present in humans are IFN-α, IFN-β, IFN-ε, IFN-κ and IFN-ω. In general, type I interferons are produced when the body recognizes a virus that has invaded it. They are produced by fibroblasts and monocytes. However, the production of type I IFN-α is inhibited by another cytokine known as Interleukin-10. Once released, type I interferons bind to specific receptors on target cells, which leads to expression of proteins that will prevent the virus from producing and replicating its RNA and DNA. Overall, IFN-α can be used to treat hepatitis B and C infections, while IFN-β can be used to treat multiple sclerosis. Interferon type II (IFN-γ in humans): This is also known as immune interferon and is activated by Interleukin-12. Type II interferons are also released by cytotoxic T cells and type-1 T helper cells. However, they block the proliferation of type-2 T helper cells. The previous results in an inhibition of Th2 immune response and a further induction of Th1 immune response. IFN type II binds to IFNGR, which consists of IFNGR1 and IFNGR2 chains. Interferon type III: Signal through a receptor complex consisting of IL10R2 (also called CRF2-4) and IFNLR1 (also called CRF2-12). Although discovered more recently than type I and type II IFNs, recent information demonstrates the importance of Type III IFNs in some types of virus or fungal infections. In general, type I and II interferons are responsible for regulating and activating the immune response. Expression of type I and III IFNs can be induced in virtually all cell types upon recognition of viral components, especially nucleic acids, by cytoplasmic and endosomal receptors, whereas type II interferon is induced by cytokines such as IL-12, and its expression is restricted to immune cells such as T cells and NK cells. Function All interferons share several common effects: they are antiviral agents and they modulate functions of the immune system. Administration of Type I IFN has been shown experimentally to inhibit tumor growth in animals, but the beneficial action in human tumors has not been widely documented. A virus-infected cell releases viral particles that can infect nearby cells. However, the infected cell can protect neighboring cells against a potential infection of the virus by releasing interferons. In response to interferon, cells produce large amounts of an enzyme known as protein kinase R (PKR). This enzyme phosphorylates a protein known as eIF-2 in response to new viral infections; the phosphorylated eIF-2 forms an inactive complex with another protein, called eIF2B, to reduce protein synthesis within the cell. Another cellular enzyme, RNAse L—also induced by interferon action—destroys RNA within the cells to further reduce protein synthesis of both viral and host genes. Inhibited protein synthesis impairs both virus replication and infected host cells. In addition, interferons induce production of hundreds of other proteins—known collectively as interferon-stimulated genes (ISGs)—that have roles in combating viruses and other actions produced by interferon. They also limit viral spread by increasing p53 activity, which kills virus-infected cells by promoting apoptosis. The effect of IFN on p53 is also linked to its protective role against certain cancers. Another function of interferons is to up-regulate major histocompatibility complex molecules, MHC I and MHC II, and increase immunoproteasome activity. All interferons significantly enhance the presentation of MHC I dependent antigens. Interferon gamma (IFN-gamma) also significantly stimulates the MHC II-dependent presentation of antigens. Higher MHC I expression increases presentation of viral and abnormal peptides from cancer cells to cytotoxic T cells, while the immunoproteasome processes these peptides for loading onto the MHC I molecule, thereby increasing the recognition and killing of infected or malignant cells. Higher MHC II expression increases presentation of these peptides to helper T cells; these cells release cytokines (such as more interferons and interleukins, among others) that signal to and co-ordinate the activity of other immune cells. Interferons can also suppress angiogenesis by down regulation of angiogenic stimuli deriving from tumor cells. They also suppress the proliferation of endothelial cells. Such suppression causes a decrease in tumor angiogenesis, a decrease in its vascularization and subsequent growth inhibition. Interferons, such as interferon gamma, directly activate other immune cells, such as macrophages and natural killer cells. Induction of interferons Production of interferons occurs mainly in response to microbes, such as viruses and bacteria, and their products. Binding of molecules uniquely found in microbes—viral glycoproteins, viral RNA, bacterial endotoxin (lipopolysaccharide), bacterial flagella, CpG motifs—by pattern recognition receptors, such as membrane bound toll like receptors or the cytoplasmic receptors RIG-I or MDA5, can trigger release of IFNs. Toll Like Receptor 3 (TLR3) is important for inducing interferons in response to the presence of double-stranded RNA viruses; the ligand for this receptor is double-stranded RNA (dsRNA). After binding dsRNA, this receptor activates the transcription factors IRF3 and NF-κB, which are important for initiating synthesis of many inflammatory proteins. RNA interference technology tools such as siRNA or vector-based reagents can either silence or stimulate interferon pathways. Release of IFN from cells (specifically IFN-γ in lymphoid cells) is also induced by mitogens. Other cytokines, such as interleukin 1, interleukin 2, interleukin-12, tumor necrosis factor and colony-stimulating factor, can also enhance interferon production. Downstream signaling By interacting with their specific receptors, IFNs activate signal transducer and activator of transcription (STAT) complexes; STATs are a family of transcription factors that regulate the expression of certain immune system genes. Some STATs are activated by both type I and type II IFNs. However each IFN type can also activate unique STATs. STAT activation initiates the most well-defined cell signaling pathway for all IFNs, the classical Janus kinase-STAT (JAK-STAT) signaling pathway. In this pathway, JAKs associate with IFN receptors and, following receptor engagement with IFN, phosphorylate both STAT1 and STAT2. As a result, an IFN-stimulated gene factor 3 (ISGF3) complex forms—this contains STAT1, STAT2 and a third transcription factor called IRF9—and moves into the cell nucleus. Inside the nucleus, the ISGF3 complex binds to specific nucleotide sequences called IFN-stimulated response elements (ISREs) in the promoters of certain genes, known as IFN stimulated genes ISGs. Binding of ISGF3 and other transcriptional complexes activated by IFN signaling to these specific regulatory elements induces transcription of those genes. A collection of known ISGs is available on Interferome, a curated online database of ISGs (www.interferome.org); Additionally, STAT homodimers or heterodimers form from different combinations of STAT-1, -3, -4, -5, or -6 during IFN signaling; these dimers initiate gene transcription by binding to IFN-activated site (GAS) elements in gene promoters. Type I IFNs can induce expression of genes with either ISRE or GAS elements, but gene induction by type II IFN can occur only in the presence of a GAS element. In addition to the JAK-STAT pathway, IFNs can activate several other signaling cascades. For instance, both type I and type II IFNs activate a member of the CRK family of adaptor proteins called CRKL, a nuclear adaptor for STAT5 that also regulates signaling through the C3G/Rap1 pathway. Type I IFNs further activate p38 mitogen-activated protein kinase (MAP kinase) to induce gene transcription. Antiviral and antiproliferative effects specific to type I IFNs result from p38 MAP kinase signaling. The phosphatidylinositol 3-kinase (PI3K) signaling pathway is also regulated by both type I and type II IFNs. PI3K activates P70-S6 Kinase 1, an enzyme that increases protein synthesis and cell proliferation; phosphorylates ribosomal protein s6, which is involved in protein synthesis; and phosphorylates a translational repressor protein called eukaryotic translation-initiation factor 4E-binding protein 1 (EIF4EBP1) in order to deactivate it. Interferons can disrupt signaling by other stimuli. For example, Interferon alpha induces RIG-G, which disrupts the CSN5-containing COP9 signalosome (CSN), a highly conserved multiprotein complex implicated in protein deneddylation, deubiquitination, and phosphorylation. RIG-G has shown the capacity to inhibit NF-κB and STAT3 signaling in lung cancer cells, which demonstrates the potential of type I IFNs. Virus resistance to interferons Many viruses have evolved mechanisms to resist interferon activity. They circumvent the IFN response by blocking downstream signaling events that occur after the cytokine binds to its receptor, by preventing further IFN production, and by inhibiting the functions of proteins that are induced by IFN. Viruses that inhibit IFN signaling include Japanese Encephalitis Virus (JEV), dengue type 2 virus (DEN-2), and viruses of the herpesvirus family, such as human cytomegalovirus (HCMV) and Kaposi's sarcoma-associated herpesvirus (KSHV or HHV8). Viral proteins proven to affect IFN signaling include EBV nuclear antigen 1 (EBNA1) and EBV nuclear antigen 2 (EBNA-2) from Epstein-Barr virus, the large T antigen of Polyomavirus, the E7 protein of Human papillomavirus (HPV), and the B18R protein of vaccinia virus. Reducing IFN-α activity may prevent signaling via STAT1, STAT2, or IRF9 (as with JEV infection) or through the JAK-STAT pathway (as with DEN-2 infection). Several poxviruses encode soluble IFN receptor homologs—like the B18R protein of the vaccinia virus—that bind to and prevent IFN interacting with its cellular receptor, impeding communication between this cytokine and its target cells. Some viruses can encode proteins that bind to double-stranded RNA (dsRNA) to prevent the activity of RNA-dependent protein kinases; this is the mechanism reovirus adopts using its sigma 3 (σ3) protein, and vaccinia virus employs using the gene product of its E3L gene, p25. The ability of interferon to induce protein production from interferon stimulated genes (ISGs) can also be affected. Production of protein kinase R, for example, can be disrupted in cells infected with JEV. Some viruses escape the anti-viral activities of interferons by gene (and thus protein) mutation. The H5N1 influenza virus, also known as bird flu, has resistance to interferon and other anti-viral cytokines that is attributed to a single amino acid change in its Non-Structural Protein 1 (NS1), although the precise mechanism of how this confers immunity is unclear. Coronavirus response Coronaviruses evade innate immunity during the first ten days of viral infection. In the early stages of infection, SARS-CoV-2 induces an even lower interferon type I (IFN-I) response than SARS-CoV, which itself is a weak IFN-I inducer in human cells. SARS-CoV-2 limits the IFN-III response as well. Reduced numbers of plasmacytoid dendritic cells with age is associated with increased COVID-19 severity, possibly because these cells are substantial interferon producers. Ten percent of patients with life-threatening COVID-19 have autoantibodies against type I interferon. Delayed IFN-I response contributes to the pathogenic inflammation (cytokine storm) seen in later stages of COVID-19 disease. Application of IFN-I prior to (or in the very early stages of) viral infection can be protective, which should be validated in randomized clinical trials. Interferon therapy Diseases Interferon beta-1a and interferon beta-1b are used to treat and control multiple sclerosis, an autoimmune disorder. This treatment may help in reducing attacks in relapsing-remitting multiple sclerosis and slowing disease progression and activity in secondary progressive multiple sclerosis. Interferon therapy is used (in combination with chemotherapy and radiation) as a treatment for some cancers. This treatment can be used in hematological malignancy, such as in leukemia and lymphomas including hairy cell leukemia, chronic myeloid leukemia, nodular lymphoma, and cutaneous T-cell lymphoma. Patients with recurrent melanomas receive recombinant IFN-α2b. Both hepatitis B and hepatitis C are treated with IFN-α, often in combination with other antiviral drugs. Some of those treated with interferon have a sustained virological response and can eliminate hepatitis virus. The most harmful strain—hepatitis C genotype I virus—can be treated with a 60-80% success rate with the current standard-of-care treatment of interferon-α, ribavirin and recently approved protease inhibitors such as Telaprevir (Incivek) May 2011, Boceprevir (Victrelis) May 2011 or the nucleotide analog polymerase inhibitor Sofosbuvir (Sovaldi) December 2013. Biopsies of patients given the treatment show reductions in liver damage and cirrhosis. Some evidence shows giving interferon immediately following infection can prevent chronic hepatitis C, although diagnosis early in infection is difficult since physical symptoms are sparse in early hepatitis C infection. Control of chronic hepatitis C by IFN is associated with reduced hepatocellular carcinoma. Unconfirmed results suggested that interferon eye drops may be an effective treatment for people who have herpes simplex virus epithelial keratitis, a type of eye infection. There is no clear evidence to suggest that removing the infected tissue (debridement) followed by interferon drops is an effective treatment approach for these types of eye infections. Unconfirmed results suggested that the combination of interferon and an antiviral agent may speed the healing process compared to antiviral therapy alone. When used in systemic therapy, IFNs are mostly administered by an intramuscular injection. The injection of IFNs in the muscle or under the skin is generally well tolerated. The most frequent adverse effects are flu-like symptoms: increased body temperature, feeling ill, fatigue, headache, muscle pain, convulsion, dizziness, hair thinning, and depression. Erythema, pain, and hardness at the site of injection are also frequently observed. IFN therapy causes immunosuppression, in particular through neutropenia and can result in some infections manifesting in unusual ways. Drug formulations Several different types of interferons are approved for use in humans. One was first approved for medical use in 1986. For example, in January 2001, the Food and Drug Administration (FDA) approved the use of PEGylated interferon-alpha in the USA; in this formulation, PEGylated interferon-alpha-2b (Pegintron), polyethylene glycol is linked to the interferon molecule to make the interferon last longer in the body. Approval for PEGylated interferon-alpha-2a (Pegasys) followed in October 2002. These PEGylated drugs are injected once weekly, rather than administering two or three times per week, as is necessary for conventional interferon-alpha. When used with the antiviral drug ribavirin, PEGylated interferon is effective in treatment of hepatitis C; at least 75% of people with hepatitis C genotypes 2 or 3 benefit from interferon treatment, although this is effective in less than 50% of people infected with genotype 1 (the more common form of hepatitis C virus in both the U.S. and Western Europe). Interferon-containing regimens may also include protease inhibitors such as boceprevir and telaprevir. There are also interferon-inducing drugs, notably tilorone that is shown to be effective against Ebola virus. History Interferons were first described in 1957 by Alick Isaacs and Jean Lindenmann at the National Institute for Medical Research in London; the discovery was a result of their studies of viral interference. Viral interference refers to the inhibition of virus growth caused by previous exposure of cells to an active or a heat-inactivated virus. Isaacs and Lindenmann were working with a system that involved the inhibition of the growth of live influenza virus in chicken embryo chorioallantoic membranes by heat-inactivated influenza virus. Their experiments revealed that this interference was mediated by a protein released by cells in the heat-inactivated influenza virus-treated membranes. They published their results in 1957 naming the antiviral factor they had discovered interferon. The findings of Isaacs and Lindenmann have been widely confirmed and corroborated in the literature. Furthermore, others may have made observations on interferons before the 1957 publication of Isaacs and Lindenmann. For example, during research to produce a more efficient vaccine for smallpox, Yasu-ichi Nagano and Yasuhiko Kojima—two Japanese virologists working at the Institute for Infectious Diseases at the University of Tokyo—noticed inhibition of viral growth in an area of rabbit-skin or testis previously inoculated with UV-inactivated virus. They hypothesised that some "viral inhibitory factor" was present in the tissues infected with virus and attempted to isolate and characterize this factor from tissue homogenates. Independently, Monto Ho, in John Enders's lab, observed in 1957 that attenuated poliovirus conferred a species specific anti-viral effect in human amniotic cell cultures. They described these observations in a 1959 publication, naming the responsible factor viral inhibitory factor (VIF). It took another fifteen to twenty years, using somatic cell genetics, to show that the interferon action gene and interferon gene reside in different human chromosomes. The purification of human beta interferon did not occur until 1977. Y.H. Tan and his co-workers purified and produced biologically active, radio-labeled human beta interferon by superinducing the interferon gene in fibroblast cells, and they showed its active site contains tyrosine residues. Tan's laboratory isolated sufficient amounts of human beta interferon to perform the first amino acid, sugar composition and N-terminal analyses. They showed that human beta interferon was an unusually hydrophobic glycoprotein. This explained the large loss of interferon activity when preparations were transferred from test tube to test tube or from vessel to vessel during purification. The analyses showed the reality of interferon activity by chemical verification. The purification of human alpha interferon was not reported until 1978. A series of publications from the laboratories of Sidney Pestka and Alan Waldman between 1978 and 1981, describe the purification of the type I interferons IFN-α and IFN-β. By the early 1980s, genes for these interferons had been cloned, adding further definitive proof that interferons were responsible for interfering with viral replication. Gene cloning also confirmed that IFN-α was encoded by a family of many related genes. The type II IFN (IFN-γ) gene was also isolated around this time. Interferon was scarce and expensive until 1980, when the interferon gene was inserted into bacteria using recombinant DNA technology, allowing mass cultivation and purification from bacterial cultures or derived from yeasts. Interferon can also be produced by recombinant mammalian cells. Before the early 1970s, large scale production of human interferon had been pioneered by Kari Cantell. He produced large amounts of human alpha interferon from large quantities of human white blood cells collected by the Finnish Blood Bank. Large amounts of human beta interferon were made by superinducing the beta interferon gene in human fibroblast cells. Cantell's and Tan's methods of making large amounts of natural interferon were critical for chemical characterisation, clinical trials and the preparation of small amounts of interferon messenger RNA to clone the human alpha and beta interferon genes. The superinduced human beta interferon messenger RNA was prepared by Tan's lab for Cetus corp. to clone the human beta interferon gene in bacteria and the recombinant interferon was developed as 'betaseron' and approved for the treatment of MS. Superinduction of the human beta interferon gene was also used by Israeli scientists to manufacture human beta interferon. Human interferons Teleost fish interferons References External links Cytokines Antiviral drugs
[ 0.028271397575736046, 0.3216021656990051, -0.12548774480819702, -0.01890239119529724, -0.22370921075344086, -0.2620420753955841, 0.614565908908844, 0.1955987811088562, -0.04519078880548477, -0.4681052565574646, -0.07091398537158966, -0.026621364057064056, -0.9270598888397217, 0.33627921342...
15123
https://en.wikipedia.org/wiki/Israeli%20settlement
Israeli settlement
Israeli settlements, or Israeli colonies, are civilian communities inhabited by Israeli citizens, overwhelmingly of Jewish ethnicity, built in violation of international law on lands occupied by Israel in the 1967 Six-Day War. Israeli settlements currently exist in the Palestinian territory of the West Bank, including East Jerusalem, and in the Syrian territory of the Golan Heights. East Jerusalem and the Golan Heights have been effectively annexed by Israel, though the international community has rejected any change of status in both territories and continues to consider each occupied territory. Although the West Bank settlements are on land administered under Israeli military rule rather than civil law, Israeli civil law is "pipelined" into the settlements, such that Israeli citizens living there are treated similarly to those living in Israel. Israeli settlements had previously been built within the Egyptian territory of the Sinai Peninsula, and within the Palestinian territory of the Gaza Strip; however, Israel evacuated and dismantled the 18 Sinai settlements following the 1979 Egypt–Israel peace agreement and all of the 21 settlements in the Gaza Strip, along with four in the West Bank, in 2005 as part of its unilateral disengagement from Gaza. Israel has established Jewish neighborhoods in East Jerusalem and in the Israeli-occupied portion of the Golan Heights, both of which Israel has effectively annexed, and as such Israel does not consider the developments there to be settlements. The international community regards both territories as held under Israeli occupation and the localities established there to be illegal settlements. The International Court of Justice found the settlements to be illegal in its 2004 advisory opinion on the West Bank barrier. In the West Bank, Israel continues to expand its remaining settlements as well as settling new areas, despite pressure from the international community to desist. The transfer by an occupying power of its civilian population into the territory it occupies is a war crime, although Israel disputes that this applies to the West Bank. On 20 December 2019, the International Criminal Court announced an International Criminal Court investigation in Palestine into alleged war crimes. The presence and ongoing expansion of existing settlements by Israel and the construction of settlement outposts is frequently criticized as an obstacle to the Israeli–Palestinian peace process by the Palestinians, and third parties such as the OIC, the United Nations, Russia, the United Kingdom, France, and the European Union have echoed those criticisms. The international community considers the settlements to be illegal under international law, and the United Nations has repeatedly upheld the view that Israel's construction of settlements constitutes a violation of the Fourth Geneva Convention. The United States for decades considered the settlements to be "illegitimate" until the Trump Administration in November 2019 shifted its position declaring "the establishment of Israeli civilian settlements in the West Bank is not per se inconsistent with international law." According to Peace Now, based on figures given by the Israeli Central Bureau of Statistics for the end of 2018, the number of settlers is 427,800, an increase of 14,400 over the prior year. B'tselem, as of 16 January 2019, estimated that 209,270 live in occupied East Jerusalem while the Foundation for Middle East Peace cites Daniel Seidemann as of late 2019 for a figure of 218,000. Population statistics for Israeli settlements in the West Bank, excluding East Jerusalem, show c.400,000 almost exclusively Jewish citizens of Israel; East Jerusalem settlements are inhabited by over 300,000 Israeli citizens (both Jewish citizens of Israel and Arab citizens of Israel), and over 20,000 Israeli citizens live in settlements in the Golan Heights. Housing costs and state subventions Settlement has an economic dimension, much of it driven by the significantly lower costs of housing for Israeli citizens living in Israeli settlements compared to the cost of housing and living in Israel proper. Government spending per citizen in the settlements is double that spent per Israeli citizen in Tel Aviv and Jerusalem, while government spending for settlers in isolated Israeli settlements is three times the Israeli national average. Most of the spending goes to the security of the Israeli citizens living there. Number of settlements and inhabitants On 30 June 2014, according to the Yesha Council, 382,031 Israeli citizens lived in the 121 officially recognised Israeli settlements in the West Bank. A number of Palestinian non-Israeli citizens (as opposed to Arab citizens of Israel) also reside in Israeli settlements in East Jerusalem, however, over 300,000 Israeli citizens (both Jewish citizens of Israel and Arab citizens of Israel) lived in settlements in East Jerusalem, and over 20,000 Israeli citizens lived in settlements in the Golan Heights. In January 2015 the Israeli Interior Ministry gave figures of 389,250 Israeli citizens living in the West Bank and a further 375,000 Israeli citizens living in East Jerusalem. As of 30 January 2020, there are about 130 government-approved settlements, and 100 unofficial ones, which are home to around 400,000 Israelis in the West Bank, with an additional 200,000 Israelis residing in 12 neighborhoods in East Jerusalem. Character: rural and urban Settlements range in character from farming communities and frontier villages to urban suburbs and neighborhoods. The four largest settlements, Modi'in Illit, Ma'ale Adumim, Beitar Illit and Ariel, have achieved city status. Ariel has 18,000 residents, while the rest have around 37,000 to 55,500 each. History Occupied territories Following the 1967 Six-Day War, Israel occupied a number of territories. It took over the remainder of the Palestinian Mandate territories of the West Bank including East Jerusalem, from Jordan which had controlled the territories since the 1948 Arab-Israeli war, and the Gaza Strip from Egypt, which had held Gaza under occupation since 1949. From Egypt it also captured the Sinai Peninsula and from Syria it captured most of the Golan Heights, which since 1981 has been administered under the Golan Heights Law. Settlement policy As early as September 1967, Israeli settlement policy was progressively encouraged by the Labor government of Levi Eshkol. The basis for Israeli settlement in the West Bank became the Allon Plan, named after its inventor Yigal Allon. It implied Israeli annexation of major parts of the Israeli-occupied territories, especially East Jerusalem, Gush Etzion and the Jordan Valley. The settlement policy of the government of Yitzhak Rabin was also derived from the Allon Plan. The first settlement was Kfar Etzion, in the southern West Bank, although that location was outside the Allon Plan. Many settlements began as Nahal settlements. They were established as military outposts and later expanded and populated with civilian inhabitants. According to a secret document dating to 1970, obtained by Haaretz, the settlement of Kiryat Arba was established by confiscating land by military order and falsely representing the project as being strictly for military use while in reality, Kiryat Arba was planned for settler use. The method of confiscating land by military order for establishing civilian settlements was an open secret in Israel throughout the 1970s, but publication of the information was suppressed by the military censor. The Likud government of Menahem Begin, from 1977, was more supportive to settlement in other parts of the West Bank, by organizations like Gush Emunim and the Jewish Agency/World Zionist Organization, and intensified the settlement activities. In a government statement, Likud declared that the entire historic Land of Israel is the inalienable heritage of the Jewish people and that no part of the West Bank should be handed over to foreign rule. Ariel Sharon declared in the same year (1977) that there was a plan to settle 2 million Jews in the West Bank by 2000. The government abrogated the prohibition from purchasing occupied land by Israelis; the "Drobles Plan", a plan for large-scale settlement in the West Bank meant to prevent a Palestinian state under the pretext of security became the framework for its policy. The "Drobles Plan" from the World Zionist Organization, dated October 1978 and named "Master Plan for the Development of Settlements in Judea and Samaria, 1979–1983", was written by the Jewish Agency director and former Knesset member Matityahu Drobles. In January 1981, the government adopted a follow up-plan from Drobles, dated September 1980 and named "The current state of the settlements in Judea and Samaria", with more details about settlement strategy and policy. Since 1967, government-funded settlement projects in the West Bank are implemented by the "Settlement Division" of the World Zionist Organization. Though formally a non-governmental organization, it is funded by the Israeli government and leases lands from the Civil Administration to settle in the West Bank. It is authorized to create settlements in the West Bank on lands licensed to it by the Civil Administration. Traditionally, the Settlement Division has been under the responsibility of the Agriculture Ministry. Since the Olso Accords, it was always housed within the Prime Minister's Office (PMO). In 2007, it was moved back to the Agriculture Ministry. In 2009, the Netanyahu Government decided to subject all settlement activities to additional approval of the Prime Minister and the Defense Minister. In 2011, Netanyahu sought to move the Settlement Division again under the direct control of (his own) PMO, and to curtail Defense Minister Ehud Barak's authority. At the presentation of the Oslo II Accord on 5 October 1995 in the Knesset, PM Yitzhak Rabin expounded the Israeli settlement policy in connection with the permanent solution to the conflict. Israel wanted "a Palestinian entity, less than a state, which will be a home to most of the Palestinian residents living in the Gaza Strip and the West Bank". It wanted to keep settlements beyond the Green Line including Ma'ale Adumim and Givat Ze'ev in East Jerusalem. Blocs of settlements should be established in the West Bank. Rabin promised not to return to the 4 June 1967 lines. In June 1997, the Likud government of Benjamin Netanyahu presented its "Allon Plus Plan". This plan holds the retention of some 60% of the West Bank, including the "Greater Jerusalem" area with the settlements Gush Etzion and Ma'aleh Adumim, other large concentrations of settlements in the West Bank, the entire Jordan Valley, a "security area", and a network of Israeli-only bypass roads. In the Road map for peace of 2002, which was never implemented, the establishment of a Palestinian state was acknowledged. Outposts would be dismantled. However, many new outposts appeared instead, few were removed. Israel's settlement policy remained unchanged. Settlements in East Jerusalem and remaining West Bank were expanded. While according to official Israeli policy no new settlements were built, at least some hundred unauthorized outposts were established since 2002 with state funding in the 60% of the West Bank that was not under Palestinian administrative control and the population growth of settlers did not diminish. In 2005, all 21 settlements in the Gaza Strip and four in the northern West Bank were forcibly evacuated as part of Israeli disengagement from the Gaza Strip, known to some in Israel as "the Expulsion". However, the disengagement was more than compensated by transfers to the West Bank. After the failure of the Roadmap, several new plans emerged to settle in major parts of the West Bank. In 2011, Haaretz revealed the Civil Administration's "Blue Line"-plan, written in January 2011, which aims to increase Israeli "state-ownership" of West Bank land ("state lands") and settlement in strategic areas like the Jordan Valley and the northern Dead Sea area. In March 2012, it was revealed that the Civil Administration over the years covertly allotted 10% of the West Bank for further settlement. Provisional names for future new settlements or settlement expansions were already assigned. The plan includes many Palestinian built-up sites in the Areas A and B. Geography and municipal status Some settlements are self-contained cities with a stable population in the tens of thousands, infrastructure, and all other features of permanence. Examples are Beitar Illit (a city of close to 45,000 residents), Ma'ale Adumim, Modi'in Illit, and Ariel (almost 20,000 residents). Some are towns with a local council status with populations of 2,000–20,0000, such as Alfei Menashe, Eli, Elkana, Efrat and Kiryat Arba. There are also clusters of villages governed by a local elected committee and regional councils that are responsible for municipal services. Examples are Kfar Adumim, Neve Daniel, Kfar Tapuach and Ateret. Kibbutzim and moshavim in the territories include Argaman, Gilgal, Niran and Yitav. Jewish neighborhoods have been built on the outskirts of Arab neighborhoods, for example in Hebron. In Jerusalem, there are urban neighborhoods where Jews and Arabs live together: the Muslim Quarter, Silwan, Abu Tor, Sheikh Jarrah and Shimon HaTzadik. Under the Oslo Accords, the West Bank was divided into three separate parts designated as Area A, Area B and Area C. Leaving aside the position of East Jerusalem, all of the settlements are in Area C which comprises about 60% of the West Bank. Types of settlement Cities/towns: Ariel, Betar Illit, Modi'in Illit and Ma'ale Adumim. Urban suburbs, such as Har Gilo. Block settlements, such as Gush Etzion and settlements in the Nablus area. Frontier villages, such as those along the Jordan River. Outposts, small settlements, some authorized and some unauthorized, often on hilltops. The Sasson Report, commissioned by Ariel Sharon's administration, found that several government ministries had cooperated to establish illegal outposts, spending millions of dollars on infrastructure. Resettlement of former Jewish communities Some settlements were established on sites where Jewish communities had existed during the British Mandate of Palestine or even since the First Aliyah or ancient times. Golan Heights – Bnei Yehuda, founded in 1890, abandoned because of Arab attacks in 1920, rebuilt near the original site in 1972. Jerusalem – Jewish presence alongside other peoples since biblical times, various surrounding communities and neighborhoods, including Kfar Shiloah, also known as Silwan—settled by Yemenite Jews in 1884, Jewish residents evacuated in 1938, a few Jewish families move into reclaimed homes in 2004. Other communities: Shimon HaTzadik, Neve Yaakov and Atarot which in post-1967 was rebuilt as an industrial zone. Gush Etzion – four communities, established between 1927 and 1947, destroyed 1948, reestablished beginning 1967. Hebron – Jewish presence since biblical times, forced out in the wake of the 1929 Hebron massacre, some families returned in 1931 but were evacuated by the British, a few buildings resettled since 1967. Dead Sea, northern area – Kalia and Beit HaArava – the former was built in 1934 as a kibbutz for potash mining. The latter was built in 1943 as an agricultural community. Both were abandoned in 1948, and subsequently destroyed by Jordanian forces, and resettled after the Six-Day War. Gaza City had a Jewish community for many centuries that was evacuated following riots in 1929. After the Six-Day War, Jewish communities weren't built in Gaza City, but in Gush Katif in the southwestern part of the Gaza Strip, f.e. Kfar Darom – established in 1946, evacuated in 1948 after an Egyptian attack, resettled in 1970, evacuated in 2005 as part of the withdrawal from the Gaza Strip. Demographics At the end of 2010, 534,224 Jewish Israeli lived in the West Bank, including East Jerusalem. 314,132 of them lived in the 121 authorised settlements and 102 unauthorised settlement outposts on the West Bank, 198,629 were living in East Jerusalem, and almost 20,000 lived in settlements in the Golan Heights. In 2011, 328,423 Israeli Jews were living on the West Bank, excluding Jerusalem, and the Jewish population in the Golan Heights exceeded 20,000. For the year 2012, the Jewish population in the West Bank settlements excluding East Jerusalem was expected to rise to 350,000. In May 2014, the Israeli Housing Minister Uri Ariel, who himself lives in the West Bank settlement of Kfar Adumim, put the settler population at up to 750,000: 400,000 in the West Bank and up to 350,000 in East Jerusalem. He stated: "I think that in five years there will be 550,000 or 600,000 Jews in Judea and Samaria, rather than 400,000 (now)". As of 30 June 2014, according to the Yesha Council, 382,031 Israeli citizens lived in the 121 officially recognised Israeli settlements in the West Bank, almost exclusively Jewish citizens of Israel. A number of Palestinian non-Israeli citizens (as opposed to Arab citizens of Israel) also reside in Israeli settlements in East Jerusalem, however, over 300,000 Israeli citizens (both Jewish citizens of Israel and Arab citizens of Israel) lived in settlements in East Jerusalem, and over 20,000 Israeli citizens lived in settlements in the Golan Heights. In January 2015 the Israeli Interior Ministry gave figures of 389,250 Israeli citizens living in the West Bank and a further 375,000 Israeli citizens living in East Jerusalem. By the end of 2016, the West Bank Jewish population rose to 420,899, excluding East Jerusalem, where there were more than 200,000 Jews. Note: due to change of definition, the number of settlements in the West Bank decreased in 1997 from 138 to 121 (outposts not included). Based on various sources, population dispersal can be estimated as follows: 1 including Sinai 2 Janet Abu-Lughod mentions 500 settlers in Gaza in 1978 (excluding Sinai), and 1,000 in 1980 In addition to internal migration, in large though declining numbers, the settlements absorb annually about 1000 new immigrants from outside Israel. The American Kulanu organization works with such right-wing Israeli settler groups as Amishav and Shavei Israel to settle "lost" Jews of color in such areas where local Palestinians are being displaced. In the 1990s, the annual settler population growth was more than three times the annual population growth in Israel. Population growth has continued in the 2000s. According to the BBC, the settlements in the West Bank have been growing at a rate of 5–6% since 2001. In 2016, there were sixty thousand American Israelis living in settlements in the West Bank. The establishment of settlements in the Palestinian territories is linked to the displacement of the Palestinian populations as evidenced by a 1979 Security Council Commission which established a link between Israeli settlements and the displacement of the local population. The commission also found that those who remained were under consistent pressure to leave to make room for further settlers who were being encouraged into the area. In conclusion the commission stated that settlement in the Palestinian territories was causing "profound and irreversible changes of a geographic and demographic nature". Administration and local government West Bank The Israeli settlements in the West Bank fall under the administrative district of Judea and Samaria Area. Since December 2007, approval by both the Israeli Prime Minister and Israeli Defense Minister of all settlement activities (including planning) in the West Bank is required. Authority for planning and construction is held by the Israel Defense Forces Civil Administration. The area consists of four cities, thirteen local councils and six regional councils. Cities: Ariel, Betar Illit, Maale Adumim, Modi'in Illit; Local councils: Alfei Menashe, Beit Aryeh-Ofarim, Beit El, Efrat, Elkana, Giv'at Ze'ev, Har Adar, Immanuel, Karnei Shomron, Kedumim, Kiryat Arba, Ma'ale Efraim, Oranit; Regional councils: Gush Etzion (Ezion Bloc), Har Hebron (Mount Hebron), Matte Binyamin (Staff of Benjamin, named after the ancient Israelite tribe that dwelled in the area), Megilot (Scrolls, named after the Dead Sea scrolls, which were discovered in the area), Shomron Regional Council (Samaria), Biq'at HaYarden (Jordan valley). The Yesha Council (, Moatzat Yesha, a Hebrew acronym for Judea, Samaria and Gaza) is the umbrella organization of municipal councils in the West Bank. The actual buildings of the Israeli settlements cover only 1 percent of the West Bank, but their jurisdiction and their regional councils extend to about 42 percent of the West Bank, according to the Israeli NGO B'Tselem. Yesha Council chairman Dani Dayan disputes the figures and claims that the settlements only control 9.2 percent of the West Bank. Between 2001 and 2007 more than 10,000 Israeli settlement units were built, while 91 permits were issued for Palestinian construction, and 1,663 Palestinian structures were demolished in Area C. West Bank Palestinians have their cases tried in Israel's military courts while Jewish Israeli settlers living in the same occupied territory are tried in civil courts. The arrangement has been described as "de facto segregation" by the UN Committee on the Elimination of Racial Discrimination. A bill to formally extend Israeli law to the Israeli settlements in the West Bank was rejected in 2012. The basic military laws governing the West Bank are influenced by what is called the "pipelining" of Israeli legislation. As a result of "enclave law", large portions of Israeli civil law are applied to Israeli settlements and Israeli residents in the occupied territories. On 31 August 2014, Israel announced it was appropriating 400 hectares of land in the West Bank to eventually house 1,000 Israel families. The appropriation was described as the largest in more than 30 years. According to reports on Israel Radio, the development is a response to the 2014 kidnapping and murder of Israeli teenagers. East Jerusalem East Jerusalem is defined in the Jerusalem Law as part of Israel and its capital, Jerusalem. As such it is administered as part of the city and its district, the Jerusalem District. Pre-1967 residents of East Jerusalem and their descendants have residency status in the city but many have refused Israeli citizenship. Thus, the Israeli government maintains an administrative distinction between Israeli citizens and non-citizens in East Jerusalem, but the Jerusalem municipality does not. Golan Heights The Golan Heights is administered under Israeli civil law as the Golan sub-district, a part of the Northern District. Israel makes no legal or administrative distinction between pre-1967 communities in the Golan Heights (mainly Druze) and the post-1967 settlements. Sinai Peninsula After the capture of the Sinai Peninsula from Egypt in the 1967 Six-Day War, settlements were established along the Gulf of Aqaba and in northeast Sinai, just below the Gaza Strip. Israel had plans to expand the settlement of Yamit into a city with a population of 200,000, though the actual population of Yamit did not exceed 3,000. The Sinai Peninsula was returned to Egypt in stages beginning in 1979 as part of the Egypt–Israel Peace Treaty. As required by the treaty, in 1982 Israel evacuated the Israeli civilian population from the 18 Sinai settlements in Sinai. In some instances evacuations were done forcefully, such as the evacuation of Yamit. All the settlements were then dismantled. Gaza Strip Before Israel's unilateral disengagement plan in which the Israeli settlements were evacuated, there were 21 settlements in the Gaza Strip under the administration of the Hof Aza Regional Council. The land was allocated in such a way that each Israeli settler disposed of 400 times the land available to the Palestinian refugees, and 20 times the volume of water allowed to the peasant farmers of the Strip. Legal status The consensus view in the international community is that the existence of Israeli settlements in the West Bank including East Jerusalem and the Golan Heights is in violation of international law. The Fourth Geneva Convention includes statements such as "the Occupying Power shall not deport or transfer parts of its own civilian population into the territory it occupies". On 20 December 2019, International Criminal Court chief prosecutor Fatou Bensouda announced an International Criminal Court investigation in Palestine into alleged war crimes committed during the Israeli–Palestinian conflict. At present, the view of the international community, as reflected in numerous UN resolutions, regards the building and existence of Israeli settlements in the West Bank, East Jerusalem and the Golan Heights as a violation of international law. UN Security Council Resolution 446 refers to the Fourth Geneva Convention as the applicable international legal instrument, and calls upon Israel to desist from transferring its own population into the territories or changing their demographic makeup. The reconvened Conference of the High Contracting Parties to the Geneva Conventions has declared the settlements illegal as has the primary judicial organ of the UN, the International Court of Justice. The position of successive Israeli governments is that all authorized settlements are entirely legal and consistent with international law. In practice, Israel does not accept that the Fourth Geneva Convention applies de jure, but has stated that on humanitarian issues it will govern itself de facto by its provisions, without specifying which these are. The scholar and jurist Eugene Rostow has disputed the illegality of authorized settlements. Under Israeli law, West Bank settlements must meet specific criteria to be legal. In 2009, there were approximately 100 small communities that did not meet these criteria and are referred to as illegal outposts. In 2014 twelve EU countries warned businesses against involving themselves in the settlements. According to the warnings, economic activities relating to the settlements involve legal and economic risks stemming from the fact that the settlements are built on occupied land not recognized as Israel's. Illegality arguments The consensus of the international community – the vast majority of states, the overwhelming majority of legal experts, the International Court of Justice and the UN, is that settlements are in violation of international law. After the Six-Day War, in 1967, Theodor Meron, legal counsel to the Israeli Foreign Ministry stated in a legal opinion to the Prime Minister, "My conclusion is that civilian settlement in the administered territories contravenes the explicit provisions of the Fourth Geneva Convention." This legal opinion was sent to Prime Minister Levi Eshkol. However, it was not made public at the time. The Labor cabinet allowed settlements despite the warning. This paved the way for future settlement growth. In 2007, Meron stated that "I believe that I would have given the same opinion today." In 1978, the Legal Adviser of the Department of State of the United States reached the same conclusion. The International Court of Justice, in its advisory opinion, has since ruled that Israel is in breach of international law by establishing settlements in Occupied Palestinian Territory, including East Jerusalem. The Court maintains that Israel cannot rely on its right of self-defense or necessity to impose a regime that violates international law. The Court also ruled that Israel violates basic human rights by impeding liberty of movement and the inhabitants' right to work, health, education and an adequate standard of living. International intergovernmental organizations such as the Conference of the High Contracting Parties to the Fourth Geneva Convention, major organs of the United Nations, the European Union, and Canada, also regard the settlements as a violation of international law. The Committee on the Elimination of Racial Discrimination wrote that "The status of the settlements was clearly inconsistent with Article 3 of the Convention, which, as noted in the Committee's General Recommendation XIX, prohibited all forms of racial segregation in all countries. There is a consensus among publicists that the prohibition of racial discrimination, irrespective of territories, is an imperative norm of international law." Amnesty International, and Human Rights Watch have also characterized the settlements as a violation of international law. In late January 2013 a report drafted by three justices, presided over by Christine Chanet, and issued by the United Nations Human Rights Council declared that Jewish settlements constituted a creeping annexation based on multiple violations of the Geneva Conventions and international law, and stated that if Palestine ratified the Rome Accord, Israel could be tried for "gross violations of human rights law and serious violations of international humanitarian law." A spokesman for Israel's Foreign Ministry declared the report 'unfortunate' and accused the UN's Human Rights Council of a "systematically one-sided and biased approach towards Israel." According to Talia Sasson, the High Court of Justice in Israel, with a variety of different justices sitting, has repeatedly stated for more than 4 decades that Israel's presence in the West Bank is in violation of international law. Legality arguments Four prominent jurists cited the concept of the "sovereignty vacuum" in the immediate aftermath of the Six-Day War to describe the legal status of the West Bank and Gaza: Yehuda Zvi Blum in 1968, Elihu Lauterpacht in 1968, Julius Stone in 1969 and 1981, and Stephen M. Schwebel in 1970. Eugene V. Rostow also argued in 1979 that the occupied territories' legal status was undetermined. Stephen M. Schwebel made three distinctions specific to the Israeli situation to claim that the territories were seized in self-defense and that Israel has more title to them than the previous holders. Professor Julius Stone also wrote that "Israel's presence in all these areas pending negotiation of new borders is entirely lawful, since Israel entered them lawfully in self-defense." He argued that it would be an "irony bordering on the absurd" to read Article 49(6) as meaning that the State of Israel was obliged to ensure (by force if necessary) that areas with a millennial association with Jewish life, shall be forever "judenrein". Professor Ben Saul took exception to this view, arguing that Article 49(6) can be read to include voluntary or assisted transfers, as indeed it was in the advisory opinion of the International Court of Justice which had expressed this interpretation in the Israeli Wall Advisory Opinion (2003). Israel maintains that a temporary use of land and buildings for various purposes is permissible under a plea of military necessity and that the settlements fulfilled security needs. Israel argues that its settlement policy is consistent with international law, including the Fourth Geneva Convention, while recognising that some settlements have been constructed illegally on private land. The Israeli Supreme Court has ruled that the power of the Civil Administration and the Military Commander in the occupied territories is limited by the entrenched customary rules of public international law as codified in the Hague Regulations. In 1998 the Israeli Minister of Foreign Affairs produced "The International Criminal Court Background Paper". It concludesInternational law has long recognised that there are crimes of such severity they should be considered "international crimes." Such crimes have been established in treaties such as the Genocide Convention and the Geneva Conventions.... The following are Israel's primary issues of concern [ie with the rules of the ICC]: The inclusion of settlement activity as a "war crime" is a cynical attempt to abuse the Court for political ends. The implication that the transfer of civilian population to occupied territories can be classified as a crime equal in gravity to attacks on civilian population centres or mass murder is preposterous and has no basis in international law. A UN conference was held in Rome in 1998, where Israel was one of seven countries to vote against the Rome Statute to establish the International Criminal Court. Israel was opposed to a provision that included as a war crime the transfer of civilian populations into territory the government occupies. Israel has signed the statute, but not ratified the treaty. Land ownership A 1996 amendment to an Israeli military order, states that land privately owned can not be part of a settlement, unless the land in question has been confiscated for military purposes. In 2006 Peace Now acquired a report, which it claims was leaked from the Israeli Government's Civil Administration, indicating that up to 40 percent of the land Israel plans to retain in the West Bank is privately owned by Palestinians. Peace Now called this a violation of Israeli law. Peace Now published a comprehensive report about settlements on private lands. In the wake of a legal battle, Peace Now lowered the figure to 32 percent, which the Civil Administration also denied. The Washington Post reported that "The 38-page report offers what appears to be a comprehensive argument against the Israeli government's contention that it avoids building on private land, drawing on the state's own data to make the case." In February 2008, the Civil Administration stated that the land on which more than a third of West Bank settlements was built had been expropriated by the IDF for "security purposes." The unauthorized seizure of private Palestinian land was defined by the Civil Administration itself as 'theft.' According to B'Tselem, more than 42 percent of the West Bank are under control of the Israeli settlements, 21 percent of which was seized from private Palestinian owners, much of it in violation of the 1979 Israeli Supreme Court decision. In 1979, the government decided to extend settlements or build new ones only on "state lands". A secret database, drafted by a retired senior officer, Baruch Spiegel, on orders from former defense minister Shaul Mofaz, found that some settlements deemed legal by Israel were illegal outposts, and that large portions of Ofra, Elon Moreh and Beit El were built on private Palestinian land. The "Spiegel report" was revealed by Haaretz in 2009. Many settlements are largely built on private lands, without approval of the Israeli Government. According to Israel, the bulk of the land was vacant, was leased from the state, or bought fairly from Palestinian landowners. Invoking the Absentee Property Law to transfer, sell or lease property in East Jerusalem owned by Palestinians who live elsewhere without compensation has been criticized both inside and outside of Israel. Opponents of the settlements claim that "vacant" land belonged to Arabs who fled or collectively to an entire village, a practice that developed under Ottoman rule. B'Tselem charged that Israel is using the absence of modern legal documents for the communal land as a legal basis for expropriating it. These "abandoned lands" are sometimes laundered through a series of fraudulent sales. According to Amira Hass, one of the techniques used by Israel to expropriate Palestinian land is to place desired areas under a 'military firing zone' classification, and then issue orders for the evacuation of Palestinians from the villages in that range, while allowing contiguous Jewish settlements to remain unaffected. Effects on Palestinian human rights Amnesty International argues that Israel's settlement policy is discriminatory and a violation of Palestinian human rights. B'Tselem claims that Israeli travel restrictions impact on Palestinian freedom of movement and Palestinian human rights have been violated in Hebron due to the presence of the settlers within the city. According to B'Tselem, over fifty percent of West Bank land expropriated from Palestinians has been used to establish settlements and create reserves of land for their future expansion. The seized lands mainly benefit the settlements and Palestinians cannot use them. The roads built by Israel in the West Bank to serve the settlements are closed to Palestinian vehicles' and act as a barrier often between villages and the lands on which they subsist. Human Rights Watch and other human rights observer volunteer regularly file reports on "settler violence," referring to stoning and shooting incidents involving Israeli settlers. Israel's withdrawal from Gaza and Hebron have led to violent settler protests and disputes over land and resources. Meron Benvenisti described the settlement enterprise as a "commercial real estate project that conscripts Zionist rhetoric for profit." The construction of the Israeli West Bank barrier has been criticized as an infringement on Palestinian human and land rights. The United Nations Office for the Coordination of Humanitarian Affairs estimated that 10% of the West Bank would fall on the Israeli side of the barrier. In July 2012, the UN Human Rights Council decided to set up a probe into Jewish settlements. The report of the independent international fact-finding mission which investigated the "implications of the Israeli settlements on the civil, political, economic, social and cultural rights of the Palestinian people throughout the Occupied Palestinian Territory" was published in February 2013. In February 2020, the Office of the United Nations High Commissioner for Human Rights published a list of 112 companies linked to activities related to Israeli settlements in the occupied West Bank. Economy Goods produced in Israeli settlements are able to stay competitive on the global market, in part because of massive state subsidies they receive from the Israeli government. Farmers and producers are given state assistance, while companies that set up in the territories receive tax breaks and direct government subsidies. An Israeli government fund has also been established to help companies pay customs penalties. Palestinian officials estimate that settlers sell goods worth some $500 million to the Palestinian market. Israel has built 16 industrial zones, containing roughly 1000 industrial plants, in the West Bank and East Jerusalem on acreage that consumes large parts of the territory planned for a future Palestinian state. According to Jodi Rudoren these installations both entrench the occupation and provide work for Palestinians, even those opposed to it. The 16 parks are located at Shaked, Beka'ot, Baran, Karnei Shomron, Emmanuel, Barkan, Ariel, Shilo, Halamish, Ma'ale Efraim, Sha'ar Binyamin, Atarot, Mishor Adumim, Gush Etzion, Kiryat Arba and Metarim (2001). In spite of this, the West Bank settlements have failed to develop a self-sustaining local economy. About 60% of the settler workforce commutes to Israel for work. The settlements rely primarily on the labor of their residents in Israel proper rather than local manufacturing, agriculture, or research and development. Of the industrial parks in the settlements, there are only two significant ones, at Ma'ale Adumim and Barkan, with most of the workers there being Palestinian. Only a few hundred settler households cultivate agricultural land, and rely primarily on Palestinian labor in doing so. Settlement has an economic dimension, much of it driven by the significantly lower costs of housing for Israeli citizens living in Israeli settlements compared to the cost of housing and living in Israel proper. Government spending per citizen in the settlements is double that spent per Israeli citizen in Tel Aviv and Jerusalem, while government spending for settlers in isolated Israeli settlements is three times the Israeli national average. Most of the spending goes to the security of the Israeli citizens living there. Export to EU According to Israeli government estimates, $230 million worth of settler goods including fruit, vegetables, cosmetics, textiles and toys are exported to the EU each year, accounting for approximately 2% of all Israeli exports to Europe. A 2013 report of Profundo revealed that at least 38 Dutch companies imported settlement products. European Union law requires a distinction to be made between goods originating in Israel and those from the occupied territories. The former benefit from preferential custom treatment according to the EU-Israel Association Agreement (2000); the latter don't, having been explicitly excluded from the agreement. In practice, however, settler goods often avoid mandatory customs through being labelled as originating in Israel, while European customs authorities commonly fail to complete obligatory postal code checks of products to ensure they have not originated in the occupied territories. In 2009, the United Kingdom's Department for the Environment, Food and Rural Affairs issued new guidelines concerning labelling of goods imported from the West Bank. The new guidelines require labelling to clarify whether West Bank products originate from settlements or from the Palestinian economy. Israel's foreign ministry said that the UK was "catering to the demands of those whose ultimate goal is the boycott of Israeli products"; but this was denied by the UK government, who said that the aim of the new regulations was to allow consumers to choose for themselves what produce they buy. Denmark has similar legislation requiring food products from settlements in the occupied territories to be accurately labelled. On 12 November 2019 the Court of Justice of the European Union in a ruling covering all territory Israel captured in the 1967 war decided that labels on foodstuffs must not imply that goods produced in occupied territory came from Israel itself and must "prevent consumers from being misled as to the fact that the State of Israel is present in the territories concerned as an occupying power and not as a sovereign entity". In its ruling, the court said that failing to inform EU consumers they were potentially buying goods produced in settlements denies them access to "ethical considerations and considerations relating to the observance of international law". In January 2019 the Dail (Ireland's lower house) voted in favour, by 78 to 45, of the Control of Economic Activity (Occupied Territories) bill. This piece of legislation prohibits the purchasing of any good and/or service from the Golan Heights, East Jerusalem or West Bank settlements. As of February 2019 the bill has some stages to be completed,once codified, either a five-year jail sentence or fines of up to €250,000 ($284,000) will affect anyone who breaks this law. A petition under the European Citizens' Initiative, submitted in September 2021, was accepted on 20 February 2022. The petition seeks the adoption of legislation to ban trade with unlawful settlements. The petition requires a million signatures from across the EU and has received support from civil society groups including Human Rights Watch. Palestinian economy and resources A Palestinian report argued in 2011 that settlements have a detrimental effect on the Palestinian economy, equivalent to about 85% of the nominal gross domestic product of Palestine, and that the "occupation enterprise" allows the state of Israel and commercial firms to profit from Palestinian natural resources and tourist potential. A 2013 report published by the World Bank analysed the impact that the limited access to Area C lands and resources had on the Palestinian economy. While settlements represent a single axis of control, it is the largest with 68% of the Area C lands reserved for the settlements. The report goes on to calculate that access to the lands and resources of Area C, including the territory in and around settlements, would increase the Palestinian GDP by some $3.5 billion (or 35%) per year. The Israeli Supreme Court has ruled that Israeli companies are entitled to exploit the West Bank's natural resources for economic gain, and that international law must be "adapted" to the "reality on the ground" of long-term occupation. Palestinian labour Due to the availability of jobs offering twice the prevailing salary of the West Bank (), as well as high unemployment, tens of thousands of Palestinians work in Israeli settlements. According to the Manufacturers Association of Israel, some 22,000 Palestinians were employed in construction, agriculture, manufacturing and service industries. An Al-Quds University study in 2011 found that 82% of Palestinian workers said they would prefer to not work in Israeli settlements if they had alternative employment in the West Bank. Palestinians have been highly involved in the construction of settlements in the West Bank. In 2013, the Palestinian Central Bureau of Statistics released their survey showing that the number of Palestinian workers who are employed by the Jewish settlements increased from 16,000 to 20,000 in the first quarter. The survey also found that Palestinians who work in Israel and the settlements are paid more than twice their salary compared to what they receive from Palestinian employers. In 2008, Kav LaOved charged that Palestinians who work in Israeli settlements are not granted basic protections of Israeli labor law. Instead, they are employed under Jordanian labor law, which does not require minimum wage, payment for overtime and other social rights. In 2007, the Supreme Court of Israel ruled that Israeli labor law does apply to Palestinians working in West Bank settlements and applying different rules in the same work place constituted discrimination. The ruling allowed Palestinian workers to file lawsuits in Israeli courts. In 2008, the average sum claimed by such lawsuits stood at 100,000 shekels. According to Palestinian Center for Policy and Survey Research, 63% of Palestinians opposed PA plans to prosecute Palestinians who work in the settlements. However, 72% of Palestinians support a boycott of the products they sell. Although the Palestinian Authority has criminalized working in the settlements, the director-general at the Palestinian Ministry of Labor, Samer Salameh, described the situation in February 2014 as being "caught between two fires". He said "We strongly discourage work in the settlements, since the entire enterprise is illegal and illegitimate...but given the high unemployment rate and the lack of alternatives, we do not enforce the law that criminalizes work in the settlements." Violence Israeli settler violence Gush Emunim Underground was a militant organization that operated in 1979–1984. The organization planned attacks on Palestinian officials and the Dome of the Rock. In 1994, Baruch Goldstein of Hebron, a member of Kach carried out the Cave of the Patriarchs massacre, killing 29 Muslim worshipers and injuring 125. The attack was widely condemned by the Israeli government and Jewish community. The Palestinian leadership has accused Israel of "encouraging and enabling" settler violence in a bid to provoke Palestinian riots and violence in retaliation. Violence perpetrated by Israeli settlers against Palestinians constitutes terrorism according to the U.S. Department of State, and former IDF Head of Central Command Avi Mizrahi stated that such violence constitutes "terror." In mid-2008, a UN report recorded 222 acts of Israeli settler violence against Palestinians and IDF troops compared with 291 in 2007. This trend reportedly increased in 2009. Maj-Gen Shamni said that the number had risen from a few dozen individuals to hundreds, and called it "a very grave phenomenon." In 2008–2009, the defense establishment adopted a harder line against the extremists. This group responded with a tactic dubbed "price tagging", vandalizing Palestinian property whenever police or soldiers were sent in to dismantle outposts. From January through to September 2013, 276 attacks by settlers against Palestinians were recorded. Leading religious figures in the West Bank have harshly criticized these tactics. Rabbi Menachem Froman of Tekoa said that "Targeting Palestinians and their property is a shocking thing, (...) It's an act of hurting humanity. (...) This builds a wall of fire between Jews and Arabs." The Yesha Council and Hanan Porat also condemned such actions. Other rabbis have been accused of inciting violence against non-Jews. In response to settler violence, the Israeli government said that it would increase law enforcement and cut off aid to illegal outposts. Some settlers are thought to lash out at Palestinians because they are "easy victims." The United Nations accused Israel of failing to intervene and arrest settlers suspected of violence. In 2008, Haaretz wrote that "Israeli society has become accustomed to seeing lawbreaking settlers receive special treatment and no other group could similarly attack Israeli law enforcement agencies without being severely punished." In September 2011, settlers vandalized a mosque and an army base. They slashed tires and cut cables of 12 army vehicles and sprayed graffiti. In November 2011, the United Nations Office for Coordination of Human Affairs (OCHA) in the Palestinian territories published a report on settler violence that showed a significant rise compared to 2009 and 2010. The report covered physical violence and property damage such as uprooted olive trees, damaged tractors and slaughtered sheep. The report states that 90% of complaints filed by Palestinians have been closed without charge. According to EU reports, Israel has created an "atmosphere of impunity" for Jewish attackers, which is seen as tantamount to tacit approval by the state. In the West Bank, Jews and Palestinians live under two different legal regimes and it is difficult for Palestinians to lodge complaints, which must be filed in Hebrew in Israeli settlements. The 27 ministers of foreign affairs of the European Union published a report in May 2012 strongly denouncing policies of the State of Israel in the West Bank and denouncing "continuous settler violence and deliberate provocations against Palestinian civilians." The report by all EU ministers called "on the government of Israel to bring the perpetrators to justice and to comply with its obligations under international law." In July 2014, a day after the burial of three murdered Israeli teens, Khdeir, a 16-year-old Palestinian, was forced into a car by 3 Israeli settlers on an East Jerusalem street. His family immediately reported the fact to Israeli Police who located his charred body a few hours later at Givat Shaul in the Jerusalem Forest. Preliminary results from the autopsy suggested that he was beaten and burnt while still alive. The murder suspects explained the attack as a response to the June abduction and murder of three Israeli teens. The murders contributed to a breakout of hostilities in the 2014 Israel–Gaza conflict. In July 2015, a similar incident occurred where Israeli settlers made an arson attack on two Palestinian houses, one of which was empty; however, the other was occupied, resulting in the burning to death of a Palestinian infant; the four other members of his family were evacuated to the hospital suffering serious injuries. These two incidents received condemnation from the United States, European Union and the IDF. The European Union criticized Israel for "failing to protect the Palestinian population". Olive trees While the Economy of the Palestinian territories has shown signs of growth, the International Committee of the Red Cross reported that Palestinian olive farming has suffered. According to the ICRC, 10,000 olive trees were cut down or burned by settlers in 2007–2010. Foreign ministry spokesman Yigal Palmor said the report ignored official PA data showing that the economic situation of Palestinians had improved substantially, citing Mahmoud Abbas's comment to The Washington Post in May 2009, where he said "in the West Bank, we have a good reality, the people are living a normal life." Haaretz blamed the violence during the olive harvest on a handful of extremists. In 2010, trees belonging to both Jews and Arabs were cut down, poisoned or torched. In the first two weeks of the harvest, 500 trees owned by Palestinians and 100 trees owned by Jews had been vandalized. In October 2013, 100 trees were cut down. Violent attacks on olive trees seem to be facilitated by the apparently systematic refusal of the Israeli authorities to allow Palestinians to visit their own groves, sometimes for years, especially in cases where the groves are deemed to be too close to settlements. Palestinian violence against settlers Israeli civilians living in settlements have been targeted by violence from armed Palestinian groups. These groups, according to Human Rights Watch, assert that settlers are "legitimate targets" that have "forfeited their civilian status by residing in settlements that are illegal under international humanitarian law." Both Human Rights Watch and B'tselem rejected this argument on the basis that the legal status of the settlements has no effect on the civilian status of their residents. Human Rights Watch said the "prohibition against intentional attacks against civilians is absolute." B'tselem said "The settlers constitute a distinctly civilian population, which is entitled to all the protections granted civilians by international law. The Israeli security forces' use of land in the settlements or the membership of some settlers in the Israeli security forces does not affect the status of the other residents living among them, and certainly does not make them proper targets of attack." Fatal attacks on settlers have included firing of rockets and mortars and drive-by shootings, also targeting infants and children. Violent incidents include the murder of Shalhevet Pass, a ten-month-old baby shot by a Palestinian sniper in Hebron, and the murder of two teenagers by unknown perpetrators on 8 May 2001, whose bodies were hidden in a cave near Tekoa, a crime that Israeli authorities suggest may have been committed by Palestinian terrorists. In the Bat Ayin axe attack, children in Bat Ayin were attacked by a Palestinian wielding an axe and a knife. A 13-year-old boy was killed and another was seriously wounded. Rabbi Meir Hai, a father of seven, was killed in a drive-by shooting. In August 2011, five members of one family were killed in their beds. The victims were the father Ehud (Udi) Fogel, the mother Ruth Fogel, and three of their six children—Yoav, 11, Elad, 4, and Hadas, the youngest, a three-month-old infant. According to David Ha'ivri, and as reported by multiple sources, the infant was decapitated. Pro-Palestinian activist violence Pro-Palestinian activists who hold regular protests near the settlements have been accused of stone-throwing, physical assault and provocation. In 2008, Avshalom Peled, head of the Israel Police's Hebron district, called "left-wing" activity in the city dangerous and provocative, and accused activists of antagonizing the settlers in the hope of getting a reaction. Environmental issues Municipal Environmental Associations of Judea and Samaria, an environmental awareness group, was established by the settlers to address sewage treatment problems and cooperate with the Palestinian Authority on environmental issues. According to a 2004 report by Friends of the Earth Middle East, settlers account for 10% of the population in the West Bank but produce 25% of the sewage output. Beit Duqqu and Qalqilyah have accused settlers of polluting their farmland and villagers claim children have become ill after swimming in a local stream. Legal action was taken against 14 settlements by the Israeli Ministry of the Environment. The Palestinian Authority has also been criticized by environmentalists for not doing more to prevent water pollution. Settlers and Palestinians share the mountain aquifer as a water source, and both generate sewage and industrial effluents that endanger the aquifer. Friends of the Earth Middle East claimed that sewage treatment was inadequate in both sectors. Sewage from Palestinian sources was estimated at 46 million cubic meters a year, and sources from settler sources at 15 million cubic meters a year. A 2004 study found that sewage was not sufficiently treated in many settlements, while sewage from Palestinian villages and cities flowed into unlined cesspits, streams and the open environment with no treatment at all. In a 2007 study, the Israel Nature and Parks Authority and Israeli Ministry of Environmental Protection, found that Palestinian towns and cities produced 56 million cubic meters of sewage per year, 94 percent discharged without adequate treatment, while Israeli sources produced 17.5 million cubic meters per year, 31.5 percent without adequate treatment. According to Palestinian environmentalists, the settlers operate industrial and manufacturing plants that can create pollution as many do not conform to Israeli standards. In 2005, an old quarry between Kedumim and Nablus was slated for conversion into an industrial waste dump. Pollution experts warned that the dump would threaten Palestinian water sources. Impact on Palestinian demographics The Consortium for Applied Research on International Migration (CARIM) has reported in their 2011 migration profile for Palestine that the reasons for individuals to leave the country are similar to those of other countries in the region and they attribute less importance to the specific political situation of the occupied Palestinian territory. Human Rights Watch in 2010 reported that Israeli settlement policies have had the effect of "forcing residents to leave their communities". In 2008, Condoleezza Rice suggested sending Palestinian refugees to South America, which might reduce pressure on Israel to withdraw from the settlements. Sushil P. Seth speculates that Israelis seem to feel that increasing settlements will force many Palestinians to flee to other countries and that the remainder will be forced to live under Israeli terms. Speaking anonymously with regard to Israeli policies in the South Hebron Hills, a UN expert said that the Israeli crackdown on alternative energy infrastructures like solar panels is part of a deliberate strategy in Area C. "From December 2010 to April 2011, we saw a systematic targeting of the water infrastructure in Hebron, Bethlehem and the Jordan valley. Now, in the last couple of months, they are targeting electricity. Two villages in the area have had their electrical poles demolished. There is this systematic effort by the civil administration targeting all Palestinian infrastructure in Hebron. They are hoping that by making it miserable enough, they [the Palestinians] will pick up and leave." Approximately 1,500 people in 16 communities are dependent on energy produced by these installations duct business are threatened with work stoppage orders from the Israeli administration on their installation of alternative power infrastructure, and demolition orders expected to follow will darken the homes of 500 people. Educational institutions Ariel University, formerly the College of Judea and Samaria, is the major Israeli institution of higher education in the West Bank. With close to 13,000 students, it is Israel's largest public college. The college was accredited in 1994 and awards bachelor's degrees in arts, sciences, technology, architecture and physical therapy. On 17 July 2012, the Council for Higher Education in Judea and Samaria voted to grant the institution full university status. Teacher training colleges include Herzog College in Alon Shvut and Orot Israel College in Elkana. Ohalo College is located in Katzrin, in the Golan Heights. Curricula at these institutions are overseen by the Council for Higher Education in Judea and Samaria (CHE-JS). In March 2012, The Shomron Regional Council was awarded the Israeli Ministry of Education's first prize National Education Award in recognizing its excellence in investing substantial resources in the educational system. The Shomron Regional Council achieved the highest marks in all parameters (9.28 / 10). Gershon Mesika, the head of the regional council, declared that the award was a certificate of honour of its educators and the settlement youth who proved their quality and excellence. Strategic significance In 1983 an Israeli government plan entitled "Master Plan and Development Plan for Settlement in Samaria and Judea" envisaged placing a "maximally large Jewish population" in priority areas to accomplish incorporation of the West Bank in the Israeli "national system". According to Ariel Sharon, strategic settlement locations would work to preclude the formation of a Palestinian state. Palestinians argue that the policy of settlements constitutes an effort to preempt or sabotage a peace treaty that includes Palestinian sovereignty, and claim that the presence of settlements harm the ability to have a viable and contiguous state. This was also the view of the Israeli Vice Prime Minister Haim Ramon in 2008, saying "the pressure to enlarge Ofra and other settlements does not stem from a housing shortage, but rather is an attempt to undermine any chance of reaching an agreement with the Palestinians ..." The Israel Foreign Ministry asserts that some settlements are legitimate, as they took shape when there was no operative diplomatic arrangement, and thus they did not violate any agreement. Based on this, they assert that: Prior to the signing of the Egypt–Israel Peace Treaty, the eruption of the First Intifada, down to the signing of the Israel–Jordan peace treaty in 1994, Israeli governments on the left and right argued that the settlements were of strategic and tactical importance. The location of the settlements was primarily chosen based on the threat of an attack by the bordering hostile countries of Jordan, Syria, and Egypt and possible routes of advance into Israeli population areas. These settlements were seen as contributing to the security of Israel at a time when peace treaties had not been signed. Dismantling of settlements An early evacuation took place in 1982 as part of the Egypt–Israel Peace Treaty, when Israel was required to evacuate its settlers from the 18 Sinai settlements. Arab parties to the conflict had demanded the dismantlement of the settlements as a condition for peace with Israel. The evacuation was carried out with force in some instances, for example in Yamit. The settlements were demolished, as it was feared that settlers might try to return to their homes after the evacuation. Israel's unilateral disengagement plan took place in 2005. It involved the evacuation of settlements in the Gaza Strip and part of the West Bank, including all 21 settlements in Gaza and four in the West Bank, while retaining control over Gaza's borders, coastline, and airspace. Most of these settlements had existed since the early 1980s, some were over 30 years old; the total population involved was more than 10,000. There was significant opposition to the plan among parts of the Israeli public, and especially those living in the territories. George W. Bush said that a permanent peace deal would have to reflect "demographic realities" in the West Bank regarding Israel's settlements. Within the former settlements, almost all buildings were demolished by Israel, with the exception of certain government and religious structures, which were completely emptied. Under an international arrangement, productive greenhouses were left to assist the Palestinian economy but about 30% of these were destroyed within hours by Palestinian looters. Following the withdrawal, many of the former synagogues were torched and destroyed by Palestinians. The Palestinian leadership "maintained" that the synagogues were "symbols of Israeli occupation." Kofi Annan, the Secretary-General of the United Nations at the time, said the Palestinian Authority had a "moral responsibility to protect the synagogues as places with religious significance." Some believe that settlements need not necessarily be dismantled and evacuated, even if Israel withdraws from the territory where they stand, as they can remain under Palestinian rule. These ideas have been expressed both by left-wing Israelis, and by Palestinians who advocate the two-state solution, and by extreme Israeli right-wingers and settlers who object to any dismantling and claim links to the land that are stronger than the political boundaries of the state of Israel. The Israeli government has often threatened to dismantle outposts. Some have actually been dismantled, occasionally with use of force; this led to settler violence. Palestinian statehood bid of 2011 American refusal to declare the settlements illegal was said to be the determining factor in the 2011 attempt to declare Palestinian statehood at the United Nations, the so-called Palestine 194 initiative. Israel announced additional settlements in response to the Palestinian diplomatic initiative and Germany responded by moving to stop deliveries to Israel of submarines capable of carrying nuclear weapons. Finally in 2012, several European states switched to either abstain or vote for statehold in response to continued settlement construction. Israel approved further settlements in response to the vote, which brought further worldwide condemnation. Impact on peace process The settlements have been a source of tension between Israel and the U.S. Jimmy Carter regarded the settlements as illegal and tactically unwise. Ronald Reagan stated that they were legal but an obstacle to negotiations. In 1991, the U.S. delayed a subsidized loan to pressure Israel on the subject of settlement-building in the Jerusalem-Bethlehem corridor. In 2005, U.S. declared support for "the retention by Israel of major Israeli population centers as an outcome of negotiations," reflecting the statement by George W. Bush that a permanent peace treaty would have to reflect "demographic realities" in the West Bank. In June 2009, Barack Obama said that the United States "does not accept the legitimacy of continued Israeli settlements." Palestinians claim that Israel has undermined the Oslo accords and peace process by continuing to expand the settlements. Settlements in the Sinai Peninsula were evacuated and razed in the wake of the peace agreement with Egypt. The 27 ministers of foreign affairs of the European Union published a report in May 2012 strongly denouncing policies of the State of Israel in the West Bank and finding that Israeli settlements in the West Bank are illegal and "threaten to make a two-state solution impossible." In the framework of the Oslo I Accord of 1993 between the Israeli government and the Palestine Liberation Organization (PLO), a modus vivendi was reached whereby both parties agreed to postpone a final solution on the destination of the settlements to the permanent status negotiations (Article V.3). Israel claims that settlements thereby were not prohibited, since there is no explicit interim provision prohibiting continued settlement construction, the agreement does register an undertaking by both sides, namely that "Neither side shall initiate or take any step that will change the status of the West Bank and the Gaza Strip pending the outcome of the permanent status negotiations" (Article XXX1 (7)), which has been interpreted as, not forbidding settlements, but imposing severe restrictions on new settlement building after that date. Melanie Jacques argued in this context that even 'agreements between Israel and the Palestinians which would allow settlements in the OPT, or simply tolerate them pending a settlement of the conflict, violate the Fourth Geneva Convention.' Final status proposals have called for retaining long-established communities along the Green Line and transferring the same amount of land in Israel to the Palestinian state. The Clinton administration proposed that Israel keep some settlements in the West Bank, especially those in large blocs near the pre-1967 borders of Israel, with the Palestinians receiving concessions of land in other parts of the country. Both Clinton and Tony Blair pointed out the need for territorial and diplomatic compromise based on the validity of some of the claims of both sides. Fayed Mustafa, Palestinian ambassador to Russia, called for the return of Palestinian territories to Egypt and Jordan if talks failed. As Minister of Defense, Ehud Barak approved a plan requiring security commitments in exchange for withdrawal from the West Bank. Barak also expressed readiness to cede parts of East Jerusalem and put the holy sites in the city under a "special regime." On 14 June 2009, Israeli Prime Minister Benjamin Netanyahu, as an answer to U.S. President Barack Obama's speech in Cairo, delivered a speech setting out his principles for a Palestinian-Israeli peace, among others, he alleged "... we have no intention of building new settlements or of expropriating additional land for existing settlements." In March 2010, the Netanyahu government announced plans for building 1,600 housing units in Ramat Shlomo across the Green Line in East Jerusalem during U.S. Vice President Joe Biden's visit to Israel causing a diplomatic row. On 6 September 2010, Jordanian King Abdullah II and Syrian President Bashar al-Assad said that Israel would need to withdraw from all of the lands occupied in 1967 in order to achieve peace with the Palestinians. Bradley Burston has said that a negotiated or unilateral withdraw from most of the settlements in the West Bank is gaining traction in Israel. In November 2010, the United States offered to "fight against efforts to delegitimize Israel" and provide extra arms to Israel in exchange for a continuation of the settlement freeze and a final peace agreement, but failed to come to an agreement with the Israelis on the exact terms. In December 2010, the United States criticised efforts by the Palestinian Authority to impose borders for the two states through the United Nations rather than through direct negotiations between the two sides. In February 2011, it vetoed a draft resolution to condemn all Jewish settlements established in the occupied Palestinian territory since 1967 as illegal. The resolution, which was supported by all other Security Council members and co-sponsored by nearly 120 nations, would have demanded that "Israel, as the occupying power, immediately and completely ceases all settlement activities in the occupied Palestinian territory, including East Jerusalem and that it fully respect its legal obligations in this regard." The U.S. representative said that while it agreed that the settlements were illegal, the resolution would harm chances for negotiations. Israel's deputy Foreign Minister, Daniel Ayalon, said that the "UN serves as a rubber stamp for the Arab countries and, as such, the General Assembly has an automatic majority," and that the vote "proved that the United States is the only country capable of advancing the peace process and the only righteous one speaking the truth: that direct talks between Israel and the Palestinians are required." Palestinian negotiators, however, have refused to resume direct talks until Israel ceases all settlement activity. In November 2009, Israeli Prime Minister Netanyahu issued a 10-month settlement freeze in the West Bank in an attempt to restart negotiations with the Palestinians. The freeze did not apply to building in Jerusalem in areas across the green line, housing already under construction and existing construction described as "essential for normal life in the settlements" such as synagogues, schools, kindergartens and public buildings. The Palestinians refused to negotiate without a complete halt to construction. In the face of pressure from the United States and most world powers supporting the demand by the Palestinian Authority that Israel desist from settlement project in 2010, Israel's ambassador to the UN Meron Reuben said Israel would only stop settlement construction after a peace agreement is concluded, and expressed concern were Arab countries to press for UN recognition of a Palestinian state before such an accord. He cited Israel's dismantlement of settlements in both the Sinai which took place after a peace agreement, and its unilateral dismantlement of settlements in the Gaza Strip. He presumed that settlements would stop being built were Palestinians to establish a state in a given area. Proposals for land swap The Clinton Parameters, a 2000 peace proposal by then U.S. President Bill Clinton, included a plan on which the Palestinian State was to include 94–96% of the West Bank, and around 80% of the settlers were to be under Israeli sovereignty, and in exchange for that, Israel will concede some territory (so called 'Territory Exchange' or 'Land Swap') within the Green Line (1967 borders). The swap would consist of 1–3% of Israeli territory, such that the final borders of the West Bank part of the Palestinian state would include 97% of the land of the original borders. In 2010, Palestinian Authority President Mahmoud Abbas said that the Palestinians and Israel have agreed on the principle of a land swap. The issue of the ratio of land Israel would give to the Palestinians in exchange for keeping settlement blocs is an issue of dispute, with the Palestinians demanding that the ratio be 1:1, and Israel insisting that other factors be considered as well. Under any peace deal with the Palestinians, Israel intends to keep the major settlement blocs close to its borders, which contain over 80% of the settlers. Prime Ministers Yitzhak Rabin, Ariel Sharon, and Benjamin Netanyahu have all stated Israel's intent to keep such blocs under any peace agreement. U.S. President George W. Bush acknowledged that such areas should be annexed to Israel in a 2004 letter to Prime Minister Sharon. The European Union position is that any annexation of settlements should be done as part of mutually agreed land swaps, which would see the Palestinians controlling territory equivalent to the territory captured in 1967. The EU says that it will not recognise any changes to the 1967 borders without an agreement between the parties. Israeli Foreign Minister Avigdor Lieberman has proposed a plan which would see settlement blocs annexed to Israel in exchange for heavily Arab areas inside Israel as part of a population exchange. According to Mitchell G. Bard: "Ultimately, Israel may decide to unilaterally disengage from the West Bank and determine which settlements it will incorporate within the borders it delineates. Israel would prefer, however, to negotiate a peace treaty with the Palestinians that would specify which Jewish communities will remain intact within the mutually agreed border of Israel, and which will need to be evacuated. Israel will undoubtedly insist that some or all of the "consensus" blocs become part of Israel". Proposal of dual citizenship A number of proposals for the granting of Palestinian citizenship or residential permits to Jewish settlers in return for the removal of Israeli military installations from the West Bank have been fielded by such individuals as Arafat, Ibrahim Sarsur and Ahmed Qurei. In contrast, Mahmoud Abbas said in July 2013 that "In a final resolution, we would not see the presence of a single Israeli—civilian or soldier—on our lands." Israeli Minister Moshe Ya'alon said in April 2010 that "just as Arabs live in Israel, so, too, should Jews be able to live in Palestine." ... "If we are talking about coexistence and peace, why the [Palestinian] insistence that the territory they receive be ethnically cleansed of Jews?". The idea has been expressed by both advocates of the two-state solution and supporters of the settlers and conservative or fundamentalist currents in Israeli Judaism that, while objecting to any withdrawal, claim stronger links to the land than to the State of Israel. Settlement expansion Pre Resolution 2334 On 19 June 2011, Haaretz reported that the Israeli cabinet voted to revoke Defense Minister Ehud Barak's authority to veto new settlement construction in the West Bank, by transferring this authority from the Agriculture Ministry, headed by Barak ally Orit Noked, to the Prime Minister's office. In 2009, newly elected Prime Minister Benjamin Netanyahu said: "I have no intention of building new settlements in the West Bank... But like all the governments there have been until now, I will have to meet the needs of natural growth in the population. I will not be able to choke the settlements." On 15 October 2009, he said the settlement row with the United States had been resolved. In April 2012, four illegal outposts were retroactively legalized by the Israeli government. In June 2012, the Netanyahu government announced a plan to build 851 homes in five settlements: 300 units in Beit El and 551 units in other settlements. Amid peace negotiations that showed little signs of progress, Israel issued on 3 November 2013, tenders for 1,700 new homes for Jewish settlers. The plots were offered in nine settlements in areas Israel says it intends to keep in any peace deal with the Palestinians. On 12 November, Peace Now revealed that the Construction and Housing Ministry had issued tenders for 24,000 more settler homes in the West Bank, including 4,000 in East Jerusalem. 2,500 units were planned in Ma'aleh Adumim, some 9,000 in the Gush Etzion Region, and circa 12,000 in the Binyamin Region, including 1,200 homes in the E1 area in addition to 3,000 homes in previously frozen E1 projects. Circa 15,000 homes of the 24,000 plan would be east of the West Bank Barrier and create the first new settlement blocs for two decades, and the first blocs ever outside the Barrier, far inside the West Bank. As stated before, the Israeli government (as of 2015) has a program of residential subsidies in which Israeli settlers receive about double that given to Israelis in Tel Aviv and Jerusalem. As well, settlers in isolated areas receive three times the Israeli national average. From the beginning of 2009 to the end of 2013, the Israeli settlement population as a whole increased by a rate of over 4% per year. A New York Times article in 2015 stated that said building had been "at the heart of mounting European criticism of Israel." Resolution 2334 and quarterly reports United Nations Security Council Resolution 2334 "Requests the Secretary-General to report to the Council every three months on the implementation of the provisions of the present resolution;" In the first of these reports, delivered verbally at a security council meeting on 24 March 2017, United Nations Special Coordinator for the Middle East Peace Process, Nickolay Mladenov, noted that Resolution 2334 called on Israel to take steps to cease all settlement activity in the Occupied Palestinian Territory, that "no such steps have been taken during the reporting period" and that instead, there had been a marked increase in statements, announcements and decisions related to construction and expansion. Regularization and outpost method The 2017 Settlement Regularization in "Judea and Samaria" Law permits backdated legalization of outposts constructed on private Palestinian land. Following a petition challenging its legality, on June 9, 2020, Israel's Supreme Court struck down the law that had retroactively legalized about 4,000 settler homes built on privately owned Palestinian land. The Israeli Attorney General has stated that existing laws already allow legalization of Israeli constructions on private Palestinian land in the West Bank. The Israeli Attorney General, Avichai Mandelblit, has updated the High Court on his official approval of the use of a legal tactic permitting the de facto legalization of roughly 2,000 illegally built Israeli homes throughout the West Bank. The legal mechanism is known as "market regulation" and relies on the notion that wildcat Israeli homes built on private Palestinian land were done so in good faith. In a report of 22 July 2019, PeaceNow notes that after a gap of 6 years when there were no new outposts, establishment of new outposts recommenced in 2012, with 32 of the current 126 outposts set up to date. 2 outposts were subject to eviction, 15 were legalized and at least 35 are in process of legalization. Updates and related matters The Israeli government announced in 2019 that it has made monetary grants available for the construction of hotels in Area C of the West Bank. According to Peace Now approvals for building in Israeli settlements in East Jerusalem has expanded by 60% since Trump became US president in 2017. On 9 July 2021, Michael Lynk, U.N. special rapporteur on human rights in the occupied Palestinian territory, addressing a session of the UN Human Rights Council in Geneva, said "I conclude that the Israeli settlements do amount to a war crime," and "I submit to you that this finding compels the international community...to make it clear to Israel that its illegal occupation, and its defiance of international law and international opinion, can and will no longer be cost-free." Israel, which does not recognize Lynk's mandate, boycotted the session. A new Israeli government, formed on 13 June, 2021, declared a “status quo” in the settlements policy. According to Peace Now, as of 28 October this has not been the case. On October 24, 2021, tenders were published for 1,355 housing units plus another 83 in Givat HaMatos and on 27 October, 2021, approval was given for 3,000 housing units including in settlements deep inside the West Bank. These developments were condemned by the U.S. as well as by the United Kingdom, Russia and 12 European countries. while UN experts, Michael Lynk, Special Rapporteur on the situation of human rights in the Palestinian Territory occupied since 1967 and Mr. Balakrishnan Rajagopal (United States of America), UN Special Rapporteur on adequate housing said that settlement expansion should be treated as a "presumptive war crime". See also Israeli settlement timeline Jewish land purchase in Palestine List of Israeli settlements Neo-Zionism Palestinian Land Law Population statistics for Israeli West Bank settlements Proposed Israeli annexation of the West Bank State of Judea Development town Unrecognized Bedouin villages in Israel Kibbutz Notes References Further reading Israeli Settlements interactive map and Israeli land use from The Guardian Israeli Settlements. Bloomberg News Israeli settlements: Where, when, and why they're built, Ilene R. Prusher, Christian Science Monitor, 15 September 2009 Text of the Fourth 1949 Geneva Convention from icrc.org The legal status of Israeli settlements under IHL (International Humanitarian Law), Reuters ReliefWeb, 31 January 2004 The Humanitarian Impact on Palestinians of Israeli Settlements and Other Infrastructure in the West Bank from UN OCHA, Palestinian territories Israeli Communities in Yesha & Jordan Valley The Illegal Settlements—slideshow by The First Post Viewpoints and commentary Monitoring Israeli Colonization Activities in the Palestinian Territory, The Applied Research Institute Jerusalem Land Expropriation and Settlements from B'tselem Israel and The Palestinian Territories, The Carter Center Israeli Confiscation and Settlement on Palestinian Land from If Americans Knew Settlements and Settlements and U.S. Policy, Americans for Peace Now Bregman, Ahron, Elusive Peace: How the Holy Land Defeated America "The Wye River Memorandum and Israeli Settlements", Geoffrey Aronson, The Jerusalem Fund, 4 August 1999 For Israel, Land or Peace Jimmy Carter, The Carter Center, 26 November 2000 Backgrounder: Jewish settlements and the Media from the Committee for Accuracy in Middle East Reporting in America, 5 October 2001 From "occupied territories" to "disputed territories", Dore Gold, Jerusalem Center for Public Affairs, 16 January 2002 Ottoman Land Registration Law as a Contributing Factor in the Israeli-Arab Conflict by Rabbi Jon-Jay Tilsen, 2003 Diplomatic and Legal Aspects of the Settlement Issue from the Jerusalem Center for Public Affairs, 19 January 2003 Occupation and Settlement: The Myth and Reality, David Meir-Levi, Think-Israel.org, 24 June 2005 "At Israeli Outpost, Showdown Looms for Settlers, Government" Gershom Gorenberg, Jewish Daily Forward, 27 January 2006 Settlements 'violate Israeli law', BBC News, 21 November 2006 Backgrounder: The debate about settlements from the Committee for Accuracy in Middle East Reporting in America, 13 June 2007 "Israel's Settlers Are Here to Stay" op-ed by Dani Dayan in The New York Times 25 July 2012 External links 2019 amnesty 2019 Think Twice: Can companies do business with Israeli settlements in the Occupied Palestinian Territories while respecting human rights? UNSC 2334 quarterly reports 1967 establishments in Israel Populated places established in 1967 Israeli-occupied territories
[ 0.4168449640274048, 0.2926706373691559, -0.23037821054458618, -0.6002073287963867, 0.2673637866973877, 0.6992974877357483, -0.3616522252559662, 0.2980300784111023, 0.026633864268660545, -0.8049765229225159, -0.9994181394577026, -0.6021033525466919, -0.21117053925991058, 0.5353383421897888,...
15125
https://en.wikipedia.org/wiki/Irrealism%20%28the%20arts%29
Irrealism (the arts)
Irrealism is a term that has been used by various writers in the fields of philosophy, literature, and art to denote specific modes of unreality and/or the problems in concretely defining reality. While in philosophy the term specifically refers to a position put forward by the American philosopher Nelson Goodman, in literature and art it refers to a variety of writers and movements. If the term has nonetheless retained a certain consistency in its use across these fields and would-be movements, it perhaps reflects the word’s position in general English usage: though the standard dictionary definition of irreal gives it the same meaning as unreal, irreal is very rarely used in comparison with unreal. Thus, it has generally been used to describe something which, while unreal, is so in a very specific or unusual fashion, usually one emphasizing not just the "not real," but some form of estrangement from our generally accepted sense of reality. Irrealism in literature In literature, the term irrealism was first used extensively in the United States in the 1970s to describe the post-realist "new fiction" of writers such as Donald Barthelme or John Barth. More generally, it described the notion that all forms of writing could only "offer particular versions of reality rather than actual descriptions of it," and that a story need not offer a clear resolution at its end. John Gardner, in The Art of Fiction, cites in this context the work of Barthelme and its "seemingly limitless ability to manipulate [literary] techniques as modes of apprehension [which] apprehend nothing." Though Barth, in a 1974 interview, stated, "irrealism—not antirealism or unrealism, but irrealism—is all that I would confidently predict is likely to characterize the prose fiction of the 1970s," this did not prove to be the case. Instead writing in the United States quickly returned to its realist orthodoxy and the term irrealism fell into disuse. In recent years, however, the term has been revived in an attempt to describe and categorize, in literary and philosophical terms, how it is that the work of an irrealist writer differs from the work of writers in other, non-realistic genres (e.g., the fantasy of J.R.R. Tolkien, the magical realism of Gabriel García Márquez) and what the significance of this difference is. This can be seen in Dean Swinford's essay Defining irrealism: scientific development and allegorical possibility. Approaching the issue from a structuralist and narratological point of view, he has defined irrealism as a "peculiar mode of postmodern allegory" that has resulted from modernity’s fragmentation and dismantling of the well-ordered and coherent medieval system of symbol and allegory. Thus a lion, when presented in a given context in medieval literature, could only be interpreted in a single, approved way. Contemporary literary theory, however, denies the attribution of such fixed meanings. According to Swinford, this change can be attributed in part to the fact that "science and technical culture have changed perceptions of the natural world, have significantly changed the natural world itself, thereby altering the vocabulary of symbols applicable to epistemological and allegorical attempts to understand it." Thus irreal works such as Italo Calvino's Cosmicomics and Jorge Luis Borges' Ficciones can be seen as an attempt to find a new allegorical language to explain our changed perceptions of the world that have been brought about by our scientific and technical culture, especially concepts such as quantum physics or the theory of relativity. "The Irrealist work, then, operates within a given system," writes Swinford, "and attests to its plausibility, despite the fact that this system, and the world it represents, is often a mutation, an aberration." The online journal The Cafe Irreal , on the other hand, has defined irrealism as being a type of existentialist literature in which the means are continually and absurdly rebelling against the ends that we have determined for them. An example of this would be Franz Kafka's story The Metamorphosis, in which the salesman Gregor Samsa's plans for supporting his family and rising up in rank by hard work and determination are suddenly thrown topsy-turvy by his sudden and inexplicable transformation into a man-sized insect. Such fiction is said to emphasize the fact that human consciousness, being finite in nature, can never make complete sense of, or successfully order, a universe that is infinite in its aspects and possibilities. Which is to say: as much as we might try to order our world with a certain set of norms and goals (which we consider our real world), the paradox of a finite consciousness in an infinite universe creates a zone of irreality ("that which is beyond the real") that offsets, opposes, or threatens the real world of the human subject. Irrealist writing often highlights this irreality, and our strange fascination with it, by combining the unease we feel because the real world doesn't conform to our desires with the narrative quality of the dream state (where reality is constantly and inexplicably being undermined); it is thus said to communicate directly, "by feeling rather than articulation, the uncertainties inherent in human existence or, to put it another way... the irreconcilability between human aspiration and human reality." If the irreal story can be considered an allegory, then, it would be an allegory that is "so many pointers to an unknown meaning," in which the meaning is felt more than it is articulated or systematically analyzed. Irrealism in art Various writers have addressed the question of Irrealism in Art. Many salient observations on Irrealism in Art are found in Nelson Goodman's Languages of Art. Goodman himself produced some multimedia shows, one of which inspired by hockey and is entitled Hockey Seen: A Nightmare in Three Periods and Sudden Death. Garret Rowlan, writing in The Cafe Irreal, writes that the malaise present in the work of the Italian artist Giorgio de Chirico, "which recalls Kafka, has to do with the sense of another world lurking, hovering like the long shadows that dominate de Chirico's paintings, which frequently depict a landscape at twilight's uncertain hour. Malaise and mystery are all by-products of the interaction of the real and the unreal, the rub and contact of two worlds caught on irrealism's shimmering surface." The writer Dean Swinford, whose concept of irrealism was described at length in the section "Irrealism in Literature", wrote that the artist Remedios Varos, in her painting The Juggler, "creates a personal allegorical system which relies on the predetermined symbols of Christian and classical iconography. But these are quickly refigured into a personal system informed by the scientific and organized like a machine...in the Irreal work, allegory operates according to an altered, but constant and orderly iconographic system." Artist Tristan Tondino claims "There is no specific style to Irrealist Art. It is the result of awareness that every human act is the result of the limitations of the world of the actor." In Australia, the art journal the art life has recently detected the presence of a "New Irrealism" among the painters of that country, which is described as being an "approach to painting that is decidedly low key, deploying its effects without histrionic showmanship, while creating an eerie other world of ghostly images and abstract washes." What exactly constituted the "old" irrealism, they do not say. Irrealist Art, Film and Music Edition Irrealist Art Edition is a publishing company created in the 90s by contemporary plastic artist Frédéric Iriarte. Together with the Estonian poet, writer and art critic Ilmar Laaban, they developed their concept of Irrealism through several essays, exhibitions, projects, manifest and a book, "Irréalisation". Irrealist Art Edition Irrealism in music Some hardcore bands in Italy have claimed to be irrealist. See also Franz Kafka Nikolai Gogol René Magritte Kōbō Abe Giorgio de Chirico Magnus Mills Jorge Luis Borges Donald Barthelme John Barth Remedios Varo Frédéric Iriarte D. Harlan Wilson Max Blecher Footnotes References Swinford, Dean, “Defining Irrealism: Scientific Development and Allegorical Possibility,” Journal of the Fantastic in the Arts, 12.1 (2001): 77-89. Evans, G.S. and Alice Whittenburg, "After Kafka: Kafka Criticism and Scholarship as a Resource in an Attempt to Promulgate a New Literary Genre," Journal of the Kafka Society of America, 31/32(1+2): 18-26. Critical theory Realism (art movement) Art movements Literary movements Philosophical movements
[ 0.6621411442756653, 0.21040262281894684, -0.21719330549240112, 0.2603698670864105, -0.4396587908267975, 0.17807094752788544, 0.5448440909385681, 0.4491073787212372, -0.010986851528286934, -0.4452088475227356, -0.5171343088150024, 0.7043687701225281, -0.3605792224407196, 0.4605708420276642,...
15129
https://en.wikipedia.org/wiki/You%20have%20two%20cows
You have two cows
"You have two cows" is a form of political satire on various political, economic, etc. systems. The setup of a typical joke of this kind is the assumption that the listener lives within a given system and has two cows. The punch line is what happens to the listener and the cows in this system. History An article in The Modern Language Journal lists the following classical ones: Socialism: You have two cows. You give one to your neighbor. Communism: You have two cows. You give them to the government, and the government then gives you some milk. Fascism: You have two cows. You keep the cows and give the milk to the government. The government then sells you milk. Capitalism: You have two cows. You sell one and buy a bull. Nazism: You have two cows. The government takes both and shoots you. Bill Sherk mentions that such lists circulated throughout the United States since around 1936 under the title "Parable of the Isms". A column in The Chicago Daily Tribune in 1938 attributes a version involving socialism, communism, fascism and New Dealism to an address by Silas Strawn to the Economic Club of Chicago on 29 November 1935. Notable usages Jokes of this genre formed the base of a monologue by American comedian Pat Paulsen on The Smothers Brothers Comedy Hour in the late 1960s. Satirising the satire, he appended this comment to capitalism: "...Then put both of them in your wife's name and declare bankruptcy." This material was later used as an element of his satirical US presidential campaign in 1968, and was included on his 1968 comedy album Pat Paulsen for President. Richard M Steers and Luciara Nardon in their book about global economy use the "two cows" metaphor to illustrate the concept of cultural differences. They write that jokes of the kind: Russian company: You have two cows. You drink some vodka and count them again. You have five cows. The Russian Mafia shows up and takes however many cows you have. – are considered funny because they are "realistic but exaggerated caricatures" of various cultures, and the pervasiveness of such jokes stems from the significant cultural differences. Steers and Nardon also state that others believe such jokes present cultural stereotypes and must be viewed with caution. See also Spherical cow Notes References Fictional cattle Political satire Joke cycles Metaphors referring to cattle Political metaphors Economic policy 1940s neologisms
[ 0.5781294703483582, 0.3776872456073761, -0.6443926095962524, 0.04390328750014305, -0.5664334893226624, 0.09028473496437073, 0.13893760740756989, 0.8556525707244873, -0.5139643549919128, -0.16864052414894104, -0.09719840437173843, 0.5409867763519287, -0.19788144528865814, 0.3731964826583862...
15134
https://en.wikipedia.org/wiki/Lightbulb%20joke
Lightbulb joke
A lightbulb joke is a joke cycle that asks how many people of a certain group are needed to change, replace, or screw in a light bulb. Generally, the punch line answer highlights a stereotype of the target group. There are numerous versions of the lightbulb joke satirizing a wide range of cultures, beliefs and occupations. Early versions of the joke, popular in the late 1960s and the 1970s, were used to insult the intelligence of people, especially Poles ("Polish jokes"). For instance: Although lightbulb jokes tend to be derogatory in tone (e.g., "How many drummers..." / "Four: one to hold the light bulb and three to drink until the room spins"), the people targeted by them may take pride in the stereotypes expressed and are often themselves the jokes' originators, as in "How many Germans does it take to change a lightbulb? One, we're very efficient but not funny." where the joke itself becomes a statement of ethnic pride. Lightbulb jokes applied to subgroups can be used to ease tensions between them. Variations Some versions of the joke are puns on the words "change" or "screw", or "light": Lightbulb jokes may be responses to current events, particularly those related to energy and political power. For example, the lightbulb may not need to be changed at all due to ongoing power outages. The Village Voice held a $200 lightbulb joke contest around the time of the Iran hostage crisis, with the winning joke being: Lightbulb jokes can also be about sports, teasing about their teams past, future, etc. References Notes Alan Dundes (1981). "Many Hands Make Light Work or Caught in the Act of Screwing in Light Bulbs". In Incandescent light bulbs Joke cycles
[ 0.6248400807380676, 0.24352818727493286, -0.2642403542995453, -0.044132448732852936, -0.14888380467891693, 0.2215595245361328, 0.22046859562397003, 0.07457143813371658, -0.1687641739845276, -0.16834071278572083, -0.26903942227363586, 0.04932914674282074, -0.6622524261474609, 0.268691211938...
15144
https://en.wikipedia.org/wiki/International%20Electrotechnical%20Commission
International Electrotechnical Commission
The International Electrotechnical Commission (IEC; in French: Commission électrotechnique internationale) is an international standards organization that prepares and publishes international standards for all electrical, electronic and related technologies – collectively known as "electrotechnology". IEC standards cover a vast range of technologies from power generation, transmission and distribution to home appliances and office equipment, semiconductors, fibre optics, batteries, solar energy, nanotechnology and marine energy as well as many others. The IEC also manages four global conformity assessment systems that certify whether equipment, system or components conform to its international standards. All electrotechnologies are covered by IEC Standards, including energy production and distribution, electronics, magnetics and electromagnetics, electroacoustics, multimedia, telecommunication and medical technology, as well as associated general disciplines such as terminology and symbols, electromagnetic compatibility, measurement and performance, dependability, design and development, safety and the environment. History The first International Electrical Congress took place in 1881 at the International Exposition of Electricity, held in Paris. At that time the International System of Electrical and Magnetic Units was agreed to. The International Electrotechnical Commission held its inaugural meeting on 26 June 1906, following discussions among the British Institution of Electrical Engineers, the American Institute of Electrical Engineers, and others, which began at the 1900 Paris International Electrical Congress,, with British engineer R. E. B. Crompton playing a key role. In 1906, Lord Kelvin was elected as the first President of the International Electrotechnical Commission. The IEC was instrumental in developing and distributing standards for units of measurement, particularly the gauss, hertz, and weber. It also first proposed a system of standards, the Giorgi System, which ultimately became the SI, or Système International d'unités (in English, the International System of Units). In 1938, it published a multilingual international vocabulary to unify terminology relating to electrical, electronic and related technologies. This effort continues, and the International Electrotechnical Vocabulary is published online as the Electropedia. The CISPR (Comité International Spécial des Perturbations Radioélectriques) – in English, the International Special Committee on Radio Interference – is one of the groups founded by the IEC. Currently, 88 countries are IEC members while another 84 participate in the Affiliate Country Programme, which is not a form of membership but is designed to help industrializing countries get involved with the IEC. Originally located in London, the Commission moved to its current headquarters in Geneva in 1948. It has regional centres in Africa (Nairobi, Kenya), Asia-Pacific (Singapore), Latin America (São Paulo, Brazil) and North America (Boston, United States). The work is done by some 10,000 electrical and electronics experts from industry, government, academia, test labs and others with an interest in the subject. IEC standards are often adopted as national standards by its members. IEC standards The IEC cooperates closely with the International Organization for Standardization (ISO) and the International Telecommunication Union (ITU). In addition, it works with several major standards development organizations, including the IEEE with which it signed a cooperation agreement in 2002, which was amended in 2008 to include joint development work. IEC standards that are not jointly developed with ISO have numbers in the range 60000–79999 and their titles take a form such as IEC 60417: Graphical symbols for use on equipment. Following the Dresden Agreement with CENELEC the numbers of older IEC standards were converted in 1997 by adding 60000, for example IEC 27 became IEC 60027. Standards of the 60000 series are also found preceded by EN to indicate that the IEC standard is also adopted by CENELEC as a European standard; for example IEC 60034 is also available as EN 60034. Standards developed jointly with ISO, such as ISO/IEC 26300 (Open Document Format for Office Applications (OpenDocument) v1.0), ISO/IEC 27001 (Information technology, Security techniques, Information security management systems, Requirements), and ISO/IEC 17000 series, carry the acronym of both organizations. The use of the ISO/IEC prefix covers publications from ISO/IEC Joint Technical Committee 1 – Information Technology, as well as conformity assessment standards developed by ISO CASCO (Committee on conformity assessment) and IEC CAB (Conformity Assessment Board). Other standards developed in cooperation between IEC and ISO are assigned numbers in the 80000 series, such as IEC 82045–1. IEC standards are also being adopted by other certifying bodies such as BSI (United Kingdom), CSA (Canada), UL & ANSI/INCITS (United States), SABS (South Africa), Standards Australia, SPC/GB (China) and DIN (Germany). IEC standards adopted by other certifying bodies may have some noted differences from the original IEC standard. Membership and participation The IEC is made up of members, called national committees, and each NC represents its nation's electrotechnical interests in the IEC. This includes manufacturers, providers, distributors and vendors, consumers and users, all levels of governmental agencies, professional societies and trade associations as well as standards developers from national standards bodies. National committees are constituted in different ways. Some NCs are public sector only, some are a combination of public and private sector, and some are private sector only. About 90% of those who prepare IEC standards work in industry. IEC Member countries include: Full members Algeria Argentina Australia Austria Belarus Belgium Brazil Bulgaria Canada Colombia Chile China Croatia Czech Republic Denmark Egypt Finland France Germany Greece Hungary India Indonesia Iran Iraq Ireland Israel Italy Japan Kuwait Libya Luxembourg Malaysia Mexico Netherlands New Zealand Nigeria Norway Oman Pakistan Perú Philippines Poland Portugal Qatar Romania Russia Saudi Arabia Serbia Singapore Slovakia Slovenia South Korea South Africa Spain Sweden Switzerland Thailand Turkey Ukraine United Arab Emirates United Kingdom United States Associate members (limited voting and managerial rights) Albania Bahrain Bangladesh Bosnia & Herzegovina Cuba Cyprus Democratic People's Republic of Korea Estonia Ethiopia Georgia Ghana Iceland Jordan Kazakhstan Kenya Latvia Lithuania North Macedonia Malta Moldova Montenegro Morocco Sri Lanka Tunisia Vietnam Uganda Affiliates In 2001 and in response to calls from the WTO to open itself to more developing nations, the IEC launched the Affiliate Country Programme to encourage developing nations to become involved in the Commission's work or to use its International Standards. Countries signing a pledge to participate in the work and to encourage the use of IEC Standards in national standards and regulations are granted access to a limited number of technical committee documents for the purposes of commenting. In addition, they can select a limited number of IEC Standards for their national standards' library. Countries participating in the Affiliate Country Programme are: Afghanistan Angola Antigua and Barbuda Armenia Azerbaijan Barbados Belize Benin Bhutan Bolivia Botswana Brunei Burkina Faso Burundi Cabo Verde Cambodia Cameroon Central African Republic Chad Comoros Congo (Rep. of) Congo (Democratic Rep. of) Costa Rica Côte d'Ivoire Dominica Dominican Republic Ecuador El Salvador Eritrea Eswatini Fiji Gabon Grenada Guatemala Guinea Guinea Bissau Guyana Haiti Honduras Jamaica Kyrgyzstan Laos Lebanon Lesotho Madagascar Malawi Mali Mauritania Mauritius Mongolia Mozambique Myanmar Namibia Nepal Niger Palestine Panama Papua New Guinea Paraguay Rwanda Saint Lucia Saint Vincent and the Grenadines Sao Tome and Principe Senegal Seychelles Sierra Leone South Sudan Sudan Suriname Syrian Arab Republic Tanzania The Gambia Togo Trinidad and Tobago Turkmenistan Uruguay Uzbekistan Venezuela Yemen Zambia Zimbabwe Technical information Graphical Symbols Hydraulic Turbines Switchgear Dependability Power Systems Management Fibre Optics Audio, video and multimedia systems and equipment Standards and tools published in database format International Electrotechnical Vocabulary IEC Glossary IEC 60061: Lamp caps, lampholders and gauges IEC 60417 Graphical Symbols for Use on Equipment IEC 60617: Graphical Symbols for Diagrams See also International Organization for Standardization International Telecommunication Union World Standards Cooperation List of IEC standards List of IEC Technical Committees References External links IEC Webstore IEC Electropedia – Free online multilingual dictionary of 20 000 electrical and electronic terms IEC System of Conformity Assessment for Electrotechnical Equipment and Components IEC System for quality assessment of electronic components and associated materials and processes IEC Scheme for certification to standards for electrical equipment for explosive atmospheres IEC System for Certification to Standards Relating to Equipment for Use in Renewable Energy Applications List of IEC Technical Committees on IEC Official Website All IEC standards available in English and Russian (translation) languages, Standards of International Electrotechnical Electrical engineering organizations Organisations based in Geneva International organisations based in Switzerland
[ 1.1776959896087646, 0.3814985454082489, 0.10160072892904282, 0.5490947961807251, -0.06919396668672562, -0.5546082258224487, -0.6141020059585571, 0.15386897325515747, -0.10764393210411072, -0.05697065591812134, -0.4891640841960907, 0.5953459143638611, -0.19418999552726746, 0.081622302532196...
15145
https://en.wikipedia.org/wiki/ISO%209660
ISO 9660
ISO 9660 (also known as ECMA-119) is a file system for optical disc media. Being sold by the International Organization for Standardization (ISO) the file system is considered an international technical standard. Since the specification is available for anybody to purchase, implementations have been written for many operating systems. ISO 9660 traces its roots to the High Sierra Format, which arranged file information in a dense, sequential layout to minimize nonsequential access by using a hierarchical (eight levels of directories deep) tree file system arrangement, similar to UNIX and FAT. To facilitate cross platform compatibility, it defined a minimal set of common file attributes (directory or ordinary file and time of recording) and name attributes (name, extension, and version), and used a separate system use area where future optional extensions for each file may be specified. High Sierra was adopted in December 1986 (with changes) as an international standard by Ecma International as ECMA-119 and submitted for fast tracking to the ISO, where it was eventually accepted as ISO 9660:1988. Subsequent amendments to the standard were published in 2013 and 2020. The first 16 sectors of the file system are empty and reserved for other uses. The rest begins with a volume descriptor set (a header block which describes the subsequent layout) and then the path tables, directories and files on the disc. An ISO 9660 compliant disc must contain at least one primary volume descriptor describing the file system and a volume descriptor set terminator which is a volume descriptor that marks the end of the descriptor set. The primary volume descriptor provides information about the volume, characteristics and metadata, including a root directory record that indicates in which sector the root directory is located. Other fields contain metadata such as the volume's name and creator, along with the size and number of logical blocks used by the file system. Path tables summarize the directory structure of the relevant directory hierarchy. For each directory in the image, the path table provides the directory identifier, the location of the extent in which the directory is recorded, the length of any extended attributes associated with the directory, and the index of its parent directory path table entry. There are several extensions to ISO 9660 that relax some of its limitations. Notable examples include Rock Ridge (Unix-style permissions and longer names), Joliet (Unicode, allowing non-Latin scripts to be used), El Torito (enables CDs to be bootable) and the Apple ISO 9660 Extensions (macOS-specific file characteristics such as resource forks, file backup date and more). History Compact discs were originally developed for recording musical data, but soon were used for storing additional digital data types because they were equally effective for archival mass data storage. Called CD-ROMs, the lowest level format for these type of compact discs was defined in the Yellow Book specification in 1983. However, this book did not define any format for organizing data on CD-ROMs into logical units such as files, which led to every CD-ROM maker creating their own format. In order to develop a CD-ROM file system standard (Z39.60 - Volume and File Structure of CDROM for Information Interchange), the National Information Standards Organization (NISO) set up Standards Committee SC EE (Compact Disc Data Format) in July 1985. In September/ October 1985 several companies invited experts to participate in the development of a working paper for such a standard. In November 1985, representatives of computer hardware manufacturers gathered at the High Sierra Hotel and Casino (currently called the Hard Rock Hotel and Casino) near Lake Tahoe, California. This group became known as the High Sierra Group (HSG). Present at the meeting were representatives from Apple Computer, AT&T, Digital Equipment Corporation (DEC), Hitachi, LaserData, Microware, Microsoft, 3M, Philips, Reference Technology Inc., Sony Corporation, TMS Inc., VideoTools (later Meridian), Xebec, and Yelick. The meeting report evolved from the Yellow Book CD-ROM standard, which was so open ended it was leading to diversification and creation of many incompatible data storage methods. The High Sierra Group Proposal (HSGP) was released in May 1986, defining a file system for CD-ROMs commonly known as the High Sierra Format. A draft version of this proposal was submitted to the European Computer Manufacturers Association (ECMA) for standardization. With some changes, this led to the issue of the initial edition of the ECMA-119 standard in December 1986. The ECMA submitted their standard to the International Standards Organization (ISO) for fast tracking, where it was further refined into the ISO 9660 standard. For compatibility the second edition of ECMA-119 was revised to be equivalent to ISO 9660 in December 1987. ISO 9660:1988 was published in 1988. The main changes from the High Sierra Format in the ECMA-119 and ISO 9660 standards were international extensions to allow the format to work better on non-US markets. In order not to create incompatibilities, NISO suspended further work on Z39.60, which had been adopted by NISO members on 28 May 1987. It was withdrawn before final approval, in favour of ISO 9660. In 2013, ISO published Amendment 1 to the ISO 9660 standard, introducing new data structures and relaxed file name rules intended to "bring harmonization between ISO 9660 and widely used 'Joliet Specification'." In December 2017, a 3rd Edition of ECMA-119 was published that is technically identical with ISO 9660, Amendment 1. In 2020, ISO published Amendment 2, which adds some minor clarifying matter, but does not add or correct any technical information of the standard. Specifications The following is the rough overall structure of the ISO 9660 file system. Multi-byte values can be stored in three different formats: little-endian, big-endian, and in a concatenation of both types in what the specification calls "both-byte" order. Both-byte order is required in several fields in the volume descriptors and directory records, while path tables can be either little-endian or big-endian. Top level The system area, the first 32,768 data bytes of the disc (16 sectors of 2,048 bytes each), is unused by ISO 9660 and therefore available for other uses. While it is suggested that they are reserved for use by bootable media, a CD-ROM may contain an alternative file system descriptor in this area, and it is often used by hybrid CDs to offer classic Mac OS-specific and macOS-specific content. Volume descriptor set The data area begins with the volume descriptor set, a set of one or more volume descriptors terminated with a volume descriptor set terminator. These collectively act as a header for the data area, describing its content (similar to the BIOS parameter block used by FAT, HPFS and NTFS formatted disks). Each volume descriptor is 2048 bytes in size, fitting perfectly into a single Mode 1 or Mode 2 Form 1 sector. They have the following structure: The data field of a volume descriptor may be subdivided into several fields, with the exact content depending on the type. Redundant copies of each volume descriptor can also be included in case the first copy of the descriptor becomes corrupt. Standard volume descriptor types are the following: An ISO 9660 compliant disc must contain at least one primary volume descriptor describing the file system and a volume descriptor set terminator for indicating the end of the descriptor sequence. The volume descriptor set terminator is simply a particular type of volume descriptor with the purpose of marking the end of this set of structures. The primary volume descriptor provides information about the volume, characteristics and metadata, including a root directory record that indicates in which sector the root directory is located. Other fields contain the description or name of the volume, and information about who created it and with which application. The size of the logical blocks which the file system uses to segment the volume is also stored in a field inside the primary volume descriptor, as well as the amount of space occupied by the volume (measured in number of logical blocks). In addition to the primary volume descriptor(s), supplementary volume descriptors or enhanced volume descriptors may be present. Supplementary volume descriptors describe the same volume as the primary volume descriptor does, and are normally used for providing additional code page support when the standard code tables are insufficient. The standard specifies that ISO 2022 is used for managing code sets that are wider than 8 bytes, and that ISO 2375 escape sequences are used to identify each particular code page used. Consequently, ISO 9660 supports international single-byte and multi-byte character sets, provided they fit into the framework of the referenced standards. However, ISO 9660 does not specify any code pages that are guaranteed to be supported: all use of code tables other than those defined in the standard itself are subject to agreement between the originator and the recipient of the volume. Enhanced volume descriptors were introduced in ISO 9660, Amendment 1. They relax some of the requirements of the other volume descriptors and the directory records referenced by them: for example, the directory depth can exceed eight, file identifiers need not contain '.' or file version number, the length of a file and directory identifier is maximized to 207. Path tables Path tables summarize the directory structure of the relevant directory hierarchy. For each directory in the image, the path table provides the directory identifier, the location of the extent in which the directory is recorded, the length of any extended attributes associated with the directory, and the index of its parent directory path table entry. The parent directory number is a 16-bit number, limiting its range from 1 to 65,535. Directories and files Directory entries are stored following the location of the root directory entry, where evaluation of filenames is begun. Both directories and files are stored as extents, which are sequential series of sectors. Files and directories are differentiated only by a file attribute that indicates its nature (similar to Unix). The attributes of a file are stored in the directory entry that describes the file, and optionally in the extended attribute record. To locate a file, the directory names in the file's path can be checked sequentially, going to the location of each directory to obtain the location of the subsequent subdirectory. However, a file can also be located through the path table provided by the file system. This path table stores information about each directory, its parent, and its location on disc. Since the path table is stored in a contiguous region, it can be searched much faster than jumping to the particular locations of each directory in the file's path, thus reducing seek time. The standard specifies three nested levels of interchange (paraphrased from section 10): Level 1: File names are limited to eight characters with a three-character extension. Directory names are limited to eight characters. Files may contain one single file section. Level 2: Files may contain one single file section. Level 3: No additional restrictions than those stipulated in the main body of the standard. That is, directory identifiers may not exceed 31 characters in length, and file name + '.' + file name extension may not exceed 30 characters in length (sections 7.5 and 7.6). Files are also allowed to consist of multiple non-contiguous sections (with some restrictions as to order). Additional restrictions in the body of the standard: The depth of the directory hierarchy must not exceed 8 (root directory being at level 1), and the path length of any file must not exceed 255. (section 6.8.2.1). The standard also specifies the following name restrictions (sections 7.5 and 7.6): All levels restrict file names in the mandatory file hierarchy to upper case letters, digits, underscores ("_"), and a dot. (See also section 7.4.4 and Annex A.) If no characters are specified for the File Name then the File Name Extension shall consist of at least one character. If no characters are specified for the File Name Extension then the File Name shall consist of at least one character. File names shall not have more than one dot. Directory names shall not use dots at all. A CD-ROM producer may choose one of the lower Levels of Interchange specified in chapter 10 of the standard, and further restrict file name length from 30 characters to only 8+3 in file identifiers, and 8 in directory identifiers in order to promote interchangeability with implementations that do not implement the full standard. All numbers in ISO 9660 file systems except the single byte value used for the GMT offset are unsigned numbers. As the length of a file's extent on disc is stored in a 32 bit value, it allows for a maximum length of just over 4.2 GB (more precisely, one byte less than 4 GiB). It is possible to circumvent this limitation by using the multi-extent (fragmentation) feature of ISO 9660 Level 3 to create ISO 9660 file systems and single files up to 8 TB. With this, files larger than 4 GiB can be split up into multiple extents (sequential series of sectors), each not exceeding the 4 GiB limit. For example, the free software such as InfraRecorder, ImgBurn and mkisofs as well as Roxio Toast are able to create ISO 9660 file systems that use multi-extent files to store files larger than 4 GiB on appropriate media such as recordable DVDs. Linux supports multiple extents. Extensions and improvements There are several extensions to ISO 9660 that relax some of its limitations. Notable examples include Rock Ridge (Unix-style permissions and longer names), Joliet (Unicode, allowing non-Latin scripts to be used), El Torito (enables CDs to be bootable) and the Apple ISO 9660 Extensions (macOS-specific file characteristics such as resource forks, file backup date and more). SUSP System Use Sharing Protocol (SUSP, IEEE P1281) provides a generic way of including additional properties for any directory entry reachable from the primary volume descriptor (PVD). In an ISO 9660 volume, every directory entry has an optional system use area whose contents are undefined and left to be interpreted by the system. SUSP defines a method to subdivide that area into multiple system use fields, each identified by a two-character signature tag. The idea behind SUSP was that it would enable any number of independent extensions to ISO 9660 to be created and included on a volume without conflicting. It also allows for the inclusion of property data that would otherwise be too large to fit within the limits of the system use area. SUSP defines several common tags and system use fields: CE: Continuation area PD: Padding field SP: System use sharing protocol indicator ST: System use sharing protocol terminator ER: Extensions reference ES: Extension selector Other known SUSP fields include: AA: Apple extension, preferred BA: Apple extension, old (length attribute is missing) AS: Amiga file properties ZF: zisofs compressed file, usually produced by program mkzftree or by libisofs. Transparently decompressed by Linux kernel if built with CONFIG_ZISOFS. AL: records Extended File Attributes, including ACLs. Proposed by libburnia, supported by libisofs. The Apple extensions do not technically follow the SUSP standard; however the basic structure of the AA and AB fields defined by Apple are forward compatible with SUSP; so that, with care, a volume can use both Apple extensions as well as RRIP extensions. Rock Ridge The Rock Ridge Interchange Protocol (RRIP, IEEE P1282) is an extension which adds POSIX file system semantics. The availability of these extension properties allows for better integration with Unix and Unix-like operating systems. The standard takes its name from the fictional town Rock Ridge in Mel Brooks' film Blazing Saddles. The RRIP extensions are, briefly: Longer file names (up to 255 bytes) and fewer restrictions on allowed characters (support for lowercase, etc.) UNIX-style file modes, user ids and group ids, and file timestamps Support for Symbolic links and device files Deeper directory hierarchy (more than 8 levels) Efficient storage of sparse files The RRIP extensions are built upon SUSP, defining additional tags for support of POSIX semantics, along with the format and meaning of the corresponding system use fields: RR: Rock Ridge extensions in-use indicator (note: dropped from standard after version 1.09) PX: POSIX file attributes PN: POSIX device numbers SL: symbolic link NM: alternate name CL: child link PL: parent link RE: relocated directory TF: time stamp SF: sparse file data Amiga Rock Ridge is similar to RRIP, except it provides additional properties used by AmigaOS. It too is built on the SUSP standard by defining an "AS"-tagged system use field. Thus both Amiga Rock Ridge and the POSIX RRIP may be used simultaneously on the same volume. Some of the specific properties supported by this extension are the additional Amiga-bits for files. There is support for attribute "P" that stands for "pure" bit (indicating re-entrant command) and attribute "S" for script bit (indicating batch file). This includes the protection flags plus an optional comment field. These extensions were introduced by Angela Schmidt with the help of Andrew Young, the primary author of the Rock Ridge Interchange Protocol and System Use Sharing Protocol. The first publicly available software to master a CD-ROM with Amiga extensions was MakeCD, an Amiga software which Angela Schmidt developed together with Patrick Ohly. El Torito El Torito is an extension designed to allow booting a computer from a CD-ROM. It was announced in November 1994 and first issued in January 1995 as a joint proposal by IBM and BIOS manufacturer Phoenix Technologies. According to legend, the El Torito CD/DVD extension to ISO 9660 got its name because its design originated in an El Torito restaurant in Irvine, California (). The initial two authors were Curtis Stevens, of Phoenix Technologies, and Stan Merkin, of IBM. A 32-bit PC BIOS will search for boot code on an ISO 9660 CD-ROM. The standard allows for booting in two different modes. Either in hard disk emulation when the boot information can be accessed directly from the CD media, or in floppy emulation mode where the boot information is stored in an image file of a floppy disk, which is loaded from the CD and then behaves as a virtual floppy disk. This is useful for computers that were designed to boot only from a floppy drive. For modern computers the "no emulation" mode is generally the more reliable method. The BIOS will assign a BIOS drive number to the CD drive. The drive number (for INT 13H) assigned is any of 80hex (hard disk emulation), 00hex (floppy disk emulation) or an arbitrary number if the BIOS should not provide emulation. Emulation is useful for booting older operating systems from a CD, by making it appear to them as if they were booted from a hard or floppy disk. El Torito can also be used to produce CDs which can boot up Linux operating systems, by including the GRUB bootloader on the CD and following the Multiboot Specification. While the El Torito spec alludes to a "Mac" platform ID, PowerPC-based Apple Macintosh computers don't use it. Joliet Joliet is an extension specified and endorsed by Microsoft and has been supported by all versions of its Windows operating system since Windows 95 and Windows NT 4.0. Its primary focus is the relaxation of the filename restrictions inherent with full ISO 9660 compliance. Joliet accomplishes this by supplying an additional set of filenames that are encoded in UCS-2BE (UTF-16BE in practice since Windows 2000). These filenames are stored in a special supplementary volume descriptor, that is safely ignored by ISO 9660-compliant software, thus preserving backward compatibility. The specification only allows filenames to be up to 64 Unicode characters in length. However, the documentation for mkisofs states filenames up to 103 characters in length do not appear to cause problems. Microsoft has documented it "can use up to 110 characters." Joliet allows Unicode characters to be used for all text fields, which includes file names and the volume name. A "Secondary" volume descriptor with type 2 contains the same information as the Primary one (sector 16 offset 40 bytes), but in UCS-2BE in sector 17, offset 40 bytes. As a result of this, the volume name is limited to 16 characters. Many current PC operating systems are able to read Joliet-formatted media, thus allowing exchange of files between those operating systems even if non-Roman characters are involved (such as Arabic, Japanese or Cyrillic), which was formerly not possible with plain ISO 9660-formatted media. Operating systems which can read Joliet media include: Microsoft Windows; Microsoft recommends the use of the Joliet extension for developers targeting Windows. Linux macOS FreeBSD OpenSolaris Haiku AmigaOS RISC OS Romeo Romeo was developed by Adaptec and allows the use of long filenames up to 128 characters. However, Romeo is not backwards compatible with ISO 9660 and discs authored using this file system can only be read under the Windows 9x and Windows NT platforms, thus not allowing exchange of files between those operating systems if non-Roman characters are involved (such as Arabic, Japanese or Cyrillic), for example ü becomes ³. Apple extensions Apple Computer authored a set of extensions that add ProDOS or HFS/HFS+ (the primary contemporary file system for Mac OS) properties to the filesystem. Some of the additional metadata properties include: Date of last backup File type Creator code Flags and data for display Reference to a resource fork In order to allow non-Macintosh systems to access Macintosh files on CD-ROMs, Apple chose to use an extension of the standard ISO 9660 format. Most of the data, other than the Apple specific metadata, remains visible to operating systems that are able to read ISO 9660. Other extensions For operating systems which do not support any extensions, a name translation file TRANS.TBL must be used. The TRANS.TBL file is a plain ASCII text file. Each line contains three fields, separated by an arbitrary amount of whitespace: The file type ("F" for file or "D" for directory); The ISO 9660 filename (including the usually hidden ";1" for files); and The extended filename, which may contain spaces. Most implementations that create TRANS.TBL files put a single space between the file type and ISO 9660 name and some arbitrary number of tabs between the ISO 9660 filename and the extended filename. Native support for using TRANS.TBL still exists in many ISO 9660 implementations, particularly those related to Unix. However, it has long since been superseded by other extensions, and modern utilities that create ISO 9660 images either cannot create TRANS.TBL files at all, or no longer create them unless explicitly requested by the user. Since a TRANS.TBL file has no special identification other than its name, it can also be created separately and included in the directory before filesystem creation. The ISO 13490 standard is an extension to the ISO 9660 format that adds support for multiple sessions on a disc. Since ISO 9660 is by design a read-only, pre-mastered file system, all the data has to be written in one go or "session" to the medium. Once written, there is no provision for altering the stored content. ISO 13490 was created to allow adding more files to a writeable disc such as CD-R in multiple sessions. JIS X 0606:1998, also known as ISO 9660:1999, is a Japanese Industrial Standard draft created by the Japanese National Body (JTC1 N4222) in order to make some improvements and remove some limitations from the original ISO 9660 standard. This draft was submitted in 1998, but it has not been ratified as an ISO standard yet. Some of its changes includes the removal of some restrictions imposed by the original standard by extending the maximum file name length to 207 characters, removing the eight-level maximum directory nesting limit, and removing the special meaning of the dot character in filenames. Some operating systems allow these relaxations as well when reading optical discs. Several disc authoring tools (such as Nero Burning ROM, mkisofs and ImgBurn) support a so-called "ISO 9660:1999" mode (sometimes called "ISO 9660 v2" or "ISO 9660 Level 4" mode) that removes restrictions following the guidelines in the ISO 9660:1999 draft. The ISO 13346/ECMA-167 standard was designed in conjunction to the ISO 13490 standard. This new format addresses most of the shortcomings of ISO 9660, and a subset of it evolved into the Universal Disk Format (UDF), which was adopted for DVDs. The volume descriptor table retains the ISO9660 layout, but the identifier has been updated. Disc images Optical disc images are a common way to electronically transfer the contents of CD-ROMs. They often have the filename extension .iso (.iso9660 is less common, but also in use) and are commonly referred to as "ISOs". Platforms Most operating systems support reading of ISO 9660 formatted discs, and most new versions support the extensions such as Rock Ridge and Joliet. Operating systems that do not support the extensions usually show the basic (non-extended) features of a plain ISO 9660 disc. Operating systems that support ISO 9660 and its extensions include the following: DOS: access with extensions, such as MSCDEX.EXE (Microsoft CDROM Extension), NWCDEX.EXE or CORELCDX.EXE Microsoft Windows 95, Windows 98, Windows ME: can read ISO 9660 Level 1, 2, 3, and Joliet Microsoft Windows NT 4.0, Windows 2000, Windows XP, and newer Windows versions, can read ISO 9660 Level 1, 2, 3, Joliet, and ISO 9660:1999. Windows 7 may also mistake UDF format for CDFS. for more information see UDF. Linux and BSD: ISO 9660 Level 1, 2, 3, Joliet, Rock Ridge, and ISO 9660:1999 Apple GS/OS: ISO Level 1 and 2 support via the HS.FST File System Translator. Classic Mac OS 7 to 9: ISO Level 1, 2. Optional free software supports Rock Ridge and Joliet (including ISO Level 3): Joke Ridge and Joliet Volume Access. macOS (all versions): ISO Level 1, 2, Joliet and Rock Ridge Extensions. Level 3 is not currently supported, although users have been able to mount these discs AmigaOS supports the "AS" extensions (which preserve the Amiga protection bits and file comments) QNX ULTRIX OS/2, eComStation and ArcaOS BeOS, Zeta and Haiku OpenVMS supports only ISO 9660 Interchange levels 1–3, with no extensions RISC OS support for optical media written on a PC is patchy. Most CD-Rs/RWs work perfectly, however DVD+-Rs/RWs/RAMs are entirely hit and miss running RISC OS 4.02, RISC OS 4.39 and RISC OS 6.20 See also Comparison of disc image software Disk image emulator List of International Organization for Standardization standards Hybrid CD References Further reading External links This is the ECMA release of the ISO 9660:1988 standard, available as a free download ISOLINUX source code (see isolinux.asm line 294 onward) (see int 13h in interrupt.b, esp. functions 4a to 4d) , discusses shortcomings of the standard US Patent 5758352 - Common name space for long and short filenames Amiga APIs Apple Inc. file systems Compact disc Disk file systems Ecma standards 09660 Optical computer storage Optical disc authoring Windows disk file systems
[ -0.019644323736429214, -0.10937435925006866, 0.28308776021003723, 0.4884161949157715, 0.019110972061753273, -0.4787857234477997, -0.4750320315361023, -0.12614838778972626, -0.3504118323326111, -0.1411321461200714, -0.5768306255340576, 0.8430814743041992, -0.5005061626434326, 0.127165034413...
15146
https://en.wikipedia.org/wiki/Ice%20skating
Ice skating
Ice skating is the self-propulsion and gliding of a person across an ice surface, using metal-bladed ice skates. People skate for various reasons, including recreation (fun), exercise, competitive sports, and commuting. Ice skating may be performed on naturally frozen bodies of water, such as ponds, lakes, canals, and rivers; and on man-made ice surfaces such as ice rinks, ice hockey rinks, and arenas, both indoors and outdoors. Various formal sports involving skating have emerged since the 19th century. Ice hockey, Bandy, and Ringette are team sports played with, respectively, a flat sliding puck, a ball and a rubber ring. Figure skating, speed skating, Ice cross downhill and Barrel jumping are among the sporting disciplines for individuals. History Early history of ice skating Research suggests that the earliest ice skating happened in southern Finland more than 4,000 years ago. This was done to save energy during winter journeys. True skating emerged when a steel blade with sharpened edges was used. Skates now cut into the ice instead of gliding on top of it. The Dutch added edges to ice skates in the 13th or 14th century. These ice skates were made of steel, with sharpened edges on the bottom to aid movement. The fundamental construction of modern ice skates has stayed largely the same since then, although differing greatly in the details, particularly in the method of binding and the shape and construction of the steel blades. In the Netherlands, ice skating was considered proper for all classes of people, as shown in many pictures from Dutch Golden Age painters. Ice skating was also practiced in China during the Song dynasty, and became popular among the ruling family of the Qing dynasty. Rising popularity and first clubs In England "the London boys" had improvised butcher's bones as skates since the 12th century. Skating on metal skates seems to have arrived in England at the same time as the garden canal, with the English Restoration in 1660, after the king and court returned from an exile largely spent in the Netherlands. In London the ornamental "canal" in St James's Park was the main centre until the 19th century. Both Samuel Pepys and John Evelyn, the two leading diarists of the day, saw it on the "new canal" there on 1 December 1662, the first time Pepys had ever seen it ("a very pretty art"). Then it was "performed before their Majesties and others, by diverse gentlemen and others, with scheets after the manner of the Hollanders". Two weeks later, on 15 December 1662, Pepys accompanied the Duke of York, later King James II, on a skating outing: "To the Duke, and followed him in the Park, when, though the ice was broken, he would go slide upon his skates, which I did not like; but he slides very well." In 1711 Jonathan Swift still thinks the sport might be unfamiliar to his "Stella", writing to her: "Delicate walking weather; and the Canal and Rosamund's Pond full of the rabble and with skates, if you know what that is. The first organised skating club was the Edinburgh Skating Club, formed in the 1740s, (some claim the club was established as early as 1642).An early contemporary reference to the club appeared in the second edition (1783) of the Encyclopædia Britannica: From this description and others, it is apparent that the form of skating practiced by club members was indeed an early form of figure skating rather than speed skating. For admission to the club, candidates had to pass a skating test where they performed a complete circle on either foot (e.g., a figure eight), and then jumped over first one hat, then two and three, placed over each other on the ice. On the Continent, participation in ice skating was limited to members of the upper classes. Emperor Rudolf II of the Holy Roman Empire enjoyed ice skating so much, he had a large ice carnival constructed in his court in order to popularise the sport. King Louis XVI of France brought ice skating to Paris during his reign. Madame de Pompadour, Napoleon I, Napoleon III, and the House of Stuart were, among others, royal and upper-class fans of ice skating. The next skating club to be established was in London and was not founded until 1830. Members wore a silver skate hanging from their buttonhole and met on The Serpentine, Hyde Park on 27th December, 1830. By the mid-19th century, ice skating was a popular pastime among the British upper and middle classes—Queen Victoria became acquainted with her future husband, Prince Albert, through a series of ice skating trips. Albert continued to skate after their marriage and on falling through the ice was once rescued by Victoria and a lady in waiting from a stretch of water in the grounds of Buckingham Palace. Early attempts at the construction of artificial ice rinks were made during the "rink mania" of 1841–44. As the technology for the maintenance of natural ice did not exist, these early rinks used a substitute consisting of a mixture of hog's lard and various salts. An item in the 8 May 1844 issue of Littell's 'Living Age' headed the 'Glaciarium' reported that "This establishment, which has been removed to Grafton Street East' Tottenham Court Road, was opened on Monday afternoon. The area of artificial ice is extremely convenient for such as may be desirous of engaging in the graceful and manly pastime of skating." Emergence as a sport Skating became popular as a recreation, a means of transport and spectator sport in The Fens in England for people from all walks of life. Racing was the preserve of workers, most of them agricultural labourers. It is not known when the first skating matches were held, but by the early nineteenth century racing was well established and the results of matches were reported in the press. Skating as a sport developed on the lakes of Scotland and the canals of the Netherlands. In the 13th and 14th centuries wood was substituted for bone in skate blades, and in 1572 the first iron skates were manufactured. When the waters froze, skating matches were held in towns and villages all over the Fens. In these local matches men (or sometimes women or children) would compete for prizes of money, clothing, or food. The winners of local matches were invited to take part in the grand or championship matches, in which skaters from across the Fens would compete for cash prizes in front of crowds of thousands. The championship matches took the form of a Welsh main or "last man standing" contest (single-elimination tournament). The competitors, 16 or sometimes 32, were paired off in heats and the winner of each heat went through to the next round. A course of 660 yards was measured out on the ice, and a barrel with a flag on it placed at either end. For a one-and-a-half-mile race the skaters completed two rounds of the course, with three barrel turns. In the Fens, skates were called pattens, fen runners, or Whittlesey runners. The footstock was made of beechwood. A screw at the back was screwed into the heel of the boot, and three small spikes at the front kept the skate steady. There were holes in the footstock for leather straps to fasten it to the foot. The metal blades were slightly higher at the back than the front. In the 1890s, fen skaters started to race in Norwegian style skates. On Saturday 1 February 1879, a number of professional ice skaters from Cambridgeshire and Huntingdonshire met in the Guildhall, Cambridge, to set up the National Skating Association, the first national ice skating body in the world. The founding committee consisted of several landowners, a vicar, a fellow of Trinity College, a magistrate, two members of parliament, the mayor of Cambridge, the Lord Lieutenant of Cambridge, journalist James Drake Digby, the president of Cambridge University Skating Club, and Neville Goodman, a graduate of Peterhouse, Cambridge (and son of Potto Brown's milling partner, Joseph Goodman). The newly formed Association held their first one-and-a-half-mile British professional championship at Thorney in December 1879. Figure skating The first instructional book concerning ice skating was published in London in 1772. The book, written by a British artillery lieutenant, Robert Jones, describes basic figure skating forms such as circles and figure eights. The book was written solely for men, as women did not normally ice skate in the late 18th century. It was with the publication of this manual that ice skating split into its two main disciplines, speed skating and figure skating. The founder of modern figure skating as it is known today was Jackson Haines, an American. He was the first skater to incorporate ballet and dance movements into his skating, as opposed to focusing on tracing patterns on the ice. Haines also invented the sit spin and developed a shorter, curved blade for figure skating that allowed for easier turns. He was also the first to wear blades that were permanently attached to the boot. The International Skating Union was founded in 1892 as the first international ice skating organisation in Scheveningen, in the Netherlands. The Union created the first codified set of figure skating rules and governed international competition in speed and figure skating. The first Championship, known as the Championship of the Internationale Eislauf-Vereingung, was held in Saint Petersburg in 1896. The event had four competitors and was won by Gilbert Fuchs. Physical mechanics of skating A skate can glide over ice because there is a layer of ice molecules on the surface that are not as tightly bound as the molecules of the mass of ice beneath. These molecules are in a semiliquid state, providing lubrication. The molecules in this "quasi-fluid" or "water-like" layer are less mobile than liquid water, but are much more mobile than the molecules deeper in the ice. At about the slippery layer is one molecule thick; as the temperature increases the slippery layer becomes thicker. It had long been believed that ice is slippery because the pressure of an object in contact with it causes a thin layer to melt. The hypothesis was that the blade of an ice skate, exerting pressure on the ice, melts a thin layer, providing lubrication between the ice and the blade. This explanation, called "pressure melting", originated in the 19th century. (See Regelation.) Pressure melting could not account for skating on ice temperatures lower than −3.5 °C, whereas skaters often skate on lower-temperature ice. In the 20th century, an alternative explanation, called "friction melting", proposed by Lozowski, Szilder, Le Berre, Pomeau, and others showed that because of the viscous frictional heating, a macroscopic layer of melt ice is in-between the ice and the skate. With this they fully explained the low friction with nothing else but macroscopic physics, whereby the frictional heat generated between skate and ice melts a layer of ice. This is a self-stabilizing mechanism of skating. If by fluctuation the friction gets high, the layer grows in thickness and lowers the friction, and if it gets low, the layer decreases in thickness and increases the friction. The friction generated in the sheared layer of water between skate and ice grows as √V with V the velocity of the skater, such that for low velocities the friction is also low. Whatever the origin of the water layer, skating is more destructive than simply gliding. A skater leaves a visible trail behind on virgin ice and skating rinks have to be regularly resurfaced to improve the skating conditions. It means that the deformation caused by the skate is plastic rather than elastic. The skate ploughs through the ice in particular due to the sharp edges. Thus another component has to be added to the friction: the "ploughing friction". The calculated frictions are of the same order as the measured frictions in real skating in a rink. The ploughing friction decreases with the velocity V, since the pressure in the water layer increases with V and lifts the skate (aquaplaning). As a result the sum of the water-layer friction and the ploughing friction only increases slightly with V, making skating at high speeds (>90 km/h) possible. Inherent safety risks A person's ability to ice skate depends on the roughness of the ice, the design of the ice skate, and the skill and experience of the skater. While serious injury is rare, a number of short track speed skaters have been paralysed after a heavy fall when they collided with the boarding. A fall can be fatal if a helmet is not worn to protect against severe head injury. Accidents are rare but there is a risk of injury from collisions, particularly during hockey games or in pair skating. A significant danger when skating outdoors on a frozen body of water is falling through the ice into the freezing water underneath. Death can result from shock, hypothermia, or drowning. It is often difficult or impossible for the skater to climb out of the water, due to the weight of their ice skates and thick winter clothing, and the ice repeatedly breaking as they struggle to get back onto the surface. Also, if the skater becomes disoriented under the water, they might not be able to find the hole in the ice through which they have fallen. Although this can prove fatal, it is also possible for the rapid cooling to produce a condition in which a person can be revived up to hours after falling into the water. Communal activities on ice A number of recreational and sporting activities take place on ice: Ice cricket - a variant of the English game of cricket played in harsh wintry conditions. Ice hockey – fast-paced contact team sport, using a vulcanized rubber puck, usually played on a special ice hockey rink Speed skating – competitive form of ice skating in which contenders race over fixed distances, short track and long track versions Figure skating – winter sport with multiple disciplines: men's singles, ladies' singles, pair skating, ice dance, and synchronized skating Bandy – contact team sport similar to ice hockey, but using a ball instead of a puck, and played on a large ice field Rink bandy – a form of bandy that can be played on a standard ice hockey rink Ringette – non-contact team sport using a small rubber ring instead of a ball or puck Tour skating – recreational long-distance skating outdoors on open areas of natural ice Ice cross downhill – competitive extreme sport featuring downhill skating on a walled track Barrel jumping – speed skating discipline in which skaters jump over a length of multiple barrels Broomball and curling are also played on ice, but the players are not required to wear ice skates. Gallery Pictures Videos See also Fen skating Ice resurfacer Kite ice skating Lidwina, patron saint of ice skaters Yuri on Ice References External links Skating and Science (a bibliography) Skating Skating Winter Olympic sports Articles containing video clips
[ -0.12647318840026855, -0.11151975393295288, 0.13840432465076447, 0.5715152621269226, -0.40886443853378296, 0.05450417101383209, 0.3049761652946472, 0.26245251297950745, -0.78721684217453, -0.26837944984436035, 0.3048132658004761, -0.18013866245746613, -0.3275379240512848, 0.056539066135883...
15147
https://en.wikipedia.org/wiki/International%20Olympic%20Committee
International Olympic Committee
The International Olympic Committee (IOC; , CIO) is a non-governmental sports organisation based in Lausanne, Switzerland. It is constituted in the form of an association under the Swiss Civil Code (articles 60–79). Founded by Pierre de Coubertin and Demetrios Vikelas in 1894, it is the authority responsible for organising the modern (Summer, Winter, and Youth) Olympic Games. The IOC is the governing body of the National Olympic Committees (NOCs) and of the worldwide "Olympic Movement", the IOC's term for all entities and individuals involved in the Olympic Games. As of 2020, there are 206 NOCs officially recognised by the IOC. The current president of the IOC is Thomas Bach of Germany, who succeeded Jacques Rogge of Belgium in September 2013. History The IOC was created by Pierre de Coubertin, on 23 June 1894 with Demetrios Vikelas as its first president. As of February 2022, its membership consists of 105 active members, 45 honorary members, and one honor member (Henry Kissinger). The IOC is the supreme authority of the worldwide modern Olympic Movement. The IOC organizes the modern Olympic Games and Youth Olympic Games (YOG), held in summer and winter, every four years. The first Summer Olympics was held in Athens, Greece, in 1896; the first Winter Olympics was in Chamonix, France, in 1924. The first Summer YOG was in Singapore in 2010 and the first Winter YOG in Innsbruck were in 2012. Until 1992, both Summer and Winter Olympics were held in the same year. After that year, however, the IOC shifted the Winter Olympics to the even years between Summer Games, to help space the planning of the two events from one another, and improve the financial balance of the IOC, which receives a proportionally greater income in Olympic years. In 2009, the UN General Assembly granted the IOC Permanent Observer status. The decision enables the IOC to be directly involved in the UN Agenda and to attend UN General Assembly meetings where it can take the floor. In 1993, the General Assembly approved a Resolution to further solidify IOC–UN cooperation by reviving the Olympic Truce. The IOC received approval in November 2015 to construct a new headquarters in Vidy, Lausanne. The cost of the project was estimated to stand at $156m. The IOC announced on 11 February 2019 that "Olympic House" would be inaugurated on 23 June 2019 to coincide with its 125th anniversary. The Olympic Museum remains in Ouchy, Lausanne. Mission and roles The stated mission of the IOC is to promote the Olympics throughout the world and to lead the Olympic Movement: To encourage and support the organization, development, and coordination of sport and sports competitions; To ensure the regular celebration of the Olympic Games; To cooperate with the competent public or private organizations and authorities in the endeavor to place sport at the service of humanity and thereby to promote peace; To act against any form of discrimination affecting the Olympic Movement; To encourage and support the promotion of women in sport at all levels and in all structures with a view to implementing the principle of equality of men and women; IOC Executive Board IOC Commissions Organization IOC Session The IOC Session is the general meeting of the members of the IOC, held once a year in which each member has one vote. It is the IOC's supreme organ and its decisions are final. Extraordinary Sessions may be convened by the President or upon the written request of at least one third of the members. Among others, the powers of the Session are: To adopt or amend the Olympic Charter. To elect the members of the IOC, the Honorary President and the honorary members. To elect the President, the vice-presidents and all other members of the IOC Executive Board. To elect the host city of the Olympic Games. Subsidiaries Olympic Foundation (Lausanne, Switzerland) IOC Television and Marketing Services S.A. (Lausanne, Switzerland) The Olympic Partner Programme (Lausanne, Switzerland) Olympic Broadcasting Services S.A. (Lausanne, Switzerland) Olympic Broadcasting Services S.L. (Madrid, Spain) Olympic Channel Services S.A. (Lausanne, Switzerland) Olympic Channel Services S.L. (Madrid, Spain) Olympic Foundation for Culture and Heritage (Lausanne, Switzerland) IOC Heritage Management Olympic Studies Centre Olympic Museum International Programmes for Arts, Culture and Education Olympic Solidarity (Lausanne, Switzerland) Honours In addition to the Olympic medals for competitors, the IOC awards a number of other honours. The Pierre de Coubertin medal is awarded to athletes who demonstrate a special spirit of sportsmanship in Olympic events The Olympic Cup is awarded to institutions or associations with a record of merit and integrity in actively developing the Olympic Movement The Olympic Order is awarded to individuals for exceptionally distinguished contributions to the Olympic Movement; superseded the Olympic Certificate The Olympic Laurel is awarded to individuals for promoting education, culture, development, and peace through sport The Olympic town status has been given to some towns that have been particularly important for the Olympic Movement IOC members For most of its existence, the IOC was controlled by members who were selected by other members. Countries that had hosted the Games were allowed two members. When named, they did not become the representatives of their respective countries to the IOC, but rather the opposite, IOC members in their respective countries. Oath of the International Olympic Committee "Granted the honour of becoming a member of the International Olympic Committee and declaring myself aware of my responsibilities in such a capacity, I undertake to serve the Olympic Movement to the very best of my ability; to respect and ensure the respect of all the provisions of the Olympic Charter and the decisions of the International Olympic Committee which I consider as not the subject to appeal on my part; to comply with the code of ethics to keep myself free from any political or commercial influence and from any racial or religious consideration; to fight against all other forms of discrimination; and to promote in all circumstances the interests of the International Olympic Committee and those of the Olympic Movement." Cessation of membership The membership of IOC members ceases in the following circumstances: Resignation: any IOC member may cease their membership at any time by delivering a written resignation to the President. Non re-election: any IOC member ceases to be a member without further formality if they are not re-elected. Age limit: any IOC member ceases to be a member at the end of the calendar year during which they reach the age of 70 or 80. Any member who joined in the 1900s ceases to be a member at age 80 and any member who joined in the 2000s ceases to be a member at age 70. Failure to attend Sessions or take active part in IOC work for two consecutive years. Transfer of domicile or of main center of interests to a country other than the country which was theirs at the time of their election. Members elected as active athletes cease to be a member upon ceasing to be a member of the IOC Athletes' Commission. Presidents and individuals holding an executive or senior leadership position within NOCs, world or continental associations of NOCs, IFs or associations of IFs, or other organisations recognised by the IOC cease to be a member upon ceasing to exercise the function they were exercising at the time of their election. Expulsion: an IOC member may be expelled by decision of the Session if such member has betrayed their oath or if the Session considers that such member has neglected or knowingly jeopardised the interests of the IOC or acted in a way which is unworthy of the IOC. Sports federations recognised by IOC There are currently 82 international sports federations (IFs) recognised by the IOC. These are: The 33 members of Association of Summer Olympic International Federations (ASOIF) The 7 members of Association of International Olympic Winter Sports Federations (AIOWF) The 42 members of Association of IOC Recognised International Sports Federations (ARISF) Olympic marketing During the first half of the 20th century the IOC ran on a small budget. As president of the IOC from 1952 to 1972, Avery Brundage rejected all attempts to link the Olympics with commercial interest. Brundage believed the lobby of corporate interests would unduly impact the IOC's decision-making. Brundage's resistance to this revenue stream meant the IOC left organising committees to negotiate their own sponsorship contracts and use the Olympic symbols. When Brundage retired the IOC had US$2 million in assets; eight years later the IOC coffers had swelled to US$45 million. This was primarily due to a shift in ideology toward expansion of the Games through corporate sponsorship and the sale of television rights. When Juan Antonio Samaranch was elected IOC president in 1980 his desire was to make the IOC financially independent. Samaranch appointed Canadian IOC member Richard Pound to lead the initiative as Chairman of the "New Sources of Finance Commission". In 1982 the IOC drafted International Sport and Leisure, a Swiss sports marketing company, to develop a global marketing programme for the Olympic Movement. ISL successfully developed the programme but was replaced by Meridian Management, a company partly owned by the IOC in the early 1990s. In 1989, one of the staff members at ISL Marketing, Michael Payne, moved to the IOC and became the organisation's first marketing director. However ISL and subsequently Meridian, continued in the established role as the IOC's sales and marketing agents until 2002. In collaboration with ISL Marketing and subsequently Meridian Management, Payne made major contributions to the creation of a multibillion-dollar sponsorship marketing programme for the organisation which, along with improvements in TV marketing and improved financial management, helped to restore the IOC's financial viability. Revenue The Olympic Movement generates revenue through five major programmes. Broadcast partnerships, managed by the IOC. Commercial sponsorship, organised through the IOC's worldwide TOP programme. Domestic sponsorship, managed by the Organising Committees for the Olympic Games (OCOGs). Ticketing. Licensing programmes within the host country. The OCOGs have responsibility for the domestic sponsorship, ticketing and licensing programmes, under the direction of the IOC. The Olympic Movement generated a total of more than US$4 billion (€2.5 billion) in revenue during the Olympic quadrennium from 2001 to 2004. Revenue distribution The IOC distributes some of the Olympic marketing revenue to organisations throughout the Olympic Movement to support the staging of the Olympic Games and to promote the worldwide development of sport. The IOC retains approximately 10% of the Olympic marketing revenue for the operational and administrative costs of governing the Olympic Movement. For the 2013-2016 period, the IOC had revenues of about US$5.0 billion, of which 73% were from broadcasting rights and 18% were from The Olympic Partners. The Rio 2016 organising committee received US$1.5 billion and the Sochi 2014 organising committee received 833 million. National Olympic committees and international federations received US$739 million each. Organizing Committees for the Olympic Games The IOC provides TOP programme contributions and Olympic broadcast revenue to the OCOGs to support the staging of the Summer Olympic Games and the Winter Olympic Games: TOP programme revenue to OCOGs: the two OCOGs of each Olympic quadrennium generally share approximately 50% of TOP programme revenue and value-in-kind contributions, with approximately 30% provided to the summer OCOG and 20% provided to the winter OCOG. Broadcast revenue to OCOGs: the IOC contributes 49% of the Olympic broadcast revenue for each Games to the OCOG. During the 2001–2004 Olympic quadrennium, the Salt Lake 2002 Organizing Committee received US$443 million, €395 million in broadcast revenue from the IOC, and the Athens 2004 Organizing Committee received US$732 million, €690 million. Domestic programme revenue to OCOGs: the OCOGs generate substantial revenue from the domestic marketing programmes that they manage within the host country, including domestic sponsorship, ticketing and licensing. National Olympic Committees The NOCs receive financial support for the training and development of Olympic teams, Olympic athletes and Olympic hopefuls. The IOC distributes TOP programme revenue to each of the NOCs throughout the world. The IOC also contributes Olympic broadcast revenue to Olympic Solidarity, an IOC organisation that provides financial support to NOCs with the greatest need. The continued success of the TOP programme and Olympic broadcast agreements has enabled the IOC to provide increased support for the NOCs with each Olympic quadrennium. The IOC provided approximately US$318.5 million to NOCs for the 2001–2004 quadrennium. International Olympic Sports Federations The IOC is now the largest single revenue source for the majority of IFs, with its contributions of Olympic broadcast revenue that assist the IFs in the development of their respective sports worldwide. The IOC provides financial support from Olympic broadcast revenue to the 28 IFs of Olympic summer sports and the seven IFs of Olympic winter sports after the completion of the Summer Olympics and the Winter Olympics, respectively. The continually increasing value of Olympic broadcast partnership has enabled the IOC to deliver substantially increased financial support to the IFs with each successive Games. The seven winter sports IFs shared US$85.8 million, €75 million in Salt Lake 2002 broadcast revenue. The contribution to the 28 summer sports IFs from Athens 2004 broadcast revenue has not yet been determined, but the contribution is expected to mark a significant increase over the US$190 million, €150 million that the IOC provided to the summer IFs following Sydney 2000. Other organisations The IOC contributes Olympic marketing revenue to the programmes of various recognised international sports organisations, including the International Paralympic Committee (IPC), and the World Anti-Doping Agency (WADA). The Olympic Partner programme The Olympic Partner (TOP) sponsorship programme includes the following commercial sponsors of the Olympic Games. Airbnb Allianz Alibaba Group Atos Bridgestone Coca-Cola Dow Chemical Company (to 2020) General Electric (to 2020) Intel Mengniu Dairy (joint partnership with Coca-Cola) Omega SA (previously The Swatch Group, its parent company) Panasonic Procter & Gamble Samsung Toyota Visa Inc. Environmental concerns The IOC recognises that the Olympic Games demand substantial environmental resources, activities, and construction projects that could be detrimental to a host city's environment. In 1995, IOC President Juan Antonio Samaranch stated, "the International Olympic Committee is resolved to ensure that the environment becomes the third dimension of the organization of the Olympic Games, the first and second being sport and culture." Acting on this statement, in 1996 the IOC added the "environment" as a third pillar to its vision for the Olympic Games. The IOC requires cities bidding to host the Olympics to provide a comprehensive strategy to protect the environment in preparation for hosting, and following the conclusion of the Games. This initiative was most notably acted upon in 2000, when the "Green Olympics" effort was developed by the Beijing Organizing Committee for the Beijing Olympic Games. The Beijing 2008 Summer Olympics effort to host environmentally friendly games resulted in over 160 projects meeting the goal of "green" games through improved air quality and water quality, implementation of sustainable energy sources, improved waste management, and environmental education. These projects included industrial plant relocation or closure, furnace replacement, introduction of new emission standards, and more strict traffic control. Most of these measures were adopted on a temporary basis, and although real improvements were realized (particularly in air quality), most of these improvements had disappeared one year following the Games. Although these improvements were short lived, IOC's inclusion of environmental policies in evaluating and selecting host cities demonstrates a corporate responsibility that may be built upon in years to come. Detailed frameworks for environmental sustainability have been released for the 2018 Winter Olympics, and 2020 Summer Olympics in PyeongChang, South Korea, and Tokyo, Japan, respectively. IOC approaches The IOC has four major approaches to addressing environmental health concerns during the construction and competitions of the Olympic Games. First, the IOC Sustainability and Legacy Commission focuses on how the IOC can improve the strategies and policies associated with environmental health throughout the process of cities hosting the Olympic Games. Secondly, every candidate city must provide information to the IOC on environmental health issues like air quality and environmental impact assessments. Thirdly, every host city is given the option to declare "pledges" to address specific or general environmental health concerns of hosting the Olympic Game. Fourthly, the IOC has every host city collaborate with the United Nations to work towards addressing environmental health objectives. Ultimately, the IOC uses these four major approaches in an attempt to minimize the negative environmental health concerns of a host city. Venue construction effects on air Cities hosting the Olympic Games have two primary concerns: traffic congestion and air pollution, both of which can result in compromised air quality during and after Olympic venue construction. Research at the Beijing Olympic Games identified particulate matter – measured in terms of PM10 (the amount of aerodynamic diameter of particle≤10 μm in a given amount of air) – as a top priority that should be taken into consideration. The particulate matter in the air, along with other airborne pollutants, cause both serious health problems, such as asthma, and contribute to the deterioration of urban ecosystems. Black Carbon is released into the air from incomplete combustion of carbonaceous fluids contributing to global climate change and human health effects. The black carbon concentrations are highly impacted by the truck traffic due to the traffic congestion during the massive construction. Additionally, secondary pollutants like CO, NOx, SO2, benzene, toluene, ethylbenzene, and xylenes (BTEX) are also released during the venue construction, resulting in harmful effects to the environment. Methods to measure particulates in the air Environmental magnetic methods have been established as a successful way of measuring the degree of pollution in air, water and soil. Environmental magnetism is sensitive to particle size, and has proven effective even at low detection levels. For these reasons, it is becoming more widely used. Measures taken to improve air quality Various air quality measures are undertaken before and after the Olympic Games. Research studies demonstrate that the primary method to reduce concentrations of air pollutants is traffic control, including barring heavy vehicles from the roads. For the Beijing Olympics, vehicles not meeting the Euro 1 emission standards were also banned from the roads, and the odd-even rule was implemented in the Beijing administrative area. Additional air quality improvement measures include replacing coal with natural gas, suspending construction and/or imposing strict dust control on construction sites, closing or relocating the polluting industrial plants, building long subway lines, using cleaner fluid in power plants, and reducing the activity by some of the polluting factories. These were several air quality improvement measures implemented by the Beijing government. There, levels of primary and secondary pollutants were reduced, and good air quality was recorded during the Beijing Olympics on most of the days. Venue construction effects on soil Soil contamination can occur during the process of constructing the Olympic venues. In the case of the 2006 Winter Olympic Games in Torino, Italy, negative environmental impacts were observed, including impacts on soil. Before the Games, researchers studied four areas which the Games would likely affect: a floodplain, a highway, the motorway connecting the city to Lyon, France, and a landfill. They performed an extensive analysis in the types of chemicals found in the soils in these areas both before and after the Games. Their findings revealed an increase in the number of metals in the topsoils post-Games, and indicated that soil was capable, as part of an ecosystem, of negating, or "buffering," the effects of many heavy metals. However, their findings also revealed that this was not the case for all metals, and that mercury, lead, and arsenic may have been transferred into the food chain on a massive scale. One of the promises made to Londoners when they won the right to host the 2012 Olympic Games was that the Olympic Park would be a "blueprint for sustainable living." However, residents of the allotments of Manor Road were relocated, due to the building of the Olympic stadium, and would later disagree that the Olympics had had any positive effect on their lives. Allotments, originally, were intended to provide low-income residents with a plot of land on which to grow their own food, thus receiving the dual health benefits of a supply of fresh food and outdoor work. Many of these sites were lost as a result of the Olympic venue construction, most notably the Manor Road site. Residents were promised that the allotments would be returned, and they eventually were. However, the soil quality would never be the same. Crops tended by allotment residents were the result of years of careful cultivation, and thus, those years of care and attention were destroyed by a bulldozer. Further, allotment residents were exposed to radioactive waste for five months prior to moving, during the excavation of the site for the Games. Other local residents, construction workers, and onsite archeologists faced similar exposures and risks. In contrast, the Sydney Olympic Games of 2000 provided an opportunity to improve a highly contaminated area known as the Homebush Bay site. A study commissioned by the New South Wales Government Olympic Coordination Authority, which was responsible for the Games' site preparation, looked at soil contamination prior to the Games. The work assessed soils that had been previously impacted by waste and identified areas that could pose a risk to the environment. Soil metal concentrations were found to be high enough to potentially contaminate groundwater. After risk areas were identified, a remediation strategy was developed. Contaminated soil was consolidated into four containment areas within the site, which left the remaining areas available for recreational use. Also, the contained waste materials no longer posed a threat to surrounding aquifers. Sydney's winning Olympic bid provided a catalyst to undertake the "greenest" single urban remediation ever attempted in Australia. Venue construction effects on water The Olympic Games can affect water quality in the surrounding region in several ways, including water runoff and the transfer of polluting substances from the air to water sources through rainfall. Harmful particulates come from both natural substances (such as plant matter crushed by higher volumes of pedestrian and vehicle traffic) and man-made substances (such as exhaust from vehicles or industry). Contaminants from these two categories lead to elevated amounts of toxins in street dust. Street dust then reaches water sources through runoff, facilitating the transfer of toxins to environments and communities that rely on these water sources. For example, one method of measuring the runoff contamination of water sources involves magnetism. Magnetism measurement systems allow specialists to measure the differences in mineral magnetic parameters in samples of water, air, and vegetation. Unlike traditional methods of measuring pollutants, magnetism is relatively inexpensive, and can identify smaller particle sizes. Another method used to assess the amount and effects of water pollutants is to measure the amount of PM2.5 in rainfall. Measuring PM2.5 (the amount of aerodynamic diameter of particle≤2.5 μm in a given amount of air) is a common metric for assessing air quality. Comparing PM2.5 levels between air and rainfall samples allows scientists to determine the amount of air pollution being transferred to water sources. Pollutants in rainfall quickly and directly affect pollution in groundwater sources. In 2013, researchers in Beijing found a significant relationship between the amount of PM2.5 concentrations in the air and in rainfall. Studies showed that rainfall had a significant "washing" effect on PM2.5 in the air, transferring a large portion of these pollutants from the air to water sources. In this way, Beijing's notorious air pollution has a direct and significant impact on rainfall, and therefore, on water resources throughout the region. Controversies Amateurism and professionalism Pierre de Coubertin, founder of the IOC, was influenced by the ethos of the aristocracy as exemplified in the English public schools. The public schools subscribed to the belief that sport formed an important part of education and there was a prevailing concept of fairness in which practicing or training was considered cheating. As class structure evolved through the 20th century, the definition of the amateur athlete as an aristocratic gentleman became outdated. The advent of the state-sponsored "full-time amateur athlete" of the Eastern Bloc countries further eroded the ideology of the pure amateur, as it put the self-financed amateurs of the Western countries at a disadvantage. The Soviet Union entered teams of athletes who were all nominally students, soldiers, or working in a profession, but many of whom were in reality paid by the state to train on a full-time basis. Nevertheless, the IOC held to the traditional rules regarding amateurism. Near the end of the 1960s, the Canadian Amateur Hockey Association (CAHA) felt their amateur players could no longer be competitive against the Soviet team's full-time athletes and the other constantly improving European teams. They pushed for the ability to use players from professional leagues but met opposition from the IIHF and IOC. At the IIHF Congress in 1969, the IIHF decided to allow Canada to use nine non-NHL professional hockey players at the 1970 World Championships in Montreal and Winnipeg, Manitoba, Canada. The decision was reversed in January 1970 after Brundage said that ice hockey's status as an Olympic sport would be in jeopardy if the change was made. In response, Canada withdrew from international ice hockey competition and officials stated that they would not return until "open competition" was instituted. Beginning in the 1970s, amateurism requirements were gradually phased out of the Olympic Charter. After the 1988 Games, the IOC decided to make all professional athletes eligible for the Olympics, subject to the approval of the IFs. 1976 Winter Olympics (Denver, Colorado) The cities of Denver, Colorado, United States; Sion, Switzerland; Tampere, Finland; and Vancouver (with the Garibaldi mountains), Canada, made bids for the 1976 Winter Olympics. The Games were originally awarded to Denver on 12 May 1970, but a rise in costs led to Colorado voters' rejection on 7 November 1972, by a 3 to 2 margin, of a $5 million bond issue to finance the Games with public funds. Denver officially withdrew on 15 November, and the IOC then offered the Games to Whistler, British Columbia, Canada, but they too declined, owing to a change of government following elections. Whistler would go on to be associated with neighbouring Vancouver's successful bid for the 2010 Games. Salt Lake City, Utah, a 1972 Winter Olympics final candidate who would eventually host the 2002 Winter Olympics, offered itself as a potential host after the withdrawal of Denver. The IOC, still reeling from the Denver rejection, declined the offer from Salt Lake City and, on 5 February 1973, selected Innsbruck to host the 1976 Winter Olympics, the same city that had hosted the Games twelve years earlier. 2002 bid A scandal broke on 10 December 1998, when Swiss IOC member Marc Hodler, head of the coordination committee overseeing the organisation of the 2002 Games, announced that several members of the IOC had taken gifts. Although nothing strictly illegal had been done, it was felt that the acceptance of the gifts was morally dubious. Soon four independent investigations were underway: by the IOC, the United States Olympic Committee (USOC), the SLOC, and the United States Department of Justice. Before any of the investigations could even get under way, Tom Welch and David Johnson, the co-heads of the SLOC, both resigned their posts. Many others soon followed. The Department of Justice filed charges against the two: fifteen counts of bribery and fraud. As a result of the investigation, ten members of the IOC were expelled and another ten were sanctioned. Stricter rules were adopted for future bids, and caps were put into place as to how much IOC members could accept from bid cities. Additionally, new term and age limits were put into place for IOC membership, and fifteen former Olympic athletes were added to the committee. From sporting and business standpoints, however, Salt Lake 2002 was one of the most successful Winter Olympiads in history; records were set in both the broadcasting and marketing programs. Over 2 billion viewers watched more than 13 billion viewer-hours. The Games were also financially successful raising more money with fewer sponsors than any prior Olympic Games, which left SLOC with a surplus of $40 million. The surplus was used to create the Utah Athletic Foundation, which maintains and operates many of the remaining Olympic venues. Sex verification controversies Sex verification is a practice used by Olympic and other sporting institutions to ensure participants compete only in categories for their sex. Verifying the sex of Olympic participants dates back to ancient Greece when Kallipateira attempted to break Greek law by dressing as a man to enter the arena as a trainer. After she was discovered a new policy was erected wherein trainers, just as athletes, were made to attend naked in order to better assure all were male.   In more recent history, sex verification has taken many forms and been subject to dispute within various societal spheres. Before mandatory sex testing, Olympic officials relied on “nude parades” and doctor's notes. Successful women athletes perceived to be masculine were most likely to be targeted for inspection. In 1968, the International Olympic Committee (IOC) implemented compulsory sex verification at the Grenoble Winter Games where a lottery system was used to determine who would be inspected with a Barr body test. The scientific community also found fault in this policy for different reasons. The use of the Barr body test was evaluated by fifteen geneticists who unanimously agreed it was scientifically invalid. By the 1970s this method was replaced with PCR testing, as well as evaluating other factors including brain anatomy and behaviour in order to verify sex. Following continued backlash against mandatory sex testing of both forms, the IOC's Athletes' Commission successfully advocated for the end of the practice in 1999. Although sex testing was no longer mandated by IOC policy, women who did not present as feminine enough continued to be inspected based on suspicion in the 2000, 2004, and 2008 Summer Games. By 2011 the IOC created a Hyperandrogenism Regulation, which aimed to standardize natural testosterone levels in women athletes. This transition in sex testing was to assure a fairness within female categories. This was due to the belief that higher testosterone levels increased athletic ability and gave unfair advantages to certain women including intersex and transgender competitors. Any female athlete flagged for suspicion and whose testosterone surpassed regulation levels, was prohibited from competing until medical treatment brought their hormone levels within the standardized amounts. It has been argued by press, scholars, and politicians that some ethnicities are disproportionately impacted by this regulation and it has been alleged that the rule endorses hegemonic gender norms. Most notable cases of competition bans due to sex testing results are as follows: Maria José Martínez-Patiño (1985), Santhi Soundarajan (2006), Caster Semenya (2009), Annet Negesa (2012), and Dutee Chand (2014). In 2014 Dutee Chand was banned from competing internationally after being found to be in violation of the Hyperandrogenism Regulation. Following the decision of her appeal by the Court of Arbitration for Sport, the IOC suspended the policy for the 2016 and 2018 Games. Press advocated for the continued suspension of sex verification practices for the 2020 Tokyo Games. Other controversies: 2006–2013 In 2006, a report ordered by the Nagano region's governor said the Japanese city provided millions of dollars in an "illegitimate and excessive level of hospitality" to IOC members, including $4.4 million spent on entertainment alone. Earlier reports put the figure at approximately $14 million. The precise figures are unknown since Nagano, after the IOC asked that the entertainment expenditures not be made public, destroyed the financial records. International groups attempted to pressure the IOC to reject Beijing's bid in protest of the state of human rights in the People's Republic of China. One Chinese dissident who expressed similar sentiments was arrested and sentenced to two years in prison for calling on the IOC to do just that at the same time that IOC inspectors were touring the city. Amnesty International expressed concern in 2006 regarding the Olympic Games to be held in China in 2008, likewise expressing concerns over the human rights situation. The second principle in the Fundamental Principles of Olympism, Olympic Charter states that "The goal of Olympism is to place sport at the service of the harmonious development of man, with a view to promoting a peaceful society concerned with the preservation of human dignity." Amnesty International considers the policies and practices of the People's Republic as failing to meet that principle, and urged the IOC to press China to immediately enact human rights reform. In August 2008, the IOC issued DMCA take down notices on Tibetan Protest videos of the Beijing Olympics hosted on YouTube. YouTube and the Electronic Frontier Foundation (EFF) both pushed back against the IOC, which then withdrew their complaint. In 2010, the IOC was nominated for the Public Eye Awards. This award seeks to present "shame-on-you-awards to the nastiest corporate players of the year". Before the start of the 2012 Olympic Games, the IOC decided not to hold a minute of silence to honor the 11 Israeli Olympians who were killed 40 years prior in the Munich Massacre. Jacques Rogge, the then-IOC President, said it would be "inappropriate" to do so. Speaking of the decision, Israeli Olympian Shaul Ladany, who had survived the Munich Massacre, commented: "I do not understand. I do not understand, and I do not accept it". In February 2013, the IOC did not include wrestling as one of its core Olympic sports for the Summer Olympic programme for the 2020 Olympics. This decision was poorly received by the sporting and wrestling community. Wrestling was still part of the programme at the 2016 Summer Olympics in Rio de Janeiro. This decision was later overturned, and wrestling was a part of the 2020 Olympic Games in Tokyo. Russian doping scandal Media attention began growing in December 2014 when German broadcaster ARD reported on state-sponsored doping in Russia, comparing it to doping in East Germany. In November 2015, the World Anti-Doping Agency (WADA) published a report and the International Association of Athletics Federations (IAAF) suspended Russia indefinitely from world track and field events. The United Kingdom Anti-Doping agency later assisted WADA with testing in Russia. In June 2016, they reported that they were unable to fully carry out their work and noted intimidation by armed Federal Security Service (FSB) agents. After a Russian former lab director made allegations about the 2014 Winter Olympics in Sochi, WADA commissioned an independent investigation led by Richard McLaren. McLaren's investigation found corroborating evidence, concluding in a report published in July 2016 that the Ministry of Sport and the FSB had operated a "state-directed failsafe system" using a "disappearing positive [test] methodology" (DPM) from "at least late 2011 to August 2015". In response to these findings, WADA announced that RUSADA should be regarded as non-compliant with respect to the World Anti-Doping Code and recommended that Russia be banned from competing at the 2016 Summer Olympics. The IOC rejected the recommendation, stating that a separate decision would be made for each athlete by the relevant IF and the IOC, based on the athlete's individual circumstances. One day prior to the opening ceremony, 270 athletes were cleared to compete under the Russian flag, while 167 were removed because of doping. In contrast, the entire Kuwaiti team was banned from competing under their own flag (for a non-doping related matter). The IOC's decision on 24 July 2016 was criticised by athletes and writers. It received support from the European Olympic Committees, which said that Russia was "a valued member". Cam Cole of Canada's National Post said that the IOC had "caved, as it always does, defaulting to whatever compromise it could safely adopt without offending a superpower." Expressing disappointment, a member of the IOC Athletes' Commission, Hayley Wickenheiser, wrote, "I ask myself if we were not dealing with Russia would this decision to ban a nation [have] been an easier one? I fear the answer is yes." Writing for Deutsche Welle in Germany, Olivia Gerstenberger said that Bach had "flunked" his first serious test, adding, "With this decision, the credibility of the organization is shattered once more, while that of state-sponsored doping actually receives a minor boost." Bild (Germany) described Bach as "Putin's poodle". Paul Hayward, chief sports writer of The Daily Telegraph (UK), remarked, "The white flag of capitulation flies over the International Olympic Committee. Russia's deep political reach should have told us this would happen." Leaders of thirteen national anti-doping organisations wrote that the IOC had "violated the athletes' fundamental rights to participate in Games that meet the stringent requirements of the World Anti-Doping Code" and "[demonstrated that] it lacks the independence required to keep commercial and political interests from influencing the tough decisions necessary to protect clean sport." WADA's former chief investigation, Jack Robertson, said "The anti-doping code is now just suggestions to follow or not" and that "WADA handed the IOC that excuse [not enough time before the Olympics] by sitting on the allegations for close to a year." McLaren was dissatisfied with the IOC's handling of his report, saying "It was about state-sponsored doping and the mis-recording of doping results and they turned the focus into individual athletes and whether they should compete. [...] it was a complete turning upside down of what was in the report and passing over responsibility to all the different international federations." In contrast to the IOC, the IPC voted unanimously to ban the entire Russian team from the 2016 Summer Paralympics, having found evidence that the DPM was also in operation at the 2014 Winter Paralympics. On 5 December 2017, the IOC announced that the Russian Olympic Committee had been suspended effective immediately from the 2018 Winter Olympics. Athletes who had no previous drug violations and a consistent history of drug testing were to be allowed to compete under the Olympic Flag as an "Olympic Athlete from Russia" (OAR). Under the terms of the decree, Russian government officials were barred from the Games, and neither the country's flag nor anthem would be present. The Olympic Flag and Olympic Anthem will be used instead, and on 20 December 2017 the IOC proposed an alternate logo for the uniforms. IOC President Thomas Bach said that "after following due process [the IOC] has issued proportional sanctions for this systematic manipulation while protecting the clean athletes." The New York Times' Rebecca Ruiz and Tariq Panja reported the decision was "without precedent in Olympics history", while Sean Ingle at The Guardian noted the IOC's view that Russian doping was an "unprecedented attack on the integrity of the Olympic Games and sport". Hugo Lowell at the i newspaper, meanwhile, reported that the IOC nonetheless stopped short of a total ban against Russia from the Games. On 1 February 2018, the Court of Arbitration for Sport (CAS) found that the IOC provided insufficient evidence for 28 athletes, and overturned their IOC sanctions. For 11 other athletes, the CAS decided that there was sufficient evidence to uphold their Sochi sanctions, but reduced their lifetime bans to only the 2018 Winter Olympics. The IOC said in a statement that "the result of the CAS decision does not mean that athletes from the group of 28 will be invited to the Games. Not being sanctioned does not automatically confer the privilege of an invitation" and that "this [case] may have a serious impact on the future fight against doping". The IOC found it important to note that the CAS Secretary General "insisted that the CAS decision does not mean that these 28 athletes are innocent" and that they would consider an appeal against the court's decision. Later that month, the Russian Olympic Committee was reinstated by the IOC, despite numerous failed drug tests by Russian athletes in the 2018 Olympics, and the Russian Anti-Doping Agency was re-certified in September, despite the Russian officials not accepting the McLaren Report. The IOC was harshly criticized for their handling of the Russian doping scandal. After reinstating the Russian Olympic committee following the 2018 Winter Olympics, Jim Walden, attorney for Dr. Grigory Rodchenkov, who masterminded Russia's programme, called the move "weakness in the face of evil." 2018 ROC in Taiwan election interference controversy On 24 November 2018, the Republic of China in Taiwan held a referendum over a change in the naming of their Olympic representation, from "Chinese Taipei," a name agreed to in 1981 by the People's Republic of China, who denies the ROC's legitimacy, to simply "Taiwan", after the main island in the Free Area. In the immediate days prior to the referendum, the IOC, under pressure from the PRC government, issued a threatening statement, suggesting that if the team underwent the name change, the IOC had the right to exercise, "suspension of or withdrawal," of the team from the 2020 Tokyo Olympics. In response to the allegations of election interference, the IOC stated, "The IOC does not interfere with local procedures and fully respects freedom of expression. However, to avoid any unnecessary expectations or speculations, the IOC wishes to reiterate that this matter is under its jurisdiction." Subsequently, with many feeling significant IOC and PRC pressure, the referendum failed in Taiwan with 45.20% to 54.80%. Bid controversies: Rio 2016 and Tokyo 2020 On 1 March 2016, Owen Gibson of The Guardian reported that French financial prosecutors investigating corruption in world athletics had expanded their remit to include the bidding and voting processes for the Rio 2016 and Tokyo 2020 Olympics. The story followed an earlier report in January by Gibson, who revealed that Papa Massata Diack, the son of the then-IAAF president Lamine Diack, appeared to arrange for "parcels" to be delivered to six IOC members in 2008 when Qatar was bidding for the 2016 Olympic Games, though it failed to make it beyond the shortlisting stage. Qatar denied the allegations. Gibson then reported on 11 May 2016 that a €1.3m (£1m, $1.5m) payment from the Tokyo Olympic bid team to an account linked to Papa Diack was made during Japan's successful race to host the 2020 Games. The following day, French financial prosecutors confirmed they were investigating allegations of "corruption and money laundering" of more than $2m in suspicious payments made by the Tokyo 2020 Olympic bid to a secret bank account linked to Papa Diack. The string of exclusives by The Guardian prompted a response from Tsunekazu Takeda of the Tokyo 2020 bid committee on 17 May 2016, though he denied any allegations of wrongdoing, and refused to reveal details of the transfers. The controversy was reignited on 11 January 2019 after it emerged Takeda had been indicted on corruption charges in France over his role in the bid process. Beijing 2022 Winter Olympics The IOC has received criticism from numerous human rights groups and world governments, for continuing to allow Beijing to host the 2022 Winter Olympics, even in the wake of the release of the Xinjiang Papers, which documented the abuses by the Chinese government against the Uyghur Muslim population in Xinjiang, in what many governments have described as a genocide. Many government officials, notably those in the United States and the United Kingdom, called for a boycott of the 2022 winter games. The IOC has responded to concerns by saying that the Olympic Games must not be politicized. Some Nations, including the United States, diplomatically boycotted games, which prohibited a diplomatic delegation from representing a nation at the games, rather than a full boycott which would have also barred athletes from competing. In September 2021, the IOC suspended the National Olympic Committee of North Korea, after it failed to participate in the 2020 Summer Games over "COVID-19 Concerns". Many have speculated that this suspension was intended to send a message to other nations, that if they did not send athletes to the 2022 Winter Games, they could be suspended from participation in future Olympics. On 14 October 2021, vice-president of the IOC, John Coates, announced that the IOC had no plans to challenge the Chinese government on humanitarian issues, stating that the issues are "not within the IOC's remit". In December 2021, the United States House of Representatives voted unanimously for a resolution stating that the IOC had violated its own human rights commitments by cooperating with the Chinese government. In January 2022, the U.S. House of Representatives introduced legislation to strip the IOC of its tax exemption status in the United States. In November 2021, the IOC was criticized by Human Rights Watch (HRW) and others for its response to the 2021 disappearance of Peng Shuai, following her publishing of sexual assault allegations against former Chinese vice premier and high-ranking member of the Chinese Communist Party Zhang Gaoli. The IOC's response was criticized as complicit in assisting the Chinese government to silence Peng's sexual assault allegations. Zhang Gaoli previously led a steering committee for Beijing to secure the 2022 Winter Olympics. See also Association of International Olympic Winter Sports Federations (AIOWF) Association of IOC Recognised International Sports Federations (ARISF) Association of Summer Olympic International Federations (ASOIF) Deaflympics International Academy of Sport Science and Technology (AISTS) International Committee of Sports for the Deaf (ICSD) International Paralympic Committee Global Association of International Sports Federations (GAISF) FICTS (Fédération Internationale Cinéma Télévision Sportifs) (Organisation recognised by the IOC) References Further reading 1894 establishments in Switzerland International sports bodies based in Switzerland Sports organizations established in 1894 United Nations General Assembly observers Olympic organizations Supraorganizations Organisations based in Lausanne
[ 1.1576414108276367, 0.31606993079185486, -0.2885860204696655, 0.11644082516431808, -0.2958620488643646, -0.2551991641521454, -0.09959886223077774, 0.4861131012439728, -0.9834665060043335, 0.011859974823892117, -0.23320703208446503, -0.1506519913673401, -0.5522220134735107, 0.00880969688296...
15150
https://en.wikipedia.org/wiki/Integrated%20circuit
Integrated circuit
An integrated circuit or monolithic integrated circuit (also referred to as an IC, a chip, or a microchip) is a set of electronic circuits on one small flat piece (or "chip") of semiconductor material, usually silicon. Large numbers of tiny MOSFETs (metal–oxide–semiconductor field-effect transistors) integrate into a small chip. This results in circuits that are orders of magnitude smaller, faster, and less expensive than those constructed of discrete electronic components. The IC's mass production capability, reliability, and building-block approach to integrated circuit design has ensured the rapid adoption of standardized ICs in place of designs using discrete transistors. ICs are now used in virtually all electronic equipment and have revolutionized the world of electronics. Computers, mobile phones, and other digital home appliances are now inextricable parts of the structure of modern societies, made possible by the small size and low cost of ICs such as modern computer processors and microcontrollers. Very-large-scale integration was made practical by technological advancements in metal–oxide–silicon (MOS) semiconductor device fabrication. Since their origins in the 1960s, the size, speed, and capacity of chips have progressed enormously, driven by technical advances that fit more and more MOS transistors on chips of the same size – a modern chip may have many billions of MOS transistors in an area the size of a human fingernail. These advances, roughly following Moore's law, make the computer chips of today possess millions of times the capacity and thousands of times the speed of the computer chips of the early 1970s. ICs have two main advantages over discrete circuits: cost and performance. The cost is low because the chips, with all their components, are printed as a unit by photolithography rather than being constructed one transistor at a time. Furthermore, packaged ICs use much less material than discrete circuits. Performance is high because the IC's components switch quickly and consume comparatively little power because of their small size and proximity. The main disadvantage of ICs is the high cost of designing them and fabricating the required photomasks. This high initial cost means ICs are only commercially viable when high production volumes are anticipated. Terminology An integrated circuit is defined as: A circuit in which all or some of the circuit elements are inseparably associated and electrically interconnected so that it is considered to be indivisible for the purposes of construction and commerce. Circuits meeting this definition can be constructed using many different technologies, including thin-film transistors, thick-film technologies, or hybrid integrated circuits. However, in general usage integrated circuit has come to refer to the single-piece circuit construction originally known as a monolithic integrated circuit, often built on a single piece of silicon. History An early attempt at combining several components in one device (like modern ICs) was the Loewe 3NF vacuum tube from the 1920s. Unlike ICs, it was designed with the purpose of tax avoidance, as in Germany, radio receivers had a tax that was levied depending on how many tube holders a radio receiver had. It allowed radio receivers to have a single tube holder. Early concepts of an integrated circuit go back to 1949, when German engineer Werner Jacobi (Siemens AG) filed a patent for an integrated-circuit-like semiconductor amplifying device showing five transistors on a common substrate in a three-stage amplifier arrangement. Jacobi disclosed small and cheap hearing aids as typical industrial applications of his patent. An immediate commercial use of his patent has not been reported. Another early proponent of the concept was Geoffrey Dummer (1909–2002), a radar scientist working for the Royal Radar Establishment of the British Ministry of Defence. Dummer presented the idea to the public at the Symposium on Progress in Quality Electronic Components in Washington, D.C. on 7 May 1952. He gave many symposia publicly to propagate his ideas and unsuccessfully attempted to build such a circuit in 1956. Between 1953 and 1957, Sidney Darlington and Yasuo Tarui (Electrotechnical Laboratory) proposed similar chip designs where several transistors could share a common active area, but there was no electrical isolation to separate them from each other. The monolithic integrated circuit chip was enabled by the inventions of the planar process by Jean Hoerni and p–n junction isolation by Kurt Lehovec. Hoerni's invention was built on Mohamed M. Atalla's work on surface passivation, as well as Fuller and Ditzenberger's work on the diffusion of boron and phosphorus impurities into silicon, Carl Frosch and Lincoln Derick's work on surface protection, and Chih-Tang Sah's work on diffusion masking by the oxide. First integrated circuits A precursor idea to the IC was to create small ceramic substrates (so-called micromodules), each containing a single miniaturized component. Components could then be integrated and wired into a bidimensional or tridimensional compact grid. This idea, which seemed very promising in 1957, was proposed to the US Army by Jack Kilby and led to the short-lived Micromodule Program (similar to 1951's Project Tinkertoy). However, as the project was gaining momentum, Kilby came up with a new, revolutionary design: the IC. Newly employed by Texas Instruments, Kilby recorded his initial ideas concerning the integrated circuit in July 1958, successfully demonstrating the first working example of an integrated circuit on 12 September 1958. In his patent application of 6 February 1959, Kilby described his new device as "a body of semiconductor material … wherein all the components of the electronic circuit are completely integrated." The first customer for the new invention was the US Air Force. Kilby won the 2000 Nobel Prize in physics for his part in the invention of the integrated circuit. However, Kilby's invention was a hybrid integrated circuit (hybrid IC), rather than a monolithic integrated circuit (monolithic IC) chip. Kilby's IC had external wire connections, which made it difficult to mass-produce. Half a year after Kilby, Robert Noyce at Fairchild Semiconductor invented the first true monolithic IC chip. It was a new variety of integrated circuit, more practical than Kilby's implementation. Noyce's design was made of silicon, whereas Kilby's chip was made of germanium. Noyce's monolithic IC put all components on a chip of silicon and connected them with copper lines. Noyce's monolithic IC was fabricated using the planar process, developed in early 1959 by his colleague Jean Hoerni. Modern IC chips are based on Noyce's monolithic IC, rather than Kilby's hybrid IC. NASA's Apollo Program was the largest single consumer of integrated circuits between 1961 and 1965. TTL integrated circuits Transistor–transistor logic (TTL) was developed by James L. Buie in the early 1960s at TRW Inc. TTL became the dominant integrated circuit technology during the 1970s to early 1980s. Dozens of TTL integrated circuits were a standard method of construction for the processors of minicomputers and mainframe computers. Computers such as IBM 360 mainframes, PDP-11 minicomputers and the desktop Datapoint 2200 were built from bipolar integrated circuits, either TTL or the even faster emitter-coupled logic (ECL). MOS integrated circuits Nearly all modern IC chips are metal–oxide–semiconductor (MOS) integrated circuits, built from MOSFETs (metal–oxide–silicon field-effect transistors). The MOSFET (also known as the MOS transistor), which was invented by Mohamed M. Atalla and Dawon Kahng at Bell Labs in 1959, made it possible to build high-density integrated circuits. In contrast to bipolar transistors which required a number of steps for the p–n junction isolation of transistors on a chip, MOSFETs required no such steps but could be easily isolated from each other. Its advantage for integrated circuits was pointed out by Dawon Kahng in 1961. The list of IEEE milestones includes the first integrated circuit by Kilby in 1958, Hoerni's planar process and Noyce's planar IC in 1959, and the MOSFET by Atalla and Kahng in 1959. The earliest experimental MOS IC to be fabricated was a 16-transistor chip built by Fred Heiman and Steven Hofstein at RCA in 1962. General Microelectronics later introduced the first commercial MOS integrated circuit in 1964, a 120-transistor shift register developed by Robert Norman. By 1964, MOS chips had reached higher transistor density and lower manufacturing costs than bipolar chips. MOS chips further increased in complexity at a rate predicted by Moore's law, leading to large-scale integration (LSI) with hundreds of transistors on a single MOS chip by the late 1960s. Following the development of the self-aligned gate (silicon-gate) MOSFET by Robert Kerwin, Donald Klein and John Sarace at Bell Labs in 1967, the first silicon-gate MOS IC technology with self-aligned gates, the basis of all modern CMOS integrated circuits, was developed at Fairchild Semiconductor by Federico Faggin in 1968. The application of MOS LSI chips to computing was the basis for the first microprocessors, as engineers began recognizing that a complete computer processor could be contained on a single MOS LSI chip. This led to the inventions of the microprocessor and the microcontroller by the early 1970s. During the early 1970s, MOS integrated circuit technology enabled the very large-scale integration (VLSI) of more than 10,000 transistors on a single chip. At first, MOS-based computers only made sense when high density was required, such as aerospace and pocket calculators. Computers built entirely from TTL, such as the 1970 Datapoint 2200, were much faster and more powerful than single-chip MOS microprocessors such as the 1972 Intel 8008 until the early 1980s. Advances in IC technology, primarily smaller features and larger chips, have allowed the number of MOS transistors in an integrated circuit to double every two years, a trend known as Moore's law. Moore originally stated it would double every year, but he went on to change the claim to every two years in 1975. This increased capacity has been used to decrease cost and increase functionality. In general, as the feature size shrinks, almost every aspect of an IC's operation improves. The cost per transistor and the switching power consumption per transistor goes down, while the memory capacity and speed go up, through the relationships defined by Dennard scaling (MOSFET scaling). Because speed, capacity, and power consumption gains are apparent to the end user, there is fierce competition among the manufacturers to use finer geometries. Over the years, transistor sizes have decreased from 10s of microns in the early 1970s to 10 nanometers in 2017 with a corresponding million-fold increase in transistors per unit area. As of 2016, typical chip areas range from a few square millimeters to around 600 mm2, with up to 25 million transistors per mm2. The expected shrinking of feature sizes and the needed progress in related areas was forecast for many years by the International Technology Roadmap for Semiconductors (ITRS). The final ITRS was issued in 2016, and it is being replaced by the International Roadmap for Devices and Systems. Initially, ICs were strictly electronic devices. The success of ICs has led to the integration of other technologies, in an attempt to obtain the same advantages of small size and low cost. These technologies include mechanical devices, optics, and sensors. Charge-coupled devices, and the closely related active-pixel sensors, are chips that are sensitive to light. They have largely replaced photographic film in scientific, medical, and consumer applications. Billions of these devices are now produced each year for applications such as cellphones, tablets, and digital cameras. This sub-field of ICs won the Nobel Prize in 2009. Very small mechanical devices driven by electricity can be integrated onto chips, a technology known as microelectromechanical systems. These devices were developed in the late 1980s and are used in a variety of commercial and military applications. Examples include DLP projectors, inkjet printers, and accelerometers and MEMS gyroscopes used to deploy automobile airbags. Since the early 2000s, the integration of optical functionality (optical computing) into silicon chips has been actively pursued in both academic research and in industry resulting in the successful commercialization of silicon based integrated optical transceivers combining optical devices (modulators, detectors, routing) with CMOS based electronics. Photonic integrated circuits that use light are also being developed, using the emerging field of physics known as photonics. Integrated circuits are also being developed for sensor applications in medical implants or other bioelectronic devices. Special sealing techniques have to be applied in such biogenic environments to avoid corrosion or biodegradation of the exposed semiconductor materials. , the vast majority of all transistors are MOSFETs fabricated in a single layer on one side of a chip of silicon in a flat two-dimensional planar process. Researchers have produced prototypes of several promising alternatives, such as: various approaches to stacking several layers of transistors to make a three-dimensional integrated circuit (3DIC), such as through-silicon via, "monolithic 3D", stacked wire bonding, and other methodologies. transistors built from other materials: graphene transistors, molybdenite transistors, carbon nanotube field-effect transistor, gallium nitride transistor, transistor-like nanowire electronic devices, organic field-effect transistor, etc. fabricating transistors over the entire surface of a small sphere of silicon. modifications to the substrate, typically to make "flexible transistors" for a flexible display or other flexible electronics, possibly leading to a roll-away computer. As it becomes more difficult to manufacture ever smaller transistors, companies are using multi-chip modules, three-dimensional integrated circuits, package on package, High Bandwidth Memory and through-silicon vias with die stacking to increase performance and reduce size, without having to reduce the size of the transistors. Such techniques are collectively known as advanced packaging. Advanced packaging is mainly divided into 2.5D and 3D packaging. 2.5D describes approaches such as multi-chip modules while 3D describes approaches where dies are stacked in one way or another, such as package on package and high bandwidth memory. All approaches involve 2 or more dies in a single package. Alternatively, approaches such as 3D NAND stack multiple layers on a single die. Design The cost of designing and developing a complex integrated circuit is quite high, normally in the multiple tens of millions of dollars. Therefore, it only makes economic sense to produce integrated circuit products with high production volume, so the non-recurring engineering (NRE) costs are spread across typically millions of production units. Modern semiconductor chips have billions of components, and are too complex to be designed by hand. Software tools to help the designer are essential. Electronic Design Automation (EDA), also referred to as Electronic Computer-Aided Design (ECAD), is a category of software tools for designing electronic systems, including integrated circuits. The tools work together in a design flow that engineers use to design and analyze entire semiconductor chips. Types Integrated circuits can be broadly classified into analog, digital and mixed signal, consisting of analog and digital signaling on the same IC. Digital integrated circuits can contain billions of logic gates, flip-flops, multiplexers, and other circuits in a few square millimeters. The small size of these circuits allows high speed, low power dissipation, and reduced manufacturing cost compared with board-level integration. These digital ICs, typically microprocessors, DSPs, and microcontrollers, use boolean algebra to process "one" and "zero" signals. Among the most advanced integrated circuits are the microprocessors or "cores", used in personal computers, cell-phones, microwave ovens, etc. Several cores may be integrated together in a single IC or chip. Digital memory chips and application-specific integrated circuits (ASICs) are examples of other families of integrated circuits. In the 1980s, programmable logic devices were developed. These devices contain circuits whose logical function and connectivity can be programmed by the user, rather than being fixed by the integrated circuit manufacturer. This allows a chip to be programmed to do various LSI-type functions such as logic gates, adders and registers. Programmability comes in various forms – devices that can be programmed only once, devices that can be erased and then re-programmed using UV light, devices that can be (re)programmed using flash memory, and field-programmable gate arrays (FPGAs) which can be programmed at any time, including during operation. Current FPGAs can (as of 2016) implement the equivalent of millions of gates and operate at frequencies up to 1 GHz. Analog ICs, such as sensors, power management circuits, and operational amplifiers (op-amps), process continuous signals, and perform analog functions such as amplification, active filtering, demodulation, and mixing. ICs can combine analog and digital circuits on a chip to create functions such as analog-to-digital converters and digital-to-analog converters. Such mixed-signal circuits offer smaller size and lower cost, but must account for signal interference. Prior to the late 1990s, radios could not be fabricated in the same low-cost CMOS processes as microprocessors. But since 1998, radio chips have been developed using RF CMOS processes. Examples include Intel's DECT cordless phone, or 802.11 (Wi-Fi) chips created by Atheros and other companies. Modern electronic component distributors often further sub-categorize integrated circuits: Digital ICs are categorized as logic ICs (such as microprocessors and microcontrollers), memory chips (such as MOS memory and floating-gate memory), interface ICs (level shifters, serializer/deserializer, etc.), power management ICs, and programmable devices. Analog ICs are categorized as linear integrated circuits and RF circuits (radio frequency circuits). Mixed-signal integrated circuits are categorized as data acquisition ICs (including A/D converters, D/A converters, digital potentiometers), clock/timing ICs, switched capacitor (SC) circuits, and RF CMOS circuits. Three-dimensional integrated circuits (3D ICs) are categorized into through-silicon via (TSV) ICs and Cu-Cu connection ICs. Manufacturing Fabrication The semiconductors of the periodic table of the chemical elements were identified as the most likely materials for a solid-state vacuum tube. Starting with copper oxide, proceeding to germanium, then silicon, the materials were systematically studied in the 1940s and 1950s. Today, monocrystalline silicon is the main substrate used for ICs although some III-V compounds of the periodic table such as gallium arsenide are used for specialized applications like LEDs, lasers, solar cells and the highest-speed integrated circuits. It took decades to perfect methods of creating crystals with minimal defects in semiconducting materials' crystal structure. Semiconductor ICs are fabricated in a planar process which includes three key process steps photolithography, deposition (such as chemical vapor deposition), and etching. The main process steps are supplemented by doping and cleaning. More recent or high-performance ICs may instead use multi-gate FinFET or GAAFET transistors instead of planar ones, starting at the 22 nm node (Intel) or 16/14 nm nodes. Mono-crystal silicon wafers are used in most applications (or for special applications, other semiconductors such as gallium arsenide are used). The wafer need not be entirely silicon. Photolithography is used to mark different areas of the substrate to be doped or to have polysilicon, insulators or metal (typically aluminium or copper) tracks deposited on them. Dopants are impurities intentionally introduced to a semiconductor to modulate its electronic properties. Doping is the process of adding dopants to a semiconductor material. Integrated circuits are composed of many overlapping layers, each defined by photolithography, and normally shown in different colors. Some layers mark where various dopants are diffused into the substrate (called diffusion layers), some define where additional ions are implanted (implant layers), some define the conductors (doped polysilicon or metal layers), and some define the connections between the conducting layers (via or contact layers). All components are constructed from a specific combination of these layers. In a self-aligned CMOS process, a transistor is formed wherever the gate layer (polysilicon or metal) crosses a diffusion layer. Capacitive structures, in form very much like the parallel conducting plates of a traditional electrical capacitor, are formed according to the area of the "plates", with insulating material between the plates. Capacitors of a wide range of sizes are common on ICs. Meandering stripes of varying lengths are sometimes used to form on-chip resistors, though most logic circuits do not need any resistors. The ratio of the length of the resistive structure to its width, combined with its sheet resistivity, determines the resistance. More rarely, inductive structures can be built as tiny on-chip coils, or simulated by gyrators. Since a CMOS device only draws current on the transition between logic states, CMOS devices consume much less current than bipolar junction transistor devices. A random-access memory is the most regular type of integrated circuit; the highest density devices are thus memories; but even a microprocessor will have memory on the chip. (See the regular array structure at the bottom of the first image.) Although the structures are intricate – with widths which have been shrinking for decades – the layers remain much thinner than the device widths. The layers of material are fabricated much like a photographic process, although light waves in the visible spectrum cannot be used to "expose" a layer of material, as they would be too large for the features. Thus photons of higher frequencies (typically ultraviolet) are used to create the patterns for each layer. Because each feature is so small, electron microscopes are essential tools for a process engineer who might be debugging a fabrication process. Each device is tested before packaging using automated test equipment (ATE), in a process known as wafer testing, or wafer probing. The wafer is then cut into rectangular blocks, each of which is called a die. Each good die (plural dice, dies, or die) is then connected into a package using aluminium (or gold) bond wires which are thermosonically bonded to pads, usually found around the edge of the die. Thermosonic bonding was first introduced by A. Coucoulas which provided a reliable means of forming these vital electrical connections to the outside world. After packaging, the devices go through final testing on the same or similar ATE used during wafer probing. Industrial CT scanning can also be used. Test cost can account for over 25% of the cost of fabrication on lower-cost products, but can be negligible on low-yielding, larger, or higher-cost devices. , a fabrication facility (commonly known as a semiconductor fab) can cost over US$8 billion to construct. The cost of a fabrication facility rises over time because of increased complexity of new products; this is known as Rock's law. Such a facility features: The wafers up to 300 mm in diameter (wider than a common dinner plate). Copper interconnects where copper wiring replaces aluminum for interconnects. Low-κ dielectric insulators. Silicon on insulator (SOI). Strained silicon in a process used by IBM known as Strained silicon directly on insulator (SSDOI). Multigate devices such as tri-gate transistors. ICs can be manufactured either in-house by integrated device manufacturers (IDMs) or using the foundry model. IDMs are vertically integrated companies (like Intel and Samsung) that design, manufacture and sell their own ICs, and may offer design and/or manufacturing (foundry) services to other companies (the latter often to fabless companies). In the foundry model, fabless companies (like Nvidia only design and sell ICs and outsource all manufacturing to pure play foundries such as TSMC. These foundries may offer IC design services. Packaging The earliest integrated circuits were packaged in ceramic flat packs, which continued to be used by the military for their reliability and small size for many years. Commercial circuit packaging quickly moved to the dual in-line package (DIP), first in ceramic and later in plastic, which is commonly cresol-formaldehyde-novolac. In the 1980s pin counts of VLSI circuits exceeded the practical limit for DIP packaging, leading to pin grid array (PGA) and leadless chip carrier (LCC) packages. Surface mount packaging appeared in the early 1980s and became popular in the late 1980s, using finer lead pitch with leads formed as either gull-wing or J-lead, as exemplified by the small-outline integrated circuit (SOIC) package – a carrier which occupies an area about 30–50% less than an equivalent DIP and is typically 70% thinner. This package has "gull wing" leads protruding from the two long sides and a lead spacing of 0.050 inches. In the late 1990s, plastic quad flat pack (PQFP) and thin small-outline package (TSOP) packages became the most common for high pin count devices, though PGA packages are still used for high-end microprocessors. Ball grid array (BGA) packages have existed since the 1970s. Flip-chip Ball Grid Array packages, which allow for a much higher pin count than other package types, were developed in the 1990s. In an FCBGA package, the die is mounted upside-down (flipped) and connects to the package balls via a package substrate that is similar to a printed-circuit board rather than by wires. FCBGA packages allow an array of input-output signals (called Area-I/O) to be distributed over the entire die rather than being confined to the die periphery. BGA devices have the advantage of not needing a dedicated socket but are much harder to replace in case of device failure. Intel transitioned away from PGA to land grid array (LGA) and BGA beginning in 2004, with the last PGA socket released in 2014 for mobile platforms. , AMD uses PGA packages on mainstream desktop processors, BGA packages on mobile processors, and high-end desktop and server microprocessors use LGA packages. Electrical signals leaving the die must pass through the material electrically connecting the die to the package, through the conductive traces (paths) in the package, through the leads connecting the package to the conductive traces on the printed circuit board. The materials and structures used in the path these electrical signals must travel have very different electrical properties, compared to those that travel to different parts of the same die. As a result, they require special design techniques to ensure the signals are not corrupted, and much more electric power than signals confined to the die itself. When multiple dies are put in one package, the result is a system in package, abbreviated . A multi-chip module (), is created by combining multiple dies on a small substrate often made of ceramic. The distinction between a large MCM and a small printed circuit board is sometimes fuzzy. Packaged integrated circuits are usually large enough to include identifying information. Four common sections are the manufacturer's name or logo, the part number, a part production batch number and serial number, and a four-digit date-code to identify when the chip was manufactured. Extremely small surface-mount technology parts often bear only a number used in a manufacturer's lookup table to find the integrated circuit's characteristics. The manufacturing date is commonly represented as a two-digit year followed by a two-digit week code, such that a part bearing the code 8341 was manufactured in week 41 of 1983, or approximately in October 1983. Intellectual property The possibility of copying by photographing each layer of an integrated circuit and preparing photomasks for its production on the basis of the photographs obtained is a reason for the introduction of legislation for the protection of layout designs. The US Semiconductor Chip Protection Act of 1984 established intellectual property protection for photomasks used to produce integrated circuits. A diplomatic conference held at Washington, D.C. in 1989 adopted a Treaty on Intellectual Property in Respect of Integrated Circuits, also called the Washington Treaty or IPIC Treaty. The treaty is currently not in force, but was partially integrated into the TRIPS agreement. National laws protecting IC layout designs have been adopted in a number of countries, including Japan, the EC, the UK, Australia, and Korea. The UK enacted the Copyright, Designs and Patents Act, 1988, c. 48, § 213, after it initially took the position that its copyright law fully protected chip topographies. See British Leyland Motor Corp. v. Armstrong Patents Co. Criticisms of inadequacy of the UK copyright approach as perceived by the US chip industry are summarized in further chip rights developments. Australia passed the Circuit Layouts Act of 1989 as a sui generis form of chip protection. Korea passed the Act Concerning the Layout-Design of Semiconductor Integrated Circuits. Generations In the early days of simple integrated circuits, the technology's large scale limited each chip to only a few transistors, and the low degree of integration meant the design process was relatively simple. Manufacturing yields were also quite low by today's standards. As metal–oxide–semiconductor (MOS) technology progressed, millions and then billions of MOS transistors could be placed on one chip, and good designs required thorough planning, giving rise to the field of electronic design automation, or EDA. Some SSI and MSI chips, like discrete transistors, are still mass-produced, both to maintain old equipment and build new devices that require only a few gates. The 7400 series of TTL chips, for example, has become a de facto standard and remains in production. Small-scale integration (SSI) The first integrated circuits contained only a few transistors. Early digital circuits containing tens of transistors provided a few logic gates, and early linear ICs such as the Plessey SL201 or the Philips TAA320 had as few as two transistors. The number of transistors in an integrated circuit has increased dramatically since then. The term "large scale integration" (LSI) was first used by IBM scientist Rolf Landauer when describing the theoretical concept; that term gave rise to the terms "small-scale integration" (SSI), "medium-scale integration" (MSI), "very-large-scale integration" (VLSI), and "ultra-large-scale integration" (ULSI). The early integrated circuits were SSI. SSI circuits were crucial to early aerospace projects, and aerospace projects helped inspire development of the technology. Both the Minuteman missile and Apollo program needed lightweight digital computers for their inertial guidance systems. Although the Apollo Guidance Computer led and motivated integrated-circuit technology, it was the Minuteman missile that forced it into mass-production. The Minuteman missile program and various other United States Navy programs accounted for the total $4 million integrated circuit market in 1962, and by 1968, U.S. Government spending on space and defense still accounted for 37% of the $312 million total production. The demand by the U.S. Government supported the nascent integrated circuit market until costs fell enough to allow IC firms to penetrate the industrial market and eventually the consumer market. The average price per integrated circuit dropped from $50.00 in 1962 to $2.33 in 1968. Integrated circuits began to appear in consumer products by the turn of the 1970s decade. A typical application was FM inter-carrier sound processing in television receivers. The first application MOS chips were small-scale integration (SSI) chips. Following Mohamed M. Atalla's proposal of the MOS integrated circuit chip in 1960, the earliest experimental MOS chip to be fabricated was a 16-transistor chip built by Fred Heiman and Steven Hofstein at RCA in 1962. The first practical application of MOS SSI chips was for NASA satellites. Medium-scale integration (MSI) The next step in the development of integrated circuits introduced devices which contained hundreds of transistors on each chip, called "medium-scale integration" (MSI). MOSFET scaling technology made it possible to build high-density chips. By 1964, MOS chips had reached higher transistor density and lower manufacturing costs than bipolar chips. In 1964, Frank Wanlass demonstrated a single-chip 16-bit shift register he designed, with a then-incredible 120 MOS transistors on a single chip. The same year, General Microelectronics introduced the first commercial MOS integrated circuit chip, consisting of 120 p-channel MOS transistors. It was a 20-bit shift register, developed by Robert Norman and Frank Wanlass. MOS chips further increased in complexity at a rate predicted by Moore's law, leading to chips with hundreds of MOSFETs on a chip by the late 1960s. Large-scale integration (LSI) Further development, driven by the same MOSFET scaling technology and economic factors, led to "large-scale integration" (LSI) by the mid-1970s, with tens of thousands of transistors per chip. The masks used to process and manufacture SSI, MSI and early LSI and VLSI devices (such as the microprocessors of the early 1970s) were mostly created by hand, often using Rubylith-tape or similar. For large or complex ICs (such as memories or processors), this was often done by specially hired professionals in charge of circuit layout, placed under the supervision of a team of engineers, who would also, along with the circuit designers, inspect and verify the correctness and completeness of each mask. Integrated circuits such as 1K-bit RAMs, calculator chips, and the first microprocessors, that began to be manufactured in moderate quantities in the early 1970s, had under 4,000 transistors. True LSI circuits, approaching 10,000 transistors, began to be produced around 1974, for computer main memories and second-generation microprocessors. Very-large-scale integration (VLSI) "Very-large-scale integration" (VLSI) is a development started with hundreds of thousands of transistors in the early 1980s, and, as of 2016, transistor counts continue to grow beyond ten billion transistors per chip. Multiple developments were required to achieve this increased density. Manufacturers moved to smaller MOSFET design rules and cleaner fabrication facilities. The path of process improvements was summarized by the International Technology Roadmap for Semiconductors (ITRS), which has since been succeeded by the International Roadmap for Devices and Systems (IRDS). Electronic design tools improved, making it practical to finish designs in a reasonable time. The more energy-efficient CMOS replaced NMOS and PMOS, avoiding a prohibitive increase in power consumption. The complexity and density of modern VLSI devices made it no longer feasible to check the masks or do the original design by hand. Instead, engineers use tools to perform most functional verification work. In 1986, one-megabit random-access memory (RAM) chips were introduced, containing more than one million transistors. Microprocessor chips passed the million-transistor mark in 1989 and the billion-transistor mark in 2005. The trend continues largely unabated, with chips introduced in 2007 containing tens of billions of memory transistors. ULSI, WSI, SoC and 3D-IC To reflect further growth of the complexity, the term ULSI that stands for "ultra-large-scale integration" was proposed for chips of more than 1 million transistors. Wafer-scale integration (WSI) is a means of building very large integrated circuits that uses an entire silicon wafer to produce a single "super-chip". Through a combination of large size and reduced packaging, WSI could lead to dramatically reduced costs for some systems, notably massively parallel supercomputers. The name is taken from the term Very-Large-Scale Integration, the current state of the art when WSI was being developed. A system-on-a-chip (SoC or SOC) is an integrated circuit in which all the components needed for a computer or other system are included on a single chip. The design of such a device can be complex and costly, and whilst performance benefits can be had from integrating all needed components on one die, the cost of licensing and developing a one-die machine still outweigh having separate devices. With appropriate licensing, these drawbacks are offset by lower manufacturing and assembly costs and by a greatly reduced power budget: because signals among the components are kept on-die, much less power is required (see Packaging). Further, signal sources and destinations are physically closer on die, reducing the length of wiring and therefore latency, transmission power costs and waste heat from communication between modules on the same chip. This has led to an exploration of so-called Network-on-Chip (NoC) devices, which apply system-on-chip design methodologies to digital communication networks as opposed to traditional bus architectures. A three-dimensional integrated circuit (3D-IC) has two or more layers of active electronic components that are integrated both vertically and horizontally into a single circuit. Communication between layers uses on-die signaling, so power consumption is much lower than in equivalent separate circuits. Judicious use of short vertical wires can substantially reduce overall wire length for faster operation. Silicon labeling and graffiti To allow identification during production most silicon chips will have a serial number in one corner. It is also common to add the manufacturer's logo. Ever since ICs were created, some chip designers have used the silicon surface area for surreptitious, non-functional images or words. These are sometimes referred to as chip art, silicon art, silicon graffiti or silicon doodling. ICs and IC families The 555 timer IC The Operational amplifier 7400-series integrated circuits 4000-series integrated circuits, the CMOS counterpart to the 7400 series (see also: 74HC00 series) Intel 4004, generally regarded as the first commercially available microprocessor, which led to the famous 8080 CPU and then the IBM PC's 8088, 80286, 486 etc. The MOS Technology 6502 and Zilog Z80 microprocessors, used in many home computers of the early 1980s The Motorola 6800 series of computer-related chips, leading to the 68000 and 88000 series (used in some Apple computers and in the 1980s Commodore Amiga series) The LM-series of analog integrated circuits See also Chipset Integrated injection logic Ion implantation Microelectronics Monolithic microwave integrated circuit Multi-threshold CMOS Silicon-germanium Sound chip SPICE Chip carrier Dark silicon Integrated passive devices High-temperature operating life Thermal simulations for integrated circuits Heat generation in integrated circuits References Further reading External links General The first monolithic integrated circuits A large chart listing ICs by generic number including access to most of the datasheets for the parts. The History of the Integrated Circuit at Nobelprize.org Patents – Miniaturized electronic circuit – J.S. Kilby – Integrated semiconductor circuit device – R.F. Stewart – Method of making miniaturized electronic circuits – J.S. Kilby – Capacitor for miniaturized electronic circuits or the like – J. . Kilby Integrated circuit die manufacturing IC Die Photography – A gallery of IC die photographs Zeptobars – Yet another gallery of IC die photographs 1949 in computing 20th-century inventions American inventions Computer-related introductions in 1949 Digital electronics Discovery and invention controversies German inventions Semiconductor devices
[ 0.7314125299453735, 0.11940307170152664, -0.0005190902738831937, 0.4226284623146057, 0.02087707258760929, -0.09784979373216629, -0.45074108242988586, 0.1628817617893219, -0.1848232001066208, -0.5951871871948242, -0.3720393776893616, 0.3991686999797821, -0.588787853717804, 0.423742771148681...
15154
https://en.wikipedia.org/wiki/IBM%203270
IBM 3270
The IBM 3270 is a family of block oriented display and printer computer terminals introduced by IBM in 1971 and normally used to communicate with IBM mainframes. The 3270 was the successor to the IBM 2260 display terminal. Due to the text color on the original models, these terminals are informally known as green screen terminals. Unlike a character-oriented terminal, the 3270 minimizes the number of I/O interrupts required by transferring large blocks of data known as data streams, and uses a high speed proprietary communications interface, using coaxial cable. IBM no longer manufactures 3270 terminals, but the IBM 3270 protocol is still commonly used via TN3270 clients, 3270 terminal emulation or web interfaces to access mainframe-based applications, which are sometimes referred to as green screen applications. Principles The 3270 series was designed to connect with mainframe computers, often at a remote location, using the technology then available in the early 1970s. The main goal of the system was to maximize the number of terminals that could be used on a single mainframe. To do this, the 3270 was designed to minimize the amount of data transmitted, and minimize the frequency of interrupts to the mainframe. By ensuring the CPU is not interrupted at every keystroke, a 1970s-era IBM 3033 mainframe fitted with only 16 MB of main memory was able to support up to 17,500 3270 terminals under CICS. Most 3270 devices are clustered, with one or more displays or printers connected to a control unit (the 3275 and 3276 included an integrated control unit). Originally devices were connected to the control unit over coaxial cable; later Token Ring, twisted pair, or Ethernet connections were available. A local control unit attaches directly to the channel of a nearby mainframe. A remote control unit is connected to a communications line by a modem. Remote 3270 controllers are frequently multi-dropped, with multiple control units on a line. IBM 3270 devices are connected to a 3299 multiplexer or to the cluster controller, e.g., 3271, 3272, 3274, 3174, using RG-62, 93 ohm, coax cables in a point to point configuration with one dedicated cable per terminal. Data is sent with a bit rate of 2.3587 Mbit/s using a slightly modified differential Manchester encoding. Cable runs of up to are supported, although IBM documents routinely stated the maximum supported coax cable length was . Originally devices were equipped with BNC connectors, which later was replaced with special so-called DPC – Dual Purpose Connectors supporting the IBM Shielded twisted pair cabling system without the need for so-called red baluns. In a data stream, both text and control (or formatting functions) are interspersed allowing an entire screen to be painted as a single output operation. The concept of formatting in these devices allows the screen to be divided into fields (clusters of contiguous character cells) for which numerous field attributes, e.g., color, highlighting, character set, protection from modification, can be set. A field attribute occupies a physical location on the screen that also determines the beginning and end of a field. There are also character attributes associated with individual screen locations. Using a technique known as read modified, a single transmission back to the mainframe can contain the changes from any number of formatted fields that have been modified, but without sending any unmodified fields or static data. This technique enhances the terminal throughput of the CPU, and minimizes the data transmitted. Some users familiar with character interrupt-driven terminal interfaces find this technique unusual. There is also a read buffer capability that transfers the entire content of the 3270-screen buffer including field attributes. This is mainly used for debugging purposes to preserve the application program screen contents while replacing it, temporarily, with debugging information. Early 3270s offered three types of keyboards. The typewriter keyboard came in both a 66 key version, with no programmed function (PF) keys, and a 78 key version with twelve. Both versions had two Program Attention (PA) keys. The data entry keyboard had five PF keys and two PA keys. The operator console keyboard had twelve PF keys and two PA keys. Later 3270s had an Attention key, a Cursor Select key, a System Request key, twenty-four PF keys and three PA keys. There was also a TEST REQ key. When one of these keys is pressed, it will cause its control unit to generate an I/O interrupt to the host computer and present an Attention ID (AID) identifying which key was pressed. Application program functions such as termination, page-up, page-down, or help can be invoked by a single key press, thereby reducing the load on very busy processors. A downside to this approach was that vi-like behavior, responding to individual keystrokes, was not possible. For the same reason, a port of Lotus 1-2-3 to mainframes with 3279 screens did not meet with success because its programmers were not able to properly adapt the spreadsheet's user interface to a screen at a time rather than character at a time device. But end-user responsiveness was arguably more predictable with 3270, something users appreciated. Applications Following its introduction the 3270 and compatibles were by far the most commonly used terminals on IBM System/370 and successor systems. IBM and third-party software that included an interactive component took for granted the presence of 3270 terminals and provided a set of ISPF panels and supporting programs. Conversational Monitor System (CMS) in VM has support for the 3270 continuing to z/VM. Time Sharing Option (TSO) in OS/360 and successors has line mode command line support and also has facilities for full screen applications, e.g., ISPF. Device independent Display Operator Console Support (DIDOCS) in Multiple Console Support (MCS) for OS/360 and successors. The SPF and Program Development Facility (ISPF/PDF) editors for MVS and VM/SP (ISPF/PDF was available for VM, but little used) and the XEDIT editors for VM/SP through z/VM make extensive use of 3270 features. Customer Information Control System (CICS) has support for 3270 panels. Various versions of Wylbur have support for 3270, including support for full-screen applications. The modified data tag is well suited to converting formatted, structured punched card input onto the 3270 display device. With the appropriate programming, any batch program that uses formatted, structured card input can be layered onto a 3270 terminal. IBM's OfficeVision office productivity software enjoyed great success with 3270 interaction because of its design understanding. And for many years the PROFS calendar was the most commonly displayed screen on office terminals around the world. A version of the WordPerfect word processor ported to System/370 was designed for the 3270 architecture. SNA 3270 devices can be a part of an SNA – System Network Architecture network or non-SNA network. If the controllers are SNA connected, they appear to SNA as PU – Physical Unit type 2.0 (PU2.1 for APPN) nodes typically with LU – Logical Unit type 1, 2, and 3 devices connected. Local, channel attached, controllers are controlled by VTAM – Virtual Telecommunications Access Method. Remote controllers are controlled by the NCP – Network Control Program in the Front End Processor i.e. 3705, 3720, 3725, 3745, and VTAM. Third parties One of the first groups to write and provide operating system support for the 3270 and its early predecessors was the University of Michigan, who created the Michigan Terminal System in order for the hardware to be useful outside of the manufacturer. MTS was the default OS at Michigan for many years, and was still used at Michigan well into the 1990s. Many manufacturers, such as GTE, Hewlett Packard, Honeywell/Incoterm Div, Memorex, ITT Courier, McData, Harris, Alfaskop and Teletype/AT&T created 3270 compatible terminals, or adapted ASCII terminals such as the HP 2640 series to have a similar block-mode capability that would transmit a screen at a time, with some form validation capability. The industry distinguished between ‘System compatible controllers’ and ‘Plug compatibility controllers’, where ‘System compatibility’ meant that the 3rd party system was compatible with the 3270 data stream terminated in the unit, but not as ‘Plug compatibility’ equipment, also were compatible at the coax level thereby allowing IBM terminals to be connected to a 3rd party controller or vice versa. Modern applications are sometimes built upon legacy 3270 applications, using software utilities to capture (screen scraping) screens and transfer the data to web pages or GUI interfaces. In the early 1990s a popular solution to link PCs with the mainframes was the Irma board, an expansion card that plugged into a PC and connected to the controller through a coaxial cable. 3270 simulators for IRMA and similar adapters typically provide file transfers between the PC and the mainframe using the same protocol as the IBM 3270 PC. Models The IBM 3270 display terminal subsystem consists of displays, printers and controllers. Optional features for the 3275 and 3277 are the selector-pen, ASCII rather than EBCDIC character set, an audible alarm, and a keylock for the keyboard. A keyboard numeric lock was available and will lock the keyboard if the operator attempts to enter non-numeric data into a field defined as numeric. Later an Operator Identification Card Reader was added which could read information encoded on a magnetic stripe card. Displays Generally, 3277 models allow only upper-case input, except for the mixed EBCDIC/APL or text keyboards, which have lower case. Lower-case capability and dead keys were available as an RPQ (Request Price Quotation); these were added to the later 3278 & 3279 models. A version of the IBM PC called the 3270 PC, released in October 1983, includes 3270 terminal emulation. Later, the 3270 PC/G (graphics), 3270 PC/GX (extended graphics), 3270 Personal Computer AT, 3270 PC AT/G (graphics) and 3270 PC AT/GX (extended graphics) followed. CUT vs. DFT There are two types of 3270 displays in respect to where the 3270 data stream terminates. For CUT (Control Unit Terminal) displays, the stream terminates in the display controller, the controller instructs the display to move the cursor, position a character, etc. EBCDIC is translated by the controller into ‘3270 Character Set’, and keyboard scan-codes from the terminal, read by the controller through a poll, is translated by the controller into EBCDIC. For DFT (Distributed Function Terminal) type displays, most of the 3270 data stream is forwarded to the display by the controller. The display interprets the 3270 protocol itself. In addition to passing the 3270 data stream directly to the terminal, allowing for features like EAB - Extended Attributes, Graphics, etc., DFT also enabled multi sessions (up to 5 simultaneous), featured in the 3290 and 3194 multisession displays. This feature was also widely used in 2nd generation 3270 terminal emulation software. The MLT - Multiple Logical Terminals feature of the 3174 controller also enabled multiple sessions from a CUT type terminal. 3277 3277 model 1: 40×12 terminal 3277 model 2: 80×24 terminal, the biggest success of all 3277 GA: a 3277 with an RS232C I/O, often used to drive a Tektronix 4013 or 4015 graphic screen (monochrome) 3278 3278 models 1–5: next-generation, with accented characters and dead keys in countries that needed them model 1: 80x12 model 2: 80×24 model 2A: 80x24 (console) with 4 lines reserved model 3: 80×32 or 80x24 (switchable) model 4: 80×43 or 80x24 (switchable) model 5: 132×27 or 80×24 (switchable) 3278 PS: programmable characters; able to display monochrome graphics 3279 The IBM 3279 was IBM's first color terminal. IBM initially announced four models, and later added a fifth model for use as a processor console. Models model 2A: 80-24 base color model 2B: 80-24 extended color model 2C: 80-24 base color (console) with 4 lines reserved model 3A: 80-32 base color model 3B: 80-32 extended color Base colorIn base color mode the protection and intensity field attributes determine the color: {| class="wikitable" |+ Base color mode |- | Protection | Intensity | Color |- | Unprotected | Normal | Green |- | Unprotected | Intensified | Red |- | Protected | Normal | Blue |- | Protected | Intensified | White |} Extended colorIn extended color mode the color field and character attributes determine the color as one of Neutral (White) Red Blue Green Pink Yellow Turquoise The 3279 was introduced in 1979. The 3279 was widely used as an IBM mainframe terminal before PCs became commonly used for the purpose. It was part of the 3270 series, using the 3270 data stream. Terminals could be connected to a 3274 controller, either channel connected to an IBM mainframe or linked via an SDLC (Synchronous Data Link Control) link. In the Systems Network Architecture (SNA) protocol these terminals were logical unit type 2 (LU2). The basic models 2A and 3A used red, green for input fields, and blue and white for output fields. However, the models 2B and 3B supported seven colors, and when equipped with the optional Programmed Symbol Set feature had a loadable character set that could be used to show graphics. The IBM 3279 with its graphics software support, Graphical Data Display Manager (GDDM), was designed at IBM's Hursley Development Laboratory, near Winchester, England. 3290 The 3290 Information Panel a 17", amber monochrome plasma display unit announced March 8, 1983, capable of displaying in various modes, including four independent 3278 model 2 terminals, or a single 160×62 terminal; it also supports partitioning. The 3290 supports graphics through the use of programmed symbols. A 3290 application can divide its screen area up into as many as 16 separate explicit partitions (logical screens). The 3290 is a Distributed Function Terminal (DFT) and requires that the controller do a downstream load (DSL) of microcode from floppy or hard disk. 317x 3178: lower cost terminal (1983) 3179: low cost color terminal announced March 20, 1984. 3180 The 3180 was a monochrome display, introduced on March 20, 1984, that the user could configure for several different basic and extended display modes; all of the basic modes have a primary screen size of 24x80. Modes 2 and 2+ have a secondary size of 24x80, 3 and 3+ have a secondary size of 32x80, 4 and 4+ have a secondary size of 43x80 and 5 and 5+ have a secondary size of 27x132. An application can override the primary and alternate screen sizes for the extended mode. The 3180 also supported a single explicit partition that could be reconfigured under application control. 3191 The IBM 3191 Display Station is an economical monochrome CRT. Models A and B are 1920 characters 12-inch CRTs. Models D, E and L are 1920 or 2560 character 14-inch CRTs. 3192 Model C provides a 7-color 14 inch CRT with 80x24 or 80x32 characters Model D provides a green monochrome 15 inch CRT with 80x24, 80x32, 80x44 or 132x27 characters Model F provides a 7-color high-resolution 14 inch CRT with 80x24, 80x32, 80x44 or 132x27 characters Model G provides a 7-color 14 inch CRT with 80x24 or 80x32 characters Model L provides a green monochrome 15 inch CRT with 80x24, 80x32, 80x44 or 132x27 characters with a selector pen capability Model W provides a black and while 15 inch CRT with 80x24, 80x32, 80x44 or 132x27 characters 3193 The IBM 3193 Display Station is a high-resolution, portrait-type, monochrome, 380mm (15 inch) CRT image display providing up to letter or A4 size document display capabilities in addition to alphanumeric data. Compressed images can be sent to the 3193 from a scanner and decompression is performed in the 3193. Image data compression is a technique to save transmission time and reduce storage requirements. 3194 The IBM 3194 is a Display Station that features a 1.44MB 3.5" floppy drive and IND$FILE transfer. Model C provides a 12-inch color CRT with 80x24 or 80x32 characters Model D provides a 15-inch monochrome CRT with 80x24, 80x31, 80x44 or 132x27 characters Model H provides a 14-inch color CRT with 80x24, 80x31, 80x44 or 132x27 characters Subsequent 3104: low-cost R-loop connected terminal for the IBM 8100 system 3472 Infowindow Non-IBM Displays Several third-party manufacturers produced 3270 displays besides IBM. GTE GTE manufactured the IS/7800 Video Display System, nominally compatible with IBM 3277 displays attached to a 3271 or 3272. An incompatibility with the RA buffer order broke the logon screen in VM/SE (SEPP). Harris Harris manufactured the 8000 Series Terminal Systems, compatible with IBM 3277 displays attached to a 3271 or 3272. Harris later manufactured the 9100–9200 Information Processing Systems, which included 9178 9278 9279-2A 9279-3G 9280 Informer 270 376/SNA The Informer company manufactured a special version of their model 270 terminal that was compatible with IBM 3270 and its associated coax port to connect to a 3x74. Memorex Telex Memorex 1377, compatible with IBM 3277Attaches to 1371 or 1372 Documentation for the following is available at Memorex/Telex 2078 Memorex/Telex 2079 Memorex/Telex 2080 Memorex/Telex 2178 Memorex/Telex 2179 Nokia/Alfaskop Alfaskop Display Unit 4110 Alfaskop Display Unit 4112 AT&T AT&T introduced the Dataspeed 40 terminal/controller, compatible with the IBM 3275, in 1980. Graphics models IBM had two different implementations for supporting graphics. The first was implemented in the optional Programmed Symbol Sets (PSS) of the 3278, 3279 and 3287, which became a standard feature on the later 3279-S3G, a.k.a. 3279G, and was based on piecing together graphics with on-the-fly custom-defined symbols downloaded to the terminal. The second later implementation provided All Points Addressable (APA) graphics, a.k.a. Vector Graphics, allowing more efficient graphics than the older technique. The first terminal to support APA / Vector graphics was the 3179G terminal that later was replaced by first the 3192G and later the 3472G. Both implementations are supported by IBM GDDM - Graphical Data Display Manager first released in 1979, and by SAS with their SAS/GRAPH software. IBM 3279G IBM 3279-S3G, a.k.a. 3279G, terminal, announced in 1979, was IBM's graphics replacement for the 3279-3B with PSS. The terminal supported 7 colors and the graphics were made up of Programmable Symbol sets loaded to the terminal by the graphical application GDDM - Graphical Data Display Manager using Write Structured Field command. Programmable Symbols is an addition to the normal base character set consisting of Latin characters, numbers, etc. hardwired into the terminal. The 3279G supports 6 additional sets of symbols each supporting 190 symbols, resulting in a total of 1.140 programmable symbols. 3 of the Programmable Symbols sets have 3 planes each enabling coloring (red, blue, green) the Programmable Symbols downloaded to those sets, thereby supporting a total of 7 colors. Each ‘character’ cell consists of a 9x12 or a 9x16 dot matrix depending on the screen model. In order to program a cell with a symbol 18 bytes of data is needed making the data load quite heavy in some instances when compared to classic text screens. If one for example wishes to draw a hyperbole on the screen, the application must first compute the required Programmable Symbols to make up hyperbole and load them to the terminal. The next step is then for the application to paint the screen by addressing the screen cell position and select the appropriate symbol in one of the Programmable Symbols sets. The 3279G could be ordered with Attribute Select Keyboard enabling the operator to select attributes, colors and Programmable Symbols sets, making that version of the terminal quite distinctive. IBM 3179G The IBM 3179G announced June 18, 1985, is an IBM mainframe computer terminal providing 80×24 or 80×32 characters, 16 colors, plus graphics and is the first terminal to support the APA graphics apart from the 3270 PC/G, 3270 PC/GX, PC AT/G and PC AT/GX. 3179-G terminals combine text and graphics as separate layers on the screen. Although the text and graphics appear combined on the screen, the text layer actually sits over the graphics layer. The text layer contains the usual 3270-style cells which display characters (letters, numbers, symbols, or invisible control characters). The graphics layer is an area of 720×384 pixels. All Points Addressable or vector graphics is used to paint each pixel in one of sixteen colors. As well as being separate layers on the screen, the text and graphics layers are sent to the display in separate data streams, making them completely independent. The application i.e. GDDM sends the vector definitions to the 3179-G, and the work of activating the pixels that represent the picture (the vector-to-raster conversion) is done in the terminal itself. The datastream is related to the number of graphics primitives (lines, arcs, and so on) in the picture. Arcs are split into short vectors, that are sent to the 3179-G to be drawn. The 3179-G does not store graphic data, and so cannot offload any manipulation function from GDDM. In particular, with user control, each new viewing operation means that the data has to be regenerated and retransmitted. The 3179G is a distributed function terminal (DFT) and requires a downstream load (DSL) to load its microcode from the cluster controller's floppy disk or hard drive. The G10 model is a standard 122-key typewriter keyboard, while the G20 model offers APL on the same layout. Compatible with IBM System/370, IBM 4300 series, 303x, 308x, IBM 3090, and IBM 9370. IBM 3192G The IBM 3192G, announced in 1987 was the successor to 3179G. It featured 16 colors, and support for printers (i.e., IBM Proprinter) for local hardcopy with graphical support, or system printer, text only, implemented as an additional LU. IBM 3472G The IBM 3472G announced in 1989 was the successor to 3192G and featured five concurrent sessions, one of which could be graphics. Unlike the 3192-G, it needed no expansion unit to attach a mouse or color plotter, and it needed no expansion unit to attach a mouse or color plotter and it could also attach a tablet device for digitised input and a bar code reader. APL / APL2 Most IBM terminals, starting with the 3277, could be delivered with an APL keyboard, allowing the operator/programmer to enter APL symbolic instructions directly into the editor. In order to display APL symbols on the terminal, it had to be equipped with an APL character set in addition to the normal 3270-character set. The APL character set is addressed with a preceding Graphic Escape X'08' instruction. With the advent of the graphic terminal 3179G, the APL character set was expandable to 138 characters, called APL2. The added characters were: Diamond, Quad Null, Iota Underbar, Epsilon Underbar, Left Tack, Right Tack, Equal Underbar, Squished Quad, Quad Slope, and Dieresis Dot. Later APL2 symbols were supported by 3191 Models D, E, L, the CUT version of 3192, and 3472. Please note that IBM's version's of APL also is called APL2. Display-Controller 3275 remote display with controller function (no additional displays up to one printer) 3276 remote display with controller function. IBM 3276, announced in 1981, was a combined remote controller and display terminal, offering support for up to 8 displays, the 3276 itself included. By default, the 3276 had two type A coax ports, one for its own display, and one free for an additional terminal or printer. Up to three additional adapters, each supporting two coax devices, could be installed. The 3276 could connect to a non-SNA or SNA host using BSC or SDLC with line speed of up to 9,600 bit/s. The 3276 looked very much like the 3278 terminal, and the terminal feature of the 3276 itself, was more or less identical to those of the 3278. Printers 3284 matrix printer 3286 matrix printer 3287 printer, including a color model 3288 line printer 3268-1 R-loop connected stand-alone printer for the IBM 8100 system 4224 matrix printer In 1984 announced IPDS – Intelligent Printer Data Stream for online printing of AFP - Advanced Function Presentation documents, using bidirectional communications between the application and the printer. IPDS support among others printing of text, fonts, images, graphics, and barcodes. The IBM 4224 is one of the IPDS capable dot matrix printers. With the emergence of printers, including laser printers, from HP, Canon, and others, targeted the PC market, 3270 customers got an alternative to IBM 3270 printers by connecting this type of printers through printer protocol converters from manufactures like I-data, MPI Tech, Adacom, and others. The printer protocol converters basically emulate a 3287 type printer, and later extended to support IPDS. The IBM 3482 terminal, announced in 1992, offered a printer port, which could be used for host addressable printing as well as local screen copy.   In the later versions of 3174 the Asynchronous Emulation Adapter (AEA), supporting async RS-232 character-based type terminals, was enhanced to support printers equipped with a serial interface. Controllers 3271 remote controller 3272 local controller 3274 cluster controller (different models could be channel-attached or remote via BSC or SDLC communication lines, and had between eight and 32 co-ax ports) 3174 cluster controller On the 3274 and 3174, IBM used the term configuration support letter, sometimes followed by a release number, to designate a list of features together with the hardware and microcode needed to support them. By 1994 the 3174 Establishment Controller supported features such as attachment to multiple hosts via Token Ring, Ethernet, or X.25 in addition to the standard channel attach or SDLC; terminal attachment via twisted pair, Token Ring or Ethernet in addition to co-ax; and TN3270. They also support attachment of asynchronous ASCII terminals, printers, and plotters alongside 3270 devices. 3274 controller IBM introduced the 3274 controller family in 1977, replacing the 3271–2 product line. Where the features of the 3271–2 was hardcoded, the 3274 was controlled by its microcode that was read from the 3274's build in 8” floppy drive. 3274 models included 8, 12, 16, and 32 port remote controllers and 32-port local channel attached units. In total 16 different models were over time released to the market. The 3274-1A was an SNA physical Unit type 2.0 (PU2.0), required only a single address on the channel for all 32 devices and was not compatible with the 3272. The 3274-1B and 3274-1D were compatible with the 3272 and were referred to as local non-SNA models. The 3274 controllers introduced a new generation of the coax protocol, named Category A, to differentiate them from the Category B coax devices, such as the 3277 terminal and the 3284 printer. The first Category A coax devices were the 3278 and the first color terminal, the IBM 3279 Color Display Station. Enabling backward compatibility, it was possible to install coax boards, so-called ‘panels’, in groups of 4 or 8 supporting the now older Category B coax devices. A maximum of 16 Category B terminals could be supported, and only 8 if the controller were fully loaded with a maximum of 4 panels each supporting 8 Category A devices. During its life span, the 3274 supported several features including: Extended Data Stream Extended Highlighting Programmed Symbol Set (PSS) V.24 interfaces with speed up to 14.4 kbit/s V.35 interfaces with speed up to 56 kbit/s X.25 network attachment DFT – Distributed Function Terminal DSL – Downstream load for 3290 and 3179G 9901 and 3299 multiplexer Entry Assist Dual Logic (the feature of having two sessions from a CUT mode display). 3174 controller IBM introduced the 3174 Subsystem Control Unit in 1986, replacing the 3274 product line. The 3174 was designed to enhance the 3270 product line with many new connectivity options and features. Like the 3274, it was customizable, the main difference was that it used smaller (5.25-inch) diskettes than the 3274 (8-inch diskettes), and that the larger floor models had 10 slots for adapters, some of them were per default occupied by channel adapter/serial interface, coax adapter, etc. Unlike the 3274, any local models could be configured as either local SNA or local non-SNA, including PU2.1 (APPN). The models included: 01L, 01R, 02R, 03R, 51R, 52R, 53R, 81R and 82R. The 01L were local channel attached, the R models remotely connected, and the x3R Token Ring (upstream) connected. The 0xL/R models were floor units supporting up to 32 coax devices through the use of internal or external multiplexers (TMA/3299). The 5xR, models were shelf units with 9 coax ports, expandable to 16, by the connection of a 3299 multiplexer. The smallest desktop units, 8xR, had 4 coax ports expandable to 8, by the connection of a 3299 multiplexer. In the 3174 controller line IBM also slightly altered the classical BNC coax connector by changing the BNC connector to DPC – Dual Purpose Connector. The DPC female connector was a few millimeters longer and with a build-in switch that detected if a normal BNC connector were connected or a newer DPC connector was connected, thereby changing the physical layer from 93 ohm unbalanced coax, to 150 ohm balanced twisted-pair, thereby directly supporting the IBM Cabling system without the need for a so-called red balun. Configuration Support A was the first microcode offered with the 3174. It supported all the hardware modules present at the time, almost all the microcode features found in 3274 and introduced a number of new features including: Intelligent Printer Data Stream (IPDS), Multiple Logical Terminals, Country Extended Code Page (CECP), Response Time Monitor, and Token Ring configured as host interface. Configuration Support S, strangely following release A, introduced that a local or remote controller could act as 3270 Token-Ring DSPU Gateway, supporting up to 80 Downstream PU's. In 1989, IBM introduced a new range of 3174 models and changed the name from 3174 Subsystem Control Unit to 3174 Establishment Controller. The main new feature was support for an additional 32 coax port in floor models. The models included: 11L, 11R, 12R, 13R, 61R, 62R, 63R, 91R, and 92R. The new line of controllers came with Configuration Support B release 1, increased the number of supported DSPU on the Token-Ring gateway to 250 units, and introduced at the same time ‘Group Polling’ that offloaded the mainframe/VTAM polling requirement on the channel. Configuration Support B release 2 to 5, enabled features like: Local Format Storage (CICS Screen Buffer), Type Ahead, Null/Space Processing, ESCON channel support. In 1990–1991, a total of 7 more models were added: 21R, 21L, 12L, 22L, 22R, 23R, and 90R. The 12L offered ESCON fibreoptic channel attachment. The models with 2xx designation were equal to the 1xx models but repacked for rackmount and offered only 4 adapter slots. The 90R was not intended as a coax controller, it was positioned as a Token Ring 3270 DSPU gateway. However, it did have one coax port for configuring the unit, which with a 3299 multiplexer could be expanded to 8. The line of controllers came with Configuration Support C to support ISDN, APPN and Peer Communication. The ISDN feature allowed downstream devices, typically PC's, to connect to the 3174 via the ISDN network. The APPN support enabled the 3174 to be a part of an APPN network, and the Peer Communication allowed coax attached PC's with ‘Peer Communication Support’ to access resources on the Token-Ring network attached to the 3174. The subsequent releases 2 to 6 of Configuration Support C enables support for: Split screen, Copy from session to session, Calculator function, Access to AS/400 host and 5250 keyboard emulation, Numerous APPN enhancements, TCP/IP Telnet support that allowed 3270 CUT terminals to communicate with TCP/IP servers using Telnet, and at the same time in another screen to communicate with the mainframe using native 3270. TN3270 support where the 3174 could connect to a TN3270 host/gateway, eliminating SNA, but preserving the 3270 data stream. IP forwarding allowing bridging of LAN (Token-Ring or Ethernet) connected devices downstream to the 3174 to route IP traffic onto the Frame Relay WAN interface. In 1993, three new models were added with the announcement of Ethernet Adapter (FC 3045). The models were: 14R, 24R, and 64R. This was also IBM's final hardware announcement of 3174. The floor models, and the rack-mountable units, could be expanded with a range of special 3174 adapters, that by 1993 included: Channel adapter, ESCON adapter, Serial (V.24/V.35) adapter, Concurrent Communication Adapter, Coax adapter, Fiber optic “coax” adapter, Async adapter, ISDN adapter, Token-Ring adapter, Ethernet adapter, and line encryption adapter. In 1994, IBM incorporated the functions of RPQ 8Q0935 into Configuration Support-C release 3, including the TN3270 client. Non-IBM Controllers GTE The GTE IS/7800 Video Display Systems used one of two nominally IBM compatible controllers: 7801 (remote, 3271 equivalent) 7802 (local, 3277 equivalent) Harris The Harris 8000 Series Terminal Systems used one of four controllers: 8171 (remote, 3271 equivalent) 8172 (local, 3277 equivalent) 8181 (remote, 3271 equivalent) 8182 (local, 3277 equivalent) 9116 9210 9220 Home grown An alternative implementation of an establishment controller exists in form of OEC (Open Establishment Controller). It's a combination of an Arduino shield with a BNC connector and a Python program that runs on a POSIX system. OEC allows to connect a 3270 display to IBM mainframes via TN3270 or to other systems via VT100. Currently only CUT but not DFT displays are supported. Memorex Memorex had two controllers for its 3277-compatible 1377; the 1371 for remote connection and the 1372 for local connection. Later Memorex offered a series of controllers compatible with the IBM 3274 and 3174 2074 2076 2174 2274 Multiplexers IBM offered a device called 3299 that acted as a multiplexer between an accordingly configured 3274 controller, with the 9901 multiplexer feature, and up to 8 displays/printers, thereby reducing the number of coax cables between the 3x74 controller and the displays/printers. With the introduction of the 3174 controller internal or external multiplexers (3299) became mainstream as the 3174-1L controller was equipped with 4 multiplexed ports each supporting 8 devices. The internal 3174 multiplexer card was named TMA – Terminal Multiplexer adapter 9176. A number of vendors manufactured 3270 multiplexers before and alongside IBM including Fibronics and Adacom offering multiplexers that supported TTP – Telephone Twisted Pair as an alternative to coax, and fiber-optic links between the multiplexers. In some instances, the multiplexer worked as an “expansion” unit on smaller remote controllers including the 3174-81R / 91R, where the 3299 expanded the number of coax ports from 4 to 8, or the 3174-51R / 61R, where the 3299 expanded the number of coax ports from 8 to 16. Manufacture The IBM 3270 display terminal subsystem was designed and developed by IBM's Kingston, New York, laboratory (which later closed during IBM's difficult time in the mid-1990s). The printers were developed by the Endicott, New York, laboratory. As the subsystem expanded, the 3276 display-controller was developed by the Fujisawa laboratory, Japan, and later the Yamato laboratory; and the 3279 color display and 3287 color printer by the Hursley, UK, laboratory. The subsystem products were manufactured in Kingston (displays and controllers), Endicott (printers), and Greenock, Scotland, UK, (most products) and shipped to users in U.S. and worldwide. 3278 terminals continued to be manufactured in Hortolândia, near Campinas, Brazil as far as late 1980s, having its internals redesigned by a local engineering team using modern CMOS technology, while retaining its external look and feel. Telnet 3270 Telnet 3270, or tn3270 describes both the process of sending and receiving 3270 data streams using the telnet protocol and the software that emulates a 3270 class terminal that communicates using that process. tn3270 allows a 3270 terminal emulator to communicate over a TCP/IP network instead of an SNA network. Telnet 3270 can be used for either terminal or print connections. Standard telnet clients cannot be used as a substitute for tn3270 clients, as they use fundamentally different techniques for exchanging data. Technical Information 3270 character set The 3270 displays are available with a variety of keyboards and character sets. The following table shows the 3275/3277/3284–3286 character set for US English EBCDIC (optional characters were available for US ASCII, and UK, French, German, and Italian EBCDIC). On the 3275 and 3277 terminals without the a text feature, lower case characters display as uppercase. NL, EM, DUP, and FM control characters display and print as 5, 9, *, and ; characters, respectively, except by the printer when WCC or CCC bits 2 and 3 = '00'b, in which case NL and EM serve their control function and do not print. Data stream Data sent to the 3270 consist of commands, a Copy Control Character (CCC) or Write Control Character (WCC) if appropriate, a device address for copy, orders, character data and structured fields. Commands instruct the 3270 control unit to perform some action on a specified device, such as a read or write. Orders are sent as part of the data stream to control the format of the device buffer. Structured fields are to convey additional control functions and data to or from the terminal. On a local non-SNA controller, the command is a CCW opcode rather than the first byte of the outbound display stream; on all other controllers, the command is the first byte of the display stream, exclusive of protocol headers. Commands The following table includes datastream commands and CCW opcodes for local non-SNA controllers; it does not include CCW opcodes for local SNA controllers. Write control character The data sent by Write or Erase/Write consists of the command code itself followed by a Write Control Character (WCC) optionally followed by a buffer containing orders or data (or both). The WCC controls the operation of the device. Bits may start printer operation and specify a print format. Other bit settings will sound the audible alarm if installed, unlock the keyboard to allow operator entry, or reset all the Modified Data Tags in the device buffer. Orders Orders consist of the order code byte followed by zero to three bytes of variable information. Attributes The 3270 has three kinds of attributes: Field attributes Extended attributes Character attributes Field attributes The original 3277 and 3275 displays used an 8-bit field attribute byte of which five bits were used. Bits 0 and 1 are set so that the attribute will always be a valid EBCDIC (or ASCII) character. Bit 2 is zero to indicate that the associated field is unprotected (operator could enter data) or one for protected. Bit 3 is zero to indicate that this field, if unprotected, could accept alphanumeric input. One indicates that only numeric input is accepted, and automatically shifts to numeric for some keyboards. Bit 4 and 5 operate in tandem: '00'B indicate that the field is displayed on the screen and is not selector-pen detectable. '01'B indicates that the field is displayable and selector-pen detectable. '10'B indicates that the field is intensified (bright), displayable, and selector-pen detectable. '11'B indicates that the field is non-display, non-printable, and not pen detectable. This last can be used in conjunction with the modified data tag to imbed static data on the screen that will be read each time data was read from the device. Bit 7 is the "Modified Data Tag", where '0' indicates that the associated field has not been modified by the operator and '1' indicates that it has been modified. As noted above, this bit can be set programmatically to cause the field to be treated as modified. Later models include base color: "Base color (four colors) can be produced on color displays and color printers from current 3270 application programs by use of combinations of the field intensify and field protection attribute bits. For more information on color, refer to IBM 3270 Information System: Color and Programmed Symbols, GA33-3056." Extended attributes The 3278 and 3279 and later models used extended attributes to add support for seven colors, blinking, reverse video, underscoring, field outlining, field validation, and programmed symbols. Character attributes The 3278 and 3279 and later models allowed attributes on individual characters in a field to override the corresponding field attributes. Buffer addressing 3270 displays and printers have a buffer containing one byte for every screen position. For example, a 3277 model 2 featured a screen size of 24 rows of 80 columns for a buffer size of 1920 bytes. Bytes are addressed from zero to the screen size minus one, in this example 1919. "There is a fixed relationship between each ... buffer storage location and its position on the display screen." Most orders start operation at the "current" buffer address, and executing an order or writing data will update this address. The buffer address can be set directly using the Set Buffer Address (SBA) order, often followed by Start Field or Start Field Extended. For a device with a 1920 character display a twelve bit address is sufficient. Later 3270s with larger screen sizes use fourteen or sixteen bits. Addresses are encoded within orders in two bytes. For twelve bit addresses the high order two bits of each byte are set to form valid EBCDIC (or ASCII) characters. For example, address 0 is coded as X'4040', or space-space, address 1919 is coded as X'5D7F', or ''. Programmers hand-coding panels usually keep the table of addresses from the 3270 Component Description or the 3270 Reference Card handy. For fourteen and sixteen-bit address, the address uses contiguous bits in two bytes. Example The following data stream writes an attribute in row 24, column 1, writes the (protected) characters '> ' in row 24, columns 2 and 3, and creates an unprotected field on row 24 from columns 5-79. Because the buffer wraps around an attribute is placed on row 24, column 80 to terminate the input field. This data stream would normally be written using an Erase/Write command which would set undefined positions on the screen to '00'x. Values are given in hexadecimal. Data Description D3 WCC [reset device + restore (unlock) keyboard + reset MDT] 11 5C F0 SBA Row 24 Column 1 1D F0 SF/Attribute [protected, alphanumeric, display normal intensity, not pen-detectable, MDT off] 6E 40 '> ' 1D 40 SF/Attribute [unprotected, alphanumeric, display normal intensity, not pen-detectable, MDT off] SBA is not required here since this is being written at the current buffer position 13 IC - cursor displays at current position: Row 24, column 5 11 5D 7F SBA Row 24 Column 80 1D F0 SF/Attribute [protected, alphanumeric, display normal intensity, not pen-detectable, MDT off] Extended Data Stream Most 3270 terminals newer than the 3275, 3277, 3284 and 3286 support an extended data stream (EDS) that allows many new capabilities, including: Display buffers larger than 4096 characters Additional field attributes, e.g., color Character attributes within a field Redefining display geometry Querying terminal characteristics Programmed Symbol Sets All Points Addressable (APA) graphics See also 3270 emulator List of IBM products IBM 5250 display terminal subsystem for IBM AS/400 and IBM System/3X family Notes References 3174Intro 3270ColorPSS 3270Intro 3270DS 3270CS 3274Desc RFC1041 RFC1576 RFC2355 RFC6270 External links Partial IBM history noting the unveiling of the 3270 display system in 1971 3270 Information Display System - 3270 Data Stream Programmer's Reference from IBM Introduction to Telnet 3270 from Cisco - Telnet 3270 Regime Option - TN3270 Current Practices - TN3270 Enhancements 3270 Data Stream Programming rbanffy/3270font: A TTF remake of the font from the 3270 3270 3270 Block-oriented terminal 3270 Multimodal interaction History of human–computer interaction
[ -0.5987269282341003, 0.08456335961818695, 0.4444109797477722, 0.3034863770008087, 0.007716900669038296, 0.5516936779022217, -0.3369118571281433, 0.3832048177719116, -0.2757267653942108, -0.059672679752111435, 0.20634029805660248, 0.27150747179985046, -0.4567413032054901, 0.0962515994906425...
15155
https://en.wikipedia.org/wiki/I.%20M.%20Pei
I. M. Pei
Ieoh Ming Pei ( ; ; April 26, 1917 – May 16, 2019) was a Chinese-American architect. Raised in Shanghai, Pei drew inspiration at an early age from the garden villas at Suzhou, the traditional retreat of the scholar-gentry to which his family belonged. In 1935, he moved to the United States and enrolled in the University of Pennsylvania's architecture school, but he quickly transferred to the Massachusetts Institute of Technology. He was unhappy with the focus at both schools on Beaux-Arts architecture, and spent his free time researching emerging architects, especially Le Corbusier. After graduating, he joined the Harvard Graduate School of Design (GSD) and became a friend of the Bauhaus architects Walter Gropius and Marcel Breuer. In 1948, Pei was recruited by New York City real estate magnate William Zeckendorf, for whom he worked for seven years before establishing an independent design firm in 1955, I. M. Pei & Associates. In 1966 that became I. M. Pei & Partners, and in 1989 became Pei Cobb Freed & Partners. Pei retired from full-time practice in 1990. In his retirement, he worked as an architectural consultant primarily from his sons' architectural firm Pei Partnership Architects. Pei's first major recognition came with the Mesa Laboratory at the National Center for Atmospheric Research in Colorado (designed in 1961, and completed in 1967). His new stature led to his selection as chief architect for the John F. Kennedy Library in Massachusetts. He went on to design Dallas City Hall and the East Building of the National Gallery of Art. He returned to China for the first time in 1975 to design a hotel at Fragrant Hills, and designed Bank of China Tower, Hong Kong, a skyscraper in Hong Kong for the Bank of China fifteen years later. In the early 1980s, Pei was the focus of controversy when he designed a glass-and-steel pyramid for the Louvre in Paris. He later returned to the world of the arts by designing the Morton H. Meyerson Symphony Center in Dallas, the Miho Museum in Japan, Shigaraki, near Kyoto, and the chapel of the junior and high school: MIHO Institute of Aesthetics, the Suzhou Museum in Suzhou, Museum of Islamic Art in Qatar, and the Grand Duke Jean Museum of Modern Art, abbreviated to Mudam, in Luxembourg. Pei won a wide variety of prizes and awards in the field of architecture, including the AIA Gold Medal in 1979, the first Praemium Imperiale for Architecture in 1989, and the Lifetime Achievement Award from the Cooper-Hewitt, National Design Museum, in 2003. In 1983, he won the Pritzker Prize, which is sometimes referred to as the Nobel Prize of architecture. Childhood I. M. Pei's ancestry traces back to the Ming dynasty, when his family moved from Anhui province to Suzhou. The family made their wealth in medicinal herbs, then proceeded to join the ranks of the scholar-gentry. Ieoh Ming Pei was born on April 26, 1917, to Tsuyee and Lien Kwun, and the family moved to Hong Kong one year later. The family eventually included five children. As a boy, Pei was very close to his mother, a devout Buddhist who was recognized for her skills as a flautist. She invited him (and not his brothers or sisters) to join her on meditation retreats. His relationship with his father was less intimate. Their interactions were respectful but distant. Pei's ancestors' success meant that the family lived in the upper echelons of society, but Pei said his father was "not cultivated in the ways of the arts". The younger Pei, drawn more to music and other cultural forms than to his father's domain of banking, explored art on his own. "I have cultivated myself," he said later. Pei studied in St. Paul's College in Hong Kong as a child. When Pei was 10, his father received a promotion and relocated with his family to Shanghai. Pei attended St. John's Middle School, the secondary school of St. John's University that was run by Anglican missionaries. Academic discipline was rigorous; students were allowed only one half-day each month for leisure. Pei enjoyed playing billiards and watching Hollywood movies, especially those of Buster Keaton and Charlie Chaplin. He also learned rudimentary English skills by reading the Bible and novels by Charles Dickens. Shanghai's many international elements gave it the name "Paris of the East". The city's global architectural flavors had a profound influence on Pei, from The Bund waterfront area to the Park Hotel, built in 1934. He was also impressed by the many gardens of Suzhou, where he spent the summers with extended family and regularly visited a nearby ancestral shrine. The Shizilin Garden, built in the 14th century by a Buddhist monk and owned by Pei's uncle Bei Runsheng, was especially influential. Its unusual rock formations, stone bridges, and waterfalls remained etched in Pei's memory for decades. He spoke later of his fondness for the garden's blending of natural and human-built structures. Soon after the move to Shanghai, Pei's mother developed cancer. As a pain reliever, she was prescribed opium, and assigned the task of preparing her pipe to Pei. She died shortly after his thirteenth birthday, and he was profoundly upset. The children were sent to live with extended family; their father became more consumed by his work and more physically distant. Pei said: "My father began living his own separate life pretty soon after that." His father later married a woman named Aileen, who moved to New York later in her life. Education and formative years As Pei neared the end of his secondary education, he decided to study at a university. He was accepted in a number of schools, but decided to enroll at the University of Pennsylvania. Pei's choice had two roots. While studying in Shanghai, he had closely examined the catalogs for various institutions of higher learning around the world. The architectural program at the University of Pennsylvania stood out to him. The other major factor was Hollywood. Pei was fascinated by the representations of college life in the films of Bing Crosby, which differed tremendously from the academic atmosphere in China. "College life in the U.S. seemed to me to be mostly fun and games", he said in 2000. "Since I was too young to be serious, I wanted to be part of it ... You could get a feeling for it in Bing Crosby's movies. College life in America seemed very exciting to me. It's not real, we know that. Nevertheless, at that time it was very attractive to me. I decided that was the country for me." Pei added that "Crosby's films in particular had a tremendous influence on my choosing the United States instead of England to pursue my education." In 1935 Pei boarded a boat and sailed to San Francisco, then traveled by train to Philadelphia. What he found once he arrived, however, differed vastly from his expectations. Professors at the University of Pennsylvania based their teaching in the Beaux-Arts style, rooted in the classical traditions of ancient Greece and Rome. Pei was more intrigued by modern architecture, and also felt intimidated by the high level of drafting proficiency shown by other students. He decided to abandon architecture and transferred to the engineering program at Massachusetts Institute of Technology (MIT). Once he arrived, however, the dean of the architecture school commented on his eye for design and convinced Pei to return to his original major. MIT's architecture faculty was also focused on the Beaux-Arts school, and Pei found himself uninspired by the work. In the library he found three books by the Swiss-French architect Le Corbusier. Pei was inspired by the innovative designs of the new International Style, characterized by simplified form and the use of glass and steel materials. Le Corbusier visited MIT in , an occasion which powerfully affected Pei: "The two days with Le Corbusier, or 'Corbu' as we used to call him, were probably the most important days in my architectural education." Pei was also influenced by the work of U.S. architect Frank Lloyd Wright. In 1938 he drove to Spring Green, Wisconsin, to visit Wright's famous Taliesin building. After waiting for two hours, however, he left without meeting Wright. Although he disliked the Beaux-Arts emphasis at MIT, Pei excelled in his studies. "I certainly don't regret the time at MIT", he said later. "There I learned the science and technique of building, which is just as essential to architecture." Pei received his B.Arch. degree in 1940; his thesis was titled "Standardized Propaganda Units for War Time and Peace Time China". While visiting New York City in the late 1930s, Pei met a Wellesley College student named Eileen Loo. They began dating and married in the spring of 1942. She enrolled in the landscape architecture program at Harvard University, and Pei was thus introduced to members of the faculty at Harvard's Graduate School of Design (GSD). He was excited by the lively atmosphere and joined the GSD in . Less than a month later, Pei suspended his work at Harvard to join the National Defense Research Committee, which coordinated scientific research into U.S. weapons technology during World War II. Pei's background in architecture was seen as a considerable asset; one member of the committee told him: "If you know how to build you should also know how to destroy." The fight against Germany was ending, so he focused on the Pacific War. The U.S. realized that its bombs used against the stone buildings of Europe would be ineffective against Japanese cities, mostly constructed from wood and paper; Pei was assigned to work on incendiary bombs. Pei spent two and a half years with the NDRC, but revealed few details of his work. In 1945 Eileen gave birth to a son, T'ing Chung; she withdrew from the landscape architecture program in order to care for him. Pei returned to Harvard in the autumn of 1945, and received a position as assistant professor of design. The GSD was developing into a hub of resistance to the Beaux-Arts orthodoxy. At the center were members of the Bauhaus, a European architectural movement that had advanced the cause of modernist design. The Nazi regime had condemned the Bauhaus school, and its leaders left Germany. Two of these, Walter Gropius and Marcel Breuer, took positions at the Harvard GSD. Their iconoclastic focus on modern architecture appealed to Pei, and he worked closely with both men. One of Pei's design projects at the GSD was a plan for an art museum in Shanghai. He wanted to create a mood of Chinese authenticity in the architecture without using traditional materials or styles. The design was based on straight modernist structures, organized around a central courtyard garden, with other similar natural settings arranged nearby. It was very well received; Gropius, in fact, called it "the best thing done in [my] master class." Pei received his M.Arch. degree in 1946, and taught at Harvard for another two years. Career 1948–1956: early career with Webb and Knapp In the spring of 1948, Pei was recruited by New York real estate magnate William Zeckendorf to join a staff of architects for his firm of Webb and Knapp to design buildings around the country. Pei found Zeckendorf's personality the opposite of his own; his new boss was known for his loud speech and gruff demeanor. Nevertheless, they became good friends and Pei found the experience personally enriching. Zeckendorf was well connected politically, and Pei enjoyed learning about the social world of New York's city planners. His first project for Webb and Knapp was an apartment building with funding from the Housing Act of 1949. Pei's design was based on a circular tower with concentric rings. The areas closest to the supporting pillar handled utilities and circulation; the apartments themselves were located toward the outer edge. Zeckendorf loved the design and even showed it off to Le Corbusier when they met. The cost of such an unusual design was too high, however, and the building never moved beyond the model stage. Pei finally saw his architecture come to life in 1949, when he designed a two-story corporate building for Gulf Oil in Atlanta, Georgia. The building was demolished in February 2013 although the front facade will be retained as part of an apartment development. His use of marble for the exterior curtain wall brought praise from the journal Architectural Forum. Pei's designs echoed the work of Mies van der Rohe in the beginning of his career as also shown in his own weekend-house in Katonah, New York in 1952. Soon Pei was so inundated with projects that he asked Zeckendorf for assistants, which he chose from his associates at the GSD, including Henry N. Cobb and Ulrich Franzen. They set to work on a variety of proposals, including the Roosevelt Field Shopping Mall on Long Island. The team also redesigned the Webb and Knapp office building, transforming Zeckendorf's office into a circular space with teak walls and a glass clerestory. They also installed a control panel into the desk that allowed their boss to control the lighting in his office. The project took one year and exceeded its budget, but Zeckendorf was delighted with the results. In 1952, Pei and his team began work on a series of projects in Denver, Colorado. The first of these was the Mile High Center, which compressed the core building into less than 25 percent of the total site; the rest is adorned with an exhibition hall and fountain-dotted plazas. One block away, Pei's team also redesigned Denver's Courthouse Square, which combined office spaces, commercial venues, and hotels. These projects helped Pei conceptualize architecture as part of the larger urban geography. "I learned the process of development," he said later, "and about the city as a living organism." These lessons, he said, became essential for later projects. Pei and his team also designed a united urban area for Washington, D.C., called L'Enfant Plaza (named for French-American architect Pierre Charles L'Enfant). Pei's associate Araldo Cossutta was the lead architect for the plaza's North Building (955 L'Enfant Plaza SW) and South Building (490 L'Enfant Plaza SW). Vlastimil Koubek was the architect for the East Building (L'Enfant Plaza Hotel, located at 480 L'Enfant Plaza SW), and for the Center Building (475 L'Enfant Plaza SW; now the United States Postal Service headquarters). The team set out with a broad vision that was praised by both The Washington Post and Washington Star (which rarely agreed on anything), but funding problems forced revisions and a significant reduction in scale. In 1955, Pei's group took a step toward institutional independence from Webb and Knapp by establishing a new firm called I. M. Pei & Associates. (The name changed later to I. M. Pei & Partners.) They gained the freedom to work with other companies, but continued working primarily with Zeckendorf. The new firm distinguished itself through the use of detailed architectural models. They took on the Kips Bay residential area on the East Side of Manhattan, where Pei set up Kips Bay Towers, two large long towers of apartments with recessed windows (to provide shade and privacy) in a neat grid, adorned with rows of trees. Pei involved himself in the construction process at Kips Bay, even inspecting the bags of cement to check for consistency of color. The company continued its urban focus with the Society Hill project in central Philadelphia. Pei designed the Society Hill Towers, a three-building residential block injecting cubist design into the 18th-century milieu of the neighborhood. As with previous projects, abundant green spaces were central to Pei's vision, which also added traditional townhouses to aid the transition from classical to modern design. From 1958 to 1963, Pei and Ray Affleck developed a key downtown block of Montreal in a phased process that involved one of Pei's most admired structures in the Commonwealth, the cruciform tower known as the Royal Bank Plaza (Place Ville Marie). According to The Canadian Encyclopedia "its grand plaza and lower office buildings, designed by internationally famous US architect I. M. Pei, helped to set new standards for architecture in Canada in the 1960s ... The tower's smooth aluminum and glass surface and crisp unadorned geometric form demonstrate Pei's adherence to the mainstream of 20th-century modern design." Although these projects were satisfying, Pei wanted to establish an independent name for himself. In 1959 he was approached by MIT to design a building for its Earth science program. The Green Building continued the grid design of Kips Bay and Society Hill. The pedestrian walkway at the ground floor, however, was prone to sudden gusts of wind, which embarrassed Pei. "Here I was from MIT," he said, "and I didn't know about wind-tunnel effects." At the same time, he designed the Luce Memorial Chapel in at Tunghai University in Taichung, Taiwan. The soaring structure, commissioned by the same organisation that had run his middle school in Shanghai, broke severely from the cubist grid patterns of his urban projects. The challenge of coordinating these projects took an artistic toll on Pei. He found himself responsible for acquiring new building contracts and supervising the plans for them. As a result, he felt disconnected from the actual creative work. "Design is something you have to put your hand to," he said. "While my people had the luxury of doing one job at a time, I had to keep track of the whole enterprise." Pei's dissatisfaction reached its peak at a time when financial problems began plaguing Zeckendorf's firm. I. M. Pei and Associates officially broke from Webb and Knapp in 1960, which benefited Pei creatively but pained him personally. He had developed a close friendship with Zeckendorf, and both men were sad to part ways. NCAR and related projects Pei was able to return to hands-on design when he was approached in 1961 by Walter Orr Roberts to design the new Mesa Laboratory for the National Center for Atmospheric Research outside Boulder, Colorado. The project differed from Pei's earlier urban work; it would rest in an open area in the foothills of the Rocky Mountains. He drove with his wife around the region, visiting assorted buildings and surveying the natural environs. He was impressed by the United States Air Force Academy in Colorado Springs, but felt it was "detached from nature". The conceptualization stages were important for Pei, presenting a need and an opportunity to break from the Bauhaus tradition. He later recalled the long periods of time he spent in the area: "I recalled the places I had seen with my mother when I was a little boy—the mountaintop Buddhist retreats. There in the Colorado mountains, I tried to listen to the silence again—just as my mother had taught me. The investigation of the place became a kind of religious experience for me." Pei also drew inspiration from the Mesa Verde cliff dwellings of the Ancestral Puebloans; he wanted the buildings to exist in harmony with their natural surroundings. To this end, he called for a rock-treatment process that could color the buildings to match the nearby mountains. He also set the complex back on the mesa overlooking the city, and designed the approaching road to be long, winding, and indirect. Roberts disliked Pei's initial designs, referring to them as "just a bunch of towers". Roberts intended his comments as typical of scientific experimentation, rather than artistic critique; still, Pei was frustrated. His second attempt, however, fit Roberts' vision perfectly: a spaced-out series of clustered buildings, joined by lower structures and complemented by two underground levels. The complex uses many elements of cubist design, and the walkways are arranged to increase the probability of casual encounters among colleagues. Once the laboratory was built, several problems with its construction became apparent. Leaks in the roof caused difficulties for researchers, and the shifting of clay soil beneath caused cracks in the buildings which were expensive to repair. Still, both architect and project manager were pleased with the final result. Pei referred to the NCAR complex as his "breakout building", and he remained a friend of Roberts until the scientist died in . The success of NCAR brought renewed attention to Pei's design acumen. He was recruited to work on a variety of projects, including the S. I. Newhouse School of Public Communications at Syracuse University, the Everson Museum of Art in Syracuse, New York, the Sundrome terminal at John F. Kennedy International Airport in New York City, and dormitories at New College of Florida. Kennedy Library After President John F. Kennedy was assassinated in , his family and friends discussed how to construct a library that would serve as a fitting memorial. A committee was formed to advise Kennedy's widow Jacqueline, who would make the final decision. The group deliberated for months and considered many famous architects. Eventually, Kennedy chose Pei to design the library, based on two considerations. First, she appreciated the variety of ideas he had used for earlier projects. "He didn't seem to have just one way to solve a problem," she said. "He seemed to approach each commission thinking only of it and then develop a way to make something beautiful." Ultimately, however, Kennedy made her choice based on her personal connection with Pei. Calling it "really an emotional decision", she explained: "He was so full of promise, like Jack; they were born in the same year. I decided it would be fun to take a great leap with him." The project was plagued with problems from the outset. The first was scope. President Kennedy had begun considering the structure of his library soon after taking office, and he wanted to include archives from his administration, a museum of personal items, and a political science institute. After the assassination, the list expanded to include a fitting memorial tribute to the slain president. The variety of necessary inclusions complicated the design process and caused significant delays. Pei's first proposed design included a large glass pyramid that would fill the interior with sunlight, meant to represent the optimism and hope that Kennedy's administration had symbolized for so many in the United States. Mrs. Kennedy liked the design, but resistance began in Cambridge, the first proposed site for the building, as soon as the project was announced. Many community members worried that the library would become a tourist attraction, causing particular problems with traffic congestion. Others worried that the design would clash with the architectural feel of nearby Harvard Square. By the mid-1970s, Pei tried proposing a new design, but the library's opponents resisted every effort. These events pained Pei, who had sent all three of his sons to Harvard, and although he rarely discussed his frustration, it was evident to his wife. "I could tell how tired he was by the way he opened the door at the end of the day," she said. "His footsteps were dragging. It was very hard for I. M. to see that so many people didn't want the building." Finally the project moved to Columbia Point, near the University of Massachusetts Boston. The new site was less than ideal; it was located on an old landfill, and just over a large sewage pipe. Pei's architectural team added more fill to cover the pipe and developed an elaborate ventilation system to conquer the odor. A new design was unveiled, combining a large square glass-enclosed atrium with a triangular tower and a circular walkway. The John F. Kennedy Presidential Library and Museum was dedicated on October 20, 1979. Critics generally liked the finished building, but the architect himself was unsatisfied. The years of conflict and compromise had changed the nature of the design, and Pei felt that the final result lacked its original passion. "I wanted to give something very special to the memory of President Kennedy," he said in 2000. "It could and should have been a great project." Pei's work on the Kennedy project boosted his reputation as an architect of note. "Pei Plan" in Oklahoma City The Pei Plan was a failed urban redevelopment initiative designed for downtown Oklahoma City, Oklahoma, in 1964. The plan called for the demolition of hundreds of old downtown structures in favor of renewed parking, office building, and retail developments, in addition to public projects such as the Myriad Convention Center and the Myriad Botanical Gardens. It was the dominant template for downtown development in Oklahoma City from its inception through the 1970s. The plan generated mixed results and opinion, largely succeeding in re-developing office building and parking infrastructure but failing to attract its anticipated retail and residential development. Significant public resentment also developed as a result of the destruction of multiple historic structures. As a result, Oklahoma City's leadership avoided large-scale urban planning for downtown throughout the 1980s and early 1990s, until the passage of the Metropolitan Area Projects (MAPS) initiative in 1993. Providence's Cathedral Square Another city which turned to Pei for urban renewal during this time was Providence, Rhode Island. In the late 1960s, Providence hired Pei to redesign Cathedral Square, a once-bustling civic center which had become neglected and empty, as part of an ambitious larger plan to redesign downtown. Pei's new plaza, modeled after the Greek Agora marketplace, opened in 1972. Unfortunately, the city ran out of money before Pei's vision could be fully realized. Also, recent construction of a low-income housing complex and Interstate 95 had changed the neighborhood's character permanently. In 1974, The Providence Evening Bulletin called Pei's new plaza a "conspicuous failure". By 2016, media reports characterized the plaza as a neglected, little-visited "hidden gem". Augusta, Georgia In 1974, the city of Augusta, Georgia turned to Pei and his firm for downtown revitalization. The Chamber of Commerce building and Bicentennial Park were completed from his plan. In 1976, Pei designed a distinctive modern penthouse that was added to the roof of architect William Lee Stoddart's historic Lamar Building, designed in 1916. In 1980, Pei and his company designed the Augusta Civic Center, now known as the James Brown Arena. Dallas City Hall Kennedy's assassination also led indirectly to another commission for Pei's firm. In 1964 the acting mayor of Dallas, Erik Jonsson, began working to change the community's image. Dallas was known and disliked as the city where the president had been killed, but Jonsson began a program designed to initiate a community renewal. One of the goals was a new city hall, which could be a "symbol of the people". Jonsson, a co-founder of Texas Instruments, learned about Pei from his associate Cecil Howard Green, who had recruited the architect for MIT's Earth Sciences building. Pei's approach to the new Dallas City Hall mirrored those of other projects; he surveyed the surrounding area and worked to make the building fit. In the case of Dallas, he spent days meeting with residents of the city and was impressed by their civic pride. He also found that the skyscrapers of the downtown business district dominated the skyline, and sought to create a building which could face the tall buildings and represent the importance of the public sector. He spoke of creating "a public-private dialogue with the commercial high-rises". Working with his associate Theodore Musho, Pei developed a design centered on a building with a top much wider than the bottom; the facade leans at an angle of 34 degrees, which shades the building from the Texas sun. A plaza stretches out before the building, and a series of support columns holds it up. It was influenced by Le Corbusier's High Court building in Chandigarh, India; Pei sought to use the significant overhang to unify the building and plaza. The project cost much more than initially expected, and took 11 years to complete. Revenue was secured in part by including a subterranean parking garage. The interior of the city hall is large and spacious; windows in the ceiling above the eighth floor fill the main space with light. The city of Dallas received the building well, and a local television news crew found unanimous approval of the new city hall when it officially opened to the public in 1978. Pei himself considered the project a success, even as he worried about the arrangement of its elements. He said: "It's perhaps stronger than I would have liked; it's got more strength than finesse." He felt that his relative lack of experience left him without the necessary design tools to refine his vision, but the community liked the city hall enough to invite him back. Over the years he went on to design five additional buildings in the Dallas area. Hancock Tower, Boston While Pei and Musho were coordinating the Dallas project, their associate Henry Cobb had taken the helm for a commission in Boston. John Hancock Insurance chairman Robert Slater hired I. M. Pei & Partners to design a building that could overshadow the Prudential Tower, erected by their rival. After the firm's first plan was discarded due to a need for more office space, Cobb developed a new plan around a towering parallelogram, slanted away from the Trinity Church and accented by a wedge cut into each narrow side. To minimize the visual impact, the building was covered in large reflective glass panels; Cobb said this would make the building a "background and foil" to the older structures around it. When the Hancock Tower was finished in 1976, it was the tallest building in New England. Serious issues of execution became evident in the tower almost immediately. Many glass panels fractured in a windstorm during construction in 1973. Some detached and fell to the ground, causing no injuries but sparking concern among Boston residents. In response, the entire tower was reglazed with smaller panels. This significantly increased the cost of the project. Hancock sued the glass manufacturers, Libbey-Owens-Ford, as well as I. M. Pei & Partners, for submitting plans that were "not good and workmanlike". LOF countersued Hancock for defamation, accusing Pei's firm of poor use of their materials; I. M. Pei & Partners sued LOF in return. All three companies settled out of court in 1981. The project became an albatross for Pei's firm. Pei himself refused to discuss it for many years. The pace of new commissions slowed and the firm's architects began looking overseas for opportunities. Cobb worked in Australia and Pei took on jobs in Singapore, Iran, and Kuwait. Although it was a difficult time for everyone involved, Pei later reflected with patience on the experience. "Going through this trial toughened us," he said. "It helped to cement us as partners; we did not give up on each other." National Gallery East Building, Washington, DC In the mid-1960s, directors of the National Gallery of Art in Washington, D.C., declared the need for a new building. Paul Mellon, a primary benefactor of the gallery and a member of its building committee, set to work with his assistant J. Carter Brown (who became gallery director in 1969) to find an architect. The new structure would be located to the east of the original building, and tasked with two functions: offer a large space for public appreciation of various popular collections; and house office space as well as archives for scholarship and research. They likened the scope of the new facility to the Library of Alexandria. After inspecting Pei's work at the Des Moines Art Center in Iowa and the Johnson Museum at Cornell University, they offered him the commission. Pei took to the project with vigor, and set to work with two young architects he had recently recruited to the firm, William Pedersen and Yann Weymouth. Their first obstacle was the unusual shape of the building site, a trapezoid of land at the intersection of Constitution and Pennsylvania Avenues. Inspiration struck Pei in 1968, when he scrawled a rough diagram of two triangles on a scrap of paper. The larger building would be the public gallery; the smaller would house offices and archives. This triangular shape became a singular vision for the architect. As the date for groundbreaking approached, Pedersen suggested to his boss that a slightly different approach would make construction easier. Pei simply smiled and said: "No compromises." The growing popularity of art museums presented unique challenges to the architecture. Mellon and Pei both expected large crowds of people to visit the new building, and they planned accordingly. To this end, Pei designed a large lobby roofed with enormous skylights. Individual galleries are located along the periphery, allowing visitors to return after viewing each exhibit to the spacious main room. A large mobile sculpture by American artist Alexander Calder was later added to the lobby. Pei hoped the lobby would be exciting to the public in the same way as the central room of the Guggenheim Museum is in New York City. The modern museum, he said later, "must pay greater attention to its educational responsibility, especially to the young". Materials for the building's exterior were chosen with careful precision. To match the look and texture of the original gallery's marble walls, builders re-opened the quarry in Knoxville, Tennessee, from which the first batch of stone had been harvested. The project even found and hired Malcolm Rice, a quarry supervisor who had overseen the original 1941 gallery project. The marble was cut into three-inch-thick blocks and arranged over the concrete foundation, with darker blocks at the bottom and lighter blocks on top. The East Building was honored on May 30, 1978, two days before its public unveiling, with a black-tie party attended by celebrities, politicians, benefactors, and artists. When the building opened, popular opinion was enthusiastic. Large crowds visited the new museum, and critics generally voiced their approval. Ada Louise Huxtable wrote in The New York Times that Pei's building was "a palatial statement of the creative accommodation of contemporary art and architecture". The sharp angle of the smaller building has been a particular note of praise for the public; over the years it has become stained and worn from the hands of visitors. Some critics disliked the unusual design, however, and criticized the reliance on triangles throughout the building. Others took issue with the large main lobby, particularly its attempt to lure casual visitors. In his review for Artforum, critic Richard Hennessy described a "shocking fun-house atmosphere" and "aura of ancient Roman patronage". One of the earliest and most vocal critics, however, came to appreciate the new gallery once he saw it in person. Allan Greenberg had scorned the design when it was first unveiled, but wrote later to J. Carter Brown: "I am forced to admit that you are right and I was wrong! The building is a masterpiece." Fragrant Hills, China After U.S. President Richard Nixon made his famous 1972 visit to China, a wave of exchanges took place between the two countries. One of these was a delegation of the American Institute of Architects in 1974, which Pei joined. It was his first trip back to China since leaving in 1935. He was favorably received, returned the welcome with positive comments, and a series of lectures ensued. Pei noted in one lecture that since the 1950s Chinese architects had been content to imitate Western styles; he urged his audience in one lecture to search China's native traditions for inspiration. In 1978, Pei was asked to initiate a project for his home country. After surveying a number of different locations, Pei fell in love with a valley that had once served as an imperial garden and hunting preserve known as Fragrant Hills. The site housed a decrepit hotel; Pei was invited to tear it down and build a new one. As usual, he approached the project by carefully considering the context and purpose. Likewise, he considered modernist styles inappropriate for the setting. Thus, he said, it was necessary to find "a third way". After visiting his ancestral home in Suzhou, Pei created a design based on some simple but nuanced techniques he admired in traditional residential Chinese buildings. Among these were abundant gardens, integration with nature, and consideration of the relationship between enclosure and opening. Pei's design included a large central atrium covered by glass panels that functioned much like the large central space in his East Building of the National Gallery. Openings of various shapes in walls invited guests to view the natural scenery beyond. Younger Chinese who had hoped the building would exhibit some of Cubist flavor for which Pei had become known were disappointed, but the new hotel found more favour with government officials and architects. The hotel, with 325 guest rooms and a four-story central atrium, was designed to fit perfectly into its natural habitat. The trees in the area were of special concern, and particular care was taken to cut down as few as possible. He worked with an expert from Suzhou to preserve and renovate a water maze from the original hotel, one of only five in the country. Pei was also meticulous about the arrangement of items in the garden behind the hotel; he even insisted on transporting of rocks from a location in southwest China to suit the natural aesthetic. An associate of Pei's said later that he never saw the architect so involved in a project. During construction, a series of mistakes collided with the nation's lack of technology to strain relations between architects and builders. Whereas 200 or so workers might have been used for a similar building in the US, the Fragrant Hill project employed over 3,000 workers. This was mostly because the construction company lacked the sophisticated machines used in other parts of the world. The problems continued for months, until Pei had an uncharacteristically emotional moment during a meeting with Chinese officials. He later explained that his actions included "shouting and pounding the table" in frustration. The design staff noticed a difference in the manner of work among the crew after the meeting. As the opening neared, however, Pei found the hotel still needed work. He began scrubbing floors with his wife and ordered his children to make beds and vacuum floors. The project's difficulties took an emotional and physical strain on the Pei family. The Fragrant Hill Hotel opened on October 17, 1982, but quickly fell into disrepair. A member of Pei's staff returned for a visit several years later and confirmed the dilapidated condition of the hotel. He and Pei attributed this to the country's general unfamiliarity with deluxe buildings. The Chinese architectural community at the time gave the structure little attention, as their interest at the time centered on the work of American postmodernists such as Michael Graves. Javits Convention Center, New York As the Fragrant Hill project neared completion, Pei began work on the Jacob K. Javits Convention Center in New York City, for which his associate James Freed served as lead designer. Hoping to create a vibrant community institution in what was then a run-down neighborhood on Manhattan's west side, Freed developed a glass-coated structure with an intricate space frame of interconnected metal rods and spheres. The convention center was plagued from the start by budget problems and construction blunders. City regulations forbid a general contractor having final authority over the project, so architects and program manager Richard Kahan had to coordinate the wide array of builders, plumbers, electricians, and other workers. The forged steel globes to be used in the space frame came to the site with hairline cracks and other defects: 12,000 were rejected. These and other problems led to media comparisons with the disastrous Hancock Tower. One New York City official blamed Kahan for the difficulties, indicating that the building's architectural flourishes were responsible for delays and financial crises. The Javits Center opened on April 3, 1986, to a generally positive reception. During the inauguration ceremonies, however, neither Freed nor Pei was recognized for their role in the project. Grand Louvre, Paris When François Mitterrand was elected President of France in 1981, he laid out an ambitious plan for a variety of construction projects. One of these was the renovation of the Louvre. Mitterrand appointed a civil servant named to oversee it. After visiting museums in Europe and the United States, including the U.S. National Gallery, he asked Pei to join the team. The architect made three secretive trips to Paris, to determine the feasibility of the project; only one museum employee knew why he was there. Pei finally agreed that a new construction project was not only possible, but necessary for the future of the museum. He thus became the first foreign architect to work on the Louvre. The heart of the new design included not only a renovation of the Cour Napoléon in the midst of the buildings, but also a transformation of the interiors. Pei proposed a central entrance, not unlike the lobby of the National Gallery East Building, which would link the three major wings around the central space. Below would be a complex of additional floors for research, storage, and maintenance purposes. At the center of the courtyard he designed a glass and steel pyramid, first proposed with the Kennedy Library, to serve as entrance and anteroom skylight. It was mirrored by an inverted pyramid to the west, to reflect sunlight into the complex. These designs were partly an homage to the fastidious geometry of the French landscape architect André Le Nôtre (1613–1700). Pei also found the pyramid shape best suited for stable transparency, and considered it "most compatible with the architecture of the Louvre, especially with the faceted planes of its roofs". Biasini and Mitterrand liked the plans, but the scope of the renovation displeased Louvre administrator André Chabaud. He resigned from his post, complaining that the project was "unfeasible" and posed "architectural risks". Some sections of the French public also reacted harshly to the design, mostly because of the proposed pyramid. One critic called it a "gigantic, ruinous gadget"; another charged Mitterrand with "despotism" for inflicting Paris with the "atrocity". Pei estimated that 90 percent of Parisians opposed his design. "I received many angry glances in the streets of Paris," he said. Some condemnations carried nationalistic overtones. One opponent wrote: "I am surprised that one would go looking for a Chinese architect in America to deal with the historic heart of the capital of France." Soon, however, Pei and his team won the support of several key cultural icons, including the conductor Pierre Boulez and Claude Pompidou, widow of former French President Georges Pompidou, after whom the similarly controversial Centre Georges Pompidou was named. In an attempt to soothe public ire, Pei took a suggestion from then-mayor of Paris Jacques Chirac and placed a full-sized cable model of the pyramid in the courtyard. During the four days of its exhibition, an estimated 60,000 people visited the site. Some critics eased their opposition after witnessing the proposed scale of the pyramid. Pei demanded a method of glass production that resulted in clear panes. The pyramid was constructed at the same time as the subterranean levels below, which caused difficulties during the building stages. As they worked, construction teams came upon an abandoned set of rooms containing 25,000 historical items; these were incorporated into the rest of the structure to add a new exhibition zone. The new Cour Napoléon was opened to the public on October 14, 1988, and the Pyramid entrance was opened the following March. By this time, public opposition had softened; a poll found a 56 percent approval rating for the pyramid, with 23 percent still opposed. The newspaper Le Figaro had vehemently criticized Pei's design, but later celebrated the tenth anniversary of its magazine supplement at the pyramid. Prince Charles of Britain surveyed the new site with curiosity, and declared it "marvelous, very exciting". A writer in Le Quotidien de Paris wrote: "The much-feared pyramid has become adorable." The experience was exhausting for Pei, but also rewarding. "After the Louvre," he said later, "I thought no project would be too difficult." The pyramid achieved further widespread international recognition for its central role in the plot at the denouement of The Da Vinci Code by Dan Brown and its appearance in the final scene of the subsequent screen adaptation. The Louvre Pyramid has become Pei's most famous structure. Meyerson Symphony Center, Dallas The opening of the Louvre Pyramid coincided with four other projects on which Pei had been working, prompting architecture critic Paul Goldberger to declare 1989 "the year of Pei" in The New York Times. It was also the year in which Pei's firm changed its name to Pei Cobb Freed & Partners, to reflect the increasing stature and prominence of his associates. At the age of 72, Pei had begun thinking about retirement, but continued working long hours to see his designs come to light. One of the projects took Pei back to Dallas, Texas, to design the Morton H. Meyerson Symphony Center. The success of city's performing artists, particularly the Dallas Symphony Orchestra then led by conductor Eduardo Mata, led to interest by city leaders in creating a modern center for musical arts that could rival the best halls in Europe. The organizing committee contacted 45 architects, but at first Pei did not respond, thinking that his work on the Dallas City Hall had left a negative impression. One of his colleagues from that project, however, insisted that he meet with the committee. He did and, although it would be his first concert hall, the committee voted unanimously to offer him the commission. As one member put it: "We were convinced that we would get the world's greatest architect putting his best foot forward." The project presented a variety of specific challenges. Because its main purpose was the presentation of live music, the hall needed a design focused on acoustics first, then public access and exterior aesthetics. To this end, a professional sound technician was hired to design the interior. He proposed a shoebox auditorium, used in the acclaimed designs of top European symphony halls such as the Amsterdam Concertgebouw and Vienna Musikverein. Pei drew inspiration for his adjustments from the designs of the German architect Johann Balthasar Neumann, especially the Basilica of the Fourteen Holy Helpers. He also sought to incorporate some of the panache of the Paris Opéra designed by Charles Garnier. Pei's design placed the rigid shoebox at an angle to the surrounding street grid, connected at the north end to a long rectangular office building, and cut through the middle with an assortment of circles and cones. The design attempted to reproduce with modern features the acoustic and visual functions of traditional elements like filigree. The project was risky: its goals were ambitious and any unforeseen acoustic flaws would be virtually impossible to remedy after the hall's completion. Pei admitted that he did not completely know how everything would come together. "I can imagine only 60 percent of the space in this building," he said during the early stages. "The rest will be as surprising to me as to everyone else." As the project developed, costs rose steadily and some sponsors considered withdrawing their support. Billionaire tycoon Ross Perot made a donation of US$10 million, on the condition that it be named in honor of Morton H. Meyerson, the longtime patron of the arts in Dallas. The building opened and immediately garnered widespread praise, especially for its acoustics. After attending a week of performances in the hall, a music critic for The New York Times wrote an enthusiastic account of the experience and congratulated the architects. One of Pei's associates told him during a party before the opening that the symphony hall was "a very mature building"; he smiled and replied: "Ah, but did I have to wait this long?" Bank of China, Hong Kong A new offer had arrived for Pei from the Chinese government in 1982. With an eye toward the transfer of sovereignty of Hong Kong from the British in 1997, authorities in China sought Pei's aid on a new tower for the local branch of the Bank of China. The Chinese government was preparing for a new wave of engagement with the outside world and sought a tower to represent modernity and economic strength. Given the elder Pei's history with the bank before the Communist takeover, government officials visited the 89-year-old man in New York to gain approval for his son's involvement. Pei then spoke with his father at length about the proposal. Although the architect remained pained by his experience with Fragrant Hills, he agreed to accept the commission. The proposed site in Hong Kong's Central District was less than ideal; a tangle of highways lined it on three sides. The area had also been home to a headquarters for Japanese military police during World War II, and was notorious for prisoner torture. The small parcel of land made a tall tower necessary, and Pei had usually shied away from such projects; in Hong Kong especially, the skyscrapers lacked any real architectural character. Lacking inspiration and unsure of how to approach the building, Pei took a weekend vacation to the family home in Katonah, New York. There he found himself experimenting with a bundle of sticks until he happened upon a cascading sequence. Pei felt that his design for the Bank of China Tower needed to reflect "the aspirations of the Chinese people". The design that he developed for the skyscraper was not only unique in appearance, but also sound enough to pass the city's rigorous standards for wind-resistance. The building is composed of four triangular shafts rising up from a square base, supported by a visible truss structure that distributes stress to the four corners of the base. Using the reflective glass that had become something of a trademark for him, Pei organized the facade around diagonal bracing in a union of structure and form that reiterates the triangle motif established in the plan. At the top, he designed the roofs at sloping angles to match the rising aesthetic of the building. Some influential advocates of feng shui in Hong Kong and China criticized the design, and Pei and government officials responded with token adjustments. As the tower neared completion, Pei was shocked to witness the government's massacre of unarmed civilians at the Tiananmen Square protests of 1989. He wrote an opinion piece for The New York Times titled "China Won't Ever Be the Same," in which he said that the killings "tore the heart out of a generation that carries the hope for the future of the country". The massacre deeply disturbed his entire family, and he wrote that "China is besmirched." 1990–2019: museum projects As the 1990s began, Pei transitioned into a role of decreased involvement with his firm. The staff had begun to shrink, and Pei wanted to dedicate himself to smaller projects allowing for more creativity. Before he made this change, however, he set to work on his last major project as active partner: the Rock and Roll Hall of Fame in Cleveland, Ohio. Considering his work on such bastions of high culture as the Louvre and U.S. National Gallery, some critics were surprised by his association with what many considered a tribute to low culture. The sponsors of the hall, however, sought Pei for specifically this reason; they wanted the building to have an aura of respectability from the beginning. As in the past, Pei accepted the commission in part because of the unique challenge it presented. Using a glass wall for the entrance, similar in appearance to his Louvre pyramid, Pei coated the exterior of the main building in white metal, and placed a large cylinder on a narrow perch to serve as a performance space. The combination of off-centered wraparounds and angled walls was, Pei said, designed to provide "a sense of tumultuous youthful energy, rebelling, flailing about". The building opened in 1995, and was received with moderate praise. The New York Times called it "a fine building", but Pei was among those who felt disappointed with the results. The museum's early beginnings in New York combined with an unclear mission created a fuzzy understanding among project leaders for precisely what was needed. Although the city of Cleveland benefited greatly from the new tourist attraction, Pei was unhappy with it. At the same time, Pei designed a new museum for Luxembourg, the Musée d'art moderne Grand-Duc Jean, commonly known as the Mudam. Drawing from the original shape of the Fort Thüngen walls where the museum was located, Pei planned to remove a portion of the original foundation. Public resistance to the historical loss forced a revision of his plan, however, and the project was nearly abandoned. The size of the building was halved, and it was set back from the original wall segments to preserve the foundation. Pei was disappointed with the alterations, but remained involved in the building process even during construction. In 1995, Pei was hired to design an extension to the Deutsches Historisches Museum, or German Historical Museum in Berlin. Returning to the challenge of the East Building of the U.S. National Gallery, Pei worked to combine a modernist approach with a classical main structure. He described the glass cylinder addition as a "beacon," and topped it with a glass roof to allow plentiful sunlight inside. Pei had difficulty working with German government officials on the project; their utilitarian approach clashed with his passion for aesthetics. "They thought I was nothing but trouble", he said. Pei also worked at this time on two projects for a new Japanese religious movement called Shinji Shumeikai. He was approached by the movement's spiritual leader, Kaishu Koyama, who impressed the architect with her sincerity and willingness to give him significant artistic freedom. One of the buildings was a bell tower, designed to resemble the bachi used when playing traditional instruments like the shamisen. Pei was unfamiliar with the movement's beliefs, but explored them in order to represent something meaningful in the tower. As he said: "It was a search for the sort of expression that is not at all technical." The experience was rewarding for Pei, and he agreed immediately to work with the group again. The new project was the Miho Museum, to display Koyama's collection of tea ceremony artifacts. Pei visited the site in Shiga Prefecture, and during their conversations convinced Koyama to expand her collection. She conducted a global search and acquired more than 300 items showcasing the history of the Silk Road. One major challenge was the approach to the museum. The Japanese team proposed a winding road up the mountain, not unlike the approach to the NCAR building in Colorado. Instead, Pei ordered a hole cut through a nearby mountain, connected to a major road via a bridge suspended from ninety-six steel cables and supported by a post set into the mountain. The museum itself was built into the mountain, with 80 percent of the building underground. When designing the exterior, Pei borrowed from the tradition of Japanese temples, particularly those found in nearby Kyoto. He created a concise spaceframe wrapped into French limestone and covered with a glass roof. Pei also oversaw specific decorative details, including a bench in the entrance lobby, carved from a 350-year-old keyaki tree. Because of Koyama's considerable wealth, money was rarely considered an obstacle; estimates at the time of completion put the cost of the project at US$350 million. During the first decade of the 2000s, Pei designed a variety of buildings, including the Suzhou Museum near his childhood home. He also designed the Museum of Islamic Art in Doha, Qatar at the request of the Al-Thani Family. Although it was originally planned for the corniche road along Doha Bay, Pei convinced the project coordinators to build a new island to provide the needed space. He then spent six months touring the region and surveying mosques in Spain, Syria, and Tunisia. He was especially impressed with the elegant simplicity of the Mosque of Ibn Tulun in Cairo. Once again, Pei sought to combine new design elements with the classical aesthetic most appropriate for the location of the building. The sand-colored rectangular boxes rotate evenly to create a subtle movement, with small arched windows at regular intervals into the limestone exterior. Inside, galleries are arranged around a massive atrium, lit from above. The museum's coordinators were pleased with the project; its official website describes its "true splendour unveiled in the sunlight," and speaks of "the shades of colour and the interplay of shadows paying tribute to the essence of Islamic architecture". The Macao Science Center in Macau was designed by Pei Partnership Architects in association with I. M. Pei. The project to build the science center was conceived in 2001 and construction started in 2006. The center was completed in 2009 and opened by the Chinese President Hu Jintao. The main part of the building is a distinctive conical shape with a spiral walkway and large atrium inside, similar to that of the Solomon R. Guggenheim Museum in New York City. Galleries lead off the walkway, mainly consisting of interactive exhibits aimed at science education. The building is in a prominent position by the sea and is now a Macau landmark. Pei's career ended with his death in May 2019, at 102 years of age. Style and method Pei's style was described as thoroughly modernist, with significant cubist themes. He was known for combining traditional architectural principles with progressive designs based on simple geometric patterns—circles, squares, and triangles are common elements of his work in both plan and elevation. As one critic wrote: "Pei has been aptly described as combining a classical sense of form with a contemporary mastery of method." In 2000, biographer Carter Wiseman called Pei "the most distinguished member of his Late-Modernist generation still in practice". At the same time, Pei himself rejected simple dichotomies of architectural trends. He once said: "The talk about modernism versus post-modernism is unimportant. It's a side issue. An individual building, the style in which it is going to be designed and built, is not that important. The important thing, really, is the community. How does it affect life?" Pei's work is celebrated throughout the world of architecture. His colleague John Portman once told him: "Just once, I'd like to do something like the East Building." But this originality did not always bring large financial reward; as Pei replied to the successful architect: "Just once, I'd like to make the kind of money you do." His concepts, moreover, were too individualized and dependent on context to have given rise to a particular school of design. Pei referred to his own "analytical approach" when explaining the lack of a "Pei School". "For me," he said, "the important distinction is between a stylistic approach to the design; and an analytical approach giving the process of due consideration to time, place, and purpose ... My analytical approach requires a full understanding of the three essential elements ... to arrive at an ideal balance among them." Awards and honors In the words of his biographer, Pei won "every award of any consequence in his art", including the Arnold Brunner Award from the National Institute of Arts and Letters (1963), the Gold Medal for Architecture from the American Academy of Arts and Letters (1979), the AIA Gold Medal (1979), the first Praemium Imperiale for Architecture from the Japan Art Association (1989), the Lifetime Achievement Award from the Cooper-Hewitt, National Design Museum, the 1998 Edward MacDowell Medal in the Arts, and the 2010 Royal Gold Medal from the Royal Institute of British Architects. In 1983 he was awarded the Pritzker Prize, sometimes referred to as the Nobel Prize of architecture. In its citation, the jury said: "Ieoh Ming Pei has given this century some of its most beautiful interior spaces and exterior forms ... His versatility and skill in the use of materials approach the level of poetry." The prize was accompanied by a US$100,000 award, which Pei used to create a scholarship for Chinese students to study architecture in the U.S., on the condition that they return to China to work. In 1986, he was one of twelve recipients of the Medal of Liberty. When he was awarded the 2003 Henry C. Turner Prize by the National Building Museum, museum board chair Carolyn Brody praised his impact on construction innovation: "His magnificent designs have challenged engineers to devise innovative structural solutions, and his exacting expectations for construction quality have encouraged contractors to achieve high standards." In December 1992, Pei was awarded the Presidential Medal of Freedom by President George H. W. Bush. In 1996, Pei became the first person to be elected a foreign member of the Chinese Academy of Engineering. Personal life Pei's wife of over 70 years, Eileen Loo, died on June 20, 2014. Together they had three sons, T'ing Chung (1945–2003), Chien Chung (b. 1946; known as Didi), and Li Chung (b. 1949; known as Sandi); and a daughter, Liane (b. 1960). T'ing Chung was an urban planner and alumnus of his father's alma mater MIT and Harvard. Chieng Chung and Li Chung, who are both Harvard College and Harvard Graduate School of Design alumni, founded and run Pei Partnership Architects. Liane is a lawyer. In 2015, Pei's home health aide, Eter Nikolaishvili, grabbed Pei's right forearm and twisted it, resulting in bruising and bleeding and hospital treatment. Pei alleges that the assault occurred when Pei threatened to call the police about Nikolaishvili. Nikolaishvili agreed to plead guilty in 2016. Pei celebrated his 100th birthday on April 26, 2017. He died in Manhattan on May 16, 2019, at the age of 102. He was survived by three of his children, seven grandchildren, and five great-grandchildren. See also Chinese Americans in New York City List of I. M. Pei projects References Notes Bibliography Boehm, Gero von. Conversations with I. M. Pei: Light Is the Key. Munich: Prestel, 2000. . Cobb, Henry Nichols (2018). Henry N. Cobb: Words and Works 1948–2018: Scenes from a Life in Architecture. New York: Monacelli Press. . Diamonstein, Barbaralee. American Architecture Now. New York: Rizzoli, 1980. . Heyer, Paul. Architects on Architecture: New Directions in America. New York: Van Nostrand Reinhold, 1993. . Lenci, Ruggero. I. M. Pei: teoremi spaziali. Turin, Testo & Immagine, 2004. . Moeller, Gerard M. and Weeks, Christopher. AIA Guide to the Architecture of Washington, D.C. Baltimore: Johns Hopkins University Press, 2006. Williams, Paul Kelsey. Southwest Washington, D.C. Charleston, S.C.: Arcadia, 2005. Wiseman, Carter. I. M. Pei: A Profile in American Architecture. New York: H. N. Abrams, 2001. . Documentaries The Museum on the Mountain, 1998, aired on Ovation. The 60-minute documentary interviewed I. M. Pei in Japan on his design of Miho Museum, Japan. Compiled into a 2-hour home video documentary as I.M. Pei : the museum on the mountain, 2003. First Person Singular: I. M. Pei, 1997, aired on PBS. The 90-minute documentary interviewed I. M. Pei all over the world on his works. Compiled into a 2-hour home video documentary as I.M. Pei : the museum on the mountain, 2003. External links Pei Partnership Architects Pei Cobb Freed & Partners I. M. Pei at the Digital Archive of American Architecture Pritzker Prize information and acceptance speech Concept sketches for The Musée d'Art Moderne I. M. Pei architecture on Google Maps 1917 births 2019 deaths Modernist architects Skyscraper architects 20th-century American architects 21st-century American architects Presidential Medal of Freedom recipients United States National Medal of Arts recipients Pritzker Architecture Prize winners National Design Award winners Recipients of the Royal Gold Medal Recipients of the Praemium Imperiale Members of the American Academy of Arts and Letters Honorary Members of the Royal Academy Members of the Académie d'architecture Members of Committee of 100 American architects of Chinese descent Republic of China (1912–1949) emigrants to the United States Harvard Graduate School of Design alumni MIT School of Architecture and Planning alumni University of Pennsylvania people Alumni of St. Paul's College, Hong Kong Architects from Suzhou People from Katonah, New York American centenarians Chinese centenarians Men centenarians Foreign members of the Chinese Academy of Engineering Asia Game Changer Award winners Fellows of the American Institute of Architects People associated with the Louvre Recipients of the AIA Gold Medal
[ 0.1380174160003662, 0.6712177395820618, -0.5752977728843689, 0.12090426683425903, 0.3431715667247772, 0.8569435477256775, -0.09133826941251755, -0.2549474835395813, 0.07684065401554108, -0.6154385209083557, -0.37893587350845337, -0.015224232338368893, -0.28422343730926514, 0.21311029791831...
15156
https://en.wikipedia.org/wiki/ICD%20%28disambiguation%29
ICD (disambiguation)
ICD is the International Statistical Classification of Diseases and Related Health Problems, an international standard diagnostic tool. ICD may also refer to: Organizations Information Control Division of the US Army in Germany after WWII United States Army Medical Research Institute of Chemical Defense (USAMRICD or ICD) Iranian Club, Dubai Islamic Corporation for the Development of the Private Sector, of the Islamic Development Bank International Clothing Designs, UK clothing importer Science and technology In-circuit debugger, in electronic hardware development Interface control document, in systems and software engineering MPLAB devices ICD (n-circuit debugger) Interatomic Coulombic decay, a relaxation process Medicine Immunogenic cell death Implantable cardioverter-defibrillator Impulse control disorder Isobaric counterdiffusion Other uses Doctor of Canon Law (Latin: Iuris Canonici Doctor) Incentive-centered design Inland container depot of Container Corporation of India See also Intelligence Community Directive 301 (ICD-301)
[ 0.2221582680940628, 0.24226179718971252, -0.30505406856536865, 0.1303345263004303, -0.0895903930068016, -0.5425779819488525, -0.07078370451927185, 0.11563244462013245, -0.38403087854385376, -0.434915155172348, -0.0979841873049736, 0.021426068618893623, -0.1296280175447464, 0.93235313892364...
15158
https://en.wikipedia.org/wiki/Islamic%20Jihad
Islamic Jihad
Islamic Jihad may refer to: Islamic Jihad Movement in Palestine (headquartered in Damascus) Islamic Jihad Organization, active mostly in Lebanon Islamic Jihad Union, active in Afghanistan and Pakistan Islamic Jihad of Yemen Turkish Islamic Jihad Egyptian Islamic Jihad See also Jihad, the Islamic theological concept
[ 0.5102207064628601, 0.21269091963768005, -0.30783769488334656, -0.266593873500824, -0.5713509321212769, 0.10744809359312057, 0.3096220791339874, 0.1694335788488388, -0.27173399925231934, -0.27170252799987793, -0.8063239455223083, -0.03414391353726387, -0.7387359738349915, 0.343229919672012...
15161
https://en.wikipedia.org/wiki/I486
I486
The Intel 486, officially named i486 and also known as 80486, is a microprocessor. It is a higher-performance follow-up to the Intel 386. The i486 was introduced in 1989. It represents the fourth generation of binary compatible CPUs following the 8086 of 1978, the Intel 80286 of 1982, and 1985's i386. It was the first tightly-pipelined x86 design as well as the first x86 chip to include more than one million transistors. It offered a large on-chip cache and an integrated floating-point unit. A typical 50 MHz i486 executes around 40 million instructions per second (MIPS), reaching 50 MIPS peak performance. It is approximately twice as fast as the i386 or i286 per clock cycle. The i486's improved performance is thanks to its five-stage pipeline with all stages bound to a single cycle. The enhanced FPU unit on the chip was significantly faster than the i387 FPU per cycle. The intel 80387 FPU ("i387") was a separate, optional math coprocessor that was installed in a motherboard socket alongside the i386. The i486 was succeeded by the original Pentium. History The i486 was announced at Spring Comdex in April 1989. At the announcement, Intel stated that samples would be available in the third quarter and production quantities would ship in the fourth quarter. The first i486-based PCs were announced in late 1989. The first major update to the i486 design came in March 1992 with the release of the clock-doubled 486DX2 series. It was the first time that the CPU core clock frequency was separated from the system bus clock frequency by using a dual clock multiplier, supporting 486DX2 chips at 40 and 50 MHz. The faster 66 MHz 486DX2-66 was released that August. The fifth-generation Pentium processor launched in 1993, while Intel continued to produce i486 processors, including the triple-clock-rate 486DX4-100 with a 100 MHz clock speed and a L1 cache doubled to 16 KB. Earlier, Intel had decided not to share its 80386 and 80486 technologies with AMD. However, AMD believed that their technology sharing agreement extended to the 80386 as a derivative of the 80286. AMD reverse-engineered Intel 386 chip and produced the 40 MHz Am386DX-40 chip, which was cheaper and had lower power consumption than Intel's best 33 MHz version. Intel attempted to prevent AMD from selling the processor, but AMD won in court, which allowed it to establish itself as a competitor. AMD continued to create clones, releasing the first-generation Am486 chip in April 1993 with clock frequencies of 25, 33 and 40 MHz. Second-generation Am486DX2 chips with 50, 66 and 80 MHz clock frequencies were released the following year. The Am486 series was completed with a 120 MHz DX4 chip in 1995. AMD's long-running 1987 arbitration lawsuit against Intel was settled in 1995, and AMD gained access to Intel's 80486 microcode. This led to the creation of two versions of AMD's 486 processor - one reverse-engineered from Intel's microcode, while the other used AMD's microcode in a cleanroom development process. However, the settlement also concluded that the 80486 would be AMD's last Intel clone. Another 486 clone manufacturer was Cyrix, which was a fabless co-processor chip maker for 80286/386 systems. The first Cyrix 486 processors, the 486SLC and 486DLC, were released in 1992 and used the 80386 package. Both Texas Instruments-manufactured Cyrix processors were pin-compatible with 386SX/DX systems, which allowed them to become an upgrade option. However, these chips could not match the Intel 486 processors, having only 1 KB of cache memory and no built-in math coprocessor. In 1993, Cyrix released its own Cx486DX and DX2 processors, which were closer in performance to Intel's counterparts. Intel and Cyrix sued each other, with Intel going for patent infringement and Cyrix going with antitrust claims. In 1994 Cyrix won and dropped its antitrust claim. In 1995, both Cyrix and AMD began looking at a ready market for users wanting to upgrade their processors. Cyrix released a derivative 486 processor called the 5x86, based on the Cyrix M1 core, which was clocked up to 120 MHz and was an option for 486 Socket 3 motherboards. AMD released a 133 MHz Am5x86 upgrade chip, which was essentially an improved 80486 with double the cache and a quad multiplier that also worked with the original 486DX motherboards. Am5x86 was the first processor to use AMD's performance rating and was marketed as Am5x86-P75, with claims that it was equivalent to the Pentium 75. Kingston Technology launched a 'TurboChip' 486 system upgrade that used a 133 MHz Am5x86. Intel responded by making a Pentium OverDrive upgrade chip for 486 motherboards, which was a modified Pentium core that ran up to 83 MHz on boards with a 25 or 33 MHz front-side bus clock. OverDrive wasn't popular due to speed and price. The 486 was declared obsolete as early as 1996, with a Florida school district's purchase of a fleet of 486DX4 machines in that year sparking controversy. New computers equipped with 486 processors in discount warehouses became scarce, and an IBM spokesperson called it a "dinosaur". Even after the Pentium series of processors gained a foothold in the market, however, Intel continued to produce 486 cores for industrial embedded applications. Intel discontinued production of i486 processors in late 2007. Improvements The instruction set of the i486 is very similar to the i386, with the addition of a few extra instructions, such as CMPXCHG, a compare-and-swap atomic operation, and XADD, a fetch-and-add atomic operation that returned the original value (unlike a standard ADD, which returns flags only). The i486's performance architecture is a vast improvement over the i386. It has an on-chip unified instruction and data cache, an on-chip floating-point unit (FPU) and an enhanced bus interface unit. Due to the tight pipelining, sequences of simple instructions (such as ALU reg,reg and ALU reg,im) could sustain single-clock-cycle throughput (one instruction completed every clock). These improvements yielded a rough doubling in integer ALU performance over the i386 at the same clock rate. A 16 MHz i486 therefore had performance similar to a 33 MHz i386. The older design had to reach 50 MHz to be comparable with a 25 MHz i486 part. Differences between i386 and i486 An 8 KB on-chip (level 1) SRAM cache stores the most recently used instructions and data (16 KB and/or write-back on some later models). The i386 had no internal cache but supported a slower off-chip cache (not officially a level 2 cache because i386 had no internal level 1 cache). An enhanced external bus protocol to enable cache coherency and a new burst mode for memory accesses to fill a cache line of 16 bytes within five bus cycles. The 386 needed eight bus cycles to transfer the same amount of data. Tightly coupled pipelining completes a simple instruction like ALU reg,reg or ALU reg,im every clock cycle (after a latency of several cycles). The i386 needed two clock cycles. Integrated FPU (disabled or absent in SX models) with a dedicated local bus; together with faster algorithms on more extensive hardware than in the i387, this performed floating-point calculations faster than the i386/i387 combination. Improved MMU performance. New instructions: XADD, BSWAP, CMPXCHG, INVD, WBINVD, INVLPG. Just as in the i386, a flat 4 GB memory model could be implemented. All "segment selector" registers could be set to a neutral value in protected mode, or to zero in real mode, and using only the 32-bit "offset registers" (x86-terminology for general CPU registers used as address registers) as a linear 32-bit virtual address bypassing the segmentation logic. Virtual addresses were then normally mapped onto physical addresses by the paging system except when it was disabled. (Real mode had no virtual addresses.) Just as with the i386, circumventing memory segmentation could substantially improve performance for some operating systems and applications. On a typical PC motherboard, either four matched 30-pin (8-bit) SIMMs or one 72-pin (32-bit) SIMM per bank were required to fit the i486's 32-bit data bus. The address bus used 30-bits (A31..A2) complemented by four byte-select pins (instead of A0,A1) to allow for any 8/16/32-bit selection. This meant that the limit of directly addressable physical memory was 4 gigabytes as well (230 32-bit words = 232 8-bit words). Models Intel offered several suffixes and variants (see table). Variants include: Intel RapidCAD: a specially packaged Intel 486DX and a dummy floating-point unit (FPU) designed as pin-compatible replacements for an i386 processor and 80387 FPU. i486SL-NM: i486SL based on i486SX. i487SX (P23N): i486DX with one extra pin sold as an FPU upgrade to i486SX systems; When the i487SX was installed, it ensured that an i486SX was present on the motherboard but disabled it, taking over all of its functions. i486 OverDrive (P23T/P24T): i486SX, i486SX2, i486DX2 or i486DX4. Marked as upgrade processors, some models had different pinouts or voltage-handling abilities from "standard" chips of the same speed. Fitted to a coprocessor or "OverDrive" socket on the motherboard, they worked the same as the i487SX. The maximal internal clock frequency (on Intel's versions) ranged from 16 to 100 MHz. The 16 MHz i486SX model was used by Dell Computers. One of the few i486 models specified for a 50 MHz bus (486DX-50) initially had overheating problems and was moved to the 0.8-micrometer fabrication process. However, problems continued when the 486DX-50 was installed in local-bus systems due to the high bus speed, making it unpopular with mainstream consumers. Local-bus video was considered a requirement at the time, though it remained popular with users of EISA systems. The 486DX-50 was soon eclipsed by the clock-doubled i486DX2, which although running the internal CPU logic at twice the external bus speed (50 MHz), was nevertheless slower becaue the external bus ran at only 25 MHz. The i486DX2 at 66 MHz (with 33 MHz external bus) was faster than the 486DX-50, overall. More powerful i486 iterations such as the OverDrive and DX4 were less popular (the latter available as an OEM part only), as they came out after Intel had released the next-generation Pentium processor family. Certain steppings of the DX4 also officially supported 50 MHz bus operation, but it was a seldom-used feature. {| class="wikitable" ! || Model || CPU/busclock speed || Voltage || L1 cache* || Introduced ! width="520px" | Notes |- | || i486DX (P4) || 20, 25 MHz33 MHz50 MHz || 5 V || 8 KB WT || April 1989May 1990June 1991 || The original chip without clock multiplier |- | || i486SL || 20, 25, 33 MHz || 5 V or 3.3 V || 8 KB WT || November 1992 || Low-power version of the i486DX, reduced VCore, SMM (System Management Mode), stop clock, and power-saving features — mainly for use in portable computers |- | || i486SX (P23) || 16, 20, 25 MHz33 MHz || 5 V || 8 KB WT || September 1991September 1992 || An i486DX with the FPU part disabled; later versions had the FPU removed from the die to reduce area and hence cost. |- | || i486DX2 (P24) || 40/20, 50/25 MHz66/33 MHz || 5 V || 8 KB WT || March 1992August 1992 || The internal processor clock runs at twice the clock rate of the external bus clock |- | || i486DX-S (P4S) || 33 MHz; 50 MHz || 5 V or 3.3 V || 8 KB WT || June 1993 || SL Enhanced 486DX |- | || i486DX2-S (P24S) || 40/20 MHz,50/25 MHz,(66/33 MHz) || 5 V or 3.3 V || 8 KB WT || June 1993 || |- | || i486SX-S (P23S)|| 25, 33 MHz || 5 V or 3.3 V || 8 KB WT || June 1993 || SL Enhanced 486SX |- | || i486SX2 || 50/25, 66/33 MHz || 5 V || 8 KB WT || March 1994 || i486DX2 with the FPU disabled |- | || IntelDX4 (P24C) || 75/25, 100/33 MHz || 3.3 V || 16 KB WT || March 1994 || Designed to run at triple clock rate (not quadruple, as often believed; the DX3, which was meant to run at 2.5× the clock speed, was never released). DX4 models that featured write-back cache were identified by an "&EW" laser-etched into their top surface, while the write-through models were identified by "&E". |- | || i486DX2WB (P24D)|| 50/25 MHz,66/33 MHz || 5 V || 8 KB WB || October 1994 || Enabled write-back cache. |- | || IntelDX4WB || 100/33 MHz || 3.3 V || 16 KB WB || October 1994 || |- | || i486DX2 (P24LM) || 90/30 MHz,100/33 MHz || 2.5–2.9 V || 8 KB WT || 1994 || |- | || i486GX || up to 33 MHz || 3.3 V || 8 KB WT || || Embedded ultra-low-power CPU with all features of the i486SX and 16-bit external data bus. This CPU is for embedded battery-operated and hand-held applications. |} *WT = write-through cache strategy, WB = write-back cache strategy Other makers of 486-like CPUs Processors compatible with the i486 were produced by companies such as IBM, Texas Instruments, AMD, Cyrix, UMC, and STMicroelectronics (formerly SGS-Thomson). Some were clones (identical at the microarchitectural level), others were clean room implementations of the Intel instruction set. (IBM's multiple-source requirement was one of the reasons behind its x86 manufacturing since the 80286.) The i486 was, however, covered by many Intel patents, including from the prior i386. Intel and IBM had broad cross-licenses of these patents, and AMD was granted rights to the relevant patents in the 1995 settlement of a lawsuit between the companies. AMD produced several clones using a 40 MHz bus (486DX-40, 486DX/2-80, and 486DX/4-120) which had no Intel equivalent, as well as a part specified for 90 MHz, using a 30 MHz external clock, that was sold only to OEMs. The fastest running i486-compatible CPU, the Am5x86, ran at 133 MHz and was released by AMD in 1995. 150 MHz and 160 MHz parts were planned but never officially released. Cyrix made a variety of i486-compatible processors, positioned at the cost-sensitive desktop and low-power (laptop) markets. Unlike AMD's 486 clones, the Cyrix processors were the result of clean-room reverse engineering. Cyrix's early offerings included the 486DLC and 486SLC, two hybrid chips that plugged into 386DX or SX sockets respectively, and offered 1 KB of cache (versus 8 KB for the then-current Intel/AMD parts). Cyrix also made "real" 486 processors, which plugged into the i486's socket and offered 2 or 8 KB of cache. Clock-for-clock, the Cyrix-made chips were generally slower than their Intel/AMD equivalents, though later products with 8 KB caches were more competitive, albeit late to market. The Motorola 68040, while not i486 compatible, was often positioned as its equivalent in features and performance. Clock-for-clock basis the Motorola 68040 could significantly outperform the Intel chip. However, the i486 had the ability to be clocked significantly faster without overheating. Motorola 68040 performance lagged behind the later production i486 systems. Motherboards and buses Early i486-based computers were equipped with several ISA slots (using an emulated PC/AT-bus) and sometimes one or two 8-bit-only slots (compatible with the PC/XT-bus). Many motherboards enabled overclocking of these from the default 6 or 8 MHz to perhaps 16.7 or 20 MHz (half the i486 bus clock) in several steps, often from within the BIOS setup. Especially older peripheral cards normally worked well at such speeds as they often used standard MSI chips instead of slower (at the time) custom VLSI designs. This could give significant performance gains (such as for old video cards moved from a 386 or 286 computer, for example). However, operation beyond 8 or 10 MHz could sometimes lead to stability problems, at least in systems equipped with SCSI or sound cards. Some motherboards came equipped with a 32-bit EISA bus that was backward compatible with the ISA-standard. EISA offered attractive features such as increased bandwidth, extended addressing, IRQ sharing, and card configuration through software (rather than through jumpers, DIP switches, etc.) However, EISA cards were expensive and therefore mostly employed in servers and workstations. Consumer desktops often used the simpler, faster VESA Local Bus (VLB). Unfortunately prone to electrical and timing-based instability; typical consumer desktops had ISA slots combined with a single VLB slot for a video card. VLB was gradually replaced by PCI during the final years of the i486 period. Few Pentium class motherboards had VLB support as VLB was based directly on the i486 bus; much different from the P5 Pentium-bus. ISA persisted through the P5 Pentium generation and was not completely displaced by PCI until the Pentium III era. Late i486 boards were normally equipped with both PCI and ISA slots, and sometimes a single VLB slot. In this configuration, VLB or PCI throughput suffered depending on how buses were bridged. Initially, the VLB slot in these systems was usually fully compatible only with video cards (fitting as "VESA" stands for Video Electronics Standards Association); VLB-IDE, multi I/O, or SCSI cards could have problems on motherboards with PCI slots. The VL-Bus operated at the same clock speed as the i486-bus (basically a local bus) while the PCI bus also usually depended on the i486 clock but sometimes had a divider setting available via the BIOS. This could be set to 1/1 or 1/2, sometimes even 2/3 (for 50 MHz CPU clocks). Some motherboards limited the PCI clock to the specified maximum of 33 MHz and certain network cards depended on this frequency for correct bit-rates. The ISA clock was typically generated by a divider of the CPU/VLB/PCI clock. One of the earliest complete systems to use the i486 chip was the Apricot VX FT, produced by British hardware manufacturer Apricot Computers. Even overseas in the United States it was popularized as "The World's First 486". Later i486 boards supported Plug-And-Play, a specification designed by Microsoft that began as a part of Windows 95 to make component installation easier for consumers. Obsolescence The AMD Am5x86 and Cyrix Cx5x86 were the last i486 processors often used in late-generation i486 motherboards. They came with PCI slots and 72-pin SIMMs that were designed to run Windows 95, and also used for 80486 motherboards upgrades. While the Cyrix Cx5x86 faded when the Cyrix 6x86 took over, the AMD Am5x86 remained important given AMD K5 delays. Computers based on the i486 remained popular through the late 1990s, serving as low-end processors for entry-level PCs. Production for traditional desktop and laptop systems ceased in 1998, when Intel introduced the Celeron brand, though it continued to be produced for embedded systems through the late 2000s. In the general-purpose desktop computer role, i486-based machines remained in use into the early 2000s, especially as Windows 95 through 98 and Windows NT 4.0 were the last Microsoft operating systems to officially support i486-based systems. However, as they were overtaken by newer operating systems, i486 systems fell out of use except for backward compatibility with older programs (most notably games), especially given problems running on newer operating systems. However, DOSBox was available for later operating systems and provides emulation of the i486 instruction set, as well as full compatibility with most DOS-based programs. The i486 was eventually overtaken by the Pentium for personal computer applications, although Intel continued production for use in embedded systems. In May 2006, Intel announced that production of the i486 would stop at the end of September 2007. See also List of Intel microprocessors Motorola 68040, although not compatible, was often positioned as the Motorola equivalent to the Intel 486 in terms of performance and features. VL86C020, ARM3 core of similar time frame and comparable MIPS performance on integer code (25 MHz for both), with 310,000 transistors (in a 1.5 µm process) instead of 1 million Notes References External links Intel486 datasheets Low power SX and DX with variable freq. Dec 1992 EMBEDDED ULTRA-LOW POWER Intel 486 SX Embedded Write-Back Enhanced Intel DX4. Oct 1995 Intel i486 DX images and descriptions at cpu-collection.de Die photo of Intel 386DX Computer-related introductions in 1989 486 32-bit microprocessors
[ -0.2439865618944168, -0.10527104884386063, -0.09134066104888916, 0.061842773109674454, -0.018285246565937996, 0.2434743493795395, 0.0492701381444931, -0.004605041351169348, -0.038397304713726044, -0.2742535173892975, -0.25487297773361206, 0.12249980121850967, -0.2679450809955597, -0.138415...
15164
https://en.wikipedia.org/wiki/Intel%2080486SX
Intel 80486SX
Intel's i486SX was a modified Intel 486DX microprocessor with its floating-point unit (FPU) disabled. It was intended as a lower-cost CPU for use in low-end systems. Computer manufacturers that used these processors include Packard Bell, Compaq, ZEOS and IBM. Overview In the mid-early 1990s, common applications did not need or benefit from an FPU. Among the rare exceptions were CAD applications, which could often simulate floating point operations in software, but benefited from a hardware floating point unit immensely. AMD had begun manufacturing its 386DX clone which was faster than Intel's. To respond to this new situation Intel wanted to provide a lower cost i486 CPU for system integrators, but without sacrificing the better profit margins of a "full" i486. This was accomplished through a debug feature called Disable Floating Point (DFP), by grounding a certain bond wire in the CPU package. The i486SX was introduced in mid-1991 at 20 MHz in a PGA package. Later (1992) versions of the i486SX had the FPU entirely removed for cost-cutting reasons and comes in surface-mount packages as well. Many systems allowed the user to upgrade the i486SX to a CPU with the FPU enabled. The upgrade was shipped as the i487, which was a full-blown i486DX chip with an extra pin. The extra pin prevents the chip from being installed incorrectly. The NC# pin, one of the standard 168 pins, was used to shut off the i486SX. Although i486SX devices were not used at all when the i487 was installed, they were hard to remove because the i486SX was typically installed in non-ZIF sockets or in a plastic package that was surface mounted on the motherboard. Later OverDrive processors also plugged into the socket and offered performance enhancements as well. Gallery References External links Intel 80486SX images and descriptions at cpu-collection.de Intel Datasheets Embedded i486SX Embedded Ultra-Low Power i486SX 80486Sx de:Intel i486#i486SX
[ -0.41998717188835144, -0.0003883946337737143, -0.1810884028673172, 0.18686820566654205, -0.15534643828868866, 0.04971535503864288, 0.3628043830394745, 0.25078338384628296, -0.047618262469768524, -0.09149152040481567, -0.36528241634368896, 0.19657911360263824, -0.6132680177688599, -0.040035...
15165
https://en.wikipedia.org/wiki/Ivory
Ivory
Ivory is a hard, white material from the tusks (traditionally from elephants) and teeth of animals, that consists mainly of dentine, one of the physical structures of teeth and tusks. The chemical structure of the teeth and tusks of mammals is the same, regardless of the species of origin. The trade in certain teeth and tusks other than elephant is well established and widespread; therefore, "ivory" can correctly be used to describe any mammalian teeth or tusks of commercial interest which are large enough to be carved or scrimshawed. Besides natural ivory, ivory can also be produced synthetically, hence (unlike natural ivory) not requiring the retrieval of the material from animals. Tagua nuts can also be carved like ivory. The trade of finished goods of ivory products has its origins in Indus valley. Ivory is a main product that is seen in abundance and was used for trading in Harappan civilization. Finished ivory products that were seen in Harappan sites include kohl sticks, pins, awls, hooks, toggles, combs, gamesmen, dice, inlay and other personal ornaments. Ivory has been valued since ancient times in art or manufacturing for making a range of items from ivory carvings to false teeth, piano keys, fans, and dominoes. Elephant ivory is the most important source, but ivory from mammoth, walrus, hippopotamus, sperm whale, killer whale, narwhal and warthog are used as well. Elk also have two ivory teeth, which are believed to be the remnants of tusks from their ancestors. The national and international trade in natural ivory of threatened species such as African and Asian elephants is illegal. The word ivory ultimately derives from the ancient Egyptian âb, âbu ("elephant"), through the Latin ebor- or ebur. Uses Both the Greek and Roman civilizations practiced ivory carving to make large quantities of high value works of art, precious religious objects, and decorative boxes for costly objects. Ivory was often used to form the white of the eyes of statues. There is some evidence of either whale or walrus ivory used by the ancient Irish. Solinus, a Roman writer in the 3rd century claimed that the Celtic peoples in Ireland would decorate their sword-hilts with the 'teeth of beasts that swim in the sea'. Adomnan of Iona wrote a story about St Columba giving a sword decorated with carved ivory as a gift that a penitent would bring to his master so he could redeem himself from slavery. The Syrian and North African elephant populations were reduced to extinction, probably due to the demand for ivory in the Classical world. The Chinese have long valued ivory for both art and utilitarian objects. Early reference to the Chinese export of ivory is recorded after the Chinese explorer Zhang Qian ventured to the west to form alliances to enable the eventual free movement of Chinese goods to the west; as early as the first century BC, ivory was moved along the Northern Silk Road for consumption by western nations. Southeast Asian kingdoms included tusks of the Indian elephant in their annual tribute caravans to China. Chinese craftsmen carved ivory to make everything from images of deities to the pipe stems and end pieces of opium pipes. In Japan, ivory carvings became popular in the 17th century during the Edo period, and many netsuke and kiseru, on which animals and legendary creatures were carved, and inro, on which ivory was inlaid, were made. From the mid-1800s, the new Meiji government's policy of promoting and exporting arts and crafts led to the frequent display of elaborate ivory crafts at World's fair. Among them, the best works were admired because they were purchased by Western museums, wealthy people, and the Japanese Imperial family. The Buddhist cultures of Southeast Asia, including Myanmar, Thailand, Laos and Cambodia, traditionally harvested ivory from their domesticated elephants. Ivory was prized for containers due to its ability to keep an airtight seal. It was also commonly carved into elaborate seals utilized by officials to "sign" documents and decrees by stamping them with their unique official seal. In Southeast Asian countries, where Muslim Malay peoples live, such as Malaysia, Indonesia and the Philippines, ivory was the material of choice for making the handles of kris daggers. In the Philippines, ivory was also used to craft the faces and hands of Catholic icons and images of saints prevalent in the Santero culture. Tooth and tusk ivory can be carved into a vast variety of shapes and objects. Examples of modern carved ivory objects are okimono, netsukes, jewelry, flatware handles, furniture inlays, and piano keys. Additionally, warthog tusks, and teeth from sperm whales, orcas and hippos can also be scrimshawed or superficially carved, thus retaining their morphologically recognizable shapes. Ivory usage in the last thirty years has moved towards mass production of souvenirs and jewelry. In Japan, the increase in wealth sparked consumption of solid ivory hanko – name seals – which before this time had been made of wood. These hanko can be carved out in a matter of seconds using machinery and were partly responsible for massive African elephant decline in the 1980s, when the African elephant population went from 1.3 million to around 600,000 in ten years. Consumption before plastics Before plastics were introduced, ivory had many ornamental and practical uses, mainly because of the white color it presents when processed. It was formerly used to make cutlery handles, billiard balls, piano keys, Scottish bagpipes, buttons and a wide range of ornamental items. Synthetic substitutes for ivory in the use of most of these items have been developed since 1800: the billiard industry challenged inventors to come up with an alternative material that could be manufactured; the piano industry abandoned ivory as a key covering material in the 1970s. Ivory can be taken from dead animals – however, most ivory came from elephants that were killed for their tusks. For example, in 1930 to acquire 40 tons of ivory required the killing of approximately 700 elephants. Other animals which are now endangered were also preyed upon, for example, hippos, which have very hard white ivory prized for making artificial teeth. In the first half of the 20th century, Kenyan elephant herds were devastated because of demand for ivory, to be used for piano keys. During the Art Deco era from 1912 to 1940, dozens (if not hundreds) of European artists used ivory in the production of chryselephantine statues. Two of the most frequent users of ivory in their sculptured artworks were Ferdinand Preiss and Claire Colinet. Availability Owing to the rapid decline in the populations of the animals that produce it, the importation and sale of ivory in many countries is banned or severely restricted. In the ten years preceding a decision in 1989 by CITES to ban international trade in African elephant ivory, the population of African elephants declined from 1.3 million to around 600,000. It was found by investigators from the Environmental Investigation Agency (EIA) that CITES sales of stockpiles from Singapore and Burundi (270 tonnes and 89.5 tonnes respectively) had created a system that increased the value of ivory on the international market, thus rewarding international smugglers and giving them the ability to control the trade and continue smuggling new ivory. Since the ivory ban, some Southern African countries have claimed their elephant populations are stable or increasing, and argued that ivory sales would support their conservation efforts. Other African countries oppose this position, stating that renewed ivory trading puts their own elephant populations under greater threat from poachers reacting to demand. CITES allowed the sale of 49 tonnes of ivory from Zimbabwe, Namibia and Botswana in 1997 to Japan. In 2007, under pressure from the International Fund for Animal Welfare, eBay banned all international sales of elephant-ivory products. The decision came after several mass slaughters of African elephants, most notably the 2006 Zakouma elephant slaughter in Chad. The IFAW found that up to 90% of the elephant-ivory transactions on eBay violated their own wildlife policies and could potentially be illegal. In October 2008, eBay expanded the ban, disallowing any sales of ivory on eBay. A more recent sale in 2008 of 108 tonnes from the three countries and South Africa took place to Japan and China. The inclusion of China as an "approved" importing country created enormous controversy, despite being supported by CITES, the World Wide Fund for Nature and Traffic. They argued that China had controls in place and the sale might depress prices. However, the price of ivory in China has skyrocketed. Some believe this may be due to deliberate price fixing by those who bought the stockpile, echoing the warnings from the Japan Wildlife Conservation Society on price-fixing after sales to Japan in 1997, and monopoly given to traders who bought stockpiles from Burundi and Singapore in the 1980s. A 2019 peer-reviewed study reported that the rate of African elephant poaching was in decline, with the annual poaching mortality rate peaking at over 10% in 2011 and falling to below 4% by 2017. The study found that the "annual poaching rates in 53 sites strongly correlate with proxies of ivory demand in the main Chinese markets, whereas between-country and between-site variation is strongly associated with indicators of corruption and poverty." Based on these findings, the study authors recommended action to both reduce demand for ivory in China and other main markets and to decrease corruption and poverty in Africa. In 2006, nineteen African countries signed the "Accra Declaration" calling for a total ivory trade ban, and twenty range states attended a meeting in Kenya calling for a 20-year moratorium in 2007. Methods of obtaining ivory can be divided into: Shooting the elephant to take its tusks: this method is of concern here. Taking tusks from an elephant which has died of natural causes. Taking tusks from an elephant which has had to be put down for another reason, for example, severe arthritis, or if its last molar teeth are worn out and can no longer chew its food. Finding old tusks from elephants which died a long time before. Among working elephants which use their tusks to carry logs, there is a best length for their tusks. In former times in India, often their tusks were cut back to this length (and often the shortened tusk's end was bound in copper). This periodically freed pieces of ivory for the carving trade. Controversy and conservation issues The use and trade of elephant ivory have become controversial because they have contributed to seriously declining elephant populations in many countries. It is estimated that consumption in Great Britain alone in 1831 amounted to the deaths of nearly 4,000 elephants. In 1975, the Asian elephant was placed on Appendix I of the Convention on International Trade in Endangered Species (CITES), which prevents international trade between member states of species that are threatened by trade. The African elephant was placed on Appendix I in January 1990. Since then, some southern African countries have had their populations of elephants "downlisted" to Appendix II, allowing the domestic trade of non-ivory items; there have also been two "one off" sales of ivory stockpiles. In June 2015, more than a ton of confiscated ivory was crushed in New York City's Times Square by the Wildlife Conservation Society to send a message that the illegal trade will not be tolerated. The ivory, confiscated in New York and Philadelphia, was sent up a conveyor belt into a rock crusher. The Wildlife Conservation Society has pointed out that the global ivory trade leads to the slaughter of up to 35,000 elephants a year in Africa. In June 2018, Conservative MEPs’ Deputy Leader Jacqueline Foster MEP urged the EU to follow the UK's lead and introduce a tougher ivory ban across Europe. China was the biggest market for poached ivory but announced they would phase out the legal domestic manufacture and sale of ivory products in May 2015. In September of the same year, China and the U.S. announced they would "enact a nearly complete ban on the import and export of ivory." The Chinese market has a high degree of influence on the elephant population. Alternatives Fossil mammoth tusks Trade in the ivory from the tusks of dead woolly mammoths frozen in the tundra has occurred for 300 years and continues to be legal. Mammoth ivory is used today to make handcrafted knives and similar implements. Mammoth ivory is rare and costly because mammoths have been extinct for millennia, and scientists are hesitant to sell museum-worthy specimens in pieces. Some estimates suggest that 10 million mammoths are still buried in Siberia. Fossil walrus ivory Fossil walrus ivory from animals that died before 1972 is legal to buy and sell or possess in the United States, unlike many other types of ivory. Synthetic ivory Ivory can also be produced synthetically. Nuts A species of hard nut is gaining popularity as a replacement for ivory, although its size limits its usability. It is sometimes called vegetable ivory, or tagua, and is the seed endosperm of the ivory nut palm commonly found in coastal rainforests of Ecuador, Peru and Colombia. Gallery See also Biobased economy Destruction of ivory Ivory carving Ivory tower Jim Nyamu Vegetable ivory Walrus ivory RAL 1014 Ivory References External links TRAFFIC; "New report confirms 'major surge' in ivory smuggling in 2011" EIA "Blood Ivory: Exposing the myth of a regulated market" Federation of Environmental Organizations Sri Lanka: "Blood Ivory to Buddhist Temples?" Gemological properties of ivory The International Ivory Society Includes several diagrams. Sculpture materials
[ -0.1373060941696167, 0.40766745805740356, -1.064421534538269, 0.42341384291648865, 0.11081303656101227, 0.7759692668914795, 0.017804769799113274, 0.35524803400039673, -0.6941397786140442, -0.11262618005275726, 0.0402156338095665, 0.2385246455669403, -0.2123452126979828, 0.4461091458797455,...
15166
https://en.wikipedia.org/wiki/Infantry%20fighting%20vehicle
Infantry fighting vehicle
An infantry fighting vehicle (IFV), also known as a mechanized infantry combat vehicle (MICV), is a type of armoured fighting vehicle used to carry infantry into battle and provide direct-fire support. The 1990 Treaty on Conventional Armed Forces in Europe defines an infantry fighting vehicle as "an armoured combat vehicle which is designed and equipped primarily to transport a combat infantry squad, and which is armed with an integral or organic cannon of at least 20 millimeters calibre and sometimes an antitank missile launcher". IFVs often serve both as the principal weapons system and as the mode of transport for a mechanized infantry unit. Infantry fighting vehicles are distinct from armored personnel carriers (APCs), which are transport vehicles armed only for self-defense and not specifically engineered to fight on their own. IFVs are designed to be more mobile than tanks and are equipped with a rapid-firing autocannon or a large conventional gun; they may include side ports for infantrymen to fire their personal weapons while on board. The IFV rapidly gained popularity with armies worldwide due to a demand for vehicles with high firepower that were less expensive and easier to maintain than tanks. Nevertheless, it did not supersede the APC concept altogether, due to the latter's continued usefulness in specialized roles. Some armies continue to maintain fleets of both IFVs and APCs. History Early Cold War The infantry fighting vehicle (IFV) concept evolved directly out of that of the armored personnel carrier (APC). During the Cold War of 1947-1991 armies increasingly fitted heavier and heavier weapons systems on an APC chassis to deliver suppressive covering fire for infantry debussing from the vehicle's troop compartment. With the growing mechanization of infantry units worldwide, some armies also came to believe that the embarked personnel should fire their weapons from inside the protection of the APC and only fight on foot as a last resort. These two trends led to the IFV, with firing ports in the troop compartment and a crew-manned weapons system. The IFV established a new niche between those combat vehicles which functioned primarily as armored weapons-carriers or as APCs. During the 1950s, Soviet, US, and most Western-European armies had adopted tracked APCs. In 1958, however, the Federal Republic of Germany's newly-organized Bundeswehr adopted the Schützenpanzer Lang HS.30 (also known simply as the SPz 12-3), which resembled a conventional tracked APC but carried a turret-mounted 20 mm autocannon that enabled it to engage other armored vehicles. The SPz 12-3 was the first purpose-built IFV. The Bundeswehr's doctrine called for mounted infantry to fight and maneuver alongside tank formations rather than simply being ferried to the edge of the battlefield before dismounting. Each SPz 12-3 could carry five troops in addition to a three-man crew. Despite this, the design lacked firing ports, forcing the embarked infantry to expose themselves through open hatches to return fire. In practice it was a troubled design with reliability issues and politically controversial. As the SPz 12-3 was being inducted into service, the French and Austrian armies adopted new APCs which possessed firing ports, allowing embarked infantry to observe and fire their weapons from inside the vehicle. These were known as the AMX-VCI and Saurer 4K, respectively. Austria subsequently introduced an IFV variant of the Saurer 4K which carried a 20 mm autocannon, making it the first vehicle of this class to possess both firing ports and a turreted weapons-system. In the mid-1960s, the Swedish Army also adopted a variant of the Pansarbandvagn 302 APC which carried a 20 mm autocannon. Following the trend towards converting preexisting APCs into IFVs, the Dutch, US, and Belgian armies experimented with a variety of modified M113s during the late 1960s; these were collectively identified as the AIFV (Armored Infantry Fighting Vehicle). The first US M113-based IFV appeared in 1969; known as the XM765, it had a sharply angled hull, ten vision blocks, and a cupola-mounted 20 mm autocannon. The XM765 design, though rejected for service, later became the basis for the very similar Dutch YPR-765. The YPR-765 had five firing ports and a 25 mm autocannon with a co-axial machine gun. The Soviet Army fielded its first tracked APC, the BTR-50, in 1957. Its first wheeled APC, the BTR-152, had been designed as early as the late 1940s. Early versions of both these lightly-armored vehicles were open-topped and carried only general-purpose machine guns for armament. As Soviet strategists became more preoccupied with the possibility of a war involving weapons of mass destruction, they became convinced of the need to deliver mounted troops to a battlefield without exposing them to the radioactive fallout from an atomic weapon. The IFV concept was received favorably because it would enable a Soviet infantry squad to fight from inside their vehicles when operating in contaminated environments. Soviet design work on a new tracked IFV began in the late 1950s and the first prototype appeared as the Obyekt 765 in 1961. After evaluating and rejecting a number of other wheeled and tracked prototypes, the Soviet Army accepted the Obyekt 765 for service. It entered serial production as the BMP-1 in 1966. In addition to being amphibious and superior in cross-country mobility to its predecessors, the BMP-1 carried a 73mm smoothbore cannon, a co-axial PKT machine gun, and a launcher for 9M14 Malyutka anti-tank missiles. Its hull had sufficiently heavy armor to resist .50 caliber armor-piercing ammunition along its frontal arc. Eight firing ports and vision blocks allowed the embarked infantry squad to observe and engage targets with rifles or machine guns. The BMP-1 was so heavily armed and armored that it was widely regarded as having combined the qualities of a light tank with those of the traditional APC. Its use of a relatively large caliber main gun marked a notable departure from the Western trend of fitting IFVs with automatic cannon, which were more suitable for engaging low-flying aircraft, light armor, and dismounted personnel. The Soviet Union produced about 20,000 BMP-1s from 1966 to 1983, at which time it was regarded as the most ubiquitous IFV in the world. In Soviet service, the BMP-1 was ultimately superseded by the more sophisticated BMP-2 (in service from 1980) and by the BMP-3 (in service from 1987). A similar vehicle known as the BMD-1 was designed to accompany Soviet airborne infantry and for a number of years was the world's only airborne IFV. In 1971 the Bundeswehr adopted the Marder, which became increasingly heavily armored through its successive marks and - like the BMP - was later fitted as standard with a launcher for anti-tank guided missiles. Between 1973 and 1975 the French and Yugoslav armies developed the AMX-10P and BVP M-80, respectively - the first amphibious IFVs to appear outside the Soviet Union. The Marder, AMX-10P, and M-80 were all armed with similar 20 mm autocannon and carried seven to eight passengers. They could also be armed with various anti-tank missile configurations. Late Cold War and post-Soviet period Wheeled IFVs did not begin appearing until 1976, when the Ratel was introduced in response to a South African Army specification for a wheeled combat vehicle suited to the demands of rapid offensives combining maximum firepower and strategic mobility. Unlike European IFVs, the Ratel was not designed to allow mounted infantrymen to fight in concert with tanks but rather to operate independently across vast distances. South African officials chose a very simple, economical design because it helped reduce the significant logistical commitment necessary to keep heavier combat vehicles operational in undeveloped areas. Excessive track wear was also an issue in the region's abrasive, sandy terrain, making the Ratel's wheeled configuration more attractive. The Ratel was typically armed with a 20 mm autocannon featuring what was then a unique twin-linked ammunition feed, allowing its gunner to rapidly switch between armor-piercing or high-explosive ammunition. Other variants were also fitted with mortars, a bank of anti-tank guided missiles, or a 90 mm cannon. Most notably, the Ratel was the first mine-protected IFV; it had a blastproof hull and was built to withstand the explosive force of anti-tank mines favored by local insurgents. Like the BMP-1, the Ratel proved to be a major watershed in IFV development, albeit for different reasons: until its debut wheeled IFV designs were evaluated unfavorably, since they lacked the weight-carrying capacity and off-road mobility of tracked vehicles, and their wheels were more vulnerable to hostile fire. However, during the 1970s improvements in power trains, suspension technology, and tires had increased their potential strategic mobility. Reduced production, operation, and maintenance costs also helped make wheeled IFVs attractive to several nations. During the late 1960s and early 1970s, the US Army had gradually abandoned its attempts to utilize the M113 as an IFV and refocused on creating a dedicated IFV design able to match the BMP. Although considered reliable, the M113 chassis did not meet the necessary requirements for protection or stealth. The US also considered the M113 too heavy and slow to serve as an IFV capable of keeping pace with tanks. Its MICV-65 program produced a number of unique prototypes, none of which were accepted for service owing to concerns about speed, armor protection, and weight. US Army evaluation staff were sent to Europe to review the AMX-10P and the Marder, both of which were rejected due to high cost, insufficient armor, or lackluster amphibious capabilities. In 1973, the FMC Corporation developed and tested the XM723, which was a 21-ton tracked chassis which could accommodate three crew members and eight passengers. It initially carried a single 20 mm autocannon in a one-man turret but in 1976 a two-man turret was introduced; this carried a 25 mm autocannon like M242 or Oerlikon KBA, a co-axial machine gun, and a TOW anti-tank missile launcher. The XM723 possessed amphibious capability, nine firing ports, and spaced laminate armor on its hull. It was accepted for service with the US Army in 1980 as the Bradley Fighting Vehicle. Successive variants have been retrofitted with improved missile systems, gas particulate filter systems, Kevlar spall liners, and increased stowage. The amount of space taken up by the hull and stowage modifications has reduced the number of passengers to six. By 1982 30,000 IFVs had entered service worldwide, and the IFV concept appeared in the doctrines of 30 national armies. The popularity of the IFV was increased by the growing trend on the part of many nations to mechanize armies previously dominated by light infantry. However, contrary to expectation the IFV did not render APCs obsolete. The US, Russian, French, and German armies have all retained large fleets of IFVs and APCs, finding the APC more suitable for multi-purpose or auxiliary roles. The British Army was one of the few Western armies which had neither recognized a niche for IFVs nor adopted a dedicated IFV design by the late 1970s. In 1980, it made the decision to adopt a new tracked armored vehicle, the FV510 Warrior. British doctrine is that a vehicle should carry troops under protection to the objective and then give firepower support when they have disembarked. While normally classified as an IFV, the Warrior fills the role of an APC in British service and infantrymen do not remain embarked during combat. Doctrine The role of the IFV is closely linked to mechanized infantry doctrine. While some IFVs are armed with an organic direct fire gun or anti-tank guided missiles for close infantry support, they are not intended to assault armored and mechanized forces with any type of infantry on their own, mounted or not. Rather, the IFV's role is to give an infantry unit battlefield, tactical, and operational mobility during combined arms operations. Most IFVs either complement tanks as part of an armored battalion, brigade, or division. Others perform traditional infantry missions supported by tanks. Early development of IFVs in a number of Western nations was promoted primarily by armor officers who wanted to integrate tanks with supporting infantry in armored divisions. There were a few exceptions to the rule: for example, the Bundeswehr's decision to adopt the SPz 12-3 was largely due to the experiences of Wehrmacht panzergrenadiers who had been inappropriately ordered to undertake combat operations better suited for armor. Hence, the Bundeswehr concluded that infantry should only fight while mounted in their own armored vehicles, ideally supported by tanks. This doctrinal trend was later subsumed into the armies of other Western nations, including the US, leading to the widespread conclusion that IFVs should be confined largely to assisting the forward momentum of tanks. The Soviet Army granted more flexibility in this regard to its IFV doctrine, allowing for the mechanized infantry to occupy terrain that compromised an enemy defense, carry out flanking movements, or lure armor into ill-advised counterattacks. While they still performed an auxiliary role to tanks, the notion of using IFVs in these types of engagements dictated that they be heavily armed, which was reflected in the BMP-1 and its successors. Additionally, Soviet airborne doctrine made use of the BMD series of IFVs to operate in concert with paratroops rather than traditional mechanized or armored formations. IFVs assumed a new significance after the Yom Kippur War. In addition to heralding the combat debut of the BMP-1, that conflict demonstrated the newfound significance of anti-tank guided missiles and the obsolescence of independent armored attacks. More emphasis was placed on combined arms offensives, and the importance of mechanized infantry to support tanks reemerged. As a result of the Yom Kippur War, the Soviet Union attached more infantry to its armored formations and the US accelerated its long-delayed IFV development program. An IFV capable of accompanying tanks for the purpose of suppressing anti-tank weapons and the hostile infantry which operated them was seen as necessary to avoid the devastation wreaked on purely armored Israeli formations. Design The US Army defines all vehicles classed as IFVs as having three essential characteristics: they are armed with at least a medium-caliber cannon or automatic grenade launcher, at least sufficiently protected against small arms fire, and possess off-road mobility. It also identifies all IFVs as having some characteristics of an APC and a light tank. The United Nations Register for Conventional Arms (UNROCA) simply defines an IFV as any armored vehicle "designed to fight with soldiers on board" and "to accompany tanks". UNROCA makes a clear distinction between IFVs and APCs, as the former's primary mission is combat rather than general transport. Protection All IFVs possess armored hulls protected against rifle and machine gun fire, and some are equipped with active protection systems. Most have lighter armor than main battle tanks to ensure mobility. Armies have generally accepted risk in reduced protection to recapitalize on an IFV's mobility, weight and speed. Their fully enclosed hulls offer protection from artillery fragments and residual environmental contaminants as well as limit exposure time to the mounted infantry during extended movements over open ground. Many IFVs also have sharply angled hulls that offer a relatively high degree of protection for their armor thickness. The BMP, Boragh, BVP M-80, and their respective variants all possess steel hulls with a distribution of armor and steep angling that protect them during frontal advances. The BMP-1 was vulnerable to heavy machine guns at close range on its flanks or rear, leading to a variety of more heavily armored marks appearing from 1979 onward. The Bradley possessed a lightweight aluminum alloy hull, which in most successive marks has been bolstered by the addition of explosive reactive and slat armor, spaced laminate belts, and steel track skirts. Throughout its life cycle, an IFV is expected to gain 30% more weight from armor additions. As asymmetric conflicts become more common, an increasing concern with regards to IFV protection has been adequate countermeasures against land mines and improvised explosive devices. During the Iraq War, inadequate mine protection in US Bradleys forced their crews to resort to makeshift strategies such as lining the hull floors with sandbags. A few IFVs, such as the Ratel, have been specifically engineered to resist mine explosions. Armament IFVs may be equipped with: turrets carrying autocannons of various calibers, low or medium velocity tank guns, anti-tank guided missiles; or automatic grenade launchers. With a few exceptions, such as the BMP-1 and the BMP-3, designs such as the Marder and the BMP-2 have set the trend of arming IFVs with an autocannon suitable for use against lightly armored vehicles, low-flying aircraft, and dismounted infantry. This reflected the growing inclination to view IFVs as auxiliaries of armored formations: a small or medium caliber autocannon was perceived as an ideal suppressive weapon to complement large caliber tank fire. IFVs armed with miniature tank guns did not prove popular because many of the roles they were expected to perform were better performed by accompanying tanks. The BMP-1, which was the first IFV to carry a relatively large cannon, came under criticism during the Yom Kippur War for its mediocre individual accuracy, due in part to the low velocities of its projectiles. During the Soviet–Afghan War, BMP-1 crews also complained that their armament lacked the elevation necessary to engage insurgents in mountainous terrain. The effectiveness of large caliber, low-velocity guns like the 2A28 Grom on the BMP-1 and BMD-1 was also much reduced by the appearance of Chobham armor on Western tanks. The Ratel, which included a variant armed with a 90mm low-velocity gun, was utilized in South African combat operations against Angolan and Cuban armored formations during the South African Border War, with mixed results. Although the Ratels succeeded in destroying a large number of Angolan tanks and APCs, they were hampered by many of the same problems as the BMP-1: mediocre standoff ranges, inferior fire control, and a lack of stabilized main gun. The Ratels' heavy armament also tempted South African commanders to utilize them as light tanks rather than in their intended role of infantry support. Another design feature of the BMP-1 did prove more successful in establishing a precedent for future IFVs: its inclusion of an anti-tank missile system. This consisted of a rail-launcher firing 9M14 Malyutka missiles which had to be reloaded manually from outside the BMP's turret. Crew members had to expose themselves to enemy fire to reload the missiles, and they could not guide them effectively from inside the confines of the turret space. The BMP-2 and later variants of the BMP-1 made use of semiautonomous guided missile systems. In 1978, the Bundeswehr became the first Western army to embrace this trend when it retrofitted all its Marders with launchers for MILAN anti-tank missiles. The US Army added a launcher for TOW anti-tank missiles to its fleet of Bradleys, despite the fact that this greatly reduced the interior space available for seating the embarked infantry. This was justified on the basis that the Bradley needed to not only engage and destroy other IFVs, but support tanks in the destruction of other tanks during combined arms operations. Mobility IFVs are designed to have the strategic and tactical mobility necessary to keep pace with tanks during rapid maneuvers. Some, like the BMD series, have airborne and amphibious capabilities. IFVs may be either wheeled or tracked; tracked IFVs are usually more heavily armored and possess greater carrying capacity. Wheeled IFVs are cheaper and simpler to produce, maintain, and operate. From a logistical perspective, they are also ideal for an army without widespread access to transporters or a developed rail network to deploy its armor. See also List of AFVs List of modern armoured fighting vehicles Armoured personnel carrier Armoured warfare BMP development Improvised fighting vehicle Infantry Squad Vehicle Mechanized infantry Tank desant Armored car (military) Notes and references Annotations References Armoured fighting vehicles by type Armoured warfare
[ 0.03783290833234787, 0.23170970380306244, -0.37146973609924316, 0.3666382133960724, -0.07187902182340622, 0.396191269159317, 0.22821351885795593, -0.09465276449918747, -0.6099282503128052, -0.42033568024635315, -0.7820656299591064, 0.4692707061767578, -0.03240929916501045, -0.1360560059547...
15167
https://en.wikipedia.org/wiki/ICQ
ICQ
ICQ New is a cross-platform instant messaging (IM) and VoIP client. The name ICQ derives from the English phrase "I Seek You". Originally developed by the Israeli company Mirabilis in 1996, the client was bought by AOL in 1998, and then by Mail.Ru Group (now VK) in 2010. The ICQ client application and service were initially released in November 1996, freely available to download. ICQ was among the first stand-alone instant messenger (IM) — while real-time chat was not in itself new (Internet Relay Chat [IRC] being the most common platform at the time), the concept of a fully centralized service with individual user accounts focused on one-on-one conversations set the blueprint for later instant messaging services like AIM, and its influence is seen in modern social media applications. ICQ became the first widely adopted IM platform. At its peak around 2001, ICQ had more than 100 million accounts registered. At the time of the Mail.Ru acquisition in 2010, there were around 42 million daily users. Since 2013, ICQ has 11 million monthly users. In 2020, the Mail.Ru Group, which owns ICQ, decided to launch its new ICQ New software, based on its messenger. The updated messenger was presented to the general public on April 6, 2020. During the second week of January 2021, ICQ saw a renewed increase in popularity in Hong Kong, spurred on by the controversy over WhatsApp's privacy policy update. The number of downloads for the application increased 35-fold in the region. Features Private chats are a conversation between two users. When logging into an account, the chat can be accessed from any device thanks to cloud synchronization. A user can delete a sent message at any time either in their own chat or in their conversation partner's, and a notification will be received instead indicating that the message has been deleted. Any important messages from group or private chats, as well as an unlimited number and size of media content, can be sent to the conversation with oneself. Essentially, this chat acts as a free cloud storage. These are special chats where chats can take place of up to 25 thousand participants at the same time. Any user can create a group. A user can hide their phone number from other participants; there is an advanced polling feature; there is the possibility to see which group members have read a message, and notifications can be switched off for messages from specific group members. An alternative to blogs. Channel authors can publish posts as text messages and also attach media files. Once the post is published, subscribers receive a notification as they would from regular and group chats. The channel author can remain anonymous and does not have to show any information in the channel description. A special API-bot is available and can be used by anyone to create a bot, i.e. a small program which performs specific actions and interacts with the user. Bots can be used in a variety of ways ranging from entertainment to business services. Stickers (small images or photos expressing some form of emotion) are available to make communication via the application more emotive and personalized. Users can use the sticker library already available or upload their own. In addition, thanks to machine learning the software will recommend a sticker during communication by itself. Masks are images that are superimposed onto the camera in real-time. They can be used during video calls, superimposed onto photos and sent to other users. A nickname is a name made up by a user. It can replace a phone number when searching for and adding user contact. By using a nickname, users can share their contact details without providing a phone number. Smart answers are short phrases that appear above the message box which can be used to answer messages. ICQ NEW analyzes the contents of a conversation and suggests a few pre-set answers. ICQ NEW makes it possible to send audio messages. However, for people who do not want to or cannot listen to the audio, the audio can be automatically transcribed into text. All the user needs to do is click the relevant button and they will see the message in text form. Aside from text messaging, users can call each other as well as arrange audio or video calls for up to five people. During the video call, AR-masks can be used. UIN ICQ users are identified and distinguished from one another by UIN, or User Identification Numbers, distributed in sequential order. The UIN was invented by Mirabilis, as the user name assigned to each user upon registration. Issued UINs started at '10,000' (5 digits) and every user receives a UIN when first registering with ICQ. As of ICQ6 users are also able to log in using the specific e-mail address they associated with their UIN during the initial registration process. Unlike other instant messaging software or web applications, on ICQ the only permanent user info is the UIN, although it is possible to search for other users using their associated e-mail address or any other detail they have made public by updating it in their account's public profile. In addition the user can change all of his or her personal information, including screen name and e-mail address, without having to re-register. Since 2000 ICQ and AIM users were able to add each other to their contact list without the need for any external clients. (The AIM service has since been discontinued.) As a response to UIN theft or sale of attractive UINs, ICQ started to store email addresses previously associated with a UIN. As such UINs that are stolen can sometimes be reclaimed. This applies only if (since 1999 onwards) a valid primary email address was entered into the user profile. History The founding company of ICQ, Mirabilis, was established in June 1996 by five Israeli developers: Yair Goldfinger, Sefi Vigiser, Amnon Amir, Arik Vardi, and Arik's father Yossi Vardi. They recognized that many people were accessing the internet through non-UNIX operating systems, such as Microsoft Windows, and those users were unfamiliar with established chat technologies, e.g. IRC. ICQ was one of the first text-based messengers to reach a wide range of users. The technology Mirabilis developed for ICQ was distributed free of charge. The technology's success encouraged AOL to acquire Mirabilis on June 8, 1998, for $287 million up front and $120 million in additional payments over three years based on performance levels. In 2002 AOL successfully patented the technology. After the purchase the product was initially managed by Ariel Yarnitsky and Avi Shechter. ICQ's management changed at the end of 2003. Under the leadership of the new CEO, Orey Gilliam, who also assumed the responsibility for all of AOL's messaging business in 2007, ICQ resumed its growth; it was not only a highly profitable company, but one of AOL's most successful businesses. Eliav Moshe replaced Gilliam in 2009 and became ICQ's managing director. In April 2010, AOL sold ICQ to Digital Sky Technologies, headed by Alisher Usmanov, for $187.5 million. While ICQ was displaced by AOL Instant Messenger, Google Talk, and other competitors in the U.S. and many other countries over the 2000s, it remained the most popular instant messaging network in Russian-speaking countries, and an important part of online culture. Popular UINs demanded over 11,000₽ in 2010. In September of that year, Digital Sky Technologies changed its name to Mail.Ru Group. Since the acquisition, Mail.ru has invested in turning ICQ from a desktop client to a mobile messaging system. As of 2013, around half of ICQ's users were using its mobile apps, and in 2014, the number of users began growing for the first time since the purchase. In March 2016 the source code of the client was released under the Apache license on github.com. Development history ICQ 99a/b the first releases that were widely available. ICQ 2000 incorporated into Notes and Reminder features. ICQ 2001 included server-side storage of the contact list. This provided synchronization between multiple computers and enforced obtaining consent before adding UINs to the contact list by preventing clients from modifying the local contact list directly. On December 19, 2002, AOL Time Warner announced that ICQ had been issued a United States patent for instant messaging. ICQ 2002 was the last completely advertising-free ICQ version. ICQ Pro 2003b was the first ICQ version to use the ICQ protocol version 10. However, ICQ 5 and 5.1 use version 9 of the protocol. ICQ 2002 and 2003a used version 8 of the ICQ protocol. Earlier versions (ICQ 2001b and all ICQ clients before it) used ICQ protocol version 7. ICQ 4 and later ICQ 5 (released on Monday, February 7, 2005), were upgrades on ICQ Lite. One addition was Xtraz, which offers games and features intended to appeal to younger users of the Internet. ICQ Lite was originally an idea to offer the lighter users of instant messaging an alternative client which was a smaller download and less resource-hungry for relatively slow computers. ICQ 5 introduced skins support. There are few official skins available for the current ICQ 5.1 at the official website; however, a number of user-generated skins have been made available for download. ICQ 6, released on April 17, 2007, was the first major update since ICQ 4. The user interface has been redesigned using Boxely, the same rendering engine used in AIM Triton. This change adds new features such as the ability to send IMs directly from the client's contact list. ICQ has recently started forcing users of v5.1 to upgrade to version 6 (and XP). Those who do not upgrade will find their older version of ICQ does not start up. Although the upgrade to version 6 should be seen as a positive thing, some users may find that useful features such as sending multiple files at one time is no longer supported in the new version. At the beginning of July 2008, a network upgrade forced users to stop using ICQ 5.1 - applications that identified themselves as ICQ 5, such as Pidgin, were forced to identify themselves as ICQ 6. There seems to be no alternative for users other than using a different IM program or patching ICQ 5.1 with a special application. ICQ 7.0, released on January 18, 2010. This update includes integration with Facebook and other websites. It also allows custom personal status similar to Windows Live Messenger (MSN Messenger). ICQ 7.0 does not support traditional Chinese on standard installation or with the addition of an official language pack. This has made its adoption difficult with the established user base from Hong Kong and Taiwan where traditional Chinese is the official language. ICQ 8, released on February 5, 2012 - "Meet the new generation of ICQ, Enjoy free video calls, messages and SMS, social networks support and more." ICQ 10.0, released January 18, 2016. Newest update is 10.0 Build 12393, released on November 8, 2018. Criticism AOL pursued an aggressive policy regarding alternative ("unauthorized") ICQ clients. In July 2008 changes were implemented on ICQ servers causing many unofficial clients to stop working. These users received an official notification from "ICQ System". On December 9, 2008, another change to the ICQ servers occurred: clients sending Client IDs not matching ICQ 5.1 or higher stopped working. On December 29, 2008, the ICQ press service distributed a statement characterizing alternative clients as dangerous. On January 21, 2009, ICQ servers started blocking all unofficial clients in Russia and Commonwealth of Independent States countries. Users in Russia and Ukraine received a message from UIN 1: "Системное сообщение ICQ не поддерживает используемую вами версию. Скачайте бесплатную авторизованную версию ICQ с официального web-сайта ICQ. System Message The version you are using is not supported by ICQ. Download a free authorized ICQ version from ICQ's official website." On icq.com there was an "important message" for Russian-speaking ICQ users: "ICQ осуществляет поддержку только авторизированных версий программ: ICQ Lite и ICQ 6.5." ("ICQ supports only authorized versions of programs: ICQ Lite and ICQ 6.5.") On February 3, 2009, the events of January 21 were repeated. On December 27, 2018, ICQ announced it was to stop supporting unofficial clients, affecting many users who prefer a compact size using Miranda and other clients. On December 28, 2018, ICQ stopped working on some unofficial clients. In late March, 2019, ICQ stopped working on the Pidgin client, as initiated in December 2018. Cooperation with Russian intelligence services According to a Novaya Gazeta article published in May 2018, Russian intelligence agencies have access to online reading of ICQ users' correspondence. The article examined 34 sentences of Russian courts, during the investigation of which the evidence of the defendants' guilt was obtained by reading correspondence on a PC or mobile devices. Of the fourteen cases in which ICQ was involved, in six cases the capturing of information occurred before the seizure of the device. The reason for the article was the blocking of the Telegram service and the recommendation of the Advisor to the President of the Russian Federation Herman Klimenko to use ICQ instead. Clients AOL's OSCAR network protocol used by ICQ is proprietary and using a third party client is a violation of ICQ Terms of Service. Nevertheless, a number of third-party clients have been created by using reverse-engineering and protocol descriptions. These clients include: Adium: supports ICQ, Yahoo!, AIM, MSN, Google Talk, XMPP, and others, for macOS Ayttm: supports ICQ, Yahoo!, AIM, MSN, IRC, and XMPP bitlbee: IRC gateway, supports ICQ, Yahoo!, AIM, MSN, Google Talk, and XMPP centericq: supports ICQ, Yahoo!, AIM, MSN, IRC and XMPP, text-based climm (formerly mICQ): text-based Fire: supports ICQ, Yahoo!, AIM, MSN, IRC, and XMPP, for macOS Jimm: supports ICQ, for Java ME mobile devices Kopete: supports AIM, ICQ, MSN, Yahoo, XMPP, Google Talk, IRC, Gadu-Gadu, Novell GroupWise Messenger and others, for Unix-like Meetro: IM and social networking combined with location; supports AIM, ICQ, MSN, Yahoo! Miranda IM: supports ICQ, Yahoo!, AIM, MSN, IRC, Google Talk, XMPP, Gadu-Gadu, BNet and others, for Windows Naim: ncurses-based Pidgin (formerly Gaim): supports ICQ, Yahoo!, AIM, Gtalk, MSN, IRC, XMPP, Gadu-Gadu, SILC, Meanwhile, (IBM Lotus Sametime) and others QIP: supports ICQ, AIM, XMPP and XIMSS stICQ: supports ICQ, for Symbian OS Trillian: supports ICQ, IRC, Google Talk, XMPP and others AOL supported clients include: AOL Instant Messenger (discontinued in 2017) Messages/iChat: uses ICQ's UIN as an AIM screenname, for macOS See also Comparison of instant messaging clients Comparison of instant messaging protocols LAN messenger Online chat Windows Live Messenger Tencent QQ References External links Official ICQ Website Instant messaging clients 1996 software AIM (software) clients AOL BlackBerry software IOS software Symbian software 2010 mergers and acquisitions Mergers and acquisitions of Israeli companies Android (operating system) software Formerly proprietary software 1996 establishments in Israel
[ -0.1681884229183197, -0.20983833074569702, 0.4084765315055847, 0.14178138971328735, -0.12775126099586487, -0.5397294163703918, -0.18991467356681824, 0.10363971441984177, -0.5895017981529236, -0.425821989774704, -0.33492448925971985, -0.0014793692389503121, -0.25943025946617126, 0.277438700...
15169
https://en.wikipedia.org/wiki/Impressionism
Impressionism
Impressionism is a 19th-century art movement characterized by relatively small, thin, yet visible brush strokes, open composition, emphasis on accurate depiction of light in its changing qualities (often accentuating the effects of the passage of time), ordinary subject matter, unusual visual angles, and inclusion of movement as a crucial element of human perception and experience. Impressionism originated with a group of Paris-based artists whose independent exhibitions brought them to prominence during the 1870s and 1880s. The Impressionists faced harsh opposition from the conventional art community in France. The name of the style derives from the title of a Claude Monet work, Impression, soleil levant (Impression, Sunrise), which provoked the critic Louis Leroy to coin the term in a satirical review published in the Parisian newspaper Le Charivari. The development of Impressionism in the visual arts was soon followed by analogous styles in other media that became known as impressionist music and impressionist literature. Overview Radicals in their time, early Impressionists violated the rules of academic painting. They constructed their pictures from freely brushed colours that took precedence over lines and contours, following the example of painters such as Eugène Delacroix and J. M. W. Turner. They also painted realistic scenes of modern life, and often painted outdoors. Previously, still lifes and portraits as well as landscapes were usually painted in a studio. The Impressionists found that they could capture the momentary and transient effects of sunlight by painting outdoors or en plein air. They portrayed overall visual effects instead of details, and used short "broken" brush strokes of mixed and pure unmixed colour—not blended smoothly or shaded, as was customary—to achieve an effect of intense colour vibration. Impressionism emerged in France at the same time that a number of other painters, including the Italian artists known as the Macchiaioli, and Winslow Homer in the United States, were also exploring plein-air painting. The Impressionists, however, developed new techniques specific to the style. Encompassing what its adherents argued was a different way of seeing, it is an art of immediacy and movement, of candid poses and compositions, of the play of light expressed in a bright and varied use of colour. The public, at first hostile, gradually came to believe that the Impressionists had captured a fresh and original vision, even if the art critics and art establishment disapproved of the new style. By recreating the sensation in the eye that views the subject, rather than delineating the details of the subject, and by creating a welter of techniques and forms, Impressionism is a precursor of various painting styles, including Neo-Impressionism, Post-Impressionism, Fauvism, and Cubism. Beginnings In the middle of the 19th century—a time of change, as Emperor Napoleon III rebuilt Paris and waged war—the Académie des Beaux-Arts dominated French art. The Académie was the preserver of traditional French painting standards of content and style. Historical subjects, religious themes, and portraits were valued; landscape and still life were not. The Académie preferred carefully finished images that looked realistic when examined closely. Paintings in this style were made up of precise brush strokes carefully blended to hide the artist's hand in the work. Colour was restrained and often toned down further by the application of a golden varnish. The Académie had an annual, juried art show, the Salon de Paris, and artists whose work was displayed in the show won prizes, garnered commissions, and enhanced their prestige. The standards of the juries represented the values of the Académie, represented by the works of such artists as Jean-Léon Gérôme and Alexandre Cabanel. In the early 1860s, four young painters—Claude Monet, Pierre-Auguste Renoir, Alfred Sisley, and Frédéric Bazille—met while studying under the academic artist Charles Gleyre. They discovered that they shared an interest in painting landscape and contemporary life rather than historical or mythological scenes. Following a practice that had become increasingly popular by mid-century, they often ventured into the countryside together to paint in the open air, but not for the purpose of making sketches to be developed into carefully finished works in the studio, as was the usual custom. By painting in sunlight directly from nature, and making bold use of the vivid synthetic pigments that had become available since the beginning of the century, they began to develop a lighter and brighter manner of painting that extended further the Realism of Gustave Courbet and the Barbizon school. A favourite meeting place for the artists was the Café Guerbois on Avenue de Clichy in Paris, where the discussions were often led by Édouard Manet, whom the younger artists greatly admired. They were soon joined by Camille Pissarro, Paul Cézanne, and Armand Guillaumin. During the 1860s, the Salon jury routinely rejected about half of the works submitted by Monet and his friends in favour of works by artists faithful to the approved style. In 1863, the Salon jury rejected Manet's The Luncheon on the Grass (Le déjeuner sur l'herbe) primarily because it depicted a nude woman with two clothed men at a picnic. While the Salon jury routinely accepted nudes in historical and allegorical paintings, they condemned Manet for placing a realistic nude in a contemporary setting. The jury's severely worded rejection of Manet's painting appalled his admirers, and the unusually large number of rejected works that year perturbed many French artists. After Emperor Napoleon III saw the rejected works of 1863, he decreed that the public be allowed to judge the work themselves, and the Salon des Refusés (Salon of the Refused) was organized. While many viewers came only to laugh, the Salon des Refusés drew attention to the existence of a new tendency in art and attracted more visitors than the regular Salon. Artists' petitions requesting a new Salon des Refusés in 1867, and again in 1872, were denied. In December 1873, Monet, Renoir, Pissarro, Sisley, Cézanne, Berthe Morisot, Edgar Degas and several other artists founded the Société Anonyme Coopérative des Artistes Peintres, Sculpteurs, Graveurs ("Cooperative and Anonymous Association of Painters, Sculptors, and Engravers") to exhibit their artworks independently. Members of the association were expected to forswear participation in the Salon. The organizers invited a number of other progressive artists to join them in their inaugural exhibition, including the older Eugène Boudin, whose example had first persuaded Monet to adopt plein air painting years before. Another painter who greatly influenced Monet and his friends, Johan Jongkind, declined to participate, as did Édouard Manet. In total, thirty artists participated in their first exhibition, held in April 1874 at the studio of the photographer Nadar. The critical response was mixed. Monet and Cézanne received the harshest attacks. Critic and humorist Louis Leroy wrote a scathing review in the newspaper Le Charivari in which, making wordplay with the title of Claude Monet's Impression, Sunrise (Impression, soleil levant), he gave the artists the name by which they became known. Derisively titling his article The Exhibition of the Impressionists, Leroy declared that Monet's painting was at most, a sketch, and could hardly be termed a finished work. He wrote, in the form of a dialogue between viewers, "Impression—I was certain of it. I was just telling myself that, since I was impressed, there had to be some impression in it ... and what freedom, what ease of workmanship! Wallpaper in its embryonic state is more finished than that seascape." The term Impressionist quickly gained favour with the public. It was also accepted by the artists themselves, even though they were a diverse group in style and temperament, unified primarily by their spirit of independence and rebellion. They exhibited together—albeit with shifting membership—eight times between 1874 and 1886. The Impressionists' style, with its loose, spontaneous brushstrokes, would soon become synonymous with modern life. Monet, Sisley, Morisot, and Pissarro may be considered the "purest" Impressionists, in their consistent pursuit of an art of spontaneity, sunlight, and colour. Degas rejected much of this, as he believed in the primacy of drawing over colour and belittled the practice of painting outdoors. Renoir turned away from Impressionism for a time during the 1880s, and never entirely regained his commitment to its ideas. Édouard Manet, although regarded by the Impressionists as their leader, never abandoned his liberal use of black as a colour (while Impressionists avoided its use and preferred to obtain darker colours by mixing), and never participated in the Impressionist exhibitions. He continued to submit his works to the Salon, where his painting Spanish Singer had won a 2nd class medal in 1861, and he urged the others to do likewise, arguing that "the Salon is the real field of battle" where a reputation could be made. Among the artists of the core group (minus Bazille, who had died in the Franco-Prussian War in 1870), defections occurred as Cézanne, followed later by Renoir, Sisley, and Monet, abstained from the group exhibitions so they could submit their works to the Salon. Disagreements arose from issues such as Guillaumin's membership in the group, championed by Pissarro and Cézanne against opposition from Monet and Degas, who thought him unworthy. Degas invited Mary Cassatt to display her work in the 1879 exhibition, but also insisted on the inclusion of Jean-François Raffaëlli, Ludovic Lepic, and other realists who did not represent Impressionist practices, causing Monet in 1880 to accuse the Impressionists of "opening doors to first-come daubers". The group divided over invitations to Paul Signac and Georges Seurat to exhibit with them in 1886. Pissarro was the only artist to show at all eight Impressionist exhibitions. The individual artists achieved few financial rewards from the Impressionist exhibitions, but their art gradually won a degree of public acceptance and support. Their dealer, Durand-Ruel, played a major role in this as he kept their work before the public and arranged shows for them in London and New York. Although Sisley died in poverty in 1899, Renoir had a great Salon success in 1879. Monet became secure financially during the early 1880s and so did Pissarro by the early 1890s. By this time the methods of Impressionist painting, in a diluted form, had become commonplace in Salon art. Impressionist techniques French painters who prepared the way for Impressionism include the Romantic colourist Eugène Delacroix, the leader of the realists Gustave Courbet, and painters of the Barbizon school such as Théodore Rousseau. The Impressionists learned much from the work of Johan Barthold Jongkind, Jean-Baptiste-Camille Corot and Eugène Boudin, who painted from nature in a direct and spontaneous style that prefigured Impressionism, and who befriended and advised the younger artists. A number of identifiable techniques and working habits contributed to the innovative style of the Impressionists. Although these methods had been used by previous artists—and are often conspicuous in the work of artists such as Frans Hals, Diego Velázquez, Peter Paul Rubens, John Constable, and J. M. W. Turner—the Impressionists were the first to use them all together, and with such consistency. These techniques include: Short, thick strokes of paint quickly capture the essence of the subject, rather than its details. The paint is often applied impasto. Colours are applied side by side with as little mixing as possible, a technique that exploits the principle of simultaneous contrast to make the colour appear more vivid to the viewer. Greys and dark tones are produced by mixing complementary colours. Pure impressionism avoids the use of black paint. Wet paint is placed into wet paint without waiting for successive applications to dry, producing softer edges and intermingling of colour. Impressionist paintings do not exploit the transparency of thin paint films (glazes), which earlier artists manipulated carefully to produce effects. The impressionist painting surface is typically opaque. The paint is applied to a white or light-coloured ground. Previously, painters often used dark grey or strongly coloured grounds. The play of natural light is emphasized. Close attention is paid to the reflection of colours from object to object. Painters often worked in the evening to produce effets de soir—the shadowy effects of evening or twilight. In paintings made en plein air (outdoors), shadows are boldly painted with the blue of the sky as it is reflected onto surfaces, giving a sense of freshness previously not represented in painting. (Blue shadows on snow inspired the technique.) New technology played a role in the development of the style. Impressionists took advantage of the mid-century introduction of premixed paints in tin tubes (resembling modern toothpaste tubes), which allowed artists to work more spontaneously, both outdoors and indoors. Previously, painters made their own paints individually, by grinding and mixing dry pigment powders with linseed oil, which were then stored in animal bladders. Many vivid synthetic pigments became commercially available to artists for the first time during the 19th century. These included cobalt blue, viridian, cadmium yellow, and synthetic ultramarine blue, all of which were in use by the 1840s, before Impressionism. The Impressionists' manner of painting made bold use of these pigments, and of even newer colours such as cerulean blue, which became commercially available to artists in the 1860s. The Impressionists' progress toward a brighter style of painting was gradual. During the 1860s, Monet and Renoir sometimes painted on canvases prepared with the traditional red-brown or grey ground. By the 1870s, Monet, Renoir, and Pissarro usually chose to paint on grounds of a lighter grey or beige colour, which functioned as a middle tone in the finished painting. By the 1880s, some of the Impressionists had come to prefer white or slightly off-white grounds, and no longer allowed the ground colour a significant role in the finished painting. Content and composition Prior to the Impressionists, other painters, notably such 17th-century Dutch painters as Jan Steen, had emphasized common subjects, but their methods of composition were traditional. They arranged their compositions so that the main subject commanded the viewer's attention. J. M. W. Turner, while an artist of the Romantic era, anticipated the style of impressionism with his artwork. The Impressionists relaxed the boundary between subject and background so that the effect of an Impressionist painting often resembles a snapshot, a part of a larger reality captured as if by chance. Photography was gaining popularity, and as cameras became more portable, photographs became more candid. Photography inspired Impressionists to represent momentary action, not only in the fleeting lights of a landscape, but in the day-to-day lives of people. The development of Impressionism can be considered partly as a reaction by artists to the challenge presented by photography, which seemed to devalue the artist's skill in reproducing reality. Both portrait and landscape paintings were deemed somewhat deficient and lacking in truth as photography "produced lifelike images much more efficiently and reliably". In spite of this, photography actually inspired artists to pursue other means of creative expression, and rather than compete with photography to emulate reality, artists focused "on the one thing they could inevitably do better than the photograph—by further developing into an art form its very subjectivity in the conception of the image, the very subjectivity that photography eliminated". The Impressionists sought to express their perceptions of nature, rather than create exact representations. This allowed artists to depict subjectively what they saw with their "tacit imperatives of taste and conscience". Photography encouraged painters to exploit aspects of the painting medium, like colour, which photography then lacked: "The Impressionists were the first to consciously offer a subjective alternative to the photograph". Another major influence was Japanese ukiyo-e art prints (Japonism). The art of these prints contributed significantly to the "snapshot" angles and unconventional compositions that became characteristic of Impressionism. An example is Monet's Jardin à Sainte-Adresse, 1867, with its bold blocks of colour and composition on a strong diagonal slant showing the influence of Japanese prints. Edgar Degas was both an avid photographer and a collector of Japanese prints. His The Dance Class (La classe de danse) of 1874 shows both influences in its asymmetrical composition. The dancers are seemingly caught off guard in various awkward poses, leaving an expanse of empty floor space in the lower right quadrant. He also captured his dancers in sculpture, such as the Little Dancer of Fourteen Years. Women Impressionists Impressionists, in varying degrees, were looking for ways to depict visual experience and contemporary subjects. Women Impressionists were interested in these same ideals but had many social and career limitations compared to male Impressionists. In particular, they were excluded from the imagery of the bourgeois social sphere of the boulevard, cafe, and dance hall. As well as imagery, women were excluded from the formative discussions that resulted in meetings in those places; that was where male Impressionists were able to form and share ideas about Impressionism. In the academic realm, women were believed to be incapable of handling complex subjects which led teachers to restrict what they taught female students. It was also considered unladylike to excel in art since women's true talents were then believed to center on homemaking and mothering. Yet several women were able to find success during their lifetime, even though their careers were affected by personal circumstances – Bracquemond, for example, had a husband who was resentful of her work which caused her to give up painting. The four most well known, namely, Mary Cassatt, Eva Gonzalès, Marie Bracquemond, and Berthe Morisot, are, and were, often referred to as the 'Women Impressionists'. Their participation in the series of eight Impressionist exhibitions that took place in Paris from 1874 to 1886 varied: Morisot participated in seven, Cassatt in four, Bracquemond in three, and Gonzalès did not participate. The critics of the time lumped these four together without regard to their personal styles, techniques, or subject matter. Critics viewing their works at the exhibitions often attempted to acknowledge the women artists' talents but circumscribed them within a limited notion of femininity. Arguing for the suitability of Impressionist technique to women's manner of perception, Parisian critic S.C. de Soissons wrote:One can understand that women have no originality of thought, and that literature and music have no feminine character; but surely women know how to observe, and what they see is quite different from that which men see, and the art which they put in their gestures, in their toilet, in the decoration of their environment is sufficient to give is the idea of an instinctive, of a peculiar genius which resides in each one of them.While Impressionism legitimized the domestic social life as subject matter, of which women had intimate knowledge, it also tended to limit them to that subject matter. Portrayals of often-identifiable sitters in domestic settings (which could offer commissions) were dominant in the exhibitions. The subjects of the paintings were often women interacting with their environment by either their gaze or movement. Cassatt, in particular, was aware of her placement of subjects: she kept her predominantly female figures from objectification and cliche; when they are not reading, they converse, sew, drink tea, and when they are inactive, they seem lost in thought. The women Impressionists, like their male counterparts, were striving for "truth," for new ways of seeing and new painting techniques; each artist had an individual painting style. Women Impressionists (particularly Morisot and Cassatt) were conscious of the balance of power between women and objects in their paintings – the bourgeois women depicted are not defined by decorative objects, but instead, interact with and dominate the things with which they live. There are many similarities in their depictions of women who seem both at ease and subtly confined. Gonzalès' Box at the Italian Opera depicts a woman staring into the distance, at ease in a social sphere but confined by the box and the man standing next to her. Cassatt's painting Young Girl at a Window is brighter in color but remains constrained by the canvas edge as she looks out the window. Despite their success in their ability to have a career and Impressionism's demise attributed to its allegedly feminine characteristics (its sensuality, dependence on sensation, physicality, and fluidity) the four women artists (and other, lesser-known women Impressionists) were largely omitted from art historical textbooks covering Impressionist artists until Tamar Garb's Women Impressionists published in 1986. For example, Impressionism by Jean Leymarie, published in 1955 included no information on any women Impressionists. Main Impressionists The central figures in the development of Impressionism in France, listed alphabetically, were: Frédéric Bazille (1841–1870), who only posthumously participated in the Impressionist exhibitions Gustave Caillebotte (1848–1894), who, younger than the others, joined forces with them in the mid-1870s Mary Cassatt (1844–1926), American-born, she lived in Paris and participated in four Impressionist exhibitions Paul Cézanne (1839–1906), although he later broke away from the Impressionists Edgar Degas (1834–1917), who despised the term Impressionist Armand Guillaumin (1841–1927) Édouard Manet (1832–1883), who did not participate in any of the Impressionist exhibitions Claude Monet (1840–1926), the most prolific of the Impressionists and the one who embodies their aesthetic most obviously Berthe Morisot (1841–1895) who participated in all Impressionist exhibitions except in 1879 Camille Pissarro (1830–1903) Pierre-Auguste Renoir (1841–1919), who participated in Impressionist exhibitions in 1874, 1876, 1877 and 1882 Alfred Sisley (1839–1899) Gallery Timeline: Lives of the Impressionists The Impressionists Associates and influenced artists Among the close associates of the Impressionists were several painters who adopted their methods to some degree. These include Jean-Louis Forain (who participated in Impressionist exhibitions in 1879, 1880, 1881 and 1886) and Giuseppe De Nittis, an Italian artist living in Paris who participated in the first Impressionist exhibit at the invitation of Degas, although the other Impressionists disparaged his work. Federico Zandomeneghi was another Italian friend of Degas who showed with the Impressionists. Eva Gonzalès was a follower of Manet who did not exhibit with the group. James Abbott McNeill Whistler was an American-born painter who played a part in Impressionism although he did not join the group and preferred grayed colours. Walter Sickert, an English artist, was initially a follower of Whistler, and later an important disciple of Degas; he did not exhibit with the Impressionists. In 1904 the artist and writer Wynford Dewhurst wrote the first important study of the French painters published in English, Impressionist Painting: its genesis and development, which did much to popularize Impressionism in Great Britain. By the early 1880s, Impressionist methods were affecting, at least superficially, the art of the Salon. Fashionable painters such as Jean Béraud and Henri Gervex found critical and financial success by brightening their palettes while retaining the smooth finish expected of Salon art. Works by these artists are sometimes casually referred to as Impressionism, despite their remoteness from Impressionist practice. The influence of the French Impressionists lasted long after most of them had died. Artists like J.D. Kirszenbaum were borrowing Impressionist techniques throughout the twentieth century. Beyond France As the influence of Impressionism spread beyond France, artists, too numerous to list, became identified as practitioners of the new style. Some of the more important examples are: The American Impressionists, including Mary Cassatt, William Merritt Chase, Frederick Carl Frieseke, Childe Hassam, Willard Metcalf, Lilla Cabot Perry, Theodore Robinson, Edmund Charles Tarbell, John Henry Twachtman, Catherine Wiley and J. Alden Weir. The Australian Impressionists, including Tom Roberts, Arthur Streeton, Walter Withers, Charles Conder and Frederick McCubbin (who were prominent members of the Heidelberg School), and John Russell, a friend of Van Gogh, Rodin, Monet and Matisse. The Amsterdam Impressionists in the Netherlands, including George Hendrik Breitner, Isaac Israëls, Willem Bastiaan Tholen, Willem de Zwart, Willem Witsen and Jan Toorop. Anna Boch, Vincent van Gogh's friend Eugène Boch, Georges Lemmen and Théo van Rysselberghe, Impressionist painters from Belgium. Ivan Grohar, Rihard Jakopič, Matija Jama, and Matej Sternen, Impressionists from Slovenia. Their beginning was in the school of Anton Ažbe in Munich and they were influenced by Jurij Šubic and Ivana Kobilca, Slovenian painters working in Paris. Wynford Dewhurst, Walter Richard Sickert, and Philip Wilson Steer were well known Impressionist painters from the United Kingdom. Pierre Adolphe Valette, who was born in France but who worked in Manchester, was the tutor of L. S. Lowry. The German Impressionists, including Lovis Corinth, Max Liebermann, Ernst Oppler, Max Slevogt and August von Brandis. László Mednyánszky and Pál Szinyei-Merse in Hungary Theodor von Ehrmanns and Hugo Charlemont who were rare Impressionists among the more dominant Vienna Secessionist painters in Austria. William John Leech, Roderic O'Conor, and Walter Osborne in Ireland Konstantin Korovin and Valentin Serov in Russia Francisco Oller y Cestero, a native of Puerto Rico and a friend of Pissarro and Cézanne James Nairn in New Zealand William McTaggart in Scotland Laura Muntz Lyall, a Canadian artist Władysław Podkowiński, a Polish Impressionist and symbolist Nicolae Grigorescu in Romania Nazmi Ziya Güran, who brought Impressionism to Turkey Chafik Charobim in Egypt Eliseu Visconti in Brazil Joaquín Sorolla in Spain Faustino Brughetti, Fernando Fader, Candido Lopez, Martín Malharro, Walter de Navazio, Ramón Silva in Argentina Skagen Painters a group of Scandinavian artists who painted in a small Danish fishing village Nadežda Petrović in Serbia Ásgrímur Jónsson in Iceland Fujishima Takeji in Japan Frits Thaulow in Norway and later France Sculpture, photography and film The sculptor Auguste Rodin is sometimes called an Impressionist for the way he used roughly modeled surfaces to suggest transient light effects. Pictorialist photographers whose work is characterized by soft focus and atmospheric effects have also been called Impressionists. French Impressionist Cinema is a term applied to a loosely defined group of films and filmmakers in France from 1919 to 1929, although these years are debatable. French Impressionist filmmakers include Abel Gance, Jean Epstein, Germaine Dulac, Marcel L’Herbier, Louis Delluc, and Dmitry Kirsanoff. Music and literature Musical Impressionism is the name given to a movement in European classical music that arose in the late 19th century and continued into the middle of the 20th century. Originating in France, musical Impressionism is characterized by suggestion and atmosphere, and eschews the emotional excesses of the Romantic era. Impressionist composers favoured short forms such as the nocturne, arabesque, and prelude, and often explored uncommon scales such as the whole tone scale. Perhaps the most notable innovations of Impressionist composers were the introduction of major 7th chords and the extension of chord structures in 3rds to five- and six-part harmonies. The influence of visual Impressionism on its musical counterpart is debatable. Claude Debussy and Maurice Ravel are generally considered the greatest Impressionist composers, but Debussy disavowed the term, calling it the invention of critics. Erik Satie was also considered in this category, though his approach was regarded as less serious, more musical novelty in nature. Paul Dukas is another French composer sometimes considered an Impressionist, but his style is perhaps more closely aligned to the late Romanticists. Musical Impressionism beyond France includes the work of such composers as Ottorino Respighi (Italy), Ralph Vaughan Williams, Cyril Scott, and John Ireland (England), Manuel De Falla and Isaac Albeniz (Spain), and Charles Griffes (America). The term Impressionism has also been used to describe works of literature in which a few select details suffice to convey the sensory impressions of an incident or scene. Impressionist literature is closely related to Symbolism, with its major exemplars being Baudelaire, Mallarmé, Rimbaud, and Verlaine. Authors such as Virginia Woolf, D.H. Lawrence, Henry James, and Joseph Conrad have written works that are Impressionistic in the way that they describe, rather than interpret, the impressions, sensations and emotions that constitute a character's mental life. Post-Impressionism During the 1880s several artists began to develop different precepts for the use of colour, pattern, form, and line, derived from the Impressionist example: Vincent van Gogh, Paul Gauguin, Georges Seurat, and Henri de Toulouse-Lautrec. These artists were slightly younger than the Impressionists, and their work is known as post-Impressionism. Some of the original Impressionist artists also ventured into this new territory; Camille Pissarro briefly painted in a pointillist manner, and even Monet abandoned strict plein air painting. Paul Cézanne, who participated in the first and third Impressionist exhibitions, developed a highly individual vision emphasising pictorial structure, and he is more often called a post-Impressionist. Although these cases illustrate the difficulty of assigning labels, the work of the original Impressionist painters may, by definition, be categorised as Impressionism. See also Art periods Cantonese school of painting Expressionism (as a reaction to Impressionism) Les XX Luminism (Impressionism) Notes References Baumann, Felix Andreas, Marianne Karabelnik-Matta, Jean Sutherland Boggs, and Tobia Bezzola (1994). Degas Portraits. London: Merrell Holberton. Bomford, David, Jo Kirby, John Leighton, Ashok Roy, and Raymond White (1990). Impressionism. London: National Gallery. Denvir, Bernard (1990). The Thames and Hudson Encyclopaedia of Impressionism. London: Thames and Hudson. Distel, Anne, Michel Hoog, and Charles S. Moffett (1974). Impressionism; a centenary exhibition, the Metropolitan Museum of Art, December 12, 1974 – February 10, 1975. New York: Metropolitan Museum of Art. Eisenman, Stephen F (2011). "From Corot to Monet: The Ecology of Impressionism". Milan: Skira. . Gordon, Robert; Forge, Andrew (1988). Degas. New York: Harry N. Abrams. Gowing, Lawrence, with Adriani, Götz; Krumrine, Mary Louise; Lewis, Mary Tompkins; Patin, Sylvie; Rewald, John (1988). Cézanne: The Early Years 1859–1872. New York: Harry N. Abrams. Jensen, Robert (1994). Marketing modernism in fin-de-siècle Europe. Princeton, N.J.: Princeton University Press. . Moskowitz, Ira; Sérullaz, Maurice (1962). French Impressionists: A Selection of Drawings of the French 19th Century. Boston and Toronto: Little, Brown and Company. Rewald, John (1973). The History of Impressionism (4th, Revised Ed.). New York: The Museum of Modern Art. Richardson, John (1976). Manet (3rd Ed.). Oxford: Phaidon Press Ltd. Rosenblum, Robert (1989). Paintings in the Musée d'Orsay. New York: Stewart, Tabori & Chang. Moffett, Charles S. (1986). "The New Painting, Impressionism 1874–1886". Geneva: Richard Burton SA. External links Hecht Museum Museumsportal Schleswig-Holstein Impressionism : A Centenary Exhibition, the Metropolitan Museum of Art, December 12, 1974 – February 10, 1975, fully digitized text from The Metropolitan Museum of Art libraries Suburban Pastoral The Guardian, 24 February 2007 Impressionism: Paintings collected by European Museums (1999) was an art exhibition co-organized by the High Museum of Art, Atlanta, the Seattle Art Museum, and the Denver Art Museum, touring from May through December 1999. Online guided tour Monet's Years at Giverny: Beyond Impressionism, 1978 exhibition catalogue fully online as PDF from The Metropolitan Museum of Art, which discusses Monet's role in this movement Degas: The Artist's Mind, 1976 exhibition catalogue fully online as PDF from The Metropolitan Museum of Art, which discusses Degas's role in this movement Definition of impressionism on the Tate Art Glossary Art movements French art Articles which contain graphical timelines
[ 0.031374815851449966, 0.02314586192369461, -0.3085547089576721, -0.17850394546985626, 0.11605694890022278, 0.13596343994140625, 0.30275559425354004, 0.24540427327156067, -0.3864825963973999, -0.8507883548736572, -0.5086783170700073, 0.12960079312324524, 0.05280761048197746, 0.4695697128772...
15172
https://en.wikipedia.org/wiki/Internet%20slang
Internet slang
Internet slang (also called Internet shorthand, cyber-slang, netspeak, digispeak or chatspeak) is a non-standard or unofficial form of language used by people on the Internet to communicate to one another. An example of Internet slang is "LOL" meaning "laugh out loud". Since Internet slang is constantly changing, it is difficult to provide a standardized definition. However, it can be understood to be any type of slang that Internet users have popularized, and in many cases, have coined. Such terms often originate with the purpose of saving keystrokes or to compensate for small character limits. Many people use the same abbreviations in texting, instant messaging, and social networking websites. Acronyms, keyboard symbols, and abbreviations are common types of Internet slang. New dialects of slang, such as leet or Lolspeak, develop as ingroup internet memes rather than time savers. Many people use internet slang not only on the Internet but also face-to-face. Creation and evolution Origins Internet slang originated in the early days of the Internet with some terms predating the Internet. The earliest forms of Internet slang assumed people's knowledge of programming and commands in a specific language. Internet slang is used in chat rooms, social networking services, online games, video games and in the online community. Since 1979, users of communications networks like Usenet created their own shorthand. Motivations The primary motivation for using a slang unique to the Internet is to ease communication. However, while Internet slang shortcuts save time for the writer, they take two times as long for the reader to understand, according to a study by the University of Tasmania. On the other hand, similar to the use of slang in traditional face-to-face speech or written language, slang on the Internet is often a way of indicating group membership. Internet slang provides a channel which facilitates and constrains the ability to communicate in ways that are fundamentally different from those found in other semiotic situations. Many of the expectations and practices which we associate with spoken and written language are no longer applicable. The Internet itself is ideal for new slang to emerge because of the richness of the medium and the availability of information. Slang is also thus motivated for the "creation and sustenance of online communities". These communities, in turn, play a role in solidarity or identification or an exclusive or common cause. David Crystal distinguishes among five areas of the Internet where slang is used- The Web itself, email, asynchronous chat (for example, mailing lists), synchronous chat (for example, Internet Relay Chat), and virtual worlds. The electronic character of the channel has a fundamental influence on the language of the medium. Options for communication are constrained by the nature of the hardware needed in order to gain Internet access. Thus, productive linguistic capacity (the type of information that can be sent) is determined by the preassigned characters on a keyboard, and receptive linguistic capacity (the type of information that can be seen) is determined by the size and configuration of the screen. Additionally, both sender and receiver are constrained linguistically by the properties of the internet software, computer hardware, and networking hardware linking them. Electronic discourse refers to writing that is "very often reads as if it were being spoken – that is, as if the sender were writing talking". Types of slang Internet slang does not constitute a homogeneous language variety. Rather, it differs according to the user and type of Internet situation. Audience design occurs in online platforms, and therefore online communities can develop their own sociolects, or shared linguistic norms. Within the language of Internet slang, there is still an element of prescriptivism, as seen in style guides, for example Wired Style, which are specifically aimed at usage on the Internet. Even so, few users consciously heed these prescriptive recommendations on CMC, but rather adapt their styles based on what they encounter online. Although it is difficult to produce a clear definition of Internet slang, the following types of slang may be observed. This list is not exhaustive. Views Many debates about how the use of slang on the Internet influences language outside of the digital sphere go on. Even though the direct causal relationship between the Internet and language has yet to be proven by any scientific research, Internet slang has invited split views on its influence on the standard of language use in non-computer-mediated communications. Prescriptivists tend to have the widespread belief that the Internet has a negative influence on the future of language, and that it would lead to a degradation of standard. Some would even attribute any decline of standard formal English to the increase in usage of electronic communication. It has also been suggested that the linguistic differences between Standard English and CMC can have implications for literacy education. This is illustrated by the widely reported example of a school essay submitted by a Scottish teenager, which contained many abbreviations and acronyms likened to SMS language. There was great condemnation of this style by the mass media as well as educationists, who expressed that this showed diminishing literacy or linguistic abilities. On the other hand, descriptivists have counter-argued that the Internet allows better expressions of a language. Rather than established linguistic conventions, linguistic choices sometimes reflect personal taste. It has also been suggested that as opposed to intentionally flouting language conventions, Internet slang is a result of a lack of motivation to monitor speech online. Hale and Scanlon describe language in emails as being derived from "writing the way people talk", and that there is no need to insist on 'Standard' English. English users, in particular, have an extensive tradition of etiquette guides, instead of traditional prescriptive treatises, that offer pointers on linguistic appropriateness. Using and spreading Internet slang also adds onto the cultural currency of a language. It is important to the speakers of the language due to the foundation it provides for identifying within a group, and also for defining a person's individual linguistic and communicative competence. The result is a specialized subculture based on its use of slang. In scholarly research, attention has, for example, been drawn to the effect of the use of Internet slang in ethnography, and more importantly to how conversational relationships online change structurally because slang is used. In German, there is already considerable controversy regarding the use of anglicisms outside of CMC. This situation is even more problematic within CMC, since the jargon of the medium is dominated by English terms. An extreme example of an anti-anglicisms perspective can be observed from the chatroom rules of a Christian site, which bans all anglicisms ("" [Using anglicisms is strictly prohibited!]), and also translates even fundamental terms into German equivalents. Journalism In April 2014, Gawkers editor-in-chief Max Read instituted new writing style guidelines banning internet slang for his writing staff. Use beyond computer-mediated communication Internet slang has crossed from being mediated by the computer into other non-physical domains. Here, these domains are taken to refer to any domain of interaction where interlocutors need not be geographically proximate to one another, and where the Internet is not primarily used. Internet slang is now prevalent in telephony, mainly through short messages (SMS) communication. Abbreviations and interjections, especially, have been popularized in this medium, perhaps due to the limited character space for writing messages on mobile phones. Another possible reason for this spread is the convenience of transferring the existing mappings between expression and meaning into a similar space of interaction. At the same time, Internet slang has also taken a place as part of everyday offline language, among those with digital access. The nature and content of online conversation is brought forward to direct offline communication through the telephone and direct talking, as well as through written language, such as in writing notes or letters. In the case of interjections, such as numerically based and abbreviated Internet slang, are not pronounced as they are written physically or replaced by any actual action. Rather, they become lexicalized and spoken like non-slang words in a "stage direction" like fashion, where the actual action is not carried out but substituted with a verbal signal. The notions of flaming and trolling have also extended outside the computer, and are used in the same circumstances of deliberate or unintentional implicatures. The expansion of Internet slang has been furthered through codification and the promotion of digital literacy. The subsequently existing and growing popularity of such references among those online as well as offline has thus advanced Internet slang literacy and globalized it. Awareness and proficiency in manipulating Internet slang in both online and offline communication indicates digital literacy and teaching materials have even been developed to further this knowledge. A South Korean publisher, for example, has published a textbook that details the meaning and context of use for common Internet slang instances and is targeted at young children who will soon be using the Internet. Similarly, Internet slang has been recommended as language teaching material in second language classrooms in order to raise communicative competence by imparting some of the cultural value attached to a language that is available only in slang. Meanwhile, well-known dictionaries such as the ODE and Merriam-Webster have been updated with a significant and growing body of slang jargon. Besides common examples, lesser known slang and slang with a non-English etymology have also found a place in standardized linguistic references. Along with these instances, literature in user-contributed dictionaries such as Urban Dictionary has also been added to. Codification seems to be qualified through frequency of use, and novel creations are often not accepted by other users of slang. Today Although Internet slang began as a means of "opposition" to mainstream language, its popularity with today's globalized digitally literate population has shifted it into a part of everyday language, where it also leaves a profound impact. Frequently used slang also have become conventionalised into memetic "unit[s] of cultural information". These memes in turn are further spread through their use on the Internet, prominently through websites. The Internet as an "information superhighway" is also catalysed through slang. The evolution of slang has also created a 'slang union' as part of a unique, specialised subculture. Such impacts are, however, limited and requires further discussion especially from the non-English world. This is because Internet slang is prevalent in languages more actively used on the Internet, like English, which is the Internet's lingua franca. Around the world In Japanese, the term moe has come into common use among slang users to mean something "preciously cute" and appealing. Aside from the more frequent abbreviations, acronyms, and emoticons, Internet slang also uses archaic words or the lesser-known meanings of mainstream terms. Regular words can also be altered into something with a similar pronunciation but altogether different meaning, or attributed new meanings altogether. Phonetic transcriptions are the transformation of words to how it sounds in a certain language, and are used as internet slang. In places where logographic languages are used, such as China, a visual Internet slang exists, giving characters dual meanings, one direct and one implied. The Internet has helped people from all over the world to become connected to one another, enabling "global" relationships to be formed. As such, it is important for the various types of slang used online to be recognizable for everyone. It is also important to do so because of how other languages are quickly catching up with English on the Internet, following the increase in Internet usage in predominantly non-English speaking countries. In fact, as of January 2020, only approximately 25.9% of the online population is made up of English speakers. Different cultures tend to have different motivations behind their choice of slang, on top of the difference in language used. For example, in China, because of the tough Internet regulations imposed, users tend to use certain slang to talk about issues deemed as sensitive to the government. These include using symbols to separate the characters of a word to avoid detection from manual or automated text pattern scanning and consequential censorship. An outstanding example is the use of the term river crab to denote censorship. River crab (hexie) is pronounced the same as "harmony"—the official term used to justify political discipline and censorship. As such Chinese netizens reappropriate the official terms in a sarcastic way. Abbreviations are popular across different cultures, including countries like Japan, China, France, Portugal, etc., and are used according to the particular language the Internet users speak. Significantly, this same style of slang creation is also found in non-alphabetical languages as, for example, a form of "e gao" or alternative political discourse. The difference in language often results in miscommunication, as seen in an onomatopoeic example, "555", which sounds like "crying" in Chinese, and "laughing" in Thai. A similar example is between the English "haha" and the Spanish "jaja", where both are onomatopoeic expressions of laughter, but the difference in language also meant a different consonant for the same sound to be produced. For more examples of how other languages express "laughing out loud", see also: LOL In terms of culture, in Chinese, the numerically based onomatopoeia "770880" (), which means to 'kiss and hug you', is used. This is comparable to "XOXO", which many Internet users use. In French, "pk" or "pq" is used in the place of pourquoi, which means 'why'. This is an example of a combination of onomatopoeia and shortening of the original word for convenience when writing online. In conclusion, every different country has their own language background and cultural differences and hence, they tend to have their own rules and motivations for their own Internet slang. However, at present, there is still a lack of studies done by researchers on some differences between the countries. On the whole, the popular use of Internet slang has resulted in a unique online and offline community as well as a couple sub-categories of "special internet slang which is different from other slang spread on the whole internet... similar to jargon... usually decided by the sharing community". It has also led to virtual communities marked by the specific slang they use and led to a more homogenized yet diverse online culture. Internet slang in advertisements Internet slang is considered a form of advertisement. Through two empirical studies, it was proven that Internet slang could help promote or capture the crowd's attention through advertisement, but did not increase the sales of the product. However, using Internet slang in advertisement may attract a certain demographic, and might not be the best to use depending on the product or goods. Furthermore, an overuse of Internet slang also negatively effects the brand due to quality of the advertisement, but using an appropriate amount would be sufficient in providing more attention to the ad. According to the experiment, Internet slang helped capture the attention of the consumers of necessity items. However, the demographic of luxury goods differ, and using Internet slang would potentially have the brand lose credibility due to the appropriateness of Internet slang. See also TL;DR Cyberculture: social culture contained and created within cyberspace Internet Industry Jargon English language spelling reform Internet linguistics Internet meme Internet minute Jargon File Languages used on the Internet List of acronyms Netiquette Tironian notes, scribal abbreviations and ligatures: Roman and medieval abbreviations used to save space on manuscripts and epigraphs References Further reading Alt URL External links Dictionaries of slang and abbreviations: All Acronyms FOLDOC, computing InternetSlang.com SlangInternet.com Internet Slangs Slang Dictionary SlangLang.net Computer-mediated communication Internet memes Occupational cryptolects Slang by language
[ 0.5700234174728394, -0.06484762579202652, -0.14444516599178314, 0.0240612905472517, -0.21712759137153625, -0.22588442265987396, 0.1571706086397171, 0.9269581437110901, -0.27277204394340515, -0.664219081401825, -0.35960036516189575, 0.2375369668006897, -0.38951823115348816, 0.02827010303735...
15174
https://en.wikipedia.org/wiki/Impi
Impi
Impi is a Zulu word meaning war or combat, and by association any body of men gathered for war, for example impi ya masosha is a term denoting 'an army'. Impi were formed from multiple regiments (amabutho in Zulu) from amakhanda (large militarised homesteads). However, in English impi is often used to refer to a Zulu regiment, which is called an ibutho in Zulu, or the army itself. Its beginnings lie far back in historic tribal warfare customs, when groups of armed men called impi battled. They were systematised radically by the Zulu king Shaka, who was then only the exiled illegitimate son of king Senzangakhona kaJama, but already showing much prowess as a general in the army (impi) of Mthethwa king Dingiswayo in the Ndwandwe–Zulu War of 1817–1819. Genesis of the impi The Zulu impi is popularly identified with the ascent of Shaka, ruler of the relatively small Zulu tribe before its explosion across the landscape of southern Africa, but its earliest shape as an instrument of statecraft lies in the innovations of the Mthethwa chieftain Dingiswayo, according to some historians (Morris 1965). These innovations in turn drew upon existing tribal customs, such as the iNtanga. This was an age grade tradition common among many of the Bantu peoples of the continent's southern region. Young men were organised into age groups, with each cohort responsible for certain duties and tribal ceremonies. Periodically, the older age grades were summoned to the kraals of sub-chieftains, or inDunas, for consultations, assignments, and an induction ceremony that marked their transition from boys to full-fledged adults and warriors, the ukuButwa. Kraal or settlement elders generally handled local disputes and issues. Above them were the inDunas, and above the inDunas stood the chief of a particular clan lineage or tribe. The inDunas handled administrative matters for their chiefs – ranging from settlement of disputes, to the collection of taxes. In time of war, the inDunas supervised the fighting men in their areas, forming leadership of the military forces deployed for combat. The age grade iNtangas, under the guidance of the inDunas, formed the basis for the systematic regimental organisation that would become known worldwide as the impi. Limited nature of early tribal warfare Militarily warfare was mild among the Bantu prior to the rise of Shaka, though it occurred frequently. Objectives were typically limited to such matters as cattle raiding, avenging some personal insult, or resolving disputes over segments of grazing land. Generally a loose mob, called an impi participated in these melees. There were no campaigns of extermination against the defeated. They simply moved on to other open spaces on the veldt, and equilibrium was restored. The bow and arrow were known but seldom used. Warfare, like the hunt, depended on skilled spearmen and trackers. The primary weapon was a thin 6-foot throwing spear, the assegai. Several were carried into combat. Defensive weapons included a small cowhide shield, which was later improved by King Shaka. Many battles were prearranged, with the clan warriors meeting at an assigned place and time, while women and children of the clan watched the festivities from some distance away. Ritualized taunts, single combats and tentative charges were the typical pattern. If the affair did not dissipate before, one side might find enough courage to mount a sustained attack, driving off their enemies. Casualties were usually light. The defeated clan might pay in lands or cattle and have captives to be ransomed, but extermination and mass casualties were rare. Tactics were rudimentary. Outside the ritual battles, the quick raid was the most frequent combat action, marked by burning kraals, seizure of captives, and the driving off of cattle. Pastoral herders and light agriculturalists, the Bantu did not usually build permanent fortifications to fend off enemies. A clan under threat simply packed their meager material possessions, rounded up their cattle and fled until the marauders were gone. If the marauders did not stay to permanently dispossess them of grazing areas, the fleeing clan might return to rebuild in a day or two. The genesis of the Zulu impi thus lies in tribal structures existing long before the coming of Europeans or the Shaka era. Rise of Dingiswayo In the early 19th century, a combination of factors began to change the customary pattern. These included rising populations, the growth of white settlement and slaving that dispossessed native peoples both at the Cape and in Portuguese Mozambique, and the rise of ambitious "new men." One such man, a warrior called Dingiswayo (the Troubled One) of the Mthethwa rose to prominence. Historians such as Donald Morris hold that his political genius laid the basis for a relatively light hegemony. This was established through a combination of diplomacy and conquest, using not extermination or slavery, but strategic reconciliation and judicious force of arms. This hegemony reduced the frequent feuding and fighting among the small clans in the Mthethwa's orbit, transferring their energies to more centralised forces. Under Dingiswayo the age grades came to be regarded as military drafts, deployed more frequently to maintain the new order. It was from these small clans, including among them the eLangeni and the Zulu, that Shaka sprung. Ascent and innovations of Shaka Shaka proved himself to be one of Dingiswayo's most able warriors after the military call up of his age grade to serve in the Mthethwa forces. He fought with his iziCwe regiment wherever he was assigned during this early period, but from the beginning, Shaka's approach to battle did not fit the traditional mould. He began to implement his own individual methods and style, designing the famous short stabbing spear the iKlwa, a larger, stronger shield, and discarding the oxhide sandals that he felt slowed him down. These methods proved effective on a small scale, but Shaka himself was restrained by his overlord. His conception of warfare was far more extreme than the reconcilitory methods of Dingiswayo. He sought to bring combat to a swift and bloody decision, as opposed to duels of individual champions, scattered raids, or limited skirmishes where casualties were comparatively light. While his mentor and overlord Dingiswayo lived, Shakan methods were reined in, but the removal of this check gave the Zulu chieftain much broader scope. It was under his rule that a much more rigorous mode of tribal warfare came into being. This newer, brutal focus demanded changes in weapons, organisation and tactics. Weapons and shields Shaka is credited with introducing a new variant of the traditional weapon, demoting the long, spindly throwing spear in favour of a heavy-bladed, short-shafted stabbing spear. He is also said to have introduced a larger, heavier cowhide shield (isihlangu), and trained his forces to thus close with the enemy in more effective hand-to-hand combat. The throwing spear was not discarded, but standardised like the stabbing implement and carried as a missile weapon, typically discharged at the foe, before close contact. These weapons changes integrated with and facilitated an aggressive mobility and tactical organisation. As weapons, the Zulu warrior carried the iklwa stabbing spear (losing one could result in execution) and a club or cudgel fashioned from dense hardwood known in Zulu as the iwisa, usually called the knobkerrie or knobkerry English and knopkierie in Afrikaans, for beating an enemy in the manner of a mace. Zulu officers often carried the half-moon-shaped Zulu ax, but this weapon was more of a symbol to show their rank. The iklwa – so named because of the sucking sound it made when withdrawn from a human body – with its long and broad blade was an invention of Shaka that superseded the older thrown ipapa (so named because of the "pa-pa" sound it made as it flew through the air). It could theoretically be used both in melee and as a thrown weapon, but warriors were forbidden in Shaka's day from throwing it, which would disarm them and give their opponents something to throw back. Moreover, Shaka felt it discouraged warriors from closing into hand-to-hand combat. Shaka's brother, and successor, Dingane kaSenzangakhona reintroduced greater use of the throwing spear, perhaps as a counter to Boer firearms. As early as Shaka's reign small numbers of firearms, often obsolete muskets and rifles, were obtained by the Zulus from Europeans by trade. In the aftermath of the defeat of the British Empire at the Battle of Isandlwana in 1879, many Martini–Henry rifles were captured by the Zulus together with considerable amounts of ammunition. The advantage of this capture is debatable due to the alleged tendency of Zulu warriors to close their eyes when firing such weapons. The possession of firearms did little to change Zulu tactics, which continued to rely on a swift approach to the enemy to bring him into close combat. All warriors carried a shield made of oxhide, which retained the hair, with a central stiffening shaft of wood, the mgobo. Shields were the property of the king; they were stored in specialised structures raised off the ground for protection from vermin when not issued to the relevant regiment. The large isihlangu shield of Shaka's day was about five feet in length and was later partially replaced by the smaller umbumbuluzo, a shield of identical manufacture but around three and a half feet in length. Close combat relied on co-ordinated use of the iklwa and shield. The warrior sought to get the edge of his shield behind the edge of his enemy's, so that he could pull the enemy's shield to the side, thus opening him to a thrust with the iklwa deep into the abdomen or chest. Logistics The fast-moving host, like all military formations, needed supplies. These were provided by young boys, who were attached to a force and carried rations, cooking pots, sleeping mats, extra weapons and other material. Cattle were sometimes driven on the hoof as a movable larder. Again, such arrangements in the local context were probably nothing unusual. What was different was the systematisation and organisation, a pattern yielding major benefits when the Zulu were dispatched on raiding missions. Age-grade regimental system Age-grade groupings of various sorts were common in the Bantu tribal culture of the day, and indeed are still important in much of Africa. Age grades were responsible for a variety of activities, from guarding the camp, to cattle herding, to certain rituals and ceremonies. It was customary in Zulu culture for young men to provide limited service to their local chiefs until they were married and recognised as official householders. Shaka manipulated this system, transferring the customary service period from the regional clan leaders to himself, strengthening his personal hegemony. Such groupings on the basis of age, did not constitute a permanent, paid military in the modern Western sense, nevertheless they did provide a stable basis for sustained armed mobilisation, much more so than ad hoc tribal levies or war parties. Shaka organised the various age grades into regiments, and quartered them in special military kraals, with each regiment having its own distinctive names and insignia. Some historians argue that the large military establishment was a drain on the Zulu economy and necessitated continual raiding and expansion. This may be true since large numbers of the society's men were isolated from normal occupations, but whatever the resource impact, the regimental system clearly built on existing tribal cultural elements that could be adapted and shaped to fit an expansionist agenda. After their 20th birthdays, young men would be sorted into formal ibutho (plural amabutho) or regiments. They would build their i=handa (often referred to as a 'homestead', as it was basically a stockaded group of huts surrounding a corral for cattle), their gathering place when summoned for active service. Active service continued until a man married, a privilege only the king bestowed. The amabutho were recruited on the basis of age rather than regional or tribal origin. The reason for this was to enhance the centralised power of the Zulu king at the expense of clan and tribal leaders. They swore loyalty to the king of the Zulu nation. Mobility, training and insignia Shaka discarded sandals to enable his warriors to run faster. Initially the move was unpopular, but those who objected were simply killed, a practice that quickly concentrated the minds of remaining personnel. Zulu tradition indicates that Shaka hardened the feet of his troops by having them stamp thorny tree and bush branches flat. Shaka drilled his troops frequently, implementing forced marches covering more than fifty miles a day. He also drilled the troops to carry out encirclement tactics (see below). Such mobility gave the Zulu a significant impact in their local region and beyond. Upkeep of the regimental system and training seems to have continued after Shaka's death, although Zulu defeats by the Boers, and growing encroachment by British colonists, sharply curtailed raiding operations prior to the War of 1879. Morris (1965, 1982) records one such mission under King Mpande to give green warriors of the uThulwana regiment experience: a raid into Swaziland, dubbed "Fund' uThulwana" by the Zulu, or "Teach the uThulwana". Impi warriors were trained as early as age six, joining the army as udibi porters at first, being enrolled into same-age groups (intanga). Until they were butad, Zulu boys accompanied their fathers and brothers on campaign as servants. Eventually, they would go to the nearest ikhanda to kleza (literally, "to drink directly from the udder"), at which time the boys would become inkwebane, cadets. They would spend their time training until they were formally enlisted by the king. They would challenge each other to stick fights, which had to be accepted on pain of dishonor. In Shaka's day, warriors often wore elaborate plumes and cow tail regalia in battle, but by the Anglo-Zulu War of 1879, many warriors wore only a loin cloth and a minimal form of headdress. The later period Zulu soldier went into battle relatively simply dressed, painting his upper body and face with chalk and red ochre, despite the popular conception of elaborately panoplied warriors. Each ibutho had a singular arrangement of headdress and other adornments, so that the Zulu army could be said to have had regimental uniforms; latterly the 'full-dress' was only worn on festive occasions. The men of senior regiments would wear, in addition to their other headdress, the head-ring (isicoco) denoting their married state. A gradation of shield colour was found, junior regiments having largely dark shields the more senior ones having shields with more light colouring; Shaka's personal regiment Fasimba (The Haze) having white shields with only a small patch of darker colour. This shield uniformity was facilitated by the custom of separating the king's cattle into herds based on their coat colours. Certain adornments were awarded to individual warriors for conspicuous courage in action; these included a type of heavy brass arm-ring (ingxotha) and an intricate necklace composed of interlocking wooden pegs (iziqu). Tactics The Zulu typically took the offensive, deploying in the well-known "buffalo horns" formation (). It comprised three elements:the "horns", or flanking right and left wing elements, to encircle and pin the enemy. Generally the "horns" were made up of younger, greener troops.the "chest" sometimes referred to as "head" or central main force which delivered the coup de grace. The prime fighters made up the composition of the main force.the "loins" or reserves used to exploit success or reinforce elsewhere. Often these were older veterans. Sometimes these were positioned with their backs to the battle so as not to get unduly excited. Encirclement tactics are not unique in warfare, and historians note that attempts to surround an enemy were not unknown even in the ritualised battles. The use of separate manoeuvre elements to support a stronger central group is also well known in pre-mechanised tribal warfare, as is the use of reserve echelons farther back. What was unique about the Zulu was the degree of organisation, consistency with which they used these tactics, and the speed at which they executed them. Developments and refinements may have taken place after Shaka's death, as witnessed by the use of larger groupings of regiments by the Zulu against the British in 1879. Missions, available manpower and enemies varied, but whether facing native spear, or European bullet, the impis generally fought in and adhered to the classical buffalo horns pattern. Organisation and leadership of the Zulu forcesRegiments and corps. The Zulu forces were generally grouped into three levels: regiments, corps of several regiments, and "armies" or bigger formations, although the Zulu did not use these terms in the modern sense. Although size distinctions were taken account of, any grouping of men on a mission could collectively be called an impi, whether a raiding party of 100 or horde of 10,000. Numbers were not uniform but dependent on a variety of factors, including assignments by the king, or the manpower mustered by various clan chiefs or localities. A regiment might be 400 or 4000 men. These were grouped into corps that took their name from the military kraals where they were mustered, or sometimes the dominant regiment of that locality. There were 4 basic ranks: herdboy assistants, warriors, inDunas and higher ranked supremos for a particular mission.Higher command and unit leadership.''' Leadership was not a complicated affair. An inDuna guided each regiment, and he in turn answered to senior izinduna who controlled the corps grouping. Overall guidance of the host was furnished by elder izinduna usually with many years of experience. One or more of these elder chiefs might accompany a big force on an important mission, but there was no single "field marshal" in supreme command of all Zulu forces. Regimental izinduna, like the non-coms of today's army, and yesterday's Roman Centurions, were extremely important to morale and discipline. This was shown during the battle of Isandhlwana. Blanketed by a hail of British bullets, rockets and artillery, the advance of the Zulu faltered. Echoing from the mountain, however, were the shouted cadences and fiery exhortations of their regimental izinduna, who reminded the warriors that their king did not send them to run away. Thus encouraged, the encircling regiments remained in place, maintaining continual pressure, until weakened British dispositions enabled the host to make a final surge forward. (See Morris ref below—"The Washing of the Spears"). Summary of the Shakan reforms As noted above, Shaka was neither the originator of the impi, or the age grade structure, nor the concept of a bigger grouping than the small clan system. His major innovations were to blend these traditional elements in a new way, to systematise the approach to battle, and to standardise organization, methods and weapons, particularly in his adoption of the ilkwa – the Zulu thrusting spear, unique long-term regimental units, and the "buffalo horns" formation. Dingswayo's approach was of a loose federation of allies under his hegemony, combining to fight, each with their own contingents, under their own leaders. Shaka dispensed with this, insisting instead on a standardised organisation and weapons package that swept away and replaced old clan allegiances with loyalty to himself. This uniform approach also encouraged the loyalty and identification of warriors with their own distinctive military regiments. In time, these warriors, from many conquered tribes and clans came to regard themselves as one nation- the Zulu. The Marian reforms of Rome in the military sphere are referenced by some writers as similar. While other ancient powers such as the Carthaginians maintained a patchwork of force types, and the legions retained such phalanx-style holdovers like the triarii, Marius implemented one consistent standardised approach for all the infantry. This enabled more disciplined formations and efficient execution of tactics over time against a variety of enemies. As one military historian notes: Combined with Shaka's "buffalo horns" attack formation for surrounding and annihilating enemy forces, the Zulu combination of iklwa and shield—similar to the Roman legionaries' use of gladius and scutum—was devastating. By the time of Shaka's assassination in 1828, it had made the Zulu kingdom the greatest power in southern Africa and a force to be reckoned with, even against Britain's modern army in 1879.The Impi in battle To understand the full scope of the impi's performance in battle, military historians of the Zulu typically look to its early operations against internal African enemies, not merely the British interlude. In terms of numbers, the operations of the impi would change- from the Western equivalent of small company and battalion size forces, to manoeuvres in multi-divisional strength of between 10,000 and 40,000 men. The victory won by Zulu king Cetawasyo at Ndondakusuka, for example, two decades before the British invasion involved a deployment of 30,000 troops. These were sizeable formations in regional context but represented the bulk of prime Zulu fighting strength. Few impi-style formations were to routinely achieve this level of mobilisation for a single battle. By comparison, at Cannae, the Romans deployed 80,000 men, and generally could put tens of thousands more into smaller combat actions). The popular notion of countless attacking black spearmen is a distorted one. Manpower supplies on the continent were often limited. In the words of one historian: "The savage hordes of popular lore seldom materialized on African battlefields." This limited resource base would hurt the Zulu when they confronted technologically advanced world powers such as Britain. The advent of new weapons like firearms would also have a profound impact on the African battlefield, but as will be seen, the impi-style forces largely eschewed firearms, or used them in a minor way. Whether facing native spear or European bullet, impis largely fought as they had since the days of Shaka, from Zululand to Zimbabwe, and from Mozambique to Tanzania. Command and control Command and control of the impis was problematic at times. Indeed, the Zulu attacks on the British strongpoints at Rorke's Drift and at Kambula, (both bloody defeats) seemed to have been carried out by over-enthusiastic leaders and warriors despite contrary orders of the Zulu King, Cetshwayo. Popular film re-enactments display a grizzled izinduna directing the host from a promontory with elegant sweeps of the hand. This might have happened during the initial marshaling of forces from a jump off point, or the deployment of reserves, but once the great encircling sweep of frenzied warriors in the "horns" and "chest" was in motion, the izinduna could not generally exercise detailed control. Handling of reserve forces Although the "loins" or reserves were on hand to theoretically correct or adjust an unfavorable situation, a shattered attack could make the reserves irrelevant. Against the Boers at Blood River, massed gunfire broke the back of the Zulu assault, and the Boers were later able to mount a cavalry sweep in counterattack that became a turkey shoot against fleeing Zulu remnants. Perhaps the Zulu threw everything forward and had little left. In similar manner, after exhausting themselves against British firepower at Kambula and Ulindi, few of the Zulu reserves were available to do anything constructive, although the tribal warriors still remained dangerous at the guerrilla level when scattered. At Isandhlwana however, the "classical" Zulu system struck gold, and after liquidating the British position, it was a relatively fresh reserve force that swept down on Rorke's Drift. Comparison to contemporary armies The Zulu had greater numbers than their opponents, but greater numbers massed together in compact arrays simply presented easy targets in the age of modern firearms and artillery. African tribes that fought in smaller guerrilla detachments typically held out against European invaders for a much longer time, as witnessed by the 7-year resistance of the Lobi against the French in West Africa, or the operations of the Berbers in Algeria against the French. When the Zulu did acquire firearms, most notably captured stocks after the great victory at Isandhlwana, they lacked training and used them ineffectively, consistently firing high to give the bullets "strength." Southern Africa, including the areas near Natal, was teeming with bands like the Griquas who had learned to use guns. Indeed, one such group not only mastered the way of the gun, but became proficient horsemen as well, skills that helped build the Basotho tribe, in what is now the nation of Lesotho. In addition, numerous European renegades or adventurers (both Boer and non-Boer) skilled in firearms were known to the Zulu. Some had even led detachments for the Zulu kings on military missions. The Zulu thus had clear scope and opportunity to master and adapt the new weaponry. They also had already experienced defeat against the Boers, by concentrated firearms. They had had at least four decades to adjust their tactics to this new threat. A well-drilled corps of gunmen or grenadiers, or a battery of artillery operated by European mercenaries for example, might have provided much needed covering fire as the regiments manoeuvred into position. Throughout the 19th century they persisted in "human wave" attacks against well defended European positions where massed firepower devastated their ranks. The ministrations of an isAngoma (plural: izAngoma) Zulu diviner or "witch doctor", and the bravery of individual regiments were ultimately of little use against the volleys of modern rifles, Gatling guns and artillery at the Ineyzane River, Rorke's Drift, Kambula, Gingingdlovu and finally Ulindi. Demise of the Impi The demise of the impi finally came about with the success of European colonisation of Africa- first in southern Africa by the British, and finally in German East Africa as German colonialists defeated the last of the impi-style formations under Mkwawa, chief of the Hehe of Tanzania. The Boers, another major challenger to the impi, also saw defeat by imperial forces, in the Boer War of 1902. In its relatively brief history, the impi inspired both scorn (During the Anglo-Zulu War, British commander Lord Chelmsford complained that they did not 'fight fair') and admiration in its opponents, epitomised in Kipling's poem "Fuzzy Wuzzy":We took our chanst among the Khyber 'ills,The Boers knocked us silly at a mile,The Burman give us Irriwady Chills,'An' a Zulu Impi dished us up in style.The impi in popular culture Today the impi lives on in popular lore and culture, even in the West. While the term "impi" has become synonymous with the Zulu nation in international popular culture, it appears in various video games such as Civilization III, Civilization IV: Warlords, Civilization: Revolution, Civilization V: Brave New World, and Civilization VI, where the Impi is the unique unit for the Zulu faction with Shaka as their leader. 'Impi' is also the title of a very famous South Africa song by Johnny Clegg and the band Juluka which has become something of an unofficial national anthem, especially at major international sports events and especially when the opponent is England. Lyrics:Impi! O nans'impi iyeza (Impi! Oh here comes impi)Uban'obengathint'amabhubesi? (Who would have touched the lions?)Before stage seven of the 2013 Tour de France, the Orica-GreenEDGE cycling team played 'Impi' on their team bus in honor of teammate Daryl Impey, the first South African Tour de France leader. References Bibliography Knight, Ian. Brave Men's Blood, London, 1990. . Knight, Ian. The Zulus. Knight, Ian. Anatomy of the Zulu Army. Further reading Whybra, Julian. England's Sons'', Billericay, (7th ed.), 2010. External links Article about origin and weapons use of Zulu Impi See also African military systems to 1800 African military systems after 1900 Military history of Africa Ashanti Empire Military of the Ashanti Empire Military history of Africa Mali Empire Military history of the Mali Empire Kingdom of Ndongo Kingdom of Matamba Kingdom of Kongo Nzinga of Ndongo and Matamba Battle of Mbwila Battle of Zama Battle of Isandlwana Obsolete occupations Zulu culture Infantry Zulu words and phrases Combat occupations South African English
[ 0.6479194164276123, -0.17990700900554657, -0.5104378461837769, -0.15920701622962952, -0.7265852689743042, 0.6491965651512146, 0.6713292598724365, -0.37867626547813416, -0.6090784072875977, -0.1699255257844925, -0.26110023260116577, 0.062247175723314285, -0.7692103981971741, 0.2103853374719...
15175
https://en.wikipedia.org/wiki/Irish%20mythology
Irish mythology
Irish mythology is the mythology of the island of Ireland that has been preserved in the oral tradition, and later in the manuscripts of early Celtic Christianity. These tales and themes have continued to be developed over time in the living folklore of the country, but the main themes and characters have remained largely consistent. With the arrival of Christianity in Ireland, the first manuscripts preserved many of these tales in medieval Irish literature. Though the Christian influence is also seen in these manuscripts, this literature represents the most extensive and best preserved of all the branches of Celtic mythology. Although many of the manuscripts have not survived and much more material was probably never committed to writing, there is enough remaining to enable the identification of distinct, if overlapping, cycles: The Mythological Cycle, the Ulster Cycle, the Fenian Cycle and the Historical Cycle. There are also a number of extant mythological texts that do not fit into any of the cycles, and many recorded folk tales that continued as the oral tradition ran parallel to the manuscript tradition which, while not strictly mythological, feature personages from one or more of these four cycles. Today some of the best known tales are of Tír na nÓg, Fionn MacCumhaill, Na Fianna, The Aos Sí / Aes Sídhe, Sétanta (CúChulainn), The Tuatha Dé Danann (Gods), the Children of Lir, Táin Bó Cúailnge & the Salmon of Knowledge. Divinity In Irish mythology Depending on the sources, the importance of gods and goddesses in Irish mythology varies. The geographical tales, Dindshenchas, emphasize the importance of female divinities and powerful ancestors, while the historical tradition focuses on the colonizers, inventors, or male warriors with the female characters only intervening in episodes. The primal and ancestral goddesses are connected to the land, the waters, and sovereignty, and are often seen as the oldest ancestors of the people in the region or nation. They are maternal figures caring for the earth itself as well as their descendants, but also fierce defenders, teachers and warriors. More personalized deities may be connected to cultural qualities such as, in the case of Brigid, poetry, smith craft, and healing. Some of the female figures associated with the druids are prophetic, especially when foretelling death and doom. Zoomorphism is an important feature for many Irish deities. Badb Catha, for instance, is "the Raven of Battle", and in the Táin Bó Cúailnge, The Morrígan changes into an eel, a wolf, and a cow. Goddesses The Celtic goddesses are not divided by singular qualities such as "love goddess", but are more of the nature of well-rounded humans, who have areas of special interests or skills. In this way, they do not correspond directly to other pantheons such as those of the Greeks or Romans. The mother of the Tuatha Dé Danann is generally considered to be Anu or Danu. A number of the goddesses are associated with sacred sites where seasonal festivals are held. They include Macha of Eamhain Mhacha, Carman, and Tailtiu, among others. Warrior Goddesses are often depicted as a triad, and connected with sovereignty and sacred animals. The animals may be associated with carnage, such as wolves and crows, or the abundance of the land, such as cattle. They guard the battlefield and those who do battle, and according to the stories in the Táin Bó Cúailnge, some of these goddesses may be the instigators and directors of the entire war themselves. The main goddesses of battle are The Morrígan, Macha, and Badb. Other warrior women are seen in the role of training warriors in the Fianna bands, such as Liath Luachra, one of the women who trained the hero Fionn mac Cumhaill. Gods The Irish Gods are divided into four main groups. Group one encompasses the older gods of Gaul and Britain. The second group is the main focus of much of the mythology and surrounds the native Irish gods with their homes in burial mounds (The Great Barrows of the Dead). The third group are the gods that dwell in the sea and the fourth group includes stories of the Otherworld. The gods that appear most often are Dagda and Lug. Some scholars have argued that the stories of these gods align with the Greek stories and gods. Druids An order of priests and philosophers highly revered in Celtic society. The root deru- implies solidarity, firmness as a tree is steadfast. The Indo-European root wid- means "to know." Druids could be male or female and were often compared to Roman flamines and Indian brahmins. Druids in Gaul had authority over divine worship, and also officiated sacrifices, exercised authority over legislation and judicial matters, and educated elite youth about their order. Heroes Heroes in Irish mythology can be found in two distinct groups. There is the lawful hero who exists within the boundaries of the community, protecting their people from outsiders. Within the kin-group or túath, heroes are human and gods are not. The Fianna warrior bands are seen as outsiders, connected with the wilderness, youth, and liminal states. They are considered outsiders who protect the community from other outsiders; though they may winter with a settled community, they spend the summers living wild, training adolescents and providing a space for war-damaged veterans. They live under the authority of their own leaders, or may be somewhat anarchic, and may follow other deities or spirits than the settled communities. Oilliphéist The Oilliphéist is a sea serpent-like monster in Irish mythology and folklore. These monsters were believed to inhabit many lakes and rivers in Ireland and there are many legends of saints and heroes fighting them. Sources for myths The three main manuscript sources for Irish mythology are the late 11th/early 12th century Lebor na hUidre (Book of the Dun Cow), which is in the library of the Royal Irish Academy, and is the oldest surviving manuscript written entirely in the Irish language; the early 12th-century Book of Leinster, which is in the Library of Trinity College Dublin; and Bodleian Library, MS Rawlinson B 502 (Rawl.), which is in the Bodleian Library at the University of Oxford. Despite the dates of these sources, most of the material they contain predates their composition. Other important sources include a group of manuscripts that originated in the West of Ireland in the late 14th century or the early 15th century: The Yellow Book of Lecan, The Great Book of Lecan and The Book of Ballymote. The first of these is in the Library of Trinity College and the others are in the Royal Irish Academy. The Yellow Book of Lecan is composed of sixteen parts and includes the legends of Fionn Mac Cumhail, selections of legends of Irish Saints, and the earliest known version of the Táin Bó Cúailnge ("The Cattle Raid of Cooley"). This is one of Europe's oldest epics written in a vernacular language. Other 15th-century manuscripts, such as The Book of Fermoy, also contain interesting materials, as do such later syncretic works such as Geoffrey Keating's Foras Feasa ar Éirinn (The History of Ireland) (). These later compilers and writers may well have had access to manuscript sources that have since disappeared. Most of these manuscripts were created by Christian monks, who may well have been torn between a desire to record their native culture and hostility to pagan beliefs, resulting in some of the gods being euhemerised. Many of the later sources may also have formed parts of a propaganda effort designed to create a history for the people of Ireland that could bear comparison with the mythological descent of their British invaders from the founders of Rome, as promulgated by Geoffrey of Monmouth and others. There was also a tendency to rework Irish genealogies to fit them into the schemas of Greek or biblical genealogy. Whether medieval Irish literature provides reliable evidence of oral tradition remains a matter for debate. Kenneth Jackson described the Ulster Cycle as a "window on the Iron Age", and Garret Olmsted has attempted to draw parallels between Táin Bó Cuailnge, the Ulster Cycle epic and the iconography of the Gundestrup Cauldron. However, these "nativist" claims have been challenged by "revisionist" scholars who believe that much of the literature was created, rather than merely recorded, in Christian times, more or less in imitation of the epics of classical literature that came with Latin learning. The revisionists point to passages apparently influenced by the Iliad in Táin Bó Cuailnge, and to the Togail Troí, an Irish adaptation of Dares Phrygius' De excidio Troiae historia, found in the Book of Leinster. They also argue that the material culture depicted in the stories is generally closer to that of the time of their composition than to that of the distant past. Mythological cycle The Mythological Cycle, comprising stories of the former gods and origins of the Irish, is the least well preserved of the four cycles. It is about the principal people who invaded and inhabited the island. The people include Cessair and her followers, the Formorians, the Partholinians, the Nemedians, the Firbolgs, the Tuatha Dé Danann, and the Milesians. The most important sources are the Metrical Dindshenchas or Lore of Places and the Lebor Gabála Érenn or Book of Invasions. Other manuscripts preserve such mythological tales as The Dream of Aengus, the Wooing Of Étain and Cath Maige Tuireadh, the (second) Battle of Magh Tuireadh. One of the best known of all Irish stories, Oidheadh Clainne Lir, or The Tragedy of the Children of Lir, is also part of this cycle. Lebor Gabála Érenn is a pseudo-history of Ireland, tracing the ancestry of the Irish back to before Noah. It tells of a series of invasions or "takings" of Ireland by a succession of peoples, the fifth of whom was the people known as the Tuatha Dé Danann ("Peoples of the Goddess Danu"), who were believed to have inhabited the island before the arrival of the Gaels, or Milesians. They faced opposition from their enemies, the Fomorians, led by Balor of the Evil Eye. Balor was eventually slain by Lugh Lámfada (Lugh of the Long Arm) at the second battle of Magh Tuireadh. With the arrival of the Gaels, the Tuatha Dé Danann retired underground to become the fairy people of later myth and legend. The Metrical Dindshenchas is the great onomastics work of early Ireland, giving the naming legends of significant places in a sequence of poems. It includes a lot of important information on Mythological Cycle figures and stories, including the Battle of Tailtiu, in which the Tuatha Dé Danann were defeated by the Milesians. It is important to note that by the Middle Ages the Tuatha Dé Danann were not viewed so much as gods as the shape-shifting magician population of an earlier Golden Age Ireland. Texts such as Lebor Gabála Érenn and Cath Maige Tuireadh present them as kings and heroes of the distant past, complete with death-tales. However, there is considerable evidence, both in the texts and from the wider Celtic world, that they were once considered deities. Even after they are displaced as the rulers of Ireland, characters such as Lugh, the Mórrígan, Aengus and Manannán Mac Lir appear in stories set centuries later, betraying their immortality. A poem in the Book of Leinster lists many of the Tuatha Dé, but ends "Although [the author] enumerates them, he does not worship them". Goibniu, Creidhne and Luchta are referred to as Trí Dé Dána ("three gods of craftsmanship"), and the Dagda's name is interpreted in medieval texts as "the good god". Nuada is cognate with the British god Nodens; Lugh is a reflex of the pan-Celtic deity Lugus, the name of whom may indicate "Light"; Tuireann may be related to the Gaulish Taranis; Ogma to Ogmios; the Badb to Catubodua. Ulster cycle The Ulster Cycle is traditionally set around the first century AD, and most of the action takes place in the provinces of Ulster and Connacht. It consists of a group of heroic tales dealing with the lives of Conchobar mac Nessa, king of Ulster, the great hero Cú Chulainn, who was the son of Lug (Lugh), and of their friends, lovers, and enemies. These are the Ulaid, or people of the North-Eastern corner of Ireland and the action of the stories centres round the royal court at Emain Macha (known in English as Navan Fort), close to the modern town of Armagh. The Ulaid had close links with the Irish colony in Scotland, and part of Cú Chulainn's training takes place in that colony. The cycle consists of stories of the births, early lives and training, wooings, battles, feastings, and deaths of the heroes and reflects a warrior society in which warfare consists mainly of single combats and wealth is measured mainly in cattle. These stories are written mainly in prose. The centrepiece of the Ulster Cycle is the Táin Bó Cúailnge. Other important Ulster Cycle tales include The Tragic Death of Aife's only Son, Bricriu's Feast, and The Destruction of Da Derga's Hostel. The Exile of the Sons of Usnach, better known as the tragedy of Deirdre and the source of plays by John Millington Synge, William Butler Yeats, and Vincent Woods, is also part of this cycle. This cycle is, in some respects, close to the mythological cycle. Some of the characters from the latter reappear, and the same sort of shape-shifting magic is much in evidence, side by side with a grim, almost callous realism. While we may suspect a few characters, such as Medb or Cú Roí, of once being deities, and Cú Chulainn in particular displays superhuman prowess, the characters are mortal and associated with a specific time and place. If the Mythological Cycle represents a Golden Age, the Ulster Cycle is Ireland's Heroic Age. Fenian cycle Like the Ulster Cycle, the Fenian Cycle, also referred to as the Ossianic Cycle, is concerned with the deeds of Irish heroes. The stories of the Fenian Cycle appear to be set around the 3rd century and mainly in the provinces of Leinster and Munster. They differ from the other cycles in the strength of their links with the Gaelic-speaking community in Scotland and there are many extant Fenian texts from that country. They also differ from the Ulster Cycle in that the stories are told mainly in verse and that in tone they are nearer to the tradition of romance than the tradition of epic. The stories concern the doings of Fionn mac Cumhaill and his band of soldiers, the Fianna. The single most important source for the Fenian Cycle is the Acallam na Senórach (Colloquy of the Old Men), which is found in two 15th century manuscripts, the Book of Lismore and Laud 610, as well as a 17th century manuscript from Killiney, County Dublin. The text is dated from linguistic evidence to the 12th century. The text records conversations between Caílte mac Rónáin and Oisín, the last surviving members of the Fianna, and Saint Patrick, and consists of about 8,000 lines. The late dates of the manuscripts may reflect a longer oral tradition for the Fenian stories. The Fianna of the story are divided into the Clann Baiscne, led by Fionn mac Cumhaill (often rendered as "Finn MacCool", Finn Son of Cumhall), and the Clann Morna, led by his enemy, Goll mac Morna. Goll killed Fionn's father, Cumhal, in battle and the boy Fionn was brought up in secrecy. As a youth, while being trained in the art of poetry, he accidentally burned his thumb while cooking the Salmon of Knowledge, which allowed him to suck or bite his thumb to receive bursts of stupendous wisdom. He took his place as the leader of his band and numerous tales are told of their adventures. Two of the greatest of the Irish tales, Tóraigheacht Dhiarmada agus Ghráinne (The Pursuit of Diarmuid and Gráinne) and Oisín in Tír na nÓg form part of the cycle. The Diarmuid and Grainne story, which is one of the few Fenian prose tales, is a probable source of Tristan and Iseult. The world of the Fenian Cycle is one in which professional warriors spend their time hunting, fighting, and engaging in adventures in the spirit world. New entrants into the band are expected to be knowledgeable in poetry as well as undergo a number of physical tests or ordeals. Most of the poems are attributed to being composed by Oisín. This cycle creates a bridge between pre-Christian and Christian times. Historical cycle It was part of the duty of the medieval Irish bards, or court poets, to record the history of the family and the genealogy of the king they served. This they did in poems that blended the mythological and the historical to a greater or lesser degree. The resulting stories from what has come to be known as the Historical Cycle or Cycles of the Kings, or more correctly Cycles, as there are a number of independent groupings. This term is a more recent addition to the cycles, with it being coined in 1946 by Irish literary critic Myles Dillon. The kings that are included range from the almost entirely mythological Labraid Loingsech, who allegedly became High King of Ireland around 431 BC, to the entirely historical Brian Boru. However, the greatest glory of the Historical Cycle is the Buile Shuibhne (The Frenzy of Sweeney), a 12th century tale told in verse and prose. Suibhne, king of Dál nAraidi, was cursed by St. Ronan and became a kind of half-man, half bird, condemned to live out his life in the woods, fleeing from his human companions. The story has captured the imaginations of contemporary Irish poets and has been translated by Trevor Joyce and Seamus Heaney. Other tales Adventures The adventures, or echtrae, are a group of stories of visits to the Irish Other World (which may be westward across the sea, underground, or simply invisible to mortals). The most famous, Oisin in Tir na nÓg belongs to the Fenian Cycle, but several free-standing adventures survive, including The Adventure of Conle, The Voyage of Bran mac Ferbail, and The Adventure of Lóegaire. Voyages The voyages, or immrama, are tales of sea journeys and the wonders seen on them that may have resulted from the combination of the experiences of fishermen combined and the Other World elements that inform the adventures. Of the seven immrama mentioned in the manuscripts, only three have survived: The Voyage of Máel Dúin, the Voyage of the Uí Chorra, and the Voyage of Snedgus and Mac Riagla. The Voyage of Mael Duin is the forerunner of the later Voyage of St. Brendan. While not as ancient, later 8th century AD works, that influenced European literature, include The Vision of Adamnán. Folk tales Although there are no written sources of Irish mythology, many stories are passed down orally through traditional storytelling. Some of these stories have been lost, but some Celtic regions continue to tell folktales to the modern-day. Folktales and stories were primarily persevered in monastic scribes from the bards of nobility. Once the noble houses started to decline, this tradition was put to an abrupt end. The bards passed the stories to their families, and the families would take on the oral tradition of storytelling. During the first few years of the 20th century, Herminie T. Kavanagh wrote down many Irish folk tales, which she published in magazines and in two books. Twenty-six years after her death, the tales from her two books, Darby O'Gill and the Good People and Ashes of Old Wishes, were made into the film Darby O'Gill and the Little People. Noted Irish playwright Lady Gregory also collected folk stories to preserve Irish history. The Irish Folklore Commission gathered folk tales from the general Irish populace from 1935 onward. References Sources Primary sources in English translation Cross, Tom Peete and Clark Harris Slover. Ancient Irish Tales. Barnes and Noble Books, Totowa, New Jersey, 1936 repr. 1988. . Dillon, Myles. The Cycles of the Kings. Oxford University Press, 1946; reprinted Four Courts Press: Dublin and Portland, OR, 1994. . Dillon, Myles. Early Irish Literature. Chicago: University of Chicago Press, 1948; reprinted : Four Courts Press, Dublin and Portland, OR, 1994. . Joseph Dunn: The Ancient Irish Epic Tale Táin Bó Cúailnge (1914) Winifred Faraday: The Cattle-Raid of Cualng. London, 1904. This is a partial translation of the text in the Yellow Book of Lecan, partially censored by Faraday. Gantz, Jeffrey. Early Irish Myths and Sagas. London: Penguin Books, 1981. . Kinsella, Thomas. The Tain. Oxford: Oxford University Press, 1970. . Gregory, Lady Augusta. Cuchulain of Muirtheme. First Published 1902. Price, Bill. Celtic Myths, Oldcastle Books, 2011. MacKillop, James. Dictionary of Celtic Mythology, Oxford University Press, 1990. Primary sources in Medieval Irish Cath Maige Tuired: The Second Battle of Mag Tuired. Elizabeth A. Gray, Ed. Dublin: Irish Texts Society, 1982. Series: Irish Texts Society (Series); v. 52. Irish text, English translation and philological notes. Táin Bo Cuailnge from the Book of Leinster. Cecile O'Rahilly, Ed. Dublin Institute for Advanced Studies, 1984. Táin Bo Cuailnge Recension I. Cecile O'Rahilly, Ed. Dublin Institute for Advanced Studies 1976. Irish text, English translation and philological notes. Secondary sources Coghlan, Ronan Pocket Dictionary of Irish Myth and Legend. Belfast: Appletree, 1985. Mallory, J. P. Ed. Aspects of the Tain. Belfast: December Publications, 1992. . O'Rahilly, T. F. Early Irish History and Mythology (1946) O hOgain, Daithi "Myth, Legend and Romance: An Encyclopedia of the Irish Folk Tradition" Prentice Hall Press, (1991) : (the only dictionary/encyclopedia with source references for every entry) Rees, Brinley and Alwyn Rees. Celtic Heritage: Ancient Tradition in Ireland and Wales. New York: Thames and Hudson, 1961; repr. 1989. . Sjoestedt, M. L. Gods and Heroes of the Celts. 1949; translated by Myles Dillon. repr. Berkeley, CA: Turtle Press, 1990. . Williams, J. F. Caerwyn. Irish Literary History. Trans. Patrick K. Ford. University of Wales Press, Cardiff, Wales, and Ford and Bailie, Belmont, Massachusetts. Welsh edition 1958, English translation 1992. . Bibliography Adaptions, collections, and retellings Lady Francesca Speranza Wilde, Ancient Legends, Mystic Charms, and Superstitions of Ireland (1887) James Bonwick, Irish Druids and Old Irish Religions (1894) Lady Augusta Gregory : Cuchulain of Muirthemne (1902), and Gods and Fighting Men (1904) Juliet Marillier : Daughter of the Forest, Son of the Shadows, and Child of the Prophecy (Sevenwaters trilogy, 1999–2001). Gregory Frost : Tain (1986), and Remscela (1988) Morgan Llywelyn : Red Branch (1989), Finn MacCool (1994), and Bard: The Odyssey Of the Irish (1984) James Stephens : Irish Fairy Tales (1920) Lenihan, Eddie and Carolyn Eve Green. Meeting the Other Crowd: The Fairy Stories of Hidden Ireland. New York. Jeremy P. Tarcher/Penguin. 2004. External links Department of Irish Folklore, Dublin. Includes the National Folklore Archives The Celtic Literature Collection Legendary Fictions of the Irish Celts Celtic mythology Irish-language literature
[ -0.053368646651506424, 0.10002509504556656, -0.6336674094200134, -0.6512312293052673, -0.016712399199604988, 0.5006886124610901, 0.6746960282325745, 0.8856086134910583, -0.7106149792671204, -0.1491541564464569, -0.7489598393440247, 0.22754330933094025, 0.18286049365997314, -0.0826541408896...
15176
https://en.wikipedia.org/wiki/Insurance
Insurance
Insurance is a means of protection from financial loss. It is a form of risk management, primarily used to hedge against the risk of a contingent or uncertain loss. An entity which provides insurance is known as an insurer, an insurance company, an insurance carrier or an underwriter. A person or entity who buys insurance is known as a policyholder, while a person or entity covered under the policy is called an insured. Policyholder and insured are often used as but are not necessarily synonyms, as coverage can sometimes extend to additional insureds who did not buy the insurance. The insurance transaction involves the policyholder assuming a guaranteed, known, and relatively small loss in the form of payment to the insurer in exchange for the insurer's promise to compensate the insured in the event of a covered loss. The loss may or may not be financial, but it must be reducible to financial terms, and usually involves something in which the insured has an insurable interest established by ownership, possession, or pre-existing relationship. The insured receives a contract, called the insurance policy, which details the conditions and circumstances under which the insurer will compensate the insured, or their designated beneficiary or assignee. The amount of money charged by the insurer to the policyholder for the coverage set forth in the insurance policy is called the premium. If the insured experiences a loss which is potentially covered by the insurance policy, the insured submits a claim to the insurer for processing by a claims adjuster. A mandatory out-of-pocket expense required by an insurance policy before an insurer will pay a claim is called a deductible (or if required by a health insurance policy, a copayment). The insurer may hedge its own risk by taking out reinsurance, whereby another insurance company agrees to carry some of the risks, especially if the primary insurer deems the risk too large for it to carry. History Early methods Methods for transferring or distributing risk were practiced by Babylonian, Chinese and Indian traders as long ago as the 3rd and 2nd millennia BC, respectively. Chinese merchants travelling treacherous river rapids would redistribute their wares across many vessels to limit the loss due to any single vessel capsizing. Codex Hammurabi Law 238 (c. 1755–1750 BC) stipulated that a sea captain, ship-manager, or ship charterer that saved a ship from total loss was only required to pay one-half the value of the ship to the ship-owner. In the Digesta seu Pandectae (533), the second volume of the codification of laws ordered by Justinian I (527–565) of the Eastern Roman Empire, a legal opinion written by the Roman jurist Paulus at the beginning of the Crisis of the Third Century in 235 AD was included about the Lex Rhodia ("Rhodian law") that articulates the general average principle of marine insurance established on the island of Rhodes in approximately 1000 to 800 BC as a member of the Doric Hexapolis, plausibly by the Phoenicians during the proposed Dorian invasion and emergence of the purported Sea Peoples during the Greek Dark Ages (c. 1100–c. 750) that led to the proliferation of the Doric Greek dialect. The law of general average constitutes the fundamental principle that underlies all insurance. In 1816, an archeological excavation in Minya, Egypt (under an Eyalet of the Ottoman Empire) produced a Nerva–Antonine dynasty-era tablet from the ruins of the Temple of Antinous in Antinoöpolis, Aegyptus that prescribed the rules and membership dues of a burial society collegium established in Lanuvium, Italia in approximately 133 AD during the reign of Hadrian (117–138) of the Roman Empire. In 1851, future U.S. Supreme Court Associate Justice Joseph P. Bradley (1870–1892), once employed as an actuary for the Mutual Benefit Life Insurance Company, submitted an article to the Journal of the Institute of Actuaries detailing an historical account of a Severan dynasty-era life table compiled by the Roman jurist Ulpian in approximately 220 AD during the reign of Elagabalus (218–222) that was also included in the Digesta. Concepts of insurance has been also found in 3rd century BCE Hindu scriptures such as Dharmasastra, Arthashastra and Manusmriti. The ancient Greeks had marine loans. Money was advanced on a ship or cargo, to be repaid with large interest if the voyage prospers, but not repaid at all if the ship is lost, the rate of interest being made high enough to pay not only for the use of the capital but for the risk of losing it (fully described by Demosthenes). Loans of this character have ever since been common in maritime lands, under the name of bottomry and respondentia bonds. The direct insurance of sea-risks for a premium paid independently of loans began, as far as is known, in Belgium about A.D. 1300. Separate insurance contracts (i.e., insurance policies not bundled with loans or other kinds of contracts) were invented in Genoa in the 14th century, as were insurance pools backed by pledges of landed estates. The first known insurance contract dates from Genoa in 1347, and in the next century maritime insurance developed widely and premiums were intuitively varied with risks. These new insurance contracts allowed insurance to be separated from investment, a separation of roles that first proved useful in marine insurance. The earliest known policy of life insurance was made in the Royal Exchange, London, on the 18th of June 1583, for £383, 6s. 8d. for twelve months, on the life of William Gibbons. Modern methods Insurance became far more sophisticated in Enlightenment-era Europe, where specialized varieties developed. Property insurance as we know it today can be traced to the Great Fire of London, which in 1666 devoured more than 13,000 houses. The devastating effects of the fire converted the development of insurance "from a matter of convenience into one of urgency, a change of opinion reflected in Sir Christopher Wren's inclusion of a site for "the Insurance Office" in his new plan for London in 1667." A number of attempted fire insurance schemes came to nothing, but in 1681, economist Nicholas Barbon and eleven associates established the first fire insurance company, the "Insurance Office for Houses", at the back of the Royal Exchange to insure brick and frame homes. Initially, 5,000 homes were insured by his Insurance Office. At the same time, the first insurance schemes for the underwriting of business ventures became available. By the end of the seventeenth century, London's growth as a centre for trade was increasing due to the demand for marine insurance. In the late 1680s, Edward Lloyd opened a coffee house, which became the meeting place for parties in the shipping industry wishing to insure cargoes and ships, including those willing to underwrite such ventures. These informal beginnings led to the establishment of the insurance market Lloyd's of London and several related shipping and insurance businesses. The first life insurance policies were taken out in the early 18th century. The first company to offer life insurance was the Amicable Society for a Perpetual Assurance Office, founded in London in 1706 by William Talbot and Sir Thomas Allen. Upon the same principle, Edward Rowe Mores established the Society for Equitable Assurances on Lives and Survivorship in 1762. It was the world's first mutual insurer and it pioneered age based premiums based on mortality rate laying "the framework for scientific insurance practice and development" and "the basis of modern life assurance upon which all life assurance schemes were subsequently based." In the late 19th century "accident insurance" began to become available. The first company to offer accident insurance was the Railway Passengers Assurance Company, formed in 1848 in England to insure against the rising number of fatalities on the nascent railway system. By the late 19th century governments began to initiate national insurance programs against sickness and old age. Germany built on a tradition of welfare programs in Prussia and Saxony that began as early as in the 1840s. In the 1880s Chancellor Otto von Bismarck introduced old age pensions, accident insurance and medical care that formed the basis for Germany's welfare state. In Britain more extensive legislation was introduced by the Liberal government in the 1911 National Insurance Act. This gave the British working classes the first contributory system of insurance against illness and unemployment. This system was greatly expanded after the Second World War under the influence of the Beveridge Report, to form the first modern welfare state. Principles Insurance involves pooling funds from many insured entities (known as exposures) to pay for the losses that some may incur. The insured entities are therefore protected from risk for a fee, with the fee being dependent upon the frequency and severity of the event occurring. In order to be an insurable risk, the risk insured against must meet certain characteristics. Insurance as a financial intermediary is a commercial enterprise and a major part of the financial services industry, but individual entities can also self-insure through saving money for possible future losses. Insurability Risk which can be insured by private companies typically share seven common characteristics: Large number of similar exposure units: Since insurance operates through pooling resources, the majority of insurance policies cover individual members of large classes, allowing insurers to benefit from the law of large numbers in which predicted losses are similar to the actual losses. Exceptions include Lloyd's of London, which is famous for ensuring the life or health of actors, sports figures, and other famous individuals. However, all exposures will have particular differences, which may lead to different premium rates. Definite loss: This type of loss takes place at a known time and place, and from a known cause. The classic example involves the death of an insured person on a life-insurance policy. Fire, automobile accidents, and worker injuries may all easily meet this criterion. Other types of losses may only be definite in theory. Occupational disease, for instance, may involve prolonged exposure to injurious conditions where no specific time, place, or cause is identifiable. Ideally, the time, place, and cause of a loss should be clear enough that a reasonable person, with sufficient information, could objectively verify all three elements. Accidental loss: The event that constitutes the trigger of a claim should be fortuitous, or at least outside the control of the beneficiary of the insurance. The loss should be pure, in the sense that it results from an event for which there is only the opportunity for cost. Events that contain speculative elements such as ordinary business risks or even purchasing a lottery ticket are generally not considered insurable. Large loss: The size of the loss must be meaningful from the perspective of the insured. Insurance premiums need to cover both the expected cost of losses, plus the cost of issuing and administering the policy, adjusting losses, and supplying the capital needed to reasonably assure that the insurer will be able to pay claims. For small losses, these latter costs may be several times the size of the expected cost of losses. There is hardly any point in paying such costs unless the protection offered has real value to a buyer. Affordable premium: If the likelihood of an insured event is so high, or the cost of the event so large, that the resulting premium is large relative to the amount of protection offered, then it is not likely that insurance will be purchased, even if on offer. Furthermore, as the accounting profession formally recognizes in financial accounting standards, the premium cannot be so large that there is not a reasonable chance of a significant loss to the insurer. If there is no such chance of loss, then the transaction may have the form of insurance, but not the substance (see the U.S. Financial Accounting Standards Board pronouncement number 113: "Accounting and Reporting for Reinsurance of Short-Duration and Long-Duration Contracts"). Calculable loss: There are two elements that must be at least estimable, if not formally calculable: the probability of loss, and the attendant cost. Probability of loss is generally an empirical exercise, while cost has more to do with the ability of a reasonable person in possession of a copy of the insurance policy and a proof of loss associated with a claim presented under that policy to make a reasonably definite and objective evaluation of the amount of the loss recoverable as a result of the claim. Limited risk of catastrophically large losses: Insurable losses are ideally independent and non-catastrophic, meaning that the losses do not happen all at once and individual losses are not severe enough to bankrupt the insurer; insurers may prefer to limit their exposure to a loss from a single event to some small portion of their capital base. Capital constrains insurers' ability to sell earthquake insurance as well as wind insurance in hurricane zones. In the United States, the federal government insures flood risk. In commercial fire insurance, it is possible to find single properties whose total exposed value is well in excess of any individual insurer's capital constraint. Such properties are generally shared among several insurers or are insured by a single insurer which syndicates the risk into the reinsurance market. Legal When a company insures an individual entity, there are basic legal requirements and regulations. Several commonly cited legal principles of insurance include: Indemnity – the insurance company indemnifies or compensates, the insured in the case of certain losses only up to the insured's interest. Benefit insurance – as it is stated in the study books of The Chartered Insurance Institute, the insurance company does not have the right of recovery from the party who caused the injury and is to compensate the Insured regardless of the fact that Insured had already sued the negligent party for the damages (for example, personal accident insurance) Insurable interest – the insured typically must directly suffer from the loss. Insurable interest must exist whether property insurance or insurance on a person is involved. The concept requires that the insured have a "stake" in the loss or damage to the life or property insured. What that "stake" is will be determined by the kind of insurance involved and the nature of the property ownership or relationship between the persons. The requirement of an insurable interest is what distinguishes insurance from gambling. Utmost good faith – (Uberrima fides) the insured and the insurer are bound by a good faith bond of honesty and fairness. Material facts must be disclosed. Contribution – insurers which have similar obligations to the insured contribute in the indemnification, according to some method. Subrogation – the insurance company acquires legal rights to pursue recoveries on behalf of the insured; for example, the insurer may sue those liable for the insured's loss. The Insurers can waive their subrogation rights by using the special clauses. Causa proxima, or proximate cause – the cause of loss (the peril) must be covered under the insuring agreement of the policy, and the dominant cause must not be excluded Mitigation – In case of any loss or casualty, the asset owner must attempt to keep loss to a minimum, as if the asset was not insured. Indemnification To "indemnify" means to make whole again, or to be reinstated to the position that one was in, to the extent possible, prior to the happening of a specified event or peril. Accordingly, life insurance is generally not considered to be indemnity insurance, but rather "contingent" insurance (i.e., a claim arises on the occurrence of a specified event). There are generally three types of insurance contracts that seek to indemnify an insured: A "reimbursement" policy A "pay on behalf" or "on behalf of policy" An "indemnification" policy From an insured's standpoint, the result is usually the same: the insurer pays the loss and claims expenses. If the Insured has a "reimbursement" policy, the insured can be required to pay for a loss and then be "reimbursed" by the insurance carrier for the loss and out of pocket costs including, with the permission of the insurer, claim expenses. Under a "pay on behalf" policy, the insurance carrier would defend and pay a claim on behalf of the insured who would not be out of pocket for anything. Most modern liability insurance is written on the basis of "pay on behalf" language, which enables the insurance carrier to manage and control the claim. Under an "indemnification" policy, the insurance carrier can generally either "reimburse" or "pay on behalf of", whichever is more beneficial to it and the insured in the claim handling process. An entity seeking to transfer risk (an individual, corporation, or association of any type, etc.) becomes the "insured" party once risk is assumed by an "insurer", the insuring party, by means of a contract, called an insurance policy. Generally, an insurance contract includes, at a minimum, the following elements: identification of participating parties (the insurer, the insured, the beneficiaries), the premium, the period of coverage, the particular loss event covered, the amount of coverage (i.e., the amount to be paid to the insured or beneficiary in the event of a loss), and exclusions (events not covered). An insured is thus said to be "indemnified" against the loss covered in the policy. When insured parties experience a loss for a specified peril, the coverage entitles the policyholder to make a claim against the insurer for the covered amount of loss as specified by the policy. The fee paid by the insured to the insurer for assuming the risk is called the premium. Insurance premiums from many insureds are used to fund accounts reserved for later payment of claims – in theory for a relatively few claimants – and for overhead costs. So long as an insurer maintains adequate funds set aside for anticipated losses (called reserves), the remaining margin is an insurer's profit. Exclusions Policies typically include a number of exclusions, for example: Nuclear exclusion clause, excluding damage caused by nuclear and radiation accidents War exclusion clause, excluding damage from acts of war or terrorism. Insurers may prohibit certain activities which are considered dangerous and therefore excluded from coverage. One system for classifying activities according to whether they are authorised by insurers refers to "green light" approved activities and events, "yellow light" activities and events which require insurer consultation and/or waivers of liability, and "red light" activities and events which are prohibited and outside the scope of insurance cover. Social effects Insurance can have various effects on society through the way that it changes who bears the cost of losses and damage. On one hand it can increase fraud; on the other it can help societies and individuals prepare for catastrophes and mitigate the effects of catastrophes on both households and societies. Insurance can influence the probability of losses through moral hazard, insurance fraud, and preventive steps by the insurance company. Insurance scholars have typically used moral hazard to refer to the increased loss due to unintentional carelessness and insurance fraud to refer to increased risk due to intentional carelessness or indifference. Insurers attempt to address carelessness through inspections, policy provisions requiring certain types of maintenance, and possible discounts for loss mitigation efforts. While in theory insurers could encourage investment in loss reduction, some commentators have argued that in practice insurers had historically not aggressively pursued loss control measures—particularly to prevent disaster losses such as hurricanes—because of concerns over rate reductions and legal battles. However, since about 1996 insurers have begun to take a more active role in loss mitigation, such as through building codes. Methods of insurance According to the study books of The Chartered Insurance Institute, there are variant methods of insurance as follows: Co-insurance – risks shared between insurers Dual insurance – having two or more policies with overlapping coverage of a risk (both the individual policies would not pay separately – under a concept named contribution, they would contribute together to make up the policyholder's losses. However, in case of contingency insurances such as life insurance, dual payment is allowed) Self-insurance – situations where risk is not transferred to insurance companies and solely retained by the entities or individuals themselves Reinsurance – situations when the insurer passes some part of or all risks to another Insurer, called the reinsurer Insurers' business model Insurers may use the subscription business model, collecting premium payments periodically in return for on-going and/or compounding benefits offered to policyholders. Underwriting and investing Insurers' business model aims to collect more in premium and investment income than is paid out in losses, and to also offer a competitive price which consumers will accept. Profit can be reduced to a simple equation: Profit = earned premium + investment income – incurred loss – underwriting expenses. Insurers make money in two ways: Through underwriting, the process by which insurers select the risks to insure and decide how much in premiums to charge for accepting those risks, and taking the brunt of the risk should it come to fruition. By investing the premiums they collect from insured parties The most complicated aspect of insuring is the actuarial science of ratemaking (price-setting) of policies, which uses statistics and probability to approximate the rate of future claims based on a given risk. After producing rates, the insurer will use discretion to reject or accept risks through the underwriting process. At the most basic level, initial rate-making involves looking at the frequency and severity of insured perils and the expected average payout resulting from these perils. Thereafter an insurance company will collect historical loss-data, bring the loss data to present value, and compare these prior losses to the premium collected in order to assess rate adequacy. Loss ratios and expense loads are also used. Rating for different risk characteristics involves - at the most basic level - comparing the losses with "loss relativities"—a policy with twice as many losses would, therefore, be charged twice as much. More complex multivariate analyses are sometimes used when multiple characteristics are involved and a univariate analysis could produce confounded results. Other statistical methods may be used in assessing the probability of future losses. Upon termination of a given policy, the amount of premium collected minus the amount paid out in claims is the insurer's underwriting profit on that policy. Underwriting performance is measured by something called the "combined ratio", which is the ratio of expenses/losses to premiums. A combined ratio of less than 100% indicates an underwriting profit, while anything over 100 indicates an underwriting loss. A company with a combined ratio over 100% may nevertheless remain profitable due to investment earnings. Insurance companies earn investment profits on "float". Float, or available reserve, is the amount of money on hand at any given moment that an insurer has collected in insurance premiums but has not paid out in claims. Insurers start investing insurance premiums as soon as they are collected and continue to earn interest or other income on them until claims are paid out. The Association of British Insurers (grouping together 400 insurance companies and 94% of UK insurance services) has almost 20% of the investments in the London Stock Exchange. In 2007, U.S. industry profits from float totaled $58 billion. In a 2009 letter to investors, Warren Buffett wrote, "we were paid $2.8 billion to hold our float in 2008". In the United States, the underwriting loss of property and casualty insurance companies was $142.3 billion in the five years ending 2003. But overall profit for the same period was $68.4 billion, as the result of float. Some insurance-industry insiders, most notably Hank Greenberg, do not believe that it is possible to sustain a profit from float forever without an underwriting profit as well, but this opinion is not universally held. Reliance on float for profit has led some industry experts to call insurance companies "investment companies that raise the money for their investments by selling insurance". Naturally, the float method is difficult to carry out in an economically depressed period. Bear markets do cause insurers to shift away from investments and to toughen up their underwriting standards, so a poor economy generally means high insurance-premiums. This tendency to swing between profitable and unprofitable periods over time is commonly known as the underwriting, or insurance, cycle. Claims Claims and loss handling is the materialized utility of insurance; it is the actual "product" paid for. Claims may be filed by insureds directly with the insurer or through brokers or agents. The insurer may require that the claim be filed on its own proprietary forms, or may accept claims on a standard industry form, such as those produced by ACORD. Insurance company claims departments employ a large number of claims adjusters supported by a staff of records management and data entry clerks. Incoming claims are classified based on severity and are assigned to adjusters whose settlement authority varies with their knowledge and experience. The adjuster undertakes an investigation of each claim, usually in close cooperation with the insured, determines if coverage is available under the terms of the insurance contract, and if so, the reasonable monetary value of the claim, and authorizes payment. The policyholder may hire their own public adjuster to negotiate the settlement with the insurance company on their behalf. For policies that are complicated, where claims may be complex, the insured may take out a separate insurance policy add-on, called loss recovery insurance, which covers the cost of a public adjuster in the case of a claim. Adjusting liability insurance claims is particularly difficult because there is a third party involved, the plaintiff, who is under no contractual obligation to cooperate with the insurer and may in fact regard the insurer as a deep pocket. The adjuster must obtain legal counsel for the insured (either inside "house" counsel or outside "panel" counsel), monitor litigation that may take years to complete, and appear in person or over the telephone with settlement authority at a mandatory settlement conference when requested by the judge. If a claims adjuster suspects under-insurance, the condition of average may come into play to limit the insurance company's exposure. In managing the claims handling function, insurers seek to balance the elements of customer satisfaction, administrative handling expenses, and claims overpayment leakages. As part of this balancing act, fraudulent insurance practices are a major business risk that must be managed and overcome. Disputes between insurers and insureds over the validity of claims or claims handling practices occasionally escalate into litigation (see insurance bad faith). Marketing Insurers will often use insurance agents to initially market or underwrite their customers. Agents can be captive, meaning they write only for one company, or independent, meaning that they can issue policies from several companies. The existence and success of companies using insurance agents is likely due to the availability of improved and personalised services. Companies also use Broking firms, Banks and other corporate entities (like Self Help Groups, Microfinance Institutions, NGOs, etc.) to market their products. Types Any risk that can be quantified can potentially be insured. Specific kinds of risk that may give rise to claims are known as perils. An insurance policy will set out in detail which perils are covered by the policy and which are not. Below are non-exhaustive lists of the many different types of insurance that exist. A single policy may cover risks in one or more of the categories set out below. For example, vehicle insurance would typically cover both the property risk (theft or damage to the vehicle) and the liability risk (legal claims arising from an accident). A home insurance policy in the United States typically includes coverage for damage to the home and the owner's belongings, certain legal claims against the owner, and even a small amount of coverage for medical expenses of guests who are injured on the owner's property. Business insurance can take a number of different forms, such as the various kinds of professional liability insurance, also called professional indemnity (PI), which are discussed below under that name; and the business owner's policy (BOP), which packages into one policy many of the kinds of coverage that a business owner needs, in a way analogous to how homeowners' insurance packages the coverages that a homeowner needs. Vehicle insurance Vehicle insurance protects the policyholder against financial loss in the event of an incident involving a vehicle they own, such as in a traffic collision. Coverage typically includes: Property coverage, for damage to or theft of the car Liability coverage, for the legal responsibility to others for bodily injury or property damage Medical coverage, for the cost of treating injuries, rehabilitation and sometimes lost wages and funeral expenses Gap insurance Gap insurance covers the excess amount on your auto loan in an instance where your insurance company does not cover the entire loan. Depending on the company's specific policies it might or might not cover the deductible as well. This coverage is marketed for those who put low down payments, have high interest rates on their loans, and those with 60-month or longer terms. Gap insurance is typically offered by a finance company when the vehicle owner purchases their vehicle, but many auto insurance companies offer this coverage to consumers as well. Health insurance Health insurance policies cover the cost of medical treatments. Dental insurance, like medical insurance, protects policyholders for dental costs. In most developed countries, all citizens receive some health coverage from their governments, paid through taxation. In most countries, health insurance is often part of an employer's benefits. Income protection insurance Disability insurance policies provide financial support in the event of the policyholder becoming unable to work because of disabling illness or injury. It provides monthly support to help pay such obligations as mortgage loans and credit cards. Short-term and long-term disability policies are available to individuals, but considering the expense, long-term policies are generally obtained only by those with at least six-figure incomes, such as doctors, lawyers, etc. Short-term disability insurance covers a person for a period typically up to six months, paying a stipend each month to cover medical bills and other necessities. Long-term disability insurance covers an individual's expenses for the long term, up until such time as they are considered permanently disabled and thereafter Insurance companies will often try to encourage the person back into employment in preference to and before declaring them unable to work at all and therefore totally disabled. Disability overhead insurance allows business owners to cover the overhead expenses of their business while they are unable to work. Total permanent disability insurance provides benefits when a person is permanently disabled and can no longer work in their profession, often taken as an adjunct to life insurance. Workers' compensation insurance replaces all or part of a worker's wages lost and accompanying medical expenses incurred because of a job-related injury. Casualty insurance Casualty insurance insures against accidents, not necessarily tied to any specific property. It is a broad spectrum of insurance that a number of other types of insurance could be classified, such as auto, workers compensation, and some liability insurances. Crime insurance is a form of casualty insurance that covers the policyholder against losses arising from the criminal acts of third parties. For example, a company can obtain crime insurance to cover losses arising from theft or embezzlement. Terrorism insurance provides protection against any loss or damage caused by terrorist activities. In the United States in the wake of 9/11, the Terrorism Risk Insurance Act 2002 (TRIA) set up a federal program providing a transparent system of shared public and private compensation for insured losses resulting from acts of terrorism. The program was extended until the end of 2014 by the Terrorism Risk Insurance Program Reauthorization Act 2007 (TRIPRA). Kidnap and ransom insurance is designed to protect individuals and corporations operating in high-risk areas around the world against the perils of kidnap, extortion, wrongful detention and hijacking. Political risk insurance is a form of casualty insurance that can be taken out by businesses with operations in countries in which there is a risk that revolution or other political conditions could result in a loss. Life insurance Life insurance provides a monetary benefit to a decedent's family or other designated beneficiary, and may specifically provide for income to an insured person's family, burial, funeral and other final expenses. Life insurance policies often allow the option of having the proceeds paid to the beneficiary either in a lump sum cash payment or an annuity. In most states, a person cannot purchase a policy on another person without their knowledge. Annuities provide a stream of payments and are generally classified as insurance because they are issued by insurance companies, are regulated as insurance, and require the same kinds of actuarial and investment management expertise that life insurance requires. Annuities and pensions that pay a benefit for life are sometimes regarded as insurance against the possibility that a retiree will outlive his or her financial resources. In that sense, they are the complement of life insurance and, from an underwriting perspective, are the mirror image of life insurance. Certain life insurance contracts accumulate cash values, which may be taken by the insured if the policy is surrendered or which may be borrowed against. Some policies, such as annuities and endowment policies, are financial instruments to accumulate or liquidate wealth when it is needed. In many countries, such as the United States and the UK, the tax law provides that the interest on this cash value is not taxable under certain circumstances. This leads to widespread use of life insurance as a tax-efficient method of saving as well as protection in the event of early death. In the United States, the tax on interest income on life insurance policies and annuities is generally deferred. However, in some cases the benefit derived from tax deferral may be offset by a low return. This depends upon the insuring company, the type of policy and other variables (mortality, market return, etc.). Moreover, other income tax saving vehicles (e.g., IRAs, 401(k) plans, Roth IRAs) may be better alternatives for value accumulation. Burial insurance Burial insurance is a very old type of life insurance which is paid out upon death to cover final expenses, such as the cost of a funeral. The Greeks and Romans introduced burial insurance c. 600 CE when they organized guilds called "benevolent societies" which cared for the surviving families and paid funeral expenses of members upon death. Guilds in the Middle Ages served a similar purpose, as did friendly societies during Victorian times. Property Property insurance provides protection against risks to property, such as fire, theft or weather damage. This may include specialized forms of insurance such as fire insurance, flood insurance, earthquake insurance, home insurance, inland marine insurance or boiler insurance. The term property insurance may, like casualty insurance, be used as a broad category of various subtypes of insurance, some of which are listed below: Aviation insurance protects aircraft hulls and spares, and associated liability risks, such as passenger and third-party liability. Airports may also appear under this subcategory, including air traffic control and refuelling operations for international airports through to smaller domestic exposures. Boiler insurance (also known as boiler and machinery insurance, or equipment breakdown insurance) insures against accidental physical damage to boilers, equipment or machinery. Builder's risk insurance insures against the risk of physical loss or damage to property during construction. Builder's risk insurance is typically written on an "all risk" basis covering damage arising from any cause (including the negligence of the insured) not otherwise expressly excluded. Builder's risk insurance is coverage that protects a person's or organization's insurable interest in materials, fixtures or equipment being used in the construction or renovation of a building or structure should those items sustain physical loss or damage from an insured peril. Crop insurance may be purchased by farmers to reduce or manage various risks associated with growing crops. Such risks include crop loss or damage caused by weather, hail, drought, frost damage, pests (including especially insects), or disease - some of these being termed named perils. Index-based insurance uses models of how climate extremes affect crop production to define certain climate triggers that if surpassed have high probabilities of causing substantial crop loss. When harvest losses occur associated with exceeding the climate trigger threshold, the index-insured farmer is entitled to a compensation payment. Earthquake insurance is a form of property insurance that pays the policyholder in the event of an earthquake that causes damage to the property. Most ordinary home insurance policies do not cover earthquake damage. Earthquake insurance policies generally feature a high deductible. Rates depend on location and hence the likelihood of an earthquake, as well as the construction of the home. Fidelity bond is a form of casualty insurance that covers policyholders for losses incurred as a result of fraudulent acts by specified individuals. It usually insures a business for losses caused by the dishonest acts of its employees. Flood insurance protects against property loss due to flooding. Many U.S. insurers do not provide flood insurance in some parts of the country. In response to this, the federal government created the National Flood Insurance Program which serves as the insurer of last resort. Home insurance, also commonly called hazard insurance or homeowners insurance (often abbreviated in the real estate industry as HOI), provides coverage for damage or destruction of the policyholder's home. In some geographical areas, the policy may exclude certain types of risks, such as flood or earthquake, that require additional coverage. Maintenance-related issues are typically the homeowner's responsibility. The policy may include inventory, or this can be bought as a separate policy, especially for people who rent housing. In some countries, insurers offer a package which may include liability and legal responsibility for injuries and property damage caused by members of the household, including pets. Landlord insurance covers residential or commercial property that is rented to tenants. It also covers the landlord's liability for the occupants at the property. Most homeowners' insurance, meanwhile, cover only owner-occupied homes and not liability or damages related to tenants. Marine insurance and marine cargo insurance cover the loss or damage of vessels at sea or on inland waterways, and of cargo in transit, regardless of the method of transit. When the owner of the cargo and the carrier are separate corporations, marine cargo insurance typically compensates the owner of cargo for losses sustained from fire, shipwreck, etc., but excludes losses that can be recovered from the carrier or the carrier's insurance. Many marine insurance underwriters will include "time element" coverage in such policies, which extends the indemnity to cover loss of profit and other business expenses attributable to the delay caused by a covered loss. Renters' insurance, often called tenants' insurance, is an insurance policy that provides some of the benefits of homeowners' insurance, but does not include coverage for the dwelling, or structure, with the exception of small alterations that a tenant makes to the structure. Supplemental natural disaster insurance covers specified expenses after a natural disaster renders the policyholder's home uninhabitable. Periodic payments are made directly to the insured until the home is rebuilt or a specified time period has elapsed. Surety bond insurance is a three-party insurance guaranteeing the performance of the principal. Volcano insurance is a specialized insurance protecting against damage arising specifically from volcanic eruptions. Windstorm insurance is an insurance covering the damage that can be caused by wind events such as hurricanes. Liability Liability insurance is a very broad superset that covers legal claims against the insured. Many types of insurance include an aspect of liability coverage. For example, a homeowner's insurance policy will normally include liability coverage which protects the insured in the event of a claim brought by someone who slips and falls on the property; automobile insurance also includes an aspect of liability insurance that indemnifies against the harm that a crashing car can cause to others' lives, health, or property. The protection offered by a liability insurance policy is twofold: a legal defense in the event of a lawsuit commenced against the policyholder and indemnification (payment on behalf of the insured) with respect to a settlement or court verdict. Liability policies typically cover only the negligence of the insured, and will not apply to results of wilful or intentional acts by the insured. Public liability insurance or general liability insurance covers a business or organization against claims should its operations injure a member of the public or damage their property in some way. Directors and officers liability insurance (D&O) protects an organization (usually a corporation) from costs associated with litigation resulting from errors made by directors and officers for which they are liable. Environmental liability or environmental impairment insurance protects the insured from bodily injury, property damage and cleanup costs as a result of the dispersal, release or escape of pollutants. Errors and omissions insurance (E&O) is business liability insurance for professionals such as insurance agents, real estate agents and brokers, architects, third-party administrators (TPAs) and other business professionals. Prize indemnity insurance protects the insured from giving away a large prize at a specific event. Examples would include offering prizes to contestants who can make a half-court shot at a basketball game, or a hole-in-one at a golf tournament. Professional liability insurance, also called professional indemnity insurance (PI), protects insured professionals such as architectural corporations and medical practitioners against potential negligence claims made by their patients/clients. Professional liability insurance may take on different names depending on the profession. For example, professional liability insurance in reference to the medical profession may be called medical malpractice insurance. Often a commercial insured's liability insurance program consists of several layers. The first layer of insurance generally consists of primary insurance, which provides first dollar indemnity for judgments and settlements up to the limits of liability of the primary policy. Generally, primary insurance is subject to a deductible and obligates the insured to defend the insured against lawsuits, which is normally accomplished by assigning counsel to defend the insured. In many instances, a commercial insured may elect to self-insure. Above the primary insurance or self-insured retention, the insured may have one or more layers of excess insurance to provide coverage additional limits of indemnity protection. There are a variety of types of excess insurance, including "stand-alone" excess policies (policies that contain their own terms, conditions, and exclusions), "follow form" excess insurance (policies that follow the terms of the underlying policy except as specifically provided), and "umbrella" insurance policies (excess insurance that in some circumstances could provide coverage that is broader than the underlying insurance). Credit Credit insurance repays some or all of a loan when the borrower is insolvent. Mortgage insurance insures the lender against default by the borrower. Mortgage insurance is a form of credit insurance, although the name "credit insurance" more often is used to refer to policies that cover other kinds of debt. Many credit cards offer payment protection plans which are a form of credit insurance. Trade credit insurance is business insurance over the accounts receivable of the insured. The policy pays the policy holder for covered accounts receivable if the debtor defaults on payment. Collateral protection insurance (CPI) insures property (primarily vehicles) held as collateral for loans made by lending institutions. Cyber attack insurance Cyber-insurance is a business lines insurance product intended to provide coverage to corporations from Internet-based risks, and more generally from risks relating to information technology infrastructure, information privacy, information governance liability, and activities related thereto. Other types All-risk insurance is an insurance that covers a wide range of incidents and perils, except those noted in the policy. All-risk insurance is different from peril-specific insurance that cover losses from only those perils listed in the policy. In car insurance, all-risk policy includes also the damages caused by the own driver. Bloodstock insurance covers individual horses or a number of horses under common ownership. Coverage is typically for mortality as a result of accident, illness or disease but may extend to include infertility, in-transit loss, veterinary fees, and prospective foal. Business interruption insurance covers the loss of income, and the expenses incurred, after a covered peril interrupts normal business operations. Defense Base Act (DBA) insurance provides coverage for civilian workers hired by the government to perform contracts outside the United States and Canada. DBA is required for all U.S. citizens, U.S. residents, U.S. Green Card holders, and all employees or subcontractors hired on overseas government contracts. Depending on the country, foreign nationals must also be covered under DBA. This coverage typically includes expenses related to medical treatment and loss of wages, as well as disability and death benefits. Expatriate insurance provides individuals and organizations operating outside of their home country with protection for automobiles, property, health, liability and business pursuits. Hired-in Plant Insurance covers liability where, under a contract of hire, the customer is liable to pay for the cost of hired-in equipment and for any rental charges due to a plant hire firm, such as construction plant and machinery. Legal expenses insurance covers policyholders for the potential costs of legal action against an institution or an individual. When something happens which triggers the need for legal action, it is known as "the event". There are two main types of legal expenses insurance: before the event insurance and after the event insurance. Livestock insurance is a specialist policy provided to, for example, commercial or hobby farms, aquariums, fish farms or any other animal holding. Cover is available for mortality or economic slaughter as a result of accident, illness or disease but can extend to include destruction by government order. Media liability insurance is designed to cover professionals that engage in film and television production and print, against risks such as defamation. Nuclear incident insurance covers damages resulting from an incident involving radioactive materials and is generally arranged at the national level. (See the nuclear exclusion clause and, for the United States, the Price–Anderson Nuclear Industries Indemnity Act.) Pet insurance insures pets against accidents and illnesses; some companies cover routine/wellness care and burial, as well. Pollution insurance usually takes the form of first-party coverage for contamination of insured property either by external or on-site sources. Coverage is also afforded for liability to third parties arising from contamination of air, water, or land due to the sudden and accidental release of hazardous materials from the insured site. The policy usually covers the costs of cleanup and may include coverage for releases from underground storage tanks. Intentional acts are specifically excluded. Purchase insurance is aimed at providing protection on the products people purchase. Purchase insurance can cover individual purchase protection, warranties, guarantees, care plans and even mobile phone insurance. Such insurance is normally very limited in the scope of problems that are covered by the policy. Tax insurance is increasingly being used in corporate transactions to protect taxpayers in the event that a tax position it has taken is challenged by the IRS or a state, local, or foreign taxing authority Title insurance provides a guarantee that title to real property is vested in the purchaser or mortgagee, free and clear of liens or encumbrances. It is usually issued in conjunction with a search of the public records performed at the time of a real estate transaction. Travel insurance is an insurance cover taken by those who travel abroad, which covers certain losses such as medical expenses, loss of personal belongings, travel delay, and personal liabilities. Tuition insurance insures students against involuntary withdrawal from cost-intensive educational institutions Interest rate insurance protects the holder from adverse changes in interest rates, for instance for those with a variable rate loan or mortgage Divorce insurance is a form of contractual liability insurance that pays the insured a cash benefit if their marriage ends in divorce. Insurance financing vehicles Fraternal insurance is provided on a cooperative basis by fraternal benefit societies or other social organizations. No-fault insurance is a type of insurance policy (typically automobile insurance) where insureds are indemnified by their own insurer regardless of fault in the incident. Protected self-insurance is an alternative risk financing mechanism in which an organization retains the mathematically calculated cost of risk within the organization and transfers the catastrophic risk with specific and aggregate limits to an insurer so the maximum total cost of the program is known. A properly designed and underwritten Protected Self-Insurance Program reduces and stabilizes the cost of insurance and provides valuable risk management information. Retrospectively rated insurance is a method of establishing a premium on large commercial accounts. The final premium is based on the insured's actual loss experience during the policy term, sometimes subject to a minimum and maximum premium, with the final premium determined by a formula. Under this plan, the current year's premium is based partially (or wholly) on the current year's losses, although the premium adjustments may take months or years beyond the current year's expiration date. The rating formula is guaranteed in the insurance contract. Formula: retrospective premium = converted loss + basic premium × tax multiplier. Numerous variations of this formula have been developed and are in use. Formal self-insurance (active risk retention) is the deliberate decision to pay for otherwise insurable losses out of one's own money. This can be done on a formal basis by establishing a separate fund into which funds are deposited on a periodic basis, or by simply forgoing the purchase of available insurance and paying out-of-pocket. Self-insurance is usually used to pay for high-frequency, low-severity losses. Such losses, if covered by conventional insurance, mean having to pay a premium that includes loadings for the company's general expenses, cost of putting the policy on the books, acquisition expenses, premium taxes, and contingencies. While this is true for all insurance, for small, frequent losses the transaction costs may exceed the benefit of volatility reduction that insurance otherwise affords. Reinsurance is a type of insurance purchased by insurance companies or self-insured employers to protect against unexpected losses. Financial reinsurance is a form of reinsurance that is primarily used for capital management rather than to transfer insurance risk. Social insurance can be many things to many people in many countries. But a summary of its essence is that it is a collection of insurance coverages (including components of life insurance, disability income insurance, unemployment insurance, health insurance, and others), plus retirement savings, that requires participation by all citizens. By forcing everyone in society to be a policyholder and pay premiums, it ensures that everyone can become a claimant when or if they need to. Along the way, this inevitably becomes related to other concepts such as the justice system and the welfare state. This is a large, complicated topic that engenders tremendous debate, which can be further studied in the following articles (and others): National Insurance Social safety net Social security Social Security debate (United States) Social Security (United States) Social welfare provision Stop-loss insurance provides protection against catastrophic or unpredictable losses. It is purchased by organizations who do not want to assume 100% of the liability for losses arising from the plans. Under a stop-loss policy, the insurance company becomes liable for losses that exceed certain limits called deductibles. Closed community and governmental self-insurance Some communities prefer to create virtual insurance among themselves by other means than contractual risk transfer, which assigns explicit numerical values to risk. A number of religious groups, including the Amish and some Muslim groups, depend on support provided by their communities when disasters strike. The risk presented by any given person is assumed collectively by the community who all bear the cost of rebuilding lost property and supporting people whose needs are suddenly greater after a loss of some kind. In supportive communities where others can be trusted to follow community leaders, this tacit form of insurance can work. In this manner the community can even out the extreme differences in insurability that exist among its members. Some further justification is also provided by invoking the moral hazard of explicit insurance contracts. In the United Kingdom, The Crown (which, for practical purposes, meant the civil service) did not insure property such as government buildings. If a government building was damaged, the cost of repair would be met from public funds because, in the long run, this was cheaper than paying insurance premiums. Since many UK government buildings have been sold to property companies and rented back, this arrangement is now less common. In the United States, the most prevalent form of self-insurance is governmental risk management pools. They are self-funded cooperatives, operating as carriers of coverage for the majority of governmental entities today, such as county governments, municipalities, and school districts. Rather than these entities independently self-insure and risk bankruptcy from a large judgment or catastrophic loss, such governmental entities form a risk pool. Such pools begin their operations by capitalization through member deposits or bond issuance. Coverage (such as general liability, auto liability, professional liability, workers compensation, and property) is offered by the pool to its members, similar to coverage offered by insurance companies. However, self-insured pools offer members lower rates (due to not needing insurance brokers), increased benefits (such as loss prevention services) and subject matter expertise. Of approximately 91,000 distinct governmental entities operating in the United States, 75,000 are members of self-insured pools in various lines of coverage, forming approximately 500 pools. Although a relatively small corner of the insurance market, the annual contributions (self-insured premiums) to such pools have been estimated up to 17 billion dollars annually. Insurance companies Insurance companies may sell any combination of insurance types, but are often classified into three groups: Life insurance companies, which sell life insurance, annuities and pensions products and bear similarities to asset management businesses Non-life or property/casualty insurance companies, which sell other types of insurance. Health insurance companies, which sometimes sell life insurance or employee benefits as well General insurance companies can be further divided into these sub categories. Standard lines Excess lines In most countries, life and non-life insurers are subject to different regulatory regimes and different tax and accounting rules. The main reason for the distinction between the two types of company is that life, annuity, and pension business is very long-term in nature – coverage for life assurance or a pension can cover risks over many decades. By contrast, non-life insurance cover usually covers a shorter period, such as one year. Mutual versus proprietary Insurance companies are generally classified as either mutual or proprietary companies. Mutual companies are owned by the policyholders, while shareholders (who may or may not own policies) own proprietary insurance companies. Demutualization of mutual insurers to form stock companies, as well as the formation of a hybrid known as a mutual holding company, became common in some countries, such as the United States, in the late 20th century. However, not all states permit mutual holding companies. Reinsurance companies Reinsurance companies are insurance companies that sell policies to other insurance companies, allowing them to reduce their risks and protect themselves from substantial losses. The reinsurance market is dominated by a few very large companies, with huge reserves. A reinsurer may also be a direct writer of insurance risks as well. Captive insurance companies Captive insurance companies may be defined as limited-purpose insurance companies established with the specific objective of financing risks emanating from their parent group or groups. This definition can sometimes be extended to include some of the risks of the parent company's customers. In short, it is an in-house self-insurance vehicle. Captives may take the form of a "pure" entity, which is a 100% subsidiary of the self-insured parent company; of a "mutual" captive, which insures the collective risks of members of an industr); and of an "association" captive, which self-insures individual risks of the members of a professional, commercial or industrial association. Captives represent commercial, economic and tax advantages to their sponsors because of the reductions in costs they help create and for the ease of insurance risk management and the flexibility for cash flows they generate. Additionally, they may provide coverage of risks which is neither available nor offered in the traditional insurance market at reasonable prices. The types of risk that a captive can underwrite for their parents include property damage, public and product liability, professional indemnity, employee benefits, employers' liability, motor and medical aid expenses. The captive's exposure to such risks may be limited by the use of reinsurance. Captives are becoming an increasingly important component of the risk management and risk financing strategy of their parent. This can be understood against the following background: Heavy and increasing premium costs in almost every line of coverage Difficulties in insuring certain types of fortuitous risk Differential coverage standards in various parts of the world Rating structures which reflect market trends rather than individual loss experience Insufficient credit for deductibles or loss control efforts Other forms Other possible forms for an insurance company include reciprocals, in which policyholders reciprocate in sharing risks, and Lloyd's organizations. Admitted versus non-admitted Admitted insurance companies are those in the United States that have been admitted or licensed by the state licensing agency. The insurance they sell is called admitted insurance. Non-admitted companies have not been approved by the state licensing agency, but are allowed to sell insurance under special circumstances when they meet an insurance need that admitted companies cannot or will not meet. Insurance consultants There are also companies known as "insurance consultants". Like a mortgage broker, these companies are paid a fee by the customer to shop around for the best insurance policy among many companies. Similar to an insurance consultant, an "insurance broker" also shops around for the best insurance policy among many companies. However, with insurance brokers, the fee is usually paid in the form of commission from the insurer that is selected rather than directly from the client. Neither insurance consultants nor insurance brokers are insurance companies and no risks are transferred to them in insurance transactions. Third party administrators are companies that perform underwriting and sometimes claims handling services for insurance companies. These companies often have special expertise that the insurance companies do not have. Financial stability and rating The financial stability and strength of an insurance company should be a major consideration when buying an insurance contract. An insurance premium paid currently provides coverage for losses that might arise many years in the future. For that reason, the viability of the insurance carrier is very important. In recent years, a number of insurance companies have become insolvent, leaving their policyholders with no coverage (or coverage only from a government-backed insurance pool or other arrangements with less attractive payouts for losses). A number of independent rating agencies provide information and rate the financial viability of insurance companies. Insurance companies are rated by various agencies such as A. M. Best. The ratings include the company's financial strength, which measures its ability to pay claims. It also rates financial instruments issued by the insurance company, such as bonds, notes, and securitization products. Across the world Advanced economies account for the bulk of the global insurance industry. According to Swiss Re, the global insurance market wrote $6.287 trillion in direct premiums in 2020. ("Direct premiums" means premiums written directly by insurers before accounting for ceding of risk to reinsurers.) As usual, the United States was the country with the largest insurance market with $2.530 trillion (40.3%) of direct premiums written, with the People's Republic of China coming in second at only $574 billion (9.3%), Japan coming in third at $438 billion (7.1%), and the United Kingdom coming in fourth at $380 billion (6.2%). However, the European Union's single market is the actual second largest market, with 18 percent market share. Regulatory differences In the United States, insurance is regulated by the states under the McCarran-Ferguson Act, with "periodic proposals for federal intervention", and a nonprofit coalition of state insurance agencies called the National Association of Insurance Commissioners works to harmonize the country's different laws and regulations. The National Conference of Insurance Legislators (NCOIL) also works to harmonize the different state laws. In the European Union, the Third Non-Life Directive and the Third Life Directive, both passed in 1992 and effective 1994, created a single insurance market in Europe and allowed insurance companies to offer insurance anywhere in the EU (subject to permission from authority in the head office) and allowed insurance consumers to purchase insurance from any insurer in the EU. As far as insurance in the United Kingdom, the Financial Services Authority took over insurance regulation from the General Insurance Standards Council in 2005; laws passed include the Insurance Companies Act 1973 and another in 1982, and reforms to warranty and other aspects under discussion . The insurance industry in China was nationalized in 1949 and thereafter offered by only a single state-owned company, the People's Insurance Company of China, which was eventually suspended as demand declined in a communist environment. In 1978, market reforms led to an increase in the market and by 1995 a comprehensive Insurance Law of the People's Republic of China was passed, followed in 1998 by the formation of China Insurance Regulatory Commission (CIRC), which has broad regulatory authority over the insurance market of China. In India IRDA is insurance regulatory authority. As per the section 4 of IRDA Act 1999, Insurance Regulatory and Development Authority (IRDA), which was constituted by an act of parliament. National Insurance Academy, Pune is apex insurance capacity builder institute promoted with support from Ministry of Finance and by LIC, Life & General Insurance companies. In 2017, within the framework of the joint project of the Bank of Russia and Yandex, a special check mark (a green circle with a tick and 'Реестр ЦБ РФ' (Unified state register of insurance entities) text box) appeared in the search for Yandex system, informing the consumer that the company's financial services are offered on the marked website, which has the status of an insurance company, a broker or a mutual insurance association. Controversies Does not reduce the risk Insurance is just a risk transfer mechanism wherein the financial burden which may arise due to some fortuitous event is transferred to a bigger entity called an Insurance Company by way of paying premiums. This only reduces the financial burden and not the actual chances of happening of an event. Insurance is a risk for both the insurance company and the insured. The insurance company understands the risk involved and will perform a risk assessment when writing the policy. As a result, the premiums may go up if they determine that the policyholder will file a claim. However, premiums might reduce if the policyholder commits to a risk management program as recommended by the insurer. It's therefore important that insurers view risk management as a joint initiative between policyholder and insurer since a robust risk management plan minimizes the possibility of a large claim for the insurer while stabilizing or reducing premiums for the policyholder. If a person is financially stable and plans for life's unexpected events, they may be able to go without insurance. However, they must have enough to cover a total and complete loss of employment and of their possessions. Some states will accept a surety bond, a government bond, or even making a cash deposit with the state. Moral hazard An insurance company may inadvertently find that its insureds may not be as risk-averse as they might otherwise be (since, by definition, the insured has transferred the risk to the insurer), a concept known as moral hazard. This 'insulates' many from the true costs of living with risk, negating measures that can mitigate or adapt to risk and leading some to describe insurance schemes as potentially maladaptive. Complexity of insurance policy contracts Insurance policies can be complex and some policyholders may not understand all the fees and coverages included in a policy. As a result, people may buy policies on unfavorable terms. In response to these issues, many countries have enacted detailed statutory and regulatory regimes governing every aspect of the insurance business, including minimum standards for policies and the ways in which they may be advertised and sold. For example, most insurance policies in the English language today have been carefully drafted in plain English; the industry learned the hard way that many courts will not enforce policies against insureds when the judges themselves cannot understand what the policies are saying. Typically, courts construe ambiguities in insurance policies against the insurance company and in favor of coverage under the policy. Many institutional insurance purchasers buy insurance through an insurance broker. While on the surface it appears the broker represents the buyer (not the insurance company), and typically counsels the buyer on appropriate coverage and policy limitations, in the vast majority of cases a broker's compensation comes in the form of a commission as a percentage of the insurance premium, creating a conflict of interest in that the broker's financial interest is tilted towards encouraging an insured to purchase more insurance than might be necessary at a higher price. A broker generally holds contracts with many insurers, thereby allowing the broker to "shop" the market for the best rates and coverage possible. Insurance may also be purchased through an agent. A tied agent, working exclusively with one insurer, represents the insurance company from whom the policyholder buys (while a free agent sells policies of various insurance companies). Just as there is a potential conflict of interest with a broker, an agent has a different type of conflict. Because agents work directly for the insurance company, if there is a claim the agent may advise the client to the benefit of the insurance company. Agents generally cannot offer as broad a range of selection compared to an insurance broker. An independent insurance consultant advises insureds on a fee-for-service retainer, similar to an attorney, and thus offers completely independent advice, free of the financial conflict of interest of brokers or agents. However, such a consultant must still work through brokers or agents in order to secure coverage for their clients. Limited consumer benefits In the United States, economists and consumer advocates generally consider insurance to be worthwhile for low-probability, catastrophic losses, but not for high-probability, small losses. Because of this, consumers are advised to select high deductibles and to not insure losses which would not cause a disruption in their life. However, consumers have shown a tendency to prefer low deductibles and to prefer to insure relatively high-probability, small losses over low-probability, perhaps due to not understanding or ignoring the low-probability risk. This is associated with reduced purchasing of insurance against low-probability losses, and may result in increased inefficiencies from moral hazard. Redlining Redlining is the practice of denying insurance coverage in specific geographic areas, supposedly because of a high likelihood of loss, while the alleged motivation is unlawful discrimination. Racial profiling or redlining has a long history in the property insurance industry in the United States. From a review of industry underwriting and marketing materials, court documents, and research by government agencies, industry and community groups, and academics, it is clear that race has long affected and continues to affect the policies and practices of the insurance industry. In July 2007, the US Federal Trade Commission (FTC) released a report presenting the results of a study concerning credit-based insurance scores in automobile insurance. The study found that these scores are effective predictors of risk. It also showed that African-Americans and Hispanics are substantially overrepresented in the lowest credit scores, and substantially underrepresented in the highest, while Caucasians and Asians are more evenly spread across the scores. The credit scores were also found to predict risk within each of the ethnic groups, leading the FTC to conclude that the scoring models are not solely proxies for redlining. The FTC indicated little data was available to evaluate benefit of insurance scores to consumers. The report was disputed by representatives of the Consumer Federation of America, the National Fair Housing Alliance, the National Consumer Law Center, and the Center for Economic Justice, for relying on data provided by the insurance industry. All states have provisions in their rate regulation laws or in their fair trade practice acts that prohibit unfair discrimination, often called redlining, in setting rates and making insurance available. In determining premiums and premium rate structures, insurers consider quantifiable factors, including location, credit scores, gender, occupation, marital status, and education level. However, the use of such factors is often considered to be unfair or unlawfully discriminatory, and the reaction against this practice has in some instances led to political disputes about the ways in which insurers determine premiums and regulatory intervention to limit the factors used. An insurance underwriter's job is to evaluate a given risk as to the likelihood that a loss will occur. Any factor that causes a greater likelihood of loss should theoretically be charged a higher rate. This basic principle of insurance must be followed if insurance companies are to remain solvent. Thus, "discrimination" against (i.e., negative differential treatment of) potential insureds in the risk evaluation and premium-setting process is a necessary by-product of the fundamentals of insurance underwriting. For instance, insurers charge older people significantly higher premiums than they charge younger people for term life insurance. Older people are thus treated differently from younger people (i.e., a distinction is made, discrimination occurs). The rationale for the differential treatment goes to the heart of the risk a life insurer takes: older people are likely to die sooner than young people, so the risk of loss (the insured's death) is greater in any given period of time and therefore the risk premium must be higher to cover the greater risk. However, treating insureds differently when there is no actuarially sound reason for doing so is unlawful discrimination. Insurance patents New assurance products can now be protected from copying with a business method patent in the United States. A recent example of a new insurance product that is patented is Usage Based auto insurance. Early versions were independently invented and patented by a major US auto insurance company, Progressive Auto Insurance () and a Spanish independent inventor, Salvador Minguijon Perez. Many independent inventors are in favor of patenting new insurance products since it gives them protection from big companies when they bring their new insurance products to market. Independent inventors account for 70% of the new U.S. patent applications in this area. Many insurance executives are opposed to patenting insurance products because it creates a new risk for them. The Hartford insurance company, for example, recently had to pay $80 million to an independent inventor, Bancorp Services, in order to settle a patent infringement and theft of trade secret lawsuit for a type of corporate owned life insurance product invented and patented by Bancorp. There are currently about 150 new patent applications on insurance inventions filed per year in the United States. The rate at which patents have been issued has steadily risen from 15 in 2002 to 44 in 2006. The first insurance patent to be granted was including another example of an application posted was. It was posted on 6 March 2009. This patent application describes a method for increasing the ease of changing insurance companies. Insurance on demand Insurance on demand (also IoD) is an insurance service that provides clients with insurance protection when they need, i.e. only episodic rather than on 24/7 basis as typically provided by traditional insurers (e.g. clients can purchase an insurance for one single flight rather than a longer-lasting travel insurance plan). Insurance industry and rent-seeking Certain insurance products and practices have been described as rent-seeking by critics. That is, some insurance products or practices are useful primarily because of legal benefits, such as reducing taxes, as opposed to providing protection against risks of adverse events. Under United States tax law, for example, most owners of variable annuities and variable life insurance can invest their premium payments in the stock market and defer or eliminate paying any taxes on their investments until withdrawals are made. Sometimes this tax deferral is the only reason people use these products. Another example is the legal infrastructure which allows life insurance to be held in an irrevocable trust which is used to pay an estate tax while the proceeds themselves are immune from the estate tax. Religious concerns Muslim scholars have varying opinions about life insurance. Life insurance policies that earn interest (or guaranteed bonus/NAV) are generally considered to be a form of riba (usury) and some consider even policies that do not earn interest to be a form of gharar (speculation). Some argue that gharar is not present due to the actuarial science behind the underwriting. Jewish rabbinical scholars also have expressed reservations regarding insurance as an avoidance of God's will but most find it acceptable in moderation. Some Christians believe insurance represents a lack of faith and there is a long history of resistance to commercial insurance in Anabaptist communities (Mennonites, Amish, Hutterites, Brethren in Christ) but many participate in community-based self-insurance programs that spread risk within their communities. See also Agent of Record DIRTI 5 Earthquake loss Financial adviser Financial services (broader industry to which insurance belongs) Geneva Association (the International Association for the Study of Insurance Economics) Global assets under management Insurance broker Insurance fraud Insurance Hall of Fame Insurance law Insurance Premium Tax (UK) List of Acts of Parliament of the United Kingdom Parliament, 1960-1979 Loss-control consultant Reinsurance Intergovernmental Risk Pool The Invisible Bankers: Everything the Insurance Industry Never Wanted You to Know (book) List of finance topics List of insurance topics List of United States insurance companies Social security Uberrima fides Universal health care Welfare state Country-specific articles: Insurance in Australia Insurance in India Insurance in the United States Insurance in the United Kingdom Insurance industry in China Notes References Citations Sources External links Congressional Research Service (CRS) Reports regarding the US Insurance industry Federation of European Risk Management Associations Insurance Bureau of Canada Insurance Information Institute National Association of Insurance Commissioners The British Library – finding information on the insurance industry (UK focus) Articles containing video clips
[ 0.6470367312431335, 0.32341983914375305, 0.28160643577575684, 0.27098923921585083, 0.3395114839076996, 0.022473841905593872, 0.0031677549704909325, 0.0900527685880661, -0.2131747603416443, -0.5032234191894531, -0.4257189631462097, 0.88567715883255, 0.3343805968761444, -0.20963650941848755,...
15179
https://en.wikipedia.org/wiki/Indira%20Gandhi
Indira Gandhi
Indira Priyadarshini Gandhi (; née Nehru; 19 November 1917 – 31 October 1984) was an Indian politician and a central figure of the Indian National Congress. She was the 3rd prime minister of India and was also the first and, to date, only female prime minister of India. Gandhi was the daughter of Jawaharlal Nehru, the 1st prime minister of India. She served as prime minister from January 1966 to March 1977 and again from January 1980 until her assassination in October 1984, making her the second longest-serving Indian prime minister after her father. During Nehru's premiership from 1947 to 1964, Gandhi was considered a key assistant and accompanied him on his numerous foreign trips. She was elected president of the Indian National Congress in 1959. Upon her father's death in 1964, she was appointed as a member of the Rajya Sabha (upper house) and became a member of Lal Bahadur Shastri's cabinet as Minister of Information and Broadcasting. In the Congress Party's parliamentary leadership election held in early 1966 (upon the death of Shastri), she defeated her rival Morarji Desai to become leader, and thus succeeded Shastri, after his death, as Prime Minister of India. As prime minister, Gandhi was known for her political intransigency and unprecedented centralisation of power. She went to war with Pakistan in support of the independence movement and war of independence in East Pakistan, which resulted in an Indian victory and the creation of Bangladesh, as well as increasing India's influence to the point where it became the sole regional power of South Asia. Citing separatist tendencies, and in response to a call for revolution, Gandhi instituted a state of emergency from 1975 to 1977 where basic civil liberties were suspended and the press was censored. Widespread atrocities were carried out during the emergency. In 1980, she returned to power after free and fair elections. After Gandhi ordered military action in the Golden Temple in Operation Blue Star, her own bodyguards and Sikh nationalists assassinated her on 31 October 1984. In 1999, Indira Gandhi was named "Woman of the Millennium" in an online poll organised by the BBC. In 2020, Gandhi was named by Time magazine among the world's 100 powerful women who defined the last century. Early life and career Indira Gandhi was born Indira Nehru, into a Kashmiri Pandit family on 19 November 1917 in Allahabad. Her father, Jawaharlal Nehru, was a leading figure in the movement for independence from British rule, and became the first Prime Minister of the Dominion (and later Republic) of India. She was the only child (she had a younger brother who died young), and grew up with her mother, Kamala Nehru, at the Anand Bhavan, a large family estate in Allahabad. She had a lonely and unhappy childhood. Her father was often away, directing political activities or incarcerated, while her mother was frequently bedridden with illness, and later suffered an early death from tuberculosis. She had limited contact with her father, mostly through letters. Indira was taught mostly at home by tutors and attended school intermittently until matriculation in 1934. She was a student at the Modern School in Delhi, St Cecilia's and St Mary's Christian convent schools in Allahabad, the International School of Geneva, the Ecole Nouvelle in Bex, and the Pupils' Own School in Poona and Bombay, which is affiliated with the University of Mumbai. She and her mother Kamala moved to the Belur Math headquarters of the Ramakrishna Mission where Swami Ranganathananda was her guardian. She went on to study at the Vishwa Bharati in Santiniketan, which became Visva-Bharati University in 1951. It was during her interview with him that Rabindranath Tagore named her Priyadarshini, literally "looking at everything with kindness" in Sanskrit, and she came to be known as Indira Priyadarshini Nehru. A year later, however, she had to leave university to attend to her ailing mother in Europe. There it was decided that Indira would continue her education at the University of Oxford. After her mother died, she attended the Badminton School for a brief period before enrolling at Somerville College in 1937 to study history. Indira had to take the entrance examination twice, having failed at her first attempt with a poor performance in Latin. At Oxford, she did well in history, political science and economics, but her grades in Latin—a compulsory subject—remained poor. Indira did, however, have an active part within the student life of the university, such as membership in the Oxford Majlis Asian Society. During her time in Europe, Indira was plagued with ill-health and was constantly attended to by doctors. She had to make repeated trips to Switzerland to recover, disrupting her studies. She was being treated there in 1940, when Germany rapidly conquered Europe. Indira tried to return to England through Portugal but was left stranded for nearly two months. She managed to enter England in early 1941, and from there returned to India without completing her studies at Oxford. The university later awarded her an honorary degree. In 2010, Oxford honoured her further by selecting her as one of the ten Oxasians, illustrious Asian graduates from the University of Oxford. During her stay in Britain, Indira frequently met her future husband Feroze Gandhi (no relation to Mahatma Gandhi), whom she knew from Allahabad, and who was studying at the London School of Economics. Their marriage took place in Allahabad according to Adi Dharm rituals, though Feroze belonged to a Zoroastrian Parsi family of Gujarat. The couple had two sons, Rajiv Gandhi (born 1944) and Sanjay Gandhi (born 1946). In the 1950s, Indira, now Mrs. Indira Gandhi after her marriage, served her father unofficially as a personal assistant during his tenure as the first prime minister of India. Towards the end of the 1950s, Gandhi served as the President of the Congress. In that capacity, she was instrumental in getting the Communist led Kerala State Government dismissed in 1959. That government had the distinction of being India's first-ever elected Communist Government. After her father's death in 1964 she was appointed a member of the Rajya Sabha (upper house) and served in Prime Minister Lal Bahadur Shastri's cabinet as Minister of Information and Broadcasting. In January 1966, after Shastri's death, the Congress legislative party elected her over Morarji Desai as their leader. Congress party veteran K. Kamaraj was instrumental in Gandhi achieving victory. Because she was a woman, other political leaders in India saw Gandhi as weak and hoped to use her as a puppet once elected: Congress President Kamaraj orchestrated Mrs. Gandhi's selection as prime minister because he perceived her to be weak enough that he and the other regional party bosses could control her, and yet strong enough to beat Desai [her political opponent] in a party election because of the high regard for her father ... a woman would be an ideal tool for the Syndicate. First term as prime minister between 1966 and 1977 Gandhi's first eleven years serving as prime minister saw her evolve from the perception of Congress party leaders as their puppet, to a strong leader with the iron resolve to split the party over her policy positions, or to go to war with Pakistan to liberate Bangladesh. At the end of 1977, she was such a dominating figure in Indian politics that Congress party president D. K. Barooah had coined the phrase "India is Indira and Indira is India." First year Gandhi formed her government with Morarji Desai as deputy prime minister and finance minister. At the beginning of her first term as prime minister, she was widely criticised by the media and the opposition as a "Goongi goodiya" (Hindi for a "dumb doll" or "puppet") of the Congress party bosses who had orchestrated her election and then tried to constrain her. 1967–1971 The first electoral test for Gandhi was the 1967 general elections for the Lok Sabha and state assemblies. The Congress Party won a reduced majority in the Lok Sabha after these elections owing to widespread disenchantment over the rising prices of commodities, unemployment, economic stagnation and a food crisis. Gandhi was elected to the Lok Sabha from the Raebareli constituency. She had a rocky start after agreeing to devalue the rupee which created hardship for Indian businesses and consumers. The importation of wheat from the United States fell through due to political disputes. For the first time, the party also lost power or lost its majority in a number of states across the country. Following the 1967 elections, Gandhi gradually began to move towards socialist policies. In 1969, she fell out with senior Congress party leaders over several issues. Chief among them was her decision to support V. V. Giri, the independent candidate rather than the official Congress party candidate Neelam Sanjiva Reddy for the vacant position of president of India. The other was the announcement by the prime minister of Bank nationalisation without consulting the finance minister, Morarji Desai. These steps culminated in party president S. Nijalingappa expelling her from the party for indiscipline. Gandhi, in turn, floated her own faction of the Congress party and managed to retain most of the Congress MPs on her side with only 65 on the side of the Congress (O) faction. The Gandhi faction, called Congress (R), lost its majority in the parliament but remained in power with the support of regional parties such as DMK. The policies of the Congress under Gandhi, before the 1971 elections, also included proposals for the abolition of the Privy Purse to former rulers of the princely states and the 1969 nationalization of the fourteen largest banks in India. 1971–1977 Garibi Hatao (Eradicate Poverty) was the resonant theme for Gandhi's 1971 political bid. The slogan was developed in response to the combined opposition alliance's use of the two word manifesto—"Indira Hatao" (Remove Indira). The Garibi Hatao slogan and the proposed anti-poverty programs that came with it were designed to give Gandhi independent national support, based on the rural and urban poor. This would allow her to bypass the dominant rural castes both in and of state and local governments as well as the urban commercial class. For their part, the previously voiceless poor would at last gain both political worth and political weight. The programs created through Garibi Hatao, though carried out locally, were funded and developed by the Central Government in New Delhi. The program was supervised and staffed by the Indian National Congress party. "These programs also provided the central political leadership with new and vast patronage resources to be disbursed ... throughout the country." Gandhi's biggest achievement following the 1971 election came in December 1971 with India's decisive victory over Pakistan in the Indo-Pakistani War that occurred in the last two weeks of the Bangladesh Liberation War, which led to the formation of independent Bangladesh. She was said to be hailed as Goddess Durga by opposition leader Atal Bihari Vajpayee at the time. In the elections held for State assemblies across India in March 1972, the Congress (R) swept to power in most states riding on the post-war "Indira wave". Despite the victory against Pakistan, the Congress government faced numerous problems during this term. Some of these were due to high inflation which in turn was caused by wartime expenses, drought in some parts of the country and, more importantly, the 1973 oil crisis. Opposition to her in the 1973–75 period, after the Gandhi wave had receded, was strongest in the states of Bihar and Gujarat. In Bihar, Jayaprakash Narayan, the veteran leader came out of retirement to lead the protest movement there. Verdict on electoral malpractice On 12 June 1975, the Allahabad High Court declared Indira Gandhi's election to the Lok Sabha in 1971 void on the grounds of electoral malpractice. In an election petition filed by her 1971 opponent, Raj Narain (who later defeated her in the 1977 parliamentary election running in the Raebareli constituency), alleged several major as well as minor instances of the use of government resources for campaigning. Gandhi had asked one of her colleagues in government, Ashoke Kumar Sen, to defend her in court. She gave evidence in her defence during the trial. After almost four years, the court found her guilty of dishonest election practices, excessive election expenditure, and of using government machinery and officials for party purposes. The judge, however, rejected the more serious charges of bribery, laid against her in the case. The court ordered her stripped of her parliamentary seat and banned her from running for any office for six years. As the constitution requires that the Prime Minister must be a member of either the Lok Sabha or the Rajya Sabha, the two houses of the Parliament of India, she was effectively removed from office. However, Gandhi rejected calls to resign. She announced plans to appeal to the Supreme Court and insisted that the conviction did not undermine her position. She said: "There is a lot of talk about our government not being clean, but from our experience the situation was very much worse when [opposition] parties were forming governments." And she dismissed criticism of the way her Congress Party raised election campaign money, saying all parties used the same methods. The prime minister retained the support of her party, which issued a statement backing her. After news of the verdict spread, hundreds of supporters demonstrated outside her house, pledging their loyalty. Indian High Commissioner to the United Kingdom Braj Kumar Nehru said Gandhi's conviction would not harm her political career. "Mrs Gandhi has still today overwhelming support in the country," he said. "I believe the prime minister of India will continue in office until the electorate of India decides otherwise". State of Emergency (1975–1977) Gandhi moved to restore order by ordering the arrest of most of the opposition participating in the unrest. Her Cabinet and government then recommended that President Fakhruddin Ali Ahmed declare a state of emergency because of the disorder and lawlessness following the Allahabad High Court decision. Accordingly, Ahmed declared a State of Emergency caused by internal disorder, based on the provisions of Article 352(1) of the Constitution, on 25 June 1975. Rule by decree Within a few months, President's rule was imposed on the two opposition party ruled states of Gujarat and Tamil Nadu thereby bringing the entire country under direct Central rule or by governments led by the ruling Congress party. Police were granted powers to impose curfews and detain citizens indefinitely; all publications were subjected to substantial censorship by the Ministry of Information and Broadcasting. Finally, the impending legislative assembly elections were postponed indefinitely, with all opposition-controlled state governments being removed by virtue of the constitutional provision allowing for a dismissal of a state government on the recommendation of the state's governor. Indira Gandhi used the emergency provisions to change conflicting party members: President Ahmed issued ordinances that did not require debate in the Parliament, allowing Gandhi to rule by decree. Rise of Sanjay The Emergency saw the entry of Gandhi's younger son, Sanjay Gandhi, into Indian politics. He wielded tremendous power during the emergency without holding any government office. According to Mark Tully, "His inexperience did not stop him from using the Draconian powers his mother, Indira Gandhi, had taken to terrorise the administration, setting up what was in effect a police state." It was said that during the Emergency he virtually ran India along with his friends, especially Bansi Lal. It was also quipped that Sanjay Gandhi had total control over his mother and that the government was run by the PMH (Prime Minister House) rather than the PMO (Prime Minister Office). 1977 election and opposition years In 1977, after extending the state of emergency twice, Gandhi called elections to give the electorate a chance to vindicate her rule. She may have grossly misjudged her popularity by reading what the heavily censored press wrote about her. She was opposed by the Janata alliance of Opposition parties. The alliance was made up of Bharatiya Jana Sangh, Congress (O), The Socialist parties, and Charan Singh's Bharatiya Kranti Dal representing northern peasants and farmers. The Janata alliance, with Jai Prakash Narayan as its spiritual guide, claimed the elections were the last chance for India to choose between "democracy and dictatorship". The Congress Party split during the election campaign of 1977: veteran Gandhi supporters like Jagjivan Ram, Hemvati Nandan Bahuguna and Nandini Satpathy were compelled to part ways and form a new political entity, the CFD (Congress for Democracy), due primarily to intra-party politicking and the circumstances created by Sanjay Gandhi. The prevailing rumour was that he intended to dislodge Gandhi, and the trio stood to prevent that. Gandhi's Congress party was soundly crushed in the elections. The Janata Party's democracy or dictatorship claim seemed to resonate with the public. Gandhi and Sanjay Gandhi lost their seats, and Congress was reduced to 153 seats (compared with 350 in the previous Lok Sabha), 92 of which were in the South. The Janata alliance, under the leadership of Morarji Desai, came to power after the State of Emergency was lifted. The alliance parties later merged to form the Janata Party under the guidance of Gandhian leader, Jayaprakash Narayan. The other leaders of the Janata Party were Charan Singh, Raj Narain, George Fernandes and Atal Bihari Vajpayee. In opposition and return to power Since Gandhi had lost her seat in the election, the defeated Congress party appointed Yashwantrao Chavan as their parliamentary party leader. Soon afterwards, the Congress party split again with Gandhi floating her own Congress faction. She won a by-election in the Chikmagalur Constituency and took a seat in the Lok Sabha in November 1978 after the Janata Party's attempts to have Kannada matinee idol Rajkumar run against her failed when he refused to contest the election saying he wanted to remain apolitical. However, the Janata government's home minister, Choudhary Charan Singh, ordered her arrest along with Sanjay Gandhi on several charges, none of which would be easy to prove in an Indian court. The arrest meant that Gandhi was automatically expelled from Parliament. These allegations included that she "had planned or thought of killing all opposition leaders in jail during the Emergency". However, this strategy backfired disastrously. In response to her arrest, Gandhi's supporters hijacked an Indian Airlines jet and demanded her immediate release. Her arrest and long-running trial gained her sympathy from many people. The Janata coalition was only united by its hatred of Gandhi (or "that woman" as some called her). The party included right wing Hindu Nationalists, Socialists and former Congress party members. With so little in common, the Morarji Desai government was bogged down by infighting. In 1979, the government began to unravel over the issue of the dual loyalties of some members to Janata and the Rashtriya Swayamsevak Sangh (RSS)—the Hindu nationalist, paramilitary organisation. The ambitious Union finance minister, Charan Singh, who as the Union home minister during the previous year had ordered the Gandhi's' arrests, took advantage of this and started courting the Congress. After a significant exodus from the party to Singh's faction, Desai resigned in July 1979. Singh was appointed prime minister, by President Reddy, after Gandhi and Sanjay Gandhi promised Singh that Congress would support his government from outside on certain conditions. The conditions included dropping all charges against Gandhi and Sanjay. Since Singh refused to drop them, Congress withdrew its support and President Reddy dissolved Parliament in August 1979. Before the 1980 elections Gandhi approached the then Shahi Imam of Jama Masjid, Syed Abdullah Bukhari and entered into an agreement with him on the basis of 10-point programme to secure the support of the Muslim votes. In the elections held in January, Congress returned to power with a landslide majority. 1980 elections and third term The Congress Party under Gandhi swept back into power in January 1980. In this election, Gandhi was elected by the voters of the Medak constituency. On 23 June, Sanjay was killed in a plane crash while performing an aerobatic manoeuvre in New Delhi. In 1980, as a tribute to her son's dream of launching an indigenously manufactured car, Gandhi nationalized Sanjay's debt ridden company, Maruti Udyog, for Rs. 43,000,000 (4.34 crore) and invited joint venture bids from automobile companies around the world. Suzuki of Japan was selected as the partner. The company launched its first Indian manufactured car in 1984. By the time of Sanjay's death, Gandhi trusted only family members, and therefore persuaded her reluctant son, Rajiv, to enter politics. Her PMO office staff included H.Y.Sharada Prasad as her information adviser and speechwriter. Operation Blue Star Following the 1977 elections, a coalition led by the Sikh-majority Akali Dal came to power in the northern Indian state of Punjab. In an effort to split the Akali Dal and gain popular support among the Sikhs, Gandhi's Congress Party helped to bring the orthodox religious leader Jarnail Singh Bhindranwale to prominence in Punjab politics. Later, Bhindranwale's organisation, Damdami Taksal, became embroiled in violence with another religious sect called the Sant Nirankari Mission, and he was accused of instigating the murder of Jagat Narain, the owner of the Punjab Kesari newspaper. After being arrested over this matter, Bhindranwale disassociated himself from the Congress Party and joined Akali Dal. In July 1982, he led the campaign for the implementation of the Anandpur Resolution, which demanded greater autonomy for the Sikh-majority state. Meanwhile, a small group of Sikhs, including some of Bhindranwale's followers, turned to militancy after being targeted by government officials and police for supporting the Anandpur Resolution. In 1982, Bhindranwale and approximately 200 armed followers moved into a guest house called the Guru Nanak Niwas near the Golden Temple. By 1983, the Temple complex had become a fort for many militants. The Statesman later reported that light machine guns and semi-automatic rifles were known to have been brought into the compound. On 23 April 1983, the Punjab Police Deputy Inspector General A. S. Atwal was shot dead as he left the Temple compound. The following day, Harchand Singh Longowal (then president of Shiromani Akali Dal) confirmed the involvement of Bhindranwale in the murder. After several futile negotiations, in June 1984, Gandhi ordered the Indian army to enter the Golden Temple to remove Bhindranwale and his supporters from the complex. The army used heavy artillery, including tanks, in the action code-named Operation Blue Star. The operation badly damaged or destroyed parts of the Temple complex, including the Akal Takht shrine and the Sikh library. It also led to the deaths of many Sikh fighters and innocent pilgrims. The number of casualties remains disputed with estimates ranging from many hundreds to many thousands. Gandhi was accused of using the attack for political ends. Harjinder Singh Dilgeer stated that she attacked the temple complex to present herself as a great hero in order to win the general elections planned towards the end of 1984. There was fierce criticism of the action by Sikhs in India and overseas. There were also incidents of mutiny by Sikh soldiers in the aftermath of the attack. Assassination On 31 October 1984, two of Gandhi's Sikh bodyguards, Satwant Singh and Beant Singh, shot her with their service weapons in the garden of the prime minister's residence at 1 Safdarjung Road, New Delhi, allegedly in revenge for Operation Blue Star. The shooting occurred as she was walking past a wicket gate guarded by the two men. She was to be interviewed by the British filmmaker Peter Ustinov, who was filming a documentary for Irish television. Beant shot her three times using his side-arm; Satwant fired 30 rounds. The men dropped their weapons and surrendered. Afterwards, they were taken away by other guards into a closed room where Beant was shot dead. Kehar Singh was later arrested for conspiracy in the attack. Both Satwant and Kehar were sentenced to death and hanged in Delhi's Tihar Jail. Gandhi was taken to the All India Institutes of Medical Sciences at 9:30 AM where doctors operated on her. She was declared dead at 2:20 PM. The post-mortem examination was conducted by a team of doctors headed by Tirath Das Dogra. Dogra stated that Gandhi had sustained as many as 30 bullet wounds, from two sources: a Sten submachine gun and a .38 Special revolver. The assailants had fired 31 bullets at her, of which 30 hit her; 23 had passed through her body while seven remained inside her. Dogra extracted bullets to establish the make of the weapons used and to match each weapon with the bullets recovered by ballistic examination. The bullets were matched with their respective weapons at the Central Forensic Science Laboratory (CFSL) Delhi. Subsequently, Dogra appeared in Shri Mahesh Chandra's court as an expert witness (PW-5); his testimony took several sessions. The cross examination was conducted by Shri Pran Nath Lekhi, the defence counsel. Salma Sultan provided the first news of her assassination on Doordarshan's evening news on 31 October 1984, more than 10 hours after she was shot. Gandhi was cremated in accordance with Hindu tradition on 3 November near Raj Ghat. The site where she was cremated is known today as Shakti Sthal. In order to pay homage, Gandhi's body lay in state at Teen Murti House. Thousands of followers strained for a glimpse of the cremation. Her funeral was televised live on domestic and international stations, including the BBC. After her death, the Parade Ground was converted to the Indira Gandhi Park which was inaugurated by her son, Rajiv Gandhi. Gandhi's assassination dramatically changed the political landscape. Rajiv succeeded his mother as Prime Minister within hours of her murder and anti-Sikh riots erupted, lasting for several days and killing more than 3,000 Sikhs in New Delhi and an estimated 8,000 across India. Many Congress leaders were believed to be behind the anti-Sikh massacre. International reaction Gandhi's death was mourned worldwide. World leaders condemned the assassination and said her death would leave a 'big emptiness' in international affairs. In Moscow, Soviet President Konstantin Chernenko sent condolences stating, "The Soviet people learned with pain and sorrow about the untimely death in a villainous assassination of the glorious daughter of the great Indian people, a fiery fighter for peace and security of peoples and a great friend of the Soviet Union". President Ronald Reagan, along with secretary of state George Shultz, visited the Indian Embassy to sign a book of condolences and expressed his 'shock, revulsion, and grief' over the assassination. 42nd vice president of the United States Walter Mondale called Gandhi 'a great leader of a great democracy' and deplored 'this shocking act of violence'. Asian, African and European leaders mourned Gandhi as a great champion of democracy and leader of the Non-Aligned Movement expressed its 'deepest grief' and called the killing a 'terrorist' act. South Korean President Chun Doo-hwan, said Gandhi's death meant the 'loss of a great leader to the whole world.' Yugoslav President Veselin Đuranović, Pakistani President Mohammad Zia ul-Haq, Italian President Sandro Pertini, Pope John Paul II at the Vatican, French President Francois Mitterrand condemned the killing. At the United Nations, the General Assembly paused in its work as shocked delegates mourned the death. Assembly President Paul Lusaka of Zambia postponed a scheduled debate and hastily organized a memorial meeting. Foreign relations Gandhi is remembered for her ability to effectively promote Indian foreign policy measures. South Asia In early 1971, disputed elections in Pakistan led then East Pakistan to declare independence as Bangladesh. Repression and violence by the Pakistani army led to 10 million refugees crossing the border into India over the following months. Finally, in December 1971, Gandhi intervened directly in the conflict to liberate Bangladesh. India emerged victorious following the war with Pakistan to become the dominant power of South Asia. India had signed a treaty with the Soviet Union promising mutual assistance in the case of war, while Pakistan received active support from the United States during the conflict. U.S. President Richard Nixon disliked Gandhi personally, referring to her as a "bitch" and a "clever fox" in his private communication with Secretary of State Henry Kissinger. Nixon later wrote of the war: "[Gandhi] suckered [America]. Suckered us ... this woman suckered us." Relations with the U.S. became distant as Gandhi developed closer ties with the Soviet Union after the war. The latter grew to become India's largest trading partner and its biggest arms supplier for much of Gandhi's premiership. India's new hegemonic position, as articulated under the "Indira Doctrine", led to attempts to bring the Himalayan states under India's sphere of influence. Nepal and Bhutan remained aligned with India, while in 1975, after years of building up support, Gandhi incorporated Sikkim into India, after a referendum in which a majority of Sikkimese voted to join India. This was denounced as a "despicable act" by China. India maintained close ties with neighbouring Bangladesh (formerly East Pakistan) following the Liberation War. Prime Minister Sheikh Mujibur Rahman recognised Gandhi's contributions to the independence of Bangladesh. However, Mujibur Rahman's pro-India policies antagonised many in Bangladeshi politics and the military, which feared that Bangladesh had become a client state of India. The Assassination of Mujibur Rahman in 1975 led to the establishment of Islamist military regimes that sought to distance the country from India. Gandhi's relationship with the military regimes was strained because of her alleged support of anti-Islamist leftist guerrilla forces in Bangladesh. Generally, however, there was a rapprochement between Gandhi and the Bangladeshi regimes, although issues such as border disputes and the Farakka Dam remained an irritant to bilateral ties. In 2011, the Government of Bangladesh conferred its highest state award for non-nationals, the Bangladesh Freedom Honour posthumously on Gandhi for her "outstanding contribution" to the country's independence. Gandhi's approach to dealing with Sri Lanka's ethnic problems was initially accommodating. She enjoyed cordial relations with Prime Minister Sirimavo Bandaranaike. In 1974, India ceded the tiny islet of Katchatheevu to Sri Lanka to save Bandaranaike's socialist government from a political disaster. However, relations soured over Sri Lanka's movement away from socialism under J. R. Jayewardene, whom Gandhi despised as a "western puppet". India under Gandhi was alleged to have supported the Liberation Tigers of Tamil Eelam (LTTE) militants in the 1980s to put pressure on Jayewardene to abide by Indian interests. Nevertheless, Gandhi rejected demands to invade Sri Lanka in the aftermath of Black July 1983, an anti-Tamil pogrom carried out by Sinhalese mobs. Gandhi made a statement emphasising that she stood for the territorial integrity of Sri Lanka, although she also stated that India cannot "remain a silent spectator to any injustice done to the Tamil community." India's relationship with Pakistan remained strained following the Shimla Accord in 1972. Gandhi's authorisation of the detonation of a nuclear device at Pokhran in 1974 was viewed by Pakistani leader Zulfikar Ali Bhutto as an attempt to intimidate Pakistan into accepting India's hegemony in the subcontinent. However, in May 1976, Gandhi and Bhutto both agreed to reopen diplomatic establishments and normalise relations. Following the rise to power of General Muhammad Zia-ul-Haq in Pakistan in 1978, India's relations with its neighbour reached a nadir. Gandhi accused General Zia of supporting Khalistani militants in Punjab. Military hostilities recommenced in 1984 following Gandhi's authorisation of Operation Meghdoot. India was victorious in the resulting Siachen conflict against Pakistan. In order to keep the Soviet Union and the United States out of South Asia, Gandhi was instrumental in establishing the South Asian Association for Regional Cooperation (SAARC) in 1983 Middle East Gandhi remained a staunch supporter of the Palestinians in the Arab–Israeli conflict and was critical of the Middle East diplomacy sponsored by the United States. Israel was viewed as a religious state, and thus an analogue to India's archrival Pakistan. Indian diplomats hoped to win Arab support in countering Pakistan in Kashmir. Nevertheless, Gandhi authorised the development of a secret channel of contact and security assistance with Israel in the late 1960s. Her lieutenant, P. V. Narasimha Rao, later became prime minister and approved full diplomatic ties with Israel in 1992. India's pro-Arab policy had mixed success. Establishment of close ties with the socialist and secular Baathist regimes to some extent neutralised Pakistani propaganda against India. However, the Indo-Pakistani War of 1971 presented a dilemma for the Arab and Muslim states of the Middle East as the war was fought by two states both friendly to the Arabs. The progressive Arab regimes in Egypt, Syria, and Algeria chose to remain neutral, while the conservative pro-American Arab monarchies in Jordan, Saudi Arabia, Kuwait, and United Arab Emirates openly supported Pakistan. Egypt's stance was met with dismay by the Indians, who had come to expect close co-operation with the Baathist regimes. But, the death of Nasser in 1970 and Sadat's growing friendship with Riyadh, and his mounting differences with Moscow, constrained Egypt to a policy of neutrality. Gandhi's overtures to Muammar Gaddafi were rebuffed. Libya agreed with the Arab monarchies in believing that Gandhi's intervention in East Pakistan was an attack against Islam. The 1971 war became a temporary stumbling block in growing Indo-Iranian ties. Although Iran had earlier characterized the Indo-Pakistani war in 1965 as Indian aggression, the Shah had launched an effort at rapprochement with India in 1969 as part of his effort to secure support for a larger Iranian role in the Persian Gulf. Gandhi's tilt towards Moscow and her dismemberment of Pakistan was perceived by the Shah as part of a larger anti-Iran conspiracy involving India, Iraq, and the Soviet Union. Nevertheless, Iran had resisted Pakistani pressure to activate the Baghdad Pact and draw the Central Treaty Organisation (CENTO) into the conflict. Gradually, Indian and Iranian disillusionment with their respective regional allies led to a renewed partnership between the nations. Gandhi was unhappy with the lack of support from India's Arab allies during the war with Pakistan, while the Shah was apprehensive at the growing friendship between Pakistan and Arab states of the Persian Gulf, especially Saudi Arabia, and the growing influence of Islam in Pakistani society. There was an increase in Indian economic and military co-operation with Iran during the 1970s. The 1974 India-Iranian agreement led to Iran supplying nearly 75 percent of India's crude oil demands. Gandhi appreciated the Shah's disregard of Pan-Islamism in diplomacy. Asia-Pacific One of the major developments in Southeast Asia during Gandhi's premiership was the formation of the Association of Southeast Asian Nations (ASEAN) in 1967. Relations between ASEAN and India were mutually antagonistic. India perceived ASEAN to be linked to the Southeast Asia Treaty Organization (SEATO) and, therefore, it was seen as a pro-American organisation. On their part, the ASEAN nations were unhappy with Gandhi's sympathy for the Viet Cong and India's strong links with the USSR. Furthermore, they were also apprehensions in the region about Gandhi's plans, particularly after India played a big role in breaking up Pakistan and facilitating the emergence of Bangladesh as a sovereign country in 1971. India's entry into the nuclear weapons club in 1974 also contributed to tensions in Southeast Asia. Relations only began to improve following Gandhi's endorsement of the ZOPFAN declaration and the disintegration of the SEATO alliance in the aftermath of Pakistani and American defeats in the region. Nevertheless, Gandhi's close relations with reunified Vietnam and her decision to recognize the Vietnam-installed Government of Cambodia in 1980 meant that India and ASEAN were unable to develop a viable partnership. On 26 September 1981, Gandhi was conferred with the honorary degree of Doctor at the Laucala Graduation at the University of the South Pacific in Fiji. Africa Although independent India was initially viewed as a champion of various African independence movements, its cordial relationship with the Commonwealth of Nations and its liberal views of British policies in East Africa had harmed its image as a staunch supporter of various independence movements in the third world. Indian condemnation of militant struggles in Kenya and Algeria was in sharp contrast to China, who had supported armed struggle to win African independence. After reaching a high diplomatic point in the aftermath of Nehru's role in the Suez Crisis, India's isolation from Africa was complete when only four nations—Ethiopia, Kenya, Nigeria and Libya—supported her during the Sino-Indian War in 1962. After Gandhi became prime minister, diplomatic and economic relations with the states which had sided with India during the Sino-Indian War were expanded. Gandhi began negotiations with the Kenyan government to establish the Africa-India Development Cooperation. The Indian government also started considering the possibility of bringing Indians settled in Africa within the framework of its policy goals to help recover its declining geo-strategic influence. Gandhi declared the people of Indian origin settled in Africa as "Ambassadors of India". Efforts to rope in the Asian community to join Indian diplomacy, however, came to naught, in part because of the unwillingness of Indians to remain in politically insecure surroundings, and because of the exodus of African Indians to Britain with the passing of the Commonwealth Immigrants Act in 1968. In Uganda, the African Indian community suffered persecution and eventually expulsion under the government of Idi Amin. Foreign and domestic policy successes in the 1970s enabled Gandhi to rebuild India's image in the eyes of African states. Victory over Pakistan and India's possession of nuclear weapons showed the degree of India's progress. Furthermore, the conclusion of the Indo-Soviet treaty in 1971, and threatening gestures by the United States, to send its nuclear armed Task Force 74 into the Bay of Bengal at the height of the East Pakistan crisis had enabled India to regain its anti-imperialist image. Gandhi firmly tied Indian anti-imperialist interests in Africa to those of the Soviet Union. Unlike Nehru, she openly and enthusiastically supported liberation struggles in Africa. At the same time, Chinese influence in Africa had declined owing to its incessant quarrels with the Soviet Union. These developments permanently halted India's decline in Africa and helped to reestablish its geo-strategic presence. The Commonwealth The Commonwealth is a voluntary association of mainly former British colonies. India maintained cordial relations with most of the members during Gandhi's time in power. In the 1980s, she, along with Canadian prime minister Pierre Trudeau, Zambia's president Kenneth Kaunda, Australian prime minister Malcolm Fraser and Singapore prime minister Lee Kuan Yew was regarded as one of the pillars of the Commonwealth. India under Gandhi also hosted the 1983 Commonwealth Heads of Government summit in New Delhi. Gandhi used these meetings as a forum to put pressure on member countries to cut economic, sports, and cultural ties with Apartheid South Africa. The Non-aligned Movement In the early 1980s under Gandhi, India attempted to reassert its prominent role in the Non-Aligned Movement by focusing on the relationship between disarmament and economic development. By appealing to the economic grievances of developing countries, Gandhi and her successors exercised a moderating influence on the Non-aligned movement, diverting it from some of the Cold War issues that marred the controversial 1979 Havana meeting where Cuban leader Fidel Castro attempted to steer the movement towards the Soviet Union. Although hosting the 1983 summit at Delhi boosted Indian prestige within the movement, its close relations with the Soviet Union and its pro-Soviet positions on Afghanistan and Cambodia limited its influence. Western Europe Gandhi spent a number of years in Europe during her youth and had formed many friendships there. During her premiership she formed friendships with many leaders such as West German chancellor, Willy Brandt and Austrian chancellor Bruno Kreisky. She also enjoyed a close working relationship with many British leaders including conservative premiers, Edward Heath and Margaret Thatcher. Soviet Union and Eastern block countries The relationship between India and the Soviet Union deepened during Gandhi's rule. The main reason was the perceived bias of the United States and China, rivals of the USSR, towards Pakistan. The support of the Soviets with arms supplies and the casting of a veto at the United Nations helped in winning and consolidating the victory over Pakistan in the 1971 Bangladesh liberation war. Before the war, Gandhi signed a treaty of friendship with the Soviets. They were unhappy with the 1974 nuclear test conducted by India but did not support further action because of the ensuing Cold War with the United States. Gandhi was unhappy with the Soviet invasion of Afghanistan, but once again calculations involving relations with Pakistan and China kept her from criticising the Soviet Union harshly. The Soviets became the main arms supplier during the Gandhi years by offering cheap credit and transactions in rupees rather than in dollars. The easy trade deals also applied to non-military goods. Under Gandhi, by the early 1980s, the Soviets had become India's largest trading partner. United States When Gandhi came to power in 1966, Lyndon Johnson was the US president. At the time, India was reliant on the US for food aid. Gandhi resented the US policy of food aid being used as a tool to force India to adopt policies favoured by the US. She also resolutely refused to sign the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). Relations with the US were strained badly under President Richard Nixon and his favouring of Pakistan during the Bangladesh liberation war. Nixon despised Gandhi politically and personally. In 1981, Gandhi met President Ronald Reagan for the first time at the North–South Summit held to discuss global poverty. She had been described to him as an 'Ogre', but he found her charming and easy to work with and they formed a close working relationship during her premiership in the 1980s. Economic policy Gandhi presided over three Five-Year Plans as prime minister, two of which succeeded in meeting their targeted growth. There is considerable debate whether Gandhi was a socialist on principle or out of political expediency. Sunanda K. Datta-Ray described her as "a master of rhetoric ... often more posture than policy", while The Times journalist, Peter Hazelhurst, famously quipped that Gandhi's socialism was "slightly left of self-interest." Critics have focused on the contradictions in the evolution of her stance towards communism. Gandhi was known for her anti-communist stance in the 1950s, with Meghnad Desai even describing her as "the scourge of [India's] Communist Party." Yet, she later forged close relations with Indian communists even while using the army to break the Naxalites. In this context, Gandhi was accused of formulating populist policies to suit her political needs. She was seemingly against the rich and big business while preserving the status quo to manipulate the support of the left in times of political insecurity, such as the late 1960s. Although in time Gandhi came to be viewed as the scourge of the right-wing and reactionary political elements of India, leftist opposition to her policies emerged. As early as 1969, critics had begun accusing her of insincerity and machiavellianism. The Indian Libertarian wrote that: "it would be difficult to find a more machiavellian leftist than Mrs Indira Gandhi ... for here is Machiavelli at its best in the person of a suave, charming and astute politician." J. Barkley Rosser Jr. wrote that "some have even seen the declaration of emergency rule in 1975 as a move to suppress [leftist] dissent against Gandhi's policy shift to the right." In the 1980s, Gandhi was accused of "betraying socialism" after the beginning of Operation Forward, an attempt at economic reform. Nevertheless, others were more convinced of Gandhi's sincerity and devotion to socialism. Pankaj Vohra noted that "even the late prime minister's critics would concede that the maximum number of legislations of social significance was brought about during her tenure ... [and that] she lives in the hearts of millions of Indians who shared her concern for the poor and weaker sections and who supported her politics." In summarising the biographical works on Gandhi, Blema S. Steinberg concludes she was decidedly non-ideological. Only 7.4% (24) of the total 330 biographical extractions posit ideology as a reason for her policy choices. Steinberg notes Gandhi's association with socialism was superficial. She had only a general and traditional commitment to the ideology by way of her political and family ties. Gandhi personally had a fuzzy concept of socialism. In one of the early interviews she gave as prime minister, Gandhi had ruminated: "I suppose you could call me a socialist, but you have understand what we mean by that term ... we used the word [socialism] because it came closest to what we wanted to do here – which is to eradicate poverty. You can call it socialism; but if by using that word we arouse controversy, I don't see why we should use it. I don't believe in words at all." Regardless of the debate over her ideology or lack thereof, Gandhi remains a left-wing icon. She has been described by Hindustan Times columnist, Pankaj Vohra, as "arguably the greatest mass leader of the last century." Her campaign slogan, Garibi Hatao ('Remove Poverty'), has become an often used motto of the Indian National Congress Party. To the rural and urban poor, untouchables, minorities and women in India, Gandhi was "Indira Amma or Mother Indira." Green Revolution and the Fourth Five-Year Plan Gandhi inherited a weak and troubled economy. Fiscal problems associated with the war with Pakistan in 1965, along with a drought-induced food crisis that spawned famines, had plunged India into the sharpest recession since independence. The government responded by taking steps to liberalise the economy and agreeing to the devaluation of the currency in return for the restoration of foreign aid. The economy managed to recover in 1966 and ended up growing at 4.1% over 1966–1969. Much of that growth, however, was offset by the fact that the external aid promised by the United States government and the International Bank for Reconstruction and Development (IBRD), meant to ease the short-run costs of adjustment to a liberalised economy, never materialised. American policy makers had complained of continued restrictions imposed on the economy. At the same time, Indo-US relations were strained because of Gandhi's criticism of the American bombing campaign in Vietnam. While it was thought at the time, and for decades after, that President Johnson's policy of withholding food grain shipments was to coerce Indian support for the war, in fact, it was to offer India rainmaking technology that he wanted to use as a counterweight to China's possession of the atomic bomb. In light of the circumstances, liberalisation became politically suspect and was soon abandoned. Grain diplomacy and currency devaluation became matters of intense national pride in India. After the bitter experience with Johnson, Gandhi decided not to request food aid in the future. Moreover, her government resolved never again to become "so vulnerably dependent" on aid, and painstakingly began building up substantial foreign exchange reserves. When food stocks slumped after poor harvests in 1972, the government made it a point to use foreign exchange to buy US wheat commercially rather than seek resumption of food aid. The period of 1967–75 was characterised by socialist ascendency in India, which culminated in 1976 with the official declaration of state socialism. Gandhi not only abandoned the short-lived liberalisation programme but also aggressively expanded the public sector with new licensing requirements and other restrictions for industry. She began a new course by launching the Fourth Five-Year Plan in 1969. The government targeted growth at 5.7% while stating as its goals, "growth with stability and progressive achievement of self-reliance." The rationale behind the overall plan was Gandhi's Ten-Point Programme of 1967. This had been her first economic policy formulation, six months after coming to office. The programme emphasised greater state control of the economy with the understanding that government control assured greater welfare than private control. Related to this point were a set of policies which were meant to regulate the private sector. By the end of the 1960s, the reversal of the liberalisation process was complete, and India's policies were characterised as "protectionist as ever." To deal with India's food problems, Gandhi expanded the emphasis on production of inputs to agriculture that had already been initiated by her father, Jawaharlal Nehru. The Green Revolution in India subsequently culminated under her government in the 1970s. It transformed the country from a nation heavily reliant on imported grains, and prone to famine, to one largely able to feed itself, and becoming successful in achieving its goal of food security. Gandhi had a personal motive in pursuing agricultural self-sufficiency, having found India's dependency on the U.S. for shipments of grains humiliating. The economic period of 1967–75 became significant for its major wave of nationalisation amidst increased regulation of the private sector. Some other objectives of the economic plan for the period were to provide for the minimum needs of the community through a rural works program and the removal of the privy purses of the nobility. Both these, and many other goals of the 1967 programme, were accomplished by 1974–75. Nevertheless, the success of the overall economic plan was tempered by the fact that annual growth at 3.3–3.4% over 1969–74 fell short of the targeted figure. The Fifth Five-Year Plan The Fifth Five-Year Plan (1974–79) was enacted against the backdrop of the state of emergency and the Twenty Point Program of 1975. It was the economic rationale of the emergency, a political act which has often been justified on economic grounds. In contrast to the reception of Gandhi's earlier economic plan, this one was criticised for being a "hastily thrown together wish list." Gandhi promised to reduce poverty by targeting the consumption levels of the poor and enact wide-ranging social and economic reforms. In addition, the government targeted an annual growth rate of 4.4% over the period of the plan. The measures of the emergency regime was able to halt the economic trouble of the early to mid-1970s, which had been marred by harvest failures, fiscal contraction, and the breakdown of the Bretton Woods system of fixed exchanged rates. The resulting turbulence in the foreign exchange markets was accentuated further by the oil shock of 1973. The government was able to exceed the targeted growth figure with an annual growth rate of 5.0–5.2% over the five-year period of the plan (1974–79). The economy grew at the rate of 9% in 1975–76 alone, and the Fifth Plan, became the first plan during which the per capita income of the economy grew by over 5%. Operation Forward and the Sixth Five-Year Plan Gandhi inherited a weak economy when she became prime minister again in 1980. The preceding year—1979–80—under the Janata Party government saw the strongest recession (−5.2%) in the history of modern India with inflation rampant at 18.2%. Gandhi proceeded to abrogate the Janata Party government's Five-Year Plan in 1980 and launched the Sixth Five-Year Plan (1980–85). Her government targeted an average growth rate of 5.2% over the period of the plan. Measures to check inflation were also taken; by the early 1980s it was under control at an annual rate of about 5%. Although Gandhi continued professing socialist beliefs, the Sixth Five-Year Plan was markedly different from the years of Garibi Hatao. Populist programmes and policies were replaced by pragmatism. There was an emphasis on tightening public expenditures, greater efficiency of the state-owned enterprises (SOE), which Gandhi qualified as a "sad thing", and on stimulating the private sector through deregulation and liberation of the capital market. The government subsequently launched Operation Forward in 1982, the first cautious attempt at reform. The Sixth Plan went on to become the most successful of the Five-Year Plans yet; showing an average growth rate of 5.7% over 1980–85. Inflation and unemployment During Lal Bahadur Shastri's last full year in office (1965), inflation averaged 7.7%, compared to 5.2% at the end of Gandhi's first term in office (1977). On average, inflation in India had remained below 7% through the 1950s and 1960s. It then accelerated sharply in the 1970s, from 5.5% in 1970–71 to over 20% by 1973–74, due to the international oil crisis. Gandhi declared inflation the gravest of problems in 1974 (at 25.2%) and devised a severe anti-inflation program. The government was successful in bringing down inflation during the emergency; achieving negative figures of −1.1% by the end of 1975–76. Gandhi inherited a tattered economy in her second term; harvest failures and a second oil shock in the late 1970s had caused inflation to rise again. During Charan Singh's short time in office in the second half of 1979, inflation averaged 18.2%, compared to 6.5% during Gandhi's last year in office (1984). General economic recovery under Gandhi led to an average inflation rate of 6.5% from 1981–82 to 1985–86—the lowest since the beginning of India's inflation problems in the 1960s. The unemployment rate remained constant at 9% over a nine-year period (1971–80) before declining to 8.3% in 1983. Domestic policy Nationalisation Despite the provisions, control and regulations of the Reserve Bank of India, most banks in India had continued to be owned and operated by private persons. Businessmen who owned the banks were often accused of channeling the deposits into their own companies and ignoring priority sector lending. Furthermore, there was a great resentment against class banking in India, which had left the poor (the majority of the population) unbanked. After becoming prime minister, Gandhi expressed her intention of nationalising the banks to alleviate poverty in a paper titled, "Stray thoughts on Bank Nationalisation". The paper received overwhelming public support. In 1969, Gandhi moved to nationalise fourteen major commercial banks. After this, public sector bank branch deposits increased by approximately 800 percent; advances took a huge jump by 11,000 percent. Nationalisation also resulted in significant growth in the geographic coverage of banks; the number of bank branches rose from 8,200 to over 62,000, most of which were opened in unbanked, rural areas. The nationalisation drive not only helped to increase household savings, but it also provided considerable investments in the informal sector, in small- and medium-sized enterprises, and in agriculture, and contributed significantly to regional development and to the expansion of India's industrial and agricultural base. Jayaprakash Narayan, who became famous for leading the opposition to Gandhi in the 1970s, solidly praised her nationalisation of banks. Having been re-elected in 1971 on a nationalisation platform, Gandhi proceeded to nationalise the coal, steel, copper, refining, cotton textiles, and insurance industries. Most of this was done to protect employment and the interests of organised labour. The remaining private sector industries were placed under strict regulatory control. During the Indo-Pakistani War of 1971, foreign-owned private oil companies had refused to supply fuel to the Indian Navy and the Indian Air Force. In response, Gandhi nationalised some oil companies in 1973. However, major nationalisations also occurred in 1974 and 1976, forming the oil majors. After nationalisation, the oil majors such as the Indian Oil Corporation (IOC), the Hindustan Petroleum Corporation (HPCL) and the Bharat Petroleum Corporation (BPCL) had to keep a minimum stock level of oil, to be supplied to the military when needed. Administration In 1966, Gandhi accepted the demands of the Akalis to reorganise Punjab on linguistic lines. The Hindi-speaking southern half of Punjab became a separate state, Haryana, while the Pahari speaking hilly areas in the northeast were joined to Himachal Pradesh. By doing this she had hoped to ward off the growing political conflict between Hindu and Sikh groups in the region. However, a contentious issue that was considered unresolved by the Akalis was the status of Chandigarh, a prosperous city on the Punjab-Haryana border, which Gandhi declared a union territory to be shared as a capital by both the states. Victory over Pakistan in 1971 consolidated Indian power in Kashmir. Gandhi indicated that she would make no major concessions on Kashmir. The most prominent of the Kashmiri separatists, Sheikh Abdullah, had to recognise India's control over Kashmir in light of the new order in South Asia. The situation was normalised in the years following the war after Abdullah agreed to an accord with Gandhi, by giving up the demand for a plebiscite in return for a special autonomous status for Kashmir. In 1975, Gandhi declared the state of Jammu and Kashmir as a constituent unit of India. The Kashmir conflict remained largely peaceful if frozen under Gandhi's premiership. In 1972, Gandhi granted statehood to Meghalaya, Manipur and Tripura, while the North-East Frontier Agency was declared a union territory and renamed Arunachal Pradesh. The transition to statehood for these territories was successfully overseen by her administration. This was followed by the annexation of Sikkim in 1975. Social reform The principle of equal pay for equal work for both men and women was enshrined in the Indian Constitution under the Gandhi administration. Gandhi questioned the continued existence of a privy purse for former rulers of princely states. She argued the case for abolition based on equal rights for all citizens and the need to reduce the government's revenue deficit. The nobility responded by rallying around the Jana Sangh and other right-wing parties that stood in opposition to Gandhi's attempts to abolish royal privileges. The motion to abolish privy purses, and the official recognition of the titles, was originally brought before the Parliament in 1970. It was passed in the Lok Sabha but fell short of the two-thirds majority in the Rajya Sabha by a single vote. Gandhi responded by having a Presidential proclamation issued; de-recognising the princes; with this withdrawal of recognition, their claims to privy purses were also legally lost. However, the proclamation was struck down by the Supreme Court of India. In 1971, Gandhi again motioned to abolish the privy purse. This time, it was passed successfully as the 26th Amendment to the Constitution of India. Gandhi claimed that only "clear vision, iron will and the strictest discipline" can remove poverty. She justified the imposition of the state of emergency in 1975 in the name of the socialist mission of the Congress. Armed with the power to rule by decree and without constitutional constraints, Gandhi embarked on a massive redistribution program. The provisions included rapid enforcement of land ceilings, housing for landless labourers, the abolition of bonded labour and a moratorium on the debts of the poor. North India was at the centre of the reforms. Millions of hectares of land were acquired and redistributed. The government was also successful in procuring houses for landless labourers; According to Francine Frankel, three-fourths of the targeted four million houses was achieved in 1975 alone. Nevertheless, others have disputed the success of the program and criticised Gandhi for not doing enough to reform land ownership. The political economist, Jyotindra Das Gupta, cryptically questioned "...whether or not the real supporters of land-holders were in jail or in power?" Critics also accused Gandhi of choosing to "talk left and act right", referring to her concurrent pro-business decisions and endeavours. J. Barkley Rosser Jr. wrote that "some have even seen the declaration of emergency rule in 1975 as a move to suppress dissent against Gandhi's policy shift to the right." Regardless of the controversy over the nature of the reforms, the long-term effects of the social changes gave rise to the prominence of middle-ranking farmers from intermediate and lower castes in North India. The rise of these newly empowered social classes challenged the political establishment of the Hindi Belt in the years to come. Language policy Under the 1950 Constitution of India, Hindi was to have become the official national language by 1965. This was unacceptable to many non-Hindi speaking states, which wanted the continued use of English in government. In 1967, Gandhi introduced a constitutional amendment that guaranteed the de facto use of both Hindi and English as official languages. This established the official government policy of bilingualism in India and satisfied the non-Hindi speaking Indian states. Gandhi thus put herself forward as a leader with a pan-Indian vision. Nevertheless, critics alleged that her stance was actually meant to weaken the position of rival Congress leaders from the northern states such as Uttar Pradesh, where there had been strong, sometimes violent, pro-Hindi agitations. Gandhi came out of the language conflicts with the strong support of the south Indian populace. National security In the late 1960s and 1970s, Gandhi had the Indian army crush militant Communist uprisings in the Indian state of West Bengal. The communist insurgency in India was completely suppressed during the state of emergency. Gandhi considered the north-eastern region important, because of its strategic situation. In 1966, the Mizo uprising took place against the government of India and overran almost the whole of the Mizoram region. Gandhi ordered the Indian Army to launch massive retaliatory strikes in response. The rebellion was suppressed with the Indian Air Force carrying out airstrikes in Aizawl; this remains the only instance of India carrying out an airstrike in its own territory. The defeat of Pakistan in 1971 and the secession of East Pakistan as pro-India Bangladesh led to the collapse of the Mizo separatist movement. In 1972, after the less extremist Mizo leaders came to the negotiating table, Gandhi upgraded Mizoram to the status of a union territory. A small-scale insurgency by some militants continued into the late 1970s, but it was successfully dealt with by the government. The Mizo conflict was resolved definitively during the administration of Gandhi's son Rajiv. Today, Mizoram is considered one of the most peaceful states in the north-east. Responding to the insurgency in Nagaland, Gandhi "unleashed a powerful military offensive" in the 1970s. Finally, a massive crackdown on the insurgents took place during the state of emergency ordered by Gandhi. The insurgents soon agreed to surrender and signed the Shillong Accord in 1975. While the agreement was considered a victory for the Indian government and ended large-scale conflicts, there have since been spurts of violence by rebel holdouts and ethnic conflict amongst the tribes. India's nuclear programme Gandhi contributed to, and carried out further, the vision of Jawaharlal Nehru, former premier of India, to develop its nuclear program. Gandhi authorised the development of nuclear weapons in 1967, in response to Test No. 6 by the People's Republic of China. Gandhi saw this test as Chinese nuclear intimidation and promoted Nehru's views to establish India's stability and security interests independent from those of the nuclear superpowers. The programme became fully mature in 1974, when Dr. Raja Ramanna reported to Gandhi that India had the ability to test its first nuclear weapon. Gandhi gave verbal authorisation for this test, and preparations were made in the Indian Army's Pokhran Test Range. In 1974, India successfully conducted an underground nuclear test, unofficially code named "Smiling Buddha", near the desert village of Pokhran in Rajasthan. As the world was quiet about this test, a vehement protest came from Pakistan as its prime minister, Zulfikar Ali Bhutto, described the test as "Indian hegemony" to intimidate Pakistan. In response to this, Bhutto launched a massive campaign to make Pakistan a nuclear power. Bhutto asked the nation to unite and slogans such as "hum ghaas aur pattay kha lay gay magar nuclear power ban k rhe gay" ("We will eat grass or leaves or even go hungry, but we will get nuclear power") were employed. Gandhi directed a letter to Bhutto, and later to the world, claiming the test was for peaceful purposes and part of India's commitment to develop its programme for industrial and scientific use. In spite of intense international criticism and steady decline in foreign investment and trade, the nuclear test was popular domestically. The test caused an immediate revival of Gandhi's popularity, which had flagged considerably from its heights after the 1971 war. The overall popularity and image of the Congress Party was enhanced and the Congress Party was well received in the Indian Parliament. Family, personal life and outlook She married Feroze Gandhi at the age of 25, in 1942. Their marriage lasted 18 years until he died of a heart attack in 1960. They had two sons—Rajiv (b. 1944) and Sanjay (b. 1946). Initially, her younger son Sanjay had been her chosen heir, but after his death in a flying accident in June 1980, Gandhi persuaded her reluctant elder son Rajiv to quit his job as a pilot and enter politics in February 1981. Rajiv took office as prime minister following his mother's assassination in 1984; he served until December 1989. Rajiv Gandhi himself was assassinated by a suicide bomber working on behalf of LTTE on 21 May 1991. Gandhi's yoga guru, Dhirendra Brahmachari, helped her in making certain decisions and also executed certain top level political tasks on her behalf, especially from 1975 to 1977 when Gandhi "declared a state of emergency and suspended civil liberties." Views on women In 1952 in a letter to her American friend Dorothy Norman, Gandhi wrote: "I am in no sense a feminist, but I believe in women being able to do everything ... Given the opportunity to develop, capable Indian women have come to the top at once." While this statement appears paradoxical, it reflects Gandhi's complex feelings toward her gender and feminism. Her egalitarian upbringing with her cousins helped contribute to her sense of natural equality. "Flying kites, climbing trees, playing marbles with her boy cousins, Indira said she hardly knew the difference between a boy and a girl until the age of twelve." Gandhi did not often discuss her gender, but she did involve herself in women's issues before becoming the prime minister. Before her election as prime minister, she became active in the organisational wing of the Congress party, working in part in the Women's Department. In 1956, Gandhi had an active role in setting up the Congress Party's Women's Section. Unsurprisingly, a lot of her involvement stemmed from her father. As an only child, Gandhi naturally stepped into the political light. And, as a woman, she naturally helped head the Women's section of the Congress Party. She often tried to organise women to involve themselves in politics. Although rhetorically Gandhi may have attempted to separate her political success from her gender, Gandhi did involve herself in women's organizations. The political parties in India paid substantial attention to Gandhi's gender before she became prime minister, hoping to use her for political gain. Even though men surrounded Gandhi during her upbringing, she still had a female role model as a child. Several books on Gandhi mention her interest in Joan of Arc. In her own accounts through her letters, she wrote to her friend Dorothy Norman, in 1952 she wrote: "At about eight or nine I was taken to France; Jeanne d'Arc became a great heroine of mine. She was one of the first people I read about with enthusiasm." Another historian recounts Indira's comparison of herself to Joan of Arc: "Indira developed a fascination for Joan of Arc, telling her aunt, 'Someday I am going to lead my people to freedom just as Joan of Arc did'!" Gandhi's linking of herself to Joan of Arc presents a model for historians to assess Gandhi. As one writer said: "The Indian people were her children; members of her family were the only people capable of leading them." Gandhi had been swept up in the call for Indian independence since she was born in 1917. Thus by 1947, she was already well immersed in politics, and by 1966, when she first assumed the position of prime minister, she had held several cabinet positions in her father's office. Gandhi's advocacy for women's rights began with her help in establishing the Congress Party's Women's Section. In 1956, she wrote in a letter: "It is because of this that I am taking a much more active part in politics. I have to do a great deal of touring in order to set up the Congress Party Women's Section, and am on numerous important committees." Gandhi spent a great deal of time throughout the 1950s helping to organise women. She wrote to Norman in 1959, irritable that women had organised around the communist cause but had not mobilised for the Indian cause: "The women, whom I have been trying to organize for years, had always refused to come into politics. Now they are out in the field." Once appointed president in 1959, she "travelled relentlessly, visiting remote parts of the country that had never before received a VIP ... she talked to women, asked about child health and welfare, inquired after the crafts of the region" Gandhi's actions throughout her ascent to power clearly reflect a desire to mobilise women. Gandhi did not see the purpose of feminism. She saw her own success as a woman, and also noted that: "Given the opportunity to develop, capable Indian women have come to the top at once." Gandhi felt guilty about her inability to fully devote her time to her children. She noted that her main problem in office was how to balance her political duties with tending to her children, and "stressed that motherhood was the most important part of her life." At another point, she went into more detail: "To a woman, motherhood is the highest fulfilment ... To bring a new being into this world, to see its perfection and to dream of its future greatness is the most moving of all experiences and fills one with wonder and exaltation." Her domestic initiatives did not necessarily reflect favourably on Indian women. Gandhi did not make a special effort to appoint women to cabinet positions. She did not appoint any women to full cabinet rank during her terms in office. Yet despite this, many women saw Gandhi as a symbol for feminism and an image of women's power. Legacy After leading India to victory against Pakistan in the Bangladesh Liberation War in 1971, President V. V. Giri awarded Gandhi with India's highest civilian honour, the Bharat Ratna. In 2011, the Bangladesh Freedom Honour (Bangladesh Swadhinata Sammanona), Bangladesh's highest civilian award, was posthumously conferred on Gandhi for her "outstanding contributions" to Bangladesh's Liberation War. Gandhi's main legacy was standing firm in the face of American pressure to defeat Pakistan and turn East Pakistan into independent Bangladesh. She was also responsible for India joining the group of countries with nuclear weapons. Despite India being officially part of the Non-Aligned Movement, she gave Indian foreign policy a tilt towards the Soviet bloc. In 1999, Gandhi was named "Woman of the Millennium" in an online poll organised by the BBC. In 2012, she was ranked number seven on Outlook India's poll of the Greatest Indian. Being at the forefront of Indian politics for decades, Gandhi left a powerful but controversial legacy on Indian politics. The main legacy of her rule was destroying internal party democracy in the Congress party. Her detractors accuse her of weakening State chief ministers and thereby weakening the federal structure, weakening the independence of the judiciary, and weakening her cabinet by vesting power in her secretariat and her sons. Gandhi is also associated with fostering a culture of nepotism in Indian politics and in India's institutions. She is also almost singularly associated with the period of Emergency rule and the dark period in Indian democracy that it entailed. The Congress party was a "broad church" during the independence movement; however, it started turning into a family firm controlled by Indira Gandhi's family during the emergency. This was characterised by servility and sycophancy towards the family which later turned into a hereditary succession of Gandhi family members to power. One of her legacies is supposed to be the systematic corruption of all parts of India's government from the executive to the judiciary due to her sense of insecurity. The Forty-second Amendment of the Constitution of India which was adopted during the emergency can also be regarded as part of her legacy. Although judicial challenges and non-Congress governments tried to water down the amendment, the amendment still stands. Although the Maruti Udyog company was first established by Gandhi's son, Sanjay, it was under Indira that the then nationalized company came to prominence. She remains the only woman to occupy the office of the prime minister of India. In 2020, Gandhi was named by Time magazine among the world's 100 powerful women who defined the last century. Shakti Sthal whose name literally translates to place of strength is a monument to her. In popular culture While portrayals of Indira Gandhi by actors in Indian cinema have generally been avoided, with filmmakers using back-shots, silhouettes and voiceovers to give impressions of her character, several films surrounding her tenure, policies or assassination have been made. These include Aandhi (1975) by Gulzar, Kissa Kursi Ka (1975) by Amrit Nahata, Nasbandi (1978) by I. S. Johar, Maachis (1996) by Gulzar, Hazaaron Khwaishein Aisi (2003) by Sudhir Mishra, Hawayein (2003) by Ammtoje Mann, Des Hoyaa Pardes (2004) by Manoj Punj, Kaya Taran (2004) by Sashi Kumar, Amu (2005) by Shonali Bose, Kaum De Heere (2014) by Ravinder Ravi, 47 to 84 (2014) by Rajiv Sharma, Punjab 1984 (2014) by Anurag Singh, The Fourth Direction (2015) by Gurvinder Singh, Dharam Yudh Morcha (2016) by Naresh S. Garg, 31st October (2016) by Shivaji Lotan Patil, Baadshaho (2017) by Milan Luthria, Toofan Singh (2017) by Baghal Singh, Sonchiriya (2019) by Abhishek Chaubey, Shukranu (2020) by Bishnu Dev Halder. Aandhi, Kissa Kursi Ka and Nasbandi are notable for having been released during Gandhi's lifetime and were subject to censorship on exhibition during the Emergency. Indus Valley to Indira Gandhi is a 1970 Indian two-part documentary film by S. Krishnaswamy which traces the history of India from the earliest times of the Indus Valley Civilization to the prime ministership of Indira Gandhi. The Films Division of India produced Our Indira, a 1973 short documentary film directed by S.N.S. Sastry showing the beginning of her first tenure as PM and her speeches from the Stockholm Conference. Pradhanmantri (), a 2013 Indian documentary television series which aired on ABP News and covers the various policies and political tenures of Indian PMs, includes the tenureship of Gandhi in the episodes "Indira Gandhi Becomes PM", "Split in Congress Party", "Story before Indo-Pakistani War of 1971", "Indo-Pakistani War of 1971 and Birth of Bangladesh", "1975–77 State of Emergency in India", and "Indira Gandhi back as PM and Operation Blue Star" with Navni Parihar portraying the role of Gandhi. Parihar also portrays Gandhi in the 2021 Indian film Bhuj: The Pride of India which is based on the 1971 Indo-Pakistani War. The taboo surrounding the depiction of Indira Gandhi in Indian cinema has begun to dissipate in recent years with actors portraying her in films. Notable portrayals include: Sarita Choudhury in Midnight's Children (2012); Mandeep Kohli in Jai Jawaan Jai Kisaan (2015); Supriya Vinod in Indu Sarkar (2017), NTR: Kathanayakudu/NTR: Mahanayakudu (2019) and Yashwantrao Chavan - Bakhar Eka Vaadalaachi (2014); Flora Jacob in Raid (2018), Thalaivi (2021) and Radhe Shyam (2022), Kishori Shahane in PM Narendra Modi (2019), Avantika Akerkar in Thackeray (2019) and 83 (2021), Supriya Karnik in Main Mulayam Singh Yadav (2021), Lara Dutta in Bell Bottom (2021). Posthumous honours Bangladesh Freedom Honour, Bangladesh's highest civilian honour for non-nationals. The southernmost Indira Point (6.74678°N 93.84260°E) is named after Gandhi. The Indira Awaas Yojana, a central government low-cost housing programme for the rural poor, was named after her. The international airport at New Delhi is named Indira Gandhi International Airport in her honour. The Indira Gandhi National Open University, the largest university in the world, is also named after her. Indian National Congress established the annual Indira Gandhi Award for National Integration in 1985, given in her memory on her death anniversary. The Indira Gandhi Memorial Trust also constituted the annual Indira Gandhi Prize. Bibliography Book written by Indira Gandhi My Truth (1980), Orient Paperback, Books on Indira Gandhi My Years with Indira Gandhi by P. C. Alexander, Orient Paperbacks, , Indira Gandhi by H. Y. Sharada Prasad, Penguin India, Indira Gandhi – Tryst with Power by Nayantara Sahgal, Penguin India, Indira: India's Most Powerful Prime Minister by Sagarika Ghose, See also Indian National Congress List of presidents of the Indian National Congress List of assassinated Indian politicians List of elected and appointed female heads of state and government :Category:Indira Gandhi administration References Notes References Sources Further reading Guha, Ramachandra. India after Gandhi: The History of the World's Largest Democracy (2007) Hart, Henry C., ed. Indira Gandhi's India (Routledge, 2019). excerpt Jayakar, Pupul. Indira Gandhi: An Intimate Biography (1992) Malhotra, Inder. Indira Gandhi: A personal and political biography (1991) Malone, David M., C. Raja Mohan, and Srinath Raghavan, eds. The Oxford handbook of Indian foreign policy (2015) excerpt pp 104–111. Mansinghm Surjit. India′s Search for Power: Indira Gandhi′s Foreign Policy 1966–1982 (1984) Ved Mehta, A Family Affair: India Under Three Prime Ministers (1982) Ramesh, Jairam. Indira Gandhi: a life in nature (Simon and Schuster, 2017); on environmentalism Sahgal, Nayantara. Indira Gandhi: Tryst with Power (Penguin Random House India, 2017). Tharoor, Shashi. Reasons of state: political development and India's foreign policy under Indira Gandhi, 1966-1977 (1982) online Shourie, Arun (1984). Mrs Gandhi's second reign. New Delhi: Vikas. Indira Gandhi – Iron Lady of India by Dr Sulakshi Thelikorala Midnight's Children, Salman Rushdie External links The Indira Gandhi Memorial Trust Rare pictures of Indira Gandhi Rare letters by Indira Gandhi Famous and Historic speeches given by Indira Gandhi Indira Gandhi on global underprivilege at Encyclopaedia Britannica 1917 births 1984 deaths 20th-century Indian women politicians 20th-century Indian politicians 20th-century prime ministers of India 20th-century women rulers 4th Lok Sabha members 5th Lok Sabha members 6th Lok Sabha members 7th Lok Sabha members Assassination of Indira Gandhi Assassinated heads of government Assassinated Indian politicians Children of prime ministers of India Deaths by firearm in India Defence Ministers of India Female defence ministers Female finance ministers Female foreign ministers Female heads of government Female interior ministers Finance Ministers of India Heads of government who were later imprisoned Indian Hindus Indian socialists International School of Geneva alumni Kashmiri people Lenin Peace Prize recipients Lok Sabha members from Andhra Pradesh Lok Sabha members from Karnataka Lok Sabha members from Uttar Pradesh Ministers for Corporate Affairs Ministers for External Affairs of India Ministers for Information and Broadcasting of India Ministers of Internal Affairs of India Nehru–Gandhi family People associated with Santiniketan People educated at Badminton School People murdered in Delhi People from Raebareli People of the Emergency (India) Presidents of the Indian National Congress Prime Ministers of India Rajya Sabha members from Uttar Pradesh Recipients of the Bharat Ratna Victims of Sikh terrorism Women members of the Cabinet of India Women members of the Lok Sabha Women prime ministers Women members of the Rajya Sabha
[ -0.11842302978038788, -0.6356450915336609, -0.6270073056221008, -0.23629608750343323, -0.546481192111969, 1.0443379878997803, 0.2920326292514801, -0.26696842908859253, -0.5996643304824829, 0.3266061246395111, 0.4021807610988617, 0.10166231542825699, -0.2979671359062195, 0.6574063301086426,...
15180
https://en.wikipedia.org/wiki/Intergovernmentalism
Intergovernmentalism
In international relations, intergovernmentalism treats states (and national governments in particular) as the primary actors in the integration process. Intergovernmentalist approaches claim to be able to explain both periods of radical change in the European Union because of converging governmental preferences and periods of inertia because of diverging national interests. Intergovernmentalism is distinguishable from realism and neorealism because of its recognition of the significance of institutionalisation in international politics and the impact of domestic politics upon governmental preferences. Regional integration European integration The best-known example of regional integration is the European Union (EU), an economic and political intergovernmental organisation of 27 member states, all in Europe. The EU operates through a system of supranational independent institutions and intergovernmental negotiated decisions by the member states. Institutions of the EU include the European Commission, the Council of the European Union, the European Council, the Court of Justice of the European Union, the European Central Bank, the Court of Auditors, and the European Parliament. The European Parliament is elected every five years by EU citizens. The EU's de facto capital is Brussels. The EU has developed a single market through a standardised system of laws that apply in all member states. Within the Schengen Area (which includes 22 EU and 4 non-EU European states) passport controls have been abolished. EU policies favour the free movement of people, goods, services, and capital within its boundaries, enact legislation in justice and home affairs, and maintain common policies on trade, agriculture, fisheries and regional development. A monetary union, the eurozone, was established in 1999 and is composed of 17 member states. Through the Common Foreign and Security Policy the EU has developed a role in external relations and defence. Permanent diplomatic missions have been established around the world. The EU is represented at the United Nations, the World Trade Organization, the G8 and the G-20. Intergovernmentalism represents a way for limiting the conferral of powers upon supranational institutions, halting the emergence of common policies. In the current institutional system of the EU, the European Council and the Council play the role of the institutions which have the last word about decisions and policies of the EU, institutionalizing a de facto intergovernmental control over the EU as a whole, with the possibility to give more power to a small group of states. This extreme consequence can create the condition of supremacy of someone over someone else violating the principle of a "Union of Equals". African integration The African Union (AU, or, in its other official languages, UA) is a continental intergovernmental union, similar but less integrated to the EU, consisting of 54 African states. The AU was presented on 26 May 2001 in Addis Ababa, Ethiopia and officially founded on 9 July 2002 in Durban, South Africa to replace the Organisation of African Unity (OAU). The most important decisions of the AU are made by the Assembly of the African Union, a semi-annual meeting of the heads of state and government of its member states. The AU's secretariat, the African Union Commission, is based in Addis Ababa, Ethiopia. See also Continental Union Continentalism Functionalism (international relations) Intergovernmental organization Liberal intergovernmentalism Global citizenship Neofunctionalism Union for the Mediterranean Union of South American Nations References Political systems Theories World government International relations theory
[ 0.23781609535217285, 0.19278831779956818, -0.39639919996261597, 0.17297588288784027, -0.2916657030582428, -0.0665968507528305, 0.3090578615665436, 0.8021127581596375, -0.33815088868141174, -0.5820667743682861, -0.465249240398407, 0.4461398422718048, -0.08546523749828339, 0.3100864887237549...
15181
https://en.wikipedia.org/wiki/Individualism
Individualism
Individualism is the moral stance, political philosophy, ideology and social outlook that emphasizes the intrinsic worth of the individual. Individualists promote the exercise of one's goals and desires and to value independence and self-reliance and advocate that interests of the individual should achieve precedence over the state or a social group while opposing external interference upon one's own interests by society or institutions such as the government. Individualism is often defined in contrast to totalitarianism, collectivism and more corporate social forms. Individualism makes the individual its focus and so starts "with the fundamental premise that the human individual is of primary importance in the struggle for liberation". Anarchism, existentialism, liberalism and libertarianism are examples of movements that take the human individual as a central unit of analysis. Individualism involves "the right of the individual to freedom and self-realization". Individualism has been used as a term denoting "[t]he quality of being an individual; individuality", related to possessing "[a]n individual characteristic; a quirk". Individualism is also associated with artistic and bohemian interests and lifestyles where there is a tendency towards self-creation and experimentation as opposed to tradition or popular mass opinions and behaviors such as with humanist philosophical positions and ethics. Etymology In the English language, the word individualism was first introduced as a pejorative by utopian socialists such as the Owenites in the late 1830s, although it is unclear if they were influenced by Saint-Simonianism or came up with it independently. A more positive use of the term in Britain came to be used with the writings of James Elishama Smith, who was a millenarian and a Christian Israelite. Although an early follower of Robert Owen, he eventually rejected its collective idea of property and found in individualism a "universalism" that allowed for the development of the "original genius". Without individualism, Smith argued that individuals cannot amass property to increase one's happiness. William Maccall, another Unitarian preacher and probably an acquaintance of Smith, came somewhat later, although influenced by John Stuart Mill, Thomas Carlyle and German Romanticism, to the same positive conclusions in his 1847 work Elements of Individualism. Individual An individual is a person or any specific object in a collection. In the 15th century and earlier, and also today within the fields of statistics and metaphysics, individual means "indivisible", typically describing any numerically singular thing, but sometimes meaning "a person" as in "The problem of proper names". From the 17th century on, individual indicates separateness, as in individualism. Individuality is the state or quality of being an individuated being; a person separated from everything with unique character by possessing his or her own needs, goals, and desires in comparison to other persons. Individuation principle The principle of individuation, or , describes the manner in which a thing is identified as distinguished from other things. For Carl Jung, individuation is a process of transformation, whereby the personal and collective unconscious is brought into consciousness (by means of dreams, active imagination or free association to take examples) to be assimilated into the whole personality. It is a completely natural process necessary for the integration of the psyche to take place. Jung considered individuation to be the central process of human development. In L'individuation psychique et collective, Gilbert Simondon developed a theory of individual and collective individuation in which the individual subject is considered as an effect of individuation rather than a cause. Thus, the individual atom is replaced by a never-ending ontological process of individuation. Individuation is an always incomplete process, always leaving a "pre-individual" left-over, itself making possible future individuations. The philosophy of Bernard Stiegler draws upon and modifies the work of Gilbert Simondon on individuation and also upon similar ideas in Friedrich Nietzsche and Sigmund Freud. For Stiegler, "the I, as a psychic individual, can only be thought in relationship to we, which is a collective individual. The I is constituted in adopting a collective tradition, which it inherits and in which a plurality of Is acknowledge each other's existence." Individualism and society Individualism holds that a person taking part in society attempts to learn and discover what his or her own interests are on a personal basis, without a presumed following of the interests of a societal structure (an individualist need not be an egoist). The individualist does not necessarily follow one particular philosophy. He may create an amalgamation of elements of many philosophies, based on personal interests in particular aspects that he finds of use. On a societal level, the individualist participates on a personally structured political and moral ground. Independent thinking and opinion is a necessary trait of an individualist. Jean-Jacques Rousseau, claims that his concept of general will in The Social Contract is not the simple collection of individual wills and that it furthers the interests of the individual (the constraint of law itself would be beneficial for the individual, as the lack of respect for the law necessarily entails, in Rousseau's eyes, a form of ignorance and submission to one's passions instead of the preferred autonomy of reason). Individualism versus collectivism is a common dichotomy in cross-cultural research. Global comparative studies have found that the world's cultures vary in the degree to which they emphasize individual autonomy, freedom and initiative (individualistic traits), respectively conformity to group norms, maintaining traditions and obedience to in-group authority (collectivistic traits). Cultural differences between individualism and collectivism are differences in degrees, not in kind. Cultural individualism is strongly correlated with GDP per capita. The cultures of economically developed regions such as Australia, New Zealand, Japan, South Korea, North America and Western Europe are the most individualistic in the world. Middle income regions such as Eastern Europe, South America and mainland East Asia have cultures which are neither very individualistic nor very collectivistic. The most collectivistic cultures in the world are from economically developing regions such as the Middle East and Northern Africa, Sub-Saharan Africa, South and South-East Asia, Central Asia and Central America. An earlier analysis by Ruth Benedict in her book The Chrysanthemum and the Sword states that societies and groups can differ in the extent to which they are based upon predominantly "self-regarding" (individualistic, and/or self-interested) behaviors, rather than "other-regarding" (group-oriented, and group, or society-minded) behaviors. Ruth Benedict made a distinction, relevant in this context, between guilt societies (e.g. medieval Europe) with an "internal reference standard" and shame societies (e.g. Japan, "bringing shame upon one's ancestors") with an "external reference standard", where people look to their peers for feedback on whether an action is acceptable or not. Individualism is often contrasted either with totalitarianism or with collectivism, but there is a spectrum of behaviors at the societal level ranging from highly individualistic societies through mixed societies to collectivist. Competitive individualism According to an Oxford Dictionary, "competitive individualism" in sociology is "the view that achievement and non-achievement should depend on merit. Effort and ability are regarded as prerequisites of success. Competition is seen as an acceptable means of distributing limited resources and rewards. Methodological individualism Methodological individualism is the view that phenomena can only be understood by examining how they result from the motivations and actions of individual agents. In economics, people's behavior is explained in terms of rational choices, as constrained by prices and incomes. The economist accepts individuals' preferences as givens. Becker and Stigler provide a forceful statement of this view: On the traditional view, an explanation of economic phenomena that reaches a difference in tastes between people or times is the terminus of the argument: the problem is abandoned at this point to whoever studies and explains tastes (psychologists? anthropologists? phrenologists? sociobiologists?). On our preferred interpretation, one never reaches this impasse: the economist continues to search for differences in prices or incomes to explain any differences or changes in behavior. Political individualism Individualists are chiefly concerned with protecting individual autonomy against obligations imposed by social institutions (such as the state or religious morality). For L. Susan Brown, "Liberalism and anarchism are two political philosophies that are fundamentally concerned with individual freedom yet differ from one another in very distinct ways. Anarchism shares with liberalism a radical commitment to individual freedom while rejecting liberalism's competitive property relations." Civil libertarianism is a strain of political thought that supports civil liberties, or which emphasizes the supremacy of individual rights and personal freedoms over and against any kind of authority (such as a state, a corporation and social norms imposed through peer pressure, among others). Civil libertarianism is not a complete ideology; rather, it is a collection of views on the specific issues of civil liberties and civil rights. Because of this, a civil libertarian outlook is compatible with many other political philosophies, and civil libertarianism is found on both the right and left in modern politics. For scholar Ellen Meiksins Wood, "there are doctrines of individualism that are opposed to Lockean individualism [...] and non-Lockean individualism may encompass socialism". British historians such as Emily Robinson, Camilla Schofield, Florence Sutcliffe-Braithwaite and Natalie Thomlinson have argued that Britons were keen about defining and claiming their individual rights, identities and perspectives by the 1970s, demanding greater personal autonomy and self-determination and less outside control, angrily complaining that the establishment was withholding it. Historians argue that this shift in concerns helped cause Thatcherism and was incorporated into Thatcherism's appeal. Anarchism Within anarchism, individualist anarchism represents several traditions of thought within the anarchist movement that emphasize the individual and their will over any kinds of external determinants such as groups, society, traditions and ideological systems. Individualist anarchism is not a single philosophy but refers to a group of individualistic philosophies that sometimes are in conflict. In 1793, William Godwin, who has often been cited as the first anarchist, wrote Political Justice, which some consider to be the first expression of anarchism. Godwin, a philosophical anarchist, from a rationalist and utilitarian basis opposed revolutionary action and saw a minimal state as a present "necessary evil" that would become increasingly irrelevant and powerless by the gradual spread of knowledge. Godwin advocated individualism, proposing that all cooperation in labour be eliminated on the premise that this would be most conducive with the general good. An influential form of individualist anarchism called egoism, or egoist anarchism, was expounded by one of the earliest and best-known proponents of individualist anarchism, the German Max Stirner. Stirner's The Ego and Its Own, published in 1844, is a founding text of the philosophy. According to Stirner, the only limitation on the rights of the individual is their power to obtain what they desire, without regard for God, state, or morality. To Stirner, rights were spooks in the mind, and he held that society does not exist but "the individuals are its reality". Stirner advocated self-assertion and foresaw unions of egoists, non-systematic associations continually renewed by all parties' support through an act of will, which Stirner proposed as a form of organization in place of the state. Egoist anarchists claim that egoism will foster genuine and spontaneous union between individuals. Egoist anarchism has inspired many interpretations of Stirner's philosophy. It was re-discovered and promoted by German philosophical anarchist and LGBT activist John Henry Mackay. Josiah Warren is widely regarded as the first American anarchist and The Peaceful Revolutionist, the four-page weekly paper he edited during 1833, was the first anarchist periodical published. For American anarchist historian Eunice Minette Schuster, "[i]t is apparent [...] that Proudhonian Anarchism was to be found in the United States at least as early as 1848 and that it was not conscious of its affinity to the Individualist Anarchism of Josiah Warren and Stephen Pearl Andrews. [...] William B. Greene presented this Proudhonian Mutualism in its purest and most systematic form". Henry David Thoreau was an important early influence in individualist anarchist thought in the United States and Europe. Thoreau was an American author, poet, naturalist, tax resister, development critic, surveyor, historian, philosopher and leading transcendentalist, who is best known for his book Walden, a reflection upon simple living in natural surroundings, and his essay Civil Disobedience, an argument for individual resistance to civil government in moral opposition to an unjust state. Later, Benjamin Tucker fused Stirner's egoism with the economics of Warren and Proudhon in his eclectic influential publication Liberty. From these early influences, anarchism and especially individualist anarchism was related to the issues of love and sex. In different countries, this attracted a small but diverse following of bohemian artists and intellectuals, free love and birth control advocates, individualist naturists nudists as in anarcho-naturism,<ref>"Los anarco-individualistas, G.I.A...Una escisión de la FAI producida en el IX Congreso (Carrara, 1965) se pr odujo cuando un sector de anarquistas de tendencia humanista rechazan la interpretación que ellos juzgan disciplinaria del pacto asociativo" clásico, y crean los GIA (Gruppi di Iniziativa Anarchica) . Esta pequeña federación de grupos, hoy nutrida sobre todo de veteranos anarco-individualistas de orientación pacifista, naturista, etcétera defiende la autonomía personal y rechaza a rajatabla toda forma de intervención en los procesos del sistema, como sería por ejemplo el sindicalismo. Su portavoz es L'Internazionale con sede en Ancona. La escisión de los GIA prefiguraba, en sentido contrario, el gran debate que pronto había de comenzar en el seno del movimiento""El movimiento libertario en Italia" by Bicicleta. REVISTA DE COMUNICACIONES LIBERTARIAS Year 1 No. Noviembre, 1 1977 </ref>"Les anarchistes individualistes du début du siècle l'avaient bien compris, et intégraient le naturisme dans leurs préoccupations. Il est vraiment dommage que ce discours se soit peu à peu effacé, d'antan plus que nous assistons, en ce moment, à un retour en force du puritanisme (conservateur par essence).""Anarchisme et naturisme, aujourd'hui." by Cathy Ytak freethought and anti-clerical activists as well as young anarchist outlaws in what came to be known as illegalism and individual reclamation,Parry, Richard. The Bonnot Gang. Rebel Press, 1987. p. 15 especially within European individualist anarchism and individualist anarchism in France. These authors and activists included Oscar Wilde, Émile Armand, Han Ryner, Henri Zisly, Renzo Novatore, Miguel Giménez Igualada, Adolf Brand and Lev Chernyi among others. In his important essay The Soul of Man Under Socialism from 1891, Wilde defended socialism as the way to guarantee individualism and so he saw that "[w]ith the abolition of private property, then, we shall have true, beautiful, healthy Individualism. Nobody will waste his life in accumulating things, and the symbols for things. One will live. To live is the rarest thing in the world. Most people exist, that is all". For anarchist historian George Woodcock, "Wilde's aim in The Soul of Man Under Socialism is to seek the society most favorable to the artist. [...] for Wilde art is the supreme end, containing within itself enlightenment and regeneration, to which all else in society must be subordinated. [...] Wilde represents the anarchist as aesthete". Woodcock finds that "[t]he most ambitious contribution to literary anarchism during the 1890s was undoubtedly Oscar Wilde The Soul of Man Under Socialism" and finds that it is influenced mainly by the thought of William Godwin. Autarchism Autarchism promotes the principles of individualism, the moral ideology of individual liberty and self-reliance whilst rejecting compulsory government and supporting the elimination of government in favor of ruling oneself to the exclusion of rule by others. Robert LeFevre, recognized as an autarchist by anarcho-capitalist Murray Rothbard, distinguished autarchism from anarchy, whose economics he felt entailed interventions contrary to freedom in contrast to his own laissez-faire economics of the Austrian School. Liberalism Liberalism is the belief in the importance of individual freedom. This belief is widely accepted in the United States, Europe, Australia and other Western nations, and was recognized as an important value by many Western philosophers throughout history, in particular since the Enlightenment. It is often rejected by collectivist, Abrahamic or Confucian in civilized societies, although Taoists were and are known to be individualists. The Roman Emperor Marcus Aurelius wrote praising "the idea of a polity administered with regard to equal rights and equal freedom of speech, and the idea of a kingly government which respects most of all the freedom of the governed". Liberalism has its roots in the Age of Enlightenment and rejects many foundational assumptions that dominated most earlier theories of government, such as the Divine Right of Kings, hereditary status, and established religion. John Locke is often credited with the philosophical foundations of classical liberalism, a political ideology inspired by the broader liberal movement . He wrote "no one ought to harm another in his life, health, liberty, or possessions." In the 17th century, liberal ideas began to influence European governments in nations such as the Netherlands, Switzerland, England and Poland, but they were strongly opposed, often by armed might, by those who favored absolute monarchy and established religion. In the 18th century, the first modern liberal state was founded without a monarch or a hereditary aristocracy in America. The American Declaration of Independence includes the words which echo Locke that "all men are created equal; that they are endowed by their Creator with certain unalienable rights; that among these are life, liberty, and the pursuit of happiness; that to insure these rights, governments are instituted among men, deriving their just powers from the consent of the governed." Liberalism comes in many forms. According to John N. Gray, the essence of liberalism is toleration of different beliefs and of different ideas as to what constitutes a good life. Philosophical individualism Egoist anarchism Egoist anarchism is a school of anarchist thought that originated in the philosophy of Max Stirner, a 19th-century Hegelian philosopher whose "name appears with familiar regularity in historically orientated surveys of anarchist thought as one of the earliest and best-known exponents of individualist anarchism." According to Stirner, the only limitation on the rights of the individual is their power to obtain what they desire, without regard for God, state, or morality. Stirner advocated self-assertion and foresaw unions of egoists, non-systematic associations continually renewed by all parties' support through an act of will which Stirner proposed as a form of organisation in place of the state. Egoist anarchists argue that egoism will foster genuine and spontaneous union between individuals. Egoism has inspired many interpretations of Stirner's philosophy, but it has also gone beyond Stirner within anarchism. It was re-discovered and promoted by German philosophical anarchist and LGBT activist John Henry Mackay. John Beverley Robinson wrote an essay called "Egoism" in which he states that "Modern egoism, as propounded by Stirner and Nietzsche, and expounded by Ibsen, Shaw and others, is all these; but it is more. It is the realization by the individual that they are an individual; that, as far as they are concerned, they are the only individual." Stirner and Nietzsche, who exerted influence on anarchism despite its opposition, were frequently compared by French "literary anarchists" and anarchist interpretations of Nietzschean ideas appear to have also been influential in the United States. Anarchists who adhered to egoism include Benjamin Tucker, Émile Armand, John Beverley Robinson, Adolf Brand, Steven T. Byington, Renzo Novatore, James L. Walker, Enrico Arrigoni, Biofilo Panclasta, Jun Tsuji and André Arru as well as contemporary ones such as Hakim Bey, Bob Black and Wolfi Landstreicher. Ethical egoism Ethical egoism, also called simply egoism, is the normative ethical position that moral agents ought to do what is in their own self-interest. It differs from psychological egoism, which claims that people do only act in their self-interest. Ethical egoism also differs from rational egoism which holds merely that it is rational to act in one's self-interest. However, these doctrines may occasionally be combined with ethical egoism. Ethical egoism contrasts with ethical altruism, which holds that moral agents have an obligation to help and serve others. Egoism and altruism both contrast with ethical utilitarianism, which holds that a moral agent should treat one's self (also known as the subject) with no higher regard than one has for others (as egoism does, by elevating self-interests and "the self" to a status not granted to others), but that one also should not (as altruism does) sacrifice one's own interests to help others' interests, so long as one's own interests (i.e. one's own desires or well-being) are substantially-equivalent to the others' interests and well-being. Egoism, utilitarianism, and altruism are all forms of consequentialism, but egoism and altruism contrast with utilitarianism, in that egoism and altruism are both agent-focused forms of consequentialism (i.e. subject-focused or subjective), but utilitarianism is called agent-neutral (i.e. objective and impartial) as it does not treat the subject's (i.e. the self's, i.e. the moral "agent's") own interests as being more or less important than if the same interests, desires, or well-being were anyone else's. Ethical egoism does not require moral agents to harm the interests and well-being of others when making moral deliberation, e.g. what is in an agent's self-interest may be incidentally detrimental, beneficial, or neutral in its effect on others. Individualism allows for others' interest and well-being to be disregarded or not as long as what is chosen is efficacious in satisfying the self-interest of the agent. Nor does ethical egoism necessarily entail that in pursuing self-interest one ought always to do what one wants to do, e.g. in the long term the fulfilment of short-term desires may prove detrimental to the self. Fleeting pleasance then takes a back seat to protracted eudaemonia. In the words of James Rachels, "[e]thical egoism [...] endorses selfishness, but it doesn't endorse foolishness." Ethical egoism is sometimes the philosophical basis for support of libertarianism or individualist anarchism as in Max Stirner, although these can also be based on altruistic motivations. These are political positions based partly on a belief that individuals should not coercively prevent others from exercising freedom of action. Existentialism Existentialism is a term applied to the work of a number of 19th- and 20th-century philosophers who generally held, despite profound doctrinal differences,Oxford Companion to Philosophy, ed. Ted Honderich, New York (1995), p. 259. that the focus of philosophical thought should be to deal with the conditions of existence of the individual person and his or her emotions, actions, responsibilities, and thoughts.Cooper, D. E. Existentialism: A Reconstruction (Basil Blackwell, 1999, p. 8) The early 19th century philosopher Søren Kierkegaard, posthumously regarded as the father of existentialism,Stanford Encyclopedia of Philosophy http://plato.stanford.edu/entries/kierkegaard/ maintained that the individual solely has the responsibilities of giving one's own life meaning and living that life passionately and sincerely,Lowrie, Walter. Kierkegaard's attack upon "Christendom" (Princeton, 1968, pp. 37–40) in spite of many existential obstacles and distractions including despair, angst, absurdity, alienation and boredom. Subsequent existential philosophers retain the emphasis on the individual, but differ in varying degrees on how one achieves and what constitutes a fulfilling life, what obstacles must be overcome, and what external and internal factors are involved, including the potential consequences of the existenceMartin, Clancy. Religious Existentialism in Companion to Phenomenology and Existentialism (Blackwell, 2006, pp. 188–205) or non-existence of God.D.E. Cooper Existentialism: A Reconstruction (Basil Blackwell, 1999, p. 8). Many existentialists have also regarded traditional systematic or academic philosophy in both style and content as too abstract and remote from concrete human experience.Walter Kaufmann, Existentialism: From Dostoevesky to Sartre, New York (1956), p. 12 Existentialism became fashionable after World War II as a way to reassert the importance of human individuality and freedom. Freethought Freethought holds that individuals should not accept ideas proposed as truth without recourse to knowledge and reason. Thus, freethinkers strive to build their opinions on the basis of facts, scientific inquiry and logical principles, independent of any logical fallacies or intellectually limiting effects of authority, confirmation bias, cognitive bias, conventional wisdom, popular culture, prejudice, sectarianism, tradition, urban legend and all other dogmas. Regarding religion, freethinkers hold that there is insufficient evidence to scientifically validate the existence of supernatural phenomena. Humanism Humanism is a perspective common to a wide range of ethical stances that attaches importance to human dignity, concerns, and capabilities, particularly rationality. Although the word has many senses, its meaning comes into focus when contrasted to the supernatural or to appeals to authority. Since the 19th century, humanism has been associated with an anti-clericalism inherited from the 18th-century Enlightenment philosophes. 21st century Humanism tends to strongly endorse human rights, including reproductive rights, gender equality, social justice, and the separation of church and state. The term covers organized non-theistic religions, secular humanism, and a humanistic life stance. Hedonism Philosophical hedonism is a meta-ethical theory of value which argues that pleasure is the only intrinsic good and pain is the only intrinsic bad. The basic idea behind hedonistic thought is that pleasure (an umbrella term for all inherently likable emotions) is the only thing that is good in and of itself or by its very nature. This implies evaluating the moral worth of character or behavior according to the extent that the pleasure it produces exceeds the pain it entails. Libertinism A libertine is one devoid of most moral restraints, which are seen as unnecessary or undesirable, especially one who ignores or even spurns accepted morals and forms of behaviour sanctified by the larger society. Libertines place value on physical pleasures, meaning those experienced through the senses. As a philosophy, libertinism gained new-found adherents in the 17th, 18th, and 19th centuries, particularly in France and Great Britain. Notable among these were John Wilmot, 2nd Earl of Rochester and the Marquis de Sade. During the Baroque era in France, there existed a freethinking circle of philosophers and intellectuals who were collectively known as libertinage érudit and which included Gabriel Naudé, Élie Diodati and François de La Mothe Le Vayer. The critic Vivian de Sola Pinto linked John Wilmot, 2nd Earl of Rochester's libertinism to Hobbesian materialism. Objectivism Objectivism is a system of philosophy created by philosopher and novelist Ayn Rand which holds that reality exists independent of consciousness; human beings gain knowledge rationally from perception through the process of concept formation and inductive and deductive logic; the moral purpose of one's life is the pursuit of one's own happiness or rational self-interest. Rand thinks the only social system consistent with this morality is full respect for individual rights, embodied in pure laissez-faire capitalism; and the role of art in human life is to transform man's widest metaphysical ideas, by selective reproduction of reality, into a physical form—a work of art—that he can comprehend and to which he can respond emotionally. Objectivism celebrates man as his own hero, "with his own happiness as the moral purpose of his life, with productive achievement as his noblest activity, and reason as his only absolute." Philosophical anarchism Philosophical anarchism is an anarchist school of thought which contends that the state lacks moral legitimacy. In contrast to revolutionary anarchism, philosophical anarchism does not advocate violent revolution to eliminate it but advocates peaceful evolution to superate it. Although philosophical anarchism does not necessarily imply any action or desire for the elimination of the state, philosophical anarchists do not believe that they have an obligation or duty to obey the state, or conversely that the state has a right to command. Philosophical anarchism is a component especially of individualist anarchism. Philosophical anarchists of historical note include Mohandas Gandhi, William Godwin, Pierre-Joseph Proudhon, Max Stirner, Benjamin Tucker and Henry David Thoreau. Contemporary philosophical anarchists include A. John Simmons and Robert Paul Wolff. Subjectivism Subjectivism is a philosophical tenet that accords primacy to subjective experience as fundamental of all measure and law. In extreme forms such as solipsism, it may hold that the nature and existence of every object depends solely on someone's subjective awareness of it. In the proposition 5.632 of the Tractatus Logico-Philosophicus, Ludwig Wittgenstein wrote: "The subject doesn't belong to the world, but it is a limit of the world". Metaphysical subjectivism is the theory that reality is what we perceive to be real, and that there is no underlying true reality that exists independently of perception. One can also hold that it is consciousness rather than perception that is reality (subjective idealism). In probability, a subjectivism stands for the belief that probabilities are simply degrees-of-belief by rational agents in a certain proposition and which have no objective reality in and of themselves. Ethical subjectivism stands in opposition to moral realism, which claims that moral propositions refer to objective facts, independent of human opinion; to error theory, which denies that any moral propositions are true in any sense; and to non-cognitivism, which denies that moral sentences express propositions at all. The most common forms of ethical subjectivism are also forms of moral relativism, with moral standards held to be relative to each culture or society, i.e. cultural relativism, or even to every individual. The latter view, as put forward by Protagoras, holds that there are as many distinct scales of good and evil as there are subjects in the world. Moral subjectivism is that species of moral relativism that relativizes moral value to the individual subject. Horst Matthai Quelle was a Spanish language German anarchist philosopher influenced by Max Stirner. Quelle argued that since the individual gives form to the world, he is those objects, the others and the whole universe. One of his main views was a "theory of infinite worlds" which for him was developed by pre-socratic philosophers. Solipsism Solipsism is the philosophical idea that only one's own mind is sure to exist. The term comes from Latin solus ("alone") and ipse ("self"). Solipsism as an epistemological position holds that knowledge of anything outside one's own mind is unsure. The external world and other minds cannot be known, and might not exist outside the mind. As a metaphysical position, solipsism goes further to the conclusion that the world and other minds do not exist. Solipsism is the only epistemological position that, by its own postulate, is both irrefutable and yet indefensible in the same manner. Although the number of individuals sincerely espousing solipsism has been small, it is not uncommon for one philosopher to accuse another's arguments of entailing solipsism as an unwanted consequence, in a kind of reductio ad absurdum. In the history of philosophy, solipsism has served as a skeptical hypothesis. Economic individualism The doctrine of economic individualism holds that each individual should be allowed autonomy in making his or her own economic decisions as opposed to those decisions being made by the community, the corporation or the state for him or her. Classical liberalism Liberalism is a political ideology that developed in the 19th century in the Americas, England and Western Europe. It followed earlier forms of liberalism in its commitment to personal freedom and popular government, but differed from earlier forms of liberalism in its commitment to classical economics and free markets. Notable liberals in the 19th century include Jean-Baptiste Say, Thomas Malthus and David Ricardo. Classical liberalism, sometimes also used as a label to refer to all forms of liberalism before the 20th century, was revived in the 20th century by Ludwig von Mises and Friedrich Hayek and further developed by Milton Friedman, Robert Nozick, Loren Lomasky and Jan Narveson. Libertarianism Libertarianism upholds liberty as a core principle. Libertarians seek to maximize autonomy and political freedom, emphasizing free association, freedom of choice, individualism and voluntary association. Libertarianism shares a skepticism of authority and state power, but libertarians diverge on the scope of their opposition to existing economic and political systems. Various schools of libertarian thought offer a range of views regarding the legitimate functions of state and private power, often calling for the restriction or dissolution of coercive social institutions. Different categorizations have been used to distinguish various forms of libertarianism.Carlson, Jennifer D. (2012). "Libertarianism". In Miller, Wilburn R., ed. The Social History of Crime and Punishment in America. London: SAGE Publications. p. 1006. . "There exist three major camps in libertarian thought: right-libertarianism, socialist libertariaism, and left-lbertarianism; the extent to which these represent distinct ideologies as opposed to variations on a theme is contrasted by scholars. Regardless, these factions differ most pronouncedly with respect to private property." This is done to distinguish libertarian views on the nature of property and capital, usually along left–right or socialist–capitalist lines. Left-libertarianism Left-libertarianism represents several related yet distinct approaches to politics, society, culture and political and social theory which stress both individual and political freedom alongside social justice. Unlike right-libertarians, left-libertarians believe that neither claiming nor mixing one's labor with natural resources is enough to generate full private property rights, and maintain that natural resources (land, oil, gold, trees) ought to be held in some egalitarian manner, either unowned or owned collectively. Those left-libertarians who support property do so under different property normsByas, Jason Lee (25 November 2015). "The Moral Irrelevance of Rent". Center for a Stateless Society. Retrieved 21 March 2020.Gillis, William (29 November 2015). "The Organic Emergence of Property from Reputation". Center for a Stateless Society. Retrieved 8 April 2020. and theories, or under the condition that recompense is offered to the local or global community. Related terms include egalitarian libertarianism,Sullivan, Mark A. (July 2003). "Why the Georgist Movement Has Not Succeeded: A Personal Response to the Question Raised by Warren J. Samuels". American Journal of Economics and Sociology. 62 (3): 612. left-wing libertarianism, libertarianism, libertarian socialism,Long, Roderick T. (2012). "The Rise of Social Anarchism". In Gaus, Gerald F.; D'Agostino, Fred, eds. The Routledge Companion to Social and Political Philosophy. p. 223. social libertarianism and socialist libertarianism. Left-libertarianism can refer generally to these related and overlapping schools of thought: Anti-authoritarian varieties of left-wing politics, in particular within the socialist movement, usually known as libertarian socialism. Geolibertarianism, an American synthesis of libertarianism and Georgism.DeCoster, Karen (19 April 2006). "Henry George and the Tariff Question". LewRockwell.com. Retrieved 23 September 2020. Left-wing market anarchism, stressing the socially transformative potential of non-aggression and anti-capitalist freed markets.Chartier, Gary; Johnson, Charles W. (2011). Markets Not Capitalism: Individualist Anarchism Against Bosses, Inequality, Corporate Power, and Structural Poverty. Brooklyn: Minor Compositions/Autonomedia. pp. 1–11. . Steiner–Vallentyne school, named after Hillel Steiner and Peter Vallentyne, whose proponents draw conclusions from classical liberal or market liberal premises. Right-libertarianism Right-libertarianism represents either non-collectivist forms of libertarianism or a variety of different libertarian views that scholars label to the right of libertarianism such as libertarian conservatism. Related terms include conservative libertarianism,Narveson, Jan (2001). The Libertarian Idea (revised ed.). Peterborough, Ontario: Broadview Press. p. 8. . libertarian capitalism and right-wing libertarianism.Goodway, David (2006). Anarchist Seeds Beneath the Snow: Left-Libertarian Thought and British Writers from William Morris to Colin Ward. Liverpool: Liverpool University Press. p. 4. "'Libertarian' and 'libertarianism' are frequently employed by anarchists as synonyms for 'anarchist' and 'anarchism', largely as an attempt to distance themselves from the negative connotations of 'anarchy' and its derivatives. The situation has been vastly complicated in recent decades with the rise of anarcho-capitalism, 'minimal statism' and an extreme right-wing laissez-faire philosophy advocated by such theorists as Rothbard and Nozick and their adoption of the words 'libertarian' and 'libertarianism'. It has therefore now become necessary to distinguish between their right libertarianism and the left libertarianism of the anarchist tradition". In the mid-20th century, right-libertarian ideologies such as anarcho-capitalism and minarchism co-opted the term libertarian to advocate laissez-faire capitalism and strong private property rights such as in land, infrastructure and natural resources. The latter is the dominant form of libertarianism in the United States, where it advocates civil liberties, natural law, free-market capitalism and a major reversal of the modern welfare state. In the Stanford Encyclopedia of Philosophy, Peter Vallentyne calls it right libertarianism, but he further states: "Libertarianism is often thought of as 'right-wing' doctrine. This, however, is mistaken for at least two reasons. First, on social—rather than economic—issues, libertarianism tends to be 'left-wing'. It opposes laws that restrict consensual and private sexual relationships between adults (e.g., gay sex, non-marital sex, and deviant sex), laws that restrict drug use, laws that impose religious views or practices on individuals, and compulsory military service. Second, in addition to the better-known version of libertarianism—right-libertarianism—there is also a version known as 'left-libertarianism'. Both endorse full self-ownership, but they differ with respect to the powers agents have to appropriate unappropriated natural resources (land, air, water, etc.)." Socialism With regard to economic questions within individualist socialist schools such as individualist anarchism, there are adherents to mutualism (Pierre Joseph Proudhon, Émile Armand and early Benjamin Tucker); natural rights positions (early Benjamin Tucker, Lysander Spooner and Josiah Warren); and egoistic disrespect for "ghosts" such as private property and markets (Max Stirner, John Henry Mackay, Lev Chernyi, later Benjamin Tucker, Renzo Novatore and illegalism). Contemporary individualist anarchist Kevin Carson characterizes American individualist anarchism saying that "[u]nlike the rest of the socialist movement, the individualist anarchists believed that the natural wage of labor in a free market was its product, and that economic exploitation could only take place when capitalists and landlords harnessed the power of the state in their interests. Thus, individualist anarchism was an alternative both to the increasing statism of the mainstream socialist movement, and to a classical liberal movement that was moving toward a mere apologetic for the power of big business." Libertarian socialism Libertarian socialism, sometimes dubbed left-libertarianismHicks, Steven V. and Daniel E. Shannon. The American journal of economics and sociology. Blackwell Pub, 2003. p. 612 and socialist libertarianism, is an anti-authoritarian, anti-statist and libertarian tradition within the socialist movement that rejects the state socialist conception of socialism as a statist form where the state retains centralized control of the economy."So, libertarian socialism rejects the idea of state ownership and control of the economy, along with the state as such. Through workers' self-management it proposes to bring an end to authority, exploitation, and hierarchy in production." "I1. Isn't libertarian socialism an oxymoron" in An Anarchist FAQ Libertarian socialists criticize wage slavery relationships within the workplace, emphasizing workers' self-management of the workplace and decentralized structures of political organization." ...preferringa system of popular self governance via networks of decentralized, local voluntary, participatory, cooperative associations. Roderick T. Long. "Toward a libertarian theory of class." Social Philosophy and Policy. Volume 15. Issue 02. Summer 1998. Pg. 305 Libertarian socialism asserts that a society based on freedom and justice can be achieved through abolishing authoritarian institutions that control certain means of production and subordinate the majority to an owning class or political and economic elite. Libertarian socialists advocate for decentralized structures based on direct democracy and federal or confederal associations such as libertarian municipalism, citizens' assemblies, trade unions and workers' councils. All of this is generally done within a general call for liberty"...what categorizes libertarian socialism is a focus on forms of social organization to further the freedom of the individual combined with an advocacy of non-state means for achieving this." Matt Dawson. Late modernity, individualization and socialism: An Associational Critique of Neoliberalism. Palgrave MacMillan. 2013. pg. 64 and free association through the identification, criticism and practical dismantling of illegitimate authority in all aspects of human life."Authority is defined in terms of the right to exercise social control (as explored in the "sociology of power") and the correlative duty to obey (as explred in the "philosophy of practical reason"). Anarchism is distinguished, philosophically, by its scepticism towards such moral relations – by its questioning of the claims made for such normative power – and, practically, by its challenge to those "authoritative" powers which cannot justify their claims and which are therefore deemed illegitimate or without moral foundation."Anarchism and Authority: A Philosophical Introduction to Classical Anarchism by Paul McLaughlin. AshGate. 2007. p. 1Individualist anarchist Benjamin Tucker defined anarchism as opposition to authority as follows "They found that they must turn either to the right or to the left, — follow either the path of Authority or the path of Liberty. Marx went one way; Warren and Proudhon the other. Thus were born State Socialism and Anarchism...Authority, takes many shapes, but, broadly speaking, her enemies divide themselves into three classes: first, those who abhor her both as a means and as an end of progress, opposing her openly, avowedly, sincerely, consistently, universally; second, those who profess to believe in her as a means of progress, but who accept her only so far as they think she will subserve their own selfish interests, denying her and her blessings to the rest of the world; third, those who distrust her as a means of progress, believing in her only as an end to be obtained by first trampling upon, violating, and outraging her. These three phases of opposition to Liberty are met in almost every sphere of thought and human activity. Good representatives of the first are seen in the Catholic Church and the Russian autocracy; of the second, in the Protestant Church and the Manchester school of politics and political economy; of the third, in the atheism of Gambetta and the socialism of Karl Marx." Benjamin Tucker. Individual Liberty. Within the larger socialist movement, libertarian socialism seeks to distinguish itself from Leninism and social democracy."In some ways, it is perhaps fair to say that if Left communism is an intellectual- political formation, it is so, first and foremost, negatively – as opposed to other socialist traditions. I have labelled this negative pole 'socialist orthodoxy', composed of both Leninists and social democrats...What I suggested was that these Left communist thinkers differentiated their own understandings of communism from a strand of socialism that came to follow a largely electoral road in the West, pursuing a kind of social capitalism, and a path to socialism that predominated in the peripheral and semi- peripheral countries, which sought revolutionary conquest of power and led to something like state capitalism. Generally, the Left communist thinkers were to find these paths locked within the horizons of capitalism (the law of value, money, private property, class, the state), and they were to characterize these solutions as statist, substitutionist and authoritarian." Chamsy el- Ojeili. Beyond post-socialism. Dialogues with the far-left. Palgrave Macmillan. 2015. pg 8 Past and present currents and movements commonly described as libertarian socialist include anarchism (especially anarchist schools of thought such as anarcho-communism, anarcho-syndicalism, collectivist anarchism, green anarchism, individualist anarchism,Armand, Émile (1907). "Anarchist Individualism as a Life and Activity". French individualist anarchist Émile Armand shows clearly opposition to capitalism and centralized economies when he said that the individualist anarchist "inwardly he remains refractory – fatally refractory – morally, intellectually, economically (The capitalist economy and the directed economy, the speculators and the fabricators of single are equally repugnant to him.)"Chartier, Gary; Johnson, Charles W. (2011). Markets Not Capitalism: Individualist Anarchism Against Bosses, Inequality, Corporate Power, and Structural Poverty. Brooklyn: Minor Compositions/Autonomedia. Back cover. "It introduces an eye-opening approach to radical social thought, rooted equally in libertarian socialism and market anarchism." mutualism, and social anarchism) as well as communalism, some forms of democratic socialism, guild socialism, libertarian Marxism (autonomism, council communism, left communism, and Luxemburgism, among others),Graham, Robert. "The General Idea of Proudhon's Revolution". participism, revolutionary syndicalism and some versions of utopian socialism. Mutualism Mutualism is an anarchist school of thought which can be traced to the writings of Pierre-Joseph Proudhon, who envisioned a socialist society where each person possess a means of production, either individually or collectively, with trade representing equivalent amounts of labor in the free market. Integral to the scheme was the establishment of a mutual-credit bank which would lend to producers at a minimal interest rate only high enough to cover the costs of administration. Mutualism is based on a labor theory of value which holds that when labor or its product is sold, it ought to receive goods or services in exchange embodying "the amount of labor necessary to produce an article of exactly similar and equal utility" and that receiving anything less would be considered exploitation, theft of labor, or usury. Criticisms Plato emphasized that individuals must adhere to laws and perform duties while declining to grant individuals rights to limit or reject state interference in their lives. Fascists believe that the liberal emphasis on individual freedom produces national divisiveness. Other views As creative independent lifestyle The anarchist writer and bohemian Oscar Wilde wrote in his famous essay The Soul of Man under Socialism that "Art is individualism, and individualism is a disturbing and disintegrating force. There lies its immense value. For what it seeks is to disturb monotony of type, slavery of custom, tyranny of habit, and the reduction of man to the level of a machine." For anarchist historian George Woodcock, "Wilde's aim in The Soul of Man under Socialism is to seek the society most favorable to the artist, [...] for Wilde art is the supreme end, containing within itself enlightenment and regeneration, to which all else in society must be subordinated. [...] Wilde represents the anarchist as aesthete." In this way, individualism has been used to denote a personality with a strong tendency towards self-creation and experimentation as opposed to tradition or popular mass opinions and behaviors. Anarchist writer Murray Bookchin describes a lot of individualist anarchists as people who "expressed their opposition in uniquely personal forms, especially in fiery tracts, outrageous behavior, and aberrant lifestyles in the cultural ghettos of fin de siècle New York, Paris, and London. As a credo, individualist anarchism remained largely a bohemian lifestyle, most conspicuous in its demands for sexual freedom ('free love') and enamored of innovations in art, behavior, and clothing." In relation to this view of individuality, French individualist anarchist Émile Armand advocated egoistical denial of social conventions and dogmas to live in accord to one's own ways and desires in daily life since he emphasized anarchism as a way of life and practice. In this way, he opined that "the anarchist individualist tends to reproduce himself, to perpetuate his spirit in other individuals who will share his views and who will make it possible for a state of affairs to be established from which authoritarianism has been banished. It is this desire, this will, not only to live, but also to reproduce oneself, which we shall call 'activity." In the book Imperfect Garden: The Legacy of Humanism, humanist philosopher Tzvetan Todorov identifies individualism as an important current of socio-political thought within modernity and as examples of it he mentions Michel de Montaigne, François de La Rochefoucauld, Marquis de Sade, and Charles Baudelaire. In La Rochefoucauld, he identifies a tendency similar to stoicism in which "the honest person works his being in the manner of a sculptor who searches the liberation of the forms which are inside a block of marble, to extract the truth of that matter." In Baudelaire, he finds the dandy trait in which one searches to cultivate "the idea of beauty within oneself, of satisfying one's passions of feeling and thinking." The Russian-American poet Joseph Brodsky once wrote that "[t]he surest defense against Evil is extreme individualism, originality of thinking, whimsicality, even—if you will—eccentricity. That is, something that can't be feigned, faked, imitated; something even a seasoned imposter couldn't be happy with." Ralph Waldo Emerson famously declared that "[w]hoso would be a man must be a nonconformist"—a point of view developed at length in both the life and work of Henry David Thoreau. Equally memorable and influential on Walt Whitman is Emerson's idea that "a foolish consistency is the hobgoblin of small minds, adored by little statesmen and philosophers and divines." Emerson opposed on principle the reliance on civil and religious social structures precisely because through them the individual approaches the divine second-hand, mediated by the once original experience of a genius from another age. According to Emerson, "[an institution is the lengthened shadow of one man." To achieve this original relation, Emerson stated that one must "[i]nsist on one's self; never imitate", for if the relationship is secondary the connection is lost. Religion People in Western countries tend to be more individualistic than communitarian. The authors of one study proposed that this difference is due in part to the influence of the Catholic Church in the Middle Ages. They pointed specifically to its bans on incest, cousin marriage, adoption, and remarriage, and its promotion of the nuclear family over the extended family. The Catholic Church teaches "if we pray the Our Father sincerely, we leave individualism behind, because the love that we receive frees us ... our divisions and oppositions have to be overcome" See also References Further reading Albrecht, James M. (2012) Reconstructing Individualism : A Pragmatic Tradition from Emerson to Ellison. Fordham University Press. Dewey, John. (1930). Individualism Old and New. Gagnier, Regenia. (2010). Individualism, Decadence and Globalization: On the Relationship of Part to Whole, 1859–1920. Palgrave Macmillan. Meiksins Wood, Ellen. (1972). Mind and Politics: An Approach to the Meaning of Liberal and Socialist Individualism. University of California Press. Shanahan, Daniel. (1991) Toward a Genealogy of Individualism. Amherst, MA: University of Massachusetts Press. . Watt, Ian. (1996) Myths of Modern Individualism. Cambridge: Cambridge University Press. . Barzilai, Gad. (2003). Communities and Law.'' Ann Arbor: University of Michigan Press. . Libertarian theory
[ 0.06646760553121567, -0.11015313863754272, -0.9175581336021423, 0.18913021683692932, -0.5528836846351624, 0.426297664642334, 0.9451560378074646, 0.5276175141334534, -0.03179051727056503, -0.7262033820152283, -0.19858771562576294, 0.5076546669006348, -0.5279790163040161, 0.13271598517894745...
15187
https://en.wikipedia.org/wiki/In%20vivo
In vivo
Studies that are in vivo (Latin for "within the living"; often not italicized in English) are those in which the effects of various biological entities are tested on whole, living organisms or cells, usually animals, including humans, and plants, as opposed to a tissue extract or dead organism. This is not to be confused with experiments done in vitro ("within the glass"), i.e., in a laboratory environment using test tubes, Petri dishes, etc. Examples of investigations in vivo include: the pathogenesis of disease by comparing the effects of bacterial infection with the effects of purified bacterial toxins; the development of non-antibiotics, antiviral drugs, and new drugs generally; and new surgical procedures. Consequently, animal testing and clinical trials are major elements of in vivo research. In vivo testing is often employed over in vitro because it is better suited for observing the overall effects of an experiment on a living subject. In drug discovery, for example, verification of efficacy in vivo is crucial, because in vitro assays can sometimes yield misleading results with drug candidate molecules that are irrelevant in vivo (e.g., because such molecules cannot reach their site of in vivo action, for example as a result of rapid catabolism in the liver). The English microbiologist Professor Harry Smith and his colleagues in the mid-1950s found that sterile filtrates of serum from animals infected with Bacillus anthracis were lethal for other animals, whereas extracts of culture fluid from the same organism grown in vitro were not. This discovery of anthrax toxin through the use of in vivo experiments had a major impact on studies of the pathogenesis of infectious disease. The maxim in vivo veritas ("in a living thing [there is] truth") is used to describe this type of testing and is a play on in vino veritas, ("in wine [there is] truth"), a well-known proverb. In vivo vs. ex vivo research In microbiology, in vivo is often used to refer to experimentation done in a whole organism, rather than in live isolated cells, for example, cultured cells derived from biopsies. In this situation, the more specific term is ex vivo. Once cells are disrupted and individual parts are tested or analyzed, this is known as in vitro. Methods of use According to Christopher Lipinski and Andrew Hopkins, "Whether the aim is to discover drugs or to gain knowledge of biological systems, the nature and properties of a chemical tool cannot be considered independently of the system it is to be tested in. Compounds that bind to isolated recombinant proteins are one thing; chemical tools that can perturb cell function another; and pharmacological agents that can be tolerated by a live organism and perturb its systems are yet another. If it were simple to ascertain the properties required to develop a lead discovered in vitro to one that is active in vivo, drug discovery would be as reliable as drug manufacturing." Studies on In vivo behavior, determined the formulations of set specific drugs and their habits in a Biorelevant (or Biological relevance) medium. See also Ex vivo In natura In ovo In papyro In silico In simulacra In situ In utero In vitro In vivo imaging Vivisection References Latin biological phrases Animal test conditions
[ 0.7692732214927673, 0.11426476389169693, -0.4154835343360901, 0.24848689138889313, 0.2902471721172333, -0.4246157109737396, 0.2618040442466736, -0.24920055270195007, 0.30240097641944885, -0.31573623418807983, -0.2239353060722351, 0.5272120237350464, -0.06157407537102699, -0.031985525041818...
15188
https://en.wikipedia.org/wiki/In%20vitro
In vitro
In vitro (meaning in glass, or in the glass) studies are performed with microorganisms, cells, or biological molecules outside their normal biological context. Colloquially called "test-tube experiments", these studies in biology and its subdisciplines are traditionally done in labware such as test tubes, flasks, Petri dishes, and microtiter plates. Studies conducted using components of an organism that have been isolated from their usual biological surroundings permit a more detailed or more convenient analysis than can be done with whole organisms; however, results obtained from in vitro experiments may not fully or accurately predict the effects on a whole organism. In contrast to in vitro experiments, in vivo studies are those conducted in living organisms, including humans, and whole plants. Definition In vitro (; often not italicized in English usage) studies are conducted using components of an organism that have been isolated from their usual biological surroundings, such as microorganisms, cells, or biological molecules. For example, microorganisms or cells can be studied in artificial culture media, and proteins can be examined in solutions. Colloquially called "test-tube experiments", these studies in biology, medicine, and their subdisciplines are traditionally done in test tubes, flasks, Petri dishes, etc. They now involve the full range of techniques used in molecular biology, such as the omics. In contrast, studies conducted in living beings (microorganisms, animals, humans, or whole plants) are called in vivo. Examples Examples of in vitro studies include: the isolation, growth and identification of cells derived from multicellular organisms (in cell or tissue culture); subcellular components (e.g. mitochondria or ribosomes); cellular or subcellular extracts (e.g. wheat germ or reticulocyte extracts); purified molecules (such as proteins, DNA, or RNA); and the commercial production of antibiotics and other pharmaceutical products. Viruses, which only replicate in living cells, are studied in the laboratory in cell or tissue culture, and many animal virologists refer to such work as being in vitro to distinguish it from in vivo work in whole animals. Polymerase chain reaction is a method for selective replication of specific DNA and RNA sequences in the test tube. Protein purification involves the isolation of a specific protein of interest from a complex mixture of proteins, often obtained from homogenized cells or tissues. In vitro fertilization is used to allow spermatozoa to fertilize eggs in a culture dish before implanting the resulting embryo or embryos into the uterus of the prospective mother. In vitro diagnostics refers to a wide range of medical and veterinary laboratory tests that are used to diagnose diseases and monitor the clinical status of patients using samples of blood, cells, or other tissues obtained from a patient. In vitro testing has been used to characterize specific adsorption, distribution, metabolism, and excretion processes of drugs or general chemicals inside a living organism; for example, Caco-2 cell experiments can be performed to estimate the absorption of compounds through the lining of the gastrointestinal tract; The partitioning of the compounds between organs can be determined to study distribution mechanisms; Suspension or plated cultures of primary hepatocytes or hepatocyte-like cell lines (HepG2, HepaRG) can be used to study and quantify metabolism of chemicals. These ADME process parameters can then be integrated into so called "physiologically based pharmacokinetic models" or PBPK. Advantages In vitro studies permit a species-specific, simpler, more convenient, and more detailed analysis than can be done with the whole organism. Just as studies in whole animals more and more replace human trials, so are in vitro studies replacing studies in whole animals. Simplicity Living organisms are extremely complex functional systems that are made up of, at a minimum, many tens of thousands of genes, protein molecules, RNA molecules, small organic compounds, inorganic ions, and complexes in an environment that is spatially organized by membranes, and in the case of multicellular organisms, organ systems. These myriad components interact with each other and with their environment in a way that processes food, removes waste, moves components to the correct location, and is responsive to signalling molecules, other organisms, light, sound, heat, taste, touch, and balance. This complexity makes it difficult to identify the interactions between individual components and to explore their basic biological functions. In vitro work simplifies the system under study, so the investigator can focus on a small number of components. For example, the identity of proteins of the immune system (e.g. antibodies), and the mechanism by which they recognize and bind to foreign antigens would remain very obscure if not for the extensive use of in vitro work to isolate the proteins, identify the cells and genes that produce them, study the physical properties of their interaction with antigens, and identify how those interactions lead to cellular signals that activate other components of the immune system. Species specificity Another advantage of in vitro methods is that human cells can be studied without "extrapolation" from an experimental animal's cellular response. Convenience, automation In vitro methods can be miniaturized and automated, yielding high-throughput screening methods for testing molecules in pharmacology or toxicology. Disadvantages The primary disadvantage of in vitro experimental studies is that it may be challenging to extrapolate from the results of in vitro work back to the biology of the intact organism. Investigators doing in vitro work must be careful to avoid over-interpretation of their results, which can lead to erroneous conclusions about organismal and systems biology. For example, scientists developing a new viral drug to treat an infection with a pathogenic virus (e.g., HIV-1) may find that a candidate drug functions to prevent viral replication in an in vitro setting (typically cell culture). However, before this drug is used in the clinic, it must progress through a series of in vivo trials to determine if it is safe and effective in intact organisms (typically small animals, primates, and humans in succession). Typically, most candidate drugs that are effective in vitro prove to be ineffective in vivo because of issues associated with delivery of the drug to the affected tissues, toxicity towards essential parts of the organism that were not represented in the initial in vitro studies, or other issues. In vitro to in vivo extrapolation Results obtained from in vitro experiments cannot usually be transposed, as is, to predict the reaction of an entire organism in vivo. Building a consistent and reliable extrapolation procedure from in vitro results to in vivo is therefore extremely important. Solutions include: Increasing the complexity of in vitro systems to reproduce tissues and interactions between them (as in "human on chip" systems) Using mathematical modeling to numerically simulate the behavior of the complex system, where the in vitro data provide model parameter values These two approaches are not incompatible; better in vitro systems provide better data to mathematical models. However, increasingly sophisticated in vitro experiments collect increasingly numerous, complex, and challenging data to integrate. Mathematical models, such as systems biology models, are much needed here. Extrapolating in pharmacology In pharmacology, IVIVE can be used to approximate pharmacokinetics (PK) or pharmacodynamics (PD). Since the timing and intensity of effects on a given target depend on the concentration time course of candidate drug (parent molecule or metabolites) at that target site, in vivo tissue and organ sensitivities can be completely different or even inverse of those observed on cells cultured and exposed in vitro. That indicates that extrapolating effects observed in vitro needs a quantitative model of in vivo PK. Physiologically based PK (PBPK) models are generally accepted to be central to the extrapolations. In the case of early effects or those without intercellular communications, the same cellular exposure concentration is assumed to cause the same effects, both qualitatively and quantitatively, in vitro and in vivo. In these conditions, developing a simple PD model of the dose–response relationship observed in vitro, and transposing it without changes to predict in vivo effects is not enough. See also Animal testing Ex vivo In situ In utero In vivo In silico In papyro In natura Animal in vitro cellular and developmental biology Plant in vitro cellular and developmental biology In vitro toxicology In vitro to in vivo extrapolation Slice preparation References External links Latin biological phrases Alternatives to animal testing Animal test conditions Laboratory techniques
[ 0.4812605082988739, 0.2258927971124649, -0.525886595249176, 0.3367021679878235, 0.11694680899381638, 0.02198098599910736, 0.181266650557518, -0.3261291980743408, 0.2473226636648178, -0.4937829375267029, -0.051480747759342194, 0.5554974675178528, -0.09450861066579819, 0.09835082292556763, ...
15189
https://en.wikipedia.org/wiki/IEEE%20754-1985
IEEE 754-1985
IEEE 754-1985 was an industry standard for representing floating-point numbers in computers, officially adopted in 1985 and superseded in 2008 by IEEE 754-2008, and then again in 2019 by minor revision IEEE 754-2019. During its 23 years, it was the most widely used format for floating-point computation. It was implemented in software, in the form of floating-point libraries, and in hardware, in the instructions of many CPUs and FPUs. The first integrated circuit to implement the draft of what was to become IEEE 754-1985 was the Intel 8087. IEEE 754-1985 represents numbers in binary, providing definitions for four levels of precision, of which the two most commonly used are: The standard also defines representations for positive and negative infinity, a "negative zero", five exceptions to handle invalid results like division by zero, special values called NaNs for representing those exceptions, denormal numbers to represent numbers smaller than shown above, and four rounding modes. Representation of numbers Floating-point numbers in IEEE 754 format consist of three fields: a sign bit, a biased exponent, and a fraction. The following example illustrates the meaning of each. The decimal number 0.1562510 represented in binary is 0.001012 (that is, 1/8 + 1/32). (Subscripts indicate the number base.) Analogous to scientific notation, where numbers are written to have a single non-zero digit to the left of the decimal point, we rewrite this number so it has a single 1 bit to the left of the "binary point". We simply multiply by the appropriate power of 2 to compensate for shifting the bits left by three positions: Now we can read off the fraction and the exponent: the fraction is .012 and the exponent is −3. As illustrated in the pictures, the three fields in the IEEE 754 representation of this number are: sign = 0, because the number is positive. (1 indicates negative.) biased exponent = −3 + the "bias". In single precision, the bias is 127, so in this example the biased exponent is 124; in double precision, the bias is 1023, so the biased exponent in this example is 1020. fraction = .01000…2. IEEE 754 adds a bias to the exponent so that numbers can in many cases be compared conveniently by the same hardware that compares signed 2's-complement integers. Using a biased exponent, the lesser of two positive floating-point numbers will come out "less than" the greater following the same ordering as for sign and magnitude integers. If two floating-point numbers have different signs, the sign-and-magnitude comparison also works with biased exponents. However, if both biased-exponent floating-point numbers are negative, then the ordering must be reversed. If the exponent were represented as, say, a 2's-complement number, comparison to see which of two numbers is greater would not be as convenient. The leading 1 bit is omitted since all numbers except zero start with a leading 1; the leading 1 is implicit and doesn't actually need to be stored which gives an extra bit of precision for "free." Zero The number zero is represented specially: sign = 0 for positive zero, 1 for negative zero. biased exponent = 0. fraction = 0. Denormalized numbers The number representations described above are called normalized, meaning that the implicit leading binary digit is a 1. To reduce the loss of precision when an underflow occurs, IEEE 754 includes the ability to represent fractions smaller than are possible in the normalized representation, by making the implicit leading digit a 0. Such numbers are called denormal. They don't include as many significant digits as a normalized number, but they enable a gradual loss of precision when the result of an operation is not exactly zero but is too close to zero to be represented by a normalized number. A denormal number is represented with a biased exponent of all 0 bits, which represents an exponent of −126 in single precision (not −127), or −1022 in double precision (not −1023). In contrast, the smallest biased exponent representing a normal number is 1 (see examples below). Representation of non-numbers The biased-exponent field is filled with all 1 bits to indicate either infinity or an invalid result of a computation. Positive and negative infinity Positive and negative infinity are represented thus: sign = 0 for positive infinity, 1 for negative infinity. biased exponent = all 1 bits. fraction = all 0 bits. NaN Some operations of floating-point arithmetic are invalid, such as taking the square root of a negative number. The act of reaching an invalid result is called a floating-point exception. An exceptional result is represented by a special code called a NaN, for "Not a Number". All NaNs in IEEE 754-1985 have this format: sign = either 0 or 1. biased exponent = all 1 bits. fraction = anything except all 0 bits (since all 0 bits represents infinity). Range and precision Precision is defined as the minimum difference between two successive mantissa representations; thus it is a function only in the mantissa; while the gap is defined as the difference between two successive numbers. Single precision Single-precision numbers occupy 32 bits. In single precision: The positive and negative numbers closest to zero (represented by the denormalized value with all 0s in the exponent field and the binary value 1 in the fraction field) are ±2−23 × 2−126 ≈ ±1.40130 The positive and negative normalized numbers closest to zero (represented with the binary value 1 in the exponent field and 0 in the fraction field) are ±1 × 2−126 ≈ ±1.17549 The finite positive and finite negative numbers furthest from zero (represented by the value with 254 in the exponent field and all 1s in the fraction field) are ±(2−2−23) × 2127 ≈ ±3.40282 Some example range and gap values for given exponents in single precision: As an example, 16,777,217 cannot be encoded as a 32-bit float as it will be rounded to 16,777,216. This shows why floating point arithmetic is unsuitable for accounting software. However, all integers within the representable range that are a power of 2 can be stored in a 32-bit float without rounding. Double precision Double-precision numbers occupy 64 bits. In double precision: The positive and negative numbers closest to zero (represented by the denormalized value with all 0s in the Exp field and the binary value 1 in the Fraction field) are ±2−52 × 2−1022 ≈ ±4.94066 The positive and negative normalized numbers closest to zero (represented with the binary value 1 in the Exp field and 0 in the fraction field) are ±1 × 2−1022 ≈ ±2.22507 The finite positive and finite negative numbers furthest from zero (represented by the value with 2046 in the Exp field and all 1s in the fraction field) are ±(2−2−52) × 21023 ≈ ±1.79769 Some example range and gap values for given exponents in double precision: Extended formats The standard also recommends extended format(s) to be used to perform internal computations at a higher precision than that required for the final result, to minimise round-off errors: the standard only specifies minimum precision and exponent requirements for such formats. The x87 80-bit extended format is the most commonly implemented extended format that meets these requirements. Examples Here are some examples of single-precision IEEE 754 representations: Comparing floating-point numbers Every possible bit combination is either a NaN or a number with a unique value in the affinely extended real number system with its associated order, except for the two combinations of bits for negative zero and positive zero, which sometimes require special attention (see below). The binary representation has the special property that, excluding NaNs, any two numbers can be compared as sign and magnitude integers (endianness issues apply). When comparing as 2's-complement integers: If the sign bits differ, the negative number precedes the positive number, so 2's complement gives the correct result (except that negative zero and positive zero should be considered equal). If both values are positive, the 2's complement comparison again gives the correct result. Otherwise (two negative numbers), the correct FP ordering is the opposite of the 2's complement ordering. Rounding errors inherent to floating point calculations may limit the use of comparisons for checking the exact equality of results. Choosing an acceptable range is a complex topic. A common technique is to use a comparison epsilon value to perform approximate comparisons. Depending on how lenient the comparisons are, common values include 1e-6 or 1e-5 for single-precision, and 1e-14 for double-precision. Another common technique is ULP, which checks what the difference is in the last place digits, effectively checking how many steps away the two values are. Although negative zero and positive zero are generally considered equal for comparison purposes, some programming language relational operators and similar constructs treat them as distinct. According to the Java Language Specification, comparison and equality operators treat them as equal, but Math.min() and Math.max() distinguish them (officially starting with Java version 1.1 but actually with 1.1.1), as do the comparison methods equals(), compareTo() and even compare() of classes Float and Double. Rounding floating-point numbers The IEEE standard has four different rounding modes; the first is the default; the others are called directed roundings. Round to Nearest – rounds to the nearest value; if the number falls midway it is rounded to the nearest value with an even (zero) least significant bit, which means it is rounded up 50% of the time (in IEEE 754-2008 this mode is called roundTiesToEven to distinguish it from another round-to-nearest mode) Round toward 0 – directed rounding towards zero Round toward +∞ – directed rounding towards positive infinity Round toward −∞ – directed rounding towards negative infinity. Extending the real numbers The IEEE standard employs (and extends) the affinely extended real number system, with separate positive and negative infinities. During drafting, there was a proposal for the standard to incorporate the projectively extended real number system, with a single unsigned infinity, by providing programmers with a mode selection option. In the interest of reducing the complexity of the final standard, the projective mode was dropped, however. The Intel 8087 and Intel 80287 floating point co-processors both support this projective mode. Functions and predicates Standard operations The following functions must be provided: Add, subtract, multiply, divide Square root Floating point remainder. This is not like a normal modulo operation, it can be negative for two positive numbers. It returns the exact value of . Round to nearest integer. For undirected rounding when halfway between two integers the even integer is chosen. Comparison operations. Besides the more obvious results, IEEE 754 defines that −∞ = −∞, +∞ = +∞ and x ≠ NaN for any x (including NaN). Recommended functions and predicates copysign(x,y) returns x with the sign of y, so abs(x) equals copysign(x,1.0). This is one of the few operations which operates on a NaN in a way resembling arithmetic. The function copysign is new in the C99 standard. −x returns x with the sign reversed. This is different from 0−x in some cases, notably when x is 0. So −(0) is −0, but the sign of 0−0 depends on the rounding mode. scalb(y, N) logb(x) finite(x) a predicate for "x is a finite value", equivalent to −Inf < x < Inf isnan(x) a predicate for "x is a NaN", equivalent to "x ≠ x" x <> y, which turns out to have different behavior than NOT(x = y) due to NaN. unordered(x, y) is true when "x is unordered with y", i.e., either x or y is a NaN. class(x) nextafter(x,y) returns the next representable value from x in the direction towards y History In 1976, Intel was starting the development of a floating-point coprocessor. Intel hoped to be able to sell a chip containing good implementations of all the operations found in the widely varying maths software libraries. John Palmer, who managed the project, believed the effort should be backed by a standard unifying floating point operations across disparate processors. He contacted William Kahan of the University of California, who had helped improve the accuracy of Hewlett-Packard's calculators. Kahan suggested that Intel use the floating point of Digital Equipment Corporation's (DEC) VAX. The first VAX, the VAX-11/780 had just come out in late 1977, and its floating point was highly regarded. However, seeking to market their chip to the broadest possible market, Intel wanted the best floating point possible, and Kahan went on to draw up specifications. Kahan initially recommended that the floating point base be decimal but the hardware design of the coprocessor was too far along to make that change. The work within Intel worried other vendors, who set up a standardization effort to ensure a "level playing field". Kahan attended the second IEEE 754 standards working group meeting, held in November 1977. He subsequently received permission from Intel to put forward a draft proposal based on his work for their coprocessor; he was allowed to explain details of the format and its rationale, but not anything related to Intel's implementation architecture. The draft was co-written with Jerome Coonen and Harold Stone, and was initially known as the "Kahan-Coonen-Stone proposal" or "K-C-S format". As an 8-bit exponent was not wide enough for some operations desired for double-precision numbers, e.g. to store the product of two 32-bit numbers, both Kahan's proposal and a counter-proposal by DEC therefore used 11 bits, like the time-tested 60-bit floating-point format of the CDC 6600 from 1965. Kahan's proposal also provided for infinities, which are useful when dealing with division-by-zero conditions; not-a-number values, which are useful when dealing with invalid operations; denormal numbers, which help mitigate problems caused by underflow; and a better balanced exponent bias, which can help avoid overflow and underflow when taking the reciprocal of a number. Even before it was approved, the draft standard had been implemented by a number of manufacturers. The Intel 8087, which was announced in 1980, was the first chip to implement the draft standard. In 1980, the Intel 8087 chip was already released, but DEC remained opposed, to denormal numbers in particular, because of performance concerns and since it would give DEC a competitive advantage to standardise on DEC's format. The arguments over gradual underflow lasted until 1981 when an expert hired by DEC to assess it sided against the dissenters. DEC had the study done in order to demonstrate that gradual underflow was a bad idea, but the study concluded the opposite, and DEC gave in. In 1985, the standard was ratified, but it had already become the de facto standard a year earlier, implemented by many manufacturers. See also IEEE 754 Minifloat for simple examples of properties of IEEE 754 floating point numbers Fixed-point arithmetic Notes References Further reading : A compendium of non-intuitive behaviours of floating-point on popular architectures, with implications for program verification and testing. External links Comparing floats Coprocessor.info: x87 FPU pictures, development and manufacturer information IEEE 854-1987 — History and minutes IEEE754 (Single and Double precision) Online Converter Computer arithmetic IEEE standards Floating point Computer-related introductions in 1985
[ -0.24377985298633575, 0.3600836396217346, 0.6606159210205078, 0.1422491818666458, -0.22069841623306274, 0.1516469568014145, -0.5337249636650085, -0.044894151389598846, -0.5631970763206482, 0.1309409886598587, -0.023868635296821594, 0.34094664454460144, -0.08239588886499405, 0.0720135718584...
15190
https://en.wikipedia.org/wiki/Intel%2080186
Intel 80186
The Intel 80186, also known as the iAPX 186, or just 186, is a microprocessor and microcontroller introduced in 1982. It was based on the Intel 8086 and, like it, had a 16-bit external data bus multiplexed with a 20-bit address bus. The 80188 variant, with an 8-bit external data bus was also available. Description The 80186 series was generally intended for embedded systems, as microcontrollers with external memory. Therefore, to reduce the number of integrated circuits required, it included features such as clock generator, interrupt controller, timers, wait state generator, DMA channels, and external chip select lines. The initial clock rate of the 80186 was 6 MHz, but due to more hardware available for the microcode to use, especially for address calculation, many individual instructions ran faster than on an 8086 at the same clock frequency. For instance, the common register+immediate addressing mode was significantly faster than on the 8086, especially when a memory location was both (one of) the operand(s) and the destination. Multiply and divide also showed great improvement being several times as fast as on the original 8086 and multi-bit shifts were done almost four times as quickly as in the 8086. A few new instructions were introduced with the 80186 (referred to as the 8086-2 instruction set in some datasheets): enter/leave (replacing several instructions when handling stack frames), pusha/popa (push/pop all general registers), bound (check array index against bounds), and ins/outs (input/output of string). A useful immediate mode was added for the push, imul, and multi-bit shift instructions. These instructions were also included in the contemporary 80286 and in successor chips. (The instruction set of the 80286 is superset of the 80186's, plus new instructions for protected mode.) The (redesigned) CMOS version, 80C186, introduced DRAM refresh, a power-save mode, and a direct interface to the 80C187 floating point numeric coprocessor. Intel second sourced this microprocessor to Fujitsu Limited around 1985. Uses In personal computers The 80186 would have been a natural successor to the 8086 in personal computers. However, because its integrated hardware was incompatible with the hardware used in the original IBM PC, the 80286 was used as the successor instead, in the IBM PC/AT. A few notable personal computers used the 80186: the Australian Dulmont Magnum laptop, one of the first laptops; the Wang Office Assistant, marketed as a PC-like stand-alone word processor; the Mindset; the Siemens (not 100% IBM PC compatible but using MS-DOS 2.11); the Compis (a Swedish school computer); the French SMT-Goupil G4; the RM Nimbus (a British school computer); the Unisys ICON (a Canadian school computer); ORB Computer by ABS; the HP 100LX, HP 200LX, HP 1000CX, and HP OmniGo 700LX; the Tandy 2000 desktop (a somewhat PC-compatible workstation with sharp graphics for its day); the Telex 1260 (a desktop PC-XT compatible); the Philips :YES; the Nokia MikroMikko 2; and the IBM PCradio. Acorn created a plug-in for the BBC Master range of computers containing an 80186-10 with 512 KB of RAM, the BBC Master 512 system. In addition to the above examples of stand-alone implementations of the 80186 for personal computers, there was at least one example of an "add-in" accelerator card implementation: the Orchid Technology PC Turbo 186, released in 1985. It was intended for use with the original Intel 8088-based IBM PC (Model 5150). Other devices The Intel 80186 is intended to be embedded in electronic devices that are not primarily computers. For example: the 80186 was used to control the Microtek 8086 in-circuit emulator its offshoot, Intel 80188 was embedded inside the Intel 14.4EX modem released in 1991. The 16 MHz processor was used to perform complex algorithms needed for forward error correction, Trellis modulation, and echo cancellation in the modem the IBM 7171 protocol converter, which made ASCII character-oriented terminals appear as an IBM 3270 terminal to an IBM mainframe, used the Intel 80186 as its CPU. In May 2006, Intel announced that production of the 186 would cease at the end of September 2007. Pin- and instruction-compatible replacements might still be manufactured by various third party sources, and FPGA versions are publicly available. See also iAPX, for the iAPX name NEC V20/V30, for a third-party CPU also supporting the 80186 instructions Notes References External links Intel Datasheet Scan of the Intel 80186 data book at datasheetarchive.com Intel 80186/80188 images and descriptions at cpu-collection.de Chipdb.org Intel microcontrollers 80186 16-bit microprocessors
[ 0.23604236543178558, -0.0844440832734108, 0.3476565480232239, 0.2115449756383896, -0.43290719389915466, 0.1284097582101822, -0.041834548115730286, 0.06213878095149994, -0.03198406100273132, 0.015231096185743809, 0.028467832133173943, 0.6310603618621826, -0.3577893376350403, -0.076598428189...
15191
https://en.wikipedia.org/wiki/Inquisition
Inquisition
The Inquisition or Holy Inquisition was a group of institutions within the Catholic Church whose aim was to combat heresy, conducting trials of suspected heretics. Studies of the records have found that the overwhelming majority of sentences consisted of penances, but that cases of repeat unrepentant heretics were handed over to the secular courts, which generally resulted in execution or life imprisonment. The Inquisition had its start in 12th-century Kingdom of France, with the aim of combating religious deviation (e.g. apostasy or heresy), particularly among the Cathars and the Waldensians. The inquisitorial courts from this time until the mid-15th century are together known as the Medieval Inquisition. Other groups investigated during the Medieval Inquisition, which primarily took place in France and Italy, including the Spiritual Franciscans, the Hussites, and the Beguines. Beginning in the 1250s, inquisitors were generally chosen from members of the Dominican Order, replacing the earlier practice of using local clergy as judges. During the Late Middle Ages and the early Renaissance, the scope of the Inquisition grew significantly in response to the Protestant Reformation and the Catholic Counter-Reformation. During this period, the Inquisition conducted by the Holy See was known as the Roman Inquisition. The Inquisition also expanded to other European countries, resulting in the Spanish Inquisition and the Portuguese Inquisition. The Spanish and Portuguese Inquisitions focused particularly on the anusim (people who were forced to abandon Judaism against their will) and on Muslim converts to Catholicism. The scale of the persecution of converted Muslims and converted Jews in Spain and Portugal was the result of suspicions that they had secretly reverted to their previous religions, although both religious minority groups were also more numerous on the Iberian Peninsula than in other parts of Europe. During this time, Spain and Portugal operated inquisitorial courts not only in Europe, but also throughout their empires in Africa, Asia, and the Americas. This resulted in the Goa Inquisition, the Peruvian Inquisition, and the Mexican Inquisition, among others. With the exception of the Papal States, the institution of the Inquisition was abolished in the early 19th century, after the Napoleonic Wars in Europe and the Spanish American wars of independence in the Americas. The institution survived as part of the Roman Curia, but in 1908 it was renamed the Supreme Sacred Congregation of the Holy Office. In 1965, it became the Congregation for the Doctrine of the Faith. Definition and purpose The term "Inquisition" comes from the Medieval Latin word , which described any court process based on Roman law, which had gradually come back into use during the Late Middle Ages. Today, the English term "Inquisition" can apply to any one of several institutions that worked against heretics (or other offenders against canon law) within the judicial system of the Roman Catholic Church. Although the term "Inquisition" is usually applied to ecclesiastical courts of the Catholic Church, it refers to a judicial process, not an organization. Inquisitors '...were called such because they applied a judicial technique known as inquisitio, which could be translated as "inquiry" or "inquest".' In this process, which was already widely used by secular rulers (Henry II used it extensively in England in the twelfth century), an official inquirer called for information on a specific subject from anyone who felt he or she had something to offer." The Inquisition, as a church-court, had no jurisdiction over Muslims and Jews as such. Generally, the Inquisition was concerned only with the heretical behaviour of Catholic adherents or converts. The overwhelming majority of sentences seem to have consisted of penances like wearing a cross sewn on one's clothes, going on pilgrimage, etc. When a suspect was convicted of unrepentant heresy, canon law required the inquisitorial tribunal to hand the person over to secular authorities for final sentencing. A secular magistrate, the "secular arm", would then determine the penalty based on local law. Those local laws included proscriptions against certain religious crimes (heresy, etc.), and the punishments included death by burning, although the penalty was more usually banishment or imprisonment for life, which was generally commuted after a few years. Thus the inquisitors generally knew the fate which expected anyone so remanded. The 1578 edition of the Directorium Inquisitorum (a standard Inquisitorial manual) spelled out the purpose of inquisitorial penalties: ... quoniam punitio non refertur primo & per se in correctionem & bonum eius qui punitur, sed in bonum publicum ut alij terreantur, & a malis committendis avocentur (translation: "... for punishment does not take place primarily and per se for the correction and good of the person punished, but for the public good in order that others may become terrified and weaned away from the evils they would commit"). Origin Before 1100, the Catholic Church suppressed what they believed to be heresy, usually through a system of ecclesiastical proscription or imprisonment, but without using torture, and seldom resorting to executions. Such punishments were opposed by a number of clergymen and theologians, although some countries punished heresy with the death penalty. Pope Siricius, Ambrose of Milan, and Martin of Tours protested against the execution of Priscillian, largely as an undue interference in ecclesiastical discipline by a civil tribunal. Though widely viewed as a heretic, Priscillian was executed as a sorcerer. Ambrose refused to give any recognition to Ithacius of Ossonuba, "not wishing to have anything to do with bishops who had sent heretics to their death". In the 12th century, to counter the spread of Catharism, prosecution of heretics became more frequent. The Church charged councils composed of bishops and archbishops with establishing inquisitions (the Episcopal Inquisition). The first Inquisition was temporarily established in Languedoc (south of France) in 1184. The murder of Pope Innocent's papal legate Pierre de Castelnau in 1208 sparked the Albigensian Crusade (1209–1229). The Inquisition was permanently established in 1229 (Council of Toulouse), run largely by the Dominicans in Rome and later at Carcassonne in Languedoc. Medieval Inquisition Historians use the term "Medieval Inquisition" to describe the various inquisitions that started around 1184, including the Episcopal Inquisition (1184–1230s) and later the Papal Inquisition (1230s). These inquisitions responded to large popular movements throughout Europe considered apostate or heretical to Christianity, in particular the Cathars in southern France and the Waldensians in both southern France and northern Italy. Other Inquisitions followed after these first inquisition movements. The legal basis for some inquisitorial activity came from Pope Innocent IV's papal bull Ad extirpanda of 1252, which explicitly authorized (and defined the appropriate circumstances for) the use of torture by the Inquisition for eliciting confessions from heretics. However, Nicholas Eymerich, the inquisitor who wrote the "Directorium Inquisitorum", stated: 'Quaestiones sunt fallaces et ineficaces' ("interrogations via torture are misleading and futile"). By 1256 inquisitors were given absolution if they used instruments of torture. In the 13th century, Pope Gregory IX (reigned 1227–1241) assigned the duty of carrying out inquisitions to the Dominican Order and Franciscan Order. By the end of the Middle Ages, England and Castile were the only large western nations without a papal inquisition. Most inquisitors were friars who taught theology and/or law in the universities. They used inquisitorial procedures, a common legal practice adapted from the earlier Ancient Roman court procedures. They judged heresy along with bishops and groups of "assessors" (clergy serving in a role that was roughly analogous to a jury or legal advisers), using the local authorities to establish a tribunal and to prosecute heretics. After 1200, a Grand Inquisitor headed each Inquisition. Grand Inquisitions persisted until the mid 19th century. Early Modern European history With the sharpening of debate and of conflict between the Protestant Reformation and the Catholic Counter-Reformation, Protestant societies came to see/use the Inquisition as a terrifying "Other", while staunch Catholics regarded the Holy Office as a necessary bulwark against the spread of reprehensible heresies. Witch-trials While belief in witchcraft, and persecutions directed at or excused by it, were widespread in pre-Christian Europe, and reflected in Germanic law, the influence of the Church in the early medieval era resulted in the revocation of these laws in many places, bringing an end to traditional pagan witch hunts. Throughout the medieval era, mainstream Christian teaching had denied the existence of witches and witchcraft, condemning it as pagan superstition. However, Christian influence on popular beliefs in witches and maleficium (harm committed by magic) failed to entirely eradicate folk belief in witches. The fierce denunciation and persecution of supposed sorceresses that characterized the cruel witchhunts of a later age were not generally found in the first thirteen hundred years of the Christian era. The medieval Church distinguished between "white" and "black" magic. Local folk practice often mixed chants, incantations, and prayers to the appropriate patron saint to ward off storms, to protect cattle, or ensure a good harvest. Bonfires on Midsummer's Eve were intended to deflect natural catastrophes or the influence of fairies, ghosts, and witches. Plants, often harvested under particular conditions, were deemed effective in healing. Black magic was that which was used for a malevolent purpose. This was generally dealt with through confession, repentance, and charitable work assigned as penance. Early Irish canons treated sorcery as a crime to be visited with excommunication until adequate penance had been performed. In 1258, Pope Alexander IV ruled that inquisitors should limit their involvement to those cases in which there was some clear presumption of heretical belief. The prosecution of witchcraft generally became more prominent in the late medieval and Renaissance era, perhaps driven partly by the upheavals of the era – the Black Death, the Hundred Years War, and a gradual cooling of the climate that modern scientists call the Little Ice Age (between about the 15th and 19th centuries). Witches were sometimes blamed. Since the years of most intense witch-hunting largely coincide with the age of the Reformation, some historians point to the influence of the Reformation on the European witch-hunt. Dominican priest Heinrich Kramer was assistant to the Archbishop of Salzburg. In 1484 Kramer requested that Pope Innocent VIII clarify his authority to prosecute witchcraft in Germany, where he had been refused assistance by the local ecclesiastical authorities. They maintained that Kramer could not legally function in their areas. The papal bull Summis desiderantes affectibus sought to remedy this jurisdictional dispute by specifically identifying the dioceses of Mainz, Köln, Trier, Salzburg, and Bremen. Some scholars view the bull as "clearly political". The bull failed to ensure that Kramer obtained the support he had hoped for. In fact he was subsequently expelled from the city of Innsbruck by the local bishop, George Golzer, who ordered Kramer to stop making false accusations. Golzer described Kramer as senile in letters written shortly after the incident. This rebuke led Kramer to write a justification of his views on witchcraft in his 1486 book Malleus Maleficarum ("Hammer against witches"). In the book, Kramer stated his view that witchcraft was to blame for bad weather. The book is also noted for its animus against women. Despite Kramer's claim that the book gained acceptance from the clergy at the University of Cologne, it was in fact condemned by the clergy at Cologne for advocating views that violated Catholic doctrine and standard inquisitorial procedure. In 1538 the Spanish Inquisition cautioned its members not to believe everything the Malleus said. Spanish Inquisition Portugal and Spain in the late Middle Ages consisted largely of multicultural territories of Muslim and Jewish influence, reconquered from Islamic control, and the new Christian authorities could not assume that all their subjects would suddenly become and remain orthodox Roman Catholics. So the Inquisition in Iberia, in the lands of the Reconquista counties and kingdoms like León, Castile, and Aragon, had a special socio-political basis as well as more fundamental religious motives. In some parts of Spain towards the end of the 14th century, there was a wave of violent anti-Judaism, encouraged by the preaching of Ferrand Martinez, Archdeacon of Écija. In the pogroms of June 1391 in Seville, hundreds of Jews were killed, and the synagogue was completely destroyed. The number of people killed was also high in other cities, such as Córdoba, Valencia, and Barcelona. One of the consequences of these pogroms was the mass conversion of thousands of surviving Jews. Forced baptism was contrary to the law of the Catholic Church, and theoretically anybody who had been forcibly baptized could legally return to Judaism. However, this was very narrowly interpreted. Legal definitions of the time theoretically acknowledged that a forced baptism was not a valid sacrament, but confined this to cases where it was literally administered by physical force. A person who had consented to baptism under threat of death or serious injury was still regarded as a voluntary convert, and accordingly forbidden to revert to Judaism. After the public violence, many of the converted "felt it safer to remain in their new religion". Thus, after 1391, a new social group appeared and were referred to as conversos or New Christians. King Ferdinand II of Aragon and Queen Isabella I of Castile established the Spanish Inquisition in 1478. In contrast to the previous inquisitions, it operated completely under royal Christian authority, though staffed by clergy and orders, and independently of the Holy See. It operated in Spain and in most Spanish colonies and territories, which included the Canary Islands, the Kingdom of Sicily, and all Spanish possessions in North, Central, and South America. It primarily focused upon forced converts from Islam (Moriscos, Conversos and secret Moors) and from Judaism (Conversos, Crypto-Jews and Marranos)—both groups still resided in Spain after the end of the Islamic control of Spain—who came under suspicion of either continuing to adhere to their old religion or of having fallen back into it. In 1492 all Jews who had not converted were expelled from Spain; those who converted became nominal Catholics and thus subject to the Inquisition. Inquisition in the Spanish overseas empire In the Americas, King Philip II set up three tribunals (each formally titled Tribunal del Santo Oficio de la Inquisición) in 1569, one in Mexico, Cartagena de Indias (in modern-day Colombia) and Peru. The Mexican office administered Mexico (central and southeastern Mexico), Nueva Galicia (northern and western Mexico), the Audiencias of Guatemala (Guatemala, Chiapas, El Salvador, Honduras, Nicaragua, Costa Rica), and the Spanish East Indies. The Peruvian Inquisition, based in Lima, administered all the Spanish territories in South America and Panama. Portuguese Inquisition The Portuguese Inquisition formally started in Portugal in 1536 at the request of King João III. Manuel I had asked Pope Leo X for the installation of the Inquisition in 1515, but only after his death in 1521 did Pope Paul III acquiesce. At its head stood a Grande Inquisidor, or General Inquisitor, named by the Pope but selected by the Crown, and always from within the royal family. The Portuguese Inquisition principally focused upon the Sephardi Jews, whom the state forced to convert to Christianity. Spain had expelled its Sephardi population in 1492; many of these Spanish Jews left Spain for Portugal but eventually were subject to inquisition there as well. The Portuguese Inquisition held its first auto-da-fé in 1540. The Portuguese inquisitors mostly focused upon the Jewish New Christians (i.e. conversos or marranos). The Portuguese Inquisition expanded its scope of operations from Portugal to its colonial possessions, including Brazil, Cape Verde, and Goa. In the colonies, it continued as a religious court, investigating and trying cases of breaches of the tenets of orthodox Roman Catholicism until 1821. King João III (reigned 1521–57) extended the activity of the courts to cover censorship, divination, witchcraft, and bigamy. Originally oriented for a religious action, the Inquisition exerted an influence over almost every aspect of Portuguese society: political, cultural, and social. According to Henry Charles Lea, between 1540 and 1794, tribunals in Lisbon, Porto, Coimbra, and Évora resulted in the burning of 1,175 persons, the burning of another 633 in effigy, and the penancing of 29,590. But documentation of 15 out of 689 autos-da-fé has disappeared, so these numbers may slightly understate the activity. Inquisition in the Portuguese overseas empire Goa Inquisition The Goa Inquisition began in 1560 at the order of John III of Portugal. It had originally been requested in a letter in the 1540s by Jesuit priest Francis Xavier, because of the New Christians who had arrived in Goa and then reverted to Judaism. The Goa Inquisition also focused upon Catholic converts from Hinduism or Islam who were thought to have returned to their original ways. In addition, this inquisition prosecuted non-converts who broke prohibitions against the public observance of Hindu or Muslim rites or interfered with Portuguese attempts to convert non-Christians to Catholicism. Aleixo Dias Falcão and Francisco Marques set it up in the palace of the Sabaio Adil Khan. Brazilian Inquisition The inquisition was active in colonial Brazil. The religious mystic and formerly enslaved prostitute, Rosa Egipcíaca was arrested, interrogated and imprisoned, both in the colony and in Lisbon. Egipcíaca was the first black woman in Brazil to write a book - this work detailed her visions and was entitled Sagrada Teologia do Amor Divino das Almas Peregrinas. Roman Inquisition With the Protestant Reformation, Catholic authorities became much more ready to suspect heresy in any new ideas, including those of Renaissance humanism, previously strongly supported by many at the top of the Church hierarchy. The extirpation of heretics became a much broader and more complex enterprise, complicated by the politics of territorial Protestant powers, especially in northern Europe. The Catholic Church could no longer exercise direct influence in the politics and justice-systems of lands that officially adopted Protestantism. Thus war (the French Wars of Religion, the Thirty Years' War), massacre (the St. Bartholomew's Day massacre) and the missional and propaganda work (by the Sacra congregatio de propaganda fide) of the Counter-Reformation came to play larger roles in these circumstances, and the Roman law type of a "judicial" approach to heresy represented by the Inquisition became less important overall. In 1542 Pope Paul III established the Congregation of the Holy Office of the Inquisition as a permanent congregation staffed with cardinals and other officials. It had the tasks of maintaining and defending the integrity of the faith and of examining and proscribing errors and false doctrines; it thus became the supervisory body of local Inquisitions. Arguably the most famous case tried by the Roman Inquisition was that of Galileo Galilei in 1633. The penances and sentences for those who confessed or were found guilty were pronounced together in a public ceremony at the end of all the processes. This was the sermo generalis or auto-da-fé. Penances (not matters for the civil authorities) might consist of a pilgrimage, a public scourging, a fine, or the wearing of a cross. The wearing of two tongues of red or other brightly colored cloth, sewn onto an outer garment in an "X" pattern, marked those who were under investigation. The penalties in serious cases were confiscation of property by the Inquisition or imprisonment. This led to the possibility of false charges to enable confiscation being made against those over a certain income, particularly rich marranos. Following the French invasion of 1798, the new authorities sent 3,000 chests containing over 100,000 Inquisition documents to France from Rome. Ending of the Inquisition in the 19th and 20th centuries By decree of Napoleon's government in 1797, the Inquisition in Venice was abolished in 1806. In Portugal, in the wake of the Liberal Revolution of 1820, the "General Extraordinary and Constituent Courts of the Portuguese Nation" abolished the Portuguese inquisition in 1821. The wars of independence of the former Spanish colonies in the Americas concluded with the abolition of the Inquisition in every quarter of Hispanic America between 1813 and 1825. The last execution of the Inquisition was in Spain in 1826. This was the execution by garroting of the school teacher Cayetano Ripoll for purportedly teaching Deism in his school. In Spain the practices of the Inquisition were finally outlawed in 1834. In Italy, the restoration of the Pope as the ruler of the Papal States in 1814 brought back the Inquisition to the Papal States. It remained active there until the late-19th century, notably in the well-publicised Mortara affair (1858–1870). In 1908 the name of the Congregation became "The Sacred Congregation of the Holy Office", which in 1965 further changed to "Congregation for the Doctrine of the Faith", as retained to . Statistics Beginning in the 19th century, historians have gradually compiled statistics drawn from the surviving court records, from which estimates have been calculated by adjusting the recorded number of convictions by the average rate of document loss for each time period. Gustav Henningsen and Jaime Contreras studied the records of the Spanish Inquisition, which list 44,674 cases of which 826 resulted in executions in person and 778 in effigy (i.e. a straw dummy was burned in place of the person). William Monter estimated there were 1000 executions between 1530–1630 and 250 between 1630 and 1730. Jean-Pierre Dedieu studied the records of Toledo's tribunal, which put 12,000 people on trial. For the period prior to 1530, Henry Kamen estimated there were about 2,000 executions in all of Spain's tribunals. Italian Renaissance history professor and Inquisition expert Carlo Ginzburg had his doubts about using statistics to reach a judgment about the period. "In many cases, we don't have the evidence, the evidence has been lost," said Ginzburg. Appearance in popular media In the Monty Python comedy team's Spanish Inquisition sketches, an inept Inquisitor group repeatedly bursts into scenes after someone utters the words "I didn't expect a kind of Spanish Inquisition", screaming "Nobody expects the Spanish Inquisition!" The Inquisition then uses ineffectual forms of torture, including a dish-drying rack, soft cushions and a comfy chair. The 1982 novel Baltasar and Blimunda by José Saramago, portrays how the Portuguese Inquisition impacts the fortunes of the title characters as well as several others from history, including the priest and aviation pioneer Bartolomeu de Gusmão. The 1981 comedy film History of the World, Part I, produced and directed by Mel Brooks, features a segment on the Spanish Inquisition. Inquisitio is a French television series set in the Middle Ages. In the novel Name of the Rose by Umberto Eco, there is some discussion about various sects of Christianity and inquisition, a small discussion about the ethics and purpose of inquisition, and a scene of Inquisition. In the movie by the same name, The Inquisition plays a prominent role including torture and a burning at the stake. In the novel La Catedral del Mar by Ildefonso Falcones, and Netflix series Cathedral of the Sea based on the novel, there are scenes of inquisition investigations in small towns and a great scene in Barcelona. Miloš Forman's "Goya's Ghosts", released June 9, 2007 in the US, brings to light the stories behind some of Spanish painter Francisco Goya's paintings during the Spanish Inquisition, particularly one of a priest condemning and imprisoning a beautiful woman for his own profit. Her family retaliates, but cannot save her. A fictionalized version of the Inquisition serves as a basis for the action-adventure horror stealth game A Plague Tale: Innocence. See also Auto-da-fé Black legend (Spain) Black Legend of the Spanish Inquisition Cathars List of people executed in the Papal States Witch-cult hypothesis Witch trials in the early modern period Congregation for the Doctrine of the Faith Historical revision of the Inquisition Marian Persecutions of Protestant heretics Vatican Secret Archives Documents and works Directorium Inquisitorum Histoire de l'Inquisition en France Malleus Maleficarum Notable inquisitors List of Grand Inquisitors Konrad von Marburg Tomás de Torquemada Bernardo Gui Notable cases Trial of Galileo Galilei Execution of Giordano Bruno Trial of Joan of Arc Edgardo Mortara's abduction Logroño witch trials Caterina Tarongí Rosa Egipcíaca Repentance Apologies by Pope John Paul II References Bibliography Burman, Edward, The Inquisition: The Hammer of Heresy (Sutton Publishers, 2004) . A new edition of a book first published in 1984, a general history based on the main primary sources. Carroll, Warren H., Isabel: the Catholic Queen Front Royal, Virginia, 1991 (Christendom Press) Given, James B, Inquisition and Medieval Society (Cornell University Press, 2001) Kamen, Henry, The Spanish Inquisition: A Historical Revision. (Yale University Press, 1999); . This revised edition of his 1965 original contributes to the understanding of the Spanish Inquisition in its local context. Lea, Henry Charles, A History of the Inquisition of Spain, 4 volumes (New York and London, 1906–7) Walsh, William Thomas, Characters of the Inquisition (TAN Books and Publishers, Inc, 1940/97); External links Frequently Asked Questions About the Inquisition by James Hannam Jewish Virtual Library on the Spanish Inquisition Anti-Islam sentiment in Europe Anti-Judaism Antisemitism in Europe Christianity-related controversies Counter-Reformation Islamophobia in Europe Persecution of Muslims by Christians Tribunals of the Catholic Church Violence against Muslims
[ 0.08851014077663422, -0.17923493683338165, -0.24382081627845764, 0.2182255983352661, -0.3990475833415985, 0.0049359798431396484, 0.6334982514381409, 0.49390479922294617, -0.20866963267326355, -0.1652747094631195, 0.07444915920495987, 0.8611888289451599, 0.16547641158103943, 0.2402328401803...
15192
https://en.wikipedia.org/wiki/Isaac
Isaac
Isaac is one of the three patriarchs of the Israelites and is an important figure in the Abrahamic religions, including Judaism, Christianity, and Islam. He was the son of Abraham and Sarah, the father of Jacob, and the grandfather of the twelve tribes of Israel. Isaac's name means "he will laugh", reflecting the laughter, in disbelief, of Abraham and Sarah, when told by God that they would have a child. He is the only patriarch whose name was not changed, and the only one who did not move out of Canaan. According to the narrative, he died aged 180, the longest life of the three patriarchs. After a century of exhaustive archaeological investigation, no evidence has been found for a historical Isaac. Etymology The anglicized name "Isaac" is a transliteration of the Hebrew term () which literally means "He laughs/will laugh." Ugaritic texts dating from the 13th century BCE refer to the benevolent smile of the Canaanite deity El. Genesis, however, ascribes the laughter to Isaac's parents, Abraham and Sarah, rather than El. According to the biblical narrative, Abraham fell on his face and laughed when God (Hebrew, Elohim) imparted the news of their son's eventual birth. He laughed because Sarah was past the age of childbearing; both she and Abraham were advanced in age. Later, when Sarah overheard three messengers of the Lord renew the promise, she laughed inwardly for the same reason. Sarah denied laughing when God questioned Abraham about it. Genesis narrative Birth After God changes Abram and Sarai's names to Abraham and Sarah, he tells Abraham that he will bear a second son by Sarah named Isaac, with whom a new covenant would be established. In response, Abraham began to laugh, as both he and Sarah were well beyond natural child-bearing age. Some time later, three men who Abraham identifies as messengers of God visit him and Sarah, and Abraham treats them to food and nuptials. They repeat the prophecy that Sarah would bear a child, promising Isaac's birth within a year's time, at which point Sarah laughs in disbelief. God questions why the pair laughed in disbelief at his words, and if it is because they believe such things were not within his power. Now afraid, they futilely deny ever having laughed at God's words. Time passes as Isaac is born. Although this was Abraham's second son (Abraham's first son was Ishmael, with Hagar) it was Sarah's first and only child. On the eighth day from his birth, Isaac was circumcised, as was necessary for all males of Abraham's household, in order to be in compliance with Yahweh's covenant. After Isaac had been weaned, Sarah saw Ishmael mocking, and urged her husband to cast out Hagar the bondservant and her son, so that Isaac would be Abraham's sole heir. Abraham was hesitant, but at God's order he listened to his wife's request. Binding At some point in Isaac's youth, his father Abraham took him to Mount Moriah. At God's command, Abraham was to build a sacrificial altar and sacrifice his son Isaac upon it. After he had bound his son to the altar and drawn his knife to kill him, at the last moment an angel of God prevented Abraham from proceeding. Instead, he was directed to sacrifice a nearby ram that was stuck in thickets. Family life Before Isaac was 40 (Gen 25:20) Abraham sent Eliezer, his steward, into Mesopotamia to find a wife for Isaac, from his nephew Bethuel's family. Eliezer chose the Aramean Rebekah for Isaac. After many years of marriage to Isaac, Rebekah had still not given birth to a child and was believed to be barren. Isaac prayed for her and she conceived. Rebekah gave birth to twin boys, Esau and Jacob. Isaac was 60 years old when his two sons were born. Isaac favored Esau, and Rebekah favored Jacob. The narratives about Isaac do not mention him having concubines. Migration Isaac moved to Beer-lahai-roi after his father died. When the land experienced famine, he moved to the Philistine land of Gerar where his father once lived. This land was still under the control of King Abimelech as it was in the days of Abraham. Like his father, Isaac also deceived Abimelech about his wife and also got into the well business. He had gone back to all of the wells that his father dug and saw that they were all stopped up with earth. The Philistines did this after Abraham died. So, Isaac unearthed them and began to dig for more wells all the way to Beersheba, where he made a pact with Abimelech, just like in the day of his father. Birthright Isaac grew old and became blind. He called his son Esau and directed him to procure some venison for him, in order to receive Isaac's blessing. While Esau was hunting, Jacob, after listening to his mother's advice, deceived his blind father by misrepresenting himself as Esau and thereby obtained his father's blessing, such that Jacob became Isaac's primary heir and Esau was left in an inferior position. According to Genesis 25:29–34, Esau had previously sold his birthright to Jacob for "bread and stew of lentils". Thereafter, Isaac sent Jacob into Mesopotamia to take a wife of his mother's brother's house. After 20 years working for his uncle Laban, Jacob returned home. He reconciled with his twin brother Esau, then he and Esau buried their father, Isaac, in Hebron after he died at the age of 180. Family tree Burial site According to local tradition, the graves of Isaac and Rebekah, along with the graves of Abraham and Sarah and Jacob and Leah, are in the Cave of the Patriarchs. Jewish views In rabbinical tradition, the age of Isaac at the time of binding is taken to be 37, which contrasts with common portrayals of Isaac as a child. The rabbis also thought that the reason for the death of Sarah was the news of the intended sacrifice of Isaac. The sacrifice of Isaac is cited in appeals for the mercy of God in later Jewish traditions. The post-biblical Jewish interpretations often elaborate the role of Isaac beyond the biblical description and primarily focus on Abraham's intended sacrifice of Isaac, called the aqedah ("binding"). According to a version of these interpretations, Isaac died in the sacrifice and was revived. According to many accounts of Aggadah, unlike the Bible, it is Satan who is testing Isaac as an agent of God. Isaac's willingness to follow God's command at the cost of his death has been a model for many Jews who preferred martyrdom to violation of the Jewish law. According to the Jewish tradition, Isaac instituted the afternoon prayer. This tradition is based on Genesis chapter 24, verse 63 ("Isaac went out to meditate in the field at the eventide"). Isaac was the only patriarch who stayed in Canaan during his whole life and though once he tried to leave, God told him not to do so. Rabbinic tradition gave the explanation that Isaac was almost sacrificed and anything dedicated as a sacrifice may not leave the Land of Israel. Isaac was the oldest of the biblical patriarchs at the time of his death, and the only patriarch whose name was not changed. Rabbinic literature also linked Isaac's blindness in old age, as stated in the Bible, to the sacrificial binding: Isaac's eyes went blind because the tears of angels present at the time of his sacrifice fell on Isaac's eyes. Christian views The early Christian church continued and developed the New Testament theme of Isaac as a type of Christ and the Church being both "the son of the promise" and the "father of the faithful". Tertullian draws a parallel between Isaac's bearing the wood for the sacrificial fire with Christ's carrying his cross. and there was a general agreement that, while all the sacrifices of the Old Law were anticipations of that on Calvary, the sacrifice of Isaac was so "in a pre-eminent way". The Eastern Orthodox Church and the Roman Catholic Church consider Isaac as a saint along with other biblical patriarchs. Along with those of other patriarchs and the Old Testament Righteous, his feast day is celebrated in the Eastern Orthodox Church and the Byzantine rite of the Catholic Church on the Second Sunday before Christmas (December 11–17), under the title the Sunday of the Forefathers. New Testament The New Testament states Isaac was "offered up" by his father Abraham, and that Isaac blessed his sons. Paul contrasted Isaac, symbolizing Christian liberty, with the rejected older son Ishmael, symbolizing slavery; Hagar is associated with the Sinai covenant, while Sarah is associated with the covenant of grace, into which her son Isaac enters. The Epistle of James chapter 2, verses 21–24, states that the sacrifice of Isaac shows that justification (in the Johannine sense) requires both faith and works. In the Epistle to the Hebrews, Abraham's willingness to follow God's command to sacrifice Isaac is used as an example of faith as is Isaac's action in blessing Jacob and Esau with reference to the future promised by God to Abraham. In verse 19, the author views the release of Isaac from sacrifice as analogous to the resurrection of Jesus, the idea of the sacrifice of Isaac being a prefigurement of the sacrifice of Jesus on the cross. Islamic views Islam considers Isaac (Arabic:اسحاق Ishaaq) a prophet of Islam, and describes him as the father of the Israelites and a righteous servant of God. Isaac, along with Ishmael, is highly important for Muslims for continuing to preach the message of monotheism after his father Abraham. Among Isaac's children was the follow-up Israelite patriarch Jacob, who is also venerated as an Islamic prophet. Isaac is mentioned seventeen times by name in the Quran, often with his father and his son, Jacob. The Quran states that Abraham received "good tidings of Isaac, a prophet, of the righteous", and that God blessed them both (37: 112). In a fuller description, when angels came to Abraham to tell him of the future punishment to be imposed on Sodom and Gomorrah, his wife, Sarah, "laughed, and We gave her good tidings of Isaac, and after Isaac of (a grandson) Jacob" (11: 71–74); and it is further explained that this event will take place despite Abraham and Sarah's old age. Several verses speak of Isaac as a "gift" to Abraham (6: 84; 14: 49–50), and 24: 26–27 adds that God made "prophethood and the Book to be among his offspring", which has been interpreted to refer to Abraham's two prophetic sons, his prophetic grandson Jacob, and his prophetic great-grandson Joseph. In the Quran, it later narrates that Abraham also praised God for giving him Ishmael and Isaac in his old age (14: 39–41). Elsewhere in the Quran, Isaac is mentioned in lists: Joseph follows the religion of his forefathers Abraham, Isaac and Jacob (12: 38) and speaks of God's favor to them (12: 6); Jacob's sons all testify their faith and promise to worship the God that their forefathers, "Abraham, Ishmael and Isaac", worshiped (2: 127); and the Quran commands Muslims to believe in the revelations that were given to "Abraham, Ishmael, Isaac, Jacob and the Patriarchs" (2: 136; 3: 84). In the Quran's narrative of Abraham's near-sacrifice of his son (37: 102), the name of the son is not mentioned and debate has continued over the son's identity, though many feel that the identity is the least important element in a story which is given to show the courage that one develops through faith. Quran The Quran mentions Isaac as a prophet and a righteous man of God. Isaac and Jacob are mentioned as being bestowed upon Abraham as gifts of God, who then worshipped God only and were righteous leaders in the way of God: Academic Some scholars have described Isaac as "a legendary figure" or "as a figure representing tribal history, or "as a seminomadic leader." The stories of Isaac, like other patriarchal stories of Genesis, are generally believed to have "their origin in folk memories and oral traditions of the early Hebrew pastoralist experience." The Cambridge Companion to the Bible makes the following comment on the biblical stories of the patriarchs: According to Martin Noth, a scholar of the Hebrew Bible, the narratives of Isaac date back to an older cultural stage than that of the West-Jordanian Jacob. At that era, the Israelite tribes were not yet sedentary. In the course of looking for grazing areas, they had come in contact in southern Philistia with the inhabitants of the settled countryside. The biblical historian A. Jopsen believes in the connection between the Isaac traditions and the north, and in support of this theory adduces Amos 7:9 ("the high places of Isaac"). Albrecht Alt and Martin Noth hold that, "The figure of Isaac was enhanced when the theme of promise, previously bound to the cults of the 'God the Fathers' was incorporated into the Israelite creed during the southern-Palestinian stage of the growth of the Pentateuch tradition." According to Martin Noth, at the Southern Palestinian stage of the growth of the Pentateuch tradition, Isaac became established as one of the biblical patriarchs, but his traditions were receded in the favor of Abraham. In art The earliest Christian portrayal of Isaac is found in the Roman catacomb frescoes. Excluding the fragments, Alison Moore Smith classifies these artistic works in three categories: See also Biblical and Quranic narratives Testament of Isaac Wife–sister narratives in the Book of Genesis – three such narratives, involving Abraham (two) and Isaac (one) Notes Citations References External links Isaac in Jewish Encyclopedia Abraham's son as the intended sacrifice (Al-Dhabih, Qur'an 37:99, Qur'an 37:99–113): Issues in qur'anic exegesis, journal of Semitic Studies XXX1V/ Spring 1989 Biblical patriarchs Children of Abraham Christian saints from the Old Testament Esau People whose existence is disputed Vayeira
[ -0.017554618418216705, 1.0189800262451172, -0.716837465763092, -0.6977776288986206, -0.22108539938926697, 0.49332261085510254, 0.6151593327522278, 0.04857196286320686, -0.07463820278644562, -0.6090826392173767, -0.31592053174972534, 0.032480865716934204, -0.25010499358177185, 0.39254531264...
15193
https://en.wikipedia.org/wiki/Italian%20Football%20League
Italian Football League
Italian Football League (IFL) is the top level American football league in Italy established in 1980. In 1980 the first American football league in Italy was established and crowned a champion. The Italian league (Series A) in the early 1980's was one of the first leagues in Europe to sign professional import players and coaches from the USA. The league had good popularity in the early years especially the late 1980's and early 1990's with reported attendance of 30,000 fans for a Series A league final championship game in that time period. American Football in Italy has had ups and downs since that time but has always had a competitive league with different lower levels playing below the Italian Football League (IFL). History The new IFL was founded in 2008, taking over previous league's significance called (National Football League Italy). The league was born as a result of the escape of several of the best clubs of the old championship organized by the Italian federation, such as Milano Rhinos, Parma Panthers, Bologna Doves and Bolzano Giants. However some of the historic Italian clubs have not joined the new league and continue to participate in different tournaments organized by other federations. This is the case of Legnano Frogs, Torino Giaguari, etc. In the following years a lot of teams moved to the Federazione Italiana di American Football (the federation the IFL belongs to) and most of the biggest teams are now part of the IFL that is the First Division or in the other two divisions. IFL teams Ancona Dolphins (2008–present) Bergamo Lions (2008–10, 2012, 2014–present) Bologna Doves (2008–09, 2011–12) (now in III Division) Bologna Warriors (2009–present) Bolzano Giants (2008–present) Catania Elephants (2008–12) (now in II Division) Ferrara Aquile (2014–present) Firenze Guelfi (2016–present) Lazio Marines (2009–present) Martesana Daemons (2012) (now in II Division) Milano Rhinos (2008–2018, 2020–present) Milano Seamen (2011–present) Napoli Briganti (2014–present) Palermo Corsari (2008 †) Palermo Sharks (2008) (now in II Division) Parma Panthers (2008–present) Reggio Emilia Hogs (2009–13) (now in II Division) Roma Grizzlies (2015–2018) Torino Giaguari (2014–present) † defunct ♦ due to league expansion the Napoli team can play the 2015 IFL season and is not relegated to the second division ‡ Roma Grizzlies won the second division championship and earned the right to play the 2015 IFL season Italian Bowl From 2008 to 2014 the championship game was named Italian Super Bowl MVP Italian Bowl Until 2014 the championship game was called Superbowl italiano. 2008 MVP Reggie Green (RB, Giants Bolzano) 2009 MVP Reggie Green (RB, Giants Bolzano) 2010 MVP Greg Hay (RB, Panthers Parma) 2011 MVP Tanyon Bissell (WR, Panthers Parma), MVP Ita Tommaso Monardi (QB, Panthers Parma), MVP Def Michele Canali (DL, Panthers Parma) 2012 MVP Kevin Grayson (WR, Panthers Parma) 2013 MVP Alessandro Malpeli Avalli (RB, Panthers Parma), MVP Usa Ryan Christian (RB, Panthers Parma), MVP Def Simone Bernardoni (DL, Panthers Parma) 2014 MVP Mattia Binda (RB, Milano Seamen), MVP Usa Jonathan Dally (QB, Milano Seamen), MVP def Andrea Zini (DB, Milano Seamen). 2015 MVP Stefano Di Tunisi (WR, Milano Seamen) 2016 MVP Nick Ricciardulli (RB, Rhinos Milano) References External links American Football International American Football International Italy Italian Superbowl history American football in Italy American football leagues in Europe 2008 establishments in Italy Sports leagues established in 2008 American expatriate players of American football
[ -0.013911813497543335, -0.5435648560523987, -0.11690708249807358, -0.08069802820682526, 0.08544553071260452, -0.2130071073770523, -0.13775816559791565, 0.5672896504402161, -0.45943883061408997, -0.18857234716415405, 0.2764703035354614, 0.9158017039299011, -0.5608881711959839, 0.00762929767...
15195
https://en.wikipedia.org/wiki/Iduna
Iduna
Iduna may refer to: One of several modern anglicizations of the name of the Norse goddess Iðunn 176 Iduna, an asteroid named after the goddess Iduna (bird), a genus of tree warblers Iduna (literature society) Iduna, Wisconsin, an unincorporated community, United States Iduna language, spoken in Papua New Guinea The journal of the Swedish Geatish Society Iduna, a character from Disney's animated films of Frozen See also Izuna (disambiguation)
[ 0.3639461100101471, 0.2127520889043808, -0.55056232213974, 0.0011979873524978757, -0.2697279751300812, 0.5322036743164062, 0.7125441431999207, 0.29577314853668213, -0.573939859867096, -0.3890410363674164, -0.15958459675312042, 0.13848169147968292, -0.06664056330919266, 0.4292861223220825, ...
15198
https://en.wikipedia.org/wiki/Indic
Indic
Indic may refer to: Indic languages (disambiguation) Various scripts: Brahmic scripts, a family of scripts used to write Indian and other Asian languages Kharoshthi (extinct) Indian numerals Indian religions, also known as the Dharmic faiths Other things related to the Indian subcontinent See also Inđić, a Serbian surname Indica (disambiguation)
[ 0.12383516132831573, 0.24033887684345245, -0.6619877219200134, -0.23890823125839233, -0.21678614616394043, 0.5505234003067017, 0.7156480550765991, 0.4950111210346222, -0.4190593957901001, -0.4704723656177521, 0.13566580414772034, -0.2081984430551529, -0.6477295756340027, 0.1688550412654876...
15199
https://en.wikipedia.org/wiki/Papua%20%28province%29
Papua (province)
Papua is the largest and easternmost province of Indonesia, comprising most of Western New Guinea. The province is located on the island of New Guinea. It is bordered by the state of Papua New Guinea to the east, the province of West Papua to the west, the Pacific Ocean to the north, and the Arafura Sea to the south. The province also shares maritime boundaries with Palau to the north. The province is divided into twenty-eight regencies and one city. Its capital and largest city is Jayapura. The province has a large potential in natural resources, such as gold, nickel, petroleum, etc. Puncak Jaya is the province's highest mountain and the highest point in Indonesia. Papua, along with West Papua, has a higher degree of autonomy level compared to other Indonesian provinces. The island of New Guinea has been populated for tens of thousands of years. European traders began frequenting the region around the late 16th century due to spice trade. In the end, the Dutch Empire emerged as the dominant leader in the spice war, annexing the western part of New Guinea into the colony of Dutch East Indies. The Dutch remained in New Guinea until 1962, even though other parts of the former colony has declared independence as the Republic of Indonesia in 1945. Following negotiations and conflicts with the Indonesian government, the Dutch transferred Western New Guinea to a United Nations Temporary Executive Authority (UNTEA), which was again transferred to Indonesia after the controversial Act of Free Choice. The province was formerly called Irian Jaya and comprised the entire Western New Guinea until the inauguration of the province of West Papua (then West Irian Jaya) in 2001. In 2002, Papua adopted its current name and was granted a special autonomous status under Indonesian legislation. The province of Papua remains one of the least developed provinces in Indonesia. As of 2020, Papua has a GDP per capita of Rp 56,141 (US$ 3,970), ranking 11th place among all Indonesian provinces. However, Papua only has a Human Development Index of 0.604, the lowest among all Indonesian provinces. The harsh New Guinean terrain and climate is one of the main reasons why infrastructure in Papua is considered to be the most challenging to be developed among other Indonesian regions. The 2020 Census revealed a population of 4,303,707, of which the majority of are Christians. The interior is predominantly populated by ethnic Papuans while coastal towns are inhabited by descendants of intermarriages between Papuans, Melanesians and Austronesians, including the Indonesian ethnic groups. Migrants from the rest of Indonesia also tend to inhabit the coastal regions. The province is also home to some uncontacted peoples. History Etymology There are several theories regarding the origin of the word Papua. One theory is that the name comes from the word 'Papo-Ua', which is named by the Tidore Sultanate, which in the Tidore language means "not joining" or "not being united", which means that on this island there is no king who rules. Before the age of colonization, the Tidore Sultanate exercised suzerainty over some parts of the Bird's Head Peninsula in what is now the province of West Papua before expanding to also include coastal regions in the current province of Papua. This relationship plays an important historical role in binding the archipelagic civilizations of Indonesia to the Papuan world. Another theory is that the word Papua comes from the Malay word 'papuwah', which means 'frizzled hair'. It was first mentioned in the 1812 Malay Dictionary by William Marsden, although it was not found in earlier dictionaries. In the records of 16th century Portuguese and Spanish sailors, the word 'Papua' is the designation for the inhabitants who inhabit the Raja Ampat Islands and the coastal parts of the Bird's Head Peninsula. The former name of the province, Irian Jaya, was suggested during a tribal committee meeting in Tobati, Jayapura, formed by Atmoprasojo, head of the bestuur school in the 1940s. Frans Kaisiepo, the committee leader suggested the name from Mansren Koreri myths, Iri-an from the Biak language of Biak Island, meaning "hot land" referring to the local hot climate, but also from Iryan which means heated process as a metaphor for a land that is entering a new era. In Serui Iri-an ( land-nation) means "pillar of nation", while in Merauke Iri-an ( placed higher-nation) means "rising spirit" or "to rise". The name was promoted in 1945 by Marcus Kaisiepo, brother of the future governor Frans Kaisiepo. The name Irian was politicized later by Marthin Indey, Silas Papare, and others with the Indonesian acronym 'Ikut Republik Indonesia Anti Nederland' (Join the Republic of Indonesia oppose the Netherlands). The name was used throughout the Suharto administration, until it was changed to Papua during the administration of President Abdurrahman Wahid. The Dutch, who arrived later under Jacob Le Maire and Willem Schouten, called it Schouten island. They later used this name only to refer to islands off the north coast of Papua proper, the Schouten Islands or Biak Island. When the Dutch colonized this island as part of the Dutch East Indies, they called it Nieuw Guinea. Speakers align themselves with a political orientation when choosing a name for the western half of the island of New Guinea. The official name of the region is "Papua" according to International Organization for Standardization (ISO). Independence activists refer to the region as "West Papua," while Indonesian officials have also used "West Papua" to name the westernmost province of the region since 2007. Historically, the region has had the official names of Netherlands New Guinea (1895–1962), West New Guinea or West Irian (1962–73), Irian Jaya (1973–2002), and Papua (2002–present). Pre-colonial era Papuan habitation of the region is estimated to have begun between 42,000 and 48,000 years ago. Research indicates that the highlands were an early and independent center of agriculture, and show that agriculture developed gradually over several thousands of years; the banana has been cultivated in this region for at least 7,000 years. Austronesian peoples migrating through Maritime Southeast Asia settled in the area at least 3,000 years ago, and populated especially in Cenderawasih Bay. Diverse cultures and languages have developed in the island due to geographical isolation; there are over 300 languages and two hundred additional dialects in the region (see Papuan languages, Austronesian languages, Central–Eastern Malayo-Polynesian languages). Ghau Yu Kuan, a Chinese merchant, came to Papua around the latter half of 500 AD and referred to it as Tungki, the area where they obtained spices. Meanwhile, in the latter half of 600 AD, the Sumatra-based empire of Srivijaya (7th century–13th century) referred to the island as Janggi. The empire engaged in trade relations with western New Guinea, initially taking items like sandalwood and birds-of-paradise in tribute to China, but later making slaves out of the natives. It was only at the beginning of 700 AD that traders from Persia and Gujarat began to arrive in what is now Papua and call it Dwi Panta or Samudrananta, which means 'at edge of the ocean'. The 14th-century Majapahit poem Nagarakretagama mentioned Wwanin or Onin and Sran as a recognized territory in the east, today identified as Onin peninsula in Fakfak Regency in the western part of the larger Bomberai Peninsula south of the Bird's Head region of Western New Guinea. At that time, Papua was said to be the eighth region of the Majapahit Empire. Wanin or Onin was probably the oldest name in recorded history to refer to the western part of the island of New Guinea. A transcript from the Nagarakretagama says the following: Ikang sakasanusasanusa Makasar Butun Banggawai Kuni Ggaliyao mwang i [ng] Salaya Sumba Solot Muar muwah tigang i Wandan Ambwan Athawa maloko Ewanin ri Sran ini Timur ning angeka nusatutur. According to some linguists, the word Ewanin is another name for Onin, while Sran popularly misunderstood to refers to Seram Island in Maluku, is more likely another name for Kowiai. The local Papuan kingdom in its native language is called Sran Eman Muun which is based in Kaimana and its furthest influence extends to the Kei Islands, in southeastern Maluku. In his book Nieuw Guinea, Dutch author WC. Klein explained the beginning of the influence of the Bacan Sultanate in Papua. There he wrote: In 1569 Papoese hoof den bezoeken Batjan. Ee aanterijken worden vermeld (In 1569, Papuan tribal leaders visited Bacan, which resulted in the creation of new kingdoms). According to the oral history of the Biak people, there used to be a relationship and marriage between their tribal chiefs and the sultans of Tidore. The Biak people is the largest Melanesian tribe that spreads on the northern coast of Papua, therefore the Biak language is also the most widely used and considered the language of Papuan unity. Due to the relationship of the coastal areas of Papua with the Sultans of Maluku, there are several local kingdoms on this island, which shows the entry of the system of feudalism that does not originated from Papua itself. Since the 16th century, apart from the Raja Ampat Islands which was contested between the Bacan Sultanate, Tidore Sultanate, and Ternate Sultanate, other coastal areas of Papua from the island of Biak to Mimika have became a vassal of the Tidore Sultanate. The Tidore Sultanate adheres to the trade pact and custom of Uli-Siwa ( federation of nine ), so there were nine trade partners lead by Tidore in opposition to Ternate-led Uli Lima ( federation of five ). In administering its regions in Papua, Tidore divide them to three regions, Korano Ngaruha ( Four Kings ) or Raja Ampat Islands, Papo Ua Gamsio ( Papua The Nine Negeri ) and Mafor Soa Raha ( Mafor The Four Soa ). The role of these kingdoms began to decline due to the entry of traders from Europe to the archipelago which marks the beginning of colonialism in the Indonesian Archipelago. During Tidore's rule, the main exports of the island during this period were resins, spices, slaves and the highly priced feathers of the bird-of-paradise. Sultan Nuku, one of the most famous Tidore sultans who rebelled against Dutch colonization, called himself "Sultan of Tidore and Papua", during his revolt in 1780s. He commanded loyalty from both Moluccan and Papuan chiefs, especially those of Raja Ampat Islands. Following Tidore's defeat, much of the territory it claimed in western part of New Guinea came under Dutch rule as part of Dutch East Indies. Colonial era In 1511, Antonio d'Arbau, a Portuguese sailor, called the Papua region as "Os Papuas" or llha de Papo. Don Jorge de Menetes, a sailor from Spain also stopped by in Papua a few years later (1526–1527), he refers to the region as 'Papua', which was mentioned in the diary of Antonio Figafetta, the clerk for the Magellan voyage. The name Papua was known to Figafetta when he stopped on the island of Tidore. On 16 May 1545, Yñigo Ortiz de Retez, a Spanish maritime explorer who in command of the San Juan de Letran, left port in Tidore, an island which was Spain's stronghold in the Maluku Islands and going by way of the Talaud Islands and the Schoutens, reached the northern coast of New Guinea, which was coasted till the end of August when, having got to the 5°S latitude, contrary winds and currents forced a return to Tidore where he arrived on 5 October 1545. Many islands were encountered and first charted, along the northern coast of New Guinea, and in the Padaidos, Le Maires, Ninigos, Kaniets and Hermits, to some of which Spanish names were given. On 20 June 1545 at the mouth of the Mamberamo River (that was charted as San Agustin) he took possession of the land for the Spanish Crown, in the process giving the island the name by which it is known today. He called it Nueva Guinea owing to the resemblance of the local inhabitants to the peoples of the Guinea coast in West Africa. The first map showing the whole island (as an island) was published in 1600 and shown 1606, Luís Vaz de Torres explored the southern coast of New Guinea from Milne Bay to the Gulf of Papua including Orangerie Bay, which he named Bahía de San Lorenzo. His expedition also discovered Basilaki Island, naming it Tierra de San Buenaventura, which he claimed for Spain in July 1606. On 18 October, his expedition reached the western part of the island in present-day Indonesia, and also claimed the territory for the King of Spain. In 1606, a Duyfken expedition led by the commander Wiliam Jansen from Holland landed in Papua. This expedition consisted of 3 ships, where they sailed from the north coast of Java and stopped at the Kei Islands, at the southwestern coast of Papua. With the increasing Dutch grip in the region, the Spanish left New Guinea in 1663. In 1660, the Dutch recognized the Sultan of Tidore's sovereignty over New Guinea. New Guinea thus became notionally Dutch as the Dutch held power over Tidore. Dutch New Guinea in the early 19th century was administered from the Moluccas. Although the coast had been mapped in 1825 by Lieutenant Commander D.H. Kolff, there had been no serious effort to establish a permanent presence in Dutch New Guinea. The British, however, had shown considerable interest in the area, and were threatening to settle it. To prevent this, the Governor of the Moluccas, Pieter Merkus, urged the Dutch government to establish posts along the coast. An administrative and trading post established in 1828 on Triton Bay on the southwest coast of New Guinea. On 24 August 1828, the birthday of King William I of the Netherlands, the Dutch flag was hoisted and Dutch claimed all of western Papua, which they called Nieuw Guinea Several local native chieftains proclaimed their loyalty to the Netherlands. The post was named Fort Du Bus for the then-Governor General of the Dutch East Indies, Leonard du Bus de Gisignies. Almost 30 years later, Germans established the first missionary settlement on an island near Manokwari. While in 1828 the Dutch claimed the south coast west of the 141st meridian and the north coast west of Humboldt Bay in 1848, they did not try to develop the region again until 1896; they established settlements in Manokwari and Fak-Fak in response to perceived Australian ownership claims from the eastern half of New Guinea. Great Britain and Germany had recognized the Dutch claims in treaties of 1885 and 1895. At much the same time, Britain claimed south-east New Guinea, later known as the Territory of Papua, and Germany claimed the northeast, later known as the Territory of New Guinea. The German, Dutch and British colonial administrators each attempted to suppress the still-widespread practices of inter-village warfare and headhunting within their respective territories. In 1901, the Netherlands formally purchased West New Guinea from the Sultanate of Tidore, incorporating it into the Netherlands East Indies. Dutch activity in the region remained in the first half of the twentieth century, notwithstanding the 1923 establishment of the Nieuw Guinea Beweging (New Guinea Movement) in the Netherlands by ultra right-wing supporters calling for Dutchmen to create a tropical Netherlands in Papua. This pre-war movement without full government support was largely unsuccessful in its drive, but did coincide with the development of a plan for Eurasian settlement of the Dutch Indies to establish Dutch farms in northern West New Guinea. This effort also failed as most returned to Java disillusioned, and by 1938 just 50 settlers remained near Hollandia and 258 in Manokwari. The Dutch established the Boven Digul camp in Tanahmerah, as a prison for Indonesian nationalists. Among those interned here were writer Marco Kartodikromo, Mohammad Hatta, who would become the first vice president of Indonesia, and Sutan Sjahrir, the first Indonesian Prime Minister. Before about 1930, European maps showed the highlands as uninhabited forests. When first flown over by aircraft, numerous settlements with agricultural terraces and stockades were observed. The most startling discovery took place on 4 August 1938, when Richard Archbold discovered the Grand Valley of the Baliem River, which had 50,000 yet-undiscovered Stone Age farmers living in orderly villages. The people, known as the Dani, were the last society of its size to make first contact with the rest of the world. The region became important in the War in the Pacific upon the Netherlands' declaration of war on Japan after the bombing of Pearl Harbor. In 1942, the northern coast of West New Guinea and the nearby islands were occupied by Japan. By late 1942, most parts of the Netherlands Indies were occupied by Japan. Behind Japanese lines in New Guinea, Dutch guerrilla fighters resisted under Mauritz Christiaan Kokkelink. Allied forces drove out the Japanese after Operations Reckless and Persecution, the amphibious landings near Hollandia, from 21 April 1944. The area served as General Douglas MacArthur's headquarters until the conquest of the Philippines in March 1945. Over twenty U.S. bases were established and half a million US personnel moved through the area. West New Guinean farms supplied food for the half million US troops. Papuan men went into battle to carry the wounded, acted as guides and translators, and provided a range of services, from construction work and carpentry to serving as machine shop workers and mechanics. Following the end of the war, the Dutch retained possession of West New Guinea from 1945. Preparing for independence Following the Indonesian National Revolution, the Netherlands formally transferred sovereignty to the United States of Indonesia, the successor state to the Netherlands East Indies, on 27 December 1949. However, the Dutch refused to include Netherlands New Guinea in the new Indonesian Republic and took steps to prepare it for independence as a separate country. Following the failure of the Dutch and Indonesians to resolve their differences over West New Guinea during the Dutch-Indonesian Round Table Conference in late 1949, it was decided that the present status quo of the territory would be maintained and then negotiated bilaterally one year after the date of the transfer of sovereignty. However, both sides were still unable to resolve their differences in 1950, which led the Indonesian President Sukarno to accuse the Dutch of reneging on their promises to negotiate the handover of the territory. On 17 August 1950, Sukarno dissolved the United States of Indonesia and proclaimed the unitary Republic of Indonesia. In response to Indonesian aggression, the Netherlands government stepped up its efforts to prepare the Papuan people for self-determination in 1959. These efforts culminated in the establishment of a hospital in Hollandia (modern–day Jayapura, currently Jayapura Regional General Hospital or RSUD Jayapura), a shipyard in Manokwari, agricultural research sites, plantations, and a military force known as the Papuan Volunteer Corps. By 1960, a legislative New Guinea Council had been established with a mixture of legislative, advisory and policy functions. Half of its members were to be elected, and elections for this council were held the following year. Most importantly, the Dutch also sought to create a sense of West Papuan national identity, and these efforts led to the creation of a national flag (the Morning Star flag), a national anthem, and a coat of arms. The Dutch had planned to transfer independence to West New Guinea in 1970. Following the raising of the Papuan National Flag on 1 December 1961, tensions further escalated. On 18 December 1961 Sukarno issued the Tri Komando Rakjat (People's Triple Command), calling the Indonesian people to defeat the formation of an independent state of West Papua, raise the Indonesian flag in that country, and be ready for mobilisation at any time. In 1962 Indonesia launched a significant campaign of airborne and seaborne infiltrations against the disputed territory, beginning with a seaborne infiltration launched by Indonesian forces on 15 January 1962. The Indonesian attack was comprehensively defeated by Dutch forces including the Dutch destroyers Evertsen and Kortenaer, the so-called Vlakke Hoek incident. Amongst the casualties was the Indonesian Deputy Chief of the Naval Staff; Commodore Yos Sudarso. It finally was agreed through the New York Agreement in 1962 that the administration of Western New Guinea would be temporarily transferred from the Netherlands to Indonesia and that by 1969 the United Nations should oversee a referendum of the Papuan people, in which they would be given two options: to remain part of Indonesia or to become an independent nation. For a period of time, Dutch New Guinea were under the United Nations Temporary Executive Authority, before being transferred to Indonesia in 1963. A referendum was held in 1969, which was referred to as the Act of Free Choice. The referendum was recognized by the international community and the region became the Indonesian province of Irian Jaya. The province has been renamed as Papua since 2002. Under Indonesian rule Following the Act of Free Choice plebiscite in 1969, Western New Guinea was formally integrated into the Republic of Indonesia. Instead of a referendum of the 816,000 Papuans, only 1,022 Papuan tribal representatives were allowed to vote, and they were coerced into voting in favor of integration. While several international observers including journalists and diplomats criticized the referendum as being rigged, the U.S. and Australia support Indonesia's efforts to secure acceptance in the United Nations for the pro-integration vote. That same year, 84 member states voted in favor for the United Nations to accept the result, with 30 others abstaining. Due to the Netherlands' efforts to promote a West Papuan national identity, a significant number of Papuans refused to accept the territory's integration into Indonesia. These formed the separatist Organisasi Papua Merdeka (Free Papua Movement) and have waged an insurgency against the Indonesian authorities, which continues to this day. In January 2003 President Megawati Sukarnoputri signed an order dividing Papua into three provinces: Central Irian Jaya (Irian Jaya Tengah), Papua (or East Irian Jaya, Irian Jaya Timur), and West Papua (Irian Jaya Barat). The formality of installing a local government for Jakarta in Irian Jaya Barat (West) took place in February 2003 and a governor was appointed in November; a government for Irian Jaya Tengah (Central Irian Jaya) was delayed from August 2003 due to violent local protests. The creation of this separate Central Irian Jaya Province was blocked by Indonesian courts, who declared it to be unconstitutional and in contravention of the Papua's special autonomy agreement. The previous division into two provinces was allowed to stand as an established fact. Following his election in 2014, Indonesian president, Joko Widodo, embarked on reforms intended to alleviate grievances of Native Papuans, such as stopping transmigration program and starting massive infrastructure spending in Papua, including building Trans-Papua roads network. The Joko Widodo administration has prioritized infrastructure and human resource development as a great framework for solving the conflict in Papua. The Jokowi administration has implemented a one-price fuel policy in Papua. Jokowi assessed that one price fuel policy is a form of "justice" for all Papuans. Another infrastructure that Jokowi is also building is the Palapa Ring fiber optic. In 2020, Jokowi targets that the internet can be enjoyed by all people up to West Papua. Protests against Indonesian rule in Papua happens frequently, the most recent being the 2019 Papua protests, which is also by far one of the largest. Politics Government The province of Papua is governed by a directly elected governor (currently Lukas Enembe) and a regional legislature, People's Representative Council of Papua (Dewan Perwakilan Rakyat Papua, abbreviated as DPRP or DPR Papua). A unique government organization in the province is the Papuan People's Assembly (Majelis Rakyat Papua), which was formed by the Indonesian government in 2005 as a coalition of Papuan tribal chiefs, tasked with arbitration and speaking on behalf of Papuan tribal customs. It is one of the only such institutions in the country, the other being West Papuan People's Assembly in West Papua province. Since 2014, the DPRP has 55 members who are elected through General elections every five years and 14 people who are appointed through the special autonomy, bringing the total number of DPRP members to 69 people. The DPRP leadership consists of 1 Chairperson and 3 Deputy Chairmen who come from political parties that have the most seats and votes. The current DPRP members are the results of the 2019 General Election which was sworn in on 31 October 2019 by the Chairperson of the Jayapura High Court at the Papua DPR Building. The composition of DPRP members for the 2019–2024 period consists of 13 political parties where the Nasdem Party is the political party with the most seats, with 8 seats, followed by the Democratic Party which also won 8 seats and the Indonesian Democratic Party of Struggle which won 7 seats. The province of Papua is one of three provinces to have obtained special autonomy status, the others being Aceh and West Papua. According to Law 21/2001 on Special Autonomy Status (UU Nomor 21 Tahun 2001 tentang Otonomi khusus Papua), the provincial government of Papua is provided with authority within all sectors of administration, except for the five strategic areas of foreign affairs, security and defense, monetary and fiscal affairs, religion and justice. The provincial government is authorized to issue local regulations to further stipulate the implementation of the special autonomy, including regulating the authority of districts and municipalities within the province. Due to its special autonomy status, Papua province is provided with significant amount of special autonomy funds, which can be used to benefit its indigenous peoples. But the province has low fiscal capacity and it is highly dependent on unconditional transfers and the above-mentioned special autonomy fund, which accounted for about 55% of total revenues in 2008. After obtaining its special autonomy status, to allow the local population access to timber production benefits, the Papuan provincial government issued a number of decrees, enabling: a Timber Logging Permit for Customary Communities, which enabled local people to carry out timber extraction in small concessions (250 to 1,000 hectares) for one year through a community-based or participatory community cooperative; a Permit to Manage Customary Forests, which was a timber extraction permit for larger concessions (up to 2,000 hectares) for a maximum of 20 years; logging companies had to pay compensations to local communities in addition to all other fees and taxes collected by the national government. Administrative divisions As of 2010 (following the separation of West Papua Province in 2003), the residual Papua Province consisted of 28 regencies (kabupaten) and one autonomous city (kota); these regencies and the city are together subdivided as at 2021 into 576 districts (distrik), and thence into 5,555 "villages" (kelurahan and desa). With the release of the Act Number 21 of 2001 concerning the Special Autonomous of Papua Province, the term distrik was used instead of kecamatan in the entire Western New Guinea (Papua and West Papua). The difference between the two is merely the terminology, with kepala distrik being the district head. The regencies (kabupaten) and the city (kota) are listed below with their areas and their populations at the 2020 census, together with the 2020 Human Development Index of each administrative divisions. Environment Geography and Climate The island of New Guinea lies to the east of the Malay Archipelago, with which it is sometimes included as part of a greater Indo-Australian Archipelago. Geologically it is a part of the same tectonic plate as Australia. When world sea levels were low, the two shared shorelines (which now lie 100 to 140 metres below sea level), and combined with lands now inundated into the tectonic continent of Sahul, also known as Greater Australia. The two landmasses became separated when the area now known as the Torres Strait flooded after the end of the Last Glacial Period. The province of Papua is located between 2 ° 25'LU – 9 ° S and 130 ° – 141 ° East. The total area of Papua is 317,062 km2 (122,418 sq. miles) or 19.33% of the total area of the Indonesian archipelago. Papua Province is the province that has the largest area in Indonesia. The boundaries of Papua are: Pacific Ocean (North), Arafura Sea (South), West Papua (West) and Papua New Guinea (East). Papua, like most parts of Indonesia, has two seasons, the dry season and the rainy season. From June to September the wind flows from Australia and does not contain much water vapor resulting in a dry season. On the other hand, from December to March, the wind currents contain a lot of water vapor originating from Asia and the Pacific Ocean so that the rainy season occurs. The average temperature in Papua ranges from 19 °C to 28 °C and humidity is between 80% to 89%. The average annual rainfall is between 1,500 mm to 7,500 mm. Snowfalls sometime occurs in the mountainous areas of the province, especially the central highlands region. The New Guinea Highlands, which is located at the central east–west of the province, dominates the geography of the island of New Guinea, over in total length. The western section is around long and across. The province contains the highest mountains between the Himalayas and the Andes, rising up to high, and ensuring a steady supply of rain from the tropical atmosphere. The tree line is around elevation and the tallest peaks contain permanent equatorial glaciers, increasingly melting due to a changing climate. Various other smaller mountain ranges occur both north and west of the central ranges. Except in high elevations, most areas possess a hot, humid climate throughout the year, with some seasonal variation associated with the northeast monsoon season. Another major habitat feature is the vast southern and northern lowlands. Stretching for hundreds of kilometers, these include lowland rainforests, extensive wetlands, savanna grasslands, and some of the largest expanses of mangrove forest in the world. The southern lowlands are the site of Lorentz National Park, a UNESCO World Heritage Site. The northern lowlands are drained principally by the Mamberamo River and its tributaries on the western side, and by the Sepik on the eastern side. The more extensive southern lowlands are drained by a larger number of rivers, principally the Digul in the west and the Fly in the east. The largest island offshore, Dolak (also called Yos Sudarso), lies near the Digul estuary, separated by the narrow Muli Strait that is so narrow it has been named a "creek". The island is administered as part of the Merauke Regency. The province's largest river is the Mamberamo located in the northern part of the province. The result is a large area of lakes and rivers known as the Lakes Plains region. The Baliem Valley, home of the Dani people, is a tableland above sea level in the midst of the central mountain range. Puncak Jaya, also known by its Dutch colonial name, "Carstensz Pyramid", is a limestone mountain peak above sea level. It is the highest peak of Oceania. Ecology Anthropologically, New Guinea is considered part of Melanesia. Botanically, New Guinea is considered part of Malesia, a floristic region that extends from the Malay Peninsula across Indonesia to New Guinea and the East Melanesian Islands. The flora of New Guinea is a mixture of many tropical rainforest species with origins in Asia, together with typically Australasian flora. Typical Southern Hemisphere flora include the Conifers Podocarpus and the rainforest emergents Araucaria and Agathis, as well as Tree ferns and several species of Eucalyptus. New Guinea is differentiated from its drier, flatter, and less fertile southern counterpart, Australia, by its much higher rainfall and its active volcanic geology. Yet the two land masses share a similar animal fauna, with marsupials, including wallabies and possums, and the egg-laying monotreme, the echidna. Other than bats and some two dozen indigenous rodent genera, there are no pre-human indigenous placental mammals. Pigs, several additional species of rats, and the ancestor of the New Guinea singing dog were introduced with human colonization. The island has an estimated 16,000 species of plant, 124 genera of which are endemic. Papua's known forest fauna includes; marsupials (including possums, wallabies, tree-kangaroos, cuscuses); other mammals (including the endangered long-beaked echidna); bird species such as birds-of-paradise, cassowaries, parrots, and cockatoos; the world's longest lizards (Papua monitor); and the world's largest butterflies. The waterways and wetlands of Papua are also home to salt and freshwater crocodile, tree monitors, flying foxes, osprey, bats and other animals; while the equatorial glacier fields remain largely unexplored. Protected areas within Papua province include the World Heritage Lorentz National Park, and the Wasur National Park, a Ramsar wetland of international importance. Birdlife International has called Lorentz Park "probably the single most important reserve in New Guinea". It contains five of World Wildlife Fund's "Global 200" ecoregions: Southern New Guinea Lowland Forests; New Guinea Montane Forests; New Guinea Central Range Subalpine Grasslands; New Guinea mangroves; and New Guinea Rivers and Streams. Lorentz Park contains many unmapped and unexplored areas, and is certain to contain many species of plants and animals as yet unknown to Western science. Local communities' ethnobotanical and ethnozoological knowledge of the Lorentz biota is also very poorly documented. On the other hand, Wasur National Park has a very high value biodiversity has led to the park being dubbed the "Serengeti of Papua". About 70% of the total area of the park consists of savanna (see Trans-Fly savanna and grasslands), while the remaining vegetation is swamp forest, monsoon forest, coastal forest, bamboo forest, grassy plains and large stretches of sago swamp forest. The dominant plants include Mangroves, Terminalia, and Melaleuca species. The park provides habitat for a large variety of up to 358 bird species of which some 80 species are endemic to the island of New Guinea. Fish diversity is also high in the region with some 111 species found in the eco-region and a large number of these are recorded from Wasur. The park's wetland provides habitat for various species of lobster and crab as well. Several parts of the province remains unexplored due to steep terrain, leaving a high possibility that there are still many undiscovered floras and faunas that is yet to be discovered. In February 2006, a team of scientists exploring the Foja Mountains, Sarmi, discovered new species of birds, butterflies, amphibians, and plants, including possibly the largest-flowered species of rhododendron. In December 2007, a second scientific expedition was taken to the mountain range. The expedition led to the discovery of two new species: the first being a 1.4 kg giant rat (Mallomys sp.) approximately five times the size of a regular brown rat, the second a pygmy possum (Cercartetus sp.) described by scientists as "one of the world's smallest marsupials." An expedition late in 2008, backed by the Indonesian Institute of Sciences, National Geographic Society and Smithsonian Institution, was made in order to assess the area's biodiversity. New types of animals recorded include a frog with a long erectile nose, a large woolly rat, an imperial-pigeon with rust, grey and white plumage, a 25 cm gecko with claws rather than pads on its toes, and a small, 30 cm high, black forest wallaby (a member of the genus Dorcopsis). Ecological threats include logging-induced deforestation, forest conversion for plantation agriculture (including oil palm), smallholder agricultural conversion, the introduction and potential spread of alien species such as the crab-eating macaque which preys on and competes with indigenous species, the illegal species trade, and water pollution from oil and mining operations. Economy Papua has large natural resources and a very large area. However, this province has weaknesses, namely limited infrastructure and less skilled human resources. So far, Papua has had a fairly good economic development due to the support of economic sources, especially mining, forest, agriculture and fisheries products. Economic development has been uneven in Papua, and poverty in the region remains high by Indonesian standards. Part of the problem has been neglect of the poor—too little or the wrong kind of government support from Jakarta and Jayapura. A major factor in this is the extraordinarily high cost of delivering goods and services to large numbers of isolated communities, in the absence of a developed road or river network (the latter in contrast to Kalimantan) providing access to the interior and the highlands. Intermittent political and military conflict and tight security controls have also contributed to the problem but with the exception of some border regions and a few pockets in the highlands, this has not been the main factor contributing to underdevelopment. Papua's gross domestic product grew at a faster rate than the national average until, and throughout the financial crisis of 1997–98. However, the differences are much smaller if mining is excluded from the provincial GDP. Given that most mining revenues were commandeered by the central government until the Special Autonomy Law was passed in 2001, provincial GDP without mining is most likely a better measure of Papuan GDP during the pre- and immediate post-crisis periods. On a per capita basis, the GDP growth rates for both Papua and Indonesia are lower than those for total GDP. However, the gap between per capita GDP and total GDP is larger for Papua than for Indonesia as a whole, reflecting Papua's high population growth rates. Although Papua has experienced almost no growth in GDP, the situation is not as serious as one might think. It is true that the mining sector, dominated by Freeport Indonesia, has been declining over the last decade or so, leading to a fall in the value of exports. On the other hand, government spending and fixed capital investment have both grown, by well over 10 per cent per year, contributing to growth in sectors such as finance, construction, transport and communications, and trade, hotels and restaurants. With so many sectors still experiencing respectable levels of growth, the impact of the stagnant economy on the welfare of the population will probably be limited. It should also be remembered that mining is typically an enclave activity; its impact on the general public is fairly limited, regardless of whether it is booming or contracting. Papua has depended heavily on natural resources, especially the mining, oil and gas sectors, since the mid-1970s. Although this is still the case, there have been some structural changes in the two provincial economies since the split in 2003. The contribution of mining to the economy of Papua province declined from 62 per cent in 2003 to 47 per cent in 2012. The shares of agriculture and manufacturing also fell, but that of utilities remained the same. A few other sectors, notably construction and services, increased their shares during the period. Despite these structural changes, the economy of Papua province continues to be dominated by the mining sector, and in particular by a single company, Freeport indonesia. Mining is still and remains one of the dominant economic sector in Papua. The Grasberg Mine, the world's largest gold mine and second-largest copper mine, is located in the highlands near Puncak Jaya, the highest mountain in Papua and whole Indonesia. Grasberg Mine producing 1.063 billion pounds of copper, 1.061 million ounces gold and 2.9 million ounces silver. It has 19,500 employees operated by PT Freeport Indonesia (PT-FI) which used to be 90.64% owned by Freeport-McMoran (FCX). In August 2017, FCX announced that it will divest its ownership in PT-FI so that Indonesia owns 51%. In return the CoW will be replaced by a special license (IUPK) with mining rights to 2041 and FCX will build a new smelter by 2022. Besides mining, there are at least three other important economic sectors (excluding the government sector) in the Papuan economy. The first is agriculture, particularly food crops, forestry and fisheries. Agriculture made up 10.4 per cent of provincial GDP in 2005 but grew at an average rate of only 0.1 per cent per annum in 2000–05. The second important sector is trade, hotels and restaurants, which contributed 4.0 per cent of provincial GDP in 2005. Within this sector, trade contributed most to provincial GDP. However, the subsector with the highest growth rate was hotels, which grew at 13.2 per cent per annum in 2000–05. The third important sector is transport and Communications, which contributed 3.4 per cent of provincial GDP in 2005. The sector grew at an average annual rate of 5.3 percent in 2000–05, slightly below the national level. Within the sector, sea transport, air transport and communications performed particularly well. The role of private enterprise in developing communications and air transport has become increasingly significant. Since private enterprise will only expand if businesspeople see good prospects to make a profit, this is certainly an encouraging development. At current rates of growth, the transport and communications sector could support the development of agriculture in Papua. However, so far, most of the growth in communications has been between the rapidly expanding urban areas of Jayapura, Timika, Merauke, and between them and the rest of Indonesia. Nevertheless, in the medium term, improved communication networks may create opportunities for Papua to shift from heavy dependence on the mining sector to greater reliance on the agricultural sector. With good international demand for palm oil anticipated in the medium term, production of this commodity could be expanded. However, the negative effects of deforestation on the local environment should be a major consideration in the selection of new areas for this and any other plantation crop. In 2011, Papuan caretaker governor Syamsul Arief Rivai claimed Papua's forests cover 42 million hectares with an estimated worth of Rp 700 trillion ($78 billion) and that if the forests were managed properly and sustainably, they could produce over 500 million cubic meters of logs per annum. Manufacturing and banking make up a tiny proportion of the regional economy and experienced negative growth in 2000–05. Poor infrastructure and lack of human capital are the most likely reasons for the poor performance of manufacturing. In addition, the costs of manufacturing are typically very high in Papua, as they are in many other outer island regions of Indonesia. Both within Indonesia and in the world economy, Papua's comparative advantage will continue to lie in agriculture and natural resource-based industries for a long time to come. A more significant role for manufacturing is unlikely given the far lower cost of labor and better infrastructure in Java. But provided that there are substantial improvements in infrastructure and communications, over the longer term manufacturing can be expected to cluster around activities related to agriculture—for example, food processing. Infrastructure Compared to other parts of Indonesia, the infrastructure in Papua is one of the most least developed, owing to its distance from the national capital Jakarta. Nevertheless, for the past few years, the central government has invested significant sums of money to build and improve the current infrastructure in the province. The infrastructure development efforts of the Ministry of Public Works and Housing in Papua have been very massive in the last 10 years. This effort is carried out to accelerate equitable development and support regional development in Papua. The main focus of infrastructure development in Papua is to improve regional connectivity, improve the quality of life through the provision of basic infrastructure and increase food security through the development of water resources infrastructure. The achievements and conditions of infrastructure development in Papua until 2017 have shown significant progress. Energy and water resources Electricity distribution in the province as well as the whole country is operated and managed by the Perusahaan Listrik Negara (PLN). Originally, most Papuan villages do not have access to electricity. The Indonesia government through the Ministry of Energy and Mineral Resources, in the beginning of year 2016, introduced a program named "Indonesia Terang" or Bright Indonesia. The aimed of this program is to speed up Electrification Rate (ER) with priority to the six provinces at Eastern area of Indonesia including Papua Province. The target of Indonesian's ER by 2019 is 97%. While the Indonesian's national ER already high (88.30%) in 2015, Papua still the lowest ER (45.93%) among the provinces. The scenario to boost up ER in the Eastern area by connected the consumers at villages which not electrified yet to the new Renewable Energy sources. The percentage of household that were connected to the electricity in Papua (Electrification ratio/ER) is the lowest one among the provinces in Indonesia. Data from the Ministry of Energy and Mineral Resources shows that only Papua Province has ER level below 50% (45.93%) with the national average RE was 88.30%. High ER of more than 85% can be found in the rest of west area of the country. The main reason of lowest RE in Papua is a huge area with landlocked and mountain situation and low density population. Energy consumption in residential sector, 457 GWh in year 2014, contributes the electrification rate in Papua Province. But again, geographic and demographic obstacle made the electrical energy not well dispersed in Papua. The ER level are usually higher in the coastal area but become low in the mountain area. The ongoing project of 35GW and Bright Indonesia proves that the government is focusing on improving electricity infrastructure in Papua. The target is 2.114 unelectrified villages in Papua and energy consumption each household will be 0.6 kWh/day. If they use Solar system to meet this consumption of energy, then each household should have been installed with at least 150 Wp solar home system (assuming the efficiency is 0.85 and minimum insulation is 5 hours/day). As of 2019, there are still 1,724 villages in Papua and West Papua that have not received electricity, mostly in the inland regions. Nevertheless, the Bright Indonesia program is considered to be a success, as more and more villages are receiving electricity for the first time. All pipes water supply in the province is managed by the Papua Municipal Waterworks (Indonesian: Perusahaan Daerah Air Minum Papua – PDAM Papua ). The supply of clean water is one of the main problem faced by the province, especially during drought seasons. Papua has been named as the province with the worst sanitation in Indonesia, garnering a score of 45 while the national average is 75, due to unhealthy lifestyle habits and a lack of clean water. In response, the government has invested money to build the sufficient infrastructure to hold clean water. Several new dams are also being built by the government throughout the province. Achieving universal access to drinking water, sanitation and hygiene is essential to accelerating progress in the fields of health, education and poverty alleviation. In 2015, about a quarter of the population used basic sanitation facilities at home, while a third still practiced open defecation. The coverage of improved drinking water sources is much higher, both in households and schools. Inequality based on income and residence levels is stark, demonstrating the importance of integrating equity principles into policy and practice and expanding the coverage of community-based total sanitation programs. Internet and telecommunication Papua is the largest province in Indonesia, but it has the least amount of telecommunications services due to geographic isolation. The deployment of service to the district and to the sub district is still not evenly distributed. The distribution of telecommunication services in Papua is still very uneven. This is indicated by the percentage of the number of telecommunication services and infrastructure whose distribution is centralized in certain areas such as Jayapura. Based on data, the Human Development Index in Papua increases every year but is not accompanied by an increase adequate number of telecommunication facilities. The Ministry of Communication and Information Technology through the Information Technology Accessibility Agency (BAKTI) has built around 9 base transceiver stations in remote areas of Papua, namely Puncak Jaya Regency and Mamberamo Raya Regency, to connect to internet access. In the early stages, the internet was prioritized to support the continuity of education, health and better public services. To realize connectivity in accordance with government priorities, the Ministry of Communication and Information is determined to reach all districts in the Papua region with high-speed internet networks by 2020. It is planned that all districts in Papua and West Papua will build a fast internet backbone network. There are 31 regencies that have new high-speed internet access to be built. In late 2019, the government announced the completion of the Palapa Ring project – a priority infrastructure project that aimed to provide access to 4G internet services to more than 500 regencies across Indonesia, Papua included. The project is estimated to have cost US$1.5 billion and comprises 35,000 km (21,747 miles) of undersea fiber-optic cables and 21,000 km (13,000 miles) of land cables, stretching from the westernmost city in Indonesia, Sabang to the easternmost town, Merauke, which is located in Papua. Additionally, the cables also transverse every district from the northernmost island Miangas to the southernmost island, Rote. Through the Palapa Ring, the government can facilitate a network capacity of up to 100 Gbit/s in even the most outlying regions of the country. Transportation Land So far, air routes have been a mainstay in Papua and West Papua provinces as a means of transporting people and goods, including basic necessities, due to inadequate road infrastructure conditions. This has resulted in high distribution costs which have also increased the prices of various staple goods, especially in rural areas. Therefore, the government is trying to reduce distribution costs by building the Trans-Papua Highway. As of 2016, the Trans-Papua highway that has been connected has reached 3,498 kilometers, with asphalt roads for 2,075 kilometers, while the rest are still dirt roads, and roads that have not been connected have reached 827 km. The development of the Trans-Papua highway will create connectivity between regions so that it can have an impact on the acceleration of economic growth in Papua and West Papua in the long term. Apart from the construction of the Trans-Papua highway, the government is also preparing for the first railway development project in Papua, which is currently entering the feasibility study phase. The said infrastructure funding for Papua is not insignificant. The need to connect all roads in Papua and West Papua is estimated at Rp. 12.5 trillion (US$870 million). In the 2016 State Budget, the government has also budgeted an additional infrastructure development fund of Rp. 1.8 trillion (US$126 million). Data from the Ministry of Public Works and Housing (KPUPR) states, the length of the Trans-Papua highway in Papua reaches 2,902 km. These include Merauke-Tanahmerah-Waropko (543 km), Waropko-Oksibil (136 km), Dekai-Oksibil (225 km), and Kenyam-Dekai (180 km). Then, Wamena-Habema-Kenyam-Mamug (295 km), Jayapura-Elelim-Wamena (585 km), Wamena-Mulia-Ilaga-Enarotali (466 km), Wagete-Timika (196 km), and Enarotali-Wagete-Nabire (285 km). As of 2020, only about 200–300 kilometers of the Trans-Papua highwat have not been connected. As in other provinces in Indonesia, Papua uses a dual carriageway with the left-hand traffic rule, and cities and towns such as Jayapura and Merauke provide public transportation services such as buses and taxis along with Gojek and Grab services. Currently, the Youtefa Bridge in Jayapura is the longest bridge in the province, with a total length of 732 metres (2,402 ft). The bridge cut the distance and travel time from Jayapura city center to Muara Tami district as well as Skouw State Border Post at Indonesia–Papua New Guinea border. The bridge construction was carried out by consortium of state-owned construction companies PT Pembangunan Perumahan Tbk, PT Hutama Karya (Persero), and PT Nindya Karya (Persero), with a total construction cost of IDR 1.87 trillion and support from the Ministry of Public Works and Housing worth IDR 1.3 trillion. The main span assembly of the Youtefa Bridge was not carried out at the bridge site, but at PAL Indonesia shipyard in Surabaya, East Java. Its production in Surabaya aims to improve safety aspects, improve welding quality, and speed up the implementation time to 3 months. This is the first time where the arch bridge is made elsewhere and then brought to the location. From Surabaya the bridge span, weighing 2000 tons and 112.5 m long, was sent by ship with a 3,200 kilometers journey in 19 days. Installation of the first span was carried out on 21 February 2018, while the second span was installed on 15 March 2018 with an installation time of approximately 6 hours. The bridge was inaugurated on 28 October 2019 by President Joko Widodo. A railway with a length of 205 km is being planned, which would connect the provincial capital Jayapura and Sarmi to the east. Further plans include connecting the railway to Sorong and Manokwari in West Papua. In total, the railway would have a length of 595 km, forming part of the Trans-Papua Railway. Construction of the railway is still in the planning stage. A Light Rapid Transport (LRT) connecting Jayapura and Sentani is also being planned. Air The geographical conditions of Papua which are hilly and have dense forests and do not have adequate road infrastructure, such as in Java or Sumatra, make transportation a major obstacle for local communities. Air transportation using airplanes is by far the most effective means of transportation and is needed most by the inhabitants of the island, although it is not cheap for it. A number of airlines are also scrambling to take advantage of the geographical conditions of the island by opening busy routes to and from a number of cities, both district and provincial capitals. If seen from the sufficient condition of the airport infrastructure, there are not a few airports that can be landed by jets like Boeing and Airbus as well as propeller planes such as ATR and Cessna. Sentani International Airport in Jayapura is the largest airport in the province, serving as the main gateway to the province from other parts of Indonesia. The air traffic is roughly divided between flights connecting to destinations within the Papua province and flights linking Papua to other parts of Indonesia. The airport connects Jayapura with other Indonesian cities such as Manado, Makassar, Surabaya and Jakarta, as well as towns within the province such as Biak, Timika and Merauke. Sentani International Airport is also the main base for several aviation organizations, including Associated Mission Aviation, Mission Aviation Fellowship, YAJASI and Tariku Aviation. The airport currently does not have any international flights, although there are plans to open new airline routes to neighboring Papua New Guinea in the future. Other medium-sized airports in the province are Mozes Kilangin Airport in Timika, Mopah International Airport in Merauke, Frans Kaisiepo International Airport in Biak, and Wamena Airport in Wamena. There are over 300 documented airstrips in Papua, consists of mostly small airstrips that can only be landed by small airplanes. The government is planning to open more airports in the future to connect isolated regions in the province. Water Water transportation, which includes sea and river transportation, is also one of the most crucial form of transportation in the province, after air transportation. The number of passengers departing by sea in Papua in October 2019 decreased by 16.03 percent, from 18,785 people in September 2019 to 15,773 people. The number of passengers arriving by sea in October 2019 decreased by 12.32 percent, from 11,108 people in September 2019 to 9,739 people. The volume of goods loaded in October 2019 was recorded at 17,043 tons, an increase of 30.57 percent compared to the volume in September 2019 which amounted to 13,053 tons. The volume of goods unloaded in October 2019 was recorded at 117,906 tons or a decrease of 2.03 percent compared to the volume in September 2019 which amounted to 120,349 tons. There are several ports in the province, with the Port of Depapre in Jayapura being the largest, which started operation in 2021. There are also small to medium-sized ports in Biak, Timika, Merauke and Agats, which serves passenger and cargo ships within the province, as well as from other Indonesian provinces. Healthcare Health-related matters in the Papua is administered by the Papua Provincial Health Agency (Indonesian: Dinas Kesehatan Provinsi Papua). According to the Indonesian Central Agency on Statistics, as of 2015, there are around 13,554 hospitals in Papua which consists of 226 state-owned hospitals and 13,328 private hospitals. Furthermore, there are 394 clinics spread throughout the province. Lack of good healthcare infrastructure is one of the main issues in Papua as of today, especially in the remote regions, as most hospitals that have adequate facilities are only located at major cities and towns.. A measles outbreak and famine killed at least 72 people in Asmat regency in early 2018, during which 652 children were affected by measles and 223 suffered from malnutrition. The most prominent hospital is the Papua Regional General Hospital (Indonesian: Rumah Sakit Umum Daerah Papua) in Jayapura, which is the largest state-owned hospital in the province. Education Education in Papua, as well as Indonesia in a whole, falls under the responsibility of the Ministry of Education and Culture (Kementerian Pendidikan dan Kebudayaan or Kemdikbud) and the Ministry of Religious Affairs (Kementerian Agama or Kemenag). In Indonesia, all citizens must undertake twelve years of compulsory education which consists of six years at elementary level and three each at middle and high school levels. Islamic schools are under the responsibility of the Ministry of Religious Affairs. The Constitution also notes that there are two types of education in Indonesia: formal and non-formal. Formal education is further divided into three levels: primary, secondary and tertiary education. Indonesians are required to attend 12 years of school, which consists of three years of primary school, three years of secondary school and three years of high school. As of 2015, there are 3 public universities and 40 private universities in Papua. Public universities in Papua falls under the responsibility of the Ministry of Research and Technology (Kementerian Riset dan Teknologi) as well as the Ministry of Education and Culture. The most famous university in the province is the Cenderawasih University in Jayapura. The university has faculties in economics, law, teacher training and education, medical, engineering, and social and political science. Until 2002 the university had a faculty of agricultural sciences at Manokwari, which was then separated to form the Universitas Negeri Papua. Demographics While the Papuan branch of the Central Agency on Statistics had earlier projected the 2020 population of the province to be 3,435,430 people the actual Census in 2020 revealed a total population of 4,303,707, spread throughout 28 regencies and 1 administrative city. The city of Jayapura is the most populated administrative division in the province, with a total of 398,478 people in 2020, while Supiori Regency, which comprises mainly the island of Supiori, one of the Schouten Islands within Cenderawasih Bay off the north coast of Papua, is the least populated administrative division in the province, with just 22,547 people. Most of the population in the province are concentrated in coastal regions, especially around the city of Jayapura and its suburbs. Papua is also home to many migrants from other parts of Indonesia, of which an overwhelming percentage of these migrants came as part of a government-sponsored transmigration program. The transmigration program in Papua was only formally halted by President Joko Widodo in June 2015. Ethnicity In contrast to other Indonesian provinces, which are mostly dominated by Austronesian peoples, Papua and West Papua as well as some part of Maluku are home to the Melanesians. The indigenous Papuans which are part of the Melanesians forms the majority of the population in the province. Many believe human habitation on the island dates to as early as 50,000 BC, and first settlement possibly dating back to 60,000 years ago has been proposed. The island of New Guinea is presently populated by almost a thousand different tribal groups and a near-equivalent number of separate languages, which makes it the most linguistically diverse area in the world. Current evidence indicates that the Papuans (who constitute the majority of the island's peoples) are descended from the earliest human inhabitants of New Guinea. These original inhabitants first arrived in New Guinea at a time (either side of the Last Glacial Maximum, approx 21,000 years ago) when the island was connected to the Australian continent via a land bridge, forming the landmass of Sahul. These peoples had made the (shortened) sea-crossing from the islands of Wallacea and Sundaland (the present Malay Archipelago) by at least 40,000 years ago. Notable Papuan tribes include the Asmat people who inhabits the Asmat Swamp as well as some part of the Lorentz National Park in the Asmat Regency. The Asmat inhabit a region on the island's southwestern coast bordering the Arafura Sea, with lands totaling approximately 18,000 km2 (7,336 mi2) and consisting of mangrove, tidal swamp, freshwater swamp, and lowland rainforest. The Dani people who inhabits the Baliem Valley in the highlands, including the town of Wamena and are considered to be one of the most populated tribes of the province. The Marind people of Southern Papua occupies a vast territory, which is situated on either side of the Bian River, from about 20 miles to the east of Merauke, up to the mouth of the Moeli River in the west (between Frederik Hendrik Island and the mainland; east of Yos Sudarso Island, mainly west of the Maro River (a small area goes beyond the Maro at its lower part, including Merauke). The ancestral Austronesian peoples are believed to have arrived considerably later, approximately 3,500 years ago, as part of a gradual seafaring migration from Southeast Asia, possibly originating in Taiwan. Austronesian-speaking peoples colonized many of the offshore islands to the north and east of New Guinea, such as New Ireland and New Britain, with settlements also on the coastal fringes of the main island in places. Human habitation of New Guinea over tens of thousands of years has led to a great deal of diversity, which was further increased by the later arrival of the Austronesians and the more recent history of European and Asian settlement. Papuan is also home to ethnic groups from other part of Indonesia, including the Javanese, Sundanese, Balinese, Batak, etc. Most of these migrants came as part of the transmigration program, which was an initiative of the Dutch colonial government and later continued by the Indonesian government to move landless people from densely populated areas of Indonesia to less populous areas of the country. The program was criticized by human rights activists, claiming that the program is part of "an attempt to wipe out the Papuans in a slow-motion genocide". There is open conflict between migrants, the state, and indigenous groups due to differences in culture—particularly in administration, and cultural topics such as nudity, food and sex. The transmigration program in Papua was stopped in 2015 due to the controversies it had caused. Language Papua, the easternmost region of the Indonesian archipelago, exhibits a very complex linguistic network. The diversity of languages and the situation of multilingualism is very real. There are many language families scattered in this wide area, namely the Austronesian language family and numerous non-Austronesian languages known collectively as Papuan languages. Speakers of different Austronesian languages are found in coastal communities, such as Biak, Wandamen, Waropen and Ma'ya. On the other hand, Papuan languages are spoken in the interior and Central Highlands, starting from the Bird's Head Peninsula in the west to the eastern tip of the island of New Guinea, for example Meybrat, Dani, Ekari, Asmat, Muyu and Sentani language. At this time, research efforts to find out how many indigenous languages in Papua are still being pursued. Important efforts regarding documentation and inventory of languages in Papua have also been carried out by two main agencies, namely SIL International and the Language and Book Development Agency in Jakarta. The results of the research that have been published by the two institutions show that there are differences in the number of regional languages in Papua. The Language and Book Development Agency as the official Indonesian government agency has announced or published that there are 207 different regional languages in Papua, while SIL International has stated that there are 271 regional languages in the region. Some of the regional languages of Papua are spoken by a large number of speakers and a wide spread area, some are supported by a small number of speakers and are scattered in a limited environment. However, until now it is estimated that there are still a number of regional languages in Papua that have not been properly studied so that it is not known what the form of the language is. In addition to local languages that have been listed by the two main institutions above, there are also dozens more languages from other islands due to population migration that is not included in the list of local languages in Papua, for example languages from Sulawesi (Bugis, Makassar, Toraja, Minahasa), Javanese from Java, and local languages from Maluku. So-called Papuan languages comprise hundreds of different languages, most of which are not related. As in other provinces, Indonesian is the official language of the state, as well as the province. Indonesian is used in inter-ethnic communication, usually between native Papuans and non-Papuan migrants who came from other parts of Indonesia. Most formal education, and nearly all national mass media, governance, administration, judiciary, and other forms of communication in Papua, are conducted in Indonesian. A Malay-based creole language called Papuan Malay is used as the lingua franca in the province. It emerged as a contact language among tribes in Indonesian New Guinea for trading and daily communication. Nowadays, it has a growing number of native speakers. More recently, the vernacular of Indonesian Papuans has been influenced by Standard Indonesian, the national standard dialect. Some linguists have suggested that Papuan Malay has its roots in North Moluccan Malay, as evidenced by the number of Ternate loanwords in its lexicon. Others have proposed that it is derived from Ambonese Malay. A large number of local languages are spoken in the province, and the need for a common lingua franca has been underlined by the centuries-old traditions of inter-group interaction in the form of slave-hunting, adoption, and intermarriage. It is likely that Malay was first introduced by the Biak people, who had contacts with the Sultanate of Tidore, and later, in the 19th century, by traders from China and South Sulawesi. However, Malay was probably not widespread until the adoption of the language by the Dutch missionaries who arrived in the early 20th century and were then followed in this practice by the Dutch administrators. The spread of Malay into the more distant areas was further facilitated by the ('Education for village teacher') program during the Dutch colonial era. There are four varieties of Papuan Malay that can be identified, including Serui Malay. A variety of Papuan Malay is spoken in Vanimo, Papua New Guinea near the Indonesian border. Religion According to the 2018 national census, 84.42% of the Papuans identified themselves as Christians, with 69.02% being Protestants and 15.4% being Catholics. 15.29% of the population are Muslims and less than 1% were Buddhists or Hindus. There is also substantial practice of animism, the traditional religion for many Papuans, with many blending animistic beliefs with other religions such as Christianity. Christianity, including Protestantism and Roman Catholic are mostly adhered by native Papuans and migrants from Maluku, East Nusa Tenggara and North Sulawesi. Islam are mostly adhered by migrants from western Indonesia, some Moluccans and some native Papuans. Lastly Hinduism and Buddhism are mostly adhered by Balinese migrants and Chinese-Indonesians respectively. Missionaries Carl Ottow and Johann Geisler, under the initiative of Ottho Gerhard Heldring and permission from Tidore Sultanate, are the first Christian missionaries that reached Papua. They entered Papua at Mansinam Island, near Manokwari on 5 February 1855. Since 2001, the fifth of February has been a Papuan public holiday, recognizing this first landing. In 1863, sponsored by the Dutch colonial government, the Utrecht Mission Society (UZV) started a Christian-based education system as well as regular church services in Western New Guinea. Initially the Papuans' attendance was encouraged using bribes of betel nut and tobacco, but subsequently this was stopped. In addition, slaves were bought to be raised as step children and then freed. By 1880, only 20 Papuans had been baptized, including many freed slaves. The Dutch government established posts in Netherlands New Guinea in 1898, a move welcomed by the missionaries, who saw orderly Dutch rule as the essential antidote to Papua paganism. Subsequently, the UZV mission had more success, with a mass conversion near Cenderawasih Bay in 1907 and the evangelization of the Sentani people by Pamai, a native Papuan in the late 1920s. Due to the Great Depression, the mission suffered a funding shortfall, and switched to native evangelists, who had the advantage of speaking the local language (rather than Malay), but were often poorly trained. The mission extended in the 1930s to Yos Sudarso Bay, and the UZV mission by 1934 had over 50,000 Christians, 90% of them in North Papua, the remainder in West Papua. By 1942 the mission had expanded to 300 schools in 300 congregations. The first Catholic presence in Papua was in Fakfak, a Jesuit mission in 1894. In 1902 the Vicariate of Netherlands New Guinea was established. Despite the earlier activity in Fakfak, the Dutch restricted the Catholic Church to the southern part of the island, where they were active especially around Merauke. The mission campaigned against promiscuity and the destructive practices of headhunting among the Marind-anim. Following the 1918 flu pandemic, which killed one in five in the area, the Dutch government agreed to the establishment of model villages, based on European conditions, including wearing European clothes, but which the people would submit to only by violence. In 1925 the Catholics sought to re-establish their mission in Fakfak; permission was granted in 1927. This brought the Catholics into conflict with the Protestants in North Papua, who suggested expanding to South Papua in retaliation. Culture The native Papuan people has a distinct culture and traditions that cannot be found in other parts of Indonesia. Coastal Papuans are usually more willing to accept modern influence into their daily lives, which in turn diminishes their original culture and traditions. Meanwhile, most inland Papuans still preserves their original culture and traditions, although their way of life over the past century are tied to the encroachment of modernity and globalization. Each Papuan tribe usually practices their own tradition and culture, which may differ greatly from one tribe to another. One of the most well-known Papuan tradition is the stone burning tradition (Indonesian: Tradisi Bakar Batu), which is practiced by most Papuan tribes in the province. The stone burning tradition is an important tradition for all indigenous Papuans. For them, is a form of gratitude and a gathering place between residents of the village. This tradition is usually held when there are births, traditional marriages, the coronation of tribal chiefs, and the gathering of soldiers. It is usually carried out by indigenous Papuan people who live in the interior, such as in the Baliem Valley, Panaiai, Nabire, Pegunungan Bintang, and others. other. The name of this tradition varies in each region. In Paniai, the stone burning tradition is called Gapiia. Meanwhile, in Wamena it is called Kit Oba Isogoa, while in Jayawijaya it is called Barapen. It is called the stone burning tradition because the stone is actually burned until it is hot. The function of the hot stone is to cook meat, Sweet potatoes, and vegetables on the basis of banana leaves which will be eaten by all residents at the ongoing event. In some remote Papuan communities who are Muslim or when welcoming Muslim guests, pork can be replaced with chicken or beef or mutton or can be cooked separately with pork. This is, for example, practiced by the Walesi community in Jayawijaya Regency to welcome the holy month of Ramadan. The finger cutting tradition (Indonesian: Tradisi Potong Jari) is practiced among the Dani people of the Baliem Valley in central Papua. The tradition of cutting fingers on the Dani people has existed since ancient times and is still being carried out today. This tradition symbolizes harmony, unity, and strength that comes from within a person and within a family. According to the culture of the Dani people, family is the most valuable pedestal that a human has, fingers are believed to symbolize the existence and function of a family itself. So that the tradition of cutting is carried out when someone loses a family member or relative such as husband, wife, children, younger siblings and older siblings forever. For Dani people, sadness and grief due to adversity and the loss of a family member are not only appreciated by crying, but also cutting fingers. The Dani people believes that cutting off a finger is a symbol of the sadness and pain of losing a family member. The finger-cutting tradition is also seen as a way to prevent the recurrence of a catastrophe that claimed the life of a grieving family member. The Ararem tradition is the tradition of delivering the dowry of a future husband to the family of the prospective wife in the Biak custom. In the Biak language, the word "Ararem" means dowry. In this procession, the bride and groom will be escorted on foot in a procession, accompanied by songs and dances accompanied by music and. The amount of the dowry is determined by the woman's family as agreed by her relatives. The date of submission of the dowry must be agreed upon by the family of the woman or the family of the prospective wife and the family of the man or family of the prospective husband. In the tradition of the Biak people, the payment of the dowry is a tradition that must be obeyed because it involves the consequences of a marriage. Arts and Performance There are a lot of traditional dances that are native to the province of Papua. Each Papuan tribes would usually have their own unique traditional dances. The Yospan dance (Indonesian: Tarian Yospan) is a type of social association dance in Papua which is a traditional dance originating from the coastal regions of Papua, namely Biak, Yapen and Waropen, which are often played by the younger people as a form of friendship. Initially, the Yospan dance originated from two dances called Yosim and Pancar, which were eventually combined into one. Hence, Yospan is an acronym of Yosim and Pancar. When performing the Yosim dance, which originated from Yapen and Waropen, the dancers invited other residents to be immersed in the songs sung by a group of singers and music instrument holders. The musical instruments used are simple, which consists of ukulele and guitar, musical instruments that are not native to Papua. There is also a tool that functions as a bass with three ropes. The rope is usually made from rolled fibers, a type of pandanus leaf, which can be found in the forests of the coastal areas of Papua. A music instrument called Kalabasa is also played during the dance, it is made of dried pumpkin, then filled with beads or small stones that are played by simply shaking it. The women dancers wear woven sarongs to cover their chests, decorative heads with flowers and bird feathers. Meanwhile, the male dancers would usually wear shorts, open chest, head also decorated with bird feathers. The Pancar dance that originated from Biak is only accompanied by a tifa, which is the traditional musical instrument of the coastal tribes in Papua. The Isosolo dance is a type of dance performed by the inhabitants who lives around Lake Sentani in Jayapura. The Isosolo dance is performed to symbolize the harmony between different tribes in Papua. The art of boat dancing is a tradition of the Papuan people, especially among the Sentani people, where the dance is performed from one village to another. According to the Sentani language, Isosolo or Isolo dance is a traditional art of the Sentani people who dance on a boat on Lake Sentani. The word Isosolo consists of two words, iso and solo (or holo). Iso means to rejoice and dance to express feelings of the heart, while holo means a group or herd from all age groups who dance. Hence, isosolo means a group of people who dance with joy to express their feelings. The Isosolo dance in Sentani is usually performed by ondofolo (traditional leaders) and the village community to present a gift to other ondofolo. Items that are offered are items that are considered valuable, such as large wild boar, garden products, delivering ondofolo girls to be married, and several other traditional gifts. However, at this time, apart from being a form of respect for ondoafi, isosolo is considered more as a performance of the Sentani people's pride which is one of the popular attractions at the Lake Sentani Festival, which is held annually. Each Papuan tribe usually has their own war dance. The Papuan war dance is one of the oldest dances of the Papuan people because this classical dance has been around for thousands of years and is even one of the legacies of Indonesia's prehistoric times. In Papuan culture, this dance is a symbol of how strong and brave the Papuan people are. Allegedly, this dance was once a part of traditional ceremonies when fighting other tribes. The dancers who perform this dance are a group of men, the number starts from seven people or more. They danced to the sound of drums and war songs. Their movements were characteristically excited as if they were warriors heading for battle. The Papuan war dance is very unique, varied and energetic to indicate the heroism and courage of the Papuan people. Apart from the dancers movements in playing the weapons they carry, the uniqueness of this dance is also seen in the dancers' clothes. Another traditional dance that is common to most if not all Papuan tribes is called musyoh. The emergence of the musyoh dance is based on a certain history. In ancient times, when a Papuan tribe member died due to an accident or something unexpected, the Papuan people believed that the spirit of the person who died was still roaming and unsettled. To overcome this, the Papuan tribesmen created a ritual in the form of the musyoh dance. Thus, this traditional dance is often referred to as a spirit exorcism dance. Generally, the musyoh dance is performed by men. However, besides the purpose of exorcising spirits, the musyoh dance is also used by the Papuan people for another purpose, such as welcoming guests. The musyoh dance is a symbol of respect, gratitude, and an expression of happiness in welcoming guests. If it is for the purpose of expelling the spirit, this musyoh dance is performed by men. In the case for welcoming guests, this dance is performed by men and women. The costumes worn by the dancers can be said to be very simple costumes. This simplicity can be seen from its very natural ingredients, namely processed tree bark and plant roots. The material is then used as a head covering, tops and bottoms, bracelets and necklaces. There are also unique scribbles on the dancers' bodies that show the uniqueness of the dance. Architecture Papua is famous for its varieties of traditional houses, one of which is a traditional house called honai. Honai is a traditional Papuan house, especially in the mountainous region. The basic shape of the honai is a circle with a wooden frame and woven walls and a conical roof made of straw. The honai is spread across almost all corners of the Baliem Valley which covers an area of 1,200 square kilometers. The distance from the surface of the house to the ceiling is only about 1 meter. Within the honai, there is a fireplace which is located right in the middle. The thatched roof and wooden walls of the Honai actually bring cool air inside If the air is too cold, the whole house will be warmed by the smoke from the fireplace. For the Dani people, smoke from firewood is no longer unusual for being smoked for a long time. As long as the door is still open, oxygen can still flow inside. The honai is supported by 4 main poles called heseke, which are stuck in the ground at a certain distance (about 1 meter) so that they are square. In the middle of this main pillar is placed a fireplace called a round wulikin. An honai is made in an attic so that it is divided into two rooms, at the top it is called henaepu as a bed and the bottom is called agarowa as a place to rest, tell stories or chat, and eat. The upper part of the attic or floor is made of fruit wood and covered with woven lokop wood (a kind of very small bamboo) and can be covered again with straw or dry grass. There is usually only one door in the honai, which is small and short so that people come out and enter on all fours. To the left or right of the entrance is a door leading to the attic. The kariwari is one of the traditional Papuan houses, more precisely the traditional house of the Tobati-Enggros people who live around Yotefa Bay and Lake Sentani near Jayapura. Unlike other forms of Papuan traditional houses, such as the round honai, the kariwari is usually constructed in the shape of an octagonal pyramid. Kariwari are usually made of, bamboo, iron wood and forest sago leaves. The Kariwari house consists of two floors and three rooms or three rooms, each with different functions. The kariwari is not like a honai that can be lived in by anyone, it cannot even be the residence of a tribal chief – unlike the honai which has political and legal functions. The kariwari is more specific as a place of education and worship, therefore the position of the Kariwari in the community of the Tobati-Enggros people is considered a sacred and holy place. Like traditional houses in general, the kariwari also has a design that is full of decorative details that make it unique, of course, the decorations are related to Papuan culture. especially from the Tobati-Enggros. The decorations found in the kariwari are usually in the form of works of art, among others; paintings, carvings and also sculptures. Apart from being decorated with works of art, the kariwari is also decorated with various weapons, such as; bow and arrow. There are also some skeletons of prey animals, usually in the form of wild boar fangs, kangaroo skeletons, turtle or turtle shells, birds-of-paradise, and so on. Rumsram is the traditional house of the Biak Numfor people on the northern coast of Papua. This house was originally intended for men, while women were prohibited from entering or approaching it. Its function is similar to the kariwari, namely as a place for activities in teaching and educating men who are starting to be teenagers, in seeking life experiences. The building is square with a roof in the shape of an upside down boat because of the background of the Biak Numfor tribe who work as sailors. The materials used are bark for floors, split and chopped water bamboo for walls, while the roof is made of dried sago leaves. The walls are made of sago leaves. The original rumsram wall only had a few windows and its position was at the front and back. A rumsram usually has a height of approximately 6–8 m and is divided into two parts, differentiated by floor levels. The first floor is open and without walls. Only the building columns were visible. In this place, men are educated to learn sculpting, shielding, boat building, and war techniques. In a traditional ceremony called Wor Kapanaknik, which in the Biak language means "to shave a child's hair", a traditional ritual is usually carried out when boys are 6–8 years old. The age when a child is considered to be able to think and the child has started to get education in the search for life experiences, as well as how to become a strong and responsible man as the head of the family later. The children would then enter a rumsram, hence the rite of passage is also called rumsram, because the ritual are carried out in the rumsram. The Korowai people from the Mappi Regency in southern Papua is one of the indigenous tribes in Papua that still adheres to the traditions of their ancestors, one of which is to build houses on top of trees. The Korowai people is one of the indigenous tribes in the interior of Papua that still maintains firmly the traditions of their ancestors, one of which is to build a house on a tall tree called Rumah Tinggi (lit. 'high house'). Some of the Korowai people's tree houses can even reach a height of 50 m above the ground. The Korowai people builds houses on top of trees to avoid wild animals and evil spirits. The Korowai people still believes in the myth of Laleo, a cruel demon who often attacks suddenly. Laleo is depicted as an undead that roams at night. According to the Korowai people, the higher the house, the safer it will be from Laleo's attacks. The rumah tinggi is built on big and sturdy trees as the foundation for its foundation. The tops of the trees are then deforested and used as houses. All materials come from nature, logs and boards are used for the roof and floor, while the walls are made of sago bark and wide leaves. The building process for a rumah tinggi usually takes seven days and lasts up to three years. Traditional Weapon The cuscus bone skewer is a traditional Papuan weapon used by one of the indigenous Papuan tribes, namely the Bauzi people. The Bauzi people still maintains their tradition of hunting and gathering. The weapon they use to hunt animals while waiting for the harvest to arrive is a piercing tool made of cuscus bones. The use of cuscus bones as a traditional weapon is very environmentally friendly. This happens because in its manufacture, it does not require the help of industrial equipment that pollutes the environment. This traditional weapon is made from cleaned cuscus bone (before the meat is eaten and separated from the bone), sharpened by rubbing it with a whetstone, and repeated so that the desired sharpness is formed. Papuan knife blades are usually used for slashing or cutting when hunting animals in the forest. Even though the animals they face are large mammals and crocodiles, the Papuan people still adhere to prevailing customs. The custom is that it is not permissible to use any kind of firearm when hunting. Papuan Daggers are knives made of unique materials and are difficult to obtain in other areas, namely the bones of an endemic animal to Papua, the cassowary. Cassowary bones are used by local culture to become a tool that has beneficial values for life. Apart from that, the feathers attached to the blade's handle are also the feathers of the cassowary. The Papuan spear is referred to by the local community as "Tul". The spear was a weapon that could be used for both fighting and hunting. In addition, Papuan culture often uses the spear as a property in dances. The weapons mentioned above are made from basic materials that are easily found in nature. Wood to make the handle, and a river stone that was sharpened as a spearhead. For that reason, the spear is able to survive as a weapon that must be present in hunting and fighting activities. What makes this traditional Papuan weapon feel special is that there is a rule not to use a spear other than for hunting and fighting purposes. For example, it is forbidden to cut young tree shoots with a spear, or to use a spear to carry garden produce. If this rule was broken, the person who wielded this spear would have bad luck. Meanwhile, in the manufacturing process, this spear frame takes a long time. Starting from the wood taken from the tree, then cut to the size of 3 m in a state that has been dried in the sun. After drying it in the sun, the wood for the handle is shaped in such a way, then rubbed with sea snail powder until it is sharp, which takes about 1 week. In traditional Papuan customs, the spear is interpreted as a symbol of a man's prowess. Therefore, the spears must always be properly stored. Usually hung from the ceiling or placed on a house wall support. The bow and arrow is a traditional Papuan weapon that has uses for hunting wild boar and other animals. In addition, the Papuan bow and arrow were tools that were always carried side by side with the spear. Another use of the arrow is a tool for warfare. The difference lies in the material used in the arrowheads. If the aim is to hunt animals, then the arrowheads used are made of bamboo. Meanwhile, when going to war, the indigenous tribes in Papua have rules that require that the spearhead used is made of animal bones. In addition, arrows also function as property for home decoration in several areas in Papua, including Jayapura, Wamena, and Kurulu. In these areas, arrows are only intended for house collections. The collection of bows and arrows is also not allowed to be placed carelessly, that is, they are placed on the wall of the house to still respect the culture of the services of the arrow. The Papuan parang is a symbol of the strength and tenacity of a man in the household. Parang by the local community is called by the name "jalowy". In the manufacturing process, this Papuan machete takes a lot of time. Derived from a split stone, then sharpened to form a machete that has sharpness. To increase the level of hardness and durability, machete craftsmen always add pork oil and pork blood before sharpening it until it is smooth and sharp. This Papuan parang basically has many uses. For household purposes, namely cooking, cutting meat, and cutting down sago. In addition, Papuan machetes are also used in the agricultural industry, and can even be used as a tool to propose to a potential partner. Furthermore, parang can also be used as a collection. Papuan Chisels are traditional Papuan weapons that have various uses, such as cutting rattan for weaving, tools for punching holes in wood, as well as emergency tools for stabbing enemies in the event of war. However, most of their functions have now shifted to tools used in the carpentry field. Historically, in ancient times a chisel was a tool used to trim the fingers of a dead family member. Unfortunately, this culture has been banned by the government and can only be used as a tool in industry. The chisel-making process is not complicated. All it takes is carefulness so as not to rub the edges too thin. To add comfort when worn, craftsmen usually add thin wooden twists. Music and handicrafts Tifa is a traditional Papuan musical instrument that is played by beating. Unlike those from Maluku, this musical instrument from Papua is usually longer and has a handle on one part of the instrument. Meanwhile, the tifa from Maluku has a wide size and there is no handle on the side. The material used also comes from the strongest wood, usually the type of Lenggua wood (Pterocarpus indicus) with animal skin as the upper membrane. The animal's skin is tied with rattan in a circle so that it is tight and can produce a beautiful sound. In addition, on the body part of the musical instrument there is a typical Papuan carving. Tifa is usually used to accompany guest welcoming events, traditional parties, dances, etc. The size of the sound that comes out of the drum depends on the size of the instrument. Apart from being a means of accompanying the dance, the tifa also has a social meaning based on the function and shape of the carved ornaments on the body of the tifa. In the culture of the Marind-Anim people in Merauke, each clan has its own shape and motif as well as a name for each tifa. The same goes for the Biak and Waropen people. Pikon is a traditional wind instrument typical of the Hubala tribe of the Dani people inhabiting the Baliem Valley which is made of bamboo. Pikon comes from the word Pikonane in the Dani languages, which means a sound musical instrument. The icon is oval-shaped. Pikon is made of bamboo, in which a vibrating stick is attached with a rope in the middle, so that it is able to produce a variety of sounds. This musical instrument is generally played by men in the Dani people. They play pikon as a fatigue reliever, even though the resulting sound tends not to be melodious because it is just like the sound of birds chirping without tone. However, with the development of the times, now the sounds made by Pikon can be heard as do, mi and sol tones. Pikon is also played in the Baliem Jayawijaya Valley Cultural Festival commemorating Indonesia's Independence Day. The length of the picon in general is 5.2 cm. The way to play pikon is to blow the center of the bamboo that has been given a hole while pulling the rope that joins the stick. Pikon can also be formed using a hite, which is the bark of an arrow. The triton is a traditional Papuan musical instrument that is played by blowing it. This musical instrument is found throughout the coast, especially in the Biak, Yapen, Waropen and Nabire. Initially, this tool was only used as a means of communication or as a means of calling and signaling. Currently this instrument is also used as a means of entertainment and traditional musical instruments. The Noken is a traditional Papuan bag carried with a head and made of bark fibers. Similar to bags, in general, this bag is used to carry daily necessities. Papuan people usually use it to bring agricultural products such as vegetables, tubers and also to bring merchandise to the market. Because of its uniqueness that is carried with its head, this noken is registered with UNESCO as one of the traditional works and world cultural heritage. On 4 December 2012, the noken was listed in the UNESCO Intangible Cultural Heritage Lists as a cultural heritage of Indonesia. In several areas of Papua, noken – instead of the usual ballot box – is preferred as a way to place ballots, where it is recognized as a ballot tool in the Papua regional leadership elections. The koteka is a penis sheath traditionally worn by native male inhabitants of some (mainly highland) ethnic groups in New Guinea to cover their genitals. They are normally made from a dried-out gourd, Lagenaria siceraria, although unrelated species such as pitcher-plant Nepenthes mirabilis, are also used. They are held in place by a small loop of fiber attached to the base of the koteka and placed around the scrotum. A secondary loop placed around the chest or abdomen is attached to the main body of the koteka. It is traditional clothing in certain New Guinea highlands societies including in the Grand Baliem Valley. It is worn without other clothing, tied in upward position. Many tribes can be identified by the way they wear their koteka. Some wear them pointed straight out, straight up, at an angle, or in other directions. The diameter of the koteka can also be a clue. Contrary to popular belief, there is little correlation between the size or length of the koteka and the social status of the wearer. In 1971–1972 the Indonesian New Order government launched "Operasi Koteka" ("Operation Penis Gourd") which consisted primarily of trying to encourage the people to wear shorts and shirts because such clothes were considered more "modern". But the people did not have changes of clothing, did not have soap, and were unfamiliar with the care of such clothes so the unwashed clothing caused skin diseases. There were also reports of men wearing the shorts as hats and the women using the dresses as carrying bags. Cuisine The native Papuan food usually consists of roasted boar with Tubers such as sweet potato. The staple food of Papua and eastern Indonesia in general is sago, as the counterpart of central and western Indonesian cuisines that favour rice as their staple food. Sago is either processed as a pancake or sago congee called papeda, usually eaten with yellow soup made from tuna, red snapper or other fishes spiced with turmeric, lime, and other spices. On some coasts and lowlands on Papua, sago is the main ingredient to all the foods. Sagu bakar, sagu lempeng, and sagu bola, has become dishes that is well known to all Papua, especially on the custom folk culinary tradition on Mappi, Asmat and Mimika. Papeda is one of the sago foods that is rarely found. As Papua is considered as a non-Muslim majority regions, pork is readily available everywhere. In Papua, pig roast which consists of pork and yams are roasted in heated stones placed in a hole dug in the ground and covered with leaves; this cooking method is called bakar batu (burning the stone), and it is an important cultural and social event among Papuan people. In the coastal regions, seafood is the main food for the local people. One of the famous sea foods from Papua is fish wrap (Indonesian: Ikan Bungkus). Wrapped fish in other areas is called Pepes ikan. Wrapped fish from Papua is known to be very fragrant. This is because there are additional bay leaves so that the mixture of spices is more fragrant and soaks into the fish meat. The basic ingredient of Papuan wrapped fish is sea fish, the most commonly used fish is milkfish. Milkfish is suitable for "wrap" because it has meat that does not crumble after processing. The spices are sliced or cut into pieces, namely, red and bird's eye chilies, bay leaves, tomatoes, galangal, and lemongrass stalks. While other spices are turmeric, garlic and red, red chilies, coriander, and hazelnut. The spices are first crushed and then mixed or smeared on the fish. The wrapping is in banana leaves. Udang selingkuh is a type of prawn dish native to Wamena and the surrounding area. Udang selingkuhis usually served grilled with minimal seasoning, which is only salt. The slightly sweet natural taste of this animal makes it quite salty. The serving of Udang selingkuh is usually accompanied by warm rice and papaya or kale. It is usually also served with the colo-colo sambal combination which has a spicy-sweet taste. Common Papuan snacks are usually made out of sago. Kue bagea (also called sago cake) is a cake originating from Ternate in North Maluku, although it can also be found in Papua. It has a round shape and creamy color. Bagea has a hard consistency that can be softened in tea or water, to make it easier to chew. It is prepared using sago, a plant-based starch derived from the sago palm or sago cycad. Sagu Lempeng is a typical Papuan snacks that is made in the form of processed sago in the form of plates. Sagu Lempeng are also a favorite for travelers. But it is very difficult to find in places to eat because this bread is a family consumption and is usually eaten immediately after cooking. Making sago plates is as easy as making other breads. Sago is processed by baking it by printing rectangles or rectangles with iron which is ripe like white bread. Initially tasteless, but recently it has begun to vary with sugar to get a sweet taste. It has a tough texture and can be enjoyed by mixing it or dipping it in water to make it softer. Sago porridge is a type of porridge that are found in Papua. This porridge is usually eaten with yellow soup made of mackerel or tuna then seasoned with turmeric and lime. Sago porridge is sometimes also consumed with boiled tubers, such as those from cassava or sweet potato. Vegetable papaya flowers and sautéed kale are often served as side dishes to accompany the sago porridge. In the inland regions, Sago worms are usually served as a type of snack dish. Sago worms come from sago trunks which are cut and left to rot. The rotting stems cause the worms to come out. The shape of the sago worms varies, ranging from the smallest to the largest size of an adult's thumb. These sago caterpillars are usually eaten alive or cooked beforehand, such as stir-frying, cooking, frying and then skewered. But over time, the people of Papua used to process these sago caterpillars into sago caterpillar satay. To make satay from this sago caterpillar, the method is no different from making satay in general, namely on skewers with a skewer and grilled over hot coals. See also Asmat Swamp Districts of Papua List of earthquakes in Indonesia List of rivers of Papua Papua conflict References Cited works External links Languages and ethnic groups of Papua Province SIL Ethnologue Provinces of Indonesia Arafura Sea New Guinea Autonomous provinces Ethnic conflicts in Indonesia Articles containing video clips States and territories established in 1969 1969 establishments in Indonesia
[ 0.046454429626464844, -0.18004584312438965, -0.09573309868574142, -0.16348469257354736, -0.3467108905315399, 0.09074621647596359, -0.06277453154325485, 0.0246895682066679, -0.24705204367637634, -0.1722164899110794, -0.0754084587097168, 0.03836411237716675, -0.15268254280090332, 0.330556988...
15200
https://en.wikipedia.org/wiki/IMF%20%28disambiguation%29
IMF (disambiguation)
The IMF, or International Monetary Fund is an international organization. IMF may also refer to: Entertainment Impossible Missions Force, a fictional secret espionage agency in the Mission: Impossible television and film series International Music Feed, a music video television network Internationale Medien und Film, see Intermedia (company) Science and technology Immunofluorescence Labeling, a method used in immunology and cytology Individual Master File, the system used by the IRS to process tax transactions Inframammary fold, in anatomy Intern in Marriage and Family Therapy Initial mass function, in stellar astronomy Intelligent Message Filter, a Microsoft anti-spam technology for Exchange/Outlook Intermolecular forces, non-bonding electrostatic forces between molecules Interoperable Master Format, in cinema, a file-based master format for movies, standardized by SMPTE Interplanetary magnetic field, in space Intramuscular fat, in anatomy Other uses International Myeloma Foundation, a non-profit serving patients with a cancer of plasma cells in the bone marrow International Metalworkers' Federation, a global union federation Internationale Maifestspiele Wiesbaden, International May Festival Fédération Internationale de Motocyclisme, aka International Motorcycling Federation
[ 0.162345752120018, -0.05407745763659477, 0.022222837433218956, 0.1494186669588089, -0.09201968461275101, -0.39487549662590027, -0.44977182149887085, 0.11000777781009674, -0.657638669013977, -0.05013281852006912, -0.31458109617233276, 0.43446576595306396, -0.3972052037715912, 0.837074100971...
15201
https://en.wikipedia.org/wiki/Interdisciplinarity
Interdisciplinarity
Interdisciplinarity or interdisciplinary studies involves the combination of two or more academic disciplines into one activity (e.g., a research project). It draws knowledge from several other fields like sociology, anthropology, psychology, economics etc. It is about creating something by thinking across boundaries. It is related to an interdiscipline or an interdisciplinary field, which is an organizational unit that crosses traditional boundaries between academic disciplines or schools of thought, as new needs and professions emerge. Large engineering teams are usually interdisciplinary, as a power station or mobile phone or other project requires the melding of several specialties. However, the term "interdisciplinary" is sometimes confined to academic settings. The term interdisciplinary is applied within education and training pedagogies to describe studies that use methods and insights of several established disciplines or traditional fields of study. Interdisciplinarity involves researchers, students, and teachers in the goals of connecting and integrating several academic schools of thought, professions, or technologies—along with their specific perspectives—in the pursuit of a common task. The epidemiology of HIV/AIDS or global warming requires understanding of diverse disciplines to solve complex problems. Interdisciplinary may be applied where the subject is felt to have been neglected or even misrepresented in the traditional disciplinary structure of research institutions, for example, women's studies or ethnic area studies. Interdisciplinarity can likewise be applied to complex subjects that can only be understood by combining the perspectives of two or more fields. The adjective interdisciplinary is most often used in educational circles when researchers from two or more disciplines pool their approaches and modify them so that they are better suited to the problem at hand, including the case of the team-taught course where students are required to understand a given subject in terms of multiple traditional disciplines. For example, the subject of land use may appear differently when examined by different disciplines, for instance, biology, chemistry, economics, geography, and politics. Development Although "interdisciplinary" and "interdisciplinarity" are frequently viewed as twentieth century terms, the concept has historical antecedents, most notably Greek philosophy. Julie Thompson Klein attests that "the roots of the concepts lie in a number of ideas that resonate through modern discourse—the ideas of a unified science, general knowledge, synthesis and the integration of knowledge", while Giles Gunn says that Greek historians and dramatists took elements from other realms of knowledge (such as medicine or philosophy) to further understand their own material. The building of Roman roads required men who understood surveying, material science, logistics and several other disciplines. Any broadminded humanist project involves interdisciplinarity, and history shows a crowd of cases, as seventeenth-century Leibniz's task to create a system of universal justice, which required linguistics, economics, management, ethics, law philosophy, politics, and even sinology. Interdisciplinary programs sometimes arise from a shared conviction that the traditional disciplines are unable or unwilling to address an important problem. For example, social science disciplines such as anthropology and sociology paid little attention to the social analysis of technology throughout most of the twentieth century. As a result, many social scientists with interests in technology have joined science, technology and society programs, which are typically staffed by scholars drawn from numerous disciplines. They may also arise from new research developments, such as nanotechnology, which cannot be addressed without combining the approaches of two or more disciplines. Examples include quantum information processing, an amalgamation of quantum physics and computer science, and bioinformatics, combining molecular biology with computer science. Sustainable development as a research area deals with problems requiring analysis and synthesis across economic, social and environmental spheres; often an integration of multiple social and natural science disciplines. Interdisciplinary research is also key to the study of health sciences, for example in studying optimal solutions to diseases. Some institutions of higher education offer accredited degree programs in Interdisciplinary Studies. At another level, interdisciplinarity is seen as a remedy to the harmful effects of excessive specialization and isolation in information silos. On some views, however, interdisciplinarity is entirely indebted to those who specialize in one field of study—that is, without specialists, interdisciplinarians would have no information and no leading experts to consult. Others place the focus of interdisciplinarity on the need to transcend disciplines, viewing excessive specialization as problematic both epistemologically and politically. When interdisciplinary collaboration or research results in new solutions to problems, much information is given back to the various disciplines involved. Therefore, both disciplinarians and interdisciplinarians may be seen in complementary relation to one another. Barriers Because most participants in interdisciplinary ventures were trained in traditional disciplines, they must learn to appreciate differences of perspectives and methods. For example, a discipline that places more emphasis on quantitative rigor may produce practitioners who are more scientific in their training than others; in turn, colleagues in "softer" disciplines who may associate quantitative approaches with difficulty grasp the broader dimensions of a problem and lower rigor in theoretical and qualitative argumentation. An interdisciplinary program may not succeed if its members remain stuck in their disciplines (and in disciplinary attitudes). Those who lack experience in interdisciplinary collaborations may also not fully appreciate the intellectual contribution of colleagues from those discipline. From the disciplinary perspective, however, much interdisciplinary work may be seen as "soft", lacking in rigor, or ideologically motivated; these beliefs place barriers in the career paths of those who choose interdisciplinary work. For example, interdisciplinary grant applications are often refereed by peer reviewers drawn from established disciplines; not surprisingly, interdisciplinary researchers may experience difficulty getting funding for their research. In addition, untenured researchers know that, when they seek promotion and tenure, it is likely that some of the evaluators will lack commitment to interdisciplinarity. They may fear that making a commitment to interdisciplinary research will increase the risk of being denied tenure. Interdisciplinary programs may also fail if they are not given sufficient autonomy. For example, interdisciplinary faculty are usually recruited to a joint appointment, with responsibilities in both an interdisciplinary program (such as women's studies) and a traditional discipline (such as history). If the traditional discipline makes the tenure decisions, new interdisciplinary faculty will be hesitant to commit themselves fully to interdisciplinary work. Other barriers include the generally disciplinary orientation of most scholarly journals, leading to the perception, if not the fact, that interdisciplinary research is hard to publish. In addition, since traditional budgetary practices at most universities channel resources through the disciplines, it becomes difficult to account for a given scholar or teacher's salary and time. During periods of budgetary contraction, the natural tendency to serve the primary constituency (i.e., students majoring in the traditional discipline) makes resources scarce for teaching and research comparatively far from the center of the discipline as traditionally understood. For these same reasons, the introduction of new interdisciplinary programs is often resisted because it is perceived as a competition for diminishing funds. Due to these and other barriers, interdisciplinary research areas are strongly motivated to become disciplines themselves. If they succeed, they can establish their own research funding programs and make their own tenure and promotion decisions. In so doing, they lower the risk of entry. Examples of former interdisciplinary research areas that have become disciplines, many of them named for their parent disciplines, include neuroscience, cybernetics, biochemistry and biomedical engineering. These new fields are occasionally referred to as "interdisciplines". On the other hand, even though interdisciplinary activities are now a focus of attention for institutions promoting learning and teaching, as well as organizational and social entities concerned with education, they are practically facing complex barriers, serious challenges and criticism. The most important obstacles and challenges faced by interdisciplinary activities in the past two decades can be divided into "professional", "organizational", and "cultural" obstacles. Interdisciplinary studies and studies of interdisciplinarity An initial distinction should be made between interdisciplinary studies, which can be found spread across the academy today, and the study of interdisciplinarity, which involves a much smaller group of researchers. The former is instantiated in thousands of research centers across the US and the world. The latter has one US organization, the Association for Interdisciplinary Studies (founded in 1979), two international organizations, the International Network of Inter- and Transdisciplinarity (founded in 2010) and the Philosophy of/as Interdisciplinarity Network (founded in 2009), and one research institute devoted to the theory and practice of interdisciplinarity, the Center for the Study of Interdisciplinarity at the University of North Texas (founded in 2008). As of 1 September 2014, the Center for the Study of Interdisciplinarity has ceased to exist. This is the result of administrative decisions at the University of North Texas. An interdisciplinary study is an academic program or process seeking to synthesize broad perspectives, knowledge, skills, interconnections, and epistemology in an educational setting. Interdisciplinary programs may be founded in order to facilitate the study of subjects which have some coherence, but which cannot be adequately understood from a single disciplinary perspective (for example, women's studies or medieval studies). More rarely, and at a more advanced level, interdisciplinarity may itself become the focus of study, in a critique of institutionalized disciplines' ways of segmenting knowledge. In contrast, studies of interdisciplinarity raise to self-consciousness questions about how interdisciplinarity works, the nature and history of disciplinarity, and the future of knowledge in post-industrial society. Researchers at the Center for the Study of Interdisciplinarity have made the distinction between philosophy 'of' and 'as' interdisciplinarity, the former identifying a new, discrete area within philosophy that raises epistemological and metaphysical questions about the status of interdisciplinary thinking, with the latter pointing toward a philosophical practice that is sometimes called 'field philosophy'. Perhaps the most common complaint regarding interdisciplinary programs, by supporters and detractors alike, is the lack of synthesis—that is, students are provided with multiple disciplinary perspectives, but are not given effective guidance in resolving the conflicts and achieving a coherent view of the subject. Others have argued that the very idea of synthesis or integration of disciplines presupposes questionable politico-epistemic commitments. Critics of interdisciplinary programs feel that the ambition is simply unrealistic, given the knowledge and intellectual maturity of all but the exceptional undergraduate; some defenders concede the difficulty, but insist that cultivating interdisciplinarity as a habit of mind, even at that level, is both possible and essential to the education of informed and engaged citizens and leaders capable of analyzing, evaluating, and synthesizing information from multiple sources in order to render reasoned decisions. While much has been written on the philosophy and promise of interdisciplinarity in academic programs and professional practice, social scientists are increasingly interrogating academic discourses on interdisciplinarity, as well as how interdisciplinarity actually works—and does not—in practice. Some have shown, for example, that some interdisciplinary enterprises that aim to serve society can produce deleterious outcomes for which no one can be held to account. Politics of interdisciplinary studies Since 1998, there has been an ascendancy in the value of interdisciplinary research and teaching and a growth in the number of bachelor's degrees awarded at U.S. universities classified as multi- or interdisciplinary studies. The number of interdisciplinary bachelor's degrees awarded annually rose from 7,000 in 1973 to 30,000 a year by 2005 according to data from the National Center of Educational Statistics (NECS). In addition, educational leaders from the Boyer Commission to Carnegie's President Vartan Gregorian to Alan I. Leshner, CEO of the American Association for the Advancement of Science have advocated for interdisciplinary rather than disciplinary approaches to problem-solving in the 21st century. This has been echoed by federal funding agencies, particularly the National Institutes of Health under the direction of Elias Zerhouni, who has advocated that grant proposals be framed more as interdisciplinary collaborative projects than single-researcher, single-discipline ones. At the same time, many thriving longstanding bachelor's in interdisciplinary studies programs in existence for 30 or more years, have been closed down, in spite of healthy enrollment. Examples include Arizona International (formerly part of the University of Arizona), the School of Interdisciplinary Studies at Miami University, and the Department of Interdisciplinary Studies at Wayne State University; others such as the Department of Interdisciplinary Studies at Appalachian State University, and George Mason University's New Century College, have been cut back. Stuart Henry has seen this trend as part of the hegemony of the disciplines in their attempt to recolonize the experimental knowledge production of otherwise marginalized fields of inquiry. This is due to threat perceptions seemingly based on the ascendancy of interdisciplinary studies against traditional academia. Historical examples There are many examples of when a particular idea, almost on the same period, arises in different disciplines. One case is the shift from the approach of focusing on "specialized segments of attention" (adopting one particular perspective), to the idea of "instant sensory awareness of the whole", an attention to the "total field", a "sense of the whole pattern, of form and function as a unity", an "integral idea of structure and configuration". This has happened in painting (with cubism), physics, poetry, communication and educational theory. According to Marshall McLuhan, this paradigm shift was due to the passage from an era shaped by mechanization, which brought sequentiality, to the era shaped by the instant speed of electricity, which brought simultaneity. Efforts to simplify and defend the concept An article in the Social Science Journal attempts to provide a simple, common-sense, definition of interdisciplinarity, bypassing the difficulties of defining that concept and obviating the need for such related concepts as transdisciplinarity, pluridisciplinarity, and multidisciplinary: In turn, interdisciplinary richness of any two instances of knowledge, research, or education can be ranked by weighing four variables: number of disciplines involved, the "distance" between them, the novelty of any particular combination, and their extent of integration. Interdisciplinary knowledge and research are important because: "Creativity often requires interdisciplinary knowledge. Immigrants often make important contributions to their new field. Disciplinarians often commit errors which can be best detected by people familiar with two or more disciplines. Some worthwhile topics of research fall in the interstices among the traditional disciplines. Many intellectual, social, and practical problems require interdisciplinary approaches. Interdisciplinary knowledge and research serve to remind us of the unity-of-knowledge ideal. Interdisciplinarians enjoy greater flexibility in their research. More so than narrow disciplinarians, interdisciplinarians often treat themselves to the intellectual equivalent of traveling in new lands. Interdisciplinarians may help breach communication gaps in the modern academy, thereby helping to mobilize its enormous intellectual resources in the cause of greater social rationality and justice. By bridging fragmented disciplines, interdisciplinarians might play a role in the defense of academic freedom." Quotations See also Commensurability (philosophy of science) Domon group Encyclopedism Holism Holism in science Integrative learning Interdiscipline Interdisciplinary arts Interdisciplinary teaching Interprofessional education Methodology Polymath Science of team science Social ecological model Science and technology studies (STS) Synoptic philosophy Systems theory Thematic learning Periodic table of human sciences in Tinbergen's four questions Transdisciplinarity References Further reading Association for Integrative Studies Center for the Study of Interdisciplinarity Centre for Interdisciplinary Research in the Arts (University of Manchester) College for Interdisciplinary Studies, University of British Columbia, Vancouver, British Columbia, Canada Frank, Roberta: "'Interdisciplitarity': The First Half Century", Issues in Integrative Studies 6 (1988): 139-151, PDF Frodeman, R., Klein, J.T., and Mitcham, C. Oxford Handbook of Interdisciplinarity. Oxford University Press, 2010. The Evergreen State College, Olympia, Washington Gram Vikas (2007) Annual Report, p. 19. Hang Seng Centre for Cognitive Studies Indiresan, P.V. (1990) Managing Development: Decentralisation, Geographical Socialism And Urban Replication. India: Sage Interdisciplinary Arts Department, Columbia College Chicago Interdisciplinarity and tenure/ Interdisciplinary Studies Project, Harvard University School of Education, Project Zero Klein, Julie Thompson (1996) Crossing Boundaries: Knowledge, Disciplinarities, and Interdisciplinarities (University Press of Virginia) Klein, Julie Thompson (2006) "Resources for interdisciplinary studies." Change, (Mark/April). 52–58 Kockelmans, Joseph J. editor (1979) Interdisciplinarity and Higher Education, The Pennsylvania State University Press . Yifang Ma, Roberta Sinatra, Michael Szell, Interdisciplinarity: A Nobel Opportunity, November 2018 Gerhard Medicus Interdisciplinarity in Human Sciences (Documents No. 6, 7 and 8 in English) Moran, Joe. (2002). Interdisciplinarity. NYU Gallatin School of Individualized Study, New York, NY Poverty Action Lab (accessed on 4 November 2008) Rhoten, D. (2003). A multi-method analysis of the social and technical conditions for interdisciplinary collaboration. School of Social Ecology at the University of California, Irvine Siskin, L.S. & Little, J.W. (1995). The Subjects in Question. Teachers College Press. about the departmental organization of high schools and efforts to change that. Stiglitz, Joseph (2002) Globalisation and its Discontents, United States of America, W.W. Norton and Company Sumner, A and M. Tribe (2008) International Development Studies: Theories and Methods in Research and Practice, London: Sage Thorbecke, Eric. (2006) "The Evolution of the Development Doctrine, 1950–2005". UNU-WIDER Research Paper No. 2006/155. United Nations University, World Institute for Development Economics Research Trans- & inter-disciplinary science approaches- A guide to on-line resources on integration and trans- and inter-disciplinary approaches. Truman State University's Interdisciplinary Studies Program Peter Weingart and Nico Stehr, eds. 2000. Practicing Interdisciplinarity (University of Toronto Press) External links Association for Interdisciplinary Studies National Science Foundation Workshop Report: Interdisciplinary Collaboration in Innovative Science and Engineering Fields Rethinking Interdisciplnarity online conference, organized by the Institut Nicod, CNRS, Paris [broken] Center for the Study of Interdisciplinarity at the University of North Texas Labyrinthe. Atelier interdisciplinaire, a journal (in French), with a special issue on La Fin des Disciplines? Rupkatha Journal on Interdisciplinary Studies in Humanities: An Online Open Access E-Journal, publishing articles on a number of areas Article about interdisciplinary modeling (in French with an English abstract) Wolf, Dieter. Unity of Knowledge, an interdisciplinary project Soka University of America has no disciplinary departments and emphasizes interdisciplinary concentrations in the Humanities, Social and Behavioral Sciences, International Studies, and Environmental Studies. SystemsX.ch - The Swiss Initiative in Systems Biology Tackling Your Inner 5-Year-Old: Saving the world requires an interdisciplinary perspective Academia Academic discipline interactions Epistemology Knowledge Occupations Pedagogy Philosophy of education
[ 0.3869524300098419, 0.010941305197775364, -0.18235662579536438, -0.05776600167155266, -0.15315881371498108, -0.27367207407951355, 0.5192566514015198, 0.49962976574897766, -0.32800722122192383, -0.9666361808776855, -0.8710671067237854, 0.04762383550405502, 0.022000852972269058, 0.1804027557...
15205
https://en.wikipedia.org/wiki/Insertion%20sort
Insertion sort
Insertion sort is a simple sorting algorithm that builds the final sorted array (or list) one item at a time. It is much less efficient on large lists than more advanced algorithms such as quicksort, heapsort, or merge sort. However, insertion sort provides several advantages: Simple implementation: Jon Bentley shows a three-line C version, and a five-line optimized version Efficient for (quite) small data sets, much like other quadratic sorting algorithms More efficient in practice than most other simple quadratic (i.e., O(n2)) algorithms such as selection sort or bubble sort Adaptive, i.e., efficient for data sets that are already substantially sorted: the time complexity is O(kn) when each element in the input is no more than places away from its sorted position Stable; i.e., does not change the relative order of elements with equal keys In-place; i.e., only requires a constant amount O(1) of additional memory space Online; i.e., can sort a list as it receives it When people manually sort cards in a bridge hand, most use a method that is similar to insertion sort. Algorithm Insertion sort iterates, consuming one input element each repetition, and grows a sorted output list. At each iteration, insertion sort removes one element from the input data, finds the location it belongs within the sorted list, and inserts it there. It repeats until no input elements remain. Sorting is typically done in-place, by iterating up the array, growing the sorted list behind it. At each array-position, it checks the value there against the largest value in the sorted list (which happens to be next to it, in the previous array-position checked). If larger, it leaves the element in place and moves to the next. If smaller, it finds the correct position within the sorted list, shifts all the larger values up to make a space, and inserts into that correct position. The resulting array after k iterations has the property where the first k + 1 entries are sorted ("+1" because the first entry is skipped). In each iteration the first remaining entry of the input is removed, and inserted into the result at the correct position, thus extending the result: becomes with each element greater than x copied to the right as it is compared against x. The most common variant of insertion sort, which operates on arrays, can be described as follows: Suppose there exists a function called Insert designed to insert a value into a sorted sequence at the beginning of an array. It operates by beginning at the end of the sequence and shifting each element one place to the right until a suitable position is found for the new element. The function has the side effect of overwriting the value stored immediately after the sorted sequence in the array. To perform an insertion sort, begin at the left-most element of the array and invoke Insert to insert each element encountered into its correct position. The ordered sequence into which the element is inserted is stored at the beginning of the array in the set of indices already examined. Each insertion overwrites a single value: the value being inserted. Pseudocode of the complete algorithm follows, where the arrays are zero-based: i ← 1 while i < length(A) j ← i while j > 0 and A[j-1] > A[j] swap A[j] and A[j-1] j ← j - 1 end while i ← i + 1 end while The outer loop runs over all the elements except the first one, because the single-element prefix A[0:1] is trivially sorted, so the invariant that the first i entries are sorted is true from the start. The inner loop moves element A[i] to its correct place so that after the loop, the first i+1 elements are sorted. Note that the and-operator in the test must use short-circuit evaluation, otherwise the test might result in an array bounds error, when j=0 and it tries to evaluate A[j-1] > A[j] (i.e. accessing A[-1] fails). After expanding the swap operation in-place as x ← A[j]; A[j] ← A[j-1]; A[j-1] ← x (where x is a temporary variable), a slightly faster version can be produced that moves A[i] to its position in one go and only performs one assignment in the inner loop body: i ← 1 while i < length(A) x ← A[i] j ← i - 1 while j >= 0 and A[j] > x A[j+1] ← A[j] j ← j - 1 end while A[j+1] ← x i ← i + 1 end while The new inner loop shifts elements to the right to clear a spot for x = A[i]. The algorithm can also be implemented in a recursive way. The recursion just replaces the outer loop, calling itself and storing successively smaller values of n on the stack until n equals 0, where the function then returns up the call chain to execute the code after each recursive call starting with n equal to 1, with n increasing by 1 as each instance of the function returns to the prior instance. The initial call would be insertionSortR(A, length(A)-1). function insertionSortR(array A, int n) if n > 0 insertionSortR(A, n-1) x ← A[n] j ← n-1 while j >= 0 and A[j] > x A[j+1] ← A[j] j ← j-1 end while A[j+1] ← x end if end function It does not make the code any shorter, it also doesn't reduce the execution time, but it increases the additional memory consumption from to (at the deepest level of recursion the stack contains references to the array, each with accompanying value of variable from down to 1). Best, worst, and average cases The best case input is an array that is already sorted. In this case insertion sort has a linear running time (i.e., O(n)). During each iteration, the first remaining element of the input is only compared with the right-most element of the sorted subsection of the array. The simplest worst case input is an array sorted in reverse order. The set of all worst case inputs consists of all arrays where each element is the smallest or second-smallest of the elements before it. In these cases every iteration of the inner loop will scan and shift the entire sorted subsection of the array before inserting the next element. This gives insertion sort a quadratic running time (i.e., O(n2)). The average case is also quadratic, which makes insertion sort impractical for sorting large arrays. However, insertion sort is one of the fastest algorithms for sorting very small arrays, even faster than quicksort; indeed, good quicksort implementations use insertion sort for arrays smaller than a certain threshold, also when arising as subproblems; the exact threshold must be determined experimentally and depends on the machine, but is commonly around ten. Example: The following table shows the steps for sorting the sequence {3, 7, 4, 9, 5, 2, 6, 1}. In each step, the key under consideration is underlined. The key that was moved (or left in place because it was the biggest yet considered) in the previous step is marked with an asterisk. 3 7 4 9 5 2 6 1 3* 7 4 9 5 2 6 1 3 7* 4 9 5 2 6 1 3 4* 7 9 5 2 6 1 3 4 7 9* 5 2 6 1 3 4 5* 7 9 2 6 1 2* 3 4 5 7 9 6 1 2 3 4 5 6* 7 9 1 1* 2 3 4 5 6 7 9 Relation to other sorting algorithms Insertion sort is very similar to selection sort. As in selection sort, after k passes through the array, the first k elements are in sorted order. However, the fundamental difference between the two algorithms is that insertion sort scans backwards from the current key, while selection sort scans forwards. This results in selection sort making the first k elements the k smallest elements of the unsorted input, while in insertion sort they are simply the first k elements of the input. The primary advantage of insertion sort over selection sort is that selection sort must always scan all remaining elements to find the absolute smallest element in the unsorted portion of the list, while insertion sort requires only a single comparison when the (k + 1)-st element is greater than the k-th element; when this is frequently true (such as if the input array is already sorted or partially sorted), insertion sort is distinctly more efficient compared to selection sort. On average (assuming the rank of the (k + 1)-st element rank is random), insertion sort will require comparing and shifting half of the previous k elements, meaning that insertion sort will perform about half as many comparisons as selection sort on average. In the worst case for insertion sort (when the input array is reverse-sorted), insertion sort performs just as many comparisons as selection sort. However, a disadvantage of insertion sort over selection sort is that it requires more writes due to the fact that, on each iteration, inserting the (k + 1)-st element into the sorted portion of the array requires many element swaps to shift all of the following elements, while only a single swap is required for each iteration of selection sort. In general, insertion sort will write to the array O(n2) times, whereas selection sort will write only O() times. For this reason selection sort may be preferable in cases where writing to memory is significantly more expensive than reading, such as with EEPROM or flash memory. While some divide-and-conquer algorithms such as quicksort and mergesort outperform insertion sort for larger arrays, non-recursive sorting algorithms such as insertion sort or selection sort are generally faster for very small arrays (the exact size varies by environment and implementation, but is typically between 7 and 50 elements). Therefore, a useful optimization in the implementation of those algorithms is a hybrid approach, using the simpler algorithm when the array has been divided to a small size. Variants D.L. Shell made substantial improvements to the algorithm; the modified version is called Shell sort. The sorting algorithm compares elements separated by a distance that decreases on each pass. Shell sort has distinctly improved running times in practical work, with two simple variants requiring O(n3/2) and O(n4/3) running time. If the cost of comparisons exceeds the cost of swaps, as is the case for example with string keys stored by reference or with human interaction (such as choosing one of a pair displayed side-by-side), then using binary insertion sort may yield better performance. Binary insertion sort employs a binary search to determine the correct location to insert new elements, and therefore performs ⌈log2 n⌉ comparisons in the worst case. When each element in the array is searched for and inserted this is O(n log n). The algorithm as a whole still has a running time of O(n2) on average because of the series of swaps required for each insertion. The number of swaps can be reduced by calculating the position of multiple elements before moving them. For example, if the target position of two elements is calculated before they are moved into the proper position, the number of swaps can be reduced by about 25% for random data. In the extreme case, this variant works similar to merge sort. A variant named binary merge sort uses a binary insertion sort to sort groups of 32 elements, followed by a final sort using merge sort. It combines the speed of insertion sort on small data sets with the speed of merge sort on large data sets. To avoid having to make a series of swaps for each insertion, the input could be stored in a linked list, which allows elements to be spliced into or out of the list in constant time when the position in the list is known. However, searching a linked list requires sequentially following the links to the desired position: a linked list does not have random access, so it cannot use a faster method such as binary search. Therefore, the running time required for searching is O(n), and the time for sorting is O(n2). If a more sophisticated data structure (e.g., heap or binary tree) is used, the time required for searching and insertion can be reduced significantly; this is the essence of heap sort and binary tree sort. In 2006 Bender, Martin Farach-Colton, and Mosteiro published a new variant of insertion sort called library sort or gapped insertion sort that leaves a small number of unused spaces (i.e., "gaps") spread throughout the array. The benefit is that insertions need only shift elements over until a gap is reached. The authors show that this sorting algorithm runs with high probability in O(n log n) time. If a skip list is used, the insertion time is brought down to O(log n), and swaps are not needed because the skip list is implemented on a linked list structure. The final running time for insertion would be O(n log n). List insertion sort is a variant of insertion sort. It reduces the number of movements. List insertion sort code in C If the items are stored in a linked list, then the list can be sorted with O(1) additional space. The algorithm starts with an initially empty (and therefore trivially sorted) list. The input items are taken off the list one at a time, and then inserted in the proper place in the sorted list. When the input list is empty, the sorted list has the desired result. struct LIST * SortList1(struct LIST * pList) { // zero or one element in list if (pList == NULL || pList->pNext == NULL) return pList; // head is the first element of resulting sorted list struct LIST * head = NULL; while (pList != NULL) { struct LIST * current = pList; pList = pList->pNext; if (head == NULL || current->iValue < head->iValue) { // insert into the head of the sorted list // or as the first element into an empty sorted list current->pNext = head; head = current; } else { // insert current element into proper position in non-empty sorted list struct LIST * p = head; while (p != NULL) { if (p->pNext == NULL || // last element of the sorted list current->iValue < p->pNext->iValue) // middle of the list { // insert into middle of the sorted list or as the last element current->pNext = p->pNext; p->pNext = current; break; // done } p = p->pNext; } } } return head; } The algorithm below uses a trailing pointer for the insertion into the sorted list. A simpler recursive method rebuilds the list each time (rather than splicing) and can use O(n) stack space. struct LIST { struct LIST * pNext; int iValue; }; struct LIST * SortList(struct LIST * pList) { // zero or one element in list if (!pList || !pList->pNext) return pList; /* build up the sorted array from the empty list */ struct LIST * pSorted = NULL; /* take items off the input list one by one until empty */ while (pList != NULL) { /* remember the head */ struct LIST * pHead = pList; /* trailing pointer for efficient splice */ struct LIST ** ppTrail = &pSorted; /* pop head off list */ pList = pList->pNext; /* splice head into sorted list at proper place */ while (!(*ppTrail == NULL || pHead->iValue < (*ppTrail)->iValue)) { /* does head belong here? */ /* no - continue down the list */ ppTrail = &(*ppTrail)->pNext; } pHead->pNext = *ppTrail; *ppTrail = pHead; } return pSorted; } References Further reading . External links – graphical demonstration . . – implementations of insertion sort in C and several other programming languages Sorting algorithms Comparison sorts Stable sorts Articles with example pseudocode Online sorts no:Sorteringsalgoritme#Innstikksortering
[ -0.23571895062923431, -0.3601585328578949, -0.4362489581108093, -0.10976189374923706, -0.0653834119439125, 0.45456981658935547, -0.12268951535224915, -0.267608642578125, -0.307291716337204, -0.6241912841796875, -0.6204329133033752, 0.06903410702943802, -0.650705099105835, 0.025115445256233...
15207
https://en.wikipedia.org/wiki/Ig%20Nobel%20Prize
Ig Nobel Prize
The Ig Nobel Prize ( ) is a satiric prize awarded annually since 1991 to celebrate ten unusual or trivial achievements in scientific research, its stated aim being to "honor achievements that first make people laugh, and then make them think." The name of the award is a pun on the Nobel Prize, which it parodies, and on the word ignoble (not noble). Organized by the scientific humor magazine Annals of Improbable Research (AIR), the Ig Nobel Prizes are presented by Nobel laureates in a ceremony at the Sanders Theater, Harvard University, and are followed by the winners' public lectures at the Massachusetts Institute of Technology. History The Ig Nobels were created in 1991 by Marc Abrahams, editor and co-founder of the Annals of Improbable Research, a former editor-in-chief of the Journal of Irreproducible Results who has been master of ceremonies at all awards ceremonies. Awards were presented at that time for discoveries "that cannot, or should not, be reproduced". Ten prizes are awarded each year in many categories, including the Nobel Prize categories of physics, chemistry, physiology/medicine, literature, and peace, but also other categories such as public health, engineering, biology, and interdisciplinary research. The Ig Nobel Prizes recognize genuine achievements, with the exception of three prizes awarded in the first year to fictitious scientists Josiah S. Carberry, Paul DeFanti, and Thomas Kyle. The awards are sometimes criticism via satire, as in the two awards given for homeopathy research, prizes in "science education" to the Kansas State Department of Education and Colorado State Board of Education for their stance regarding the teaching of evolution, and the prize awarded to Social Text after the Sokal affair. Most often, however, they draw attention to scientific articles that have some humorous or unexpected aspect. Examples range from the discovery that the presence of humans tends to sexually arouse ostriches, to the statement that black holes fulfill all the technical requirements for being the location of Hell, to research on the "five-second rule", a tongue-in-cheek belief that food dropped on the floor will not become contaminated if it is picked up within five seconds. Sir Andre Geim, who had been awarded an Ig Nobel Prize in 2000 for levitating a frog by magnetism, was awarded a Nobel Prize in physics in 2010 for his work with the electromagnetic properties of graphene. He is the only individual, as of 2021, to have received both a Nobel and an Ig Nobel. Ceremony The prizes are mostly presented by Nobel laureates, originally at a ceremony in a lecture hall at MIT but since 1994 in the Sanders Theater at Harvard University. Due to the COVID-19 pandemic, 2020 and 2021's event was held fully online. The event contains a number of running jokes, including Miss Sweetie Poo, a little girl who repeatedly cries out, "Please stop: I'm bored", in a high-pitched voice if speakers go on too long. The awards ceremony is traditionally closed with the words: "If you didn't win a prize—and especially if you did—better luck next year!" The ceremony is co-sponsored by the Harvard Computer Society, the Harvard–Radcliffe Science Fiction Association and the Harvard–Radcliffe Society of Physics Students. Throwing paper planes onto the stage is a long-standing tradition. For many years Professor Roy J. Glauber swept the stage clean of the airplanes as the official "Keeper of the Broom." Glauber could not attend the 2005 awards because he was traveling to Stockholm to claim a genuine Nobel Prize in Physics. The "Parade of Ignitaries" into the hall includes supporting groups. At the 1997 ceremonies, a team of "cryogenic sex researchers" distributed a pamphlet titled "Safe Sex at Four Kelvin." Delegates from the Museum of Bad Art are often on hand to display some pieces from their collection. Outreach The ceremony is recorded and broadcast on National Public Radio in the US and is shown live over the Internet. The recording is broadcast each year, on the Friday after US Thanksgiving, on the public radio program Science Friday. In recognition of this, the audience chants the name of the radio show's host, Ira Flatow. Two books have been published with write-ups on some winners: The Ig Nobel Prize, and The Ig Nobel Prize 2 which was later retitled The Man Who Tried to Clone Himself. An Ig Nobel Tour has been an annual part of National Science week in the United Kingdom since 2003. The tour has also traveled to Australia several times, Aarhus University in Denmark in April 2009, Italy and The Netherlands. Reception A September 2009 article in The National titled "A noble side to Ig Nobels" says that, although the Ig Nobel Awards are veiled criticism of trivial research, history shows that trivial research sometimes leads to important breakthroughs. For instance, in 2006, a study showing that one of the malaria mosquitoes (Anopheles gambiae) is attracted equally to the smell of Limburger cheese and the smell of human feet earned the Ig Nobel Prize in the area of biology. As a direct result of these findings, traps baited with this cheese have been placed in strategic locations in some parts of Africa to combat the epidemic of malaria. And Andre Geim, before sharing the 2010 Nobel Prize in Physics for his research on graphene, shared the Physics Ig Nobel in 2000 with Michael Berry for the magnetic levitation of a frog, which by 2022 was reportedly part of the inspiration for China's lunar gravity research facility. See also List of Ig Nobel Prize winners Darwin Awards – an award for enriching the human gene pool by idiotic self-destruction Golden Raspberry Awards – awards for bad movies Bulwer-Lytton Fiction Contest – an award for bad writing Bookseller/Diagram Prize for Oddest Title of the Year – a book prize Pigasus Award – exposing parapsychological, paranormal, or psychic frauds Golden Fleece Award – award for waste of government funds; often awarded for government-paid research considered frivolous or wasteful "British scientists" - Russian joke regarding absurd news reports about scientific discoveries References External links Index to list of past winners 1991 establishments in the United States Awards established in 1991 Harvard University Ironic and humorous awards Humour in science
[ -0.42617475986480713, 0.4792620539665222, 0.10204334557056427, 0.1663060486316681, -0.3793339133262634, -0.2565382122993469, 0.006578532978892326, 0.37509217858314514, -0.2134418487548828, 0.2922962009906769, -0.3646860718727112, 0.4689123034477234, -0.14704325795173645, 0.8281382918357849...
15208
https://en.wikipedia.org/wiki/Isaac%20Alb%C3%A9niz
Isaac Albéniz
Isaac Manuel Francisco Albéniz y Pascual (; 29 May 1860 – 18 May 1909) was a Spanish Catalan virtuoso pianist, composer, and conductor. He is one of the foremost composers of the Post-Romantic era who also had a significant influence on his contemporaries and younger composers. He is best known for his piano works based on Spanish folk music idioms. Transcriptions of many of his pieces, such as Asturias (Leyenda), Granada, Sevilla, Cadiz, Córdoba, Cataluña, Mallorca, and Tango in D, are important pieces for classical guitar, though he never composed for the guitar. The personal papers of Albéniz are preserved in, among other institutions, the Library of Catalonia. Life Born in Camprodon, province of Girona, to Ángel Albéniz (a customs official) and his wife, Maria de los Dolores Pascual, Albéniz was a child prodigy who first performed at the age of four. At age seven, after apparently taking lessons from Antoine François Marmontel, he passed the entrance examination for piano at the Conservatoire de Paris, but he was refused admission because he was believed to be too young. By the time he had reached 12, he had made many attempts to run away from home. His concert career began at the age of nine when his father toured both Isaac and his sister, Clementina, throughout northern Spain. A popular myth is that at the age of twelve Albéniz stowed away in a ship bound for Buenos Aires. He then found himself in Cuba, then in the United States, giving concerts in New York and San Francisco and then travelled to Liverpool, London and Leipzig. By age 15, he had already given concerts worldwide. This story is not entirely false, Albéniz did travel the world as a performer; however, he was accompanied by his father, who as a customs agent was required to travel frequently. This can be attested by comparing Isaac's concert dates with his father's travel itinerary. In 1876, after a short stay at the Leipzig Conservatory, he went to study at the Royal Conservatory of Brussels after King Alfonso's personal secretary, Guillermo Morphy, obtained him a royal grant. Count Morphy thought highly of Albéniz, who would later dedicate Sevilla to Morphy's wife when it premiered in Paris in January 1886. In 1880 Albéniz went to Budapest, Hungary, to study with Franz Liszt, only to find out that Liszt was in Weimar, Germany. In 1883 he met the teacher and composer Felip Pedrell, who inspired him to write Spanish music such as the Chants d'Espagne. The first movement (Prelude) of that suite, later retitled after the composer's death as Asturias (Leyenda), is now part of the classical guitar repertoire, even though it was originally composed for piano. Many of Albéniz's other compositions were also transcribed for guitar by Francisco Tárrega. At the 1888 Barcelona Universal Exposition, the piano manufacturer Érard sponsored a series of 20 concerts featuring Albéniz's music. The apex of Albéniz's concert career is considered to be 1889 to 1892 when he had concert tours throughout Europe. During the 1890s Albéniz lived in London and Paris. For London he wrote some musical comedies which brought him to the attention of the wealthy Francis Money-Coutts, 5th Baron Latymer. Money-Coutts commissioned and provided him with librettos for the opera Henry Clifford and for a projected trilogy of Arthurian operas. The first of these, Merlin (1898–1902), was thought to have been lost but has recently been reconstructed and performed. Albéniz never completed Lancelot (only the first act is finished, as a vocal and piano score), and he never began Guinevere, the final part. In 1900 he started to suffer from Bright's disease and returned to writing piano music. Between 1905 and 1908 he composed his final masterpiece, Iberia (1908), a suite of twelve piano "impressions". In 1883 the composer married his student Rosina Jordana. They had two children who lived into adulthood: Laura (a painter) and Alfonso (who played for Real Madrid in the early 1900s before embarking on a career as a diplomat). Another child, Blanca, died in 1886, and two other children died in infancy. His great-granddaughter is Cécilia Attias, former wife of Nicolas Sarkozy. Albéniz died from his kidney disease on 18 May 1909 at age 48 in Cambo-les-Bains, in Labourd, south-western France. Only a few weeks before his death, the French Government bestowed upon Albéniz the Legion of Honour, its highest honour. He is buried at the Montjuïc Cemetery, Barcelona. Music Early works Albéniz's early works were mostly "salon style" music. Albéniz's first published composition, Marcha Militar, appeared in 1868. A number of works written before this are now lost. He continued composing in traditional styles ranging from Jean-Philippe Rameau, Johann Sebastian Bach, Ludwig van Beethoven, Frédéric Chopin and Franz Liszt until the mid-1880s. He also wrote at least five zarzuelas, of which all but two are now lost. Perhaps the best source on the works is Albéniz himself. He is quoted as commenting on his earlier period works as:There are among them a few things that are not completely worthless. The music is a bit infantile, plain, spirited; but in the end, the people, our Spanish people, are something of all that. I believe that the people are right when they continue to be moved by Córdoba, Mallorca, by the copla of the Sevillanas, by the Serenata, and Granada. In all of them I now note that there is less musical science, less of the grand idea, but more colour, sunlight, flavour of olives. That music of youth, with its little sins and absurdities that almost point out the sentimental affectation ... appears to me like the carvings in the Alhambra, those peculiar arabesques that say nothing with their turns and shapes, but which are like the air, like the sun, like the blackbirds or like the nightingales of its gardens. They are more valuable than all else of Moorish Spain, which though we may not like it, is the true Spain. Middle period During the late 1880s, the strong influence of Spanish style is evident in Albéniz's music. In 1883 Albéniz met the teacher and composer Felipe Pedrell. Pedrell was a leading figure in the development of nationalist Spanish music. In his book The Music of Spain, Gilbert Chase describes Pedrell's influence on Albéniz: "What Albéniz derived from Pedrell was above all a spiritual orientation, the realization of the wonderful values inherent in Spanish music." Felipe Pedrell inspired Albéniz to write Spanish music such as the Suite española, Op. 47, noted for its delicate, intricate melody and abrupt dynamic changes. In addition to the Spanish spirit infused in Albéniz's music, he incorporated other qualities as well. In her biography of Albéniz, Pola Baytelman discerns four characteristics of the music from the middle period as follows: 1. The dance rhythms of Spain, of which there are a wide variety. 2. The use of cante jondo, which means deep or profound singing. It is the most serious and moving variety of flamenco or Spanish gypsy song, often dealing with themes of death, anguish, or religion. 3. The use of exotic scales also associated with flamenco music. The Phrygian mode is the most prominent in Albéniz's music, although he also used the Aeolian and Mixolydian modes as well as the whole-tone scale. 4. The transfer of guitar idioms into piano writing. Following his marriage, Albéniz settled in Madrid, Spain and produced a substantial quantity of music in a relatively short period. By 1886 he had written over 50 piano pieces. Albéniz biographer Walter A. Clark says that pieces from this period received enthusiastic reception in the composer's many concerts. Chase describes music from this period, Taking the guitar as his instrumental model, and drawing his inspiration largely from the peculiar traits of Andalusian folk music—but without using actual folk themes—Albéniz achieves a stylization of Spanish traditional idioms that while thoroughly artistic, gives a captivating impression of spontaneous improvisation... Córdoba is the piece that best represents the style of Albéniz in this period, with its hauntingly beautiful melody, set against the acrid dissonances of the plucked accompaniment imitating the notes of the Moorish guslas. Here is the heady scent of jasmines amid the swaying palm trees, the dream fantasy of an Andalusian "Arabian Nights" in which Albéniz loved to let his imagination dwell. Later period While Albéniz's crowning achievement, Iberia, was written in the last years of his life in France, many of its preceding works are well-known and of great interest. The five pieces in Chants d'Espagne, (Songs of Spain, published in 1892) are a solid example of the compositional ideas he was exploring in the "middle period" of his life. The suite shows what Albéniz biographer Walter Aaron Clark describes as the "first flowering of his unique creative genius", and the beginnings of compositional exploration that became the hallmark of his later works. This period also includes his operatic works—Merlin, Henry Clifford, and Pepita Jiménez. His orchestral works of this period include Spanish Rhapsody (1887) and Catalonia (1899), dedicated to Ramon Casas, who had painted his full-length portrait in 1894. Impact As one of the leading composers of his era, Albéniz's influences on both contemporary composers and on the future of Spanish music are profound. As a result of his extended stay in France and the friendship he formed with numerous composers there, his composition technique and harmonic language has influenced aspiring younger composers such as Claude Debussy and Maurice Ravel. His activities as conductor, performer and composer significantly raised the profile of Spanish music abroad and encouraged Spanish music and musicians in his own country. Albéniz's works have become an important part of the repertoire of the classical guitar, many of which have been transcribed by Francisco Tárrega, Miguel Llobet and others. Asturias (Leyenda) in particular is heard most often on the guitar, as are Granada, Sevilla, Cadiz, Cataluña, Córdoba, Mallorca, and Tango in D. Gordon Crosskey and Cuban-born guitarist Manuel Barrueco have both made solo guitar arrangements of all the eight-movements in Suite española. Selections from Iberia have rarely been attempted on solo guitar but have been very effectively performed by guitar ensembles, such as the performance by John Williams and Julian Bream of Iberia's opening "Evocation". The Doors incorporated "Asturias" into their song "Spanish Caravan"; also, Iron Maiden's "To Tame a Land" uses the introduction of the piece for the song bridge. More recently, a guitar version of Granada functions as something of a love theme in Woody Allen's 2008 film Vicky Cristina Barcelona. The theme from Asturias was incorporated or adapted in several soundtracks including the 2008 horror film Mirrors, composed by Javier Navarrete, or the Netflix TV show Godless, composed by Carlos Rafael Rivera. In 1997 the Fundación Isaac Albéniz was founded to promote Spanish music and musicians and to act as a research centre for Albéniz and Spanish music in general. A street in Quito, Ecuador, is named after him. In film A film about his life entitled Albéniz was made in 1947. It was produced in Argentina. References and sources References Sources Further reading Alarcón Hernández, Joana; et al. Isaac Albéniz, artistes i mecenes. Barcelona: Museu Diocesà de Barcelona, 2009. Albéniz, Isaac. Chants d'Espagne, G. Henle Verlag, Berlin, 2004. Albéniz, Isaac. Impresiones y diarios de viaje. [Madrid]: Fundación Isaac Albéniz, DL 1990. Amat Cortes, Joan. Isaac Albéniz, un català universal. [Barcelona]: Cevagraf, DL 1998. Aviñoa, Xosé. Albéniz. Madrid; Barcelona [etc.]: Daimon, cop. 1986. Aviñoa, Xosé. La música i el Modernisme. Barcelona: Curial, 1985. (Biblioteca de cultura catalana (Curial Edicions Catalanes); 58). Aviñoa, Xosé. Modernisme i Modernistes – Musica i Modernisme: Definició i Període. Lunwerg editores, 2001. Baytelman, Pola. Isaac Albéniz: Chronological List and Thematic Catalog of His Piano Works, Harmonie Park Press, Michigan 1993. Clark, Walter Aaron. Isaac Albéniz: A Guide to Research, Garland Publishing Inc. New York & London, 1998. Ericourt, Daniel; Erickson, Robert. P. MasterClasses in Spanish Piano Music, Hinshaw Music, Chapel Hill North Carolina, 1984. Gauthier, André. Albéniz. Madrid: Espasa Calpe, 1978. (Clásicos de la música). Guerra y Alarcón, Antonio. Isaac Albéniz. Notas crítico-biográficas de tan eminente pianista. [S.l.]: Fundación Isaac Albéniz, DL 1990. Heras, Antonio de las. Vida de Albéniz. Barcelona: Ediciones Patria, [1942]. Iglesias, Antonio. Isaac Albéniz : su obra para piano. 2 vols. Madrid: Alpuerto, DL 1987. Jean-Aubry, G. "Isaac Albéniz 1860–1909", in The Musical Times, vol 58, no. 898, December 1917 pp. 535–538. Kalfa, Jacqueline. Isaac Albéniz (1860–1909) : la vocation de l'Espagne. Paris: Séguier, 2000. (Carré Musique; 4). Marco, Thomas. Spanish Music in the Twentieth Century. 1993. Martorell, Oriol; Valls, Manuel. Síntesi històrica de la música catalana. Sant Cugat del Vallès: Els llibres de la frontera, 1985. Montero Alonso, José. Albéniz, España en "suite". Madrid: Editorial Silex, 1988. Morales, Luisa; Clark, Walter A. Antes de Iberia : de Masarnau a Albéniz : actas del Symposium FIMTE 2008 = Pre-Iberia : from Masarnau to Albéniz : proceedings of FIMTE Symposium 2008. Garrucha: Leal; [Granada]: Centro de Documentación Musical de Andalucía, cop. 2009. (Series FIMTE; 3). Pedrell, Felip. Concierto de Albéniz. Madrid: Fundación Isaac Albéniz, 1990. Pérez Senz, Javier. Isaac Albéniz, 1860–1909. Cents anys : un geni romàntic. Barcelona: Institut de Cultura, Departament de Cultura i Mitjans de Comunicació, 2008. (Quaderns de l'Auditori; 7). Reverter, Arturo. Albéniz-Arbós, historia de una amistad. Madrid: Scherzo, 1989. Romero, Justo. Isaac Albéniz. Barcelona: Península, 2002. (Guías Scherzo; 14). Ruiz Albéniz, Victor. Isaac Albéniz. Madrid: Comisaría General de Música, 1948. Salazar, Adolfo. "Isaac Albéniz y los albores del renacimiento musical en España", en Revista de Occidente, vol. 12 (Madrid, 1926), pp. 99–107. Sempronio. Retrats de Ramon Casas. Barcelona: Edicions Polígrafa, 1970. Torres, Jacinto. Las claves Madrileñas de Isaac Albéniz. Imprenta Artesanal de Madrid, 2009. Torres Mulas, Jacinto. Catálogo sistemático descriptivo de las obras musicales de Isaac Albéniz. Madrid : Instituto de Bibliografía Musical, DL 2001. Villalba, Luis. Imagen distanciada de un compositor-pianista. Madrid: Fundación Isaac Albéniz, 1990. Albéniz : edición conmemorativa del centenario de Isaac Albéniz 1909–2009. [Madrid]: Ministerio de Cultura, Sociedad Cultural de Conmemoraciones Culturales, DL 2009. Albéniz : leyendas y verdades : Conde Duque. Sala de las Bóvedas del 11 de noviembre de 2009 al 31 de enero de 2010. Madrid: Centro Cultural del Conde Duque. Ayuntamiento de Madrid, Sociedad Estatal de Conmemoraciones Culturales, 2009. External links Albéniz Foundation Personal papers of Isaac Albéniz in the Biblioteca de Catalunya En torno a Isaac Albéniz y su "Iberia" by Antonio Iglesias, Antonio Fernández-Cid (ref) Facsimiles (La Biblioteca Virtual Miguel de Cervantes) Improvisación nº 1, Improvisación nº 2, Improvisación nº 3 (ref – La Biblioteca Virtual Miguel de Cervantes) Photos (Gallica) L'escola pianística catalana (Enregistraments històrics) (la mà de guido , LMG3060) The Catalan Piano Tradition (VAI Audio, 1001) Rollos de Pianola (Obras de Albéniz, Granados, Turina, Ocón, Chapí, Alonso y Otros) (Almaviva, DS – 0141) Tango, arranged by Mischa Elman for violin and piano (from the Sibley Music Library Digital Scores Collection) 1860 births 1909 deaths 19th-century classical composers 19th-century classical pianists 19th-century Spanish male musicians 19th-century Spanish musicians 20th-century classical composers 20th-century classical pianists 20th-century Spanish male musicians 20th-century Spanish musicians Burials at Montjuïc Cemetery Classical composers from Catalonia Classical musicians from Catalonia Catalan pianists Composers for piano Deaths from nephritis Male classical pianists Male opera composers Pupils of Salomon Jadassohn Pupils of Vincent d'Indy Spanish classical composers Spanish classical pianists Spanish male classical composers Spanish opera composers Spanish Romantic composers University of Music and Theatre Leipzig alumni
[ -0.0181747879832983, 0.6295786499977112, -0.5693939924240112, -0.3071762025356293, -0.27462759613990784, 1.0303417444229126, 0.2535284161567688, 0.171703040599823, -0.1541781723499298, -0.9621652960777283, 0.12905491888523102, 0.21984557807445526, -0.7571382522583008, 0.29795747995376587, ...
15210
https://en.wikipedia.org/wiki/ITU-R
ITU-R
The ITU Radiocommunication Sector (ITU-R) is one of the three sectors (divisions or units) of the International Telecommunication Union (ITU) and is responsible for radio communications. Its role is to manage the international radio-frequency spectrum and satellite orbit resources and to develop standards for radiocommunication systems with the objective of ensuring the effective use of the spectrum. ITU is required, according to its constitution, to allocate spectrum and register frequency allocation, orbital positions and other parameters of satellites, “in order to avoid harmful interference between radio stations of different countries”. The international spectrum management system is therefore based on regulatory procedures for frequency coordination, notification and registration. ITU-R has a permanent secretariat, the Radiocommunication Bureau, based at the ITU HQ in Geneva, Switzerland. The elected Director of the Bureau is Mr. Mario Maniewicz; he was first elected by the ITU membership to the directorship in 2018. History The CCIR—Comité consultatif international pour la radio, Consultative Committee on International Radio or International Radio Consultative Committee—was founded in 1927. In 1932 the CCIR and several other organizations (including the original ITU, which had been founded as the International Telegraph Union in 1865) merged to form what would in 1934 become known as the International Telecommunication Union. In 1992, the CCIR became the ITU-R. See also ITU-T ITU-R Recommendations Rec. 601 Rec. 709 Global Standards Collaboration Radio science#ITU-R References External links International Telecommunication Union Radio organizations
[ 0.3218773603439331, 0.2810007929801941, 0.24121905863285065, -0.2543483078479767, -0.09055263549089432, 0.14442665874958038, -0.06339520961046219, -0.24716602265834808, -0.19838757812976837, -0.19415871798992157, -0.8761948347091675, 0.9251892566680908, -0.01630186289548874, 0.196918413043...
15214
https://en.wikipedia.org/wiki/Irish%20Civil%20War
Irish Civil War
The Irish Civil War (; 28 June 1922 – 24 May 1923) was a conflict that followed the Irish War of Independence and accompanied the establishment of the Irish Free State, an entity independent from the United Kingdom but within the British Empire. The civil war was waged between two opposing groups, the pro-treaty Provisional Government and the anti-treaty Irish Republican Army (IRA), over the Anglo-Irish Treaty. The forces of the Provisional Government (which became the Free State in December 1922) supported the Treaty, while the anti-treaty opposition saw it as a betrayal of the Irish Republic (which had been proclaimed during the Easter Rising). Many of those who fought on both sides in the conflict had been members of the IRA during the War of Independence. The Civil War was won by the pro-treaty Free State forces, who benefited from substantial quantities of weapons provided by the British Government. The conflict may have claimed more lives than the War of Independence that preceded it, and left Irish society divided and embittered for generations. Today, two of the main political parties in the Republic of Ireland, Fine Gael and Fianna Fáil, are direct descendants of the opposing sides of the war. Background The treaty and its consequences The Anglo-Irish Treaty was agreed upon to end the 1919–1921 Irish War of Independence between the Irish Republic and the United Kingdom of Great Britain and Ireland. The treaty provided for a self-governing Irish state, having its own army and police. The Treaty also allowed Northern Ireland (the six north-eastern countiesFermanagh, Antrim, Tyrone, Londonderry, Armagh and Down where collectively the majority population was of the Protestant religion) to opt out of the new state and return to the United Kingdomwhich it did immediately. However, rather than creating the independent republic favoured by most nationalists, the Irish Free State would be an autonomous dominion of the British Empire with the British monarch as head of state, in the same manner as Canada and Australia. The British suggested dominion status in secret correspondence even before treaty negotiations began, but Sinn Féin leader Éamon de Valera rejected the dominion. The treaty also stipulated that members of the new Irish Oireachtas (parliament) would have to take the following "Oath of Allegiance" This oath was highly objectionable to many Irish Republicans. Furthermore, the partition of Ireland, which had already been decided by the Westminster parliament in the Government of Ireland Act 1920, was effectively confirmed in the Anglo-Irish treaty. The most contentious areas of the Treaty for the IRA were the disestablishment of the Irish Republic declared in 1919, the abandonment of the First Dáil, the status of the Irish Free State as a dominion in the British Commonwealth and the British retention of the strategic Treaty Ports on Ireland's south western and north western coasts which were to remain occupied by the Royal Navy. All these issues were the cause of a split in the IRA and ultimately civil war. Michael Collins, the republican leader who had led the Irish negotiating team, argued that the treaty gave "not the ultimate freedom that all nations aspire and develop, but the freedom to achieve freedom". However, anti-treaty militants in 1922 believed that the treaty would never deliver full Irish independence. Split in the Nationalist movement The split over the treaty was deeply personal. Many of the leaders on both sides had been close friends and comrades during the War of Independence. This made their disagreement over the treaty all the more bitter. Michael Collins later said that Éamon de Valera had sent him as plenipotentiary to negotiate the treaty because he knew that the British would not concede an independent Irish republic and wanted Collins to take the blame for the compromise settlement. He said that he felt deeply betrayed when de Valera refused to stand by the agreement that the plenipotentiaries had negotiated with David Lloyd George and Winston Churchill. De Valera, for his part, was furious that Collins and Arthur Griffith had signed the treaty without consulting him or the Irish cabinet as instructed. Dáil Éireann (the parliament of the Irish Republic) narrowly passed the Anglo-Irish Treaty by 64 votes to 57 on 7 January 1922. Following the Treaty's ratification, in accordance with article 17 of the Treaty, the British-recognised Provisional Government of the Irish Free State was established. Its authority under the Treaty was to provide a "provisional arrangement for the administration of Southern Ireland during the interval" before the establishment of the Irish Free State. In accordance with the Treaty, the British Government transferred "the powers and machinery requisite for the discharge of its duties". Before the British Government transferred such powers, the members of the Provisional Government each "signified in writing [their] acceptance of [the Treaty]". Upon the Treaty's ratification, de Valera resigned as President of the Republic and failed to be re-elected by an even closer vote of 60–58. He challenged the right of the Dáil to approve the treaty, saying that its members were breaking their oath to the Irish Republic. Meanwhile, he continued to promote a compromise whereby the new Irish Free State would be in "external association" with the British Commonwealth rather than be a member of it (the inclusion of republics within the Commonwealth of Nations was not formally implemented until 1949). In early March, de Valera formed the Cumann na Poblachta ('Republican Association') party while remaining a member of Sinn Féin, and commenced a speaking tour of the more republican province of Munster on 17 March 1922. During the tour he made controversial speeches at Carrick on Suir, Lismore, Dungarvan and Waterford, saying at one point, "If the Treaty were accepted, the fight for freedom would still go on, and the Irish people, instead of fighting foreign soldiers, will have to fight the Irish soldiers of an Irish government set up by Irishmen." At Thurles several days later he repeated this imagery, and added that the IRA "would have to wade through the blood of the soldiers of the Irish Government, and perhaps through that of some members of the Irish Government to get their freedom." In a letter to the Irish Independent on 23 March, de Valera accepted the accuracy of their report of his comment about "wading" through blood, but deplored that the newspaper had published it. More seriously, many Irish Republican Army (IRA) officers were also against the treaty, and in March 1922 an ad hoc Army Convention repudiated the authority of the Dáil to accept the treaty. In contrast, the Minister of Defence, Richard Mulcahy, stated in the Dáil on 28 April that conditions in Dublin had prevented a Convention from being held, but that delegates had been selected and voted by ballot to accept the Oath. The anti-Treaty IRA formed their own "Army Executive", which they declared to be the real government of the country, despite the result of the 1921 general election. On 26 April Mulcahy summarised alleged illegal activities by many IRA men over the previous three months, whom he described as 'seceding volunteers', including hundreds of robberies. Yet this fragmenting army was the only police force on the ground following the disintegration of the Irish Republican Police and the disbanding of the Royal Irish Constabulary (RIC). By putting ten questions to Mulcahy on 28 April, Seán MacEntee argued that the Army Executive had acted continuously on its own to create a republic since 1917, had an unaltered constitution, had never fallen under the control of the Dáil, and that: "the only body competent to dissolve the Volunteer Executive was a duly convened convention of the Irish Republican Army" – not the Dáil. By accepting the treaty in January and abandoning the republic, the Dáil majority had effectively deserted the Army Executive. In his reply, Mulcahy rejected this interpretation. Then, in a debate on defence, MacEntee suggested that supporting the Army Executive "... even if it meant the scrapping of the Treaty and terrible and immediate war with England, would be better than the civil war which we are beginning at present apparently." MacEntee's supporters added that the many robberies complained of by Mulcahy on 26 April were caused by the lack of payment and provision by the Dáil to the volunteers. Delay until the June election Collins established an "army re-unification committee" to re-unite the IRA and organised an election pact with de Valera's anti-treaty political followers to campaign jointly in the Free State's first election in 1922 and form a coalition government afterwards. He also tried to reach a compromise with anti-treaty IRA leaders by agreeing to a republican-type constitution (with no mention of the British monarchy) for the new state. IRA leaders such as Liam Lynch were prepared to accept this compromise. However, the proposal for a republican constitution was vetoed by the British as being contrary to the terms of the treaty and they threatened military intervention in the Free State unless the treaty were fully implemented. Collins reluctantly agreed. This completely undermined the electoral pact between the pro- and anti-treaty factions, who went into the Irish general election on 18 June 1922 as hostile parties, both calling themselves Sinn Féin. The Pro-Treaty Sinn Féin party won the election with 239,193 votes to 133,864 for Anti-Treaty Sinn Féin. A further 247,226 people voted for other parties, most of whom supported the Treaty. Labour's 132,570 votes were ambiguous with regard to the Treaty. According to Hopkinson, "Irish labour and union leaders, while generally pro-Treaty, made little attempt to lead opinion during the Treaty conflict, casting themselves rather as attempted peacemakers." The election showed that a majority of the Irish electorate accepted the treaty and the foundation of the Irish Free State, but de Valera, his political followers and most of the IRA continued to oppose the treaty. De Valera is quoted as saying, "the majority have no right to do wrong". Meanwhile, under the leadership of Michael Collins and Arthur Griffith, the pro-treaty Provisional Government set about establishing the Irish Free State, and organised the National Army – to replace the IRA – and a new police force. However, since it was envisaged that the new army would be built around the IRA, Anti-Treaty IRA units were allowed to take over British barracks and take their arms. In practice, this meant that by the summer of 1922, the Provisional Government of Southern Ireland controlled only Dublin and some other areas like County Longford where the IRA units supported the treaty. Fighting ultimately broke out when the Provisional Government tried to assert its authority over well-armed and intransigent Anti-Treaty IRA units around the country – particularly a hardline group in Dublin. Course of the war Dublin fighting On 14 April 1922, 200 Anti-Treaty IRA militants, led by Rory O'Connor, occupied the Four Courts and several other buildings in central Dublin, resulting in a tense stand-off. These anti-treaty Republicans wanted to spark a new armed confrontation with the British, which they hoped would unite the two factions of the IRA against their common enemy. However, for those who were determined to make the Free State into a viable, self-governing Irish state, this was an act of rebellion that would have to be put down by them rather than the British. Arthur Griffith was in favour of using force against these men immediately, but Michael Collins, who wanted at all costs to avoid civil war, left the Four Courts garrison alone until late June 1922. By this point, the Pro-Treaty Sinn Féin party had secured a large majority in the general election, along with other parties that supported the Treaty. Collins was also coming under continuing pressure from London to assert his government's authority in Dublin. Assassination of Field Marshal Wilson The British Government at this time also lost patience with the situation in Dublin as a result of the assassination of Field Marshal Henry Hughes Wilson, a prominent security adviser to the Prime Minister of Northern Ireland, James Craig, by IRA men on his own doorstep in London on 22 June 1922, with no responsibility for the act being publicly claimed by any IRA authority. Winston Churchill assumed that the Anti-Treaty IRA were responsible for the shooting and warned Collins that he would use British troops to attack the Four Courts unless the Provisional Government took action. In fact, the British cabinet actually resolved to attack the Four Courts themselves on 25 June, in an operation that would have involved tanks, howitzers and aeroplanes. However, on the advice of General Nevil Macready, who commanded the British garrison in Dublin, the plan was cancelled at the last minute. Macready's argument was that British involvement would have united Irish Nationalist opinion against the treaty, and instead Collins was given a last chance to clear the Four Courts himself. Collins orders the assault on the Four Courts The final straw for the Free State government came on 26 June, when the anti-treaty forces occupying the Four Courts kidnapped JJ "Ginger" O'Connell, a general in the new National Army, in retaliation for the arrest of Leo Henderson. Collins, after giving the Four Courts garrison a final (and according to Ernie O'Malley, only) ultimatum to leave the building on 27 June, decided to end the stand-off by bombarding the Four Courts garrison into surrender. The government then appointed Collins as Commander-in-Chief of the National Army. This attack was not the opening shot of the war, as skirmishes had taken place between pro- and anti-treaty IRA factions throughout the country when the British were handing over the barracks. However, this represented the 'point of no return', when all-out war was effectively declared and the Civil War officially began. Collins ordered Mulcahy to accept a British offer of two 18-pounder field artillery for use by the new army of the Free State, though General Macready gave just 200 shells of the 10,000 he had in store at Richmond barracks in Inchicore. The anti-treaty forces in the Four Courts, who possessed only small arms, surrendered after three days of bombardment and the storming of the building by Provisional Government troops (28–30 June 1922). Shortly before the surrender, a massive explosion destroyed the western wing of the complex, including the Irish Public Record Office (PRO), injuring many advancing Free State soldiers and destroying the records. Government supporters alleged that the building had been deliberately mined. Historians dispute whether the PRO was intentionally destroyed by mines laid by the Republicans on their evacuation, or whether the explosions occurred when their ammunition store was accidentally ignited by the bombardment. Coogan, however, asserts that two lorry-loads of gelignite was exploded in the PRO, leaving priceless manuscripts floating over the city for several hours afterward. Pitched battles continued in Dublin until 5 July. IRA units from the Dublin Brigade, led by Oscar Traynor, occupied O'Connell Street – provoking a week's more street fighting and costing another 65 killed and 280 wounded. Among the dead was Republican leader Cathal Brugha, who made his last stand after exiting the Granville Hotel. In addition, the Free State took over 500 Republican prisoners. The civilian casualties are estimated to have numbered well over 250. When the fighting in Dublin died down, the Free State government was left firmly in control of the Irish capital and the anti-treaty forces dispersed around the country, mainly to the south and west. The opposing forces The outbreak of the Civil War forced pro- and anti-treaty supporters to choose sides. Supporters of the treaty came to be known as "pro-treaty" or Free State Army, legally the National Army, and were often called "Staters" by their opponents. The latter called themselves Republicans and were also known as "anti-treaty" forces or "Irregulars", a term preferred by the Free State side. The Anti-Treaty IRA claimed that it was defending the Irish Republic declared in 1916 during the Easter Rising, confirmed by the First Dáil and invalidly set aside by those who accepted the compromise of the Free State. Éamon de Valera stated that he would serve as an ordinary IRA volunteer and left the leadership of the anti-treaty Republicans to Liam Lynch, the IRA Chief of Staff. De Valera, though the Republican President as of October 1922, had little control over military operations. The campaign was directed by Liam Lynch until he was killed on 10 April 1923, and then by Frank Aiken from 20 April 1923. The Civil War split the IRA. When the Civil War broke out, the Anti-Treaty IRA (concentrated in the south and west) outnumbered pro-Free State forces by roughly 12,000 men to 8,000. Moreover, the anti-treaty ranks included many of the IRA's most experienced guerrilla fighters. The paper strength of the IRA in early 1922 was over 72,000 men, but most of them were recruited during the truce with the British and fought in neither the War of Independence nor the Civil War. According to Richard Mulcahy's estimate, the Anti-Treaty IRA at the beginning of the war had 6,780 rifles and 12,900 men. However, the IRA lacked an effective command structure, a clear strategy and sufficient arms. As well as rifles they had a handful of machine guns and many of their fighters were armed only with shotguns or handguns. They also took a small number of armoured cars from British troops as they were evacuating the country. Finally, they had no artillery of any kind. As a result, they were forced to adopt a defensive stance throughout the war. By contrast, the Free State government managed to expand its forces dramatically after the start of the war. Michael Collins and his commanders were able to build up an army that could overwhelm their opponents in the field. British supplies of artillery, aircraft, armoured cars, machine guns, small arms and ammunition were of much help to pro-Treaty forces. The British delivered for instance, over 27,000 rifles, 250 machine guns and eight 18-pounder artillery pieces to the pro-treaty forces between the outbreak of the Civil War and September 1922. The National Army amounted to 14,000 men by August 1922, was 38,000 strong by the end of 1922, and by the end of the war had grown to 55,000 men and 3,500 officers, far in excess of what the Irish state would need to maintain in peacetime. Like the Anti-Treaty IRA, the Free State's National Army was initially rooted in the IRA that fought against the British. Collins' most ruthless officers and men were recruited from the Dublin Active Service Unit (the elite unit of the IRA's Dublin Brigade) and from Michael Collins' Intelligence Department and assassination unit, The Squad. In the new National Army, they were known as the Dublin Guard. Towards the end of the war, they were implicated in some notorious atrocities against anti-treaty guerrillas in County Kerry. Up to the outbreak of Civil War, it had been agreed that only men with service in the IRA could be recruited into the National Army. However, once the war began, all such restrictions were lifted. A 'National Call to Arms' issued on 7 July for recruitment on a six-month basis brought in thousands of new recruits. Many of the new army's recruits were veterans of the British Army in World War I, where they had served in disbanded Irish regiments of the British Army. Many others were raw recruits without any military experience. The fact that at least 50% of the other ranks had no military experience in turn led to ill-discipline becoming a major problem. A major problem for the National Army was a shortage of experienced officers. At least 20% of its officers had previously served as officers in the British Army, while 50% of the rank-and-file of the National Army had served in the British Army in World War I. Former British Army officers were also recruited for their technical expertise. A number of the senior Free State commanders, such as Emmet Dalton, John T. Prout and W.R.E. Murphy, had seen service as officers in World War I, Dalton and Murphy in the British Army and Prout in the US Army. The Republicans made much use of this fact in their propaganda — claiming that the Free State was only a proxy force for Britain itself. However, the majority of Free State soldiers were raw recruits without military experience, either in World War I or the Irish War of Independence. There were also a significant number of former members of the British Armed Forces on the Republican side, including such senior figures as Tom Barry, David Robinson and Erskine Childers. Free State takes major towns With Dublin in pro-treaty hands, conflict spread throughout the country. The war started with the anti-treaty forces holding Cork, Limerick and Waterford as part of a self-styled Munster Republic. However, since the anti-treaty side were not equipped to wage conventional war, Liam Lynch was unable to take advantage of the Republicans' initial advantage in numbers and territory held. He hoped simply to hold the Munster Republic long enough to force Britain to renegotiate the treaty. The large towns in Ireland were all relatively easily taken by the Free State in August 1922. Michael Collins, Richard Mulcahy and Eoin O'Duffy planned a nationwide Free State offensive, dispatching columns overland to take Limerick in the west and Waterford in the south-east and seaborne forces to take counties Cork and Kerry in the south and Mayo in the west. In the south, landings occurred at Union Hall in Cork and Fenit, the port of Tralee, in Kerry. Limerick fell on 20 July, Waterford on the same day and Cork city on 10 August after a Free State force landed by sea at Passage West. Another seaborne expedition to Mayo in the west secured government control over that part of the country. While in some places the Republicans had put up determined resistance, nowhere were they able to defeat regular forces armed with artillery and armour. The only real conventional battle during the Free State offensive, the Battle of Killmallock, was fought when Free State troops advanced south from Limerick. Guerrilla war Government victories in the major towns inaugurated a period of guerrilla warfare. After the fall of Cork, Liam Lynch ordered IRA units to disperse and form flying columns as they had when fighting the British. They held out in areas such as the western part of counties Cork and Kerry in the south, county Wexford in the east and counties Sligo and Mayo in the west. Sporadic fighting also took place around Dundalk, where Frank Aiken and the Fourth Northern Division of the Irish Republican Army were based, and Dublin, where small-scale but regular attacks were mounted on Free State troops. August and September 1922 saw widespread attacks on Free State forces in the territories that they had occupied in the July–August offensive, inflicting heavy casualties on them. Michael Collins was killed in an ambush by anti-treaty Republicans at Béal na Bláth, near his home in County Cork, in August 1922. Collins' death increased the bitterness of the Free State leadership towards the Republicans and probably contributed to the subsequent descent of the conflict into a cycle of atrocities and reprisals. Arthur Griffith, the Free State president, had also died of a brain haemorrhage ten days before, leaving the government in the hands of W.T. Cosgrave and the Free State army under the command of General Richard Mulcahy. For a brief period, with rising casualties among its troops and its two principal leaders dead, it looked as if the Free State might collapse. However, as winter set in, the Republicans found it increasingly difficult to sustain their campaign, and casualty rates among National Army troops dropped rapidly. For instance, in County Sligo, 54 people died in the conflict, of whom all but eight had been killed by the end of September. In the autumn and winter of 1922, Free State forces broke up many of the larger Republican guerrilla units – in Sligo, Meath and Connemara in the west, for example, and in much of Dublin city. Elsewhere, anti-treaty units were forced by lack of supplies and safe-houses to disperse into smaller groups, typically of nine to ten men. Despite these successes for the National Army, it took eight more months of intermittent warfare before the war was brought to an end. By late 1922 and early 1923, the anti-treaty guerrilla campaign had been reduced largely to acts of sabotage and destruction of public infrastructure such as roads and railways. It was also in this period that the Anti-Treaty IRA began burning the homes of Free State Senators and of many of the Anglo-Irish landed class. In October 1922, Éamon de Valera and the anti-treaty Teachtaí Dála (TDs) set up their own "Republican government" in opposition to the Free State. However, by then the anti-treaty side held no significant territory and de Valera's government had no authority over the population. Atrocities and executions On 27 September 1922, three months after the outbreak of war, the Free State's Provisional Government put before the Dáil an Army Emergency Powers Resolution proposing to extend the legislation for setting up military tribunals, transferring some of the Free State's judicial powers over Irish citizens accused of anti-government activities to the Army Council. The legislation, commonly referred to as the "Public Safety Bill", set up and empowered military tribunals to impose life imprisonment, as well as the death penalty, for 'aiding or abetting attacks' on state forces, possession of arms and ammunition or explosive 'without the proper authority' and 'looting destruction or arson'. The final phase of the Civil War degenerated into a series of atrocities that left a lasting legacy of bitterness in Irish politics. The Free State began executing Republican prisoners on 17 November 1922, when five IRA men were shot by firing squad. They were followed on 24 November by the execution of acclaimed author and treaty negotiator Erskine Childers. In all, out of around 12,000 Republican prisoners taken in the conflict, 81 were officially executed by the Free State. The Anti-Treaty IRA in reprisal assassinated TD Seán Hales on 7 December 1922. The next day four prominent Republicans held since the first week of the war — Rory O'Connor, Liam Mellows, Richard Barrett and Joe McKelvey — were executed in revenge for the killing of Hales. In addition, Free State troops, particularly in County Kerry, where the guerrilla campaign was most bitter, began the summary execution of captured anti-treaty fighters. The most notorious example of this occurred at Ballyseedy, where nine Republican prisoners were tied to a landmine, which was detonated, killing eight and only leaving one, Stephen Fuller, who was blown clear by the blast, to escape. The number of "unauthorised" executions of Republican prisoners during the war has been put as high as 153. Among the Republican reprisals were the assassination of Kevin O'Higgins's father and W. T. Cosgrave's uncle in February 1923. The IRA were unable to maintain an effective guerrilla campaign, given the gradual loss of support. The Catholic Church also supported the Free State, deeming it the lawful government of the country, denouncing the IRA and refusing to administer the Sacraments to anti-treaty fighters. On 10 October 1922, the Catholic Bishops of Ireland issued a formal statement, describing the anti-treaty campaign as: The Church's support for the Free State aroused bitter hostility among some republicans. Although the Catholic Church in independent Ireland has often been seen as a triumphalist Church, a recent study has found that it felt deeply insecure after these events. End of the war By early 1923, the offensive capability of the IRA had been seriously eroded and when, in February 1923, the Republican leader Liam Deasy was captured by Free State forces, he called on the republicans to end their campaign and reach an accommodation with the Free State. The State's executions of anti-treaty prisoners, 34 of whom were shot in January 1923, also took its toll on the Republicans' morale. In addition, the National Army's operations in the field were slowly but steadily breaking up the remaining Republican concentrations. March and April 1923 saw this progressive dismemberment of the Republican forces continue with the capture and sometimes killing of guerrilla columns. A National Army report of 11 April stated, "Events of the last few days point to the beginning of the end as a far as the irregular campaign is concerned". As the conflict petered out into a de facto victory for the pro-treaty side, de Valera asked the IRA leadership to call a ceasefire, but they refused. The Anti-Treaty IRA executive met on 26 March in County Tipperary to discuss the war's future. Tom Barry proposed a motion to end the war, but it was defeated by 6 votes to 5. Éamon de Valera was allowed to attend, after some debate, but was given no voting rights. Liam Lynch, the Republican leader, was killed in a skirmish in the Knockmealdown Mountains in County Tipperary on 10 April. The National Army had extracted information from Republican prisoners in Dublin that the IRA Executive was in the area and as well as killing Lynch, they also captured senior anti-treaty IRA officers Dan Breen, Todd Andrews, Seán Gaynor and Frank Barrett in the operation. It is often suggested that the death of Lynch allowed the more pragmatic Frank Aiken, who took over as IRA Chief of Staff, to call a halt to what seemed a futile struggle. Aiken's accession to IRA leadership was followed on 30 April by the declaration of a suspension of military activities; on 24 May 1923, he issued a ceasefire order to IRA volunteers. They were to dump arms rather than surrender them or continue a fight that they were incapable of winning. Aftermath of the ceasefire Éamon de Valera supported the order, issuing a statement to Anti-Treaty fighters on 24 May: The Free State government had started peace negotiations in early May, which broke down. The High Court of Justice in Ireland ruled on 31 July 1923 that a state of war no longer existed, and consequently the internment of republicans, permitted under common law only in wartime, was now illegal. Without a formal peace, holding 13,000 prisoners and worried that fighting could break out again at any time, the government enacted two Public Safety (Emergency Powers) Acts on 1 and 3 August 1923, to permit continued internment and other measures. Thousands of Anti-Treaty IRA members (including Éamon de Valera on 15 August) were arrested by the Free State forces in the weeks and months after the end of the war, when they had dumped their arms and returned home. A general election was held on 27 August 1923, which Cumann na nGaedheal, the pro-Free State party, won with about 40% of the first-preference vote. The Republicans, represented by Sinn Féin, won about 27% of the vote. Many of their candidates and supporters were still imprisoned before, during and after the election. In October 1923, around 8,000 of the 12,000 Republican prisoners in Free State gaols went on a hunger strike. The strike lasted for 41 days and met little success (among those who died were Denny Barry, Joseph Whitty and Andy O'Sullivan) see: 1923 Irish Hunger Strikes. However, most of the women prisoners were released shortly thereafter and the hunger strike helped concentrate the Republican movement on the prisoners and their associated organisations. In July, de Valera had recognised the Republican political interests lay with the prisoners and went so far as to say: Attacks on former Unionists Although the cause of the Civil War was the Treaty, as the war developed the anti-treaty forces sought to identify their actions with the traditional Republican cause of the "men of no property" and the result was that large Anglo-Irish landowners and some less well-off Southern Unionists were attacked. A total of 192 "stately homes" of the old landed class and of Free State politicians were destroyed by anti-treaty forces during the war. The stated reason for such attacks was that some landowners had become Free State senators. In October 1922, a deputation of Southern Unionists met W. T. Cosgrave to offer their support to the Free State and some of them had received positions in the State's Upper house or Senate. Among the prominent senators whose homes were attacked were: Palmerstown House near Naas, which belonged to the Earl of Mayo, Moore Hall in Mayo, Horace Plunkett (who had helped to establish the rural co-operative schemes), and Senator Henry Guinness (which was unsuccessful). Also burned was Marlfield House in Clonmel, the home of Senator John Philip Bagwell, with its extensive library of historical documents. Bagwell was kidnapped and held in the Dublin Mountains, but later released when reprisals were threatened. However, in addition to their allegiance to the Free State, there were also other factors behind Republican animosity towards the old landed class. Many, but not all of these people, had supported the Crown forces during the War of Independence. This support was often largely moral, but sometimes it took the form of actively assisting the British in the conflict. Such attacks should have ended with the Truce of 11 July 1921, but they continued after the truce and escalated during the Civil War. In July 1922, Con Moloney, the IRA Adjutant General, ordered that unionist property should be seized to accommodate their men. The "worst spell" of attacks on former unionist property came in the early months of 1923, 37 "big houses" being burnt in January and February alone. Though the Land Purchase (Ireland) Act 1903 allowed tenants to buy land from their landlords, some small farmers, particularly in Mayo and Galway, simply occupied land belonging to political opponents during this period when the RIC had ceased to function. In 1919, senior Sinn Féin officials were sufficiently concerned at this unilateral action that they instituted Arbitration Courts to adjudicate disputes. Sometimes these attacks had sectarian overtones, although most IRA men made no distinction between Catholic and Protestant supporters of the Irish government. The IRA burnt an orphanage housing Protestant boys near Clifden, County Galway in June 1922, on the ground that it was "pro-British". The 60 orphans were taken to Devonport on board a Royal Navy destroyer. Controversy continues to this day about the extent of intimidation of Protestants at this time. Many left Ireland during and after the Civil War. Dr Andy Bielenberg of UCC considers that about 41,000 who were not linked to the former British administration left Southern Ireland (which became the Irish Free State) between 1919 and 1923. He has found that a "high-water mark" of this 41,000 left between 1921 and 1923. In all, from 1911 to 1926, the Protestant population of the 26 counties fell from some 10.4% of the total population to 7.4%. Foreign support The Civil War attracted international attention which led to various groups expressing support and opposition to the anti-treaty side. The Communist Party of Great Britain in its journal The Communist wrote "The proletarians of the IRA have the future of Ireland in their hands. If the Irish Labour Party would only dare! A mass movement of the Irish workers in alliance with the IRA could establish a Workers' Republic now". They were also supported by the Communist International (Comintern) which on 3 January 1923 passed a resolution stating it "sends fraternal greetings to the struggling Irish national revolutionaries and feels assured that they will soon tread the only path that leads to real freedom – the path of Communism. The CI will assist all efforts to organise the struggle to combat this terror and to help the Irish workers and peasants to victory." The majority of Irish-Americans supported the treaty, including those in Clann na Gael and Friends of Irish Freedom. However anti-treaty republicans had control of what was left of Clann na Gael and the American Association for the Recognition of the Irish Republic so they supported the anti-treaty side during the war. Consequences Casualties The Civil War, though short, was bloody. It cost the lives of many public figures, including Michael Collins, Cathal Brugha, Arthur Griffith and Liam Lynch. Both sides carried out brutal acts: the anti-treaty forces killed a TD and several other pro-Treaty politicians and burned many homes of senators and Free State supporters, while the government executed anti-treaty prisoners, officially and unofficially. Precise figures for the dead and wounded have yet to be calculated. The pro-treaty forces suffered between 800-1000 fatalities from all causes. It has been suggested that the anti-treaty forces' death toll was higher. but the Republican roll of honour, compiled in the 1920s lists 426 anti-Treaty IRA Volunteers killed between January 1922 and April 1924. The most recent county-by-county research suggests a death toll of just under 2,000. For total combatant and civilian deaths, a minimum of 1,500 and a maximum of 4,000 have been suggested, though the latter figure is now generally estimated to be too high. The Garda Síochána (new police force) was not involved in the war, which meant that it was well-placed to develop into an unarmed and politically neutral police service after the war. It had been disarmed by the Government in order to win public confidence in June–September 1922 and in December 1922, the IRA issued a General Order not to fire on the Civil Guard. The Criminal Investigation Department, or CID, a 350-strong, armed, plain-clothed Police Corps that had been established during the conflict for the purposes of counter-insurgency, was disbanded in October 1923, shortly after the conflict's end. Economic costs The economic costs of the war were also high. As their forces abandoned their fixed positions in July–August 1922, the Republicans burned many of the administrative buildings and businesses that they had been occupying. In addition, their subsequent guerrilla campaign caused much destruction and the economy of the Free State suffered a hard blow in the earliest days of its existence as a result. The material damage caused by the war to property came to over £30 million. Particularly damaging to the Free State's economy was the systematic destruction of railway infrastructure and roads by the Republicans. In addition, the cost to the Free State of waging the war came to another £17 million. By September 1923, Deputy Hogan estimated the cost at £50 million. The new State ended 1923 with a budget deficit of over £4 million. This weakened financial situation meant that the new state could not pay its share of Imperial debt under the treaty. This adversely affected the boundary negotiations in 1924–25, in which the Free State government acquiesced that border with Northern Ireland would remain unchanged in exchange for forgiveness of the Imperial debt. Further, the state undertook to pay for damage caused to property between the truce of July 1921 and the end of the Civil War; W. T. Cosgrave told the Dáil: Political results The fact that the Irish Civil War was fought between Irish Nationalist factions meant that the sporadic conflict in Northern Ireland ended. Collins and Sir James Craig signed an agreement to end it on 30 March 1922, but, despite this, Collins covertly supplied arms to the Northern IRA until a week before his death in August 1922. Because of the Irish Civil War, Northern Ireland was able to consolidate its existence and the partition of Ireland was confirmed for the foreseeable future. The continuing war also confirmed the northern Unionists' existing stance against the ethos of all shades of nationalism. This might have led to open hostilities between North and South had the Irish Civil War not broken out. Indeed, the Ulster Special Constabulary (the "B-Specials") that had been established in 1920 (on the foundation of Northern Ireland) was expanded in 1922 rather than being demobilised. In the event, it was only well after their defeat in the Civil War that anti-treaty Irish Republicans seriously considered whether to take armed action against British rule in Northern Ireland (the first serious suggestion to do this came in the late 1930s). The northern units of the IRA largely supported the Free State side in the Civil War because of Collins's policies, and over 500 of them joined the new Free State's National Army. The cost of the war and the budget deficit it caused was a difficulty for the new Free State and affected the Boundary Commission negotiations of 1925, which were to determine the border with Northern Ireland. The Free State agreed to waive its claim to predominantly Nationalist areas in Northern Ireland and in return its agreed share of the Imperial debt under the 1921 Treaty was not paid. In 1926, having failed to persuade the majority of the Anti-Treaty IRA or the anti-treaty party of Sinn Féin to accept the new status quo as a basis for an evolving Republic, a large faction led by de Valera and Aiken left to resume constitutional politics and to found the Fianna Fáil party. Whereas Fianna Fáil was to become the dominant party in Irish politics, Sinn Féin became a small, isolated political party. The IRA, then much more numerous and influential than Sinn Féin, remained associated with Fianna Fáil (though not directly) until banned by de Valera in 1935. In 1927, Fianna Fáil members took the Oath of Allegiance and entered the Dáil, effectively recognising the legitimacy of the Free State. The Free State was already moving towards independence by this point. Under the Statute of Westminster 1931, the British Parliament gave up its right to legislate for members of the British Commonwealth. When elected to power in 1932, Fianna Fáil under de Valera set about dismantling what they considered to be objectionable features of the treaty, abolishing the Oath of Allegiance, removing the power of the Office of Governor General (British representative in Ireland) and abolishing the Senate, which was dominated by former Unionists and pro-treaty Nationalists. In 1937, they passed a new constitution, which made a President the head of state, did not mention any allegiance to the British monarch, and which included a territorial claim to Northern Ireland. The following year, Britain returned without conditions the seaports that it had kept under the terms of the treaty. When the Second World War broke out in 1939, the state was able to demonstrate its independence by remaining neutral throughout the war, although Dublin did to some extent tacitly support the Allies. Finally, in 1948, a coalition government, containing elements of both sides in the Civil War (pro-treaty Fine Gael and anti-treaty Clann na Poblachta) left the British Commonwealth and described the state as the Republic of Ireland. By the 1950s, the issues over which the Civil War had been fought were largely settled. Legacy As with most civil wars, the internecine conflict left a bitter legacy, which continues to influence Irish politics to this day. The two largest political parties in the republic through most of its history (except for the 2011 and 2020 general elections) were Fianna Fáil and Fine Gael, the descendants respectively of the anti-treaty and pro-treaty forces of 1922. Until the 1970s, almost all of Ireland's prominent politicians were veterans of the Civil War, a fact which poisoned the relationship between Ireland's two biggest parties. Examples of Civil War veterans include: Republicans Éamon de Valera, Frank Aiken, Todd Andrews and Seán Lemass; and Free State supporters W. T. Cosgrave, Richard Mulcahy and Kevin O'Higgins. Moreover, many of these men's sons and daughters also became politicians, meaning that the personal wounds of the civil war were felt over three generations. In the 1930s, after Fianna Fáil took power for the first time, it looked possible for a while that the Civil War might break out again between the IRA and the pro-Free State Blueshirts. Fortunately, this crisis was averted, and by the 1950s violence was no longer prominent in politics in the Republic of Ireland. However, the breakaway IRA continued (and continues in various forms) to exist. It was not until 1948 that the IRA renounced military attacks on the forces of the southern Irish state when it became the Republic of Ireland. After this point, the organisation dedicated itself primarily to the end of British rule in Northern Ireland. The IRA Army Council still makes claim to be the legitimate Provisional Government of the Irish Republic declared in 1916 and annulled by the Anglo-Irish Treaty of 1921. Notes Footnotes Bibliography External links Historical artefacts from the Irish Civil War The Irish Story archive on the Irish Civil War North Kerry in the Irish Civil War The final siege of Limerick City from 7 July until 21 July 1922, on the Limerick Leader web site. The Dáil Treaty Debates 1921–22. From the Official Report of the Parliamentary Debates of the Houses of the Oireachtas List of National Army soldiers killed in action War Memorials of the Civil War Map of Europe during Irish Civil War at omniatlas.com Civil wars involving the states and peoples of Europe Civil wars of the Industrial era Guerrilla wars History of the Republic of Ireland Wars involving Ireland Irish Free State 1922 in Ireland 1923 in Ireland Monarchy in the Irish Free State
[ -0.08394264429807663, -0.30047687888145447, -0.5042533278465271, -0.6857280135154724, -0.33795300126075745, 0.16460655629634857, 0.4863194227218628, 0.7024756073951721, -0.07516758143901825, -0.07096245139837265, -0.49178019165992737, 0.3933316767215729, -0.4531151354312897, 0.975699067115...
15215
https://en.wikipedia.org/wiki/Internet%20Explorer
Internet Explorer
Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, (from August 16, 1995 to March 30, 2021) commonly abbreviated IE or MSIE) is a discontinued series of graphical web browsers developed by Microsoft and included in the Microsoft Windows line of operating systems, starting in 1995. It was first released as part of the add-on package Plus! for Windows 95 that year. Later versions were available as free downloads, or in-service packs, and included in the original equipment manufacturer (OEM) service releases of Windows 95 and later versions of Windows. New feature development for the browser was discontinued in 2016 in favor of new browser Microsoft Edge. Since Internet Explorer is a Windows component and is included in long-term lifecycle versions of Windows such as Windows Server 2019, it will continue to receive security updates until at least 2029. Microsoft 365 ended support for Internet Explorer on August 17, 2021, and Microsoft Teams ended support for IE on November 30, 2020. Internet Explorer is set for discontinuation on June 15, 2022, after which the alternative will be Microsoft Edge with IE mode for legacy sites. Internet Explorer was once the most widely used web browser, attaining a peak of about 95% usage share by 2003. This came after Microsoft used bundling to win the first browser war against Netscape, which was the dominant browser in the 1990s. Its usage share has since declined with the launch of Firefox (2004) and Google Chrome (2008), and with the growing popularity of mobile operating systems such as Android and iOS that do not support Internet Explorer. Estimates for Internet Explorer's market share in 2022 are about 0.45% across all platforms, or by StatCounter's numbers ranked 9th. On traditional PCs, the only platform on which it has ever had significant share, it is ranked 6th at 1.06%, after Opera. Microsoft Edge, IE's successor, first overtook Internet Explorer in terms of market share in November 2019. Microsoft spent over per year on Internet Explorer in the late 1990s, with over 1,000 people involved in the project by 1999. Versions of Internet Explorer for other operating systems have also been produced, including an Xbox 360 version called Internet Explorer for Xbox and for platforms Microsoft no longer supports: Internet Explorer for Mac and Internet Explorer for UNIX (Solaris and HP-UX), and an embedded OEM version called Pocket Internet Explorer, later rebranded Internet Explorer Mobile made for Windows CE, Windows Phone, and, previously, based on Internet Explorer 7, for Windows Phone 7. On March 17, 2015, Microsoft announced that Microsoft Edge would replace Internet Explorer as the default browser on "for certain versions of Windows 10". This makes Internet Explorer 11 the last release. Internet Explorer, however, remains on Windows 10 LTSC and Windows Server 2019 primarily for enterprise purposes. Since January 12, 2016, only Internet Explorer 11 has official support for consumers; extended support for Internet Explorer 10 ended on January 31, 2020. Support varies based on the operating system's technical capabilities and its support life cycle. On May 20, 2021, it was announced that full support for Internet Explorer would be discontinued on June 15, 2022, after which, the alternative will be Microsoft Edge with IE mode for legacy sites. Microsoft is committed to support Internet Explorer that way to 2029 at least, with a one-year notice before it is discontinued. The IE mode "uses the Trident MSHTML engine", i.e. the rendering code of Internet Explorer. The browser has been scrutinized throughout its development for use of third-party technology (such as the source code of Spyglass Mosaic, used without royalty in early versions) and security and privacy vulnerabilities, and the United States and the European Union have alleged that integration of Internet Explorer with Windows has been to the detriment of fair browser competition. History Internet Explorer 1 The Internet Explorer project was started in the summer of 1994 by Thomas Reardon, who, according to the Massachusetts Institute of Technology Review of 2003, used source code from Spyglass, Inc. Mosaic, which was an early commercial web browser with formal ties to the pioneering National Center for Supercomputing Applications (NCSA) Mosaic browser. In late 1994, Microsoft licensed Spyglass Mosaic for a quarterly fee plus a percentage of Microsoft's non-Windows revenues for the software. Although bearing a name like NCSA Mosaic, Spyglass Mosaic had used the NCSA Mosaic source code sparingly. The first version, dubbed Microsoft Internet Explorer, was installed as part of the Internet Jumpstart Kit in the Microsoft Plus! pack for Windows 95. The Internet Explorer team began with about six people in early development. Internet Explorer 1.5 was released several months later for Windows NT and added support for basic table rendering. By including it free of charge with their operating system, they did not have to pay royalties to Spyglass Inc, resulting in a lawsuit and a US$8 million settlement on January 22, 1997. Microsoft was sued by SyNet Inc. in 1996, for trademark infringement, claiming it owned the rights to the name "Internet Explorer". It ended with Microsoft paying $5 Million to settle the lawsuit. Internet Explorer 2 Internet Explorer 2 is the second major version of Internet Explorer, released on November 22, 1995, for Windows 95 and Windows NT, and on April 23, 1996, for Apple Macintosh and Windows 3.1. Internet Explorer 3 Internet Explorer 3 is the third major version of Internet Explorer, released on August 13, 1996 for Microsoft Windows and on January 8, 1997 for Apple Mac OS. Internet Explorer 4 Internet Explorer 4 is the fourth major version of Internet Explorer, released on September 1997 for Microsoft Windows, Mac OS, Solaris, and HP-UX. Internet Explorer 5 Internet Explorer 5 is the fifth major version of Internet Explorer, released on March 18, 1999 for Windows 3.1, Windows NT 3, Windows 95, Windows NT 4.0 SP3, Windows 98, Mac OS X (up to v5.2.3), Classic Mac OS (up to v5.1.7), Solaris and HP-UX (up to 5.01 SP1). Internet Explorer 6 Internet Explorer 6 is the sixth major version of Internet Explorer, released on August 24, 2001 for Windows NT 4.0 SP6a, Windows 98, Windows 2000, Windows ME and as the default web browser for Windows XP and Windows Server 2003. Internet Explorer 7 Internet Explorer 7 is the seventh major version of Internet Explorer, released on October 18, 2006 for Windows XP SP2, Windows Server 2003 SP1 and as the default web browser for Windows Vista, Windows Server 2008 and Windows Embedded POSReady 2009. Internet Explorer 8 Internet Explorer 8 is the eight major version of Internet Explorer, released on March 19, 2009 for Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008 and as the default web browser for Windows 7 (later default was Internet Explorer 11) and Windows Server 2008 R2. Internet Explorer 9 Internet Explorer 9 is the ninth major version of Internet Explorer, released on March 14, 2011 for Windows 7, Windows Server 2008 R2, Windows Vista Service Pack 2 and Windows Server 2008 SP2 with the Platform Update. Internet Explorer 10 Internet Explorer 10 is the tenth major version of Internet Explorer, released on October 26, 2012 for Windows 7, Windows Server 2008 R2 and as the default web browser for Windows 8 and Windows Server 2012. Internet Explorer 11 Internet Explorer 11 is featured in Windows 8.1, which was released on October 17, 2013. It includes an incomplete mechanism for syncing tabs. It is a major update to its developer tools, enhanced scaling for high DPI screens, HTML5 prerender and prefetch, hardware-accelerated JPEG decoding, closed captioning, HTML5 full screen, and is the first Internet Explorer to support WebGL and Google's protocol SPDY (starting at v3). This version of IE has features dedicated to Windows 8.1, including cryptography (WebCrypto), adaptive bitrate streaming (Media Source Extensions) and Encrypted Media Extensions. Internet Explorer 11 was made available for Windows 7 users to download on November 7, 2013, with Automatic Updates in the following weeks. Internet Explorer 11's user agent string now identifies the agent as "Trident" (the underlying browser engine) instead of "MSIE". It also announces compatibility with Gecko (the browser engine of Firefox). Microsoft claimed that Internet Explorer 11, running the WebKit SunSpider JavaScript Benchmark, was the fastest browser as of October 15, 2013. Internet Explorer 11 was made available for Windows Server 2012 and Windows Embedded 8 Standard in the spring of 2019. End of life Microsoft Edge, officially unveiled on January 21, 2015, has replaced Internet Explorer as the default browser on Windows 10. Internet Explorer is still installed in Windows 10 to maintain compatibility with older websites and intranet sites that require ActiveX and other Microsoft legacy web technologies. According to Microsoft, the development of new features for Internet Explorer has ceased. However, it will continue to be maintained as part of the support policy for the versions of Windows with which it is included. On June 1, 2020, the Internet Archive removed the latest version of Internet Explorer from its list of supported browsers, citing its dated infrastructure that makes it hard to work with, following the suggestion of Microsoft Chief of Security Chris Jackson that users not use it as their default browser, but to use it only for websites that require it. Since November 30, 2020, the web version of Microsoft Teams can no longer be accessed using Internet Explorer 11, followed by the remaining Microsoft 365 applications since August 17, 2021. The browser itself will continue to be supported for the lifecycle of the Windows version on which it is installed until June 15, 2022. Microsoft recommends Internet Explorer users migrate to Edge and use the built-in "Internet Explorer mode" which enables support for legacy internet applications. Features Internet Explorer has been designed to view a broad range of web pages and provide certain features within the operating system, including Microsoft Update. During the height of the browser wars, Internet Explorer superseded Netscape only when it caught up technologically to support the progressive features of the time. Standards support Internet Explorer, using the MSHTML (Trident) browser engine: Supports HTML 4.01, parts of HTML5, CSS Level 1, Level 2, and Level 3, XML 1.0, and DOM Level 1, with minor implementation gaps. Fully supports XSLT 1.0 as well as an obsolete Microsoft dialect of XSLT often referred to as WD-xsl, which was loosely based on the December 1998 W3C Working Draft of XSL. Support for XSLT 2.0 lies in the future: semi-official Microsoft bloggers have indicated that development is underway, but no dates have been announced. Almost full conformance to CSS 2.1 has been added in the Internet Explorer 8 release. The MSHTML browser engine in Internet Explorer 9 in 2011, scored highest in the official W3C conformance test suite for CSS 2.1 of all major browsers. Supports XHTML in Internet Explorer 9 (MSHTML Trident version 5.0). Prior versions can render XHTML documents authored with HTML compatibility principles and served with a text/html MIME-type. Supports a subset of SVG in Internet Explorer 9 (MSHTML Trident version 5.0), excluding SMIL, SVG fonts and filters. Internet Explorer uses DOCTYPE sniffing to choose between standards mode and a "quirks mode" in which it deliberately mimics nonstandard behaviors of old versions of MSIE for HTML and CSS rendering on screen (Internet Explorer always uses standards mode for printing). It also provides its own dialect of ECMAScript called JScript. Internet Explorer was criticized by Tim Berners-Lee for its limited support for SVG, which is promoted by W3C. Non-standard extensions Internet Explorer has introduced an array of proprietary extensions to many of the standards, including HTML, CSS, and the DOM. This has resulted in several web pages that appear broken in standards-compliant web browsers and has introduced the need for a "quirks mode" to allow for rendering improper elements meant for Internet Explorer in these other browsers. Internet Explorer has introduced several extensions to the DOM that have been adopted by other browsers. These include the inner HTML property, which provides access to the HTML string within an element, which was part of IE 5 and was standardized as part of HTML 5 roughly 15 years later after all other browsers implemented it for compatibility, the XMLHttpRequest object, which allows the sending of HTTP request and receiving of HTTP response, and may be used to perform AJAX, and the designMode attribute of the content Document object, which enables rich text editing of HTML documents. Some of these functionalities were not possible until the introduction of the W3C DOM methods. Its Ruby character extension to HTML is also accepted as a module in W3C XHTML 1.1, though it is not found in all versions of W3C HTML. Microsoft submitted several other features of IE for consideration by the W3C for standardization. These include the 'behavior' CSS property, which connects the HTML elements with JScript behaviors (known as HTML Components, HTC), HTML+TIME profile, which adds timing and media synchronization support to HTML documents (similar to the W3C XHTML+SMIL), and the VML vector graphics file format. However, all were rejected, at least in their original forms; VML was subsequently combined with PGML (proposed by Adobe and Sun), resulting in the W3C-approved SVG format, one of the few vector image formats being used on the web, which IE did not support until version 9. Other non-standard behaviors include: support for vertical text, but in a syntax different from W3C CSS3 candidate recommendation, support for a variety of image effects and page transitions, which are not found in W3C CSS, support for obfuscated script code, in particular JScript.Encode, as well as support for embedding EOT fonts in web pages. Favicon Support for favicons was first added in Internet Explorer 5. Internet Explorer supports favicons in PNG, static GIF and native Windows icon formats. In Windows Vista and later, Internet Explorer can display native Windows icons that have embedded PNG files. Usability and accessibility Internet Explorer makes use of the accessibility framework provided in Windows. Internet Explorer is also a user interface for FTP, with operations similar to Windows Explorer. Internet Explorer 5 and 6 had a side bar for web searches, enabling jumps through pages from results listed in the side bar. Pop-up blocking and tabbed browsing were added respectively in Internet Explorer 6 and Internet Explorer 7. Tabbed browsing can also be added to older versions by installing MSN Search Toolbar or Yahoo Toolbar. Cache Internet Explorer caches visited content in the Temporary Internet Files folder to allow quicker access (or offline access) to previously visited pages. The content is indexed in a database file, known as Index.dat. Multiple Index.dat files exist which index different content—visited content, web feeds, visited URLs, cookies, etc. Prior to IE7, clearing the cache used to clear the index but the files themselves were not reliably removed, posing a potential security and privacy risk. In IE7 and later, when the cache is cleared, the cache files are more reliably removed, and the index.dat file is overwritten with null bytes. Caching has been improved in IE9. Group Policy Internet Explorer is fully configurable using Group Policy. Administrators of Windows Server domains (for domain-joined computers) or the local computer can apply and enforce a variety of settings on computers that affect the user interface (such as disabling menu items and individual configuration options), as well as underlying security features such as downloading of files, zone configuration, per-site settings, ActiveX control behavior and others. Policy settings can be configured for each user and for each machine. Internet Explorer also supports Integrated Windows Authentication. Architecture Internet Explorer uses a componentized architecture built on the Component Object Model (COM) technology. It consists of several major components, each of which is contained in a separate dynamic-link library (DLL) and exposes a set of COM programming interfaces hosted by the Internet Explorer main executable, : is the protocol handler for HTTP, HTTPS, and FTP. It handles all network communication over these protocols. is responsible for MIME-type handling and download of web content, and provides a thread-safe wrapper around WinInet.dll and other protocol implementations. houses the MSHTML (Trident) browser engine introduced in Internet Explorer 4, which is responsible for displaying the pages on-screen and handling the Document Object Model (DOM) of the web pages. MSHTML.dll parses the HTML/CSS file and creates the internal DOM tree representation of it. It also exposes a set of APIs for runtime inspection and modification of the DOM tree. The DOM tree is further processed by a browser engine which then renders the internal representation on screen. contains the user interface and window of IE in Internet Explorer 7 and above. provides the navigation, local caching and history functionalities for the browser. is responsible for rendering the browser user interface such as menus and toolbars. Internet Explorer does not include any native scripting functionality. Rather, exposes an API that permits a programmer to develop a scripting environment to be plugged-in and to access the DOM tree. Internet Explorer 8 includes the bindings for the Active Scripting engine, which is a part of Microsoft Windows and allows any language implemented as an Active Scripting module to be used for client-side scripting. By default, only the JScript and VBScript modules are provided; third party implementations like ScreamingMonkey (for ECMAScript 4 support) can also be used. Microsoft also makes available the Microsoft Silverlight runtime that allows CLI languages, including DLR-based dynamic languages like IronPython and IronRuby, to be used for client-side scripting. Internet Explorer 8 introduced some major architectural changes, called loosely coupled IE (LCIE). LCIE separates the main window process (frame process) from the processes hosting the different web applications in different tabs (tab processes). A frame process can create multiple tab processes, each of which can be of a different integrity level, each tab process can host multiple web sites. The processes use asynchronous inter-process communication to synchronize themselves. Generally, there will be a single frame process for all web sites. In Windows Vista with protected mode turned on, however, opening privileged content (such as local HTML pages) will create a new tab process as it will not be constrained by protected mode. Extensibility Internet Explorer exposes a set of Component Object Model (COM) interfaces that allows add-ons to extend the functionality of the browser. Extensibility is divided into two types: Browser extensibility and content extensibility. Browser extensibility involves adding context menu entries, toolbars, menu items or Browser Helper Objects (BHO). BHOs are used to extend the feature set of the browser, whereas the other extensibility options are used to expose that feature in the user interface. Content extensibility adds support for non-native content formats. It allows Internet Explorer to handle new file formats and new protocols, e.g. WebM or SPDY. In addition, web pages can integrate widgets known as ActiveX controls which run on Windows only but have vast potentials to extend the content capabilities; Adobe Flash Player and Microsoft Silverlight are examples. Add-ons can be installed either locally, or directly by a web site. Since malicious add-ons can compromise the security of a system, Internet Explorer implements several safeguards. Internet Explorer 6 with Service Pack 2 and later feature an Add-on Manager for enabling or disabling individual add-ons, complemented by a "No Add-Ons" mode. Starting with Windows Vista, Internet Explorer and its BHOs run with restricted privileges and are isolated from the rest of the system. Internet Explorer 9 introduced a new component – Add-on Performance Advisor. Add-on Performance Advisor shows a notification when one or more of installed add-ons exceed a pre-set performance threshold. The notification appears in the Notification Bar when the user launches the browser. Windows 8 and Windows RT introduce a Metro-style version of Internet Explorer that is entirely sandboxed and does not run add-ons at all. In addition, Windows RT cannot download or install ActiveX controls at all; although existing ones bundled with Windows RT still run in the traditional version of Internet Explorer. Internet Explorer itself can be hosted by other applications via a set of COM interfaces. This can be used to embed the browser functionality inside a computer program or create Internet Explorer shells. Security Internet Explorer uses a zone-based security framework that groups sites based on certain conditions, including whether it is an Internet- or intranet-based site as well as a user-editable whitelist. Security restrictions are applied per zone; all the sites in a zone are subject to the restrictions. Internet Explorer 6 SP2 onwards uses the Attachment Execution Service of Microsoft Windows to mark executable files downloaded from the Internet as being potentially unsafe. Accessing files marked as such will prompt the user to make an explicit trust decision to execute the file, as executables originating from the Internet can be potentially unsafe. This helps in preventing the accidental installation of malware. Internet Explorer 7 introduced the phishing filter, which restricts access to phishing sites unless the user overrides the decision. With version 8, it also blocks access to sites known to host malware. Downloads are also checked to see if they are known to be malware-infected. In Windows Vista, Internet Explorer by default runs in what is called Protected Mode, where the privileges of the browser itself are severely restricted—it cannot make any system-wide changes. One can optionally turn this mode off, but this is not recommended. This also effectively restricts the privileges of any add-ons. As a result, even if the browser or any add-on is compromised, the damage the security breach can cause is limited. Patches and updates to the browser are released periodically and made available through the Windows Update service, as well as through Automatic Updates. Although security patches continue to be released for a range of platforms, most feature additions and security infrastructure improvements are only made available on operating systems that are in Microsoft's mainstream support phase. On December 16, 2008, Trend Micro recommended users switch to rival browsers until an emergency patch was released to fix a potential security risk which "could allow outside users to take control of a person's computer and steal their passwords.” Microsoft representatives countered this recommendation, claiming that "0.02% of internet sites" were affected by the flaw. A fix for the issue was released the following day with the Security Update for Internet Explorer KB960714, on Microsoft Windows Update. In 2010, Germany's Federal Office for Information Security, known by its German initials, BSI, advised "temporary use of alternative browsers" because of a "critical security hole" in Microsoft's software that could allow hackers to remotely plant and run malicious code on Windows PCs. In 2011, a report by Accuvant, funded by Google, rated the security (based on sandboxing) of Internet Explorer worse than Google Chrome but better than Mozilla Firefox. A 2017 browser security white paper comparing Google Chrome, Microsoft Edge, and Internet Explorer 11 by X41 D-Sec in 2017 came to similar conclusions, also based on sandboxing and support of legacy web technologies. Security vulnerabilities Internet Explorer has been subjected to many security vulnerabilities and concerns such that the volume of criticism for IE is unusually high. Much of the spyware, adware, and computer viruses across the Internet are made possible by exploitable bugs and flaws in the security architecture of Internet Explorer, sometimes requiring nothing more than viewing of a malicious web page to install themselves. This is known as a "drive-by install.” There are also attempts to trick the user into installing malicious software by misrepresenting the software's true purpose in the description section of an ActiveX security alert. A number of security flaws affecting IE originated not in the browser itself, but in ActiveX-based add-ons used by it. Because the add-ons have the same privilege as IE, the flaws can be as critical as browser flaws. This has led to the ActiveX-based architecture being criticized for being fault-prone. By 2005, some experts maintained that the dangers of ActiveX had been overstated and there were safeguards in place. In 2006, new techniques using automated testing found more than a hundred vulnerabilities in standard Microsoft ActiveX components. Security features introduced in Internet Explorer 7 mitigated some of these vulnerabilities. In 2008, Internet Explorer had a number of published security vulnerabilities. According to research done by security research firm Secunia, Microsoft did not respond as quickly as its competitors in fixing security holes and making patches available. The firm also reported 366 vulnerabilities in ActiveX controls, an increase from the previous year. According to an October 2010 report in The Register, researcher Chris Evans had detected a known security vulnerability which, then dating back to 2008, had not been fixed for at least six hundred days. Microsoft says that it had known about this vulnerability, but it was of exceptionally low severity as the victim web site must be configured in a peculiar way for this attack to be feasible at all. In December 2010, researchers were able to bypass the "Protected Mode" feature in Internet Explorer. Vulnerability exploited in attacks on U.S. firms In an advisory on January 14, 2010, Microsoft said that attackers targeting Google and other U.S. companies used software that exploits a security hole, which had already been patched, in Internet Explorer. The vulnerability affected Internet Explorer 6 from on Windows XP and Server 2003, IE6 SP1 on Windows 2000 SP4, IE7 on Windows Vista, XP, Server 2008, and Server 2003, IE8 on Windows 7, Vista, XP, Server 2003, and Server 2008 (R2). The German government warned users against using Internet Explorer and recommended switching to an alternative web browser, due to the major security hole described above that was exploited in Internet Explorer. The Australian and French Government issued a similar warning a few days later. Major vulnerability across versions On April 26, 2014, Microsoft issued a security advisory relating to (use-after-free vulnerability in Microsoft Internet Explorer 6 through 11), a vulnerability that could allow "remote code execution" in Internet Explorer versions 6 to 11. On April 28, 2014, the United States Department of Homeland Security's United States Computer Emergency Readiness Team (US-CERT) released an advisory stating that the vulnerability could result in "the complete compromise" of an affected system. US-CERT recommended reviewing Microsoft's suggestions to mitigate an attack or using an alternate browser until the bug is fixed. The UK National Computer Emergency Response Team (CERT-UK) published an advisory announcing similar concerns and for users to take the additional step of ensuring their antivirus software is up to date. Symantec, a cyber security firm, confirmed that "the vulnerability crashes Internet Explorer on Windows XP". The vulnerability was resolved on May 1, 2014, with a security update. Market adoption and usage share The adoption rate of Internet Explorer seems to be closely related to that of Microsoft Windows, as it is the default web browser that comes with Windows. Since the integration of Internet Explorer 2.0 with Windows 95 OSR 1 in 1996, and especially after version 4.0's release in 1997, the adoption was greatly accelerated: from below 20% in 1996, to about 40% in 1998, and over 80% in 2000. This made Microsoft the winner in the infamous 'first browser war' against Netscape. Netscape Navigator was the dominant browser during 1995 and until 1997, but rapidly lost share to IE starting in 1998, and eventually slipped behind in 1999. The integration of IE with Windows led to a lawsuit by AOL, Netscape's owner, accusing Microsoft of unfair competition. The infamous case was eventually won by AOL but by then it was too late, as Internet Explorer had already become the dominant browser. Internet Explorer peaked during 2002 and 2003, with about 95% share. Its first notable competitor after beating Netscape was Firefox from Mozilla, which itself was an offshoot from Netscape. Firefox 1.0 had surpassed Internet Explorer 5 in early 2005, with Firefox 1.0 at 8 percent market share. Approximate usage over time based on various usage share counters averaged for the year overall, or for the fourth quarter, or for the last month in the year depending on availability of reference. According to StatCounter Internet Explorer's market share fell below 50% in September 2010. In May 2012, Google Chrome overtook Internet Explorer as the most used browser worldwide, according to StatCounter. In September 2021, usage share is low globally, while a bit higher in Africa, at 2.61%. Industry adoption Browser Helper Objects are also used by many search engines companies and third parties for creating add-ons that access their services, such as search engine toolbars. Because of the use of COM, it is possible to embed web-browsing functionality in third-party applications. Hence, there are several Internet Explorer shells, and several content-centric applications like RealPlayer also use Internet Explorer's web browsing module for viewing web pages within the applications. Removal While a major upgrade of Internet Explorer can be uninstalled in a traditional way if the user has saved the original application files for installation, the matter of uninstalling the version of the browser that has shipped with an operating system remains a controversial one. The idea of removing a stock install of Internet Explorer from a Windows system was proposed during the United States v. Microsoft Corp. case. One of Microsoft's arguments during the trial was that removing Internet Explorer from Windows may result in system instability. Indeed, programs that depend on libraries installed by IE, including Windows help and support system, fail to function without IE. Before Windows Vista, it was not possible to run Windows Update without IE because the service used ActiveX technology, which no other web browser supports. Impersonation by malware The popularity of Internet Explorer has led to the appearance of malware abusing its name. On January 28, 2011, a fake Internet Explorer browser calling itself "Internet Explorer – Emergency Mode" appeared. It closely resembles the real Internet Explorer but has fewer buttons and no search bar. If a user attempts to launch any other browser such as Google Chrome, Mozilla Firefox, Opera, Safari, or the real Internet Explorer, this browser will be loaded instead. It also displays a fake error message, claiming that the computer is infected with malware and Internet Explorer has entered "Emergency Mode.” It blocks access to legitimate sites such as Google if the user tries to access them. See also Bing Bar History of the web browser List of web browsers Month of bugs Web 2.0 Windows Filtering Platform Winsock Notes References Further reading External links Internet Explorer Architecture 1995 software FTP clients History of the Internet News aggregator software Proprietary software Windows components Windows web browsers Computer-related introductions in 1995 Products and services discontinued in 2015 Discontinued Microsoft software Web browsers Xbox One software Xbox 360 software
[ -0.20800332725048065, 0.06474597752094269, 0.6265719532966614, -0.01098661869764328, -0.08200254291296005, -0.22355115413665771, 0.22603008151054382, 0.8108423352241516, 0.01495925709605217, -1.0410879850387573, -0.17222163081169128, 0.1678556650876999, -0.554886519908905, 0.23315832018852...
15220
https://en.wikipedia.org/wiki/Imprecise%20language
Imprecise language
Imprecise language, informal spoken language, or everyday language is less precise than any more formal or academic languages. Language might be said to be imprecise because it exhibits one or more of the following features: ambiguity – when a word or phrase pertains to its having more than one meaning in the language to which the word belongs. vagueness – when borderline cases interfere with an interpretation. equivocation – the misleading use of a term with more than one meaning or sense (by glossing over which meaning is intended at a particular time). accent – when the use of bold or italics causes confusion over the meaning of a statement. amphiboly – when a sentence may be interpreted in more than one way due to ambiguous sentence structure. While imprecise language is not desirable in various scientific fields, it may be helpful, illustrative or discussion-stimulative in other contexts. Imprecision in a discourse may or may not be the intention of the author(s) or speaker(s). The role of imprecision may depend on audience, end goal, extended context and subject matter. Relevant players and real stakes will also bear on truth-grounds of statements. References Language
[ 0.3060669004917145, 0.47102925181388855, -0.3484187424182892, 0.1796688586473465, -0.3459111154079437, -0.1829119473695755, 0.6482170820236206, 0.6053736805915833, -0.07029034942388535, -0.6138371825218201, -0.7046749591827393, 0.6304161548614502, -0.3853728771209717, -0.3189650774002075, ...
15221
https://en.wikipedia.org/wiki/Intel%2080188
Intel 80188
The Intel 80188 microprocessor was a variant of the Intel 80186. The 80188 had an 8-bit external data bus instead of the 16-bit bus of the 80186; this made it less expensive to connect to peripherals. The 16-bit registers and the one megabyte address range were unchanged, however. It had a throughput of 1 million instructions per second. Intel second sourced this microprocessor to Fujitsu Limited around 1985. Description Features and performance The 80188 series was generally intended for embedded systems, as microcontrollers with external memory. Therefore, to reduce the number of chips required, it included features such as clock generator, interrupt controller, timers, wait state generator, DMA channels, and external chip select lines. While the N80188 was compatible with the 8087 numeric co-processor, the 80C188 was not. It did not have the ESC control codes integrated. The initial clock rate of the 80188 was 6 MHz, but due to more hardware available for the microcode to use, especially for address calculation, many individual instructions ran faster than on an 8086 at the same clock frequency. For instance, the common register+immediate addressing mode was significantly faster than on the 8086, especially when a memory location was both (one of the) operand(s) and the destination. Multiply and divide also showed great improvement, being several times as fast as on the original 8086 and multi-bit shifts were done almost four times as quickly as in the 8086. End of life Along with hundreds of other processor models, Intel discontinued the 80188 processor 30 March 2006, after a life of about 24 years. Notes References External links Intel 80186/80188 images and descriptions at cpu-collection.de Scan of the Intel 80188 data book at datasheetarchive.com Intel microcontrollers 80186 es:Intel 80186 y 80188
[ -0.19120611250400543, 0.25591400265693665, 0.11778869479894638, 0.38586145639419556, -0.6378848552703857, 0.003172691212967038, 0.6820045709609985, -0.028929132968187332, -0.15610331296920776, -0.307254433631897, -0.09393336623907089, 0.16077080368995667, -0.3953258693218231, 0.15362122654...
15222
https://en.wikipedia.org/wiki/IEEE%20802.2
IEEE 802.2
IEEE 802.2 is the original name of the ISO/IEC 8802-2 standard which defines logical link control (LLC) as the upper portion of the data link layer of the OSI Model. The original standard developed by the Institute of Electrical and Electronics Engineers (IEEE) in collaboration with the American National Standards Institute (ANSI) was adopted by the International Organization for Standardization (ISO) in 1998, but it remains an integral part of the family of IEEE 802 standards for local and metropolitan networks. LLC is a software component that provides a uniform interface to the user of the data link service, usually the network layer. LLC may offer three types of services: Unacknowledged connectionless mode services (mandatory) Connection mode services (optional) Acknowledged connectionless mode services (optional) Conversely, the LLC uses the services of the media access control (MAC), which is dependent on the specific transmission medium (Ethernet, Token Ring, FDDI, 802.11, etc.). Using LLC is compulsory for all IEEE 802 networks with the exception of Ethernet. It is also used in Fiber Distributed Data Interface (FDDI) which is not part of the IEEE 802 family. The IEEE 802.2 sublayer adds some control information to the message created by the upper layer and passed to the LLC for transmission to another node on the same data link. The resulting packet is generally referred to as LLC protocol data unit (PDU) and the additional information added by the LLC sublayer is the LLC HEADER. The LLC Header consist of DSAP (Destination Service Access Point), SSAP (Source Service Access Point) and the Control field. The two 8-bit fields DSAP and SSAP allow multiplexing of various upper layer protocols above LLC. However, many protocols use the Subnetwork Access Protocol (SNAP) extension which allows using EtherType values to specify the protocol being transported atop IEEE 802.2. It also allows vendors to define their own protocol value spaces. The 8 or 16 bit HDLC-style Control field serves to distinguish communication mode, to specify a specific operation and to facilitate connection control and flow control (in connection mode) or acknowledgements (in acknowledged connectionless mode). Operational modes IEEE 802.2 provides two connectionless and one connection-oriented operational modes: Type 1 is an unacknowledged connectionless mode for a datagram service. It allows for sending frames to a single destination (point-to-point or unicast transfer), to multiple destinations on the same network (multicast), or to all stations of the network (broadcast). The use of multicasts and broadcasts reduce network traffic when the same information needs to be propagated to all stations of the network. However the Type 1 service provides no guarantees regarding the order of the received frames compared to the order in which they have been sent; the sender does not even get an acknowledgment that the frames have been received. Type 2 is a connection-oriented operational mode. Sequence numbering ensures that the frames received are guaranteed to be in the order they have been sent, and no frames are lost. Type 3 is an acknowledged connectionless service. It supports point-to-point communication only. Each device conforming the IEEE 802.2 standard must support service type 1. Each network node is assigned an LLC Class according to which service types it supports: LLC header Any 802.2 LLC PDU has the following format: When Subnetwork Access Protocol (SNAP) extension is used, it is located at the start of the Information field: The 802.2 header includes two eight-bit address fields, called service access points (SAP) or collectively LSAP in the OSI terminology: SSAP (Source SAP) is an 8-bit long field that represents the logical address of the network layer entity that has created the message. DSAP (Destination SAP) is an 8-bit long field that represents the logical addresses of the network layer entity intended to receive the message. LSAP values Although the LSAP fields are 8 bits long, the low-order bit is reserved for special purposes, leaving only 128 values available for most purposes. The low-order bit of the DSAP indicates whether it contains an individual or a group address: if the low-order bit is 0, the remaining 7 bits of the DSAP specify an individual address, which refers to a single local service access point (LSAP) to which the packet should be delivered. and if the low-order bit is 1, the remaining 7 bits of the DSAP specify a group address, which refers to a group of LSAPs to which the packet should be delivered. The low-order bit of the SSAP indicates whether the packet is a command or response packet: if it's 0, the packet is a command packet, and if it's 1, the packet is a response packet. The remaining 7 bits of the SSAP specify the LSAP (always an individual address) from which the packet was transmitted. LSAP numbers are globally assigned by the IEEE to uniquely identify well established international standards. The protocols or families of protocols which have assigned one or more SAPs may operate directly on top of 802.2 LLC. Other protocols may use the Subnetwork Access Protocol (SNAP) with IEEE 802.2 which is indicated by the hexadecimal value 0xAA (or 0xAB, if the source of a response) in SSAP and DSAP. The SNAP extension allows using EtherType values or private protocol ID spaces in all IEEE 802 networks. It can be used both in datagram and in connection-oriented network services. Ethernet (IEEE 802.3) networks are an exception; the IEEE 802.3x-1997 standard explicitly allowed using of the Ethernet II framing, where the 16-bit field after the MAC addresses does not carry the length of the frame followed by the IEEE 802.2 LLC header, but the EtherType value followed by the upper layer data. With this framing only datagram services are supported on the data link layer. IPv4, IPX, and 802.2 LLC Although IPv4 has been assigned an LSAP value of 6 (0x06) and ARP has been assigned an LSAP value of 152 (0x98), IPv4 is almost never directly encapsulated in 802.2 LLC frames without SNAP headers. Instead, the Internet standard RFC 1042 is usually used for encapsulating IPv4 traffic in 802.2 LLC frames with SNAP headers on FDDI and on IEEE 802 networks other than Ethernet. Ethernet networks typically use Ethernet II framing with EtherType 0x800 for IP and 0x806 for ARP. The IPX protocol used by Novell NetWare networks supports an additional Ethernet frame type, 802.3 raw, ultimately supporting four frame types on Ethernet (802.3 raw, 802.2 LLC, 802.2 SNAP, and Ethernet II) and two frame types on FDDI and other (non-Ethernet) IEEE 802 networks (802.2 LLC and 802.2 SNAP). It is possible to use diverse framings on a single network. It is possible to do it even for the same upper layer protocol, but in such a case the nodes using unlike framings cannot directly communicate with each other. Control Field Following the destination and source SAP fields is a control field. IEEE 802.2 was conceptually derived from HDLC, and has the same three types of PDUs: Unnumbered format PDUs, or U-format PDUs, with an 8-bit control field, which are intended for connectionless applications; Information transfer format PDUs, or I-format PDUs, with a 16-bit control and sequence numbering field, which are intended to be used in connection-oriented applications; Supervisory format PDUs, or S-format PDUs, with a 16-bit control field, which are intended to be used for supervisory functions at the LLC (Logical Link Control) layer. To carry data in the most-often used unacknowledged connectionless mode the U-format is used. It is identified by the value '11' in lower two bits of the single-byte control field. References External links . IEEE 802.02 Link protocols Logical link control
[ -0.12635932862758636, -0.1212225928902626, 0.175974503159523, -0.23823852837085724, -0.6327704191207886, -0.4536312222480774, 0.41189447045326233, 0.27894628047943115, -0.4922347664833069, -0.5268135666847229, -0.6001420617103577, 0.4864446818828583, -0.7039161324501038, -0.202970653772354...
15223
https://en.wikipedia.org/wiki/Invertebrate
Invertebrate
Invertebrates are animals that neither possess nor develop a vertebral column (commonly known as a backbone or spine), derived from the notochord. This includes all animals apart from the chordate subphylum Vertebrata. Familiar examples of invertebrates include arthropods (insects, arachnids, crustaceans, and myriapods), mollusks (chitons, snails, bivalves, squids, and octopuses), annelid (earthworms and leeches), and cnidarians (hydras, jellyfishes, sea anemones, and corals). The majority of animal species are invertebrates; one estimate puts the figure at 97%. Many invertebrate taxa have a greater number and variety of species than the entire subphylum of Vertebrata. Invertebrates vary widely in size, from 50 μm (0.002 in) rotifers to the 9–10 m (30–33 ft) colossal squid. Some so-called invertebrates, such as the Tunicata and Cephalochordata, are more closely related to vertebrates than to other invertebrates. This makes the invertebrates paraphyletic, so the term has little meaning in taxonomy. Etymology The word "invertebrate" comes from the Latin word vertebra, which means a joint in general, and sometimes specifically a joint from the spinal column of a vertebrate. The jointed aspect of vertebra is derived from the concept of turning, expressed in the root verto or vorto, to turn. The prefix in- means "not" or "without". Taxonomic significance The term invertebrates is not always precise among non-biologists since it does not accurately describe a taxon in the same way that Arthropoda, Vertebrata or Manidae do. Each of these terms describes a valid taxon, phylum, subphylum or family. "Invertebrata" is a term of convenience, not a taxon; it has very little circumscriptional significance except within the Chordata. The Vertebrata as a subphylum comprises such a small proportion of the Metazoa that to speak of the kingdom Animalia in terms of "Vertebrata" and "Invertebrata" has limited practicality. In the more formal taxonomy of Animalia other attributes that logically should precede the presence or absence of the vertebral column in constructing a cladogram, for example, the presence of a notochord. That would at least circumscribe the Chordata. However, even the notochord would be a less fundamental criterion than aspects of embryological development and symmetry or perhaps bauplan. Despite this, the concept of invertebrates as a taxon of animals has persisted for over a century among the laity, and within the zoological community and in its literature it remains in use as a term of convenience for animals that are not members of the Vertebrata. The following text reflects earlier scientific understanding of the term and of those animals which have constituted it. According to this understanding, invertebrates do not possess a skeleton of bone, either internal or external. They include hugely varied body plans. Many have fluid-filled, hydrostatic skeletons, like jellyfish or worms. Others have hard exoskeletons, outer shells like those of insects and crustaceans. The most familiar invertebrates include the Protozoa, Porifera, Coelenterata, Platyhelminthes, Nematoda, Annelida, Echinodermata, Mollusca and Arthropoda. Arthropoda include insects, crustaceans and arachnids. Number of extant species By far the largest number of described invertebrate species are insects. The following table lists the number of described extant species for major invertebrate groups as estimated in the IUCN Red List of Threatened Species, 2014.3. The IUCN estimates that 66,178 extant vertebrate species have been described, which means that over 95% of the described animal species in the world are invertebrates. Characteristics The trait that is common to all invertebrates is the absence of a vertebral column (backbone): this creates a distinction between invertebrates and vertebrates. The distinction is one of convenience only; it is not based on any clear biologically homologous trait, any more than the common trait of having wings functionally unites insects, bats, and birds, or than not having wings unites tortoises, snails and sponges. Being animals, invertebrates are heterotrophs, and require sustenance in the form of the consumption of other organisms. With a few exceptions, such as the Porifera, invertebrates generally have bodies composed of differentiated tissues. There is also typically a digestive chamber with one or two openings to the exterior. Morphology and symmetry The body plans of most multicellular organisms exhibit some form of symmetry, whether radial, bilateral, or spherical. A minority, however, exhibit no symmetry. One example of asymmetric invertebrates includes all gastropod species. This is easily seen in snails and sea snails, which have helical shells. Slugs appear externally symmetrical, but their pneumostome (breathing hole) is located on the right side. Other gastropods develop external asymmetry, such as Glaucus atlanticus that develops asymmetrical cerata as they mature. The origin of gastropod asymmetry is a subject of scientific debate. Other examples of asymmetry are found in fiddler crabs and hermit crabs. They often have one claw much larger than the other. If a male fiddler loses its large claw, it will grow another on the opposite side after moulting. Sessile animals such as sponges are asymmetrical alongside coral colonies (with the exception of the individual polyps that exhibit radial symmetry); alpheidae claws that lack pincers; and some copepods, polyopisthocotyleans, and monogeneans which parasitize by attachment or residency within the gill chamber of their fish hosts). Nervous system Neurons differ in invertebrates from mammalian cells. Invertebrates cells fire in response to similar stimuli as mammals, such as tissue trauma, high temperature, or changes in pH. The first invertebrate in which a neuron cell was identified was the medicinal leech, Hirudo medicinalis.Pastor, J., Soria, B. and Belmonte, C., (1996). Properties of the nociceptive neurons of the leech segmental ganglion. Journal of Neurophysiology, 75: 2268–2279 Learning and memory using nociceptors in the sea hare, Aplysia has been described.Castellucci, V., Pinsker, H., Kupfermann, I. and Kandel, E.R., (1970). Neuronal mechanisms of habituation and dishabituation of the gill-withdrawal reflex in Aplysia. Science, 167: 1745–1748 Mollusk neurons are able to detect increasing pressures and tissue trauma. Neurons have been identified in a wide range of invertebrate species, including annelids, molluscs, nematodes and arthropods.St John Smith, E. and Lewin, G.R., (2009). Nociceptors: a phylogenetic view. Journal of Comparative Physiology A, 195: 1089-1106 Respiratory system One type of invertebrate respiratory system is the open respiratory system composed of spiracles, tracheae, and tracheoles that terrestrial arthropods have to transport metabolic gases to and from tissues. The distribution of spiracles can vary greatly among the many orders of insects, but in general each segment of the body can have only one pair of spiracles, each of which connects to an atrium and has a relatively large tracheal tube behind it. The tracheae are invaginations of the cuticular exoskeleton that branch (anastomose) throughout the body with diameters from only a few micrometres up to 0.8 mm. The smallest tubes, tracheoles, penetrate cells and serve as sites of diffusion for water, oxygen, and carbon dioxide. Gas may be conducted through the respiratory system by means of active ventilation or passive diffusion. Unlike vertebrates, insects do not generally carry oxygen in their haemolymph. A tracheal tube may contain ridge-like circumferential rings of taenidia in various geometries such as loops or helices. In the head, thorax, or abdomen, tracheae may also be connected to air sacs. Many insects, such as grasshoppers and bees, which actively pump the air sacs in their abdomen, are able to control the flow of air through their body. In some aquatic insects, the tracheae exchange gas through the body wall directly, in the form of a gill, or function essentially as normal, via a plastron. Note that despite being internal, the tracheae of arthropods are shed during moulting (ecdysis). Reproduction Like vertebrates, most invertebrates reproduce at least partly through sexual reproduction. They produce specialized reproductive cells that undergo meiosis to produce smaller, motile spermatozoa or larger, non-motile ova. These fuse to form zygotes, which develop into new individuals. Others are capable of asexual reproduction, or sometimes, both methods of reproduction. Social interaction Social behavior is widespread in invertebrates, including cockroaches, termites, aphids, thrips, ants, bees, Passalidae, Acari, spiders, and more. Social interaction is particularly salient in eusocial species but applies to other invertebrates as well. Insects recognize information transmitted by other insects. Phyla The term invertebrates covers several phyla. One of these are the sponges (Porifera). They were long thought to have diverged from other animals early. They lack the complex organization found in most other phyla. Their cells are differentiated, but in most cases not organized into distinct tissues. Sponges typically feed by drawing in water through pores. Some speculate that sponges are not so primitive, but may instead be secondarily simplified. The Ctenophora and the Cnidaria, which includes sea anemones, corals, and jellyfish, are radially symmetric and have digestive chambers with a single opening, which serves as both the mouth and the anus. Both have distinct tissues, but they are not organized into organs. There are only two main germ layers, the ectoderm and endoderm, with only scattered cells between them. As such, they are sometimes called diploblastic. The Echinodermata are radially symmetric and exclusively marine, including starfish (Asteroidea), sea urchins, (Echinoidea), brittle stars (Ophiuroidea), sea cucumbers (Holothuroidea) and feather stars (Crinoidea). The largest animal phylum is also included within invertebrates: the Arthropoda, including insects, spiders, crabs, and their kin. All these organisms have a body divided into repeating segments, typically with paired appendages. In addition, they possess a hardened exoskeleton that is periodically shed during growth. Two smaller phyla, the Onychophora and Tardigrada, are close relatives of the arthropods and share these traits. The Nematoda or roundworms, are perhaps the second largest animal phylum, and are also invertebrates. Roundworms are typically microscopic, and occur in nearly every environment where there is water. A number are important parasites. Smaller phyla related to them are the Kinorhyncha, Priapulida, and Loricifera. These groups have a reduced coelom, called a pseudocoelom. Other invertebrates include the Nemertea or ribbon worms, and the Sipuncula. Another phylum is Platyhelminthes, the flatworms. These were originally considered primitive, but it now appears they developed from more complex ancestors. Flatworms are acoelomates, lacking a body cavity, as are their closest relatives, the microscopic Gastrotricha. The Rotifera or rotifers, are common in aqueous environments. Invertebrates also include the Acanthocephala or spiny-headed worms, the Gnathostomulida, Micrognathozoa, and the Cycliophora. Also included are two of the most successful animal phyla, the Mollusca and Annelida. The former, which is the second-largest animal phylum by number of described species, includes animals such as snails, clams, and squids, and the latter comprises the segmented worms, such as earthworms and leeches. These two groups have long been considered close relatives because of the common presence of trochophore larvae, but the annelids were considered closer to the arthropods because they are both segmented. Now, this is generally considered convergent evolution, owing to many morphological and genetic differences between the two phyla. Among lesser phyla of invertebrates are the Hemichordata, or acorn worms, and the Chaetognatha, or arrow worms. Other phyla include Acoelomorpha, Brachiopoda, Bryozoa, Entoprocta, Phoronida, and Xenoturbellida. Classification of invertebrates Invertebrates can be classified into several main categories, some of which are taxonomically obsolescent or debatable, but still used as terms of convenience. Each however appears in its own article at the following links. Sponges (Porifera) Comb jellies (Ctenophora) Medusozoans and corals (Cnidaria) Acoels (Xenacoelomorpha) Flatworms (Platyhelminthes) Bristleworms, earthworms and leeches (Annelida) Insects, springtails, crustaceans, myriapods, chelicerates (Arthropoda) Chitons, snails, slugs, bivalves, tusk shells, cephalopods (Mollusca) Roundworms or threadworms (Nematoda) Rotifers (Rotifera) Tardigrades (Tardigrada) Scalidophores (Scalidophora) Lophophorates (Lophophorata) Velvet worms (Onychophora) Arrow worms (Chaetognatha) Gordian worms or horsehair worms (Nematomorpha) Ribbon worms (Nemertea)PlacozoaLoriciferaStarfishes, sea urchins, sea cucumbers, sea lilies and brittle stars (Echinodermata) Acorn worms, cephalodiscids and graptolites (Hemichordata) Lancelets (Amphioxiformes) Salps, pyrosomes, doliolids, larvaceans and sea squirts (Tunicata) History The earliest animal fossils appear to be those of invertebrates. 665-million-year-old fossils in the Trezona Formation at Trezona Bore, West Central Flinders, South Australia have been interpreted as being early sponges. Some paleontologists suggest that animals appeared much earlier, possibly as early as 1 billion years ago though they probably became multicellular in the Tonian. Trace fossils such as tracks and burrows found in the late Neoproterozoic era indicate the presence of triploblastic worms, roughly as large (about 5 mm wide) and complex as earthworms. Around 453 MYA, animals began diversifying, and many of the important groups of invertebrates diverged from one another. Fossils of invertebrates are found in various types of sediment from the Phanerozoic. Fossils of invertebrates are commonly used in stratigraphy. Classification Carl Linnaeus divided these animals into only two groups, the Insecta and the now-obsolete Vermes (worms). Jean-Baptiste Lamarck, who was appointed to the position of "Curator of Insecta and Vermes" at the Muséum National d'Histoire Naturelle in 1793, both coined the term "invertebrate" to describe such animals and divided the original two groups into ten, by splitting Arachnida and Crustacea from the Linnean Insecta, and Mollusca, Annelida, Cirripedia, Radiata, Coelenterata and Infusoria from the Linnean Vermes. They are now classified into over 30 phyla, from simple organisms such as sea sponges and flatworms to complex animals such as arthropods and molluscs. Significance of the group Invertebrates are animals without a vertebral column. This has led to the conclusion that invertebrates are a group that deviates from the normal, vertebrates. This has been said to be because researchers in the past, such as Lamarck, viewed vertebrates as a "standard": in Lamarck's theory of evolution, he believed that characteristics acquired through the evolutionary process involved not only survival, but also progression toward a "higher form", to which humans and vertebrates were closer than invertebrates were. Although goal-directed evolution has been abandoned, the distinction of invertebrates and vertebrates persists to this day, even though the grouping has been noted to be "hardly natural or even very sharp." Another reason cited for this continued distinction is that Lamarck created a precedent through his classifications which is now difficult to escape from. It is also possible that some humans believe that, they themselves being vertebrates, the group deserves more attention than invertebrates. In any event, in the 1968 edition of Invertebrate Zoology, it is noted that "division of the Animal Kingdom into vertebrates and invertebrates is artificial and reflects human bias in favor of man's own relatives." The book also points out that the group lumps a vast number of species together, so that no one characteristic describes all invertebrates. In addition, some species included are only remotely related to one another, with some more related to vertebrates than other invertebrates (see Paraphyly). In research For many centuries, invertebrates were neglected by biologists, in favor of big vertebrates and "useful" or charismatic species. Invertebrate biology was not a major field of study until the work of Linnaeus and Lamarck in the 18th century. During the 20th century, invertebrate zoology became one of the major fields of natural sciences, with prominent discoveries in the fields of medicine, genetics, palaeontology, and ecology. The study of invertebrates has also benefited law enforcement, as arthropods, and especially insects, were discovered to be a source of information for forensic investigators. Two of the most commonly studied model organisms nowadays are invertebrates: the fruit fly Drosophila melanogaster and the nematode Caenorhabditis elegans. They have long been the most intensively studied model organisms, and were among the first life-forms to be genetically sequenced. This was facilitated by the severely reduced state of their genomes, but many genes, introns, and linkages have been lost. Analysis of the starlet sea anemone genome has emphasised the importance of sponges, placozoans, and choanoflagellates, also being sequenced, in explaining the arrival of 1500 ancestral genes unique to animals. Invertebrates are also used by scientists in the field of aquatic biomonitoring to evaluate the effects of water pollution and climate change. See also Invertebrate zoology Invertebrate paleontology Marine invertebrates Pain in invertebrates References Further reading Hyman, L. H. 1940. The Invertebrates (6 volumes) New York : McGraw-Hill. A classic work. Anderson, D. T. (Ed.). (2001). Invertebrate zoology (2nd ed.). Oxford: Oxford University Press. Brusca, R. C., & Brusca, G. J. (2003). Invertebrates (2nd ed.). Sunderland, Mass. : Sinauer Associates. Miller, S.A., & Harley, J.P. (1996). Zoology (4th ed.). Boston: WCB/McGraw-Hill. Ruppert, E. E., Fox, R. S., & Barnes, R. D. (2004). Invertebrate zoology: a functional evolutionary approach. Belmont, CA: Thomas-Brooks/Cole. Adiyodi, K.G. & Adyiodi, R.G. (Eds) 1983- . Reproductive Biology of Invertebrates. Wiley, New York. (Many volumes.) Giese, A.G. & Pearse, J.S. (Eds) 1974- . Reproduction of Marine Invertebrates. Academic Press, New York. (Many volumes.) Advances in Invertebrate Reproduction''. Elsevier Science, Amsterdam. (Five volumes.) External links Buglife (UK) African Invertebrates 01 Zoology Paraphyletic groups Obsolete animal taxa
[ 0.4093455970287323, 0.12191560864448547, -0.5295313596725464, 0.27757859230041504, -0.05093521997332573, -0.06199414283037186, 0.22697852551937103, 0.6130828261375427, -0.06290753930807114, -0.23000581562519073, 0.18891072273254395, 0.044733356684446335, -0.3772672712802887, -0.02248924225...
15225
https://en.wikipedia.org/wiki/Ivar%20Aasen
Ivar Aasen
Ivar Andreas Aasen (; 5 August 1813 – 23 September 1896) was a Norwegian philologist, lexicographer, playwright, and poet. He is best known for having assembled from dialects one of the two official written versions of the Norwegian language, Nynorsk. Background He was born as Iver Andreas Aasen at Åsen in Ørsta (then Ørsten), in the district of Sunnmøre, on the west coast of Norway. His father, a peasant with a small farm, Ivar Jonsson, died in 1826. The younger Ivar was brought up to farmwork, but he assiduously cultivated all his leisure in reading. An early interest of his was botany. When he was eighteen, he opened an elementary school in his native parish. In 1833 he entered the household of Hans Conrad Thoresen, the husband of the eminent writer Magdalene Thoresen, in Herøy (then Herø), and there he picked up the elements of Latin. Gradually, and by dint of infinite patience and concentration, the young peasant mastered many languages, and began the scientific study of their structure. Ivar single-handedly created a new language for Norway to become the “literary” language. Career About 1846 he had freed himself from all the burden of manual labour, and could occupy his thoughts with the dialect of his native district, Sunnmøre; his first publication was a small collection of folk songs in the Sunnmøre dialect (1843). His remarkable abilities now attracted general attention, and he was helped to continue his studies undisturbed. His Grammar of the Norwegian Dialects (, 1848) was the result of much labour, and of journeys taken to every part of the country. Aasen's famous Dictionary of the Norwegian Dialects () appeared in its original form in 1850, and from this publication dates all the wide cultivation of the popular language in Norwegian, since Aasen really did no less than construct, out of the different materials at his disposal, a popular language or definite folke-maal (people's language) for Norway. By 1853, he had created the norm for utilizing his new language, which he called Landsmaal, meaning country language. With certain modifications, the most important of which were introduced later by Aasen himself, but also through a latter policy aiming to merge this Norwegian language with Dano-Norwegian, this language has become Nynorsk ("New Norwegian"), the second of Norway's two official languages (the other being Bokmål, the Dano-Norwegian descendant of the Danish language used in Norway in Aasen's time). An unofficial variety of Norwegian more close to Aasen's language is still found in Høgnorsk ("High Norwegian"). Today, some consider Nynorsk on equal footing with Bokmål, as Bokmål tends to be used more in radio and television and most newspapers, whereas New Norse (Nynorsk) is used equally in government work as well as approximately 17% of schools. Although it is not as common as its brother language, it needs to be looked upon as a viable language, as a large minority of Norwegians use it as their primary language including many scholars and authors. New Norse is both a written and spoken language. Aasen composed poems and plays in the composite dialect to show how it should be used; one of these dramas, The Heir (1855), was frequently acted, and may be considered as the pioneer of all the abundant dialect-literature of the last half-century of the 1800s, from Vinje to Garborg. In 1856, he published Norske Ordsprog, a treatise on Norwegian proverbs. Aasen continuously enlarged and improved his grammars and his dictionary. He lived very quietly in lodgings in Oslo (then Christiania), surrounded by his books and shrinking from publicity, but his name grew into wide political favour as his ideas about the language of the peasants became more and more the watch-word of the popular party. In 1864, he published his definitive grammar of Nynorsk and in 1873 he published the definitive dictionary. Quite early in his career, in 1842, he had begun to receive a grant to enable him to give his entire attention to his philological investigations; and the Storting (Norwegian parliament), conscious of the national importance of his work, treated him in this respect with more and more generosity as he advanced in years. He continued his investigations to the last, but it may be said that, after the 1873 edition of his Dictionary (with a new title: ), he added but little to his stores. Aasen holds perhaps an isolated place in literary history as the one man who has invented, or at least selected and constructed, a language which has pleased so many thousands of his countrymen that they have accepted it for their schools, their sermons and their songs. He died in Christiania on 23 September 1896, and was buried with public honours. The Ivar Aasen Centre Ivar Aasen-tunet, an institution devoted to the Nynorsk language, opened in June 2000. The building in Ørsta was designed by Norwegian architect Sverre Fehn. Their web page includes most of Aasens' texts, numerous other examples of Nynorsk literature (in Nettbiblioteket, the Internet Library), and some articles, including some in English, about language history in Norway. 2013 Language year Språkåret 2013 (The Language Year 2013) celebrated Ivar Aasen's 200 year anniversary, as well as the 100 year anniversary of Det Norske Teateret. The year's main focus was to celebrate linguistic diversity in Norway. In a poll released in connection with the celebration, 56% of Norwegians said they held positive views of Aasen, while 7% held negative views. On Aasen's 200 anniversary, 5 August 2013, Bergens Tidende, which is normally published mainly in Bokmål, published an edition fully in Nynorsk in memory of Aasen. Bibliography Aasen published a wide range of material, some of it released posthumously. Footnotes References External links Christian Sinding's musical setting of three Aasen poems Score from Sibley Music Library Digital Scores collections Monument honoring Ivar Aasen by Paul Fjelde The Ivar Aasen Centre Official Website Haraldshaugen by Ivar Aasen 1813 births 1896 deaths Norwegian philologists Norwegian lexicographers Norwegian language Linguists from Norway People from Ørsta Translators of the Bible into Norwegian 19th-century translators 19th-century Norwegian writers Language reformers 19th-century lexicographers
[ -0.3563106656074524, 0.7116466164588928, -0.5174806714057922, -0.3310920298099518, -0.45119762420654297, 1.0589640140533447, 1.3758485317230225, 0.00194029591511935, -0.2693367600440979, -0.2885235548019409, 0.05445219203829765, 0.2464623898267746, -0.23150736093521118, -0.2200936079025268...