id
stringlengths
2
8
url
stringlengths
31
139
title
stringlengths
1
87
text
stringlengths
10
247k
embedding
list
15226
https://en.wikipedia.org/wiki/Irredentism
Irredentism
Irredentism is a political and popular movement whose members claim (usually on behalf of their nation), and seek to occupy, territory which they consider "lost" (or "unredeemed"), based on history or legend. The scope of this definition is occasionally subject to terminological disputes about underlying claims of expansionism, owing to lack of clarity on the historical bounds of putative nations or peoples. This term also often refers to revanchism but the difference between these two terms is, according to Merriam-Webster, that the word "irredentism" means the reunion of politically or ethnically displaced territory, along with a population having the same national identity. On the other hand, "revanchism" evolved from the French word "revanche" which means revenge. In the political realm, "revanchism" refers to such a theory that intends to seek revenge for a lost territory. Etymology The word (from Italian irredento for "unredeemed") was coined in Italy from the phrase Italia irredenta ("unredeemed Italy"). This originally referred to rule by Austria-Hungary over territories mostly or partly inhabited by ethnic Italians, such as Trentino, Trieste, Gorizia, Istria, Fiume and Dalmatia during the 19th and early 20th centuries. An area liable to be targeted by a claim is sometimes called an "irredenta". A common way to express a claim to adjacent territories on the grounds of historical or ethnic association is by using the adjective "Greater" as a prefix to the country name e.g. Greater Germanic Reich, Greater Hungary, Greater Serbia, Greater Albania etc. This conveys the concept and image of national territory at its maximum conceivable or claimed extent, with the country "proper" at its core. The use of "Greater" does not always equate, however, to irredentism; an example of such situation is Greater Poland, the region containing the historical nucleus of the Polish statehood, which bears the adjective “Greater” in order to distinguish it from the region of Lesser Poland, and is unrelated to any concept of Polish territorial claims. Examples See also Ethnic nationalism Expansionism Lebensraum Separatism Secession Manifest Destiny Pan-nationalism Phyletism Revanchism Rump state Status quo ante bellum Territorial dispute References Further reading Willard, Charles Arthur 1996 — Liberalism and the Problem of Knowledge: A New Rhetoric for Modern Democracy, Chicago: University of Chicago Press. , ; External links Divided regions International relations theory Pan-nationalism Territorial disputes
[ 0.40245521068573, -0.21982309222221375, -0.4062328338623047, -0.06451954692602158, -0.6620947122573853, 0.007023851852864027, 0.5105574727058411, 0.8401467800140381, -0.14740252494812012, -0.21893100440502167, -0.7399014234542847, 0.09038370847702026, -0.5049945116043091, 0.596951961517334...
15227
https://en.wikipedia.org/wiki/Inuit%20languages
Inuit languages
The Inuit languages are a closely related group of indigenous American languages traditionally spoken across the North American Arctic and to some extent in the subarctic in Labrador. The related Yupik languages are spoken in western and southern Alaska and in the far east of Russia, but are severely endangered in Russia today and spoken only in a few villages on the Chukchi Peninsula. The Inuit live primarily in three countries: Greenland (Kingdom of Denmark), Canada (specifically in the Nunatsiavut region of Labrador, the Nunavik region of Quebec, Nunavut, and the Northwest Territories), and the United States (specifically the coast of Alaska). The total population of Inuit speaking their traditional languages is difficult to assess with precision, since most counts rely on self-reported census data that may not accurately reflect usage or competence. Greenland census estimates place the number of speakers of varieties of Inuit languages there at roughly 50,000. As of the 2016 Canadian Census, the Indigenous population is 1,673,785 or 4.9% and 65,030 (0.2%) are Inuit (Inuk) of which 36,545 report Inuit as their mother tongue. These two countries count the bulk of speakers of Inuit language variants, although about 7,500 Alaskans speak varieties of Inuit out of a population of over 13,000 Inuit. An estimated 7,000 Greenlandic Inuit live in Denmark, the largest group outside Greenland, Canada and Alaska. Thus, the global population of speakers of varieties of Inuit is on the order of nearly 100,000 people. Nomenclature The traditional language of the Inuit is a system of closely interrelated dialects that are not readily comprehensible from one end of the Inuit world to the other; some people do not think of it as a single language but rather a group of languages. However, there are no clear criteria for breaking the Inuit language into specific member languages since it forms a dialect continuum. Each band of Inuit understands its neighbours, and most likely its neighbours' neighbours; but at some remove, comprehensibility drops to a very low level. As a result, Inuit in different places use different words for its own variants and for the entire group of languages, and this ambiguity has been carried into other languages, creating a great deal of confusion over what labels should be applied to it. In Greenland the official form of Inuit language, and the official language of the state, is called Kalaallisut. In other languages, it is often called Greenlandic or some cognate term. The Eskimo languages of Alaska are called Inupiatun, but the variants of the Seward Peninsula are distinguished from the other Alaskan variants by calling them Qawiaraq, or for some dialects, Bering Strait Inupiatun. In Canada, the word Inuktitut is routinely used to refer to all Canadian variants of the Inuit traditional language, and it is under that name that it is recognised as one of the official languages of Nunavut and the Northwest Territories. However, one of the variants of western Nunavut is called Inuinnaqtun to distinguish itself from the dialects of eastern Canada, while the variants of the Northwest Territories are sometimes called Inuvialuktun and have in the past sometimes been called Inuktun. In those dialects, the name is sometimes rendered as Inuktitun to reflect dialectal differences in pronunciation. The Inuit language of Quebec is called Inuttitut by its speakers, and often by other people, but this is a minor variation in pronunciation. In Labrador, the language is called Inuttut or, often in official documents, by the more descriptive name Labradorimiutut. Furthermore, Canadians – both Inuit and non-Inuit – sometimes use the word Inuktitut to refer to all Inuit language variants, including those of Alaska and Greenland. The phrase "Inuit language" is largely limited to professional discourse, since in each area, there is one or more conventional terms that cover all the local variants; or it is used as a descriptive term in publications where readers can't necessarily be expected to know the locally used words. Although many people refer to the Inuit language as Eskimo language, this is a broad term that also includes the Yupik languages, and is in addition strongly discouraged in Canada and diminishing in usage elsewhere. See the article on Eskimo for more information on this word. Classification and history The language of the Inuit is an Eskimo–Aleut language. It is fairly closely related to the Yupik languages and more remotely to the Aleut language. These cousin languages are all spoken in Western Alaska and Eastern Chukotka, Russia. It is not discernibly related to other indigenous languages of the Americas or northeast Asia, although some have proposed that it is related to the Uralic languages such as Finnish and the Sami languages in the proposed "Uralo-Siberian" grouping, or even Indo-European languages as part of the hypothetical "Nostratic" superphylum. Some consider it a Paleosiberian language, although that is more a geographic than a linguistic grouping. Early forms of the Inuit language are believed to have been spoken by the Thule people, who migrated east from Beringia towards the Arctic Archipelago, which had been occupied by people of the Dorset culture since the beginning of the 2nd millennium. By 1300, the Inuit and their language had reached western Greenland, and finally east Greenland roughly at the same time the Viking colonies in southern Greenland disappeared. It is generally believed that it was during this centuries-long eastward migration that the Inuit language became distinct from the Yupik languages spoken in Western Alaska and Chukotka. Until 1902, a possible enclave of the Dorset, the Sadlermiut (in modern Inuktitut spelling Sallirmiut), existed on Southampton Island. Almost nothing is known about their language, but the few eyewitness accounts tell of them speaking a "strange dialect". This suggests that they also spoke an Eskimo–Aleut language, but one quite distinct from the forms spoken in Canada today. The Yupik and Inuit languages are very similar syntactically and morphologically. Their common origin can be seen in a number of cognates: The western Alaskan variants retain a large number of features present in proto-Inuit language and in Yup'ik, enough so that they might be classed as Yup'ik languages if they were viewed in isolation from the larger Inuit world. Geographic distribution and variants The Inuit languages are a fairly closely linked set of languages which can be broken up using a number of different criteria. Traditionally, Inuit describe dialect differences by means of place names to describe local idiosyncrasies in language: The dialect of Igloolik versus the dialect of Iqaluit, for example. However, political and sociological divisions are increasingly the principal criteria for describing different variants of the Inuit languages because of their links to different writing systems, literary traditions, schools, media sources and borrowed vocabulary. This makes any partition of the Inuit language somewhat problematic. This article will use labels that try to synthesise linguistic, sociolinguistic and political considerations in splitting up the Inuit dialect spectrum. This scheme is not the only one used or necessarily one used by Inuit themselves, but its labels do try to reflect the usages most seen in popular and technical literature. In addition to the territories listed below, some 7,000 Greenlandic speakers are reported to live in mainland Denmark, and according to the 2001 census roughly 200 self-reported Inuktitut native speakers regularly live in parts of Canada which are outside traditional Inuit lands. Alaska Of the roughly 13,000 Alaskan Iñupiat, as few as 3000 may still be able to speak the Iñupiaq, with most of them over the age of 40. Alaskan Inupiat speak three distinct dialects, which have difficult mutual intelligibilty: Qawiaraq is spoken on the southern side of the Seward Peninsula and the Norton Sound area. In the past it was spoken in Chukotka, particularly Big Diomede island, but appears to have vanished in Russian areas through assimilation into Yupik, Chukchi and Russian-speaking communities. It is radically different in phonology from other Inuit language variants. Inupiatun (North Slope Iñupiaq) is spoken on the Alaska North Slope and in the Kotzebue Sound area. Malimiutun or Malimiut Inupiatun, which are the variants of the Kotzebue Sound area and the northwest of Alaska . Canada The Inuit languages are an official language in the Northwest Territories, and the official and dominant language of Nunavut; it enjoys a high level of official support in Nunavik, a semi-autonomous portion of Quebec; and is still spoken in some parts of Labrador. Generally, Canadians refer to all dialects spoken in Canada as Inuktitut, but the terms Inuvialuktun, Inuinnaqtun, and Inuttut (also called Nunatsiavummiutut or Labradorimiutut) have some currency in referring to the variants of specific areas. Western Canadian Inuit Inuvialuktun (from west to east) Uummarmiutun (Canadian Iñupiaq) Siglitun (Sallirmiutun) Inuinnaqtun Natsilingmiutut Kivallirmiutut (Kivalliq) Aivilingmiutut (Ailivik) Iglulingmiut (Qikiqtaaluk Uannanganii) Eastern Canadian Inuit Inuktitut Qikiqtaaluk Nigiani Nunavimmiututut Inuttitut (Nunatsiavummiut) Greenland Greenland counts approximately 50,000 speakers of the Inuit languages, over 90% of whom speak west Greenlandic dialects at home. Kalaallisut, or in English Greenlandic, is the name given to the standard dialect and official language of Greenland. This standard national language has been taught to all Greenlanders since schools were established, regardless of their native dialect. It reflects almost exclusively the language of western Greenland and has borrowed a great deal of vocabulary from Danish, while Canadian and Alaskan Inuit languages have tended to take vocabulary from English or sometimes French and Russian. It is written using the Latin script. The dialect of the Upernavik area in northwest Greenland is somewhat different in phonology from the standard dialect. Tunumiit oraasiat, the Tunumiit dialect, (or Tunumiisut in Greenlandic, often East Greenlandic in other languages), is the dialect of eastern Greenland. It differs sharply from other Inuit language variants and has roughly 3000 speakers according to Ethnologue. Inuktun (Or Avanersuarmiutut in Greenlandic) is the dialect of the area around Qaanaaq in northern Greenland. It is sometimes called the Thule dialect or North Greenlandic. This area is the northernmost settlement area of the Inuit and has a relatively small number of speakers. It is reputed to be fairly close to the North Baffin dialect, since a group of migratory Inuit from Baffin Island settled in the area during the 19th and early 20th centuries. It counts under 1000 speakers according to Ethnologue. Greenlandic was strongly supported by the Danish Christian mission (conducted by the Danish state church) in Greenland. Several major dictionaries were created, beginning with Poul Egedes's Dictionarium Grönlandico-danico-latinum (1750) and culminating with Samuel Kleinschmidt's (1871) "Den grønlandske ordbog" (Transl. "The Greenlandic Dictionary") that contained a Greenlandic grammatical system that has formed the basis of modern Greenlandic grammar. Together with the fact that until 1925 Danish was not taught in the public schools, these policies had the consequence that Greenlandic has always and continues to enjoy a very strong position in Greenland, both as a spoken as well as written language. Phonology and phonetics Eastern Canadian Inuit language variants have fifteen consonants and three vowels (which can be long or short). Consonants are arranged with five places of articulation: bilabial, alveolar, palatal, velar and uvular; and three manners of articulation: voiceless stops, voiced continuants, and nasals, as well as two additional sounds—voiceless fricatives. The Alaskan dialects have an additional manner of articulation, the retroflex, which was present in proto-Inuit language. Retroflexes have disappeared in all the Canadian and Greenlandic dialects. In Natsilingmiutut, the voiced palatal stop derives from a former retroflex. Almost all Inuit language variants have only three basic vowels and make a phonological distinction between short and long forms of all vowels. The only exceptions are at the extreme edges of the Inuit world: parts of Greenland, and in western Alaska. Morphology and syntax The Inuit language, like other Eskimo–Aleut languages, has a very rich morphological system, in which a succession of different morphemes are added to root words (like verb endings in European languages) to indicate things that, in languages like English, would require several words to express. (See also: Agglutinative language and Polysynthetic language) All Inuit language words begin with a root morpheme to which other morphemes are suffixed. The language has hundreds of distinct suffixes, in some dialects as many as 700. Fortunately for learners, the language has a highly regular morphology. Although the rules are sometimes very complicated, they do not have exceptions in the sense that English and other Indo-European languages do. This system makes words very long, and potentially unique. For example, in central Nunavut Inuktitut: Tusaatsiarunnanngittualuujunga. I cannot hear very well. This long word is composed of a root word tusaa- "to hear" followed by five suffixes: {| !-tsiaq- |"well" |- !-junnaq- |"be able to" |- !-nngit- |"not" |- !-tualuu- |"very much" |- !-junga |1st pers. singular present indicative non-specific |} This sort of word construction is pervasive in the Inuit languages and makes them very unlike English. In one large Canadian corpus – the Nunavut Hansard – 92% of all words appear only once, in contrast to a small percentage in most English corpora of similar size. This makes the application of Zipf's law quite difficult in the Inuit language. Furthermore, the notion of a part of speech can be somewhat complicated in the Inuit languages. Fully inflected verbs can be interpreted as nouns. The word ilisaijuq can be interpreted as a fully inflected verb: "he studies", but can also be interpreted as a noun: "student". That said, the meaning is probably obvious to a fluent speaker, when put in context. The morphology and syntax of the Inuit languages vary to some degree between dialects, and the article Inuit grammar describes primarily central Nunavut dialects, but the basic principles will generally apply to all of them and to some degree to Yupik languages as well. Vocabulary Toponymy and names Both the names of places and people tend to be highly prosaic when translated. Iqaluit, for example, is simply the plural of the noun iqaluk "fish" ("Arctic char", "salmon" or "trout" depending on dialect). Igloolik (Iglulik) means place with houses, a word that could be interpreted as simply town; Inuvik is place of people; Baffin Island, Qikiqtaaluk in Inuktitut, translates approximately to "big island". Although practically all Inuit have legal names based on southern naming traditions, at home and among themselves they still use native naming traditions. There too, names tend to consist of highly prosaic words. The Inuit traditionally believed that by adopting the name of a dead person or a class of things, they could take some of their characteristics or powers, and enjoy a part of their identity. (This is why they were always very willing to accept European names: they believed that this made them equal to the Europeans.) Common native names in Canada include "Ujarak" (rock), "Nuvuk" (headland), "Nasak" (hat, or hood), "Tupiq" or "Tupeq" in Kalaallisut (tent), and "Qajaq" (kayak). Inuit also use animal names, traditionally believing that by using those names, they took on some of the characteristics of that animal: "Nanuq" or "Nanoq" in Kalaallisut (polar-bear), "Uqalik" or "Ukaleq" in Kalaallisut (Arctic hare), and "Tiriaq" or "Teriaq" in Kalaallisut (mouse) are favourites. In other cases, Inuit are named after dead people or people in traditional tales, by naming them after anatomical traits those people are believed to have had. Examples include "Itigaituk" (has no feet), "Anana" or "Anaana" (mother), "Piujuq" (beautiful) and "Tulimak" (rib). Inuit may have any number of names, given by parents and other community members. Disc numbers and Project Surname In the 1920s, changes in lifestyle and serious epidemics like tuberculosis made the government of Canada interested in tracking the Inuit of Canada's Arctic. Traditionally Inuit names reflect what is important in Inuit culture: environment, landscape, seascape, family, animals, birds, spirits. However these traditional names were difficult for non-Inuit to parse. Also, the agglutinative nature of Inuit language meant that names seemed long and were difficult for southern bureaucrats and missionaries to pronounce. Thus, in the 1940s, the Inuit were given disc numbers, recorded on a special leather ID tag, like a dog tag. They were required to keep the tag with them always. (Some tags are now so old and worn that the number is polished out.) The numbers were assigned with a letter prefix that indicated location (E = east), community, and then the order in which the census-taker saw the individual. In some ways this state renaming was abetted by the churches and missionaries, who viewed the traditional names and their calls to power as related to shamanism and paganism. They encouraged people to take Christian names. So a young woman who was known to her relatives as "Lutaaq, Pilitaq, Palluq, or Inusiq" and had been baptised as "Annie" was under this system to become Annie E7-121. People adopted the number-names, their family members' numbers, etc., and learned all the region codes (like knowing a telephone area code). Until Inuit began studying in the south, many did not know that numbers were not normal parts of Christian and English naming systems. Then in 1969, the government started Project Surname, headed by Abe Okpik, to replace number-names with patrilineal "family surnames". But contemporary Inuit carvers and graphic artists still use their disk number as their signature on their works of art. Words for snow A popular belief exists that the Inuit have an unusually large number of words for snow. This is not accurate, and results from a misunderstanding of the nature of polysynthetic languages. In fact, the Inuit have only a few base roots for snow: 'qanniq-' ('qanik-' in some dialects), which is used most often like the verb to snow, and 'aput', which means snow as a substance. Parts of speech work very differently in the Inuit language than in English, so these definitions are somewhat misleading. The Inuit languages can form very long words by adding more and more descriptive affixes to words. Those affixes may modify the syntactic and semantic properties of the base word, or may add qualifiers to it in much the same way that English uses adjectives or prepositional phrases to qualify nouns (e.g. "falling snow", "blowing snow", "snow on the ground", "snow drift", etc.) The "fact" that there are many Inuit words for snow has been put forward so often that it has become a journalistic cliché. Numbers The Inuit use a base-20 counting system. Writing Because the Inuit languages are spread over such a large area, divided between different nations and political units and originally reached by Europeans of different origins at different times, there is no uniform way of writing the Inuit language. Currently there are six "standard" ways to write the languages: ICI Standard Syllabics (Canada) ICI Standard Roman script (Canada) Nunatsiavut Roman script (Canada) Alaskan Inupiaq script (USA) Greenlandic Though all except the syllabics use the Latin alphabet, all of them are a bit different from each other. The Canadian national organization Inuit Tapiriit Kanatami adopted Inuktut Qaliujaaqpait, a unified orthography for all varieties of Inuktitut, in September 2019. It is based on the Latin alphabet without diacritics. Most Inuktitut in Nunavut and Nunavik is written using a script called Inuktitut syllabics, based on Canadian Aboriginal syllabics. The western part of Nunavut and the Northwest Territories use Latin alphabet usually identified as Inuinnaqtun. In Alaska, another Latin alphabet is used, with some characters using diacritics. Nunatsiavut uses an alphabet devised by German-speaking Moravian missionaries, which included the letter kra. Greenland's Latin alphabet was originally much like the one used in Nunatsiavut, but underwent a spelling reform in 1973 to bring the orthography in line with changes in pronunciation and better reflect the phonemic inventory of the language. Canadian syllabics Inuktitut syllabics, used in Canada, is based on Cree syllabics, which was devised by the missionary James Evans based on Devanagari a Brahmi script. The present form of Canadian Inuktitut syllabics was adopted by the Inuit Cultural Institute in Canada in the 1970s. The Inuit in Alaska, the Inuvialuit, Inuinnaqtun speakers, and Inuit in Greenland and Labrador use Latin alphabets. Though presented in syllabic form, syllabics is not a true syllabary, but an abugida, since syllables starting with the same consonant are written with graphically similar letters. All of the characters needed for Inuktitut syllabics are available in the Unicode character repertoire, in the blocks Unified Canadian Aboriginal Syllabics. Further reading See also Duncan Pryde Inuit Sign Language Yupik languages Uralo Siberian Inupiaq language References Alia, Valerie (1994) Names, Numbers and Northern policy: Inuit, Project Surname and the Politics of Identity. Halifax NS: Fernwood Publishing. Collis, Dirmid R. F., ed. Arctic Languages: An Awakening  . Dorais, Louis-Jacques (2010) The Language of the Inuit. Syntax, Semantics, and Society in the Arctic. Montreal: McGill-Queen's University Press. Greenhorn, Beth Project Naming: Always On Our Minds, Library and Archives Canada, Canada. Mallon, Mick Inuktitut Linguistics for Technocrats. Mallon, Mick (1991) Introductory Inuktitut and Introductory Inuktitut Reference Grammar. and . Okpik, Abe. Disk Numbers. (Okpik received the Order of Canada for his work on Project Surname) Project Naming Website. Spalding, Alex (1998) Inuktitut: A Multi-dialectal Outline Dictionary (with an Aivilingmiutaq base). . Spalding, Alex (1992) Inuktitut: a Grammar of North Baffin Dialects. . External links Dictionaries and lexica Interactive IñupiaQ Dictionary Oqaasileriffik Language database   Textbook Webpages A Brief History of Inuktitut Writing Culture Inuktitut Syllabarium Our Language, Our Selves Alt.folklore.urban on Eskimo words for snow. Report of the third Danish Chukotka expedition with information on the Chukotka Yupik Unicode support Code Charts Eskimo–Aleut languages Inuit01 Inuit01 Inuit01 Languages of Greenland Inuit culture Agglutinative languages Indigenous languages of North America
[ 0.29131051898002625, 0.6385011672973633, -0.41842615604400635, -0.305822491645813, 0.1343919187784195, 0.6648375988006592, 0.8904356956481934, 0.879479169845581, -0.31436532735824585, -0.7018168568611145, -0.19147822260856628, 0.15010632574558258, -0.4857010245323181, -0.10339266061782837,...
15229
https://en.wikipedia.org/wiki/Ibn%20Battuta
Ibn Battuta
El-Hajji Abu Abdullah Muhammad ibn Battuta (; 24 February 13041368/1369), commonly known as Ibn Battuta, was an Arab-Berber Maghrebi scholar and explorer who travelled extensively in the lands of Afro-Eurasia, largely in the lands of Dar al-Islam, travelling more than any other explorer in pre-modern history, totalling around , surpassing Zheng He with about and Marco Polo with . Over a period of thirty years, Ibn Battuta visited most of southern Eurasia, including Central Asia, Southeast Asia, South Asia, China, and the Iberian Peninsula. Near the end of his life, he dictated an account of his journeys, titled A Gift to Those Who Contemplate the Wonders of Cities and the Marvels of Travelling, but commonly known as The Rihla. Early life All that is known about Ibn Battuta's life comes from the autobiographical information included in the account of his travels, which records that he was of Berber descent, born into a family of Islamic legal scholars in Tangier, known as qadis in the Muslim tradition in Morocco, on 24 February 1304, during the reign of the Marinid dynasty. His family belonged to a Berber tribe known as the Lawata. As a young man, he would have studied at a Sunni Maliki madh'hab (Islamic jurisprudence school), the dominant form of education in North Africa at that time. Maliki Muslims requested Ibn Battuta serve as their religious judge as he was from an area where it was practised. His name Europeans are sometimes puzzled by Arabic/Islamic naming conventions, which mostly don't include a given, middle, or family name. Instead they tend to have a potentially lengthy series of epithetic, aspirational, and/or patronymic names this may have just been a nickname since "battuta" means "duckling". His most common "full name" is given as Abu Abdullah Muhammad ibn Battuta, which simply means "Father of Abdullah (and Abdullah means "worshipper of Allah"), Praiseworthy son of Battuta". But many authoritative texts will go on longer, adding more of his acquired name sequence. In his travelogue, the Rihla, he gives his full name as ’ ibn Muhammad . Rihla Itinerary 1325–1332 First pilgrimage In June 1325, at the age of twenty-one, Ibn Battuta set off from his home town on a hajj, or pilgrimage, to Mecca, a journey that would ordinarily take sixteen months. He was eager to learn more about far-away lands and craved adventure. No one knew that he would not return to Morocco again for twenty-four years. "I set out alone, having neither fellow-traveller in whose companionship I might find cheer, nor caravan whose part I might join, but swayed by an overmastering impulse within me and a desire long-cherished in my bosom to visit these illustrious sanctuaries. So I braced my resolution to quit my dear ones, female and male, and forsook my home as birds forsake their nests. My parents being yet in the bonds of life, it weighed sorely upon me to part from them, and both they and I were afflicted with sorrow at this separation." He travelled to Mecca overland, following the North African coast across the sultanates of Abd al-Wadid and Hafsid. The route took him through Tlemcen, Béjaïa, and then Tunis, where he stayed for two months. For safety, Ibn Battuta usually joined a caravan to reduce the risk of being robbed. He took a bride in the town of Sfax, but soon left her due to a dispute with the father. That was the first in a series of marriages that would feature in his travels. In the early spring of 1326, after a journey of over , Ibn Battuta arrived at the port of Alexandria, at the time part of the Bahri Mamluk empire. He met two ascetic pious men in Alexandria. One was Sheikh Burhanuddin, who is supposed to have foretold the destiny of Ibn Battuta as a world traveller and told him "It seems to me that you are fond of foreign travel. You must visit my brother Fariduddin in India, Rukonuddin in Sind, and Burhanuddin in China. Convey my greetings to them". Another pious man Sheikh Murshidi interpreted the meaning of a dream of Ibn Battuta that he was meant to be a world traveller. He spent several weeks visiting sites in the area, and then headed inland to Cairo, the capital of the Mamluk Sultanate and an important city. After spending about a month in Cairo, he embarked on the first of many detours within the relative safety of Mamluk territory. Of the three usual routes to Mecca, Ibn Battuta chose the least-travelled, which involved a journey up the Nile valley, then east to the Red Sea port of Aydhab. Upon approaching the town, however, a local rebellion forced him to turn back. Ibn Battuta returned to Cairo and took a second side trip, this time to Mamluk-controlled Damascus. During his first trip he had encountered a holy man who prophesied that he would only reach Mecca by travelling through Syria. The diversion held an added advantage; because of the holy places that lay along the way, including Hebron, Jerusalem, and Bethlehem, the Mamluk authorities spared no efforts in keeping the route safe for pilgrims. Without this help many travellers would be robbed and murdered. After spending the Muslim month of Ramadan in Damascus, he joined a caravan travelling the south to Medina, site of the Mosque of the Islamic prophet Muhammad. After four days in the town, he journeyed on to Mecca while visiting holy sites along the way; upon his arrival to Mecca he completed his first pilgrimage and he took the honorific status of El-Hajji. Rather than returning home, Ibn Battuta decided to continue travelling, choosing as his next destination the Ilkhanate, a Mongol Khanate, to the northeast. Iraq and Iran On 17 November 1326, following a month spent in Mecca, Ibn Battuta joined a large caravan of pilgrims returning to Iraq across the Arabian Peninsula. The group headed north to Medina and then, travelling at night, turned northeast across the Najd plateau to Najaf, on a journey that lasted about two weeks. In Najaf, he visited the mausoleum of Ali, the Fourth Caliph. Then, instead of continuing to Baghdad with the caravan, Ibn Battuta started a six-month detour that took him into Iran. From Najaf, he journeyed to Wasit, then followed the river Tigris south to Basra. His next destination was the town of Isfahan across the Zagros Mountains in Iran. He then headed south to Shiraz, a large, flourishing city spared the destruction wrought by Mongol invaders on many more northerly towns. Finally, he returned across the mountains to Baghdad, arriving there in June 1327. Parts of the city were still ruined from the damage inflicted by Hulago Khan's invading army in 1258. In Baghdad, he found Abu Sa'id, the last Mongol ruler of the unified Ilkhanate, leaving the city and heading north with a large retinue. Ibn Battuta joined the royal caravan for a while, then turned north on the Silk Road to Tabriz, the first major city in the region to open its gates to the Mongols and by then an important trading centre as most of its nearby rivals had been razed by the Mongol invaders. Ibn Battuta left again for Baghdad, probably in July, but first took an excursion northwards along the river Tigris. He visited Mosul, where he was the guest of the Ilkhanate governor, and then the towns of Cizre (Jazirat ibn 'Umar) and Mardin in modern-day Turkey. At a hermitage on a mountain near Sinjar, he met a Kurdish mystic who gave him some silver coins. Once back in Mosul, he joined a "feeder" caravan of pilgrims heading south to Baghdad, where they would meet up with the main caravan that crossed the Arabian Desert to Mecca. Ill with diarrhoea, he arrived in the city weak and exhausted for his second hajj. Arabia Ibn Battuta remained in Mecca for some time (the Rihla suggests about three years, from September 1327 until autumn 1330). Problems with chronology, however, lead commentators to suggest that he may have left after the 1328 hajj. After the hajj in either 1328 or 1330, he made his way to the port of Jeddah on the Red Sea coast. From there he followed the coast in a series of boats (known as a jalbah, these were small craft made of wooden planks sewn together, lacking an established phrase) making slow progress against the prevailing south-easterly winds. Once in Yemen he visited Zabīd and later the highland town of Ta'izz, where he met the Rasulid dynasty king (Malik) Mujahid Nur al-Din Ali. Ibn Battuta also mentions visiting Sana'a, but whether he actually did so is doubtful. In all likelihood, he went directly from Ta'izz to the important trading port of Aden, arriving around the beginning of 1329 or 1331. Somalia From Aden, Ibn Battuta embarked on a ship heading for Zeila on the coast of Somalia. He then moved on to Cape Guardafui further down the Somalia seaboard, spending about a week in each location. Later he would visit Mogadishu, the then pre-eminent city of the "Land of the Berbers" (بلد البربر Balad al-Barbar, the medieval Arabic term for the Horn of Africa). When Ibn Battuta arrived in 1332, Mogadishu stood at the zenith of its prosperity. He described it as "an exceedingly large city" with many rich merchants, noted for its high-quality fabric that was exported to other countries, including Egypt. Ibn Battuta added that the city was ruled by a Somali Sultan, Abu Bakr ibn Sayx 'Umar, who was originally from Berbera in northern Somalia and spoke both Somali (referred to by Battuta as Mogadishan, the Benadir dialect of Somali) and Arabic with equal fluency. The Sultan, had a son and heir apparent, Hamza. Hamza was noted for bravery in battle and being exceedingly cunning as well as being dashingly handsome. Hamza led men into battle at the very ripe age of 9; his prowess on field of battle was so legendary that his enemies would rather negotiate than foolishly meet Hamza on the open field. In addition to being commanding presence on the battlefield, Hamza was a well-travelled man, as he was the first Somali to step foot in mainland China, where Hamza established ties with the Ming Dynasty of the 14th century. Hamza was a man of great generosity and known for supporting the poor and was known locally as Hamza Habibi حمزة حبيب(ي) The Sultan also claimed lineage to the Prophet through Abu Taleb, and his son Aqeel The Sultan also had a retinue of wazirs (ministers), legal experts, commanders, royal eunuchs, and assorted hangers-on at his beck and call. Swahili Coast Ibn Battuta continued by ship south to the Swahili Coast, a region then known in Arabic as the Bilad al-Zanj ("Land of the Zanj"), with an overnight stop at the island town of Mombasa. Although relatively small at the time, Mombasa would become important in the following century. After a journey along the coast, Ibn Battuta next arrived in the island town of Kilwa in present-day Tanzania, which had become an important transit centre of the gold trade. He described the city as "one of the finest and most beautifully built towns; all the buildings are of wood, and the houses are roofed with dīs reeds". Ibn Battuta recorded his visit to the Kilwa Sultanate in 1330, and commented favourably on the humility and religion of its ruler, Sultan al-Hasan ibn Sulaiman, a descendant of the legendary Ali ibn al-Hassan Shirazi. He further wrote that the authority of the Sultan extended from Malindi in the north to Inhambane in the south and was particularly impressed by the planning of the city, believing it to be the reason for Kilwa's success along the coast. During this period, he described the construction of the Palace of Husuni Kubwa and a significant extension to the Great Mosque of Kilwa, which was made of coral stones and was the largest Mosque of its kind. With a change in the monsoon winds, Ibn Battuta sailed back to Arabia, first to Oman and the Strait of Hormuz then on to Mecca for the hajj of 1330 (or 1332). Itinerary 1332–1347 Anatolia After his third pilgrimage to Mecca, Ibn Battuta decided to seek employment with the Sultan of Delhi, Muhammad bin Tughluq. In the autumn of 1330 (or 1332), he set off for the Seljuk controlled territory of Anatolia to take an overland route to India. He crossed the Red Sea and the Eastern Desert to reach the Nile valley and then headed north to Cairo. From there he crossed the Sinai Peninsula to Palestine and then travelled north again through some of the towns that he had visited in 1326. From the Syrian port of Latakia, a Genoese ship took him (and his companions) to Alanya on the southern coast of modern-day Turkey. He then journeyed westwards along the coast to the port of Antalya. In the town he met members of one of the semi-religious fityan associations. These were a feature of most Anatolian towns in the 13th and 14th centuries. The members were young artisans and had at their head a leader with the title of Akhil. The associations specialised in welcoming travellers. Ibn Battuta was very impressed with the hospitality that he received and would later stay in their hospices in more than 25 towns in Anatolia. From Antalya Ibn Battuta headed inland to Eğirdir which was the capital of the Hamidids. He spent Ramadan (June 1331 or May 1333) in the city. From this point his itinerary across Anatolia in the Rihla becomes confused. Ibn Battuta describes travelling westwards from Eğirdir to Milas and then skipping eastward past Eğirdir to Konya. He then continues travelling in an easterly direction, reaching Erzurum from where he skips back to Birgi which lies north of Milas. Historians believe that Ibn Battuta visited a number of towns in central Anatolia, but not in the order in which he describes. When Ibn Battuta arrived in Iznik, which had just been conquered by Orhan, Orhan was away and his wife was in command of the nearby stationed soldiers, Ibn Battuta gave this account of Orhan's wife: “A pious and excellent woman. She treated me honourably, gave me hospitality and sent gifts.” Ibn Battuta's account of Orhan: Ibn Battuta had also visited Bursa which at the time was the capital of the Ottoman Beylik, he described Bursa as “a great and important city with fine bazaars and wide streets, surrounded on all sides with gardens and running springs.” He also visited the Beylik of Aydin. Ibn Battuta stated that the ruler of the Beylik of Aydin had twenty Greek slaves at the entrance of his palace and Ibn Battuta was given a Greek slave as a gift. His visit to Anatolia was the first time in his travels he acquired a servant; the ruler of Aydin gifted him his first slave. Later, he purchased a young Greek girl for 40 dinars in Ephesus, was gifted another slave in Izmir by the Sultan, and purchased a second girl in Balikesir. The conspicuous evidence of his wealth and prestige continued to grow. Central Asia From Sinope he took a sea route to the Crimean Peninsula, arriving in the Golden Horde realm. He went to the port town of Azov, where he met with the emir of the Khan, then to the large and rich city of Majar. He left Majar to meet with Uzbeg Khan's travelling court (Orda), which was at the time near Mount Beshtau. From there he made a journey to Bolghar, which became the northernmost point he reached, and noted its unusually short nights in summer (by the standards of the subtropics). Then he returned to the Khan's court and with it moved to Astrakhan. Ibn Battuta recorded that while in Bolghar he wanted to travel further north into the land of darkness. The land is snow-covered throughout (northern Siberia) and the only means of transport is dog-drawn sled. There lived a mysterious people who were reluctant to show themselves. They traded with southern people in a peculiar way. Southern merchants brought various goods and placed them in an open area on the snow in the night, then returned to their tents. Next morning they came to the place again and found their merchandise taken by the mysterious people, but in exchange they found fur-skins which could be used for making valuable coats, jackets, and other winter garments. The trade was done between merchants and the mysterious people without seeing each other. As Ibn Battuta was not a merchant and saw no benefit of going there he abandoned the travel to this land of darkness. When they reached Astrakhan, Öz Beg Khan had just given permission for one of his pregnant wives, Princess Bayalun, a daughter of Byzantine emperor Andronikos III Palaiologos, to return to her home city of Constantinople to give birth. Ibn Battuta talked his way into this expedition, which would be his first beyond the boundaries of the Islamic world. Arriving in Constantinople towards the end of 1332 (or 1334), he met the Byzantine emperor Andronikos III Palaiologos. He visited the great church of Hagia Sophia and spoke with an Eastern Orthodox priest about his travels in the city of Jerusalem. After a month in the city, Ibn Battuta returned to Astrakhan, then arrived in the capital city Sarai al-Jadid and reported the accounts of his travels to Sultan Öz Beg Khan (r. 1313–1341). Then he continued past the Caspian and Aral Seas to Bukhara and Samarkand, where he visited the court of another Mongolian king, Tarmashirin (r. 1331–1334) of the Chagatai Khanate. From there, he journeyed south to Afghanistan, then crossed into India via the mountain passes of the Hindu Kush. In the Rihla, he mentions these mountains and the history of the range in slave trading. He wrote, Ibn Battuta and his party reached the Indus River on 12 September 1333. From there, he made his way to Delhi and became acquainted with the sultan, Muhammad bin Tughluq. India Muhammad bin Tughluq was renowned as the wealthiest man in the Muslim world at that time. He patronized various scholars, Sufis, qadis, viziers, and other functionaries in order to consolidate his rule. As with Mamluk Egypt, the Tughlaq Dynasty was a rare vestigial example of Muslim rule after a Mongol invasion. On the strength of his years of study in Mecca, Ibn Battuta was appointed a qadi, or judge, by the sultan. However, he found it difficult to enforce Islamic law beyond the sultan's court in Delhi, due to lack of Islamic appeal in India. It is uncertain by which route Ibn Battuta entered the Indian subcontinent but it is known that he was kidnapped and robbed by Hindu rebels on his journey to the Indian coast. He may have entered via the Khyber Pass and Peshawar, or further south. He crossed the Sutlej river near the city of Pakpattan, in modern-day Pakistan, where he paid obeisance at the shrine of Baba Farid, before crossing southwest into Rajput country. From the Rajput kingdom of Sarsatti, Battuta visited Hansi in India, describing it as "among the most beautiful cities, the best constructed and the most populated; it is surrounded with a strong wall, and its founder is said to be one of the great non-Muslim kings, called Tara". Upon his arrival in Sindh, Ibn Battuta mentions the Indian rhinoceros that lived on the banks of the Indus. The Sultan was erratic even by the standards of the time and for six years Ibn Battuta veered between living the high life of a trusted subordinate and falling under suspicion of treason for a variety of offences. His plan to leave on the pretext of taking another hajj was stymied by the Sultan. The opportunity for Battuta to leave Delhi finally arose in 1341 when an embassy arrived from Yuan dynasty China asking for permission to rebuild a Himalayan Buddhist temple popular with Chinese pilgrims. Ibn Battuta was given charge of the embassy but en route to the coast at the start of the journey to China, he and his large retinue were attacked by a group of bandits. Separated from his companions, he was robbed, kidnapped, and nearly lost his life. Despite this setback, within ten days he had caught up with his group and continued on to Khambhat in the Indian state of Gujarat. From there, they sailed to Calicut (now known as Kozhikode), where Portuguese explorer Vasco da Gama would land two centuries later. While in Calicut, Battuta was the guest of the ruling Zamorin. While Ibn Battuta visited a mosque on shore, a storm arose and one of the ships of his expedition sank. The other ship then sailed without him only to be seized by a local Sumatran king a few months later. Afraid to return to Delhi and be seen as a failure, he stayed for a time in southern India under the protection of Jamal-ud-Din, ruler of the small but powerful Nawayath sultanate on the banks of the Sharavathi river next to the Arabian Sea. This area is today known as Hosapattana and lies in the Honavar administrative district of Uttara Kannada. Following the overthrow of the sultanate, Ibn Battuta had no choice but to leave India. Although determined to continue his journey to China, he first took a detour to visit the Maldive Islands where he worked as a judge. He spent nine months on the islands, much longer than he had intended. When he arrived at the capital, Malé, Ibn Battuta did not plan to stay. However, the leaders of the formerly Buddhist nation that had recently converted to Islam were looking for a chief judge, someone who knew Arabic and Qur’an. To convince him to stay they gave him pearls, gold jewellery, and slaves, while at the same time making it impossible for him to leave by ship. Compelled into staying, he became a chief judge and married into the royal family of Omar I. Ibn Battuta took on his duties as a judge with keenness and strived to transform local practices to conform to a stricter application of Muslim law. He commanded that men who did not attend Friday prayer be publicly whipped, and that robbers’ right hand be cut off. He forbade women from being topless in public, which had previously been the custom. However, these and other strict judgments began to antagonize the island nation's rulers, and involved him in power struggles and political intrigues. Ibn Battuta resigned from his job as chief qadi, although in all likelihood it was inevitable that he would have been dismissed. Throughout his travels, Ibn Battuta kept close company with women, usually taking a wife whenever he stopped for any length of time at one place, and then divorcing her when he moved on. While in the Maldives, Ibn Battuta took four wives. In his Travels he wrote that in the Maldives the effect of small dowries and female non-mobility combined to, in effect, make a marriage a convenient temporary arrangement for visiting male travellers and sailors. From the Maldives, he carried on to Sri Lanka and visited Sri Pada and Tenavaram temple. Ibn Battuta's ship almost sank on embarking from Sri Lanka, only for the vessel that came to his rescue to suffer an attack by pirates. Stranded onshore, he worked his way back to the Madurai kingdom in India. Here he spent some time in the court of the short-lived Madurai Sultanate under Ghiyas-ud-Din Muhammad Damghani, from where he returned to the Maldives and boarded a Chinese junk, still intending to reach China and take up his ambassadorial post. He reached the port of Chittagong in modern-day Bangladesh intending to travel to Sylhet to meet Shah Jalal, who became so renowned that Ibn Battuta, then in Chittagong, made a one-month journey through the mountains of Kamaru near Sylhet to meet him. On his way to Sylhet, Ibn Battuta was greeted by several of Shah Jalal's disciples who had come to assist him on his journey many days before he had arrived. At the meeting in 1345 CE, Ibn Battuta noted that Shah Jalal was tall and lean, fair in complexion and lived by the mosque in a cave, where his only item of value was a goat he kept for milk, butter, and yogurt. He observed that the companions of the Shah Jalal were foreign and known for their strength and bravery. He also mentions that many people would visit the Shah to seek guidance. Ibn Battuta went further north into Assam, then turned around and continued with his original plan. Southeast Asia In 1345, Ibn Battuta travelled on to Samudra Pasai Sultanate in present-day Aceh, Northern Sumatra, where he notes in his travel log that the ruler of Samudra Pasai was a pious Muslim named Sultan Al-Malik Al-Zahir Jamal-ad-Din, who performed his religious duties with utmost zeal and often waged campaigns against animists in the region. The island of Sumatra, according to Ibn Battuta, was rich in camphor, areca nut, cloves, and tin. The madh'hab he observed was Imam Al-Shafi‘i, whose customs were similar to those he had previously seen in coastal India, especially among the Mappila Muslims, who were also followers of Imam Al-Shafi‘i. At that time Samudra Pasai marked the end of Dar al-Islam, because no territory east of this was ruled by a Muslim. Here he stayed for about two weeks in the wooden walled town as a guest of the sultan, and then the sultan provided him with supplies and sent him on his way on one of his own junks to China. Ibn Battuta first sailed to Malacca on the Malay Peninsula which he called "Mul Jawi". He met the ruler of Malacca and stayed as a guest for three days. Ibn Battuta then sailed to a state called Kaylukari in the land of Tawalisi, where he met Urduja, a local princess. Urduja was a brave warrior, and her people were opponents of the Yuan dynasty. She was described as an "idolater", but could write the phrase Bismillah in Islamic calligraphy. The locations of Kaylukari and Tawalisi are disputed. Kaylukari might referred to Po Klong Garai in Champa (now southern Vietnam), and Urduja might be an aristocrat of Champa or Dai Viet. Filipinos widely believe that Kaylukari was in present-day Pangasinan Province of the Philippines. In modern times, Urduja has been featured in Filipino textbooks and films as a national heroine. Numerous other locations have been proposed, ranging from Java to somewhere in Guangdong Province, China. However, Sir Henry Yule and William Henry Scott consider both Tawalisi and Urduja to be entirely fictitious. (See Tawalisi for details.) From Kaylukari, Ibn Battuta finally reached Quanzhou in Fujian Province, China. China In the year 1345 Ibn Battuta arrived at Quanzhou in China's Fujian province, then under the rule of the Mongols of the Yuan dynasty. One of the first things he noted was that Muslims referred to the city as "Zaitun" (meaning olive), but Ibn Battuta could not find any olives anywhere. He mentioned local artists and their mastery in making portraits of newly arrived foreigners; these were for security purposes. Ibn Battuta praised the craftsmen and their silk and porcelain; as well as fruits such as plums and watermelons and the advantages of paper money. He described the manufacturing process of large ships in the city of Quanzhou. He also mentioned Chinese cuisine and its usage of animals such as frogs, pigs, and even dogs which were sold in the markets, and noted that the chickens in China were larger than those in the west. Scholars however have pointed out numerous errors given in Ibn Battuta's account of China, for example confusing the Yellow River with the Grand Canal and other waterways, as well as believing that porcelain was made from coal. In Quanzhou, Ibn Battuta was welcomed by the head of the local Muslim merchants (possibly a fānzhǎng or "Leader of Foreigners" ) and Sheikh al-Islam (Imam), who came to meet him with flags, drums, trumpets, and musicians. Ibn Battuta noted that the Muslim populace lived within a separate portion in the city where they had their own mosques, bazaars, and hospitals. In Quanzhou, he met two prominent Iranians, Burhan al-Din of Kazerun and Sharif al-Din from Tabriz (both of whom were influential figures noted in the Yuan History as "A-mi-li-ding" and "Sai-fu-ding", respectively). While in Quanzhou he ascended the "Mount of the Hermit" and briefly visited a well-known Taoist monk in a cave. He then travelled south along the Chinese coast to Guangzhou, where he lodged for two weeks with one of the city's wealthy merchants. From Guangzhou he went north to Quanzhou and then proceeded to the city of Fuzhou, where he took up residence with Zahir al-Din and met Kawam al-Din and a fellow countryman named Al-Bushri of Ceuta, who had become a wealthy merchant in China. Al-Bushri accompanied Ibn Battuta northwards to Hangzhou and paid for the gifts that Ibn Battuta would present to the Mongolian Emperor Togon-temür of the Yuan Dynasty. Ibn Battuta said that Hangzhou was one of the largest cities he had ever seen, and he noted its charm, describing that the city sat on a beautiful lake surrounded by gentle green hills. He mentions the city's Muslim quarter and resided as a guest with a family of Egyptian origin. During his stay at Hangzhou he was particularly impressed by the large number of well-crafted and well-painted Chinese wooden ships, with coloured sails and silk awnings, assembling in the canals. Later he attended a banquet of the Yuan Mongol administrator of the city named Qurtai, who according to Ibn Battuta, was very fond of the skills of local Chinese conjurers. Ibn Battuta also mentions locals who worship the Solar deity. He described floating through the Grand Canal on a boat watching crop fields, orchids, merchants in black silk, and women in flowered silk and priests also in silk. In Beijing, Ibn Battuta referred to himself as the long-lost ambassador from the Delhi Sultanate and was invited to the Yuan imperial court of Togon-temür (who according to Ibn Battuta was worshipped by some people in China). Ibn Batutta noted that the palace of Khanbaliq was made of wood and that the ruler's "head wife" (Empress Gi) held processions in her honour. Ibn Battuta also wrote he had heard of "the rampart of Yajuj and Majuj" that was "sixty days' travel" from the city of Zeitun (Quanzhou); Hamilton Alexander Rosskeen Gibb notes that Ibn Battuta believed that the Great Wall of China was built by Dhul-Qarnayn to contain Gog and Magog as mentioned in the Quran. However, Ibn Battuta, who asked about the wall in China, could find no one who had either seen it or knew of anyone who had seen it. Ibn Battuta travelled from Beijing to Hangzhou, and then proceeded to Fuzhou. Upon his return to Quanzhou, he soon boarded a Chinese junk owned by the Sultan of Samudera Pasai Sultanate heading for Southeast Asia, whereupon Ibn Battuta was unfairly charged a hefty sum by the crew and lost much of what he had collected during his stay in China. Battuta claimed that the Mongol Khan (Qan) had interred with him in his grave six slave soldiers and four girl slaves. Silver, gold, weapons, and carpets were put into the grave. Return After returning to Quanzhou in 1346, Ibn Battuta began his journey back to Morocco. In Kozhikode, he once again considered throwing himself at the mercy of Muhammad bin Tughluq in Delhi, but thought better of it and decided to carry on to Mecca. On his way to Basra he passed through the Strait of Hormuz, where he learned that Abu Sa'id, last ruler of the Ilkhanate Dynasty had died in Iran. Abu Sa'id's territories had subsequently collapsed due to a fierce civil war between the Iranians and Mongols. In 1348, Ibn Battuta arrived in Damascus with the intention of retracing the route of his first hajj. He then learned that his father had died 15 years earlier and death became the dominant theme for the next year or so. The Black Death had struck and he stopped in Homs as the plague spread through Syria, Palestine, and Arabia. He heard of terrible death tolls in Gaza, but returned to Damascus that July where the death toll had reached 2,400 victims each day. When he stopped in Gaza he found it was depopulated, and in Egypt he stayed at Abu Sir. Reportedly deaths in Cairo had reached levels of 1,100 each day. He made hajj to Mecca then he decided to return to Morocco, nearly a quarter of a century after leaving home. On the way he made one last detour to Sardinia, then in 1349, returned to Tangier by way of Fez, only to discover that his mother had also died a few months before. Itinerary 1349–1354 Spain and North Africa After a few days in Tangier, Ibn Battuta set out for a trip to the Muslim-controlled territory of al-Andalus on the Iberian Peninsula. King Alfonso XI of Castile and León had threatened to attack Gibraltar, so in 1350, Ibn Battuta joined a group of Muslims leaving Tangier with the intention of defending the port. By the time he arrived, the Black Death had killed Alfonso and the threat of invasion had receded, so he turned the trip into a sight-seeing tour, travelling through Valencia and ending up in Granada. After his departure from al-Andalus he decided to travel through Morocco. On his return home, he stopped for a while in Marrakech, which was almost a ghost town following the recent plague and the transfer of the capital to Fez. Mali and Timbuktu In the autumn of 1351, Ibn Battuta left Fez and made his way to the town of Sijilmasa on the northern edge of the Sahara in present-day Morocco. There he bought a number of camels and stayed for four months. He set out again with a caravan in February 1352 and after 25 days arrived at the dry salt lake bed of Taghaza with its salt mines. All of the local buildings were made from slabs of salt by the slaves of the Masufa tribe, who cut the salt in thick slabs for transport by camel. Taghaza was a commercial centre and awash with Malian gold, though Ibn Battuta did not form a favourable impression of the place, recording that it was plagued by flies and the water was brackish. After a ten-day stay in Taghaza, the caravan set out for the oasis of Tasarahla (probably Bir al-Ksaib) where it stopped for three days in preparation for the last and most difficult leg of the journey across the vast desert. From Tasarahla, a Masufa scout was sent ahead to the oasis town of Oualata, where he arranged for water to be transported a distance of four days travel where it would meet the thirsty caravan. Oualata was the southern terminus of the trans-Saharan trade route and had recently become part of the Mali Empire. Altogether, the caravan took two months to cross the of desert from Sijilmasa. From there, Ibn Battuta travelled southwest along a river he believed to be the Nile (it was actually the river Niger), until he reached the capital of the Mali Empire. There he met Mansa Suleyman, king since 1341. Ibn Battuta disapproved of the fact that female slaves, servants, and even the daughters of the sultan went about exposing parts of their bodies not befitting a Muslim. He left the capital in February accompanied by a local Malian merchant and journeyed overland by camel to Timbuktu. Though in the next two centuries it would become the most important city in the region, at that time it was a small city and relatively unimportant. It was during this journey that Ibn Battuta first encountered a hippopotamus. The animals were feared by the local boatmen and hunted with lances to which strong cords were attached. After a short stay in Timbuktu, Ibn Battuta journeyed down the Niger to Gao in a canoe carved from a single tree. At the time Gao was an important commercial center. After spending a month in Gao, Ibn Battuta set off with a large caravan for the oasis of Takedda. On his journey across the desert, he received a message from the Sultan of Morocco commanding him to return home. He set off for Sijilmasa in September 1353, accompanying a large caravan transporting 600 female slaves, and arrived back in Morocco early in 1354. Ibn Battuta's itinerary gives scholars a glimpse as to when Islam first began to spread into the heart of west Africa. Works After returning home from his travels in 1354, and at the suggestion of the Marinid ruler of Morocco, Abu Inan Faris, Ibn Battuta dictated an account in Arabic of his journeys to Ibn Juzayy, a scholar whom he had previously met in Granada. The account is the only source for Ibn Battuta's adventures. The full title of the manuscript may be translated as A Masterpiece to Those Who Contemplate the Wonders of Cities and the Marvels of Travelling (, Tuḥfat an-Nuẓẓār fī Gharāʾib al-Amṣār wa ʿAjāʾib al-Asfār). However, it is often simply referred to as TheTravels (, Rihla), in reference to a standard form of Arabic literature. There is no indication that Ibn Battuta made any notes or had any journal during his twenty-nine years of travelling. When he came to dictate an account of his experiences he had to rely on memory and manuscripts produced by earlier travellers. Ibn Juzayy did not acknowledge his sources and presented some of the earlier descriptions as Ibn Battuta's own observations. When describing Damascus, Mecca, Medina, and some other places in the Middle East, he clearly copied passages from the account by the Andalusian Ibn Jubayr which had been written more than 150 years earlier. Similarly, most of Ibn Juzayy's descriptions of places in Palestine were copied from an account by the 13th-century traveller Muhammad al-Abdari. Scholars do not believe that Ibn Battuta visited all the places he described and argue that in order to provide a comprehensive description of places in the Muslim world, he relied on hearsay evidence and made use of accounts by earlier travellers. For example, it is considered very unlikely that Ibn Battuta made a trip up the Volga River from New Sarai to visit Bolghar and there are serious doubts about a number of other journeys such as his trip to Sana'a in Yemen, his journey from Balkh to Bistam in Khorasan, and his trip around Anatolia. Ibn Battuta's claim that a Maghrebian called "Abu'l Barakat the Berber" converted the Maldives to Islam is contradicted by an entirely different story which says that the Maldives were converted to Islam after miracles were performed by a Tabrizi named Maulana Shaikh Yusuf Shams-ud-din according to the Tarikh, the official history of the Maldives. Some scholars have also questioned whether he really visited China. Ibn Battuta may have plagiarized entire sections of his descriptions of China lifted from works by other authors like "Masalik al-absar fi mamalik al-amsar" by Shihab al-Umari, Sulaiman al-Tajir, and possibly from Al Juwayni, Rashid al din, and an Alexander romance. Furthermore, Ibn Battuta's description and Marco Polo's writings share extremely similar sections and themes, with some of the same commentary, e.g. it is unlikely that the 3rd Caliph Uthman ibn Affan had someone with the identical name in China who was encountered by Ibn Battuta. However, even if the Rihla is not fully based on what its author personally witnessed, it provides an important account of much of the 14th-century world. Concubines were used by Ibn Battuta such as in Delhi. He wedded several women, divorced at least some of them, and in Damascus, Malabar, Delhi, Bukhara, and the Maldives had children by them or by concubines. Ibn Battuta insulted Greeks as "enemies of Allah", drunkards and "swine eaters", while at the same time in Ephesus he purchased and used a Greek girl who was one of his many slave girls in his "harem" through Byzantium, Khorasan, Africa, and Palestine. It was two decades before he again returned to find out what happened to one of his wives and child in Damascus. Ibn Battuta often experienced culture shock in regions he visited where the local customs of recently converted peoples did not fit in with his orthodox Muslim background. Among the Turks and Mongols, he was astonished at the freedom and respect enjoyed by women and remarked that on seeing a Turkish couple in a bazaar one might assume that the man was the woman's servant when he was in fact her husband. He also felt that dress customs in the Maldives, and some sub-Saharan regions in Africa were too revealing. Little is known about Ibn Battuta's life after completion of his Rihla in 1355. He was appointed a judge in Morocco and died in 1368 or 1369. Ibn Battuta's work was unknown outside the Muslim world until the beginning of the 19th century, when the German traveller-explorer Ulrich Jasper Seetzen (1767–1811) acquired a collection of manuscripts in the Middle East, among which was a 94-page volume containing an abridged version of Ibn Juzayy's text. Three extracts were published in 1818 by the German orientalist Johann Kosegarten. A fourth extract was published the following year. French scholars were alerted to the initial publication by a lengthy review published in the Journal de Savants by the orientalist Silvestre de Sacy. Three copies of another abridged manuscript were acquired by the Swiss traveller Johann Burckhardt and bequeathed to the University of Cambridge. He gave a brief overview of their content in a book published posthumously in 1819. The Arabic text was translated into English by the orientalist Samuel Lee and published in London in 1829. In the 1830s, during the French occupation of Algeria, the Bibliothèque Nationale (BNF) in Paris acquired five manuscripts of Ibn Battuta's travels, in which two were complete. One manuscript containing just the second part of the work is dated 1356 and is believed to be Ibn Juzayy's autograph. The BNF manuscripts were used in 1843 by the Irish-French orientalist Baron de Slane to produce a translation into French of Ibn Battuta's visit to the Sudan. They were also studied by the French scholars Charles Defrémery and Beniamino Sanguinetti. Beginning in 1853 they published a series of four volumes containing a critical edition of the Arabic text together with a translation into French. In their introduction Defrémery and Sanguinetti praised Lee's annotations but were critical of his translation which they claimed lacked precision, even in straightforward passages. In 1929, exactly a century after the publication of Lee's translation, the historian and orientalist Hamilton Gibb published an English translation of selected portions of Defrémery and Sanguinetti's Arabic text. Gibb had proposed to the Hakluyt Society in 1922 that he should prepare an annotated translation of the entire Rihla into English. His intention was to divide the translated text into four volumes, each volume corresponding to one of the volumes published by Defrémery and Sanguinetti. The first volume was not published until 1958. Gibb died in 1971, having completed the first three volumes. The fourth volume was prepared by Charles Beckingham and published in 1994. Defrémery and Sanguinetti's printed text has now been translated into number of other languages. Historicity The German Islamic studies scholar Ralph Elger views Battuta's travel account as an important literary work but doubts the historicity of much of its content, which he suspects to be a work of fiction being compiled and inspired from other contemporary travel reports. Various other scholars have raised similar doubts. Ross E. Dunn in 1987 has similarly expressed doubts that any evidence would be found to support the narrative of the Rihla, but in 2010 Tim Mackintosh-Smith completed a multi-volume field study in dozens of the locales mentioned in the Rihla, in which he reports on previously unknown manuscripts of Islamic law kept in the archives of Al-Azhar University in Cairo that were copied by Ibn Battuta in Damascus in 1326, corroborating the date in the Rihla of his sojourn in Syria. Present day cultural references The largest themed mall in Dubai, UAE, the Ibn Battuta Mall is named for him and features both areas designed to recreate the exotic lands he visited on his travels and statuary tableaus depicting scenes from his life history. A giant semblance of Battuta, alongside two others from the history of Arab exploration, the geographer and historian Al Bakri and the navigator and cartographer Ibn Majid is displayed at the Mobility pavillion at Expo 2020 in Dubai in a section of the exhibition designed by Weta Workshop. See also List of places visited by Ibn Battuta Marco Polo Notes References Citations Bibliography . . The text of these volumes has been used as the source for translations into other languages. . . . . First published in 1986, . . . Reissued several times. Extracts are available on the Fordham University site. . . . . This volume was translated by Beckingham after Gibb's death in 1971. A separate index was published in 2000. . . . . The text is discussed in Defrémery & Sanguinetti (1853) Volume 1 pp. xvi–xvii. . First published in 1981. pp. 279–304 contain a translation of Ibn Battuta's account of his visit to West Africa. . . . Includes the text of Ibn Battuta's account of his visit to China. The translation is from the French text of Defrémery & Sanguinetti (1858) Volume 4. . . . . . Contains an introduction by Mackintosh-Smith and then an abridged version (around 40 percent of the original) of the translation by H.A.R. Gibb and C.E. Beckingham (1958–1994). . . . . External links Travels In Asia And Africa 1325–1354 — Gibb's 1929 translation from the Internet Archive A Tangerine in Delhi — Saudi Aramco World article by Tim Mackintosh-Smith (March/April 2006). The Longest Hajj: The Journeys of Ibn Battuta — Saudi Aramco World article by Douglas Bullis (July/August 2000). Google Books — link to a 2004 reissue of Gibb's 1929 translation. French text from Defrémery and Sanguinetti (1853–1858) with an introduction and footnotes by Stéphane Yérasimos published in 1982: Volume 1, Volume 2, Volume 3. Interactive scholarly edition, with critical English translation and multimodal resources mashup (publications, images, videos) Engineering Historical Memory. 1304 births 1369 deaths 14th-century Berber people 14th-century explorers 14th-century geographers 14th-century scholars Berber explorers Explorers of Arabia Explorers of Asia Explorers of India Geographers of medieval Islam Malikis Medieval Islamic travel writers Medieval travel writers Moroccan explorers Moroccan travel writers Moroccan writers People from Tangier Pilgrimage accounts Slave owners Slavery in Morocco
[ -0.4308767318725586, 0.23716773092746735, -0.7227382659912109, -0.21761544048786163, 0.09299766272306442, 0.6608971357345581, 0.41639938950538635, 0.34239625930786133, -0.4694254398345947, -0.479163259267807, -0.34212371706962585, -0.01251550205051899, -0.7144351005554199, 0.21127001941204...
15231
https://en.wikipedia.org/wiki/Integrated%20Services%20Digital%20Network
Integrated Services Digital Network
Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the digitalised circuits of the public switched telephone network. Work on the standard began in 1980 at Bell Labs and was formally standardized in 1988 in the CCITT "Red Book". By the time the standard was released, newer networking systems with much greater speeds were available, and ISDN saw relatively little uptake in the wider market. One estimate suggests ISDN use peaked at a worldwide total of 25 million subscribers at a time when 1.3 billion analog lines were in use. ISDN has largely been replaced with digital subscriber line (DSL) systems of much higher performance. Prior to ISDN, the telephone system consisted of digital links like T1/E1 on the long-distance lines between telephone company offices and analog signals on copper telephone wires to the customers, the "last mile". At the time, the network was viewed as a way to transport voice, with some special services available for data using additional equipment like modems or by providing a T1 on the customer's location. What became ISDN started as an effort to digitize the last mile, originally under the name "Public Switched Digital Capacity" (PSDC). This would allow call routing to be completed in an all-digital system, while also offering a separate data line. The Basic Rate Interface, or BRI, is the standard last-mile connection in the ISDN system, offering two 64 kbit/s "bearer" lines and a single 16 kbit/s "delta" channel for commands and data. Although ISDN found a number of niche roles and some wider uptake in specific locales, the system was largely ignored and garnered the industry nickname "innovation subscribers didn't need." It found a use for a time for small-office digital connection, using the voice lines for data at 64 kbit/s, sometimes "bonded" to 128 kbit/s, but the introduction of 56 kbit/s modems undercut its value in many roles. It also found use in videoconference systems, where the direct end-to-end connection was desirable. The H.320 standard was designed around its 64 kbit/s data rate. The underlying ISDN concepts found wider use as a replacement for the T1/E1 lines it was originally intended to extend, roughly doubling the performance of those lines. History Digital lines Since its introduction in 1881, the twisted pair copper line has been installed for telephone use worldwide, with well over a billion individual connections installed by the year 2000. Over the first half of the 20th century, the connection of these lines to form calls was increasingly automated, culminating in the crossbar switches that had largely replaced earlier concepts by the 1950s. As telephone use surged in the post-WWII era, the problem of connecting the massive number of lines became an area of significant study. Bell Labs' seminal work on digital encoding of voice led to the use of 64 kbit/s as a standard for voice lines (or 56 kbit/s in some systems). In 1962, Robert Aaron of Bell introduced the T1 system, which allowed a pair of twisted pair lines to carry 1.544 Mbit/s of data over a distance of about one mile. This was used in the Bell network to carry traffic between local switch offices, with 24 voice lines at 64 kbit/s and a separate 8 kbit/s line for signaling commands like connecting or hanging up a call. This could be extended over long distances using repeaters in the lines. T1 used a very simple encoding scheme, alternate mark inversion (AMI), which reached only a few percent of the theoretical capacity of the line but was appropriate for 1960s electronics. By the late 1970s, T1 lines and their faster counterparts, along with all-digital switching systems, had replaced the earlier analog systems for most of the western world, leaving only the customer's equipment and their local end office using analog systems. Digitizing this "last mile" was increasingly seen as the next problem that needed to be solved. However, these connections now represented over 99% of the total telephony network, as the upstream links had increasingly been aggregated into a smaller number of much higher performance systems, especially after the introduction of fiber optic lines. If the system was to become all-digital, a new standard would be needed that was appropriate for the existing customer lines, which might be miles long and of widely varying quality. ISDN standardization Around 1978, Ralph Wyndrum, Barry Bossick and Joe Lechleider of Bell Labs began one such effort to develop a last-mile solution. They studied a number of derivatives of the T1's AMI concept and concluded that a customer-side line could reliably carry about 160 kbit/s of data over a distance of . That would be enough to carry two voice-quality lines at 64 kbit/s as well as a separate 16 kbit/s line for data. At the time, modems were normally 300 bps and 1200 bit/s would not become common until the early 1980s and the 2400 bit/s standard would not be completed until 1984. In this market, 16 kbit/s represented a significant advance in performance in addition to being a separate channel and thus allowing voice and data at the same time. A key problem was that the customer might only have a single twisted pair line to the location of the handset, so the solution used in T1 with separate upstream and downstream connections was not universally available. With analog connections, the solution was to use echo cancellation, but at the much higher bandwidth of the new concept, this would not be so simple. A debate broke out between teams worldwide about the best solution to this problem; some promoted newer versions of echo cancellation, while others preferred the "ping pong" concept where the direction of data would rapidly switch the line from send to receive at such a high rate it would not be noticeable to the user. John Cioffi had recently demonstrated echo cancellation would work at these speeds, and further suggested that they should consider moving directly to 1.5 Mbit/s performance using this concept. The suggestion was literally laughed off the table, but the echo cancellation concept was taken up by Joe Lechleider eventually came to win the debate. Meanwhile, the debate over the encoding scheme itself was also ongoing. As the new standard was to be international, this was even more contentious as several regional digital standards had emerged in the 1960s and 70s and merging these back together was not going to be easy. To further confuse issues, in 1984 the Bell System was broken up and the US center for development moved to the American National Standards Institute (ANSI) T1D1.3 committee. Thomas Starr of the newly formed Ameritech led this effort and eventually convinced the ANSI group to select the 2B1Q standard proposed by Peter Adams of British Telecom. This standard used an 80 kHz base frequency and encoded two bits per baud to produce the 160 kbit/s base rate. Ultimately Japan selected a different standard, and Germany selected one with three levels instead of four, but all of these could interchange with the ANSI standard. Rollout With ISDN allowing digital-quality voice, two separate lines and all-the-time data, the telephony world was convinced there would be high customer demand for such systems in both the home and office. This proved not to be the case. During the lengthy standardization process, new concepts rendered the system largely superfluous. In the office, multi-line digital switches like the Meridian Norstar took over telephone lines while local area networks like Ethernet provided performance around 10 Mbit/s which had become the baseline for inter-computer connections in offices. ISDN offered no real advantages in the voice role and was far from competitive in data. Additionally, modems had continued improving, introducing 9600 bit/s systems in the late 1980s and 14.4 kbit/s in 1991, which significantly eroded ISDN's value proposition for the home customer. Meanwhile, Lechleider had proposed using ISDN's echo cancellation and 2B1Q encoding on existing T1 connections, allowing the distance between repeaters to be doubled to about . Another standards war broke out, but in 1991 Lechleider's 1.6 Mbit/s "High-Speed Digital Subscriber Line" eventually won this process as well, after Starr drove it through the ANSI T1E1.4 group. A similar standard emerged in Europe to replace their E1 lines, increasing the sampling range from 80 to 100 kHz to allow 2.048 Mbit/s. By the mid-1990s, these Primary Rate Interface (PRI) lines had largely replaced T1 and E1 between telephone company offices. ISDN becomes ADSL Lechleider also believed this higher-speed standard would be much more attractive to customers than ISDN had proven. Unfortunately, at these speeds, the systems suffered from a type of crosstalk known as "NEXT", for "near-end crosstalk". This made longer connections on customer lines difficult. Lechleider noted that NEXT only occurred when similar frequencies were being used, and could be diminished if one of the directions used a different carrier rate, but doing so would reduce the potential bandwidth of that channel. Lechleider suggested that most consumer use would be asymmetric anyway, and that providing a high-speed channel towards the user and a lower speed return would be suitable for many uses. This work in the early 1990s eventually led to the ADSL concept, which emerged in 1995. An early supporter of the concept was Alcatel, who jumped on ADSL while many other companies were still devoted to ISDN. Krish Prabu stated that "Alcatel will have to invest one billion dollars in ADSL before it makes a profit, but it is worth it." They introduced the first DSL Access Multiplexers (DSLAM), the large multi-modem systems used at the telephony offices, and later introduced customer ADSL modems under the Thomson brand. Alcatel remained the primary vendor of ADSL systems for well over a decade. ADSL quickly replaced ISDN as the customer-facing solution for last-mile connectivity. ISDN has largely disappeared on the customer side, remaining in use only in niche roles like dedicated teleconferencing systems and similar legacy systems. ISDN elements Integrated services refers to ISDN's ability to deliver at minimum two simultaneous connections, in any combination of data, voice, video, and fax, over a single line. Multiple devices can be attached to the line, and used as needed. That means an ISDN line can take care of what were expected to be most people's complete communications needs (apart from broadband Internet access and entertainment television) at a much higher transmission rate, without forcing the purchase of multiple analog phone lines. It also refers to integrated switching and transmission in that telephone switching and carrier wave transmission are integrated rather than separate as in earlier technology. Basic Rate Interface The entry level interface to ISDN is the Basic Rate Interface (BRI), a 128 kbit/s service delivered over a pair of standard telephone copper wires. The 144 kbit/s overall payload rate is divided into two 64 kbit/s bearer channels ('B' channels) and one 16 kbit/s signaling channel ('D' channel or data channel). This is sometimes referred to as 2B+D. The interface specifies the following network interfaces: The U interface is a two-wire interface between the exchange and a network terminating unit, which is usually the demarcation point in non-North American networks. The T interface is a serial interface between a computing device and a terminal adapter, which is the digital equivalent of a modem. The S interface is a four-wire bus that ISDN consumer devices plug into; the S & T reference points are commonly implemented as a single interface labeled 'S/T' on a Network termination 1 (NT1). The R interface defines the point between a non-ISDN device and a terminal adapter (TA) which provides translation to and from such a device. BRI-ISDN is very popular in Europe but is much less common in North America. It is also common in Japan — where it is known as INS64. Primary Rate Interface The other ISDN access available is the Primary Rate Interface (PRI), which is carried over T-carrier (T1) with 24 time slots (channels) in North America, and over E-carrier (E1) with 32 channels in most other countries. Each channel provides transmission at a 64 kbit/s data rate. With the E1 carrier, the available channels are divided into 30 bearer (B) channels, one data (D) channel, and one timing and alarm channel. This scheme is often referred to as 30B+2D. In North America, PRI service is delivered via T1 carriers with only one data channel, often referred to as 23B+D, and a total data rate of 1544 kbit/s. Non-Facility Associated Signalling (NFAS) allows two or more PRI circuits to be controlled by a single D channel, which is sometimes called 23B+D + n*24B. D-channel backup allows for a second D channel in case the primary fails. NFAS is commonly used on a Digital Signal 3 (DS3/T3). PRI-ISDN is popular throughout the world, especially for connecting private branch exchanges to the public switched telephone network (PSTN). Even though many network professionals use the term ISDN to refer to the lower-bandwidth BRI circuit, in North America BRI is relatively uncommon whilst PRI circuits serving PBXs are commonplace. Bearer channel The bearer channel (B) is a standard 64 kbit/s voice channel of 8 bits sampled at 8 kHz with G.711 encoding. B-channels can also be used to carry data, since they are nothing more than digital channels. Each one of these channels is known as a DS0. Most B channels can carry a 64kbit/s signal, but some were limited to 56K because they traveled over RBS lines. This was commonplace in the 20th century, but has since become less so. X.25 X.25 can be carried over the B or D channels of a BRI line, and over the B channels of a PRI line. X.25 over the D channel is used at many point-of-sale (credit card) terminals because it eliminates the modem setup, and because it connects to the central system over a B channel, thereby eliminating the need for modems and making much better use of the central system's telephone lines. X.25 was also part of an ISDN protocol called "Always On/Dynamic ISDN", or AO/DI. This allowed a user to have a constant multi-link PPP connection to the internet over X.25 on the D channel, and brought up one or two B channels as needed. Frame Relay In theory, Frame Relay can operate over the D channel of BRIs and PRIs, but it is seldom, if ever, used. Consumer and industry perspectives There is a second viewpoint: that of the telephone industry, where ISDN is a core technology. A telephone network can be thought of as a collection of wires strung between switching systems. The common electrical specification for the signals on these wires is T1 or E1. Between telephone company switches, the signaling is performed via SS7. Normally, a PBX is connected via a T1 with robbed bit signaling to indicate on-hook or off-hook conditions and MF and DTMF tones to encode the destination number. ISDN is much better because messages can be sent much more quickly than by trying to encode numbers as long (100 ms per digit) tone sequences. This results in faster call setup times. Also, a greater number of features are available and fraud is reduced. In common use, ISDN is often limited to usage to Q.931 and related protocols, which are a set of signaling protocols establishing and breaking circuit-switched connections, and for advanced calling features for the user. Another usage was the deployment of videoconference systems, where a direct end-to-end connection is desirable. ISDN uses the H.320 standard for audio coding and video coding, ISDN is also used as a smart-network technology intended to add new services to the public switched telephone network (PSTN) by giving users direct access to end-to-end circuit-switched digital services and as a backup or failsafe circuit solution for critical use data circuits. Video conferencing One of ISDNs successful use-cases was in the videoconference field, where even small improvements in data rates are useful, but more importantly, its direct end-to-end connection offers lower latency and better reliability than packet-switched networks of the 1990s. The H.320 standard for audio coding and video coding was designed with ISDN in mind, and more specifically its 64 kbit/s basic data rate. including audio codecs such as G.711 (PCM) and G.728 (CELP), and discrete cosine transform (DCT) video codecs such as H.261 and H.263. ISDN and broadcast industry ISDN is used heavily by the broadcast industry as a reliable way of switching low-latency, high-quality, long-distance audio circuits. In conjunction with an appropriate codec using MPEG or various manufacturers' proprietary algorithms, an ISDN BRI can be used to send stereo bi-directional audio coded at 128 kbit/s with 20 Hz – 20 kHz audio bandwidth, although commonly the G.722 algorithm is used with a single 64 kbit/s B channel to send much lower latency mono audio at the expense of audio quality. Where very high quality audio is required multiple ISDN BRIs can be used in parallel to provide a higher bandwidth circuit switched connection. BBC Radio 3 commonly makes use of three ISDN BRIs to carry 320 kbit/s audio stream for live outside broadcasts. ISDN BRI services are used to link remote studios, sports grounds and outside broadcasts into the main broadcast studio. ISDN via satellite is used by field reporters around the world. It is also common to use ISDN for the return audio links to remote satellite broadcast vehicles. In many countries, such as the UK and Australia, ISDN has displaced the older technology of equalised analogue landlines, with these circuits being phased out by telecommunications providers. Use of IP-based streaming codecs such as Comrex ACCESS and ipDTL is becoming more widespread in the broadcast sector, using broadband internet to connect remote studios. Global usage United States and Canada ISDN-BRI never gained popularity as a general use telephone access technology in Canada and the US, and remains a niche product. The service was seen as "a solution in search of a problem", and the extensive array of options and features were difficult for customers to understand and use. ISDN has long been known by derogatory backronyms highlighting these issues, such as "It Still Does Nothing", "Innovations Subscribers Don't Need", and "I Still Don't kNow", or, from the supposed standpoint of telephone companies, I Smell Dollars Now. Once the term "broadband Internet access" came to be associated with data rates incoming to the customer at 256 kbit/s or more, and alternatives like ADSL grew in popularity, the consumer market for BRI did not develop. Its only remaining advantage is that, while ADSL has a functional distance limitation and can use ADSL loop extenders, BRI has a greater limit and can use repeaters. As such, BRI may be acceptable for customers who are too remote for ADSL. Widespread use of BRI is further stymied by some small North American CLECs such as CenturyTel having given up on it and not providing Internet access using it. However, AT&T in most states (especially the former SBC/SWB territory) will still install an ISDN BRI line anywhere a normal analog line can be placed and the monthly charge is roughly $55. ISDN-BRI is currently primarily used in industries with specialized and very specific needs. High-end videoconferencing hardware can bond up to 8 B-channels together (using a BRI circuit for every 2 channels) to provide digital, circuit-switched video connections to almost anywhere in the world. This is very expensive, and is being replaced by IP-based conferencing, but where cost concern is less of an issue than predictable quality and where a QoS-enabled IP does not exist, BRI is the preferred choice. Most modern non-VoIP PBXs use ISDN-PRI circuits. These are connected via T1 lines with the central office switch, replacing older analog two-way and direct inward dialing (DID) trunks. PRI is capable of delivering Calling Line Identification (CLID) in both directions so that the telephone number of an extension, rather than a company's main number, can be sent. It is still commonly used in recording studios and some radio programs, when a voice-over actor or host is in one studio (possibly telecommuting from home), but the director and producer are in a studio at another location. The ISDN protocol delivers channelized, not-over-the-Internet service, powerful call setup and routing features, faster setup and tear down, superior audio fidelity as compared to POTS (plain old telephone service), lower delay and, at higher densities, lower cost. In 2013, Verizon announced it would no longer take orders for ISDN service in the Northeastern United States. Norway On April 19, 1988, Norwegian telecommunications company Telenor began offering nationwide ISDN services trademarked INS Net 64, and INS Net 1500, a fruition of NTT's independent research and trial from the 1970s of what it referred to the INS (Information Network System). Australia Telstra provides the business customer with the ISDN services. There are five types of ISDN services which are ISDN2, ISDN2 Enhanced, ISDN10, ISDN20 and ISDN30. Telstra changed the minimum monthly charge for voice and data calls. In general, there are two group of ISDN service types; The Basic Rate services – ISDN 2 or ISDN 2 Enhanced. Another group of types are the Primary Rate services, ISDN 10/20/30. Telstra announced that the new sales of ISDN product would be unavailable as of 31 January 2018. The final exit date of ISDN service and migration to the new service would be confirmed by 2022. India Bharat Sanchar Nigam Limited, Reliance Communications and Bharti Airtel are the largest communication service providers, and offer both ISDN BRI and PRI services across the country. Reliance Communications and Bharti Airtel uses the DLC technology for providing these services. With the introduction of broadband technology, the load on bandwidth is being absorbed by ADSL. ISDN continues to be an important backup network for point-to-point leased line customers such as banks, Eseva Centers, Life Insurance Corporation of India, and SBI ATMs. Japan On April 19, 1988, Japanese telecommunications company NTT began offering nationwide ISDN services trademarked INS Net 64, and INS Net 1500, a fruition of NTT's independent research and trial from the 1970s of what it referred to the INS (Information Network System). Previously, in April 1985, Japanese digital telephone exchange hardware made by Fujitsu was used to experimentally deploy the world's first I interface ISDN. The I interface, unlike the older and incompatible Y interface, is what modern ISDN services use today. Since 2000, NTT's ISDN offering have been known as FLET's ISDN, incorporating the "FLET's" brand that NTT uses for all of its ISP offerings. In Japan, the number of ISDN subscribers dwindled as alternative technologies such as ADSL, cable Internet access, and fiber to the home gained greater popularity. On November 2, 2010, NTT announced plans to migrate their backend from PSTN to the IP network from around 2020 to around 2025. For this migration, ISDN services will be retired, and fiber optic services are recommended as an alternative. United Kingdom In the United Kingdom, British Telecom (BT) provides ISDN2e (BRI) as well as ISDN30 (PRI). Until April 2006, they also offered services named Home Highway and Business Highway, which were BRI ISDN-based services that offered integrated analogue connectivity as well as ISDN. Later versions of the Highway products also included built-in USB sockets for direct computer access. Home Highway was bought by many home users, usually for Internet connection, although not as fast as ADSL, because it was available before ADSL and in places where ADSL does not reach. In early 2015, BT announced their intention to retire the UK's ISDN infrastructure by 2025. France France Telecom offers ISDN services under their product name Numeris (2 B+D), of which a professional Duo and home Itoo version is available. ISDN is generally known as RNIS in France and has widespread availability. The introduction of ADSL is reducing ISDN use for data transfer and Internet access, although it is still common in more rural and outlying areas, and for applications such as business voice and point-of-sale terminals. Germany In Germany, ISDN was very popular with an installed base of 25 million channels (29% of all subscriber lines in Germany as of 2003 and 20% of all ISDN channels worldwide). Due to the success of ISDN, the number of installed analog lines was decreasing. Deutsche Telekom (DTAG) offered both BRI and PRI. Competing phone companies often offered ISDN only and no analog lines. However, these operators generally offered free hardware that also allows the use of POTS equipment, such as NTBAs with integrated terminal adapters. Because of the widespread availability of ADSL services, ISDN was primarily used for voice and fax traffic. Until 2007 ISDN (BRI) and ADSL/VDSL were often bundled on the same line, mainly because the combination of DSL with an analog line had no cost advantage over a combined ISDN-DSL line. This practice turned into an issue for the operators when vendors of ISDN technology stopped manufacturing it and spare parts became hard to come by. Since then phone companies started introducing cheaper xDSL-only products using VoIP for telephony, also in an effort to reduce their costs by operating separate data & voice networks. Since approximately 2010, most German operators have offered more and more VoIP on top of DSL lines and ceased offering ISDN lines. New ISDN lines have been no longer available in Germany since 2018, existing ISDN lines were phased out from 2016 onwards and existing customers were encouraged to move to DSL-based VoIP products. Deutsche Telekom intended to phase-out by 2018 but postponed the date to 2020, other providers like Vodafone estimate to have their phase-out completed by 2022. Greece OTE, the incumbent telecommunications operator, offers ISDN BRI (BRA) services in Greece. Following the launch of ADSL in 2003, the importance of ISDN for data transfer began to decrease and is today limited to niche business applications with point-to-point requirements. International deployment A study of the German Department of Science shows the following spread of ISDN-channels per 1,000 inhabitants in the year 2005: Norway 401 Denmark 339 Germany 333 Switzerland 331 Japan 240 United Kingdom 160 Finland 160 Sweden 135 Italy 105 France 85 Spain 58 United States 47 Configurations In ISDN, there are two types of channels, B (for "bearer") and D (for "data"). B channels are used for data (which may include voice), and D channels are intended for signaling and control (but can also be used for data). There are two ISDN implementations. Basic Rate Interface (BRI), also called basic rate access (BRA) — consists of two B channels, each with bandwidth of 64 kbit/s, and one D channel with a bandwidth of 16 kbit/s. Together these three channels can be designated as 2B+D. Primary Rate Interface (PRI), also called primary rate access (PRA) in Europe — contains a greater number of B channels and a D channel with a bandwidth of 64 kbit/s. The number of B channels for PRI varies according to the nation: in North America and Japan it is 23B+1D, with an aggregate bit rate of 1.544 Mbit/s (T1); in Europe, India and Australia it is 30B+2D, with an aggregate bit rate of 2.048 Mbit/s (E1). Broadband Integrated Services Digital Network (BISDN) is another ISDN implementation and it is able to manage different types of services at the same time. It is primarily used within network backbones and employs ATM. Another alternative ISDN configuration can be used in which the B channels of an ISDN BRI line are bonded to provide a total duplex bandwidth of 128 kbit/s. This precludes use of the line for voice calls while the internet connection is in use. The B channels of several BRIs can be bonded, a typical use is a 384K videoconferencing channel. Using bipolar with eight-zero substitution encoding technique, call data is transmitted over the data (B) channels, with the signaling (D) channels used for call setup and management. Once a call is set up, there is a simple 64 kbit/s synchronous bidirectional data channel (actually implemented as two simplex channels, one in each direction) between the end parties, lasting until the call is terminated. There can be as many calls as there are bearer channels, to the same or different end-points. Bearer channels may also be multiplexed into what may be considered single, higher-bandwidth channels via a process called B channel BONDING, or via use of Multi-Link PPP "bundling" or by using an H0, H11, or H12 channel on a PRI. The D channel can also be used for sending and receiving X.25 data packets, and connection to X.25 packet network, this is specified in X.31. In practice, X.31 was only commercially implemented in the UK, France, Japan and Germany. Reference points A set of reference points are defined in the ISDN standard to refer to certain points between the telco and the end user ISDN equipment. R – defines the point between a non-ISDN terminal equipment 2 (TE2) device and a terminal adapter (TA) which provides translation to and from such a device S – defines the point between the ISDN terminal equipment 1 (TE1) or TA and a Network Termination Type 2 (NT2) device T – defines the point between the NT2 and network termination 1 (NT1) devices. Most NT-1 devices can perform the functions of the NT2 as well, and so the S and T reference points are generally collapsed into the S/T reference point. In North America, the NT1 device is considered customer premises equipment (CPE) and must be maintained by the customer, thus, the U interface is provided to the customer. In other locations, the NT1 device is maintained by the telco, and the S/T interface is provided to the customer. In India, service providers provide U interface and an NT1 may be supplied by Service provider as part of service offering. Types of communications Providing a backup line for business's inter-office and internet connectivity was a popular use of the technology. Sample call The following is an example of a Primary Rate (PRI) ISDN call showing the Q.921/LAPD and the Q.931/Network message intermixed (i.e. exactly what was exchanged on the D-channel). The call is originating from the switch where the trace was taken and goes out to some other switch, possibly an end-office LEC, who terminates the call. The first line format is <time> <D-channel> <Transmitted/Received> <LAPD/ISDN message ID>. If the message is an ISDN level message, then a decoding of the message is attempted showing the various Information Elements that make up the message. All ISDN messages are tagged with an ID number relative to the switch that started the call (local/remote). Following this optional decoding is a dump of the bytes of the message in <offset> <hex> ... <hex> <ascii> ... <ascii> format. The RR messages at the beginning prior to the call are the keep alive messages. SETUP message indicate the start of the call. Each message is acknowledged by the other side with a RR. 10:49:47.33 21/1/24 R RR 0000 02 01 01 a5 .... 10:49:47.34 21/1/24 T RR 0000 02 01 01 b9 .... 10:50:17.57 21/1/24 R RR 0000 02 01 01 a5 .... 10:50:17.58 21/1/24 T RR 0000 02 01 01 b9 .... 10:50:24.37 21/1/24 T SETUP Call Reference : 000062-local Bearer Capability : CCITT, Speech, Circuit mode, 64 kbit/s Channel ID : Implicit Interface ID implies current span, 21/1/5, Exclusive Calling Party Number : 8018023000 National number User-provided, not screened Presentation allowed Called Party Number : 3739120 Type: SUBSCRB 0000 00 01 a4 b8 08 02 00 3e 05 04 03 80 90 a2 18 03 .......>........ 0010 a9 83 85 6c 0c 21 80 38 30 31 38 30 32 33 30 30 ...l.!.801802300 0020 30 70 08 c1 33 37 33 39 31 32 30 0p..3739120 10:50:24.37 21/1/24 R RR 0000 00 01 01 a6 .... 10:50:24.77 21/1/24 R CALL PROCEEDING Call Reference : 000062-local Channel ID : Implicit Interface ID implies current span, 21/1/5, Exclusive 0000 02 01 b8 a6 08 02 80 3e 02 18 03 a9 83 85 .......>...... 10:50:24.77 21/1/24 T RR 0000 02 01 01 ba .... 10:50:25.02 21/1/24 R ALERTING Call Reference : 000062-local Progress Indicator : CCITT, Public network serving local user, In-band information or an appropriate pattern is now available 0000 02 01 ba a6 08 02 80 3e 01 1e 02 82 88 .......>..... 10:50:25.02 21/1/24 T RR 0000 02 01 01 bc .... 10:50:28.43 21/1/24 R CONNECT Call Reference : 000062-local 0000 02 01 bc a6 08 02 80 3e 07 .......>. 10:50:28.43 21/1/24 T RR 0000 02 01 01 be .... 10:50:28.43 21/1/24 T CONNECT_ACK Call Reference : 000062-local 0000 00 01 a6 be 08 02 00 3e 0f .......>. 10:50:28.44 21/1/24 R RR 0000 00 01 01 a8 .... 10:50:35.69 21/1/24 T DISCONNECT Call Reference : 000062-local Cause : 16, Normal call clearing. 0000 00 01 a8 be 08 02 00 3e 45 08 02 8a 90 .......>E.... 10:50:35.70 21/1/24 R RR 0000 00 01 01 aa .... 10:50:36.98 21/1/24 R RELEASE Call Reference : 000062-local 0000 02 01 be aa 08 02 80 3e 4d .......>M 10:50:36.98 21/1/24 T RR 0000 02 01 01 c0 .... 10:50:36.99 21/1/24 T RELEASE COMPLETE Call Reference : 000062-local 0000 00 01 aa c0 08 02 00 3e 5a .......>Z 10:50:36.00 21/1/24 R RR 0000 00 01 01 ac .... 10:51:06.10 21/1/24 R RR 0000 02 01 01 ad .... 10:51:06.10 21/1/24 T RR 0000 02 01 01 c1 .... 10:51:36.37 21/1/24 R RR 0000 02 01 01 ad .... 10:51:36.37 21/1/24 T RR 0000 02 01 01 c1 .... See also Protocols ISDN User Part (ISUP) DSS1 (ETSI "Euro-ISDN", also used in many non-European countries) DSS2 (Digital Subscriber Signalling System No. 2) NI-1 (US National ISDN Phase 1) NI-2 (US National ISDN Phase 2) 4ESS (Lucent 4ESS specific protocol defined in AT&T TR 41459) INS-NET 64/1500 (Japanese national/NTT carrier-specific protocol) DACS used in the UK by British Telecom it uses non standard D channel signalling for pair gain QSIG Remote Operations Service Element protocol (ROSE) Q.931 FTZ 1 TR 6 (obsolete German national protocol) Specifications defining the physical layer and part of the data link layers of ISDN: ISDN BRI: ITU-T I.430. ISDN PRI: ITU-T I.431. Other CAPI ATM B-ISDN IpDTL H.320 ETSI List of device bandwidths Notes References Citations Bibliography External links . . . . 1986 introductions Audio network protocols ITU-T recommendations Network access Telephony Videotelephony Wide area networks
[ 0.18106752634048462, -0.4143281877040863, 0.09376702457666397, 0.06422792375087738, 0.1479853093624115, -0.028437113389372826, -0.012055190280079842, 0.31076353788375854, -0.3360697329044342, -0.6308335065841675, -0.8441356420516968, 0.3872561454772949, -0.09011630713939667, -0.03672046214...
15235
https://en.wikipedia.org/wiki/Genomic%20imprinting
Genomic imprinting
Genomic imprinting is an epigenetic phenomenon that causes genes to be expressed or not, depending on whether they are inherited from the mother or the father. Genes can also be partially imprinted. Partial imprinting occurs when alleles from both parents are differently expressed rather than complete expression and complete suppression of one parent's allele. Forms of genomic imprinting have been demonstrated in fungi, plants and animals. In 2014, there were about 150 imprinted genes known in mice and about half that in humans. As of 2019, 260 imprinted genes have been reported in mice and 228 in humans. Genomic imprinting is an inheritance process independent of the classical Mendelian inheritance. It is an epigenetic process that involves DNA methylation and histone methylation without altering the genetic sequence. These epigenetic marks are established ("imprinted") in the germline (sperm or egg cells) of the parents and are maintained through mitotic cell divisions in the somatic cells of an organism. Appropriate imprinting of certain genes is important for normal development. Human diseases involving genomic imprinting include Angelman syndrome, Prader–Willi syndrome and male infertility. Overview In diploid organisms (like humans), the somatic cells possess two copies of the genome, one inherited from the father and one from the mother. Each autosomal gene is therefore represented by two copies, or alleles, with one copy inherited from each parent at fertilization. The expressed allele is dependent upon its parental origin. For example, the gene encoding insulin-like growth factor 2 (IGF2/Igf2) is only expressed from the allele inherited from the father. Although imprinting accounts for a small proportion of mammalian genes they play an important role in embryogenesis particularly in the formation of visceral structures and the nervous system. The term "imprinting" was first used to describe events in the insect Pseudococcus nipae. In Pseudococcids (mealybugs) (Hemiptera, Coccoidea) both the male and female develop from a fertilised egg. In females, all chromosomes remain euchromatic and functional. In embryos destined to become males, one haploid set of chromosomes becomes heterochromatinised after the sixth cleavage division and remains so in most tissues; males are thus functionally haploid. Imprinted genes in mammals That imprinting might be a feature of mammalian development was suggested in breeding experiments in mice carrying reciprocal chromosomal translocations. Nucleus transplantation experiments in mouse zygotes in the early 1980s confirmed that normal development requires the contribution of both the maternal and paternal genomes. The vast majority of mouse embryos derived from parthenogenesis (called parthenogenones, with two maternal or egg genomes) and androgenesis (called androgenones, with two paternal or sperm genomes) die at or before the blastocyst/implantation stage. In the rare instances that they develop to postimplantation stages, gynogenetic embryos show better embryonic development relative to placental development, while for androgenones, the reverse is true. Nevertheless, for the latter, only a few have been described (in a 1984 paper). No naturally occurring cases of parthenogenesis exist in mammals because of imprinted genes. However, in 2004, experimental manipulation by Japanese researchers of a paternal methylation imprint controlling the Igf2 gene led to the birth of a mouse (named Kaguya) with two maternal sets of chromosomes, though it is not a true parthenogenone since cells from two different female mice were used. The researchers were able to succeed by using one egg from an immature parent, thus reducing maternal imprinting, and modifying it to express the gene Igf2, which is normally only expressed by the paternal copy of the gene. Parthenogenetic/gynogenetic embryos have twice the normal expression level of maternally derived genes, and lack expression of paternally expressed genes, while the reverse is true for androgenetic embryos. It is now known that there are at least 80 imprinted genes in humans and mice, many of which are involved in embryonic and placental growth and development. Hybrid offspring of two species may exhibit unusual growth due to the novel combination of imprinted genes. Various methods have been used to identify imprinted genes. In swine, Bischoff et al. compared transcriptional profiles using DNA microarrays to survey differentially expressed genes between parthenotes (2 maternal genomes) and control fetuses (1 maternal, 1 paternal genome). An intriguing study surveying the transcriptome of murine brain tissues revealed over 1300 imprinted gene loci (approximately 10-fold more than previously reported) by RNA-sequencing from F1 hybrids resulting from reciprocal crosses. The result however has been challenged by others who claimed that this is an overestimation by an order of magnitude due to flawed statistical analysis. In domesticated livestock, single-nucleotide polymorphisms in imprinted genes influencing foetal growth and development have been shown to be associated with economically important production traits in cattle, sheep and pigs. Genetic mapping of imprinted genes At the same time as the generation of the gynogenetic and androgenetic embryos discussed above, mouse embryos were also being generated that contained only small regions that were derived from either a paternal or maternal source. The generation of a series of such uniparental disomies, which together span the entire genome, allowed the creation of an imprinting map. Those regions which when inherited from a single parent result in a discernible phenotype contain imprinted gene(s). Further research showed that within these regions there were often numerous imprinted genes. Around 80% of imprinted genes are found in clusters such as these, called imprinted domains, suggesting a level of co-ordinated control. More recently, genome-wide screens to identify imprinted genes have used differential expression of mRNAs from control fetuses and parthenogenetic or androgenetic fetuses hybridized to gene expression profiling microarrays, allele-specific gene expression using SNP genotyping microarrays, transcriptome sequencing, and in silico prediction pipelines. Imprinting mechanisms Imprinting is a dynamic process. It must be possible to erase and re-establish imprints through each generation so that genes that are imprinted in an adult may still be expressed in that adult's offspring. (For example, the maternal genes that control insulin production will be imprinted in a male but will be expressed in any of the male's offspring that inherit these genes.) The nature of imprinting must therefore be epigenetic rather than DNA sequence dependent. In germline cells the imprint is erased and then re-established according to the sex of the individual, i.e. in the developing sperm (during spermatogenesis), a paternal imprint is established, whereas in developing oocytes (oogenesis), a maternal imprint is established. This process of erasure and reprogramming is necessary such that the germ cell imprinting status is relevant to the sex of the individual. In both plants and mammals there are two major mechanisms that are involved in establishing the imprint; these are DNA methylation and histone modifications. Recently, a new study has suggested a novel inheritable imprinting mechanism in humans that would be specific of placental tissue and that is independent of DNA methylation (the main and classical mechanism for genomic imprinting). This was observed in humans, but not in mice, suggesting development after the evolutionary divergence of humans and mice, ~80 Mya. Among the hypothetical explanations for this novel phenomenon, two possible mechanisms have been proposed: either a histone modification that confers imprinting at novel placental-specific imprinted loci or, alternatively, a recruitment of DNMTs to these loci by a specific and unknown transcription factor that would be expressed during early trophoblast differentiation. Regulation The grouping of imprinted genes within clusters allows them to share common regulatory elements, such as non-coding RNAs and differentially methylated regions (DMRs). When these regulatory elements control the imprinting of one or more genes, they are known as imprinting control regions (ICR). The expression of non-coding RNAs, such as antisense Igf2r RNA (Air) on mouse chromosome 17 and KCNQ1OT1 on human chromosome 11p15.5, have been shown to be essential for the imprinting of genes in their corresponding regions. Differentially methylated regions are generally segments of DNA rich in cytosine and guanine nucleotides, with the cytosine nucleotides methylated on one copy but not on the other. Contrary to expectation, methylation does not necessarily mean silencing; instead, the effect of methylation depends upon the default state of the region. Functions of imprinted genes The control of expression of specific genes by genomic imprinting is unique to therian mammals (placental mammals and marsupials) and flowering plants. Imprinting of whole chromosomes has been reported in mealybugs (Genus: Pseudococcus) and a fungus gnat (Sciara). It has also been established that X-chromosome inactivation occurs in an imprinted manner in the extra-embryonic tissues of mice and all tissues in marsupials, where it is always the paternal X-chromosome which is silenced. The majority of imprinted genes in mammals have been found to have roles in the control of embryonic growth and development, including development of the placenta. Other imprinted genes are involved in post-natal development, with roles affecting suckling and metabolism. Hypotheses on the origins of imprinting A widely accepted hypothesis for the evolution of genomic imprinting is the "parental conflict hypothesis". Also known as the kinship theory of genomic imprinting, this hypothesis states that the inequality between parental genomes due to imprinting is a result of the differing interests of each parent in terms of the evolutionary fitness of their genes. The father's genes that encode for imprinting gain greater fitness through the success of the offspring, at the expense of the mother. The mother's evolutionary imperative is often to conserve resources for her own survival while providing sufficient nourishment to current and subsequent litters. Accordingly, paternally expressed genes tend to be growth-promoting whereas maternally expressed genes tend to be growth-limiting. In support of this hypothesis, genomic imprinting has been found in all placental mammals, where post-fertilisation offspring resource consumption at the expense of the mother is high; although it has also been found in oviparous birds where there is relatively little post-fertilisation resource transfer and therefore less parental conflict. A small number of imprinted genes are fast evolving under positive Darwinian selection possibly due to antagonistic co-evolution. The majority of imprinted genes display high levels of micro-synteny conservation and have undergone very few duplications in placental mammalian lineages. However, our understanding of the molecular mechanisms behind genomic imprinting show that it is the maternal genome that controls much of the imprinting of both its own and the paternally-derived genes in the zygote, making it difficult to explain why the maternal genes would willingly relinquish their dominance to that of the paternally-derived genes in light of the conflict hypothesis. Another hypothesis proposed is that some imprinted genes act coadaptively to improve both fetal development and maternal provisioning for nutrition and care. In it, a subset of paternally expressed genes are co-expressed in both the placenta and the mother's hypothalamus. This would come about through selective pressure from parent-infant coadaptation to improve infant survival. Paternally expressed 3 (PEG3) is a gene for which this hypothesis may apply. Others have approached their study of the origins of genomic imprinting from a different side, arguing that natural selection is operating on the role of epigenetic marks as machinery for homologous chromosome recognition during meiosis, rather than on their role in differential expression. This argument centers on the existence of epigenetic effects on chromosomes that do not directly affect gene expression, but do depend on which parent the chromosome originated from. This group of epigenetic changes that depend on the chromosome's parent of origin (including both those that affect gene expression and those that do not) are called parental origin effects, and include phenomena such as paternal X inactivation in the marsupials, nonrandom parental chromatid distribution in the ferns, and even mating type switching in yeast. This diversity in organisms that show parental origin effects has prompted theorists to place the evolutionary origin of genomic imprinting before the last common ancestor of plants and animals, over a billion years ago. Natural selection for genomic imprinting requires genetic variation in a population. A hypothesis for the origin of this genetic variation states that the host-defense system responsible for silencing foreign DNA elements, such as genes of viral origin, mistakenly silenced genes whose silencing turned out to be beneficial for the organism. There appears to be an over-representation of retrotransposed genes, that is to say genes that are inserted into the genome by viruses, among imprinted genes. It has also been postulated that if the retrotransposed gene is inserted close to another imprinted gene, it may just acquire this imprint. Imprinted Loci Phenotypic Signatures Unfortunately, the relationship between the phenotype and genotype of imprinted genes is solely conceptual. The idea is frameworked using two alleles on a single loci and hosts three different possible classes of genotypes. The reciprocal heterozygotes genotype class contributes to understanding how imprinting will impact genotype to phenotype relationship. Reciprocal heterozygotes have a genetically equivalent, but they are phenotypically nonequivalent. Their phenotype may not be dependent on the equivalence of the genotype. This can ultimately increase diversity in genetic classes, expanding flexibility of imprinted genes. This increase will also force a higher degree in testing capabilities and assortment of tests to determine the presences of imprinting. When a locus is identified as imprinted, two different classes express different alleles. Inherited imprinted genes of offspring are believed to be monoallelic expressions. A single locus will entirely produce one's phenotype although two alleles are inherited. This genotype class is called parental imprinting, as well as dominant imprinting. Phenotypic patterns are variant to possible expressions from paternal and maternal genotypes. Different alleles inherited from different parents will host different phenotypic qualities. One allele will have a larger phenotypic value and the other allele will be silenced. Underdominance of the locus is another possibility of phenotypic expression. Both maternal and paternal phenotypes will have a small value rather than one hosting a large value and silencing the other. Statistical frameworks and mapping models are used to identify imprinting effects on genes and complex traits. Allelic parent-of -origin influences the vary in phenotype that derive from the imprinting of genotype classes. These models of mapping and identifying imprinting effects include using unordered genotypes to build mapping models. These models will show classic quantitative genetics and the effects of dominance of the imprinted genes. Disorders associated with imprinting Imprinting may cause problems in cloning, with clones having DNA that is not methylated in the correct positions. It is possible that this is due to a lack of time for reprogramming to be completely achieved. When a nucleus is added to an egg during somatic cell nuclear transfer, the egg starts dividing in minutes, as compared to the days or months it takes for reprogramming during embryonic development. If time is the responsible factor, it may be possible to delay cell division in clones, giving time for proper reprogramming to occur. An allele of the "callipyge" (from the Greek for "beautiful buttocks"), or CLPG, gene in sheep produces large buttocks consisting of muscle with very little fat. The large-buttocked phenotype only occurs when the allele is present on the copy of chromosome 18 inherited from a sheep's father and is not on the copy of chromosome 18 inherited from that sheep's mother. In vitro fertilisation, including ICSI, is associated with an increased risk of imprinting disorders, with an odds ratio of 3.7 (95% confidence interval 1.4 to 9.7). Male infertility Epigenetic deregulations at H19 imprinted gene in sperm have been observed associated with male infertility. Indeed, methylation loss at H19 imprinted gene has been observed associated with MTHFR gene promoter hypermethylation in semen samples from infertile males. Prader-Willi/Angelman The first imprinted genetic disorders to be described in humans were the reciprocally inherited Prader-Willi syndrome and Angelman syndrome. Both syndromes are associated with loss of the chromosomal region 15q11-13 (band 11 of the long arm of chromosome 15). This region contains the paternally expressed genes SNRPN and NDN and the maternally expressed gene UBE3A. Paternal inheritance of a deletion of this region is associated with Prader-Willi syndrome (characterised by hypotonia, obesity, and hypogonadism). Maternal inheritance of the same deletion is associated with Angelman syndrome (characterised by epilepsy, tremors, and a perpetually smiling facial expression). DIRAS3 (NOEY2 or ARH1) DIRAS3 is a paternally expressed and maternally imprinted gene located on chromosome 1 in humans. Reduced DIRAS3 expression is linked to an increased risk of ovarian and breast cancers; in 41% of breast and ovarian cancers the protein encoded by DIRAS3 is not expressed, suggesting that it functions as a tumor suppressor gene. Therefore, if uniparental disomy occurs and a person inherits both chromosomes from the mother, the gene will not be expressed and the individual is put at a greater risk for breast and ovarian cancer. Other Other conditions involving imprinting include Beckwith-Wiedemann syndrome, Silver-Russell syndrome, and pseudohypoparathyroidism. Transient neonatal diabetes mellitus can also involve imprinting. The "imprinted brain hypothesis" argues that unbalanced imprinting may be a cause of autism and psychosis. Imprinted genes in other animals In insects, imprinting affects entire chromosomes. In some insects the entire paternal genome is silenced in male offspring, and thus is involved in sex determination. The imprinting produces effects similar to the mechanisms in other insects that eliminate paternally inherited chromosomes in male offspring, including arrhenotoky. In placental species, parent-offspring conflict can result in the evolution of strategies, such as genomic imprinting, for embryos to subvert maternal nutrient provisioning. Despite several attempts to find it, genomic imprinting has not been found in the platypus, reptiles, birds or fish. The absence of genomic imprinting in a placental reptile, the Pseudemoia entrecasteauxii, is interesting as genomic imprinting was thought to be associated with the evolution of viviparity and placental nutrient transport. Studies in domestic livestock, such as dairy and beef cattle, have implicated imprinted genes (e.g. IGF2) in a range of economic traits, including dairy performance in Holstein-Friesian cattle. Imprinted genes in plants A similar imprinting phenomenon has also been described in flowering plants (angiosperms). During fertilization of the egg cell, a second, separate fertilization event gives rise to the endosperm, an extraembryonic structure that nourishes the embryo in a manner analogous to the mammalian placenta. Unlike the embryo, the endosperm is often formed from the fusion of two maternal cells with a male gamete. This results in a triploid genome. The 2:1 ratio of maternal to paternal genomes appears to be critical for seed development. Some genes are found to be expressed from both maternal genomes while others are expressed exclusively from the lone paternal copy. It has been suggested that these imprinted genes are responsible for the triploid block effect in flowering plants that prevents hybridization between diploids and autotetraploids. Several computational methods to detect imprinting genes in plants from reciprocal crosses have been proposed. See also Bookmarking Metabolic imprinting References External links geneimprint.com Imprinted Gene and Parent-of-origin Effect Database J. Kimball's Imprinted Genes Site Harwell Mouse Imprinting Map Gehring Lab (MIT) Imprinting Database Molecular genetics Gene expression Epigenetics
[ 0.03895781561732292, 0.24734021723270416, -0.662943422794342, 0.02672327123582363, 0.16714200377464294, 0.018073461949825287, 0.2105250060558319, 0.5304492712020874, 0.22699019312858582, -0.8913192749023438, 0.16751399636268616, -0.03344929590821266, -0.478677898645401, 0.8609691262245178,...
15236
https://en.wikipedia.org/wiki/ICANN
ICANN
The Internet Corporation for Assigned Names and Numbers (ICANN ) is an American multistakeholder group and nonprofit organization responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numerical spaces of the Internet, ensuring the network's stable and secure operation. ICANN performs the actual technical maintenance work of the Central Internet Address pools and DNS root zone registries pursuant to the Internet Assigned Numbers Authority (IANA) function contract. The contract regarding the IANA stewardship functions between ICANN and the National Telecommunications and Information Administration (NTIA) of the United States Department of Commerce ended on October 1, 2016, formally transitioning the functions to the global multistakeholder community. Much of its work has concerned the Internet's global Domain Name System (DNS), including policy development for internationalization of the DNS system, introduction of new generic top-level domains (TLDs), and the operation of root name servers. The numbering facilities ICANN manages include the Internet Protocol address spaces for IPv4 and IPv6, and assignment of address blocks to regional Internet registries. ICANN also maintains registries of Internet Protocol identifiers. ICANN's primary principles of operation have been described as helping preserve the operational stability of the Internet; to promote competition; to achieve broad representation of the global Internet community; and to develop policies appropriate to its mission through bottom-up, consensus-based processes. ICANN's creation was announced publicly on September 17, 1998, and it formally came into being on September 30, 1998, incorporated in the U.S. state of California. Originally headquartered in Marina del Rey in the same building as the University of Southern California's Information Sciences Institute (ISI), its offices are now in the Playa Vista neighborhood of Los Angeles. History Before the establishment of ICANN, the IANA function of administering registries of Internet protocol identifiers (including the distributing top-level domains and IP addresses) was performed by Jon Postel, a Computer Science researcher who had been involved in the creation of ARPANET, first at UCLA and then at USC-ISI. In 1997 Postel testified before Congress that this had come about as a "side task" to this research work. The Information Sciences Institute was funded by the U.S. Department of Defense, as was SRI International's Network Information Center, which also performed some assigned name functions. As the Internet grew and expanded globally, the U.S. Department of Commerce initiated a process to establish a new organization to perform the IANA functions. On January 30, 1998, the National Telecommunications and Information Administration (NTIA), an agency of the U.S. Department of Commerce, issued for comment, "A Proposal to Improve the Technical Management of Internet Names and Addresses." The proposed rule making, or "Green Paper", was published in the Federal Register on February 20, 1998, providing opportunity for public comment. NTIA received more than 650 comments as of March 23, 1998, when the comment period closed. The Green Paper proposed certain actions designed to privatize the management of Internet names and addresses in a manner that allows for the development of competition and facilitates global participation in Internet management. The Green Paper proposed for discussion a variety of issues relating to DNS management including private sector creation of a new not-for-profit corporation (the "new corporation") managed by a globally and functionally representative board of directors. ICANN was formed in response to this policy. ICANN managed the Internet Assigned Numbers Authority (IANA) under contract to the United States Department of Commerce (DOC) and pursuant to an agreement with the IETF. ICANN was incorporated in California on September 30, 1998, with entrepreneur and philanthropist Esther Dyson as founding chairwoman. It is a nonprofit public benefit corporation "organized under the California Nonprofit Public Benefit Corporation Law for charitable and public purposes." ICANN was established in California due to the presence of Jon Postel, who was a founder of ICANN and was set to be its first Chief Technology Officer prior to his unexpected death. ICANN formerly operated from the same Marina del Rey building where Postel formerly worked, which is home to an office of the Information Sciences Institute at the University of Southern California. However, ICANN's headquarters is now located in the nearby Playa Vista neighborhood of Los Angeles. Per its original by-laws, primary responsibility for policy formation in ICANN was to be delegated to three supporting organizations (Address Supporting Organization, Domain Name Supporting Organization, and Protocol Supporting Organization), each of which was to develop and recommend substantive policies and procedures for the management of the identifiers within their respective scope. They were also required to be financially independent from ICANN. As expected, the regional Internet registries and the IETF agreed to serve as the Address Supporting Organization and Protocol Supporting Organization respectively, and ICANN issued a call for interested parties to propose the structure and composition of the Domain Name Supporting Organization. In March 1999, the ICANN Board, based in part on the DNSO proposals received, decided instead on an alternate construction for the DNSO which delineated specific constituencies bodies within ICANN itself, thus adding primary responsibility for DNS policy development to ICANN's existing duties of oversight and coordination. On July 26, 2006, the United States government renewed the contract with ICANN for performance of the IANA function for an additional one to five years. The context of ICANN's relationship with the U.S. government was clarified on September 29, 2006 when ICANN signed a new memorandum of understanding with the United States Department of Commerce (DOC). This document gave the DOC oversight over some of the ICANN operations. During July 2008, the DOC reiterated an earlier statement that it has "no plans to transition management of the authoritative root zone file to ICANN". The letter also stresses the separate roles of the IANA and VeriSign. On September 30, 2009, ICANN signed an agreement with the DOC (known as the "Affirmation of Commitments") that confirmed ICANN's commitment to a multistakeholder governance model, but did not remove it from DOC oversight and control. On March 10, 2016, ICANN and the DOC signed a historic, culminating agreement to finally remove ICANN and IANA from the control and oversight of the DOC. On October 1, 2016, ICANN was freed from U.S. government oversight. Notable events On March 18, 2002, publicly elected At-Large Representative for North America board member Karl Auerbach sued ICANN in Superior Court in California to gain access to ICANN's accounting records without restriction. Auerbach won. During September and October 2003, ICANN played a crucial role in the conflict over VeriSign's "wild card" DNS service Site Finder. After an open letter from ICANN issuing an ultimatum to VeriSign, later endorsed by the Internet Architecture Board, the company voluntarily ended the service on October 4, 2003. After this action, VeriSign filed a lawsuit against ICANN on February 27, 2004, claiming that ICANN had exceeded its authority. By this lawsuit, VeriSign sought to reduce ambiguity about ICANN's authority. The antitrust component of VeriSign's claim was dismissed during August 2004. VeriSign's challenge that ICANN overstepped its contractual rights is currently outstanding. A proposed settlement already approved by ICANN's board would resolve VeriSign's challenge to ICANN in exchange for the right to increase pricing on .com domains. At the meeting of ICANN in Rome, which took place from March 2 to 6, 2004, ICANN agreed to ask approval of the U.S. Department of Commerce for the Waiting List Service of VeriSign. On May 17, 2004, ICANN published a proposed budget for the year 2004–05. It included proposals to increase the openness and professionalism of its operations, and greatly increased its proposed spending from US$8.27 million to $15.83 million. The increase was to be funded by the introduction of new top-level domains, charges to domain registries, and a fee for some domain name registrations, renewals and transfers (initially USD 0.20 for all domains within a country-code top-level domain, and USD 0.25 for all others). The Council of European National Top Level Domain Registries (CENTR), which represents the Internet registries of 39 countries, rejected the increase, accusing ICANN of a lack of financial prudence and criticizing what it describes as ICANN's "unrealistic political and operational targets". Despite the criticism, the registry agreement for the top-level domains and includes a US$2 fee on every domain the licensed companies sell or renew. After a second round of negotiations during 2004, the TLDs , , , , , and were introduced during 2005. On February 28, 2006, ICANN's board approved a settlement with VeriSign in the lawsuit resulting from SiteFinder that involved allowing VeriSign (the registry) to raise its registration fees by up to 7% a year. This was criticised by a few members of the U.S. House of Representatives' Small Business Committee. During February 2007, ICANN began procedures to end accreditation of one of their registrars, RegisterFly amid charges and lawsuits involving fraud, and criticism of ICANN's management of the situation. ICANN has been the subject of criticism as a result of its handling of RegisterFly, and the harm caused to thousands of clients as a result of what has been termed ICANN's "laissez faire attitude toward customer allegations of fraud". On May 23, 2008, ICANN issued enforcement notices against ten accredited registrars and announced this through a press release entitled "'Worst Spam Offenders' Notified by ICANN, Compliance system working to correct Whois and other issues." This was largely in response to a report issued by KnujOn, called "The 10 Worst Registrars" in terms of spam advertised junk product sites and compliance failure. The mention of the word "spam" in the title of the ICANN memo is somewhat misleading since ICANN does not address issues of spam or email abuse. Website content and usage are not within ICANN's mandate. However, the KnujOn report details how various registrars have not complied with their contractual obligations under the Registrar Accreditation Agreement (RAA). The main point of the KnujOn research was to demonstrate the relationships between compliance failure, illicit product traffic, and spam. The report demonstrated that out of 900 ICANN accredited registrars, fewer than 20 held 90% of the web domains advertised in spam. These same registrars were also most frequently cited by KnujOn as failing to resolve complaints made through the Whois Data Problem Reporting System (WDPRS). On June 26, 2008, the ICANN Board started a new process of TLD naming policy to take a "significant step forward on the introduction of new generic top-level domains." This program envisioned the availability of many new or already proposed domains, as well a new application and implementation process. On October 1, 2008, ICANN issued breach notices against Joker and Beijing Innovative Linkage Technology Ltd. after further researching reports and complaints issued by KnujOn. These notices gave the registrars 15 days to fix their Whois investigation efforts. In 2010, ICANN approved a major review of its policies with respect to accountability, transparency, and public participation by the Berkman Center for Internet and Society at Harvard University. This external review was an assistance of the work of ICANN's Accountability and Transparency Review team. On February 3, 2011, ICANN announced that it had distributed the last batch of its remaining IPv4 addresses to the world's five regional Internet registries, the organizations that manage IP addresses in different regions. These registries began assigning the final IPv4 addresses within their regions until they ran out completely. On June 20, 2011, the ICANN board voted to end most restrictions on the names of generic top-level domains (gTLD). Companies and organizations became able to choose essentially arbitrary top-level Internet domain names. The use of non-Latin characters (such as Cyrillic, Arabic, Chinese, etc.) is also allowed in gTLDs. ICANN began accepting applications for new gTLDS on January 12, 2012. The initial price to apply for a new gTLD was set at $185,000 and the annual renewal fee is $25,000. Following the 2013 NSA spying scandal, ICANN endorsed the Montevideo Statement, although no direct connection between these could be proven. On October 1, 2016, ICANN ended its contract with the United States Department of Commerce National Telecommunications and Information Administration (NTIA) and entered the private sector. The European Union's General Data Protection Regulation (active since May 25, 2018) impacted on ICANN operations, which the latter tried to fix through last-minute changes. The deadline coincided with French President Macron's hosting of technology businesspeople such as Facebook CEO Mark Zuckerberg, Microsoft CEO Satya Nadella, Uber CEO Dara Khosrowshahi, IBM CEO Ginni Rometty, Intel CEO Brian Krzanich, Samsung President Young Sohn, and SAP CEO Bill McDermott. Structure From its founding to the present, ICANN has been formally organized as a nonprofit corporation "for charitable and public purposes" under the California Nonprofit Public Benefit Corporation Law. It is managed by a 16-member board of directors composed of eight members selected by a nominating committee on which all the constituencies of ICANN are represented; six representatives of its Supporting Organizations, sub-groups that deal with specific sections of the policies under ICANN's purview; an at-large seat filled by an at-large organization; and the President / CEO, appointed by the board. There are currently three supporting organizations: the Generic Names Supporting Organization (GNSO) deals with policy making on generic top-level domains (gTLDs); the Country Code Names Supporting Organization (ccNSO) deals with policy making on country-code top-level domains (ccTLDs); the Address Supporting Organization (ASO) deals with policy making on IP addresses. ICANN also relies on some advisory committees and other advisory mechanisms to receive advice on the interests and needs of stakeholders that do not directly participate in the Supporting Organizations. These include the Governmental Advisory Committee (GAC), which is composed of representatives of a large number of national governments from all over the world; the At-Large Advisory Committee (ALAC), which is composed of individual Internet users from around the world selected by each of the Regional At-Large Organizations (RALO) and Nominating Committee; the Root Server System Advisory Committee, which provides advice on the operation of the DNS root server system; the Security and Stability Advisory Committee (SSAC), which is composed of Internet experts who study security issues pertaining to ICANN's mandate; and the Technical Liaison Group (TLG), which is composed of representatives of other international technical organizations that focus, at least in part, on the Internet. Governmental Advisory Committee Representatives The Governmental Advisory Committee has representatives from 179 states and 38 Observer organizations, including the Holy See, Cook Islands, Niue, Taiwan, Hong Kong, Bermuda, Montserrat, the European Commission and the African Union Commission. Observers In addition the following organizations are GAC Observers: African Telecommunications Union Asia-Pacific Telecommunity Caribbean Telecommunications Union (CTU) Commonwealth Telecommunications Organisation (CTO) Council of Europe Economic Commission for Africa (ECA) European Broadcasting Union European Organization for Nuclear Research (CERN) European Space Agency International Labour Office International Telecommunication Union (ITU) International Criminal Police Organization (INTERPOL) International Red Cross and Red Crescent Movement Latin American Association of Telecom Regulatory Agencies (REGULATEL) League of Arab States New Partnership for Africa's Development (NEPAD) Organisation for Economic Co-operation and Development The Organization for Islamic Cooperation Organization of American States Organisation internationale de la Francophonie (OIF) Pacific Islands Forum Secretariat of the Pacific Community (SPC) Inter-American Telecommunication Commission (CITEL) International Criminal Court United Nations Educational Scientific and Cultural Organization (UNESCO) Universal Postal Union World Bank World Health Organization (WHO) World Intellectual Property Organization (WIPO) World Meteorological Organization World Trade Organization Trusted Community Representatives As the operator of the IANA domain name functions, ICANN is responsible for the DNSSEC management of the root zone. While day to day operations are managed by ICANN and Verisign, the trust is rooted in a group of Trusted Community Representatives. The members of this group must not be affiliated with ICANN, but are instead members of the broader DNS community, volunteering to become a Trusted Community Representative. The role of the representatives are primarily to take part in regular key ceremonies at a physical location, organized by ICANN, and to safeguard the key materials in between. Democratic input In the Memorandum of understanding that set up the relationship between ICANN and the U.S. government, ICANN was given a mandate requiring that it operate "in a bottom up, consensus driven, democratic manner." However, the attempts that ICANN have made to establish an organizational structure that would allow wide input from the global Internet community did not produce results amenable to the current Board. As a result, the At-Large constituency and direct election of board members by the global Internet community were soon abandoned. ICANN holds periodic public meetings rotated between continents for the purpose of encouraging global participation in its processes. Resolutions of the ICANN Board, preliminary reports, and minutes of the meetings, are published on the ICANN website, sometimes in real time. However, there are criticisms from ICANN constituencies including the Noncommercial Users Constituency (NCUC) and the At-Large Advisory Committee (ALAC) that there is not enough public disclosure and that too many discussions and decisions take place out of sight of the public. During the early 2000s, there had been speculation that the United Nations might assume control of ICANN, followed by a negative reaction from the U.S. government and worries about a division of the Internet. The World Summit on the Information Society in Tunisia during November 2005 agreed not to get involved in the day-to-day and technical operations of ICANN. However it also agreed to establish an international Internet Governance Forum, with a consultative role on the future governance of the Internet. ICANN's Government Advisory Committee is currently established to provide advice to ICANN regarding public policy issues and has participation by many of the world's governments. Some have attempted to argue that ICANN was never given the authority to decide policy, e.g., choose new TLDs or exclude other interested parties who refuse to pay ICANN's US$185,000 fee, but was to be a technical caretaker. Critics suggest that ICANN should not be allowed to impose business rules on market participants, and that all TLDs should be added on a first-come, first-served basis and the market should be the arbiter of who succeeds and who does not. Activities Uniform Domain-Name Dispute Resolution Policy (UDRP) One task that ICANN was asked to do was to address the issue of domain name ownership resolution for generic top-level domains (gTLDs). ICANN's attempt at such a policy was drafted in close cooperation with the World Intellectual Property Organization (WIPO), and the result has now become known as the Uniform Dispute Resolution Policy (UDRP). This policy essentially attempts to provide a mechanism for rapid, cheap and reasonable resolution of domain name conflicts, avoiding the traditional court system for disputes by allowing cases to be brought to one of a set of bodies that arbitrate domain name disputes. According to ICANN policy, domain registrants must agree to be bound by the UDRP—they cannot get a domain name without agreeing to this. Examination of the UDRP decision patterns has caused some to conclude that compulsory domain name arbitration is less likely to give a fair hearing to domain name owners asserting defenses under the First Amendment and other laws, compared to the federal courts of appeal in particular. Proposed elimination of public DNS whois In 2013, the initial report of ICANN's Expert Working Group has recommended that the present form of Whois, a utility that allows anyone to know who has registered a domain name on the Internet, should be "abandoned". It recommends it be replaced with a system that keeps most registration information secret (or "gated") from most Internet users, and only discloses information for "permissible purposes". ICANN's list of permissible purposes includes domain name research, domain name sale and purchase, regulatory enforcement, personal data protection, legal actions, and abuse mitigation. Whois has been a key tool of investigative journalists interested in determining who was disseminating information on the Internet. The use of whois by journalists is not included in the list of permissible purposes in the initial report. Criticism Since its creation, ICANN has been the subject of criticism and controversy. In 2000, professor Michael Froomkin of the University of Miami School of Law argued that ICANN's relationship with the U.S. Department of Commerce is illegal, in violation of either the Constitution or federal statutes. In 2009, the new Affirmation of Commitments agreement between ICANN and the U.S. Department of Commerce, that aimed to create international oversight, ran into criticism. The governance of the Internet by the United States government has been suggested by some scholars as being an example of colonialism and imperialism, and proposals have been made to internationalize ICANN's monitoring responsibilities (currently the responsibility of the US), to transform it into an international organization (under international law), and to "establish an intergovernmental mechanism enabling governments, on an equal footing, to carry out their role and responsibilities in international public policy issues pertaining to the Internet". During December 2011, the Federal Trade Commission stated ICANN had long failed to provide safeguards that protect consumers from online swindlers. TLD expansion Also during 2011, seventy-nine companies, including The Coca-Cola Company, Hewlett-Packard, Samsung and others, signed a petition against ICANN's new TLD program (sometimes referred to as a "commercial landgrab"), in a group organized by the Association of National Advertisers. As of September 2014, this group, the Coalition for Responsible Internet Domain Oversight, that opposes the rollout of ICANN's TLD expansion program, has been joined by 102 associations and 79 major companies. Partly as a response to this criticism, ICANN initiated an effort to protect trademarks in domain name registrations, which eventually culminated in the establishment of the Trademark Clearinghouse. IBSA proposal (2011) One controversial proposal, resulting from a September 2011 summit between India, Brazil, and South Africa (IBSA), would seek to move Internet governance into a "UN Committee on Internet-Related Policy" (UN-CIRP). The action was a reaction to a perception that the principles of the 2005 Tunis Agenda for the Information Society have not been met. The statement proposed the creation of a new political organization operating as a component of the United Nations to provide policy recommendations for the consideration of technical organizations such as ICANN and international bodies such as the ITU. Subsequent to public criticisms, the Indian government backed away from the proposal. Montevideo Statement on the Future of Internet Cooperation (2013) On October 7, 2013 the Montevideo Statement on the Future of Internet Cooperation was released by the managers of a number of organizations involved in coordinating the Internet's global technical infrastructure, loosely known as the "I*" (or "I-star") group. Among other things, the statement "expressed strong concern over the undermining of the trust and confidence of Internet users globally due to recent revelations of pervasive monitoring and surveillance" and "called for accelerating the globalization of ICANN and IANA functions, towards an environment in which all stakeholders, including all governments, participate on an equal footing". This desire to reduce United States association with the internet is considered a reaction to the ongoing NSA surveillance scandal. The statement was signed by the managers of the Internet Corporation for Assigned Names and Numbers (ICANN), the Internet Engineering Task Force, the Internet Architecture Board, the World Wide Web Consortium, the Internet Society, and the five regional Internet address registries (African Network Information Center, American Registry for Internet Numbers, Asia-Pacific Network Information Centre, Latin America and Caribbean Internet Addresses Registry, and Réseaux IP Européens Network Coordination Centre). Global Multistakeholder Meeting on the Future of Internet Governance (2013) During October 2013, Fadi Chehadé, former President and CEO of ICANN, met with Brazilian President Dilma Rousseff in Brasilia. Upon Chehadé's invitation, the two announced that Brazil would host an international summit on Internet governance during April 2014. The announcement came after the 2013 disclosures of mass surveillance by the U.S. government, and President Rousseff's speech at the opening session of the 2013 United Nations General Assembly, where she strongly criticized the American surveillance program as a "breach of international law". The "Global Multistakeholder Meeting on the Future of Internet Governance (NET mundial)" will include representatives of government, industry, civil society, and academia. At the IGF VIII meeting in Bali in October 2013 a commenter noted that Brazil intends the meeting to be a "summit" in the sense that it will be high level with decision-making authority. The organizers of the "NET mundial" meeting have decided that an online forum called "/1net", set up by the I* group, will be a major conduit of non-governmental input into the three committees preparing for the meeting in April. The Obama administration that had joined critics of ICANN during 2011 announced in March 2014 that they intended to transition away from oversight of the IANA functions contract. The current contract that the United States Department of Commerce has with ICANN expired in 2015, in its place the NTIA will transition oversight of the IANA functions to the 'global multistakeholder community'. NetMundial Initiative (2014) The NetMundial Initiative is a plan for international governance of the Internet that was first proposed at the Global Multistakeholder Meeting on the Future of Internet Governance (GMMFIG) conference (April 23–24, 2014) and later developed into the NetMundial Initiative by ICANN CEO Fadi Chehadé along with representatives of the World Economic Forum (WEF) and the Brazilian Internet Steering Committee (Comitê Gestor da Internet no Brasil), commonly referred to as "CGI.br". The meeting produced a nonbinding statement in favor of consensus-based decision-making. It represented a compromise and did not harshly condemn mass surveillance or support net neutrality, despite initial endorsement for that from Brazil. The final resolution says ICANN should be controlled internationally by September 2015. A minority of governments, including Russia, China, Iran and India, were unhappy with the final resolution and wanted multilateral management for the Internet, rather than broader multistakeholder management. A month later, the Panel on Global Internet Cooperation and Governance Mechanisms (convened by the Internet Corporation for Assigned Names and Numbers (ICANN) and the World Economic Forum (WEF) with assistance from The Annenberg Foundation), endorsed and included the NetMundial statement in its own report. During June 2014, France strongly attacked ICANN, saying ICANN is not a fit venue for Internet governance and that alternatives should be sought. .sucks domain ICANN has received more than $60 million from gTLD auctions, and has accepted the controversial domain name ".sucks" (referring to the primarily US slang for being inferior or objectionable). sucks domains are owned and controlled by the Vox Populi Registry which won the rights for .sucks gTLD in November 2014. The .sucks domain registrar has been described as "predatory, exploitive and coercive" by the Intellectual Property Constituency that advises the ICANN board. When the .sucks registry announced their pricing model, "most brand owners were upset and felt like they were being penalized by having to pay more to protect their brands." Because of the low utility of the ".sucks" domain, most fees come from "Brand Protection" customers registering their trademarks to prevent domains being registered. Canadian brands had complained that they were being charged "exorbitant" prices to register their trademarks as premium names. FTC chair Edith Ramirez has written to ICANN to say the agency will take action against the .sucks owner if "we have reason to believe an entity has engaged in deceptive or unfair practices in violation of Section 5 of the FTC Act". The Register reported that intellectual property lawyers are infuriated that "the dot-sucks registry was charging trademark holders $2,500 for .sucks domains and everyone else $10." U.S. Representative Bob Goodlatte has said that trademark holders are "being shaken down" by the registry's fees. Jay Rockefeller says that .sucks is "a predatory shakedown scheme" and "Approving '.sucks', a gTLD with little or no public interest value, will have the effect of undermining the credibility ICANN has slowly been building with skeptical stakeholders." .islam, .halal top level domains In a long-running dispute, ICANN has so far declined to allow a Turkish company to purchase the .islam and .halal gTLDs, after the Organisation of Islamic Cooperation objected that the gTLDs should be administered by an organization that represents all the world’s 1.6 billion Muslims. After a number of attempts to resolve the issue the domains are still held "on hold". .amazon gTLD dispute In May 2019 ICANN decided in favor of granting exclusive administration rights to amazon.com for the .amazon gTLD after a 7 year long dispute with the Amazon Cooperation Treaty Organization (ACTO). See also Alternative DNS root Domain name scams Domain Name System Domain name Domain name registrar Internationalized domain name Top-level domain Country code top-level domain Generic top-level domain Geographic top-level domain (GeoTLD) IEEE Registration Authority Internet Assigned Numbers Authority (IANA) InterNIC List of ICANN meetings List of United States quangos Montevideo Statement on the Future of Internet Cooperation NetMundial Initiative, a plan for governance of the Internet Network Solutions OneWebDay OpenNIC Trademark Clearinghouse Uniform Domain-Name Dispute-Resolution Policy WHOIS References Further reading Brito, Jerry. "ICANN vs. the World." TIME. March 5, 2011. Retrieved March 6, 2011. Franda, Marcus, The Emergence of an International Regime, Wass, Erica, Addressing the World, Paré, Daniel J. Internet Governance in Transition, Mueller, Milton L. Ruling the Root, Froomkin, A. Michael Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution, 50 Duke Law Journal17 (2000) External links ICANN DNS Operations Domain Name System Domain name registries History of the Internet Information technology organizations Internet governance organizations Internet in the United States Non-profit organizations based in California Organizations established in 1998 United States Department of Commerce 1998 establishments in California
[ -0.07810329645872116, 0.2780255079269409, -0.06662659347057343, 0.4675537943840027, 0.2032059133052826, -0.3727600574493408, -0.16321015357971191, 0.3716517388820648, -0.43579497933387756, -0.15661820769309998, 0.106839619576931, 0.12729443609714508, -0.212294340133667, 0.2671753168106079,...
15237
https://en.wikipedia.org/wiki/Iterative%20method
Iterative method
In computational mathematics, an iterative method is a mathematical procedure that uses an initial value to generate a sequence of improving approximate solutions for a class of problems, in which the n-th approximation is derived from the previous ones. A specific implementation of an iterative method, including the termination criteria, is an algorithm of the iterative method. An iterative method is called convergent if the corresponding sequence converges for given initial approximations. A mathematically rigorous convergence analysis of an iterative method is usually performed; however, heuristic-based iterative methods are also common. In contrast, direct methods attempt to solve the problem by a finite sequence of operations. In the absence of rounding errors, direct methods would deliver an exact solution (for example, solving a linear system of equations by Gaussian elimination). Iterative methods are often the only choice for nonlinear equations. However, iterative methods are often useful even for linear problems involving many variables (sometimes on the order of millions), where direct methods would be prohibitively expensive (and in some cases impossible) even with the best available computing power. Attractive fixed points If an equation can be put into the form f(x) = x, and a solution x is an attractive fixed point of the function f, then one may begin with a point x1 in the basin of attraction of x, and let xn+1 = f(xn) for n ≥ 1, and the sequence {xn}n ≥ 1 will converge to the solution x. Here xn is the nth approximation or iteration of x and xn+1 is the next or n + 1 iteration of x. Alternately, superscripts in parentheses are often used in numerical methods, so as not to interfere with subscripts with other meanings. (For example, x(n+1) = f(x(n)).) If the function f is continuously differentiable, a sufficient condition for convergence is that the spectral radius of the derivative is strictly bounded by one in a neighborhood of the fixed point. If this condition holds at the fixed point, then a sufficiently small neighborhood (basin of attraction) must exist. Linear systems In the case of a system of linear equations, the two main classes of iterative methods are the stationary iterative methods, and the more general Krylov subspace methods. Stationary iterative methods Introduction Stationary iterative methods solve a linear system with an operator approximating the original one; and based on a measurement of the error in the result (the residual), form a "correction equation" for which this process is repeated. While these methods are simple to derive, implement, and analyze, convergence is only guaranteed for a limited class of matrices. Definition An iterative method is defined by and for a given linear system with exact solution the error by An iterative method is called linear if there exists a matrix such that and this matrix is called the iteration matrix. An iterative method with a given iteration matrix is called convergent if the following holds An important theorem states that for a given iterative method and its iteration matrix it is convergent if and only if its spectral radius is smaller than unity, that is, The basic iterative methods work by splitting the matrix into and here the matrix should be easily invertible. The iterative methods are now defined as From this follows that the iteration matrix is given by Examples Basic examples of stationary iterative methods use a splitting of the matrix such as where is only the diagonal part of , and is the strict lower triangular part of . Respectively, is the strict upper triangular part of . Richardson method: Jacobi method: Damped Jacobi method: Gauss–Seidel method: Successive over-relaxation method (SOR): Symmetric successive over-relaxation (SSOR): Linear stationary iterative methods are also called relaxation methods. Krylov subspace methods Krylov subspace methods work by forming a basis of the sequence of successive matrix powers times the initial residual (the Krylov sequence). The approximations to the solution are then formed by minimizing the residual over the subspace formed. The prototypical method in this class is the conjugate gradient method (CG) which assumes that the system matrix is symmetric positive-definite. For symmetric (and possibly indefinite) one works with the minimal residual method (MINRES). In the case of non-symmetric matrices, methods such as the generalized minimal residual method (GMRES) and the biconjugate gradient method (BiCG) have been derived. Convergence of Krylov subspace methods Since these methods form a basis, it is evident that the method converges in N iterations, where N is the system size. However, in the presence of rounding errors this statement does not hold; moreover, in practice N can be very large, and the iterative process reaches sufficient accuracy already far earlier. The analysis of these methods is hard, depending on a complicated function of the spectrum of the operator. Preconditioners The approximating operator that appears in stationary iterative methods can also be incorporated in Krylov subspace methods such as GMRES (alternatively, preconditioned Krylov methods can be considered as accelerations of stationary iterative methods), where they become transformations of the original operator to a presumably better conditioned one. The construction of preconditioners is a large research area. History Probably the first iterative method for solving a linear system appeared in a letter of Gauss to a student of his. He proposed solving a 4-by-4 system of equations by repeatedly solving the component in which the residual was the largest . The theory of stationary iterative methods was solidly established with the work of D.M. Young starting in the 1950s. The conjugate gradient method was also invented in the 1950s, with independent developments by Cornelius Lanczos, Magnus Hestenes and Eduard Stiefel, but its nature and applicability were misunderstood at the time. Only in the 1970s was it realized that conjugacy based methods work very well for partial differential equations, especially the elliptic type. See also Closed-form expression Iterative refinement Non-linear least squares Numerical analysis Root-finding algorithm References External links Templates for the Solution of Linear Systems Y. Saad: Iterative Methods for Sparse Linear Systems, 1st edition, PWS 1996 Numerical analysis
[ -0.3424803614616394, 0.08572421222925186, -0.19716131687164307, 0.24700863659381866, 0.21441712975502014, 0.7936414480209351, 0.05189630761742592, -0.40389829874038696, 0.07955866307020187, -0.4494697153568268, -0.06085735931992531, 0.3755815923213959, -0.4035879373550415, -0.0780463740229...
15238
https://en.wikipedia.org/wiki/International%20judicial%20institution
International judicial institution
International judicial institutions can be divided into courts, arbitral tribunals and quasi-judicial institutions. Courts are permanent bodies, with near the same composition for each case. Arbitral tribunals, by contrast, are constituted anew for each case. Both courts and arbitral tribunals can make binding decisions. Quasi-judicial institutions, by contrast, make rulings on cases, but these rulings are not in themselves legally binding; the main example is the individual complaints mechanisms available under the various UN human rights treaties. Institutions can also be divided into global and regional institutions. The listing below incorporates both currently existing institutions, defunct institutions that no longer exist, institutions which never came into existence due to non-ratification of their constitutive instruments, and institutions which do not yet exist, but for which constitutive instruments have been signed. It does not include mere proposed institutions for which no instrument was ever signed. International courts International Court of Justice International Tribunal for the Law of the Sea International Criminal Tribunal for the Former Yugoslavia International Criminal Tribunal for Rwanda International Criminal Court International Military Tribunal (Defunct) International Military Tribunal for the Far East (Defunct) International Prize Court (Never established) Permanent Court of International Justice (Defunct. Replaced by the International Court of Justice) International arbitral tribunals Permanent Court of Arbitration WTO Appellate Body WTO Dispute Settlement Panels NAFTA Dispute Settlement Panels International Centre for the Settlement of Investment Disputes Court of Arbitration for Sport OSCE Court of Conciliation and Arbitration Quasi-judicial international institutions Human Rights Committee Committee on the Elimination of Racial Discrimination Committee on the Elimination of Discrimination Against Women Committee on Economic, Social and Cultural Rights Committee on the Rights of the Child Committee Against Torture Committee on Migrant Workers Committee on the Rights of Persons with Disabilities African regional judicial institutions African Court on Human and Peoples' Rights Court of Justice of the African Union (planned) Court of Justice of the Common Market for Eastern and Southern Africa Community Court of Justice of the Economic Community of West African States East African Court of Justice Southern African Development Community Tribunal Regional judicial institutions of the Americas Inter-American Court of Human Rights Central American Court of Justice Court of Justice of the Andean Community Caribbean Court of Justice Eastern Caribbean Supreme Court European regional judicial institutions European Court of Justice European General Court European Court of Human Rights Court of Justice of the European Free Trade Agreement States Benelux Court of Justice Economic Court of the Commonwealth of Independent States European Nuclear Energy Tribunal (dormant) Western European Union Tribunal (defunct) European Tribunal in Matters of State Immunity (dormant) Judicial institutions Judicial institutions
[ 0.27445998787879944, 0.161847323179245, -0.21006321907043457, 0.22548088431358337, 0.09050603955984116, -0.17207090556621552, 0.09227738529443741, 0.3893367052078247, -0.45456328988075256, -0.42523396015167236, -0.3531380593776703, 0.5386212468147278, 0.04086096212267876, 0.495284080505371...
15239
https://en.wikipedia.org/wiki/International%20Prize%20Court
International Prize Court
The International Prize Court was an international court proposed at the beginning of the 20th century, to hear prize cases. An international agreement to create it, the Convention Relative to the Creation of an International Prize Court, was made at the Second Hague Conference in 1907 but never came into force. The capturing of prizes (enemy equipment, vehicles, and especially ships) during wartime is a tradition that goes back as far as organized warfare itself. The International Prize Court was to hear appeals from national courts concerning prize cases. Even as a draft, the convention was innovative for the time, in being both the first ever treaty for a truly international court (as opposed to a mere arbitral tribunal), and in providing individuals with access to the court, going against the prevailing doctrines of international law at the time, according to which only states had rights and duties under international law. The Convention was opposed, particularly by elements within the United States and the United Kingdom, as a violation of national sovereignty. The 1907 convention was modified by the Additional Protocol to the Convention Relative to the Creation of an International Prize Court, done at the Hague on October 18, 1910. The protocol was an attempt to resolve some concerns expressed by the United States at the court, which felt it to be in violation of its constitutional provision that provides for the U.S. Supreme Court being the final judicial authority. However, neither the convention nor the subsequent protocol ever entered into force, since only Nicaragua ratified the agreements. As a result, the court never came into existence. A number of ideas from the International Prize Court proposal can be seen in present-day international courts, such as its provision for judges ad hoc, later adopted in the Permanent Court of International Justice and the subsequent International Court of Justice. References Primary: Secondary: Further reading Prize warfare Hague Conventions of 1899 and 1907
[ -0.12326215952634811, -0.1913416087627411, -0.23754771053791046, 0.2557448744773865, -0.14059294760227203, 0.19906558096408844, -0.32721155881881714, 0.08199863880872726, -0.30139341950416565, -0.42775994539260864, 0.14736519753932953, 0.47888246178627014, -0.11477334797382355, 0.556556105...
15240
https://en.wikipedia.org/wiki/Imam
Imam
Imam (; ; plural: ) is an Islamic leadership position. For Sunni Muslims, Imam is most commonly used as the title of a worship leader of a mosque. In this context, imams may lead Islamic worship services, lead prayers, serve as community leaders, and provide religious guidance. Thus for Sunnis, anyone can study the basic Islamic sciences and become an Imam. For Shia Muslims, the Imams are absolute infallible leaders of the Islamic community after the Prophet. Shias consider the term to be only applicable to the members and descendents of the Ahl al-Bayt, the family of the Islamic Prophet Muhammad. In Twelver Shiasm there are 14 infallibles, 12 of which are Imams, the final being Imam Mahdi who will return at the end of times. The title was also used by the Zaidi Shia Imams of Yemen, who eventually founded the Mutawakkilite Kingdom of Yemen (1918–1970). Sunni imams Sunni Islam does not have imams in the same sense as the Shi'a, an important distinction often overlooked by those outside of the Islamic religion. In everyday terms, an imam for Sunni Muslims is the one who leads Islamic formal (Fard) prayers, even in locations besides the mosque, whenever prayers are done in a group of two or more with one person leading (imam) and the others following by copying his ritual actions of worship. Friday sermon is most often given by an appointed imam. All mosques have an imam to lead the (congregational) prayers, even though it may sometimes just be a member from the gathered congregation rather than an officially appointed salaried person. The position of women as imams is controversial. The person that should be chosen, according to Hadith, is one who has most knowledge of the Quran and Sunnah (prophetic tradition) and is of good character. The term is also used for a recognized religious scholar or authority in Islam, often for the founding scholars of the four Sunni madhhabs, or schools of jurisprudence (fiqh). It may also refer to the Islamic scholars who created the analytical sciences related to Hadith or it may refer to the heads of Muhammad's family in their generational times. The position of imams in Turkey Imams are appointed by the state to work at mosques and they are required to be graduates of an İmam Hatip high school or have a university degree in Theology. This is an official position regulated by the Presidency of Religious Affairs in Turkey and only males are appointed to this position; while female officials under the same state organisation work as preachers and Qur'an course tutors, religious services experts, etc. These officials are supposed to belong to the Hanafi school of the Sunni sect. A central figure in an Islamic movement is also called an imam, like Imam Nawawi in Syria. Shia imams In the Shi'a context, an imam is not only presented as the man of God par excellence, but as participating fully in the names, attributes, and acts that theology usually reserves for God alone. Imams have a meaning more central to belief, referring to leaders of the community. Twelver and Ismaili Shi'a believe that these imams are chosen by God to be perfect examples for the faithful and to lead all humanity in all aspects of life. They also believe that all the imams chosen are free from committing any sin, impeccability which is called ismah. These leaders must be followed since they are appointed by God. Twelver Here follows a list of the Twelvers Shia imams: Fatimah, also Fatimah al-Zahraa, daughter of Muhammed (615–632), is also considered infallible but not an Imam. The Shi'a believe that the last Imam, the 12th Imam Mahdi will one day emerge on the Day of Resurrection (Qiyamah). Ismaili See Imamah (Ismaili doctrine) and List of Ismaili imams for Ismaili imams. Zaidi See details under Zaidiyyah, Islamic history of Yemen and Imams of Yemen. Imams as secular rulers At times, imams have held both secular and religious authority. This was the case in Oman among the Kharijite or Ibadi sects. At times, the imams were elected. At other times the position was inherited, as with the Yaruba dynasty from 1624 and 1742. See List of rulers of Oman, the Rustamid dynasty: 776–909, Nabhani dynasty: 1154–1624, the Yaruba dynasty: 1624–1742, the Al Said: 1744–present for further information. The Imamate of Futa Jallon (1727-1896) was a Fulani state in West Africa where secular power alternated between two lines of hereditary Imams, or almami. In the Zaidi Shiite sect, imams were secular as well as spiritual leaders who held power in Yemen for more than a thousand years. In 897, a Zaidi ruler, al-Hadi ila'l-Haqq Yahya, founded a line of such imams, a theocratic form of government which survived until the second half of the 20th century. (See details under Zaidiyyah, History of Yemen, Imams of Yemen.):) Ruhollah Khomeini is officially referred to as Imam in Iran. Several Iranian places and institutions are named "Imam Khomeini", including a city, an international airport, a hospital, and a university. Gallery Imams Muftis Shaykh See also Ayatollah Imam of Friday Prayer Imamate Mufti Citations General references Encyclopædia Britannica Online by Encyclopædia Britannica, Inc. External links . :) Islamic religious leaders Religious leadership roles Titles of national or ethnic leadership Islamic honorifics Imamate
[ 0.12463180720806122, 0.3326125741004944, -0.33533936738967896, -0.2933668792247772, -0.5010558366775513, -0.36674392223358154, 0.891207218170166, -0.11793669313192368, -0.1819535791873932, -0.2967633605003357, -0.978287935256958, 0.12249457091093063, -0.4409622251987457, 0.1602984964847564...
15242
https://en.wikipedia.org/wiki/Instrument%20flight%20rules
Instrument flight rules
In aviation, instrument flight rules (IFR) is one of two sets of regulations governing all aspects of civil aviation aircraft operations; the other is visual flight rules (VFR). The U.S. Federal Aviation Administration's (FAA) Instrument Flying Handbook defines IFR as: "Rules and regulations established by the FAA to govern flight under conditions in which flight by outside visual reference is not safe. IFR flight depends upon flying by reference to instruments in the flight deck, and navigation is accomplished by reference to electronic signals." It is also a term used by pilots and controllers to indicate the type of flight plan an aircraft is flying, such as an IFR or VFR flight plan. Basic information Comparison to visual flight rules It is possible and fairly straightforward, in relatively clear weather conditions, to fly a plane solely by reference to outside visual cues, such as the horizon to maintain orientation, nearby buildings and terrain features for navigation, and other aircraft to maintain separation. This is known as operating the aircraft under visual flight rules (VFR), and is the most common mode of operation for small aircraft. However, it is safe to fly VFR only when these outside references can be clearly seen from a sufficient distance; when flying through or above clouds, or in fog, rain, dust or similar low-level weather conditions, these references can be obscured. Thus, cloud ceiling and flight visibility are the most important variables for safe operations during all phases of flight. The minimum weather conditions for ceiling and visibility for VFR flights are defined in FAR Part 91.155, and vary depending on the type of airspace in which the aircraft is operating, and on whether the flight is conducted during daytime or nighttime. However, typical daytime VFR minimums for most airspace is 3 statute miles of flight visibility and a distance from clouds of 500 feet below, 1,000 feet above, and 2,000 feet horizontally. Flight conditions reported as equal to or greater than these VFR minimums are referred to as visual meteorological conditions (VMC). Any aircraft operating under VFR must have the required equipment on board, as described in FAR Part 91.205 (which includes some instruments necessary for IFR flight). VFR pilots may use cockpit instruments as secondary aids to navigation and orientation, but are not required to; the view outside of the aircraft is the primary source for keeping the aircraft straight and level (orientation), flying to the intended destination (navigation), and avoiding obstacles and hazards (separation). Visual flight rules are generally simpler than instrument flight rules, and require significantly less training and practice. VFR provides a great degree of freedom, allowing pilots to go where they want, when they want, and allows them a much wider latitude in determining how they get there. Instrument flight rules When operation of an aircraft under VFR is not safe, because the visual cues outside the aircraft are obscured by weather, instrument flight rules must be used instead. IFR permits an aircraft to operate in instrument meteorological conditions (IMC), which is essentially any weather condition less than VMC but in which aircraft can still operate safely. Use of instrument flight rules is also required when flying in "Class A" airspace regardless of weather conditions. Class A airspace extends from 18,000 feet above mean sea level to flight level 600 (60,000 feet pressure altitude) above the contiguous 48 United States and overlying the waters within 12 miles thereof. Flight in Class A airspace requires pilots and aircraft to be instrument equipped and rated and to be operating under instrument flight rules (IFR). In many countries commercial airliners and their pilots must operate under IFR as the majority of flights enter Class A airspace. Procedures and training are significantly more complex compared to VFR instruction, as a pilot must demonstrate competency in conducting an entire cross-country flight solely by reference to instruments. Instrument pilots must meticulously evaluate weather, create a detailed flight plan based around specific instrument departure, en route, and arrival procedures, and dispatch the flight. Separation and clearance The distance by which an aircraft avoids obstacles or other aircraft is termed separation. The most important concept of IFR flying is that separation is maintained regardless of weather conditions. In controlled airspace, air traffic control (ATC) separates IFR aircraft from obstacles and other aircraft using a flight clearance based on route, time, distance, speed, and altitude. ATC monitors IFR flights on radar, or through aircraft position reports in areas where radar coverage is not available. Aircraft position reports are sent as voice radio transmissions. In the United States, a flight operating under IFR is required to provide position reports unless ATC advises a pilot that the plane is in radar contact. The pilot must resume position reports after ATC advises that radar contact has been lost, or that radar services are terminated. IFR flights in controlled airspace require an ATC clearance for each part of the flight. A clearance always specifies a clearance limit, which is the farthest the aircraft can fly without a new clearance. In addition, a clearance typically provides a heading or route to follow, altitude, and communication parameters, such as frequencies and transponder codes. In uncontrolled airspace, ATC clearances are unavailable. In some states a form of separation is provided to certain aircraft in uncontrolled airspace as far as is practical (often known under ICAO as an advisory service in class G airspace), but separation is not mandated nor widely provided. Despite the protection offered by flight in controlled airspace under IFR, the ultimate responsibility for the safety of the aircraft rests with the pilot in command, who can refuse clearances. Weather It is essential to differentiate between flight plan type (VFR or IFR) and weather conditions (VMC or IMC). While current and forecast weather may be a factor in deciding which type of flight plan to file, weather conditions themselves do not affect one's filed flight plan. For example, an IFR flight that encounters visual meteorological conditions (VMC) en route does not automatically change to a VFR flight, and the flight must still follow all IFR procedures regardless of weather conditions. In the US, weather conditions are forecast broadly as VFR, MVFR (marginal visual flight rules), IFR, or LIFR (low instrument flight rules). The main purpose of IFR is the safe operation of aircraft in instrument meteorological conditions (IMC). The weather is considered to be MVFR or IMC when it does not meet the minimum requirements for visual meteorological conditions (VMC). To operate safely in IMC ("actual instrument conditions"), a pilot controls the aircraft relying on flight instruments and ATC provides separation. It is important not to confuse IFR with IMC. A significant amount of IFR flying is conducted in visual meteorological conditions (VMC). Anytime a flight is operating in VMC and in a volume of airspace in which VFR traffic can operate, the crew is responsible for seeing and avoiding VFR traffic; however, because the flight is conducted under instrument flight rules, ATC still provides separation services from other IFR traffic, and can in many cases also advise the crew of the location of VFR traffic near the flight path. Although dangerous and illegal, a certain amount of VFR flying is conducted in IMC. A scenario is a VFR pilot taking off in VMC conditions, but encountering deteriorating visibility while en route. Continued VFR flight into IMC can lead to spatial disorientation of the pilot which is the cause of a significant number of general aviation crashes. VFR flight into IMC is distinct from "VFR-on-top", an IFR procedure in which the aircraft operates in VMC using a hybrid of VFR and IFR rules, and "VFR over the top", a VFR procedure in which the aircraft takes off and lands in VMC but flies above an intervening area of IMC. Also possible in many countries is "Special VFR" flight, where an aircraft is explicitly granted permission to operate VFR within the controlled airspace of an airport in conditions technically less than VMC; the pilot asserts they have the necessary visibility to fly despite the weather, must stay in contact with ATC, and cannot leave controlled airspace while still below VMC minimums. During flight under IFR, there are no visibility requirements, so flying through clouds (or other conditions where there is zero visibility outside the aircraft) is legal and safe. However, there are still minimum weather conditions that must be present in order for the aircraft to take off or to land; these vary according to the kind of operation, the type of navigation aids available, the location and height of terrain and obstructions in the vicinity of the airport, equipment on the aircraft, and the qualifications of the crew. For example, Reno-Tahoe International Airport (KRNO) in a mountainous region has significantly different instrument approaches for aircraft landing on the same runway surface, but from opposite directions. Aircraft approaching from the north must make visual contact with the airport at a higher altitude than when approaching from the south because of rapidly rising terrain south of the airport. This higher altitude allows a flight crew to clear the obstacle if a landing is aborted. In general, each specific instrument approach specifies the minimum weather conditions to permit landing. Although large airliners, and increasingly, smaller aircraft, carry their own terrain awareness and warning system (TAWS), these are primarily backup systems providing a last layer of defense if a sequence of errors or omissions causes a dangerous situation. Navigation Because IFR flights often take place without visual reference to the ground, a means of navigation other than looking outside the window is required. A number of navigational aids are available to pilots, including ground-based systems such as DME/VORs and NDBs as well as the satellite-based GPS/GNSS system. Air traffic control may assist in navigation by assigning pilots specific headings ("radar vectors"). The majority of IFR navigation is given by ground- and satellite-based systems, while radar vectors are usually reserved by ATC for sequencing aircraft for a busy approach or transitioning aircraft from takeoff to cruise, among other things. Procedures Specific procedures allow IFR aircraft to transition safely through every stage of flight. These procedures specify how an IFR pilot should respond, even in the event of a complete radio failure, and loss of communications with ATC, including the expected aircraft course and altitude. Departures are described in an IFR clearance issued by ATC prior to takeoff. The departure clearance may contain an assigned heading, one or more waypoints, and an initial altitude to fly. The clearance can also specify a departure procedure (DP) or standard instrument departure (SID) that should be followed unless "NO DP" is specified in the notes section of the filed flight plan. Here is an example of an IFR clearance for a Cessna aircraft traveling from Palo Alto airport (KPAO) to Stockton airport (KSCK). Detailed explanation: "Cessna 21756" Verifies that only this specific aircraft is cleared. "cleared to Stockton Airport" Clearance Limit: the farthest destination the aircraft is allowed to go under IFR (in most cases it is the destination airport). "via turn right heading zero-six-zero within one mile of the airport." The pilot is expected to execute the right turn to 060° magnetic heading without further ATC prompting within one mile of the departure airport. "Radar vectors San Jose" The departure controller will provide directional guidance to the San Jose VOR. "Then as filed." After arriving at the San Jose VOR, the pilot will likely resume navigation without ATC prompts along the airways and intersections that were filed in their flight plan. "Maintain three thousand ..." After takeoff, climb to an indicated altitude of 3000 feet above sea level. "... expect five thousand five minutes after departure." The next altitude assignment is probably going to be 5000 feet above sea level. However, pilots must follow actual ATC altitude assignments throughout the flight. This portion of the clearance provides a backup if communications are lost, allowing the flight to continue and climb to 5000 feet. "Departure frequency is one two one decimal three." After the aircraft is airborne and the tower controller tells the pilot to "contact departure", pilots are to contact the departure controller on this communication frequency. "Squawk four two six three." The pilot should set the aircraft's transponder code to 4263 so that ATC can positively identify the flight on radar. The clearance scheme, used by ATC, can be easily remembered using the acronym "CRAFT"Clearance Limit - Route - Altitudes - Frequencies - Transponder (Squawk) En route flight is described by IFR charts showing navigation aids, fixes, and standard routes called airways. Aircraft with appropriate navigational equipment such as GPS, are also often cleared for a direct-to routing, where only the destination, or a few navigational waypoints are used to describe the route that the flight will follow. ATC will assign altitudes in its initial clearance or amendments thereto, and navigational charts indicate minimum safe altitudes for airways. The approach portion of an IFR flight may begin with a standard terminal arrival route (STAR), describing common routes to fly to arrive at an initial approach fix (IAF) from which an instrument approach commences. An instrument approach terminates either by the pilot acquiring sufficient visual reference to proceed to the runway, or with a missed approach because the required visual reference is not seen in time. Qualifications Pilot To fly under IFR, a pilot must have an instrument rating and must be current (meet recency of experience requirements). In the United States, to file and fly under IFR, a pilot must be instrument-rated and, within the preceding six months, have flown six instrument approaches, as well as holding procedures and course interception and tracking with navaids. Flight under IFR beyond six months after meeting these requirements is not permitted; however, currency may be reestablished within the next six months by completing the requirements above. Beyond the twelfth month, examination ("instrument proficiency check") by an instructor is required. Practicing instrument approaches can be done either in the instrument meteorological conditions or in visual meteorological conditions – in the latter case, a safety pilot is required so that the pilot practicing instrument approaches can wear a view-limiting device which restricts his field of view to the instrument panel. A safety pilot's primary duty is to observe and avoid other traffic. In the UK, an IR (UK restricted) - formerly the "IMC rating" - which permits flight under IFR in airspace classes B to G in instrument meteorological conditions, a non-instrument-rated pilot can also elect to fly under IFR in visual meteorological conditions outside controlled airspace. Compared to the rest of the world, the UK's flight crew licensing regime is somewhat unusual in its licensing for meteorological conditions and airspace, rather than flight rules. Aircraft The aircraft must be equipped and type-certified for instrument flight, and the related navigational equipment must have been inspected or tested within a specific period of time prior to the instrument flight. In the United States, instruments required for IFR flight in addition to those that are required for VFR flight are: heading indicator, sensitive altimeter adjustable for barometric pressure, clock with a sweep-second pointer or digital equivalent, attitude indicator, radios and suitable avionics for the route to be flown, alternator or generator, gyroscopic rate-of-turn indicator that is either a turn coordinator or the turn and bank indicator. From 1999 single-engine helicopters could not be FAA-certified for IFR. Recently, however, Bell and Leonardo have certified the single engine helicopters for instrument flight rules. See also Acronyms and abbreviations in avionics Aeronautical chart Airspace class Approach plate Autoland Autopilot Bárány chair Distance measuring equipment Flight instruments Helmet fire Instrument landing system Non-directional beacon Transponder landing system VHF omnidirectional range References External links FAA website Hear audio of a US instrument rating checkride - Part 1 "Blind Flying, January 1933, Popular Mechanics details on blind flying for that era ATC Communication, A complete pilot-to-ATC communication reference Aviation law Avionics Civil aviation
[ 0.41606074571609497, 0.3853246569633484, 0.5402559638023376, 0.03258310258388519, -0.016558783128857613, -0.18276670575141907, 0.06345674395561218, -0.5447723269462585, -0.17259162664413452, -0.3976692855358124, -0.30105122923851013, 0.480857789516449, -0.2596678137779236, -0.3222179710865...
15245
https://en.wikipedia.org/wiki/Ismail%20Khan
Ismail Khan
Mohammad Ismail Khan (Dari/Pashto: محمد اسماعیل خان) (born 1946) is an Afghan former politician who served as Minister of Energy and Water from 2005 to 2013 and before that served as the governor of Herat Province. Originally a captain in the national army, he is widely known as a former warlord as he controlled a large mujahideen force, mainly his fellow Tajiks from western Afghanistan, during the Soviet–Afghan War. His reputation gained him the nickname Lion of Herat. Ismail Khan was a key member of the now exiled political party Jamiat-e Islami and of the now defunct United National Front party. In 2021, Ismail Khan returned to arms to help defend Herat from the Taliban's offensive, which he and the Afghan Army lost. He was then captured by the Taliban forces and then reportedly fled to Iran on 16 August 2021. Early years and rise to power Khan was born in or about 1946 in the Shindand District of Herat Province in Afghanistan. His family is from the Chahar-Mahal neighbourhood of Shindand. In early 1979 Ismail Khan was a Captain in the Afghan National Army based in the western city of Herat. In early March of that year, there was a protest in front of the Communist governor's palace against the arrests and assassinations being carried out in the countryside by the Khalq government. The governor's troops opened fire on the demonstrators, who proceeded to storm the palace and hunt down Soviet advisers. The Herat garrison mutinied and joined the revolt in what is called the Herat uprising, with Ismail Khan and other officers distributing all available weapons to the insurgents. The government led by Nur Mohammed Taraki responded, pulverizing the city using Soviet supplied bombers and killing up to 24,000 citizens in less than a week. This event marked the opening salvo of the rebellion which led to the Soviet military intervention in Afghanistan in December 1979. Ismail Khan escaped to the countryside where he began to assemble a local rebel force. During the ensuing war, he became the leader of the western command of Burhanuddin Rabbani's Jamiat-e-Islami, political party. With Ahmad Shah Massoud, he was one of the most respected mujahideen leaders. In 1992, three years after the Soviet withdrawal from Afghanistan, the mujahideen captured Herat and Ismail Khan became governor. In 1995, he successfully defended his province against the Taliban, in cooperation with defense minister Ahmad Shah Massoud. Khan even tried to attack the Taliban stronghold of Kandahar, but was repulsed. Later in September, an ally of the Jamiat, Uzbek General Abdul Rashid Dostum changed sides, and attacked Herat. Ismail Khan was forced to flee to neighboring Iran with 8,000 men and the Taliban took over Herat Province. Two years later, while organizing opposition to the Taliban in Faryab area, he was betrayed and captured by Abdul Majid Rouzi who had defected to the Taliban along with Abdul Malik Pahlawan, then one of Dostum's deputies. Then in March 1999 he escaped from Kandahar prison. During the U.S. intervention in Afghanistan, he fought against the Taliban within the United Islamic Front for the Salvation of Afghanistan (Northern Alliance) and thus regained his position as Governor of Herat after they were victorious in December 2001. Karzai administration and return to Afghanistan After returning to Herat, Ismail Khan quickly consolidated his control over the region. He took over control of the city from the local ulema and quickly established control over the trade route between Herat and Iran, a large source of revenue. As Emir of Herat, Ismail Khan exercised great autonomy, providing social welfare for Heratis, expanding his power into neighbouring provinces, and maintaining direct international contacts. Although hated by the educated in Herat and often accused of human rights abuses, Ismail Khan's regime provided security, paid government employees, and made investments in public services. However, during his tenure as governor, Ismail Khan was accused of ruling his province like a private fiefdom, leading to increasing tensions with the Afghan Transitional Administration. In particular, he refused to pass on to the government the revenues gained from custom taxes on goods from Iran and Turkmenistan. On 13 August 2003, President Karzai removed Governor Ismail Khan from his command of the 4th Corps. This was announced as part of a programme removing the ability of officials to hold both civilian and military posts. Ismail Khan was ultimately removed from power in March 2004 due to pressure by neighbouring warlords and the central Afghan government. Various sources have presented different versions of the story, and the exact dynamics cannot be known with certainty. What is known is that Ismail Khan found himself at odds with a few regional commanders who, although theoretically his subordinates, attempted to remove him from power. Ismail Khan claims that these efforts began with a botched assassination attempt. Afterwards, these commanders moved their forces near Herat. Ismail Khan, unpopular with the Herati military class, was slow to mobilise his forces, perhaps waiting for the threat to Herat to become existential as a means to motivate his forces. However, the conflict was stopped with the intervention of International Security Assistance Force forces and soldiers of the Afghan National Army, freezing the conflict in its tracks. Ismail Khan's forces even fought skirmishes with the Afghan National Army, in which his son, Mirwais Sadiq was killed. Because Ismail Khan was contained by the Afghan National Army, the warlords who opposed him were quickly able to occupy strategic locations unopposed. Ismail Khan was forced to give up his governorship and to go to Kabul, where he served in Hamid Karzai's cabinet as the Minister of Energy. In 2005 Ismail Khan became the Minister of Water and Energy. In late 2012, the Government of Afghanistan accused Ismail Khan of illegally distributing weapons to his supporters. About 40 members of the country's Parliament requested Ismail Khan to answer their queries. The government believes that Khan is attempting to create some kind of disruption in the country. Assassination attempt On September 27, 2009, Ismail Khan survived a suicide blast that killed 4 of his bodyguards in Herat, in western Afghanistan. He was driving to Herat Airport when a powerful explosion occurred on the way there. Taliban spokesman, Zabiullah Mujahid, claimed responsibility and said the target was Khan. Testimony requested by a Guantanamo captive Guantanamo captive Abdul Razzaq Hekmati requested Ismail Khan's testimony, when he was called before a Combatant Status Review Tribunal. Ismail Khan, like Afghan Minister of Defense Rahim Wardak, was one of the high-profile Afghans that those conducting the Tribunals ruled were "not reasonably available" to give a statement on a captive's behalf because they could not be located. Hekmati had played a key role in helping Ismail Khan escape from the Taliban in 1999. Hekmati stood accused of helping Taliban leaders escape from the custody of Hamid Karzai's government. Carlotta Gall and Andy Worthington interviewed Ismail Khan for a new The New York Times article after Hekmati died of cancer in Guantanamo. According to the New York Times Ismail Khan said he personally buttonholed the American ambassador to tell him that Hekmati was innocent, and should be released. In contrast, Hekmati was told that the State Department had been unable to locate Khan. 2021 Taliban offensive and capture In July 2021, Ismail Khan mobilized hundreds of his loyalists in Herat in support of the Afghan Armed Forces to defend the city from an offensive by the Taliban. Despite this, the city fell on 12 August 2021. After trying to escape by helicopter, Khan was captured by the Taliban. The Taliban interviewed him shortly after and claimed that he and his forces have joined them. After negotiating with the Taliban, he was allowed to return to his residence. After leaving Taliban custody, as of August 2021 Khan is living in Mashhad, Iran. He said that a conspiracy was responsible for Herat being captured by the Taliban. Controversy Ismail Khan is a controversial figure. Reporters Without Borders has charged him with muzzling the press and ordering attacks on journalists. Also Human Rights Watch has accused him of human rights abuses. Nevertheless, he remains a popular figure for some in Afghanistan. Unlike other mujahideen commanders, Khan has not been linked to large-scale massacres and atrocities such as those committed after the capture of Kabul in 1992. Following news of his dismissal, rioting broke out in the streets of Herat, and President Karzai had to ask him to make a personal appeal for calm. Notes and references External links Official site of Amir Mohammad Ismail BBC Profile: Ismail Khan GlobalSecurity.org - General Mohammad Ismail Khan 1946 births Living people Mujahideen members of the Soviet–Afghan War Afghan Tajik people Government ministers of Afghanistan Jamiat-e Islami politicians Survivors of terrorist attacks United National Front (Afghanistan) politicians Date of birth missing (living people) Governors of Herat Province Afghan warlords 20th-century Afghan military personnel Afghan military officers
[ -0.5431559681892395, 0.27076926827430725, -0.4716707468032837, 0.07239674031734467, -0.1873437613248825, 0.41907334327697754, 0.3841780126094818, -0.4518287479877472, 0.1457808017730713, -0.21227572858333588, -0.11434696614742279, -0.1276477873325348, -0.8632314205169678, 0.278458446264266...
15250
https://en.wikipedia.org/wiki/Indigo
Indigo
Indigo is a deep color close to the color wheel blue (a primary color in the RGB color space), as well as to some variants of ultramarine, based on the ancient dye of the same name. The word "indigo" comes from the Latin for Indian as the dye was originally exported to Europe from India. It is traditionally regarded as a color in the visible spectrum, as well as one of the seven colors of the rainbow: the color between blue and violet; however, sources differ as to its actual position in the electromagnetic spectrum. The first known recorded use of indigo as a color name in English was in 1289. History Indigofera tinctoria and related species were cultivated in East Asia, Egypt, India, and Peru in antiquity. The earliest direct evidence for the use of indigo dates to around 4000 BC and comes from Huaca Prieta, in contemporary Peru. Pliny the Elder mentions India as the source of the dye after which it was named. It was imported from there in small quantities via the Silk Road. The Ancient Greek term for the dye was ("Indian dye"), which, adopted to Latin (second declension case) as indicum or indico and via Portuguese, gave rise to the modern word indigo. Spanish explorers discovered an American species of indigo and began to cultivate the product in Guatemala. The English and French subsequently began to encourage indigo cultivation in their colonies in the West Indies. In North America, indigo was introduced by Eliza Lucas into colonial South Carolina, where it became the colony's second-most important cash crop (after rice). Before the Revolutionary War, indigo accounted for more than one-third of the value of exports from the American colonies. Blue dye can be made from two different types of plants: the indigo plant, which produces the best results, and from the woad plant Isatis tinctoria, also known as pastel. For a long time, woad was the main source of blue dye in Europe. Woad was replaced by true indigo as trade routes opened up, and both plant sources have now been largely replaced by synthetic dyes. Classification as a spectral color The Early Modern English word indigo referred to the dye, not to the color (hue) itself, and indigo is not traditionally part of the basic color-naming system. Modern sources place indigo in the electromagnetic spectrum between 420 and 450 nanometers, which lies on the short-wave side of color wheel (RGB) blue, towards (spectral) violet. The correspondence of this definition with colors of actual indigo dyes, though, is disputed. Optical scientists Hardy and Perrin list indigo as between 445 and 464 nm wavelength, which occupies a spectrum segment from roughly the color wheel (RGB) blue extending to the long-wave side, towards azure. Isaac Newton introduced indigo as one of the seven base colors of his work. In the mid-1660s, when Newton bought a pair of prisms at a fair near Cambridge, the East India Company had begun importing indigo dye into England, supplanting the homegrown woad as source of blue dye. In a pivotal experiment in the history of optics, the young Newton shone a narrow beam of sunlight through a prism to produce a rainbow-like band of colors on the wall. In describing this optical spectrum, Newton acknowledged that the spectrum had a continuum of colors, but named seven: "The originall or primary colours are Red, yellow, Green, Blew, & a violet purple; together with Orang, Indico, & an indefinite varietie of intermediate gradations." He linked the seven prismatic colors to the seven notes of a western major scale, as shown in his color wheel, with orange and indigo as the semitones. Having decided upon seven colors, he asked a friend to repeatedly divide up the spectrum that was projected from the prism onto the wall: I desired a friend to draw with a pencil lines cross the image, or pillar of colours, where every one of the seven aforenamed colours was most full and brisk, and also where he judged the truest confines of them to be, whilst I held the paper so, that the said image might fall within a certain compass marked on it. And this I did, partly because my own eyes are not very critical in distinguishing colours, partly because another, to whom I had not communicated my thoughts about this matter, could have nothing but his eyes to determine his fancy in making those marks. Indigo is therefore counted as one of the traditional colors of the rainbow, the order of which is given by the mnemonics "Richard of York gave battle in vain" and Roy G. Biv. James Clerk Maxwell and Hermann von Helmholtz accepted indigo as an appropriate name for the color flanking violet in the spectrum. Later scientists concluded that Newton named the colors differently from current usage. According to Gary Waldman, "A careful reading of Newton's work indicates that the color he called indigo, we would normally call blue; his blue is then what we would name blue-green, cyan or light blue." If this is true, Newton's seven spectral colors would have been: Red: Orange: Yellow: Green: Blue: Indigo: Violet: The human eye does not readily differentiate hues in the wavelengths between what are now called blue and violet. If this is where Newton meant indigo to lie, most individuals would have difficulty distinguishing indigo from its neighbors. According to Isaac Asimov, "It is customary to list indigo as a color lying between blue and violet, but it has never seemed to me that indigo is worth the dignity of being considered a separate color. To my eyes, it seems merely deep blue." Modern color scientists typically divide the spectrum between violet and blue at about 450 nm, with no indigo. Distinction among the four major tones of indigo Like many other colors (orange, rose, and violet are the best-known), indigo gets its name from an object in the natural world—the plant named indigo once used for dyeing cloth (see also Indigo dye). The color "electric indigo" is a bright and saturated color between the traditional indigo and violet. This is the brightest color indigo that can be approximated on a computer screen; it is a color located between the (primary) blue and the color violet of the RGB color wheel. The web color blue violet or deep indigo is a tone of indigo brighter than pigment indigo, but not as bright as electric indigo. The color pigment indigo is equivalent to the web color indigo and approximates the color indigo that is usually reproduced in pigments and colored pencils. The color of indigo dye is a different color from either spectrum indigo or pigment indigo. This is the actual color of the dye. A vat full of this dye is a darker color, approximating the web color midnight blue. Below are displayed these four major tones of indigo. Electric indigo "Electric indigo" is brighter than the pigment indigo reproduced below. When plotted on the CIE chromaticity diagram, this color is at 435 nanometers, in the middle of the portion of the spectrum traditionally considered indigo, i.e., between 450 and 420 nanometers. This color is only an approximation of spectral indigo, since actual spectral colors are outside the gamut of the sRGB color system. Deep indigo (web color blue-violet) At right is displayed the web color "blue-violet", a color intermediate in brightness between electric indigo and pigment indigo. It is also known as "deep indigo". Web color indigo The color box on the right displays the web color indigo, the color indigo as it would be reproduced by artists' paints as opposed to the brighter indigo above (electric indigo) that is possible to reproduce on a computer screen. Its hue is closer to violet than to indigo dye for which the color is named. Pigment indigo can be obtained by mixing 55% pigment cyan with about 45% pigment magenta. Compare the subtractive colors to the additive colors in the two primary color charts in the article on primary colors to see the distinction between electric colors as reproducible from light on a computer screen (additive colors) and the pigment colors reproducible with pigments (subtractive colors); the additive colors are significantly brighter because they are produced from light instead of pigment. Web color indigo represents the way the color indigo was always reproduced in pigments, paints, or colored pencils in the 1950s. By the 1970s, because of the advent of psychedelic art, artists became accustomed to brighter pigments. Pigments called "bright indigo" or "bright blue-violet" (the pigment equivalent of the electric indigo reproduced in the section above) became available in artists' pigments and colored pencils. Tropical indigo 'Tropical Indigo' is the color that is called añil in the Guía de coloraciones (Guide to colorations) by Rosa Gallego and Juan Carlos Sanz, a color dictionary published in 2005 that is widely popular in the Hispanophone realm. Indigo dye Indigo dye is a greenish dark blue color, obtained from either the leaves of the tropical Indigo plant (Indigofera), or from woad (Isatis tinctoria), or the Chinese indigo (Persicaria tinctoria). Many societies make use of the Indigofera plant for producing different shades of blue. Cloth that is repeatedly boiled in an indigo dye bath-solution (boiled and left to dry, boiled and left to dry, etc.), the blue pigment becomes darker on the cloth. After dyeing, the cloth is hung in the open air to dry. A Native American woman described the process used by the Cherokee Indians when extracting the dye: We raised our indigo which we cut in the morning while the dew was still on it; then we put it in a tub and soaked it overnight, and the next day we foamed it up by beating it with a gourd. We let it stand overnight again, and the next day rubbed tallow on our hands to kill the foam. Afterwards, we poured the water off, and the sediment left in the bottom we would pour into a pitcher or crock to let it get dry, and then we would put it into a poke made of cloth (i.e. sack made of coarse cloth) and then when we wanted any of it to dye [there]with, we would take the dry indigo. In Sa Pa, Vietnam, the tropical Indigo (Indigo tinctoria) leaves are harvested and, while still fresh, placed inside a tub of room-temperature to lukewarm water where they are left to sit for 3 to 4 days and allowed to ferment, until the water turns green. Afterwards, crushed limestone (pickling lime) is added to the water, at which time the water with the leaves are vigorously agitated for 15 to 20 minutes, until the water turns blue. The blue pigment settles as sediment at the bottom of the tub. The sediment is scooped out and stored. When dyeing cloth, the pigment is then boiled in a vat of water; the cloth (usually made from yarns of hemp) is inserted into the vat for absorbing the dye. After hanging out to dry, the boiling process is repeated as often as needed to produce a darker color. Imperial blue In nature Birds Male indigobirds are a very dark, metallic blue. The indigo bunting, native to North America, is mostly bright cerulean blue with an indigo head. The related blue grosbeak is, ironically, more indigo than the indigo bunting. Fungi Lactarius indigo is one of the very few species of mushrooms colored in tones of blue. Snakes The eastern indigo snake, Drymarchon couperi, of the southeastern United States, is a dark blue/black. In culture Literature Marina Warner's novel Indigo (1992) is a retelling of Shakespeare's The Tempest and features the production of indigo dye by Sycorax. Business IndiGo is an Indian budget airline that uses an indigo logo and operates only Airbus A320s. Indigo Books and Music uses an indigo logo and has sometimes referred to the color as "blue" in advertising. Computer graphics Electric indigo is sometimes used as a glow color for computer graphics lighting, possibly because it seems to change color from indigo to lavender when blended with white. Dyes Indigo dye was used to dye denim, giving the original 'blue jeans' their distinctive colour. Guatemala, as of 1778, was considered one of the world's foremost providers of indigo. In Mexico, indigo is known as añil. After silver, and cochineal to produce red, añil was the most important product exported by historical Mexico. The use of añil is survived in the Philippines, particularly in the Visayas and Mindanao. The powder dye is mixed with vinegar to be applied to the cheek of a person suffering from mumps. Food Scientists discovered in 2008 that when a banana becomes ripe, it glows bright indigo under a black light. Some insects, as well as birds, see into the ultraviolet, because they are tetrachromats and can use this information to tell when a banana is ready to eat. The glow is the result of a chemical created as the green chlorophyll in the peel breaks down. Military The French Army adopted dark blue indigo at the time of the French Revolution, as a replacement for the white uniforms previously worn by the Royal infantry regiments. In 1806, Napoleon decided to restore the white coats because of shortages of indigo dye imposed by the British continental blockade. However, the greater practicability of the blue color led to its retention, and indigo remained the dominant color of French military coats until 1914. Spirituality The spiritualist applications use electric indigo, because the color is positioned between blue and violet on the spectrum. The color electric indigo is used in New Age philosophy to symbolically represent the sixth chakra (called Ajna), which is said to include the third eye. This chakra is believed to be related to intuition and gnosis (spiritual knowledge). Alice A. Bailey used indigo as the "second ray", representing "Love-Wisdom", in her Seven Rays system classifying people into seven metaphysical psychological types. Psychics often associate indigo paranormal auras with an interest in religion or with intense spirituality and intuition. Indigo children are said to have predominantly indigo auras. People with indigo auras are said to favor occupations such as computer analyst, animal caretaker, and counselor. In Paganism, it represents emotion, fluidity, insight, and expressiveness. It is used to spiritually heal. See also Baptisia (false indigo), a genus of flowering plants Champaran Satyagraha, the first pacifist rebellion of Mahatma Gandhi against the British Raj Indigofera, a genus of flowering plants Indiglo, a brand name for a method of electroluminescence technology Lists of colors Persicaria tinctoria, Japanese Indigo Rainbow, indigo is usually the sixth listed color of the rainbow Indigo dye, used in dyeing blue jeans their characteristic color References External links Tertiary colors Quaternary colors Optical spectrum Rainbow colors Shades of blue
[ 0.3383556604385376, -0.18313761055469513, -0.6300680041313171, -0.03357696905732155, 0.039467547088861465, 0.011664396151900291, 0.012814397923648357, 0.4319765269756317, -0.08951085060834885, -0.5839840769767761, -0.25239643454551697, 0.07062163949012756, -0.2219824343919754, 0.7135442495...
15251
https://en.wikipedia.org/wiki/International%20Monetary%20Fund
International Monetary Fund
The International Monetary Fund (IMF) is an international financial institution, headquartered in Washington, D.C., consisting of 190 countries. Its stated mission is "working to foster global monetary cooperation, secure financial stability, facilitate international trade, promote high employment and sustainable economic growth, and reduce poverty around the world." Formed in 1944, started on 27 December 1945, at the Bretton Woods Conference primarily by the ideas of Harry Dexter White and John Maynard Keynes, it came into formal existence in 1945 with 29 member countries and the goal of reconstructing the international monetary system. It now plays a central role in the management of balance of payments difficulties and international financial crises. Countries contribute funds to a pool through a quota system from which countries experiencing balance of payments problems can borrow money. , the fund had XDR 477 billion (about US$667 billion). Through the fund and other activities such as the gathering of statistics and analysis, surveillance of its members' economies, and the demand for particular policies, the IMF works to improve the economies of its member countries. The organization's objectives stated in the Articles of Agreement are: to promote international monetary co-operation, international trade, high employment, exchange-rate stability, sustainable economic growth, and making resources available to member countries in financial difficulty. IMF funds come from two major sources: quotas and loans. Quotas, which are pooled funds of member nations, generate most IMF funds. The size of a member's quota depends on its economic and financial importance in the world. Nations with greater economic significance have larger quotas. The quotas are increased periodically as a means of boosting the IMF's resources in the form of special drawing rights. The current managing director (MD) and Chairwoman of the IMF is Bulgarian economist Kristalina Georgieva, who has held the post since October 1, 2019. Gita Gopinath, who previously served as Chief Economist was appointed as First Deputy Managing Director, effective January 21, 2022. Prior to her appointment at the IMF, Gopinath served as the economic adviser to the Chief Minister of Kerala, India. Pierre-Olivier Gourinchas replaced Gopinath as Chief Economist on January 24, 2022. Functions According to the IMF itself, it works to foster global growth and economic stability by providing policy advice and financing the members by working with developing countries to help them achieve macroeconomic stability and reduce poverty. The rationale for this is that private international capital markets function imperfectly and many countries have limited access to financial markets. Such market imperfections, together with balance-of-payments financing, provide the justification for official financing, without which many countries could only correct large external payment imbalances through measures with adverse economic consequences. The IMF provides alternate sources of financing such as the Poverty Reduction and Growth Facility. Upon the founding of the IMF, its three primary functions were: to oversee the fixed exchange rate arrangements between countries, thus helping national governments manage their exchange rates and allowing these governments to prioritize economic growth, and to provide short-term capital to aid the balance of payments. This assistance was meant to prevent the spread of international economic crises. The IMF was also intended to help mend the pieces of the international economy after the Great Depression and World War II as well as to provide capital investments for economic growth and projects such as infrastructure. The IMF's role was fundamentally altered by the floating exchange rates post-1971. It shifted to examining the economic policies of countries with IMF loan agreements to determine if a shortage of capital was due to economic fluctuations or economic policy. The IMF also researched what types of government policy would ensure economic recovery. A particular concern of the IMF was to prevent financial crises such as those in Mexico in 1982, Brazil in 1987, East Asia in 1997–98, and Russia in 1998, from spreading and threatening the entire global financial and currency system. The challenge was to promote and implement a policy that reduced the frequency of crises among the emerging market countries, especially the middle-income countries which are vulnerable to massive capital outflows. Rather than maintaining a position of oversight of only exchange rates, their function became one of surveillance of the overall macroeconomic performance of member countries. Their role became a lot more active because the IMF now manages economic policy rather than just exchange rates. In addition, the IMF negotiates conditions on lending and loans under their policy of conditionality, which was established in the 1950s. Low-income countries can borrow on concessional terms, which means there is a period of time with no interest rates, through the Extended Credit Facility (ECF), the Standby Credit Facility (SCF) and the Rapid Credit Facility (RCF). Non-concessional loans, which include interest rates, are provided mainly through the Stand-By Arrangements (SBA), the Flexible Credit Line (FCL), the Precautionary and Liquidity Line (PLL), and the Extended Fund Facility. The IMF provides emergency assistance via the Rapid Financing Instrument (RFI) to members facing urgent balance-of-payments needs. Surveillance of the global economy The IMF is mandated to oversee the international monetary and financial system and monitor the economic and financial policies of its member countries. This activity is known as surveillance and facilitates international co-operation. Since the demise of the Bretton Woods system of fixed exchange rates in the early 1970s, surveillance has evolved largely by way of changes in procedures rather than through the adoption of new obligations. The responsibilities changed from those of guardians to those of overseers of members' policies. The Fund typically analyses the appropriateness of each member country's economic and financial policies for achieving orderly economic growth, and assesses the consequences of these policies for other countries and for the global economy. For instance, The IMF played a significant role in individual countries, such as Armenia and Belarus, in providing financial support to achieve stabilization financing from 2009 to 2019. The maximum sustainable debt level of a polity, which is watched closely by the IMF, was defined in 2011 by IMF economists to be 120%. Indeed, it was at this number that the Greek economy melted down in 2010. In 1995 the International Monetary Fund began to work on data dissemination standards with the view of guiding IMF member countries to disseminate their economic and financial data to the public. The International Monetary and Financial Committee (IMFC) endorsed the guidelines for the dissemination standards and they were split into two tiers: The General Data Dissemination System (GDDS) and the Special Data Dissemination Standard (SDDS). The executive board approved the SDDS and GDDS in 1996 and 1997 respectively, and subsequent amendments were published in a revised Guide to the General Data Dissemination System. The system is aimed primarily at statisticians and aims to improve many aspects of statistical systems in a country. It is also part of the World Bank Millennium Development Goals and Poverty Reduction Strategic Papers. The primary objective of the GDDS is to encourage member countries to build a framework to improve data quality and statistical capacity building to evaluate statistical needs, set priorities in improving the timeliness, transparency, reliability, and accessibility of financial and economic data. Some countries initially used the GDDS, but later upgraded to SDDS. Some entities that are not themselves IMF members also contribute statistical data to the systems: Palestinian Authority – GDDS Hong Kong – SDDS Macau – GDDS Institutions of the European Union: the European Central Bank for the Eurozone – SDDS Eurostat for the whole EU – SDDS, thus providing data from Cyprus (not using any DDSystem on its own) and Malta (using only GDDS on its own) A 2021 study found that the IMF's surveillance activities have "a substantial impact on sovereign debt with much greater impacts in emerging than high income economies." Conditionality of loans IMF conditionality is a set of policies or conditions that the IMF requires in exchange for financial resources. The IMF does require collateral from countries for loans but also requires the government seeking assistance to correct its macroeconomic imbalances in the form of policy reform. If the conditions are not met, the funds are withheld. The concept of conditionality was introduced in a 1952 executive board decision and later incorporated into the Articles of Agreement. Conditionality is associated with economic theory as well as an enforcement mechanism for repayment. Stemming primarily from the work of Jacques Polak, the theoretical underpinning of conditionality was the "monetary approach to the balance of payments". Structural adjustment Some of the conditions for structural adjustment can include: Cutting expenditures or raising revenues, also known as austerity. Focusing economic output on direct export and resource extraction, Devaluation of currencies, Trade liberalisation, or lifting import and export restrictions, Increasing the stability of investment (by supplementing foreign direct investment with the opening of facilities for the domestic market, Balancing budgets and not overspending, Removing price controls and state subsidies, Privatization, or divestiture of all or part of state-owned enterprises, Enhancing the rights of foreign investors vis-a-vis national laws, Improving governance and fighting corruption. These conditions are known as the Washington Consensus. Benefits These loan conditions ensure that the borrowing country will be able to repay the IMF and that the country will not attempt to solve their balance-of-payment problems in a way that would negatively impact the international economy. The incentive problem of moral hazard—when economic agents maximise their own utility to the detriment of others because they do not bear the full consequences of their actions—is mitigated through conditions rather than providing collateral; countries in need of IMF loans do not generally possess internationally valuable collateral anyway. Conditionality also reassures the IMF that the funds lent to them will be used for the purposes defined by the Articles of Agreement and provides safeguards that country will be able to rectify its macroeconomic and structural imbalances. In the judgment of the IMF, the adoption by the member of certain corrective measures or policies will allow it to repay the IMF, thereby ensuring that the resources will be available to support other members. , borrowing countries have had a good track record for repaying credit extended under the IMF's regular lending facilities with full interest over the duration of the loan. This indicates that IMF lending does not impose a burden on creditor countries, as lending countries receive market-rate interest on most of their quota subscription, plus any of their own-currency subscriptions that are loaned out by the IMF, plus all of the reserve assets that they provide the IMF. History 20th century The IMF was originally laid out as a part of the Bretton Woods system exchange agreement in 1944. During the Great Depression, countries sharply raised barriers to trade in an attempt to improve their failing economies. This led to the devaluation of national currencies and a decline in world trade. This breakdown in international monetary cooperation created a need for oversight. The representatives of 45 governments met at the Bretton Woods Conference in the Mount Washington Hotel in Bretton Woods, New Hampshire, in the United States, to discuss a framework for postwar international economic cooperation and how to rebuild Europe. There were two views on the role the IMF should assume as a global economic institution. American delegate Harry Dexter White foresaw an IMF that functioned more like a bank, making sure that borrowing states could repay their debts on time. Most of White's plan was incorporated into the final acts adopted at Bretton Woods. British economist John Maynard Keynes, on the other hand, imagined that the IMF would be a cooperative fund upon which member states could draw to maintain economic activity and employment through periodic crises. This view suggested an IMF that helped governments and to act as the United States government had during the New Deal to the great recession of the 1930s. The IMF formally came into existence on 27 December 1945, when the first 29 countries ratified its Articles of Agreement. By the end of 1946 the IMF had grown to 39 members. On 1 March 1947, the IMF began its financial operations, and on 8 May France became the first country to borrow from it. The IMF was one of the key organizations of the international economic system; its design allowed the system to balance the rebuilding of international capitalism with the maximization of national economic sovereignty and human welfare, also known as embedded liberalism. The IMF's influence in the global economy steadily increased as it accumulated more members. The increase reflected, in particular, the attainment of political independence by many African countries and more recently the 1991 dissolution of the Soviet Union because most countries in the Soviet sphere of influence did not join the IMF. The Bretton Woods exchange rate system prevailed until 1971 when the United States government suspended the convertibility of the US$ (and dollar reserves held by other governments) into gold. This is known as the Nixon Shock. The changes to the IMF articles of agreement reflecting these changes were ratified in 1976 by the Jamaica Accords. Later in the 1970s, large commercial banks began lending to states because they were awash in cash deposited by oil exporters. The lending of the so-called money center banks led to the IMF changing its role in the 1980s after a world recession provoked a crisis that brought the IMF back into global financial governance. 21st century The IMF provided two major lending packages in the early 2000s to Argentina (during the 1998–2002 Argentine great depression) and Uruguay (after the 2002 Uruguay banking crisis). However, by the mid-2000s, IMF lending was at its lowest share of world GDP since the 1970s. In May 2010, the IMF participated, in 3:11 proportion, in the first Greek bailout that totaled €110 billion, to address the great accumulation of public debt, caused by continuing large public sector deficits. As part of the bailout, the Greek government agreed to adopt austerity measures that would reduce the deficit from 11% in 2009 to "well below 3%" in 2014. The bailout did not include debt restructuring measures such as a haircut, to the chagrin of the Swiss, Brazilian, Indian, Russian, and Argentinian Directors of the IMF, with the Greek authorities themselves (at the time, PM George Papandreou and Finance Minister Giorgos Papakonstantinou) ruling out a haircut. A second bailout package of more than €100 billion was agreed over the course of a few months from October 2011, during which time Papandreou was forced from office. The so-called Troika, of which the IMF is part, are joint managers of this programme, which was approved by the executive directors of the IMF on 15 March 2012 for XDR 23.8 billion and saw private bondholders take a haircut of upwards of 50%. In the interval between May 2010 and February 2012 the private banks of Holland, France and Germany reduced exposure to Greek debt from €122 billion to €66 billion. , the largest borrowers from the IMF in order were Greece, Portugal, Ireland, Romania, and Ukraine. On 25 March 2013, a €10 billion international bailout of Cyprus was agreed by the Troika, at the cost to the Cypriots of its agreement: to close the country's second-largest bank; to impose a one-time bank deposit levy on Bank of Cyprus uninsured deposits. No insured deposit of €100k or less were to be affected under the terms of a novel bail-in scheme. The topic of sovereign debt restructuring was taken up by the IMF in April 2013 for the first time since 2005, in a report entitled "Sovereign Debt Restructuring: Recent Developments and Implications for the Fund's Legal and Policy Framework". The paper, which was discussed by the board on 20 May, summarised the recent experiences in Greece, St Kitts and Nevis, Belize, and Jamaica. An explanatory interview with Deputy Director Hugh Bredenkamp was published a few days later, as was a deconstruction by Matina Stevis of the Wall Street Journal. In the October 2013 Fiscal Monitor publication, the IMF suggested that a capital levy capable of reducing Euro-area government debt ratios to "end-2007 levels" would require a very high tax rate of about 10%. The Fiscal Affairs department of the IMF, headed at the time by Acting Director Sanjeev Gupta, produced a January 2014 report entitled "Fiscal Policy and Income Inequality" that stated that "Some taxes levied on wealth, especially on immovable property, are also an option for economies seeking more progressive taxation ... Property taxes are equitable and efficient, but underutilized in many economies ... There is considerable scope to exploit this tax more fully, both as a revenue source and as a redistributive instrument." At the end of March 2014, the IMF secured an $18 billion bailout fund for the provisional government of Ukraine in the aftermath of the Revolution of Dignity. Response and analysis of coronavirus In late 2019, the IMF estimated global growth in 2020 to reach 3.4%, but due to the coronavirus, in November 2020, it expected the global economy to shrink by 4.4%. In March 2020, Kristalina Georgieva announced that the IMF stood ready to mobilize $1 trillion as its response to the COVID-19 pandemic. This was in addition to the $50 billion fund it had announced two weeks earlier, of which $5 billion had already been requested by Iran. One day earlier on 11 March, the UK called to pledge £150 million to the IMF catastrophe relief fund. It came to light on 27 March that "more than 80 poor and middle-income countries" had sought a bailout due to the coronavirus. On 13 April 2020, the IMF said that it "would provide immediate debt relief to 25 member countries under its Catastrophe Containment and Relief Trust (CCRT)" programme. In November 2020, the Fund warned the economic recovery may be losing momentum as COVID-19 infections rise again and that more economic help would be needed. Member countries Not all member countries of the IMF are sovereign states, and therefore not all "member countries" of the IMF are members of the United Nations. Amidst "member countries" of the IMF that are not member states of the UN are non-sovereign areas with special jurisdictions that are officially under the sovereignty of full UN member states, such as Aruba, Curaçao, Hong Kong, and Macao, as well as Kosovo. The corporate members appoint ex-officio voting members, who are listed below. All members of the IMF are also International Bank for Reconstruction and Development (IBRD) members and vice versa. Former members are Cuba (which left in 1964), and Taiwan, which was ejected from the IMF in 1980 after losing the support of then United States President Jimmy Carter and was replaced by the People's Republic of China. However, "Taiwan Province of China" is still listed in the official IMF indices. Apart from Cuba, the other UN states that do not belong to the IMF are Liechtenstein, Monaco and North Korea. However, Andorra became the 190th member on 16 October 2020. The former Czechoslovakia was expelled in 1954 for "failing to provide required data" and was readmitted in 1990, after the Velvet Revolution. Poland withdrew in 1950—allegedly pressured by the Soviet Union—but returned in 1986. Qualifications Any country may apply to be a part of the IMF. Post-IMF formation, in the early postwar period, rules for IMF membership were left relatively loose. Members needed to make periodic membership payments towards their quota, to refrain from currency restrictions unless granted IMF permission, to abide by the Code of Conduct in the IMF Articles of Agreement, and to provide national economic information. However, stricter rules were imposed on governments that applied to the IMF for funding. The countries that joined the IMF between 1945 and 1971 agreed to keep their exchange rates secured at rates that could be adjusted only to correct a "fundamental disequilibrium" in the balance of payments, and only with the IMF's agreement. Benefits Member countries of the IMF have access to information on the economic policies of all member countries, the opportunity to influence other members' economic policies, technical assistance in banking, fiscal affairs, and exchange matters, financial support in times of payment difficulties, and increased opportunities for trade and investment. Leadership Board of Governors The Board of Governors consists of one governor and one alternate governor for each member country. Each member country appoints its two governors. The Board normally meets once a year and is responsible for electing or appointing an executive director to the executive board. While the Board of Governors is officially responsible for approving quota increases, special drawing right allocations, the admittance of new members, compulsory withdrawal of members, and amendments to the Articles of Agreement and By-Laws, in practice it has delegated most of its powers to the IMF's executive board. The Board of Governors is advised by the International Monetary and Financial Committee and the Development Committee. The International Monetary and Financial Committee has 24 members and monitors developments in global liquidity and the transfer of resources to developing countries. The Development Committee has 25 members and advises on critical development issues and on financial resources required to promote economic development in developing countries. They also advise on trade and environmental issues. The Board of Governors reports directly to the managing director of the IMF, Kristalina Georgieva. Executive Board 24 Executive Directors make up the executive board. The executive directors represent all 189 member countries in a geographically based roster. Countries with large economies have their own executive director, but most countries are grouped in constituencies representing four or more countries. Following the 2008 Amendment on Voice and Participation which came into effect in March 2011, seven countries each appoint an executive director: the United States, Japan, China, Germany, France, the United Kingdom, and Saudi Arabia. The remaining 17 Directors represent constituencies consisting of 2 to 23 countries. This Board usually meets several times each week. The Board membership and constituency is scheduled for periodic review every eight years. Managing Director The IMF is led by a managing director, who is head of the staff and serves as Chairman of the executive board. The managing director is the most powerful position at the IMF. Historically, the IMF's managing director has been a European citizen and the president of the World Bank has been an American citizen. However, this standard is increasingly being questioned and competition for these two posts may soon open up to include other qualified candidates from any part of the world. In August 2019, the International Monetary Fund has removed the age limit which is 65 or over for its managing director position. In 2011, the world's largest developing countries, the BRIC states, issued a statement declaring that the tradition of appointing a European as managing director undermined the legitimacy of the IMF and called for the appointment to be merit-based. List of Managing Directors Former managing director Dominique Strauss-Kahn was arrested in connection with charges of sexually assaulting a New York hotel room attendant and resigned on 18 May. The charges were later dropped. On 28 June 2011 Christine Lagarde was confirmed as managing director of the IMF for a five-year term starting on 5 July 2011. She was re-elected by consensus for a second five-year term, starting 5 July 2016, being the only candidate nominated for the post of managing director. First Deputy Managing Director The managing director is assisted by a First Deputy managing director (FDMD) who, by convention, has always been a citizen of the United States. Together, the managing director and his/her First Deputy lead the senior management of the IMF. Like the managing director, the First Deputy traditionally serves a five-year term. List of First Deputy Managing Directors Chief Economist The chief economist leads the research division of the IMF. S/he is a member of the Senior Leadership Team of the IMF. List of Chief Economists Voting power Voting power in the IMF is based on a quota system. Each member has a number of basic votes (each member's number of basic votes equals 5.502% of the total votes), plus one additional vote for each special drawing right (SDR) of 100,000 of a member country's quota. The special drawing right is the unit of account of the IMF and represents a potential claim to currency. It is based on a basket of key international currencies. The basic votes generate a slight bias in favour of small countries, but the additional votes determined by SDR outweigh this bias. Changes in the voting shares require approval by a super-majority of 85% of voting power. In December 2015, the United States Congress adopted a legislation authorising the 2010 Quota and Governance Reforms. As a result, all 190 members' quotas will increase from a total of about XDR 238.5 billion to about XDR 477 billion, while the quota shares and voting power of the IMF's poorest member countries will be protected. more than 6 percent of quota shares will shift to dynamic emerging market and developing countries and also from over-represented to under-represented members. four emerging market countries (Brazil, China, India, and Russia) will be among the ten largest members of the IMF. Other top 10 members are the United States, Japan, Germany, France, the United Kingdom and Italy. Effects of the quota system The IMF's quota system was created to raise funds for loans. Each IMF member country is assigned a quota, or contribution, that reflects the country's relative size in the global economy. Each member's quota also determines its relative voting power. Thus, financial contributions from member governments are linked to voting power in the organization. This system follows the logic of a shareholder-controlled organization: wealthy countries have more say in the making and revision of rules. Since decision making at the IMF reflects each member's relative economic position in the world, wealthier countries that provide more money to the IMF have more influence than poorer members that contribute less; nonetheless, the IMF focuses on redistribution. Inflexibility of voting power Quotas are normally reviewed every five years and can be increased when deemed necessary by the Board of Governors. IMF voting shares are relatively inflexible: countries that grow economically have tended to become under-represented as their voting power lags behind. Currently, reforming the representation of developing countries within the IMF has been suggested. These countries' economies represent a large portion of the global economic system but this is not reflected in the IMF's decision-making process through the nature of the quota system. Joseph Stiglitz argues, "There is a need to provide more effective voice and representation for developing countries, which now represent a much larger portion of world economic activity since 1944, when the IMF was created." In 2008, a number of quota reforms were passed including shifting 6% of quota shares to dynamic emerging markets and developing countries. Overcoming borrower/creditor divide The IMF's membership is divided along income lines: certain countries provide financial resources while others use these resources. Both developed country "creditors" and developing country "borrowers" are members of the IMF. The developed countries provide the financial resources but rarely enter into IMF loan agreements; they are the creditors. Conversely, the developing countries use the lending services but contribute little to the pool of money available to lend because their quotas are smaller; they are the borrowers. Thus, tension is created around governance issues because these two groups, creditors and borrowers, have fundamentally different interests. The criticism is that the system of voting power distribution through a quota system institutionalizes borrower subordination and creditor dominance. The resulting division of the IMF's membership into borrowers and non-borrowers has increased the controversy around conditionality because the borrowers are interested in increasing loan access while creditors want to maintain reassurance that the loans will be repaid. Use A recent source revealed that the average overall use of IMF credit per decade increased, in real terms, by 21% between the 1970s and 1980s, and increased again by just over 22% from the 1980s to the 1991–2005 period. Another study has suggested that since 1950 the continent of Africa alone has received $300 billion from the IMF, the World Bank, and affiliate institutions. A study by Bumba Mukherjee found that developing democratic countries benefit more from IMF programs than developing autocratic countries because policy-making, and the process of deciding where loaned money is used, is more transparent within a democracy. One study done by Randall Stone found that although earlier studies found little impact of IMF programs on balance of payments, more recent studies using more sophisticated methods and larger samples "usually found IMF programs improved the balance of payments". Exceptional Access Framework – sovereign debt The Exceptional Access Framework was created in 2003 when John B. Taylor was Under Secretary of the US Treasury for International Affairs. The new Framework became fully operational in February 2003 and it was applied in the subsequent decisions on Argentina and Brazil. Its purpose was to place some sensible rules and limits on the way the IMF makes loans to support governments with debt problem—especially in emerging markets—and thereby move away from the bailout mentality of the 1990s. Such a reform was essential for ending the crisis atmosphere that then existed in emerging markets. The reform was closely related to and put in place nearly simultaneously with the actions of several emerging market countries to place collective action clauses in their bond contracts. In 2010, the framework was abandoned so the IMF could make loans to Greece in an unsustainable and political situation. The topic of sovereign debt restructuring was taken up by IMF staff in April 2013 for the first time since 2005, in a report entitled "Sovereign Debt Restructuring: Recent Developments and Implications for the Fund's Legal and Policy Framework". The paper, which was discussed by the board on 20 May, summarised the recent experiences in Greece, St Kitts and Nevis, Belize and Jamaica. An explanatory interview with Deputy Director Hugh Bredenkamp was published a few days later, as was a deconstruction by Matina Stevis of the Wall Street Journal. The staff was directed to formulate an updated policy, which was accomplished on 22 May 2014 with a report entitled "The Fund's Lending Framework and Sovereign Debt: Preliminary Considerations", and taken up by the executive board on 13 June. The staff proposed that "in circumstances where a (Sovereign) member has lost market access and debt is considered sustainable ... the IMF would be able to provide Exceptional Access on the basis of a debt operation that involves an extension of maturities", which was labeled a "reprofiling operation". These reprofiling operations would "generally be less costly to the debtor and creditors—and thus to the system overall—relative to either an upfront debt reduction operation or a bail-out that is followed by debt reduction ... (and) would be envisaged only when both (a) a member has lost market access and (b) debt is assessed to be sustainable, but not with high probability ... Creditors will only agree if they understand that such an amendment is necessary to avoid a worse outcome: namely, a default and/or an operation involving debt reduction ... Collective action clauses, which now exist in most—but not all—bonds would be relied upon to address collective action problems." Impact According to a 2002 study by Randall W. Stone, the academic literature on the IMF shows "no consensus on the long-term effects of IMF programs on growth". Some research has found that IMF loans can reduce the chance of a future banking crisis, while other studies have found that they can increase the risk of political crises. IMF programs can reduce the effects of a currency crisis. Some research has found that IMF programs are less effective in countries which possess a developed-country patron (be it by foreign aid, membership of postcolonial institutions or UN voting patterns), seemingly due to this patron allowing countries to flaunt IMF program rules as these rules are not consistently enforced. Some research has found that IMF loans reduce economic growth due to creating an economic moral hazard, reducing public investment, reducing incentives to create a robust domestic policies and reducing private investor confidence. Other research has indicated that IMF loans can have a positive impact on economic growth and that their effects are highly nuanced. Criticisms Overseas Development Institute (ODI) research undertaken in 1980 included criticisms of the IMF which support the analysis that it is a pillar of what activist Titus Alexander calls global apartheid. Developed countries were seen to have a more dominant role and control over less developed countries (LDCs). The Fund worked on the incorrect assumption that all payments disequilibria were caused domestically. The Group of 24 (G-24), on behalf of LDC members, and the United Nations Conference on Trade and Development (UNCTAD) complained that the IMF did not distinguish sufficiently between disequilibria with predominantly external as opposed to internal causes. This criticism was voiced in the aftermath of the 1973 oil crisis. Then LDCs found themselves with payment deficits due to adverse changes in their terms of trade, with the Fund prescribing stabilization programmes similar to those suggested for deficits caused by government over-spending. Faced with long-term, externally generated disequilibria, the G-24 argued for more time for LDCs to adjust their economies. Some IMF policies may be anti-developmental; the report said that deflationary effects of IMF programmes quickly led to losses of output and employment in economies where incomes were low and unemployment was high. Moreover, the burden of the deflation is disproportionately borne by the poor. The IMF's initial policies were based in theory and influenced by differing opinions and departmental rivalries. Critics suggest that its intentions to implement these policies in countries with widely varying economic circumstances were misinformed and lacked economic rationale. ODI conclusions were that the IMF's very nature of promoting market-oriented approaches attracted unavoidable criticism. On the other hand, the IMF could serve as a scapegoat while allowing governments to blame international bankers. The ODI conceded that the IMF was insensitive to political aspirations of LDCs while its policy conditions were inflexible. Argentina, which had been considered by the IMF to be a model country in its compliance to policy proposals by the Bretton Woods institutions, experienced a catastrophic economic crisis in 2001, which some believe to have been caused by IMF-induced budget restrictions—which undercut the government's ability to sustain national infrastructure even in crucial areas such as health, education, and security—and privatisation of strategically vital national resources. Others attribute the crisis to Argentina's misdesigned fiscal federalism, which caused subnational spending to increase rapidly. The crisis added to widespread hatred of this institution in Argentina and other South American countries, with many blaming the IMF for the region's economic problems. The current—as of early 2006—trend toward moderate left-wing governments in the region and a growing concern with the development of a regional economic policy largely independent of big business pressures has been ascribed to this crisis. In 2006, a senior ActionAid policy analyst Akanksha Marphatia stated that IMF policies in Africa undermine any possibility of meeting the Millennium Development Goals (MDGs) due to imposed restrictions that prevent spending on important sectors, such as education and health. In an interview (2008-05-19), the former Romanian Prime Minister Călin Popescu-Tăriceanu claimed that "Since 2005, IMF is constantly making mistakes when it appreciates the country's economic performances". Former Tanzanian President Julius Nyerere, who claimed that debt-ridden African states were ceding sovereignty to the IMF and the World Bank, famously asked, "Who elected the IMF to be the ministry of finance for every country in the world?" Former chief economist of IMF and former Reserve Bank of India (RBI) Governor Raghuram Rajan who predicted the Financial crisis of 2007–08 criticised the IMF for remaining a sideline player to the developed world. He criticised the IMF for praising the monetary policies of the US, which he believed were wreaking havoc in emerging markets. He had been critical of the ultra-loose money policies of the Western nations and IMF. Countries such as Zambia have not received proper aid with long-lasting effects, leading to concern from economists. Since 2005, Zambia (as well as 29 other African countries) did receive debt write-offs, which helped with the country's medical and education funds. However, Zambia returned to a debt of over half its GDP in less than a decade. American economist William Easterly, sceptical of the IMF's methods, had initially warned that "debt relief would simply encourage more reckless borrowing by crooked governments unless it was accompanied by reforms to speed up economic growth and improve governance," according to The Economist. Conditionality The IMF has been criticised for being "out of touch" with local economic conditions, cultures, and environments in the countries they are requiring policy reform. The economic advice the IMF gives might not always take into consideration the difference between what spending means on paper and how it is felt by citizens. Countries charge that with excessive conditionality, they do not "own" the programs and the links are broken between a recipient country's people, its government, and the goals being pursued by the IMF. Jeffrey Sachs argues that the IMF's "usual prescription is 'budgetary belt tightening to countries who are much too poor to own belts. Sachs wrote that the IMF's role as a generalist institution specialising in macroeconomic issues needs reform. Conditionality has also been criticised because a country can pledge collateral of "acceptable assets" to obtain waivers—if one assumes that all countries are able to provide "acceptable collateral". One view is that conditionality undermines domestic political institutions. The recipient governments are sacrificing policy autonomy in exchange for funds, which can lead to public resentment of the local leadership for accepting and enforcing the IMF conditions. Political instability can result from more leadership turnover as political leaders are replaced in electoral backlashes. IMF conditions are often criticised for reducing government services, thus increasing unemployment. Another criticism is that IMF programs are only designed to address poor governance, excessive government spending, excessive government intervention in markets, and too much state ownership. This assumes that this narrow range of issues represents the only possible problems; everything is standardised and differing contexts are ignored. A country may also be compelled to accept conditions it would not normally accept had they not been in a financial crisis in need of assistance. On top of that, regardless of what methodologies and data sets used, it comes to same the conclusion of exacerbating income inequality. With Gini coefficient, it became clear that countries with IMF programs face increased income inequality. It is claimed that conditionalities retard social stability and hence inhibit the stated goals of the IMF, while Structural Adjustment Programs lead to an increase in poverty in recipient countries. The IMF sometimes advocates "austerity programmes", cutting public spending and increasing taxes even when the economy is weak, to bring budgets closer to a balance, thus reducing budget deficits. Countries are often advised to lower their corporate tax rate. In Globalization and Its Discontents, Joseph E. Stiglitz, former chief economist and senior vice-president at the World Bank, criticises these policies. He argues that by converting to a more monetarist approach, the purpose of the fund is no longer valid, as it was designed to provide funds for countries to carry out Keynesian reflations, and that the IMF "was not participating in a conspiracy, but it was reflecting the interests and ideology of the Western financial community." Stiglitz concludes, "Modern high-tech warfare is designed to remove physical contact: dropping bombs from 50,000 feet ensures that one does not 'feel' what one does. Modern economic management is similar: from one's luxury hotel, one can callously impose policies about which one would think twice if one knew the people whose lives one was destroying." The researchers Eric Toussaint and Damien Millet argue that the IMF's policies amount to a new form of colonization that does not need a military presence: International politics play an important role in IMF decision making. The clout of member states is roughly proportional to its contribution to IMF finances. The United States has the greatest number of votes and therefore wields the most influence. Domestic politics often come into play, with politicians in developing countries using conditionality to gain leverage over the opposition to influence policy. Reform Function and policies The IMF is only one of many international organisations, and it is a generalist institution that deals only with macroeconomic issues; its core areas of concern in developing countries are very narrow. One proposed reform is a movement towards close partnership with other specialist agencies such as UNICEF, the Food and Agriculture Organization (FAO), and the United Nations Development Program (UNDP). Jeffrey Sachs argues in The End of Poverty that the IMF and the World Bank have "the brightest economists and the lead in advising poor countries on how to break out of poverty, but the problem is development economics". Development economics needs the reform, not the IMF. He also notes that IMF loan conditions should be paired with other reforms—e.g., trade reform in developed nations, debt cancellation, and increased financial assistance for investments in basic infrastructure. IMF loan conditions cannot stand alone and produce change; they need to be partnered with other reforms or other conditions as applicable. US influence and voting reform The scholarly consensus is that IMF decision-making is not simply technocratic, but also guided by political and economic concerns. The United States is the IMF's most powerful member, and its influence reaches even into decision-making concerning individual loan agreements. The United States has historically been openly opposed to losing what Treasury Secretary Jacob Lew described in 2015 as its "leadership role" at the IMF, and the United States' "ability to shape international norms and practices". Emerging markets were not well-represented for most of the IMF's history: Despite being the most populous country, China's vote share was the sixth largest; Brazil's vote share was smaller than Belgium's. Reforms to give more powers to emerging economies were agreed by the G20 in 2010. The reforms could not pass, however, until they were ratified by the US Congress, since 85% of the Fund's voting power was required for the reforms to take effect, and the Americans held more than 16% of voting power at the time. After repeated criticism, the United States finally ratified the voting reforms at the end of 2015. The OECD countries maintained their overwhelming majority of voting share, and the United States in particular retained its share at over 16%. The criticism of the American-and-European dominated IMF has led to what some consider 'disenfranchising the world' from the governance of the IMF. Raúl Prebisch, the founding secretary-general of the UN Conference on Trade and Development (UNCTAD), wrote that one of "the conspicuous deficiencies of the general economic theory, from the point of view of the periphery, is its false sense of universality." Support of dictatorships The role of the Bretton Woods institutions has been controversial since the late Cold War, because of claims that the IMF policy makers supported military dictatorships friendly to American and European corporations, but also other anti-communist and Communist regimes (such as Mobutu's Zaire and Ceaușescu's Romania, respectively). Critics also claim that the IMF is generally apathetic or hostile to human rights, and labour rights. The controversy has helped spark the anti-globalization movement. An example of IMF's support for a dictatorship was its ongoing support for Mobutu's rule in Zaire, although its own envoy, Erwin Blumenthal, provided a sobering report about the entrenched corruption and embezzlement and the inability of the country to pay back any loans. Arguments in favour of the IMF say that economic stability is a precursor to democracy; however, critics highlight various examples in which democratised countries fell after receiving IMF loans. A 2017 study found no evidence of IMF lending programs undermining democracy in borrowing countries. To the contrary, it found "evidence for modest but definitively positive conditional differences in the democracy scores of participating and non-participating countries." On 28 June 2021 the IMF approved a US$1 billion loan to the Ugandan government despite protests from Ugandans who protested in Washington, London and South-Africa. Impact on access to food A number of civil society organisations have criticised the IMF's policies for their impact on access to food, particularly in developing countries. In October 2008, former United States president Bill Clinton delivered a speech to the United Nations on World Food Day, criticising the World Bank and IMF for their policies on food and agriculture: The FPIF remarked that there is a recurring pattern: "the destabilization of peasant producers by a one-two punch of IMF-World Bank structural adjustment programs that gutted government investment in the countryside followed by the massive influx of subsidized U.S. and European Union agricultural imports after the WTO's Agreement on Agriculture pried open markets." Impact on public health A 2009 study concluded that the strict conditions resulted in thousands of deaths in Eastern Europe by tuberculosis as public health care had to be weakened. In the 21 countries to which the IMF had given loans, tuberculosis deaths rose by 16.6%. A 2017 systematic review on studies conducted on the impact that Structural adjustment programs have on child and maternal health found that these programs have a detrimental effect on maternal and child health among other adverse effects. In 2009, a book by Rick Rowden titled The Deadly Ideas of Neoliberalism: How the IMF has Undermined Public Health and the Fight Against AIDS, claimed that the IMF's monetarist approach towards prioritising price stability (low inflation) and fiscal restraint (low budget deficits) was unnecessarily restrictive and has prevented developing countries from scaling up long-term investment in public health infrastructure. The book claimed the consequences have been chronically underfunded public health systems, leading to demoralising working conditions that have fuelled a "brain drain" of medical personnel, all of which has undermined public health and the fight against HIV/AIDS in developing countries. In 2016, the IMF's research department published a report titled "Neoliberalism: Oversold?" which, while praising some aspects of the "neoliberal agenda," claims that the organisation has been "overselling" fiscal austerity policies and financial deregulation, which they claim has exacerbated both financial crises and economic inequality around the world. Impact on environment IMF policies have been repeatedly criticised for making it difficult for indebted countries to say no to environmentally harmful projects that nevertheless generate revenues such as oil, coal, and forest-destroying lumber and agriculture projects. Ecuador, for example, had to defy IMF advice repeatedly to pursue the protection of its rainforests, though paradoxically this need was cited in the IMF argument to provide support to Ecuador. The IMF acknowledged this paradox in the 2010 report that proposed the IMF Green Fund, a mechanism to issue special drawing rights directly to pay for climate harm prevention and potentially other ecological protection as pursued generally by other environmental finance. While the response to these moves was generally positive possibly because ecological protection and energy and infrastructure transformation are more politically neutral than pressures to change social policy, some experts voiced concern that the IMF was not representative, and that the IMF proposals to generate only US$200 billion a year by 2020 with the SDRs as seed funds, did not go far enough to undo the general incentive to pursue destructive projects inherent in the world commodity trading and banking systems—criticisms often levelled at the World Trade Organization and large global banking institutions. In the context of the European debt crisis, some observers noted that Spain and California, two troubled economies within respectively the European Union and the United States, and also Germany, the primary and politically most fragile supporter of a euro currency bailout would benefit from IMF recognition of their leadership in green technology, and directly from Green Fund-generated demand for their exports, which could also improve their credit ratings. IMF and globalization Globalization encompasses three institutions: global financial markets and transnational companies, national governments linked to each other in economic and military alliances led by the United States, and rising "global governments" such as World Trade Organization (WTO), IMF, and World Bank. Charles Derber argues in his book People Before Profit, "These interacting institutions create a new global power system where sovereignty is globalized, taking power and constitutional authority away from nations and giving it to global markets and international bodies". Titus Alexander argues that this system institutionalises global inequality between western countries and the Majority World in a form of global apartheid, in which the IMF is a key pillar. The establishment of globalised economic institutions has been both a symptom of and a stimulus for globalisation. The development of the World Bank, the IMF, regional development banks such as the European Bank for Reconstruction and Development (EBRD), and multilateral trade institutions such as the WTO signals a move away from the dominance of the state as the primary actor analysed in international affairs. Globalization has thus been transformative in terms of limiting of state sovereignty over the economy. Impact on gender equality The IMF says they support women's empowerment and tries to promote their rights in countries with a significant gender gap. Scandals Managing Director Lagarde (2011-2019) was convicted of giving preferential treatment to businessman-turned-politician Bernard Tapie as he pursued a legal challenge against the French government. At the time, Lagarde was the French economic minister. Within hours of her conviction, in which she escaped any punishment, the fund's 24-member executive board put to rest any speculation that she might have to resign, praising her "outstanding leadership" and the "wide respect" she commands around the world. Former IMF Managing Director Rodrigo Rato was arrested in 2015 for alleged fraud, embezzlement and money laundering. In 2017, the Audiencia Nacional found Rato guilty of embezzlement and sentenced him to 4 years' imprisonment. In 2018, the sentence was confirmed by the Supreme Court of Spain. Alternatives In March 2011, the Ministers of Economy and Finance of the African Union proposed to establish an African Monetary Fund. At the 6th BRICS summit in July 2014 the BRICS nations (Brazil, Russia, India, China, and South Africa) announced the BRICS Contingent Reserve Arrangement (CRA) with an initial size of US$100 billion, a framework to provide liquidity through currency swaps in response to actual or potential short-term balance-of-payments pressures. In 2014, the China-led Asian Infrastructure Investment Bank was established. In the media Life and Debt, a documentary film, deals with the IMF's policies' influence on Jamaica and its economy from a critical point of view. Debtocracy, a 2011 independent Greek documentary film, also criticises the IMF. Portuguese musician José Mário Branco's 1982 album FMI is inspired by the IMF's intervention in Portugal through monitored stabilisation programs in 1977–78. In the 2015 film, Our Brand Is Crisis, the IMF is mentioned as a point of political contention, where the Bolivian population fears its electoral interference. See also Bank for International Settlements Conditionality Globalization Group of Ten Group of Thirty International financial institutions List of IMF people New Development Bank Smithsonian Agreement World Bank residual model Notes References Footnotes Bibliography Further reading Copelovitch, Mark. 2010. The International Monetary Fund in the Global Economy: Banks, Bonds, and Bailouts. Cambridge University Press. deVries, Margaret Garritsen. The IMF in a Changing World, 1945–85, International Monetary Fund, 1986. James, H. International Monetary Cooperation since Bretton Woods, Oxford, 1996. Joicey, N. and Pickford, S. "The International Monetary Fund and Global Economic Cooperation" in Nicholas Bayne and Stephen Woolcock, The New Economic Diplomacy: Decision-Making and Negotiation in International Relations, (Ashgate Publishing, 2011). Keynes, J.M. The Collected Writings, Vol. XXVI. Activities 1941–1946: Shaping the Post-War World: Bretton Woods and Reparations, Cambridge, 1980. Moschella, M. Governing Risk: The IMF and Global Financial Crises (Palgrave Macmillan; 2010). Skidelsky, R. John Maynard Keynes: Fighting for Britain, London, 2000. Truman, E. Strengthening IMF Surveillance: A Comprehensive Proposal, Policy Brief 10–29, Peterson Institute for International Economics, 2010. Weiss, Martin A. The International Monetary Fund. (Washington, DC: Congressional Research Service, 24 May 2018). Woods, N. The Globalizers: The IMF, the World Bank, and Their Borrowers, Ithaca, 2006 Woods, Ngaire and Lombardi, Domenico. (2006). Uneven Patterns of Governance: How Developing Countries are Represented in the IMF. Review of International Political Economy. Volume 13, Number 3: 480–515. External links 1945 in economics Global policy organizations International development organizations International finance institutions Organizations based in Washington, D.C. Organizations established in 1945 United Nations Development Group United Nations Economic and Social Council United Nations specialized agencies
[ 0.0005159107968211174, -0.07057347148656845, 0.2810210883617401, 0.24152888357639313, -0.08829104155302048, -0.048846881836652756, -0.777033805847168, 0.620068371295929, -0.5910301804542542, -0.18024109303951263, -0.1901618242263794, 0.40080979466438293, -0.20981177687644958, 0.68294852972...
15252
https://en.wikipedia.org/wiki/Islands%20of%20the%20Clyde
Islands of the Clyde
The Islands of the Firth of Clyde are the fifth largest of the major Scottish island groups after the Inner and Outer Hebrides, Orkney and Shetland. They are situated in the Firth of Clyde between Ayrshire and Argyll and Bute. There are about forty islands and skerries. Only four are inhabited, and only nine are larger than . The largest and most populous are Arran and Bute. They are served by dedicated ferry routes, as are Great Cumbrae and Holy Island. Unlike the isles in the four larger Scottish archipelagos, none of the isles in this group are connected to one another or to the mainland by bridges. The geology and geomorphology of the area is complex, and the islands and the surrounding sea lochs each have distinctive features. The influence of the Atlantic Ocean and the North Atlantic Drift create a mild, damp oceanic climate. There is a diversity of wildlife, including three species of rare endemic trees. The larger islands have been continuously inhabited since Neolithic times. The cultures of their inhabitants were influenced by the emergence of the kingdom of Dál Riata, beginning in 500 AD. The islands were then politically absorbed into the emerging kingdom of Alba, led by Kenneth MacAlpin. During the early Middle Ages, the islands experienced Viking incursions. In the 13th century, they became part of the Kingdom of Scotland. Geology and geography The Highland Boundary Fault runs past Bute and through the northern part of Arran. Therefore, from a geological perspective, some of the islands are in the Highlands and some in the Central Lowlands. As a result of Arran's geological similarity to Scotland, it is sometimes referred to as "Scotland in miniature" and the island is a popular destination for geologists. They come to Arran to study its intrusive igneous landforms, such as sills and dykes, as well as its sedimentary and metasedimentary rocks, which range widely in age. Visiting in 1787, the geologist James Hutton found his first example of an unconformity there. The spot where he discovered it is one of the most famous places in the history of the study of geology. The group of weakly metamorphosed rocks that form the Highland Border Complex lie discontinuously along the Highland Boundary Fault. One of the most prominent exposures is along Loch Fad on Bute. Ailsa Craig, which lies some south of Arran, has been quarried for a rare type of micro-granite containing riebeckite, known as "Ailsite". It is used by Kays of Scotland to make curling stones. (As of 2004, 60 to 70% of all curling stones in use globally were made from granite quarried on the island.) Like the rest of Scotland, the Firth of Clyde was covered by ice sheets during the Pleistocene ice ages, and the landscape has been much affected by glaciation. Back then, Arran's highest peaks may have been nunataks. Sea-level changes and the isostatic rise of land after the last retreat of the ice created clifflines behind raised beaches, which are a prominent feature of the entire coastline. The action of these forces has made charting the post glacial coastlines a complex task. The various soil types on the islands reflect their diverse geology. Bute has the most productive land, and it has a pattern of deposits that is typical of the southwest of Scotland. In the eroded valleys, there is a mixture of boulder clay and other glacial deposits. Elsewhere, especially to the south and west, there are raised beach- and marine deposits, which in some places, such as Stravanan, result in a machair landscape inland from the sandy bays. The Firth of Clyde, in which these islands lie, is north of the Irish Sea and has numerous branching inlets. Some of those inlets, including Loch Goil, Loch Long, Gare Loch, Loch Fyne, and the estuary of the River Clyde, have their own substantial features. In places, the effect of glaciation on the seabed is pronounced. For example, the Firth is deep between Arran and Bute, even though they are only apart. The islands all stand exposed to wind and tide. Various lighthouses, such as those on Ailsa Craig, Pladda, and Davaar, act as an aid to navigation. Climate The Firth of Clyde lies between 55 and 56 degrees north latitude. This is the same latitude as Labrador in Canada and north of the Aleutian Islands. However, the influence of the North Atlantic Drift—the northern extension of the Gulf Stream—moderates the winter weather. As a result, the area enjoys a mild, damp oceanic climate. Temperatures are generally cool, averaging about in January and in July at sea level. Snow seldom lies at sea level, and frosts are generally less frequent than they are on the mainland. In common with most islands off the west coast of Scotland, the average annual rainfall is generally high: between on Bute, in the Cumbraes, and in the south of Arran, and in the north of Arran. The Arran mountains are even wetter: Their summits receive over of rain annually. May, June and July are the sunniest months: on average, there is a total of 200 hours of bright sunshine during that 3-month period each year. Southern Bute benefits from a particularly large number of sunny days. History Prehistory Mesolithic humans arrived in the area of the Firth of Clyde during the 4th millennium BC, probably from Ireland. This initial arrival was followed by another wave of Neolithic peoples using the same route. In fact, there is some evidence that the Firth of Clyde was a significant route through which mainland Scotland was colonised during the Neolithic period. The inhabitants of Argyll, the Clyde estuary, and elsewhere in western Scotland at that time developed a distinctive style of megalithic structure that is known today as the Clyde cairns. About 100 of these structures have been found. They were used for interment of the dead. They are rectangular or trapezoidal, with a small enclosing chamber into which the person's body was placed. They are faced with large slabs of stone set on end (sometimes subdivided into smaller compartments). They also feature a forecourt area, which may have been used for displays or rituals associated with interment. They are mostly found in Arran, Bute, and Kintyre. It is thought likely that the Clyde cairns were the earliest forms of Neolithic monument constructed by incoming settlers. However, only a few of the cairns have been radiocarbon dated. A cairn at Monamore on Arran has been dated to 3160 BC, although other evidence suggests that it was almost certainly built earlier than that, possibly around 4000 BC. The area also features numerous standing stones dating from prehistoric times, including six stone circles on Machrie Moor in Arran, and other examples on Great Cumbrae and Bute. Later, Bronze Age settlers also constructed megaliths at various sites. Many of them date from the 2nd millennium BC. However, instead of chambered cairns, these peoples constructed burial cists, which can be found, for example, on Inchmarnock. Evidence of settlement during this period, especially the early part of it, is scant. However, one notable artifact has been found on Bute that dates from around 2000 BC. Known today as the “Queen of the Inch necklace,” it is an article of jewellery made of lignite (commonly called “jet”). During the early Iron Age, the Brythonic culture held sway. There is no evidence that the Roman occupation of southern Scotland extended into these islands. Early Scots rule Beginning in the 2nd century AD, Irish influence was at work in the region, and by the 6th century, Gaels had established the kingdom of Dál Riata there. Unlike earlier inhabitants, such as the P-Celtic speaking Brythons, these Gaels spoke a form of Gaelic (a modern version of which is still spoken today in the Hebrides). During this period, through the efforts of Saint Ninian and others, Christianity slowly supplanted Druidism. The kingdom of Dál Riata flourished from the rule of Fergus Mór in the late 5th century until the Viking incursions beginning in the late 8th century. Islands close to the shores of modern Ayrshire presumably remained part of the Kingdom of Strathclyde during this period, whilst the main islands became part of the emerging Kingdom of Alba founded by Kenneth MacAlpin (Cináed mac Ailpín). Viking influence Beginning in the 9th century and into the 13th century, the Islands of the Clyde constituted a border zone between the Norse Suðreyjar and Scotland, and many of them were under Norse hegemony. Beginning in the last half of the 12th century, and then into the early 1200s, the islands may well have served as the power base of Somhairle mac Giolla Brighde and his descendants. During this time, the islands seem to have come under the sway of the Steward of Scotland’s authority and to have been taken over by the expanding Stewart lordship. This western extension of Scottish authority appears to have been one of the factors motivating the Norwegian invasion of the region in 1230, during which the invaders seized Rothesay Castle. In 1263, Norwegian troops commanded by Haakon Haakonarson repeated the feat, but the ensuing Battle of Largs between Scots and Norwegian forces, which took place on the shores of the Firth of Clyde, was inconclusive as a military contest. This battle marked an ultimately fatal weakening of Norwegian power in Scotland. Haakon retreated to Orkney, where he died in December 1263, consoled on his death bed by recitations of the old sagas. Following his death, under the 1266 Treaty of Perth, all rights that the Norwegian Crown "had of old therein" in relation to the islands were yielded to the Kingdom of Scotland. Modern Scotland Politically, from the conclusion of the Treaty of Perth in 1266 to the present day, all of the islands of the Clyde have been part of Scotland. Ecclesiastically, beginning in the early medieval period all of these isles were part of the Diocese of Sodor and Man, based at Peel, on the Isle of Man. After 1387, the seat of the Bishopric of the Isles was relocated to the north, first to Snizort on Skye and then to Iona. This arrangement continued until the Scottish Reformation in the 16th century, when Scotland broke with the Catholic Church. The mid-1700s marked the beginning of a century of significant change. New forms of transport, industry, and agriculture brought an end to ways of life that had endured for centuries. The Battle of Culloden in 1746 foreshadowed the end of the clan system. These changes improved living standards for some, but came at a cost for others. In the late 18th and early 19th centuries, Alexander, the 10th Duke of Hamilton (1767–1852), and others implemented a controversial agricultural-reform programme called the Highland Clearances that had a devastating effect on many of Arran's inhabitants. Whole villages were emptied, and the Gaelic culture of the island was dealt a terminal blow. (A memorial to the tenant farmers evicted from the island by this programme was later erected on the shore at Lamlash, funded by a Canadian descendant of some of those evicted.) From the 1850s to the late 20th century, cargo ships known as “Clyde Puffers” (made famous by an early-20th-century story collection called the Vital Spark), were the workhorses of the islands, carrying a great deal of produce and a great variety of products to and from the islands. In May 1889, the Caledonian Steam Packet Company (CSP) was founded and began operating steamer services to and from Gourock for the Caledonian Railway. The company soon expanded by taking over rival steamer operators. David MacBrayne operated the Glasgow-to-Ardrishaig steamer service, as part of the so-called "Royal Route" to Oban. During the 20th century, many of the islands were developed as tourist resorts along the lines of mainland resorts such as Largs and Troon, but catering for Glaswegians who preferred to holiday "Doon the Watter". In 1973, CSP and MacBraynes combined their Clyde and West Highland operations under the new name of Caledonian MacBrayne. A government-owned corporation, they serve Great Cumbrae, Arran, and Bute, and also run mainland-to-mainland ferries across the firth. Private companies operate services from Arran to Holy Isle, and from McInroy's Point (Gourock) to Hunter's Quay on the Cowal peninsula. Politically, from 1890 to 1975, most of the islands comprised the traditional County of Bute, and its inhabitants were represented by the county council. Since the 1975 reorganization, however, the islands have been split more or less equally between two modern council authorities: Argyll and Bute, and North Ayrshire. Only Ailsa Craig and Lady Isle in South Ayrshire are not part of either of these two council areas. Islands Below is a table listing the nine islands of the Firth of Clyde that have an area greater than 40 hectares (approximately 100 acres), showing their population and listing the smaller uninhabited islets adjacent to them (including tidal islets separated only when the tide is higher, and skerries exposed only when the tide is lower). As of 2001, six of the islands were inhabited, but that included one with only two residents (Davaar), and one with only one resident (Sanda). At the 2011 census, there was no one usually resident on either of these islands. Outlying islands The islets that lie remote from the larger islands are described separately below. There are two islets in Gare Loch: Green Island and Perch Rock. Gare Loch is small, but it hosts the Faslane Naval Base, where the UK's Trident nuclear submarines are located. At its southern end, the loch opens into the Firth of Clyde via the Rhu narrows. There are also several islets in the Kilbrannan Sound, which lies between Arran and the Kintyre peninsula. They are: An Struthlag, Cour Island, Eilean Carrach (Carradale), Eilean Carrach (Skipness), Eilean Grianain, Eilean Sunadale, Gull Isle, Island Ross and Thorn Isle. (The Norse sagas tell a story about the Kintyre peninsula. In the late 11th century, a king of Norway (Magnus Barefoot) devised a plan to increase his territorial possessions. He persuaded a king of Scotland (Malcolm III or Edgar) to agree that he could take possession of an area of land on the west coast of Scotland if a ship could sail around it. Magnus then arranged for one of his longships to be dragged across the -long isthmus at the northern tip of the Kintyre peninsula, which connects Kintyre to the mainland. (The isthmus lies between East Loch Tarbert and West Loch Tarbert). He took command of the ship's tiller himself. Then, declaring that Kintyre had "better land than the best of the Hebrides", he claimed that dragging his ship across the isthmus had been equivalent to “sailing around” the peninsula, and thus that the peninsula counted as “land around which a ship could sail.” As a result of this maneuver, he was able to claim possession of the peninsula, which remained under Norse rule for more than a dozen years.) There are also several islets and skerries in Loch Fyne, which extends inland from the Sound of Bute, and is the longest of Scotland's sea lochs. They are: Duncuan Island, Eilean Ardgaddan, Eilean a' Bhuic, Eilean Aoghainn, Eilean a' Chomhraig, Eilean an Dúnain, Eilean Buidhe (Ardmarnock), Eilean Buidhe (Portavadie), Eilean Fraoch, Eilean Math-ghamhna, Eilean Mór, Glas Eilean, Heather Island, Inverneil Island, Kilbride Island, and Liath Eilean. There are several islets surrounding Horse Isle in North Ayrshire: Broad Rock, East Islet, Halftide Rock, High Rock and North Islet. Lady Isle lies off the South Ayrshire coast near Troon. At one time it housed "ane old chapell with an excellent spring of water". However, in June 1821, someone set fire to the "turf and pasture". Once the pasture had burned away, gales blew much of the island's soil into the sea. This permanently destroyed the island's ability to support grazing. There are no islands in Loch Goil or Loch Long, which are fjord-like arms in the northern part of the firth. Non-island areas with “island” in their name Here is a list of places along that shores of the Firth of Clyde that are not islands, but have names that misleadingly suggest they are islands (eilean being Gaelic for "island"): Eilean na Beithe, Portavadie; Eilean Beag, Cove; Eilean Dubh, Dalchenna, Loch Fyne; Eilean nan Gabhar, Melldalloch, Kyles of Bute; Barmore Island, just north of Tarbert, Kintyre; Eilean Aoidh, south of Portavadie; Eilean Leathan, Kilbrannan Sound just south of Torrisdale Bay; Island Muller, Kilbrannan Sound north of Campbeltown. Natural history Around the Firth of Clyde, there are populations of red deer, red squirrel, badger, otter, adder, and common lizard. In the Firth itself, there are harbour porpoises, basking sharks and various species of dolphin. Davaar is home to a population of wild goats. Over 200 bird species have been recorded as sighted in the area, including the black guillemot, the eider, the peregrine falcon, and the golden eagle. In 1981, there were 28 ptarmigans sighted on Arran, but in 2009 it was reported that extensive surveys had been unable to find any recorded ptarmigans sightings. Similarly, the red-billed chough no longer breeds on the island. Arran has three species of the rare endemic trees known as Arran Whitebeams: the Scottish or Arran whitebeam; the cut-leaved whitebeam; and the Catacol whitebeam. All of them are found only in Gleann Diomhan, and they are amongst the most endangered tree species in the world. (Gleann Diomhan was formerly part of a designated national nature reserve—the designation was removed in 2011)- and it continues to be part of an area designated as a Site of Special Scientific Interest.) Only 283 Arran whitebeam and 236 cut-leaved whitebeam were recorded as mature trees in 1980, and it is thought that grazing pressures and insect damage are preventing regeneration of the woodland. The Catacol whitebeam was discovered in 2007, but only two specimens have been found, so steps have been taken to protect them. Etymology The Roman historian Tacitus refers to the Clota, meaning the Clyde. The derivation is not certain but is probably from the Brythonic Clouta, which became Clut in Old Welsh. The name literally means "wash", probably referring to a river goddess who is seen as "the washer" or "the strongly flowing one". The derivation of the word “Bute” is also uncertain. The Norse name for it is Bót an Old Irish word for "fire", which might be a reference to signal fires. The etymology of “Arran” is no clearer. Haswell-Smith (2004) suggests that it derive from a Brythonic word meaning "high place", although Watson (1926) suggests it may be pre-Celtic. See also Scottish island names Rathlin Island Sleeping Warrior Arran Single Malt Mount Stuart House Cathedral of the Isles Earl of Arran (Scotland) Marquess of Bute Mull of Kintyre test Notes Footnotes References Barrett, James H. "The Norse in Scotland" in Brink, Stefan (ed) (2008) The Viking World. Abingdon. Routledge. Coventry, Martin (2008) Castles of the Clans. Musselburgh. Goblinshead. Gillen, Con (2003) Geology and landscapes of Scotland. Harpenden. Terra. Hollander, Lee M (ed. & tr.) (1964) Heimskringla: History of the Kings of Norway. Austin. University of Texas Press. Hunter, James (2000) Last of the Free: A History of the Highlands and Islands of Scotland. Edinburgh. Mainstream. Keay, J. & Keay, J. (1994) Collins Encyclopaedia of Scotland. London. HarperCollins McDonald, Dan (1977) The Clyde Puffer. Newton Abbot. David & Charles McKirdy, Alan Gordon, John & Crofts, Roger (2007) Land of Mountain and Flood: The Geology and Landforms of Scotland. Edinburgh. Birlinn. Murray, W.H (1973) The Islands of Western Scotland. London. Eyre Methuen. Murray, W.H. (1977) The Companion Guide to the West Highlands of Scotland. London. Collins. Noble, Gordon (2006) Neolithic Scotland: Timber, Stone, Earth and Fire. Edinburgh University Press. Omand, Donald (ed.) (2006) The Argyll Book. Edinburgh. Birlinn. Ordnance Survey (2009) "Get-a-map". Retrieved 1–31 August 2010. Watson, W. J (1994) The Celtic Place-Names of Scotland. Edinburgh. Birlinn. . First published 1926. Clyde Archipelagoes of Scotland Archipelagoes of the Atlantic Ocean
[ 0.2672649025917053, -0.3058759570121765, 0.5280083417892456, -0.41069844365119934, 0.2758336365222931, 0.07067424058914185, 0.5186467170715332, 0.02237410843372345, -0.1600780040025711, -0.13734173774719238, -0.31660130620002747, 0.48452064394950867, -0.40606996417045593, 0.451760023832321...
15253
https://en.wikipedia.org/wiki/International%20Bank%20Account%20Number
International Bank Account Number
The International Bank Account Number (IBAN) is an internationally agreed system of identifying bank accounts across national borders to facilitate the communication and processing of cross border transactions with a reduced risk of transcription errors. An IBAN uniquely identifies the account of a customer at a financial institution. It was originally adopted by the European Committee for Banking Standards (ECBS) and later as an international standard under ISO 13616:1997. The current standard is ISO 13616:2020, which indicates SWIFT as the formal registrar. Initially developed to facilitate payments within the European Union, it has been implemented by most European countries and numerous countries in other parts of the world, mainly in the Middle East and the Caribbean. As of May 2020, 77 countries were using the IBAN numbering system. The IBAN consists of up to 34 alphanumeric characters comprising a country code; two check digits; and a number that includes the domestic bank account number, branch identifier, and potential routing information. The check digits enable a check of the bank account number to confirm its integrity before submitting a transaction. Background Before IBAN, differing national standards for bank account identification (i.e. bank, branch, routing codes, and account number) were confusing for some users. This often led to necessary routing information being missing from payments. Routing information as specified by ISO 9362 (also known as Business Identifier Codes (BIC), SWIFT ID or SWIFT code, and SWIFT-BIC) does not require a specific format for the transaction so the identification of accounts and transaction types is left to agreements of the transaction partners. It also does not contain check digits, so errors of transcription were not detectable and it was not possible for a sending bank to validate the routing information prior to submitting the payment. Routing errors caused delayed payments and incurred extra costs to the sending and receiving banks and often to intermediate routing banks. In 1997, to overcome these difficulties, the International Organization for Standardization (ISO) published ISO 13616:1997. This proposal had a degree of flexibility that the European Committee for Banking Standards (ECBS) believed would make it unworkable, and they produced a "slimmed down" version of the standard which, amongst other things, permitted only upper-case letters and required that the IBAN for each country have a fixed length. ISO 13616:1997 was subsequently withdrawn and replaced by ISO 13616:2003. The standard was revised again in 2007 when it was split into two parts. ISO 13616-1:2007 "specifies the elements of an international bank account number (IBAN) used to facilitate the processing of data internationally in data interchange, in financial environments as well as within and between other industries" but "does not specify internal procedures, file organization techniques, storage media, languages, etc. to be used in its implementation". ISO 13616-2:2007 describes "the Registration Authority (RA) responsible for the registry of IBAN formats that are compliant with ISO 13616-1 [and] the procedures for registering ISO 13616-compliant IBAN formats". The official IBAN registrar under ISO 13616-2:2007 is SWIFT. IBAN imposes a flexible but regular format sufficient for account identification and contains validation information to avoid errors of transcription. It carries all the routing information needed to get a payment from one bank to another wherever it may be; it contains key bank account details such as country code, branch codes (known as sort codes in the UK and Ireland) and account numbers, and it contains check digits which can be validated at source according to a single standard procedure. Where used, IBANs have reduced trans-national money transfer errors to under 0.1% of total payments Structure The IBAN consists of up to 34 alphanumeric characters, as follows: country code using ISO 3166-1 alpha-2 – two letters, check digits – two digits, and Basic Bank Account Number (BBAN) – up to 30 alphanumeric characters that are country-specific. The check digits represent the checksum of the bank account number which is used by banking systems to confirm that the number contains no simple errors. IBAN is traditionally expressed in groups of four characters separated by spaces, the last group being of variable length as shown in the example below; when transmitted electronically, spaces are omitted. Permitted IBAN characters are the digits 0 to 9 and the 26 Latin alphabetic characters A to Z. This applies even in countries where these characters are not used in the national language (e.g., Thailand). Basic Bank Account Number The Basic Bank Account Number (BBAN) format is decided by the national central bank or designated payment authority of each country. There is no consistency between the formats adopted. The national authority may register its BBAN format with SWIFT but is not obliged to do so. It may adopt IBAN without registration. SWIFT also acts as the registration authority for the SWIFT system, which is used by most countries that have not adopted IBAN. A major difference between the two systems is that under SWIFT there is no requirement that BBANs used within a country be of a pre-defined length. The BBAN must be of a fixed length for the country and comprise case-insensitive alphanumeric characters. It includes the domestic bank account number, branch identifier, and potential routing information. Each country can have a different national routing/account numbering system, up to a maximum of 30 alphanumeric characters. Check digits The check digits enable the sending bank (or its customer) to perform a sanity check of the routing destination and account number from a single string of data at the time of data entry. This check is guaranteed to detect any instances where a single character has been omitted, duplicated, mistyped or where two characters have been transposed. Thus routing and account number errors are virtually eliminated. Processing One of the design aims of the IBAN was to enable as much validation as possible to be done at the point of data entry. In particular, the computer program that accepts an IBAN will be able to validate: Country code Number of characters in the IBAN correspond to the number specified for the country code BBAN format specified for the country code Account number, bank code and country code combination is compatible with the check digits The check digits are calculated using MOD-97-10 as per ISO/IEC 7064:2003 (abbreviated to mod-97 in this article), which specifies a set of check character systems capable of protecting strings against errors which occur when people copy or key data. In particular, the standard states that the following can be detected: All single substitution errors (the substitution of a single character for another, for example 4234 for 1234) All or nearly all single (local) transposition errors (the transposition of two single characters, either adjacent or with one character between them, for example 12354 or 12543 for 12345) All or nearly all shift errors (shifts of the whole string to the left or right) High proportion of double substitution errors (two separate single substitution errors in the same string, for example 7234587 for 1234567) High proportion of all other errors The underlying rules for IBANs is that the account-servicing financial institution should issue an IBAN, as there are a number of areas where different IBANs could be generated from the same account and branch numbers that would satisfy the generic IBAN validation rules. In particular cases where 00 is a valid check digit, 97 will not be a valid check digit, likewise, if 01 is a valid check digit, 98 will not be a valid check digit, similarly with 02 and 99. The UN CEFACT TBG5 has published a free IBAN validation service in 32 languages for all 57 countries that have adopted the IBAN standard. They have also published the Javascript source code of the verification algorithm. An English language IBAN checker for ECBS member country bank accounts is available on its website. Algorithms Validating the IBAN An IBAN is validated by converting it into an integer and performing a basic mod-97 operation (as described in ISO 7064) on it. If the IBAN is valid, the remainder equals 1. The algorithm of IBAN validation is as follows: Check that the total IBAN length is correct as per the country. If not, the IBAN is invalid Move the four initial characters to the end of the string Replace each letter in the string with two digits, thereby expanding the string, where A = 10, B = 11, ..., Z = 35 Interpret the string as a decimal integer and compute the remainder of that number on division by 97 If the remainder is 1, the check digit test is passed and the IBAN might be valid. Example (fictitious United Kingdom bank, sort code 12-34-56, account number 98765432): {| |• IBAN: ||||align="right"| 1234 5698 7654 32|| |- |• Rearrange: ||||align="right"|12345698765432|| |- |• Convert to integer: ||||align="right"|12345698765432|| |- |• Compute remainder: ||||align="right"|12345698765432|| mod 97 = 1 |} Generating IBAN check digits According to the ECBS "generation of the IBAN shall be the exclusive responsibility of the bank/branch servicing the account". The ECBS document replicates part of the ISO/IEC 7064:2003 standard as a method for generating check digits in the range 02 to 98. Check digits in the ranges 00 to 96, 01 to 97, and 03 to 99 will also provide validation of an IBAN, but the standard is silent as to whether or not these ranges may be used. The preferred algorithm is: Check that the total IBAN length is correct as per the country. If not, the IBAN is invalid. Replace the two check digits by 00 (e.g., GB00 for the UK). Move the four initial characters to the end of the string. Replace the letters in the string with digits, expanding the string as necessary, such that A or a = 10, B or b = 11, and Z or z = 35. Each alphabetic character is therefore replaced by 2 digits Convert the string to an integer (i.e. ignore leading zeroes). Calculate mod-97 of the new number, which results in the remainder. Subtract the remainder from 98 and use the result for the two check digits. If the result is a single-digit number, pad it with a leading 0 to make a two-digit number. Modulo operation on IBAN Any computer programming language or software package that is used to compute D mod 97 directly must have the ability to handle integers of more than 30 digits. In practice, this can only be done by software that either supports arbitrary-precision arithmetic or that can handle 219-bit (unsigned) integers, features that are often not standard. If the application software in use does not provide the ability to handle integers of this size, the modulo operation can be performed in a piece-wise manner (as is the case with the UN CEFACT TBG5 JavaScript program). Piece-wise calculation can be done in many ways. One such way is as follows: Starting from the leftmost digit of D, construct a number using the first 9 digits and call it N. Calculate N mod 97. Construct a new 9-digit N by concatenating the above result (step 2) with the next 7 digits of D. If there are fewer than 7 digits remaining in D but at least one, then construct a new N, which will have less than 9 digits, from the above result (step 2) followed by the remaining digits of D Repeat steps 2–3 until all the digits of D have been processed The result of the final calculation in step 2 will be D mod 97 = N mod 97. Example In this example, the above algorithm for D mod 97 will be applied to D = . (The digits are colour-coded to aid the description below.) If the result is one, the IBAN corresponding to D passes the check digit test. Construct N from the first 9 digits of D N = Calculate N mod 97 = 70 Construct a new 9-digit N from the above result (step 2) followed by the next 7 digits of D. N = 70 Calculate N mod 97 = 29 Construct a new 9-digit N from the above result (step 4) followed by the next 7 digits of D. N = 29 Calculate N mod 97 = 24 Construct a new N from the above result (step 6) followed by the remaining 5 digits of D. N = 24 Calculate N mod 97 = 1 From step 8, the final result is D mod 97 = 1 and the IBAN has passed this check digit test. National check digits In addition to the IBAN check digits, many countries have their own national check digits used within the BBAN, as part of their national account number formats. Each country determines its own algorithm used for assigning and validating the national check digits - some relying on international standards, some inventing their own national standard, and some allowing each bank to decide if or how to implement them. Some algorithms apply to the entire BBAN, and others to one or more of the fields within it. The check digits may be considered an integral part of the account number, or an external field separate from the account number, depending on the country's rules. Most of the variations used are based on two categories of algorithms: - ISO 7064 MOD-97-10: Treat the account number as a large integer, divide it by 97 and use the remainder or its complement as the check digit(s). - Weighted Sum: Treat the account number as a series of individual numbers, multiply each number by a weight value according to its position in the string, sum the products, divide the sum by a modulus (usually 10 or 11) and use the remainder or its complement as the check digit. In both cases, there may first be a translation from alphanumeric characters to numbers using conversion tables. The complement, if used, means the remainder is subtracted from a fixed value, usually the modulus or the modulus plus one (with the common exception that a remainder of 0 results in 0). Note that some of the national specifications define the weights order from right to left, but since the BBAN length in the IBAN is fixed, they can be used from left to right as well. Adoption International bank transactions use either an IBAN or the ISO 9362 Business Identifier Code system (BIC or SWIFT code) in conjunction with the BBAN (Basic Bank Account Number). EEA and territories The banks of most countries in Europe publish account numbers using both the IBAN format and the nationally recognised identifiers, this being mandatory within the European Economic Area. Day-to-day administration of banking in British Overseas Territories varies from territory to territory; some, such as South Georgia and the South Sandwich Islands, have too small a population to warrant a banking system while others, such as Bermuda, have a thriving financial sector. The use of the IBAN is up to the local government—Gibraltar, being part of the European Union is required to use the IBAN, as are the Crown dependencies, which use the British clearing system, and the British Virgin Islands have chosen to do so. , no other British Overseas Territories have chosen to use the IBAN. Banks in the Caribbean Netherlands also do not use the IBAN. Single Euro Payments Area The IBAN designation scheme was chosen as the foundation for electronic straight-through processing in the European Economic Area. The European Parliament mandated that a bank charge needs to be the same amount for domestic credit transfers as for cross-border credit transfers regulated in decision 2560/2001 (updated in 924/2009). This regulation took effect in 2003. Only payments in euro up to €12,500 to a bank account designated by its IBAN were covered by the regulation, not payments in other currencies. The Euro Payments regulation was the foundation for the decision to create a Single Euro Payments Area (SEPA). The European Central Bank has created the TARGET2 interbank network that unifies the technical infrastructure of the 26 central banks of the European Union (although Sweden has opted out). SEPA is a self-regulatory initiative by the banking sector of Europe as represented in the European Payments Council (EPC). The European Union made the scheme mandatory through the Payment Services Directive published in 2007. Since January 2008, all countries were required to support SEPA credit transfer, and SEPA direct debit was required to be supported since November 2009. The regulation on SEPA payments increased the charge cap (same price for domestic payments as for cross-border payments) to €50,000. With a further decision of the European Parliament, the IBAN scheme for bank accounts fully replaced the domestic numbering schemes from 31 December 2012. On 16 December 2010, the European Commission published regulations that made IBAN support mandatory for domestic credit transfer by 2013 and for domestic direct debit by 2014 (with a 12 and 24 months transition period respectively). Some countries had already replaced their traditional bank account scheme by IBAN. This included Switzerland where IBAN was introduced for national credit transfer on 1 January 2006 and the support for the old bank account numbers was not required from 1 January 2010. Based on a 20 December 2011 memorandum, the EU parliament resolved the mandatory dates for the adoption of the IBAN on 14 February 2012. On 1 February 2014, all national systems for credit transfer and direct debit were abolished and replaced by an IBAN-based system. This was then extended to all cross-border SEPA transactions on 1 February 2016 (Article 5 Section 7). After these dates the IBAN is sufficient to identify an account for home and foreign financial transactions in SEPA countries and banks are no longer permitted to require that the customer supply the BIC for the beneficiary's bank. In the run-up to the 1 February 2014 deadline, it became apparent that many old bank account numbers had not been allocated IBANs—an issue that was addressed on a country-by-country basis. In Germany, for example, Deutsche Bundesbank and the German Banking Industry Committee required that all holders of German bank codes ("Bankleitzahl") published the specifics of their IBAN generation format taking into account not only the generation of check digits but also the handling of legacy bank codes, thereby enabling third parties to generate IBANs independently of the bank. The first such catalogue was published in June 2013 as a variant of the old bank code catalog ("Bankleitzahlendatei"). Non-EEA Banks in numerous non-European countries including most states of the Middle East, North Africa and the Caribbean have implemented the IBAN format for account identification. In some countries the IBAN is used on an ad hoc basis, an example was Ukraine where account numbers used for international transfers by some domestic banks had additional aliases that followed the IBAN format as a precursor to formal SWIFT registration. This practice in Ukraine ended on 1 November 2019 when all Ukrainian banks had fully switched to the IBAN standard. The degree to which a bank verifies the validity of a recipient's bank account number depends on the configuration of the transmitting bank's software—many major software packages supply bank account validation as a standard function. Some banks outside Europe may not recognize IBAN, though this is expected to diminish with time. Non-European banks usually accept IBANs for accounts in Europe, although they might not treat IBANs differently from other foreign bank account numbers. In particular, they might not check the IBAN's validity prior to sending the transfer. Banks in the United States do not use IBAN as account numbers for U.S. accounts and use ABA routing transit numbers. Any adoption of the IBAN standard by U.S. banks would likely be initiated by ANSI ASC X9, the U.S. financial services standards development organization: a working group (X9B20) was established as an X9 subcommittee to generate an IBAN construction for U.S. bank accounts. Canadian financial institutions have not adopted IBAN and use routing numbers issued by Payments Canada for domestic transfers, and SWIFT for international transfers. There is no formal governmental or private sector regulatory requirement in Canada for the major banks to use IBAN. Australia and New Zealand do not use IBAN. They use Bank State Branch codes for domestic transfers and SWIFT for international transfers. IBAN formats by country This table summarises the IBAN formats by country: The kk after the two-character ISO country code represents the check digits calculated from the rest of the IBAN characters. If it is a constant for the country concerned, this will be stated in the Comments column. This happens where the BBAN has its own check digits that use the same algorithm as the IBAN check digits The BBAN format column shows the format of the BBAN part of an IBAN in terms of upper case alpha characters (A–Z) denoted by "a", numeric characters (0–9) denoted by "n" and mixed case alphanumeric characters (a–z, A–Z, 0–9) denoted by "c". For example, the Bulgarian BBAN (4a,6n,8c) consists of 4 alpha characters, followed by 6 numeric characters, then by 8 mixed-case alpha-numeric characters Descriptions in the Comments field have been standardised with country-specific names in brackets. The format of the various fields can be deduced from the BBAN field In addition to the above, the IBAN is under development in countries below but has not yet been catalogued for general international use. In this list "kk" represent the IBAN checksum "a" represents an alphabetic character "c" represents an alphanumeric character "n" represents a numeric character. See also Bank card number Bank regulation ABA routing transit number Routing number (Canada) Notes References External links Banking terms Financial regulation ISO standards Bank codes Checksum algorithms
[ -0.003977743908762932, 0.3340775966644287, 0.15690341591835022, -0.0616103857755661, 0.3086872398853302, 0.06261399388313293, -0.12496480345726013, 0.5722400546073914, -0.6088353395462036, -0.2275865226984024, -0.24850529432296753, -0.036820750683546066, -0.10991484671831131, 0.42127344012...
15254
https://en.wikipedia.org/wiki/Infinitive
Infinitive
Infinitive (abbreviated ) is a linguistics term for certain verb forms existing in many languages, most often used as non-finite verbs. As with many linguistic concepts, there is not a single definition applicable to all languages. The word is derived from Late Latin [modus] infinitivus, a derivative of infinitus meaning "unlimited". In traditional descriptions of English, the infinitive is the basic dictionary form of a verb when used non-finitely, with or without the particle to. Thus to go is an infinitive, as is go in a sentence like "I must go there" (but not in "I go there", where it is a finite verb). The form without to is called the bare infinitive, and the form with to is called the full infinitive or to-infinitive. In many other languages the infinitive is a distinct single word, often with a characteristic inflective ending, like morir ("[to] die") in Spanish, manger ("[to] eat") in French, portare ("[to] carry") in Latin, lieben ("[to] love") in German, (chitat, "[to] read") in Russian, etc. However, some languages have no infinitive forms. Many Native American languages, Arabic, Asian languages such as Japanese, and some languages in Africa and Australia do not have direct equivalents to infinitives or verbal nouns. Instead, they use finite verb forms in ordinary clauses or various special constructions. Being a verb, an infinitive may take objects and other complements and modifiers to form a verb phrase (called an infinitive phrase). Like other non-finite verb forms (like participles, converbs, gerunds and gerundives), infinitives do not generally have an expressed subject; thus an infinitive verb phrase also constitutes a complete non-finite clause, called an infinitive (infinitival) clause. Such phrases or clauses may play a variety of roles within sentences, often being nouns (for example being the subject of a sentence or being a complement of another verb), and sometimes being adverbs or other types of modifier. Many verb forms known as infinitives differ from gerunds (verbal nouns) in that they do not inflect for case or occur in adpositional phrases. Instead, infinitives often originate in earlier inflectional forms of verbal nouns. Unlike finite verbs, infinitives are not usually inflected for tense, person, etc. either, although some degree of inflection sometimes occurs; for example Latin has distinct active and passive infinitives. Phrases and clauses An infinitive phrase is a verb phrase constructed with the verb in infinitive form. This consists of the verb together with its objects and other complements and modifiers. Some examples of infinitive phrases in English are given below – these may be based on either the full infinitive (introduced by the particle to) or the bare infinitive (without the particle to). (to) sleep (to) write ten letters (to) go to the store for a pound of sugar Infinitive phrases often have an implied grammatical subject making them effectively clauses rather than phrases. Such infinitive clauses or infinitival clauses, are one of several kinds of non-finite clause. They can play various grammatical roles like a constituent of a larger clause or sentence; for example it may form a noun phrase or adverb. Infinitival clauses may be embedded within each other in complex ways, like in the sentence: I want to tell you that John Welborn is going to get married to Blair. Here the infinitival clause to get married is contained within the finite dependent clause that John Welborn is going to get married to Blair; this in turn is contained within another infinitival clause, which is contained in the finite independent clause (the whole sentence). The grammatical structure of an infinitival clause may differ from that of a corresponding finite clause. For example, in German, the infinitive form of the verb usually goes to the end of its clause, whereas a finite verb (in an independent clause) typically comes in second position. Clauses with implicit subject in the objective case Following certain verbs or prepositions, infinitives commonly do have an implicit subject, e.g., I want them to eat their dinner. For him to fail now would be a disappointment. As these examples illustrate, the implicit subject of the infinitive occurs in the objective case (them, him) in contrast to the nominative case that occurs with a finite verb, e.g., "They ate their dinner." Such accusative and infinitive constructions are present in Latin and Ancient Greek, as well as many modern languages. The atypical case regarding the implicit subject of an infinitive is an example of exceptional case-marking. As shown in the above examples, the object of the transitive verb "want" and the preposition "for" allude to their respective pronouns' subjective role within the clauses. Marking for tense, aspect and voice In some languages, infinitives may be marked for grammatical categories like voice, aspect, and to some extent tense. This may be done by inflection, as with the Latin perfect and passive infinitives, or by periphrasis (with the use of auxiliary verbs), as with the Latin future infinitives or the English perfect and progressive infinitives. Latin has present, perfect and future infinitives, with active and passive forms of each. For details see . English has infinitive constructions that are marked (periphrastically) for aspect: perfect, progressive (continuous), or a combination of the two (perfect progressive). These can also be marked for passive voice (as can the plain infinitive): (to) eat (plain infinitive, active) (to) be eaten (passive) (to) have eaten (perfect active) (to) have been eaten (perfect passive) (to) be eating (progressive active) (to) be being eaten (progressive passive) (to) have been eating (perfect progressive active) (to) have been being eaten (perfect progressive passive, not often used) Further constructions can be made with other auxiliary-like expressions, like (to) be going to eat or (to) be about to eat, which have future meaning. For more examples of the above types of construction, see . Perfect infinitives are also found in other European languages that have perfect forms with auxiliaries similarly to English. For example, avoir mangé means "(to) have eaten" in French. English Regarding English, the term "infinitive" is traditionally applied to the unmarked form of the verb (the "plain form") when it forms a non-finite verb, whether or not introduced by the particle to. Hence sit and to sit, as used in the following sentences, would each be considered an infinitive: I can sit here all day. I want to sit on the other chair. The form without to is called the bare infinitive; the form introduced by to is called the full infinitive or to-infinitive. The other non-finite verb forms in English are the gerund or present participle (the -ing form), and the past participle – these are not considered infinitives. Moreover, the unmarked form of the verb is not considered an infinitive when it forms a finite verb: like a present indicative ("I sit every day"), subjunctive ("I suggest that he sit"), or imperative ("Sit down!"). (For some irregular verbs the form of the infinitive coincides additionally with that of the past tense and/or past participle, like in the case of put.) Certain auxiliary verbs are defective in that they do not have infinitives (or any other non-finite forms). This applies to the modal verbs (can, must, etc.), as well as certain related auxiliaries like the had of had better and the used of used to. (Periphrases can be employed instead in some cases, like (to) be able to for can, and (to) have to for must.) It also applies to the auxiliary do, like used in questions, negatives and emphasis like described under do-support. (Infinitives are negated by simply preceding them with not. Of course the verb do when forming a main verb can appear in the infinitive.) However, the auxiliary verbs have (used to form the perfect) and be (used to form the passive voice and continuous aspect) both commonly appear in the infinitive: "I should have finished by now"; "It's thought to have been a burial site"; "Let him be released"; "I hope to be working tomorrow." Huddleston and Pullum's Cambridge Grammar of the English Language (2002) does not use the notion of the "infinitive" ("there is no form in the English verb paradigm called 'the infinitive'"), only that of the infinitival clause, noting that English uses the same form of the verb, the plain form, in infinitival clauses that it uses in imperative and present-subjunctive clauses. A matter of controversy among prescriptive grammarians and style writers has been the appropriateness of separating the two words of the to-infinitive (as in "I expect to happily sit here"). For details of this, see split infinitive. Opposing linguistic theories typically do not consider the to-infinitive a distinct constituent, instead regarding the scope of the particle to as an entire verb phrase; thus, to buy a car is parsed like to [buy [a car]], not like [to buy] [a car]. Uses of the infinitive The bare infinitive and the to-infinitive have a variety of uses in English. The two forms are mostly in complementary distribution – certain contexts call for one, and certain contexts for the other; they are not normally interchangeable, except in occasional instances like after the verb help, where either can be used. The main uses of infinitives (or infinitive phrases) are as follows: As complements of other verbs. The bare infinitive form is a complement of the dummy auxiliary do, most modal auxiliary verbs, verbs of perception like see, watch and hear (after a direct object), and the verbs of permission or causation make, bid, let, and have (also after a direct object). The to-infinitive is used after many transitive verbs like want, aim, like, fail, etc., and as an object complement of a direct object regarding verbs like want, convince, aim, etc. In various particular expressions, like had better and would rather (with bare infinitive), in order to, as if to, am to/is to/are to. As a noun phrase, expressing its action or state in an abstract, general way, forming the subject of a clause or a predicative expression: "To err is human"; "To know me is to love me". The bare infinitive can be used in such sentences like "What you should do is make a list." A common construction with the to-infinitive involves a dummy pronoun subject (it), with the infinitive phrase placed after the predicate: "It was nice to meet you." Adverbially, to express purpose, intent or result, as the to-infinitive can have the meaning of in order to, e.g. "I closed the door in order to block out any noise." As a modifier of a noun or adjective. This may relate to the meaning of the noun or adjective ("a request to see someone"; "keen to get on"), or it may form a type of non-finite relative clause, like in "the man to save us"; "the method to use"; "nice to listen to". In elliptical questions (direct or indirect): "I don't know where to go." After why the bare infinitive is used: "Why reveal it?" The infinitive is also the usual dictionary form or citation form of a verb. The form listed in dictionaries is the bare infinitive, although the to-infinitive is often used in referring to verbs or in defining other verbs: "The word 'amble' means 'to walk slowly'"; "How do we conjugate the verb to go?" For further detail and examples of the uses of infinitives in English, see Bare infinitive and To-infinitive in the article on uses of English verb forms. Other Germanic languages The original Proto-Germanic ending of the infinitive was -an, with verbs derived from other words ending in -jan or -janan. In German it is -en ("sagen"), with -eln or -ern endings on a few words based on -l or -r roots ("segeln", "ändern"). The use of zu with infinitives is similar to English to, but is less frequent than in English. German infinitives can form nouns, often expressing abstractions of the action, in which case they are of neuter gender: das Essen means the eating, but also the food. In Dutch infinitives also end in -en (zeggen — to say), sometimes used with te similar to English to, e.g., "Het is niet moeilijk te begrijpen" → "It is not hard to understand." The few verbs with stems ending in -a have infinitives in -n (gaan — to go, slaan — to hit). Afrikaans has lost the distinction between the infinitive and present forms of verbs, with the exception of the verbs "wees" (to be), which admits the present form "is", and the verb "hê" (to have), whose present form is "het". In North Germanic languages the final -n was lost from the infinitive as early as 500–540 AD, reducing the suffix to -a. Later it has been further reduced to -e in Danish and some Norwegian dialects (including the written majority language bokmål). In the majority of Eastern Norwegian dialects and a few bordering Western Swedish dialects the reduction to -e was only partial, leaving some infinitives in -a and others in -e (å laga vs. å kaste). In northern parts of Norway the infinitive suffix is completely lost (å lag’ vs. å kast’) or only the -a is kept (å laga vs. å kast’). The infinitives of these languages are inflected for passive voice through the addition of -s or -st to the active form. This suffix appearance in Old Norse was a contraction of mik (“me”, forming -mk) or sik (reflexive pronoun, forming -sk) and was originally expressing reflexive actions: (hann) kallar (“[he] calls”) + -sik (“himself”) > (hann) kallask (“[he] calls himself”). The suffixes -mk and -sk later merged to -s, which evolved to -st in the western dialects. The loss or reduction of -a in active voice in Norwegian did not occur in the passive forms (-ast, -as), except for some dialects that have -es. The other North Germanic languages have the same vowel in both forms. Latin and Romance languages The formation of the infinitive in the Romance languages reflects that in their ancestor, Latin, almost all verbs had an infinitive ending with -re (preceded by one of various thematic vowels). For example, in Italian infinitives end in -are, -ere, -rre (rare), or -ire (which is still identical to the Latin forms), and in -arsi, -ersi, -rsi, -irsi for the reflexive forms. In Spanish and Portuguese, infinitives end in -ar, -er, or -ir (Spanish also has reflexive forms in -arse, -erse, -irse), while similarly in French they typically end in -re, -er, oir, and -ir. In Romanian, both short and long-form infinitives exist; the so-called "long infinitives" end in -are, -ere, -ire and in modern speech are used exclusively as verbal nouns, while there are a few verbs that cannot be converted into the nominal long infinitive. The "short infinitives" used in verbal contexts (e.g., after an auxiliary verb) have the endings -a,-ea, -e, and -i (basically removing the ending in "-re"). In Romanian, the infinitive is usually replaced by a clause containing the conjunction să plus the subjunctive mood. The only verb that is modal in common modern Romanian is the verb a putea, to be able to. However, in popular speech the infinitive after a putea is also increasingly replaced by the subjunctive. In all Romance languages, infinitives can also form nouns. Latin infinitives challenged several of the generalizations about infinitives. They did inflect for voice (amare, "to love", amari, to be loved) and for tense (amare, "to love", amavisse, "to have loved"), and allowed for an overt expression of the subject (video Socratem currere, "I see Socrates running"). See . Romance languages inherited from Latin the possibility of an overt expression of the subject (as in Italian vedo Socrate correre). Moreover, the "inflected infinitive'''" (or "personal infinitive") found in Portuguese and Galician inflects for person and number. These, alongside Sardinian, are the only Indo-European languages that allow infinitives to take person and number endings. This helps to make infinitive clauses very common in these languages; for example, the English finite clause in order that you/she/we have... would be translated to Portuguese like para teres/ela ter/termos... (Portuguese is a null-subject language). The Portuguese personal infinitive has no proper tenses, only aspects (imperfect and perfect), but tenses can be expressed using periphrastic structures. For instance, "even though you sing/have sung/are going to sing" could be translated to "apesar de cantares/teres cantado/ires cantar". Other Romance languages (including Spanish, Romanian, Catalan, and some Italian dialects) allow uninflected infinitives to combine with overt nominative subjects. For example, Spanish al abrir yo los ojos ("when I opened my eyes") or sin yo saberlo ("without my knowing about it"). Hellenic languages Ancient Greek In Ancient Greek the infinitive has four tenses (present, future, aorist, perfect) and three voices (active, middle, passive). Present and perfect have the same infinitive for both middle and passive, while future and aorist have separate middle and passive forms. Thematic verbs form present active infinitives by adding to the stem the thematic vowel and the infinitive ending , and contracts to , e.g., . Athematic verbs, and perfect actives and aorist passives, add the suffix instead, e.g., . In the middle and passive, the present middle infinitive ending is , e.g., and most tenses of thematic verbs add an additional between the ending and the stem, e.g., . Modern Greek The infinitive per se does not exist in Modern Greek. To see this, consider the ancient Greek ἐθέλω γράφειν “I want to write”. In modern Greek this becomes θέλω να γράψω “I want that I write”. In modern Greek, the infinitive has thus changed form and function and is used mainly in the formation of periphrastic tense forms and not with an article or alone. Instead of the Ancient Greek infinitive system γράφειν, γράψειν, γράψαι, γεγραφέναι, Modern Greek uses only the form γράψει, a development of the ancient Greek aorist infinitive γράψαι. This form is also invariable. The modern Greek infinitive has only two forms according to voice: for example, γράψει for the active voice and γραφ(τ)εί for the passive voice (coming from the ancient passive aorist infinitive γραφῆναι). Balto-Slavic languages The infinitive in Russian usually ends in -t’ (ть) preceded by a thematic vowel, or -ti (ти), if not preceded by one; some verbs have a stem ending in a consonant and change the t to č’, like *mogt’ → moč’ (*могть → мочь) "can". Some other Balto-Slavic languages have the infinitive typically ending in, for example, -ć (sometimes -c) in Polish, -t’ in Slovak, -t (formerly -ti) in Czech and Latvian (with a handful ending in -s on the latter), -ty (-ти) in Ukrainian, -ць (-ts') in Belarusian. Lithuanian infinitives end in -ti, Croatian in -ti or -ći, and Slovenian in -ti or -či.Serbian officially retains infinitives -ti or -ći, but is more flexible than the other slavic languages in breaking the infinitive through a clause. The infinitive nevertheless remains the dictionary form. Bulgarian and Macedonian have lost the infinitive altogether except in a handful of frozen expressions where it is the same as the 3rd person singular aorist form. Almost all expressions where an infinitive may be used in Bulgarian are listed here; neverthess in all cases a subordinate clause is the more usual form. For that reason, the present first-person singular conjugation is the dictionary form in Bulgarian, while Macedonian uses the third person singular form of the verb in present tense. Hebrew Hebrew has two infinitives, the infinitive absolute and the infinitive construct. The infinitive construct is used after prepositions and is inflected with pronominal endings to indicate its subject or object: bikhtōbh hassōphēr "when the scribe wrote", ahare lekhtō "after his going". When the infinitive construct is preceded by (lə-, li-, lā-, lo-) "to", it has a similar meaning to the English to-infinitive, and this is its most frequent use in Modern Hebrew. The infinitive absolute is used for verb focus and emphasis, like in mōth yāmūth (literally "a dying he will die"; figuratively, "he shall indeed/surely die"). This usage is commonplace in the Hebrew Bible. In Modern Hebrew it is restricted to high-register literary works. Note, however, that the to-infinitive of Hebrew is not the dictionary form; that is the third person singular past form. Finnish The Finnish grammatical tradition includes many non-finite forms that are generally labeled as (numbered) infinitives although many of these are functionally converbs. To form the so-called first infinitive, the strong form of the root (without consonant gradation or epenthetic 'e') is used, and these changes occur: the root is suffixed with -ta/-tä according to vowel harmony consonant elision takes place if applicable, e.g., juoks+ta → juosta assimilation of clusters violating sonority hierarchy if applicable, e.g., nuol+ta → nuolla, sur+ta → surra 't' weakens to 'd' after diphthongs, e.g., juo+ta → juoda 't' elides if intervocalic, e.g., kirjoitta+ta → kirjoittaaAs such, it is inconvenient for dictionary use, because the imperative would be closer to the root word. Nevertheless, dictionaries use the first infinitive. There are also four other infinitives, plus a "long" form of the first: The long first infinitive is -kse- and must have a personal suffix appended to it. It has the general meaning of "in order to [do something], e.g., kirjoittaakseni "in order for me to write [something]". The second infinitive is formed by replacing the final -a/-ä of the first infinitive with e. It can take the inessive and instructive cases to create forms like kirjoittaessa "while writing". The third infinitive is formed by adding -ma to the first infinitive, which alone creates an "agent" form: kirjoita- becomes kirjoittama. The third infinitive is technically a noun (denoting the act of performing some verb), so case suffixes identical to those attached to ordinary Finnish nouns allow for other expressions using the third infinitive, e.g., kirjoittamalla "by writing". A personal suffix can then be added to this form to indicate the agent participle, such that kirjoittamani kirja = "The book that I wrote." The fourth infinitive adds -minen to the first to form a noun that has the connotation of "the process of [doing something]", e.g., kirjoittaminen "[the process of] writing". It, too, can be inflected like other Finnish nouns that end in -nen. The fifth infinitive adds -maisilla- to the first, and like the long first infinitive, must take a possessive suffix. It has to do with being "about to [do something]" and may also imply that the act was cut off or interrupted, e.g., kirjoittamaisillasi "you were about to write [but something interrupted you]". This form is more commonly replaced by the third infinitive in adessive case, usually also with a possessive suffix (thus kirjoittamallasi). Note that all of these must change to reflect vowel harmony, so the fifth infinitive (with a third-person suffix) of hypätä "jump" is hyppäämäisillään "he was about to jump", not *hyppäämaisillaan. Seri The Seri language of northwestern Mexico has infinitival forms used in two constructions (with the verb meaning 'want' and with the verb meaning 'be able'). The infinitive is formed by adding a prefix to the stem: either iha- (plus a vowel change of certain vowel-initial stems) if the complement clause is transitive, or ica- (and no vowel change) if the complement clause is intransitive. The infinitive shows agreement in number with the controlling subject. Examples are: icatax ihmiimzo 'I want to go', where icatax is the singular infinitive of the verb 'go' (singular root is -atax), and icalx hamiimcajc 'we want to go', where icalx is the plural infinitive. Examples of the transitive infinitive: ihaho 'to see it/him/her/them' (root -aho), and ihacta 'to look at it/him/her/them' (root -oocta). Translation to languages without an infinitive In languages without an infinitive, the infinitive is translated either as a that-clause or as a verbal noun. For example, in Literary Arabic the sentence "I want to write a book" is translated as either urīdu an aktuba kitāban (lit. "I want that I write a book", with a verb in the subjunctive mood) or urīdu kitābata kitābin (lit. "I want the writing of a book", with the masdar or verbal noun), and in Levantine Colloquial Arabic biddi aktub kitāb (subordinate clause with verb in subjunctive). Even in languages that have infinitives, similar constructions are sometimes necessary where English would allow the infinitive. For example, in French the sentence "I want you to come" translates to Je veux que vous veniez (lit. "I want that you come", with come being in the subjunctive mood). However, "I want to come" is simply Je veux venir, using the infinitive, just as in English. In Russian, sentences such as "I want you to leave" do not use an infinitive. Rather, they use the conjunction чтобы "in order to/so that" with the past tense form (most probably remnant of subjunctive) of the verb: Я хочу, чтобы вы ушли'' (literally, "I want so that you left"). See also Auxiliary verb Finite verb Gerund Non-finite verb Split infinitive Verbal noun Notes Parts of speech Syntactic entities Verb types
[ -0.567009687423706, -0.47946369647979736, -0.04946136847138405, -0.1427900642156601, -0.8872247338294983, 0.386125773191452, 0.5405802726745605, 0.4641290307044983, -0.4810445010662079, -0.17122195661067963, -0.6270654797554016, 0.3477478623390198, -0.34275302290916443, -0.1513160914182663...
15256
https://en.wikipedia.org/wiki/Immaculate%20Conception
Immaculate Conception
The Immaculate Conception is a doctrine of the Roman Catholic Church that states that the Virgin Mary was free of original sin from the moment of her conception. First debated by medieval theologians, it proved so controversial that it did not become part of official Catholic teaching until 1854, when Pius IX gave it the status of dogma in the papal bull Ineffabilis Deus. The Roman Missal and the Roman Rite Liturgy of the Hours includes references to Mary's immaculate conception in the feast of the Immaculate Conception. The Immaculate Conception became a popular subject in literature, but its abstract nature meant it was late in appearing as a subject in art. The iconography of the Virgin of the Immaculate Conception shows her standing, with arms outstretched or hands clasped in prayer. Her feast day is 8 December. Protestants rejected the doctrine of the Immaculate Conception as without foundation in the Bible, and Patriarch Anthimus VII of Constantinople characterized the dogma of the Immaculate Conception as "Roman novelt[y]". Doctrine The Immaculate Conception of Mary is one of the four Marian dogmas of the Catholic Church, meaning that it is held to be a divinely revealed truth whose denial is heresy. Defined by Pope Pius IX in Ineffabilis Deus, 1854, it states that Mary, through God's grace, was conceived free from the stain of original sin through her role as the Mother of God: We declare, pronounce, and define that the doctrine which holds that the most Blessed Virgin Mary, in the first instance of her conception, by a singular grace and privilege granted by Almighty God, in view of the merits of Jesus Christ, the Saviour of the human race, was preserved free from all stain of original sin, is a doctrine revealed by God and therefore to be believed firmly and constantly by all the faithful. While the Immaculate Conception asserts Mary's freedom from original sin, the Council of Trent, held between 1545 and 1563, had previously affirmed her freedom from personal sin. History Anne, mother of Mary, and original sin Anne appears as the mother of Mary in the late 2nd-century Gospel of James. Anne and her husband, Saint Joachim, are infertile, but God hears their prayers and Mary is conceived. The conception occurs without sexual intercourse between Anne and Joachim, but the story does not advance the idea of an immaculate conception. Medieval formulation By the 4th century it was generally accepted that Mary was free of personal sin, but original sin raised the question of whether she was also free of the sin passed down from Adam. The question became acute when the feast of her conception began to be celebrated in England in the 11th century, and the opponents of the feast of Mary's conception brought forth the objection that as sexual intercourse is sinful, to celebrate Mary's conception was to celebrate a sinful event. (The feast of Mary's conception originated in the Eastern Church in the 7th century, reached England in the 11th, and from there spread to Europe, where it was given official approval in 1477 and extended to the whole Church in 1693; the word "immaculate" was not officially added to the name of the feast until 1854). The doctrine of the Immaculate Conception caused a virtual civil war between Franciscans and Dominicans during the middle ages, with Franciscan 'Scotists' in its favour and Dominican 'Thomists' against it. The English ecclesiastic and scholar Eadmer (c.1060-c.1126) reasoned that it was possible that Mary was conceived without original sin in view of God's omnipotence, and that it was also appropriate in view of her role as Mother of God: Potuit, decuit, fecit, "it was possible, it was fitting, therefore it was done." Others, including Bernard of Clairvaux (1090–1153) and Thomas Aquinas (1225–1274), objected that if Mary were free of original sin at her conception then she would have no need of redemption, making Christ superfluous; they were answered by Duns Scotus (1264–1308), who argued that her preservation from original sin was a redemption more perfect than that granted through Christ. In 1439, the Council of Basel, in schism with Pope Eugene IV who resided at the Council of Florence, declared Mary's Immaculate Conception a "pious opinion" consistent with faith and Scripture; the Council of Trent, held in several sessions in the early 1500s, made no explicit declaration on the subject but exempted her from the universality of original sin; and by 1571 the Pope's Breviary (prayerbook) set out an elaborate celebration of the Feast of the Immaculate Conception on 8 December. Popular devotion and Ineffabilis Deus The eventual creation of the dogma was due more to popular devotion than scholarship. The Immaculate Conception became a popular subject in literature and art, and some devotees went so far as to hold that Anne had conceived Mary by kissing her husband Joachim, and that Anne's father and grandmother had likewise been conceived without sexual intercourse, although St Bridget of Sweden (c.1303–1373) told how Mary herself had revealed to her that Anne and Joachim conceived their daughter through a sexual union which was sinless because it was pure and free of sexual lust. In the 16th and especially the 17th centuries there was a proliferation of Immaculatist devotion in Spain, leading the Habsburg monarchs to demand that the papacy elevate the belief to the status of dogma. In France in 1830 Catherine Labouré (May 2, 1806 – December 31, 1876) saw a vision of Mary as the Immaculate Conception standing on a globe while a voice commanded her to have a medal made in imitation of what she saw, and her vision marked the beginning of a great 19th-century Marian revival. In 1849 Pope Pius IX asked the Bishops of the Church for their views on whether the doctrine should be defined as dogma; ninety percent of those who responded were supportive, and in 1854 the Immaculate Conception dogma was proclaimed with the bull Ineffabilis Deus. Although the Archbishop of Paris, Marie-Dominique-Auguste Sibour, warned that the Immaculate Conception "could be proved neither from the Scriptures nor from tradition" he was present at the promulgation of the decree and shortly afterwards solemnly published it in his own diocese. Ineffabilis Deus found the Immaculate Conception in the Ark of Salvation (Noah's Ark), Jacob's Ladder, the Burning Bush at Sinai, the Enclosed Garden from the Song of Songs, and many more passages. From this wealth of support the pope's advisors singled out Genesis 3:15: "The most glorious Virgin ... was foretold by God when he said to the serpent: 'I will put enmity between you and the woman, a prophecy which reached fulfilment in the figure of the Woman in the Revelation of John, crowned with stars and trampling the Dragon underfoot. Luke 1:28, and specifically the phrase "full of grace" by which Gabriel greeted Mary, was another reference to her Immaculate Conception: "she was never subject to the curse and was, together with her Son, the only partaker of perpetual benediction." Ineffabilis Deus was one of the pivotal events of the papacy of Pius, pope from 16 June 1846 to his death on 7 February 1878. Up until this point it had been understood that dogma had to be based in Scripture and accepted by tradition, but Mary's immaculate conception is not stated in the New Testament and cannot be deduced from it; Ineffabilis Deus therefore was a novelty, being based instead on the declaration of a special commission to the effect that neither Scripture nor tradition were necessary to define dogma, but only the authority of the Church expressed in the Pope. The commission Pius IX had called together declared that neither scriptural proof nor a broad and ancient stream of tradition was required to promulgate Mary's Immaculate Conception. It insisted, further, that the authority of the church today is quite sufficient to define this dogma. Four years after the proclamation of the dogma, in 1858, Mary appeared to the young Bernadette Soubirous at Lourdes in southern France, to announce that she was the Immaculate Conception. Feast, patronages and disputes The feast day of the Immaculate Conception is December 8. Its celebration seems to have begun in the Eastern church in the 7th century and may have spread to Ireland by the 8th, although the earliest well-attested record in the Western church is from England early in the 11th. It was suppressed there after the Norman Conquest (1066), and the first thorough exposition of the doctrine was a response to this suppression. It continued to spread through the 15th century despite accusations of heresy from the Thomists and strong objections from several prominent theologians. Beginning around 1140 St Bernard of Clairvaux, a Cistercian monk, wrote to Lyons Cathedral to express his surprise and dissatisfaction that it had recently begun to be observed there, but in 1477 Pope Sixtus IV, a Franciscan Scotist and devoted Immaculist, placed it on the Roman calendar (i.e., list of Church festivals and observances) via the bull Cum praexcelsa. Thereafter in 1481 and 1483, in response to the polemic writings of the prominent Thomist, Vincenzo Bandello, Pope Sixtus IV published two more bulls which forbade anybody to preach or teach against the Immaculate Conception, or for either side to accuse the other of heresy, on pains of excommunication. Pope Pius V kept the feast on the tridentine calendar but suppressed the word "immaculate". Gregory XV in 1622 prohibited any public or private assertion that Mary was conceived in sin. Urban VIII in 1624 allowed the Franciscans to establish a military order dedicated to the Virgin of the Immaculate Conception. Following the promulgation of Ineffabilis Deus the typically Franciscan phrase "immaculate conception" reasserted itself in the title and euchology (prayer formulae) of the feast. Pius IX solemnly promulgated a mass formulary drawn chiefly from one composed 400 years by a papal chamberlain at the behest of Sixtus IV, beginning "O God who by the Immaculate Conception of the Virgin...". By pontifical decree a number of countries are considered to be under the patronage of the Immaculate Conception. These include Argentina, Brazil, Korea, Nicaragua, Paraguay, the Philippines, Spain (including the old kingdoms and the present state), the United States and Uruguay. By royal decree under the House of Bragança, she is the principal Patroness of Portugal. Prayers and hymns The Roman Missal and the Roman Rite Liturgy of the Hours naturally includes references to Mary's immaculate conception in the feast of the Immaculate Conception. An example is the antiphon that begins: "Tota pulchra es, Maria, et macula originalis non est in te" ("You are all beautiful, Mary, and the original stain [of sin] is not in you." It continues: "Your clothing is white as snow, and your face is like the sun. You are all beautiful, Mary, and the original stain [of sin] is not in you. You are the glory of Jerusalem, you are the joy of Israel, you give honour to our people. You are all beautiful, Mary.") On the basis of the original Gregorian chant music, polyphonic settings have been composed by Anton Bruckner, Pablo Casals, Maurice Duruflé, Grzegorz Gerwazy Gorczycki, Ola Gjeilo, José Maurício Nunes Garcia, and . Other prayers honouring Mary's immaculate conception are in use outside the formal liturgy. The Immaculata prayer, composed by Saint Maximillian Kolbe, is a prayer of entrustment to Mary as the Immaculata. A novena of prayers, with a specific prayer for each of the nine days has been composed under the title of the Immaculate Conception Novena. Ave Maris Stella is the vesper hymn of the feast of the Immaculate Conception. The hymn Immaculate Mary, addressed to Mary as the Immaculately Conceived One, is closely associated with Lourdes. Artistic representation The Immaculate Conception became a popular subject in literature, but its abstract nature meant it was late in appearing as a subject in art. During the Medieval period it was depicted as "Joachim and Anne Meeting at the Golden Gate", meaning Mary's conception through the chaste kiss of her parents at the Golden Gate in Jerusalem; the 14th and 15th centuries were the heyday for this scene, after which it was gradually replaced by more allegorical depictions featuring an adult Mary. The 1476 extension of the feast of the Immaculate Conception to the entire Latin Church reduced the likelihood of controversy for the artist or patron in depicting an image, so that emblems depicting The Immaculate Conception began to appear. Many artists in the 15th century faced the problem of how to depict an abstract idea such as the Immaculate Conception, and the problem was not fully solved for 150 years. The Italian Renaissance artist Piero di Cosimo was among those artists who tried new solutions, but none of these became generally adopted so that the subject matter would be immediately recognisable to the faithful. The definitive iconography for the depiction of "Our Lady" seems to have been finally established by the painter and theorist Francisco Pacheco in his "El arte de la pintura" of 1649: a beautiful young girl of 12 or 13, wearing a white tunic and blue mantle, rays of light emanating from her head ringed by twelve stars and crowned by an imperial crown, the sun behind her and the moon beneath her feet. Pacheco's iconography influenced other Spanish artists or artists active in Spain such as El Greco, Bartolomé Murillo, Diego Velázquez, and Francisco Zurbarán, who each produced a number of artistic masterpieces based on the use of these same symbols. The popularity of this particular representation of The Immaculate Conception spread across the rest of Europe, and has since remained the best known artistic depiction of the concept: in a heavenly realm, moments after her creation, the spirit of Mary (in the form of a young woman) looks up in awe at (or bows her head to) God. The moon is under her feet and a halo of twelve stars surround her head, possibly a reference to "a woman clothed with the sun" from Revelation 12:1–2. Additional imagery may include clouds, a golden light, and putti. In some paintings the putti are holding lilies and roses, flowers often associated with Mary. Other churches Eastern Orthodoxy Eastern Orthodoxy never accepted Augustine's specific ideas on original sin, and in consequence did not become involved in the later developments that took place in the Roman Catholic Church, including the Immaculate Conception. When in 1894 Pope Leo XIII addressed the Eastern church in his encyclical Praeclara gratulationis, Ecumenical Patriarch Anthimos in 1895 replied with an encyclical approved by the Constantinopolitan Synod in which he stigmatised the dogmas of the Immaculate Conception and papal infallibility as "Roman novelties" and called on the Roman church to return to the faith of the early centuries. Eastern Orthodox Bishop Kallistos Ware comments that "the Latin dogma seems to us not so much erroneous as superfluous." Oriental Orthodoxy The Eritrean and Ethiopian Orthodox Tewahedo tradition affirms the Immaculate Conception. The Ethiopian Orthodox Tewahedo Church celebrates the Feast of the Immaculate Conception on Nehasie 7 (August 13). The 96th chapter of the Kebra Nagast states: “He cleansed Eve's body and sanctified it and made for it a dwelling in her for Adam’s salvation. She [i.e., Mary] was born without blemish, for He made her pure, without pollution, and she redeemed his debt without carnal union and embrace...Through the transgression of Eve we died and were buried, and by the purity of Mary we receive honour, and are exalted to the heights.” Old Catholics In the mid-19th century, some Catholics who were unable to accept the doctrine of papal infallibility left the Roman Church and formed the Old Catholic Church; their movement rejects the Immaculate Conception. Protestantism Protestants overwhelmingly condemned the promulgation of Ineffabilis Deus as an exercise in papal power, and the doctrine itself as without foundation in Scripture, for it denied that all had sinned and rested on a translation of Luke 1:28 (the "full of grace" passage) that the original Greek did not support. Protestants, therefore, teach that Mary was a sinner saved through grace like all believers. The ecumenical Lutheran-Catholic Statement on Saints, Mary, issued in 1990 after seven years of study and discussion, conceded that Lutherans and Catholics remained separated "by differing views on matters such as the invocation of saints, the Immaculate Conception and the Assumption of Mary;" the final report of the Anglican–Roman Catholic International Commission (ARCIC), created in 1969 to further ecumenical progress between the Roman Catholic Church and the Anglican Communion, similarly recorded the disagreement of the Anglicans with the doctrine, although Anglo-Catholics may hold the Immaculate Conception as an optional pious belief. See also Act for the Immaculate Conception of Mary Cathedral of the Immaculate Conception (disambiguation) Church of the Immaculate Conception (disambiguation) Congregation of the Immaculate Conception Marian doctrines of the Catholic Church Marian Fathers of the Immaculate Conception Miraculous medal Mother of God (Roman Catholic) Patronages of the Immaculate Conception Perpetual virginity of Mary Roman Catholic Marian art References Citations Bibliography External links The Immaculate Conception in Art (Painting) Ineffabilis Deus – encyclical defining the Immaculate Conception Anglican Mariology Articles containing video clips Immac Immac Immac Immac Immac Immac Immac Scotism Western Christianity
[ 0.03713517263531685, 0.1471911519765854, -0.3024837374687195, -0.1612277776002884, 0.3112676739692688, 0.6027211546897888, 0.9195536375045776, 0.38914743065834045, -0.3246069848537445, -0.23485355079174042, 0.13920016586780548, 0.8838583827018738, 0.17869482934474945, 0.6843587160110474, ...
15260
https://en.wikipedia.org/wiki/Islands%20of%20the%20North%20Atlantic
Islands of the North Atlantic
IONA (Islands of the North Atlantic) is an acronym suggested in 1980 by Sir John Biggs-Davison to refer to a loose linkage of England, Wales, Scotland, Ireland, the Isle of Man and Channel Islands, similar to the present day British-Irish Council. Its intended purpose was as a more politically acceptable alternative to British Isles, which is disliked by many people in Ireland. The neologism has been criticised on the grounds that it excludes most of the islands in the North Atlantic, and also that the only island referred to by the term that is actually in the North Atlantic Ocean is Ireland. Great Britain is in fact in between the Irish Sea and The North Sea. It has been used particularly in the context of the Northern Irish peace process during the negotiation of the Good Friday Agreement, as a neutral name for the proposed council. One feature of this name is that IONA has the same spelling as the island of Iona which is off the coast of Scotland but with which Irish people have strong cultural associations. It is therefore a name with which people of both main islands might identify. Taoiseach Bertie Ahern noted the symbolism in a 2006 address in Edinburgh:[The Island of] Iona is a powerful symbol of relationships between these islands, with its ethos of service not dominion. Iona also radiated out towards the Europe of the Dark Ages, not to mention Pagan England at Lindisfarne. The British-Irish Council is the expression of a relationship that at the origin of the Anglo-Irish process in 1981 was sometimes given the name Iona, islands of the North Atlantic, and sometimes Council of the Isles, with its evocation of the Lords of the Isles of the 14th and 15th centuries who spanned the North Channel. In the 17th century, Highland warriors and persecuted Presbyterian Ministers criss-crossed the North Channel. In a Dáil Éireann debate, Proinsias De Rossa was less enthusiastic: The acronym IONA is a useful way of addressing the coming together of these two islands. However, the island of Iona is probably a green heaven in that nobody lives on it and therefore it cannot be polluted in any way. Outside the Northern Ireland peace process the term IONA is used by the World Universities Debating Championship and in inter-varsity debating competitions throughout Britain and Ireland. In this context IONA is one of the regions which appoint a representative onto the committee of the World Universities Debating Council. Greenland, the Faroe Islands and Iceland would be included in the definition of IONA used in this context, while Newfoundland and Prince Edward Island would be in North America. However, none of these islands have yet participated in the World Universities Debating Championships. Otherwise, the term has achieved very little popular usage in any context. See also British Isles naming dispute British Isles (terminology) References Further reading The Good Friday Agreement British-Irish Council Project IONA Terminology of the British Isles Islands of the North Atlantic Ocean Geographical neologisms
[ 0.4117891490459442, -0.4629842936992645, 0.02518255077302456, -0.7882572412490845, 0.12748457491397858, -0.08754771202802658, -0.0012388250324875116, 0.34273165464401245, -0.4248007833957672, -0.03119698353111744, -0.3816961646080017, -0.16649416089057922, -0.03618122637271881, 0.206050887...
15261
https://en.wikipedia.org/wiki/Intel%20DX4
Intel DX4
IntelDX4 is a clock-tripled i486 microprocessor with 16-kB Level 1 cache. Intel named it DX4 (rather than DX3) as a consequence of litigation with AMD over trademarks. The product was officially named IntelDX4, but OEMs continued using the i486 naming convention. Intel produced IntelDX4s with two clock speed steppings: A 75-MHz version (3× 25 MHz multiplier), and a 100-MHz version (3× 33.3 MHz). Both chips were released in March 1994. A version of IntelDX4 featuring write-back cache was released in October 1994. The original write-through versions of the chip are marked with a laser-embossed “&E,” while the write-back-enabled versions are marked “&EW.” i486 OverDrive editions of IntelDX4 had locked multipliers, and therefore can only run at 3× the external clock speed. The 100-MHz model of the processor had an iCOMP rating of 435, while the 75-MHz processor had a rating of 319. IntelDX4 was an OEM-only product, but the DX4 Overdrive could be purchased at a retail store. The IntelDX4 microprocessor is mostly pin-compatible with the 80486, but requires a lower 3.3-V supply. Normal 80486 and DX2 processors use a 5-V supply; plugging a DX4 into an unmodified socket will destroy the processor. Motherboards lacking support for the 3.3-V CPUs can sometimes make use of them using a voltage regulator (VRM) that fits between the socket and the CPU. The DX4 OverDrive CPUs have VRMs built in. Specifications References DX4 de:Intel i486#Intel DX4
[ -0.14777830243110657, 0.011549628339707851, 0.1686478704214096, -0.13445687294006348, -0.39850836992263794, 0.2041546106338501, 0.21794210374355316, 0.0200478695333004, 0.23411038517951965, -0.28921401500701904, -0.628068745136261, 0.38528716564178467, -0.556315004825592, -0.02829343639314...
15264
https://en.wikipedia.org/wiki/Iapetus%20%28disambiguation%29
Iapetus (disambiguation)
Iapetus is a Titan in Greek mythology. Iapetus may also refer to: Iapetus (moon), one of the planet Saturn's moons, named for the mythological Titan Iapetus Ocean, an ancient ocean between the paleocontinents Laurentia and Baltica Iapetus suture, line of closure of the Iapetus Ocean
[ -0.20658338069915771, 0.4296468496322632, -0.9824538230895996, 0.20164482295513153, -0.3592720329761505, 1.0179470777511597, 0.5699605941772461, 0.28711700439453125, -0.2093910574913025, -0.22266733646392822, 0.1117871031165123, 0.2939218282699585, -0.6790374517440796, 0.4186616837978363, ...
15266
https://en.wikipedia.org/wiki/Interactive%20Fiction%20Competition
Interactive Fiction Competition
The Interactive Fiction Competition (also known as IFComp) is one of several annual competitions for works of interactive fiction. It has been held since 1995. It is intended for fairly short games, as judges are only allowed to spend two hours playing a game before deciding how many points to award it. The competition has been described as the "Super Bowl" of interactive fiction. Organization The competition is organized by Jacqueline Ashwell. Although the first competition had separate sections for Inform and TADS games, subsequent competitions have not been divided into sections and are open to games produced by any method, provided that the software used to play the game is freely available. Anyone can judge the games, and anyone can donate a prize. Almost always, there are enough prizes donated that anyone who enters will get one. Because anyone can judge and participate in the competition, authors are required to make their entries freely available to play. In addition to the main competition, the entries take part in the Miss Congeniality contest, where the participating authors vote for three games (not including their own). This was started in 1998 to distribute that year's surplus prizes; this additional contest has remained unchanged since then, even without the original reason for its existence. There is also a 'Golden Banana of Discord' side contest; the distinction is given to the entry with scores with the highest standard deviation. In 2016, operation of the competition was taken over by the Interactive Fiction Technology Foundation. The competition differs from the XYZZY Awards, as authors must specifically submit games to the Interactive Fiction Competition, but all games released in the past year are eligible for the XYZZY Awards. Many games win awards in both competitions. Winners The following is a list of first place winners to date: 2021: And Then You Come to a House Not Unlike the Previous One by B.J. Best 2020: The Impossible Bottle by Linus Åkesson and Tavern Crawler by Josh Labelle (tie) 2019: Zozzled by Steph Cherrywell 2018: Alias "The Magpie" by J. J. Guest 2017: The Wizard Sniffer by Buster Hudson 2016: Detectiveland by Robin Johnson 2015: Brain Guzzlers from Beyond! by Steph Cherrywell 2014: Hunger Daemon by Sean M. Shore 2013: Coloratura by Lynnea Glasser 2012: Andromeda Apocalypse by Marco Innocenti 2011: Taco Fiction by Ryan Veeder 2010: Aotearoa by Matt Wigdahl 2009: Rover's Day Out by Jack Welch and Ben Collins-Sussman 2008: Violet by Jeremy Freese 2007: Lost Pig by Admiral Jota (writing as Grunk) 2006: Floatpoint by Emily Short 2005: Vespers by Jason Devlin 2004: Luminous Horizon by Paul O'Brian 2003: Slouching Towards Bedlam by Star Foster and Daniel Ravipinto 2002: Another Earth, Another Sky by Paul O'Brian 2001: All Roads by Jon Ingold 2000: Kaged by Ian Finley 1999: Winter Wonderland by Laura A. Knauth 1998: Photopia by Adam Cadre 1997: The Edifice by Lucian P. Smith 1996: The Meteor, the Stone and a Long Glass of Sherbet by Graham Nelson 1995: Tie: A Change in the Weather by Andrew Plotkin, Uncle Zebulon's Will by Magnus Olsson Reception A reviewer for The A.V. Club said of the 2008 competition, "Once again, the IF Competition delivers some of the best writing in games." The 2008 competition was described as containing "some real standouts both in quality of puzzles and a willingness to stretch the definition of text adventures/interactive fiction." See also Spring Thing XYZZY Awards References External links Official website Interactive fiction Video game development competitions
[ -0.11132606118917465, -0.03906732052564621, 0.09192418307065964, 0.6410231590270996, 0.15780973434448242, -0.3525726795196533, -0.13076496124267578, 0.4470478296279907, -0.13969430327415466, -0.2235533446073532, -0.231376051902771, 0.4923950135707855, 0.28905245661735535, 0.183469951152801...
15267
https://en.wikipedia.org/wiki/Immunity
Immunity
Immunity may refer to: Medicine Immunity (medical), resistance of an organism to infection or disease Immunity (journal), a scientific journal published by Cell Press Biology Immune system Engineering Radiofrequence immunity describes how well an electronic circuit is protected against electromagnetic interference Law Legal immunity, the concept of a person or entity being immune from legal liability due to a special status Absolute immunity, a type of immunity for government officials that confers total immunity when acting in the course of their duties Amnesty law, a law that provides immunity for past crimes Charitable immunity, immunity from liability granted to charities in many countries from the 19th century to the mid-20th century Diplomatic immunity, agreement between sovereign governments to exclude diplomats from local laws Immunity from prosecution (international law), exclusion of governments or their officials from prosecution under international law Judicial immunity, immunity of a judge or magistrate in the course of their official duties Parliamentary immunity, immunity granted to elected officials during their tenure and in the course of their duties Qualified immunity, in the United States, immunity of individuals performing tasks as part of the government's actions Sovereign immunity, the prevention of lawsuits or prosecution against rulers or governments without their given consent Sovereign immunity in the United States, the legal privilege by which the American federal, state, and tribal governments cannot be sued Spousal privilege, also called spousal immunity, protects a spouse from testifying against the defendant State immunity, principle of international law that the government of a state is not amenable before the courts of another state Witness immunity, immunity granted to a witness in exchange for testimony Other Immunity (Rupert Hine album) Immunity (Jon Hopkins album) Immunity (Clairo album) Immunity (reality television), a condition which protects a contestant on a reality TV show from being kicked off the show in a given period "Immunity", a song by Linda Perhacs from her album The Soul of All Natural Things
[ 0.2877747714519501, 0.25707924365997314, -0.29883667826652527, 0.38126876950263977, -0.09406523406505585, -0.396261066198349, 0.7169345617294312, -0.05951685830950737, -0.4189501404762268, 0.015088756568729877, -0.6955804824829102, 0.40772461891174316, -0.01179747749119997, 0.3464490175247...
15268
https://en.wikipedia.org/wiki/Inquests%20in%20England%20and%20Wales
Inquests in England and Wales
Inquests in England and Wales are held into sudden or unexplained deaths and also into the circumstances of and discovery of a certain class of valuable artefacts known as "treasure trove". In England and Wales, inquests are the responsibility of a coroner, who operates under the jurisdiction of the Coroners and Justice Act 2009. In some circumstances where an inquest cannot view or hear all the evidence, it may be suspended and a public inquiry held with the consent of the Home Secretary. Where an inquest is needed There is a general duty upon every person to report a death to the coroner if an inquest is likely to be required. However, this duty is largely unenforceable in practice and the duty falls on the responsible registrar. The registrar must report a death where: The deceased was not attended by a doctor during their last illness The death occurred within 24 hours of admission to a hospital The cause of death has not been certified by a doctor who saw the deceased after death or within the 14 days before death The cause of death is unknown The registrar believes that the cause of death was unnatural, caused by violence, neglect or abortion outside the exemptions of the Abortion Act 1967, or occurred in suspicious circumstances Death occurred during surgery of any kind or while under anaesthetic both local and general The cause of death was or was suspected to be an industrial disease The death relates to public health or the general health or welfare of the public-at-large The coroner must hold an inquest where the death is: Violent or unnatural Sudden and of unknown cause In prison or police custody Suspected to be suicide Where the cause of death is unknown, the coroner may order a post mortem examination in order to determine whether the death was violent. If the death is found to be non-violent, an inquest is unnecessary. In 2004 in England and Wales, there were 514,000 deaths of which 225,500 were referred to the coroner. Of those, 115,800 resulted in post-mortem examinations and there were 28,300 inquests, 570 with a jury. In 2014 the Royal College of Pathologists claimed that up to 10,000 deaths a year recorded as being from natural causes should have been investigated by inquests. They were particularly concerned about people whose death occurred as a result of medical errors. "We believe a medical examiner would have been alerted to what was going on in Mid-Staffordshire long before this long list of avoidable deaths reached the total it did," said Archie Prentice, the pathologists' president. Juries A coroner must summon a jury for an inquest if the death was not a result of natural causes and occurred when the deceased was in state custody (for example in prison, police custody, or whilst detained under the Mental Health Act 1983); or if it was the result of an act or omission of a police officer; or if it was a result of a notifiable accident, poisoning or disease. The senior coroner can also call a jury at his or her own discretion. This discretion has been heavily litigated in light of the Human Rights Act 1998, which means that juries are required now in a broader range of situations than expressly required by statute. Scope of inquest The purpose of the inquest is to answer four questions: Identity of the deceased Place of death Time of death How the deceased came by their death Evidence must be solely for the purpose of answering these questions and no other evidence is admitted. It is not for the inquest to ascertain "how the deceased died" or "in what broad circumstances", but "how the deceased came by his death", a more limited question. Moreover, it is not the purpose of the inquest to determine, or appear to determine, criminal or civil liability, to apportion guilt or attribute blame. For example, where a prisoner hanged himself in a cell, he came by his death by hanging and it was not the role of the inquest to enquire into the broader circumstances such as the alleged neglect of the prison authorities that might have contributed to his state of mind or given him the opportunity. However, the inquest should set out as many of the facts as the public interest requires. Under the terms of article 2 of the European Convention of Human Rights, governments are required to "establish a framework of laws, precautions, procedures and means of enforcement which will, to the greatest extent reasonably practicable, protect life". The European Court of Human Rights has interpreted this as mandating independent official investigation of any death where public servants may be implicated. Since the Human Rights Act 1998 came into force, in those cases alone, the inquest is now to consider the broader question "by what means and in what circumstances". In disasters, such as the 1987 King's Cross fire, a single inquest may be held into several deaths. Procedure Inquests are governed by the Rules. The coroner gives notice to near relatives, those entitled to examine witnesses and those whose conduct is likely to be scrutinised. Inquests are held in public except where there are real issues and substantial of national security but only the portions which relate to national security will be held behind closed doors. Individuals with an interest in the proceedings, such as relatives of the deceased, individuals appearing as witnesses, and organisations or individuals who may face some responsibility in the death of the individual, may be represented by a legal professional be that a solicitor or barrister at the discretion of the coroner. Witnesses may be compelled to testify subject to the privilege against self-incrimination. If there are matters of National Security or matters which relate to sensitive matters then under Schedule 1 of the Coroners and Justice Act 2009 an inquest may be suspended and replaced by a public inquiry under s.2 of the Inquiries Act 2005. This can only be ordered by the Home Secretary and must be announced to Parliament with the Coroner in charge being informed and the next of kin being informed. The next of kin and Coroner can appeal the decision of the Home Secretary. Verdict or conclusions The following conclusions (formerly called verdicts) are not mandatory but are strongly recommended: Category 1 Natural causes Industrial diseases Dependency on drugs or non-dependent abuse of drugs Lack of attention at birth Lack of care or self-neglect Category 2 Suicide Attempted or self-induced abortion Accident or misadventure Execution of sentence of death Lawful killing (formerly "justifiable homicide") Open verdict (cause of death unknown or unstated) Category 3 – Unlawful killing Murder Manslaughter Infanticide Category 4 Stillbirth In 2004, 37% of inquests recorded an outcome of death by accident / misadventure, 21% by natural causes, 13% suicide, 10% open verdicts, and 19% other outcomes. Since 2004 it has been possible for the coroner to record a narrative verdict, recording the circumstances of a death without apportioning blame or liability. Since 2009, other possible verdicts have included "alcohol/drug related death" and "road traffic collision". The civil standard of proof, on the balance of probabilities, is used for all conclusions. The standard of proof for suicide and unlawful killing changed in 2018 from beyond all reasonable doubt to the balance of probabilities following a case in the courts of appeal. Modernisation Owing in particular to the failures to notice the serial murder committed by Harold Shipman, the Coroners and Justice Act 2009 modernised the system with: Greater rights of bereaved people to contribute to coroners' investigations; A new office of chief coroner to lead and supervise practice; Full-time coroners with new district boundaries; Broader investigatory powers for coroners; Improved medical support for coroners' investigation and decision making; Vesting of treasure jurisdiction in the new office of treasure coroner with national responsibility. See also Committal procedure Fatal accident inquiry, Scotland Grand jury Immunity from prosecution Preliminary hearing References External links This act extends to England and Wales only. Bibliography Department for Constitutional Affairs (2006)   Home Office (2003a)  , Cm 5831 — (2003b)  , Cm 5854 — (2004)  , Cm 6159, Lord Mackay of Clashfern (ed.) (2006) Halsbury's Laws of England, 4th ed. reissue, vol.9(2), "Coroners" Civil procedure Death in England Death in Wales Juries in the United Kingdom
[ -0.16998808085918427, 0.10177135467529297, -0.41161131858825684, -0.2935453951358795, -0.0010752426460385323, -0.08783265203237534, 0.534423291683197, 0.5336378812789917, -0.6205179691314697, 0.3026176989078522, -0.3414555788040161, -0.1474311351776123, 0.21745999157428741, 0.6717903017997...
15270
https://en.wikipedia.org/wiki/Index
Index
Index may refer to: Arts, entertainment, and media Fictional entities Index (A Certain Magical Index), a character in the light novel series A Certain Magical Index The Index, an item on a Halo megastructure in the Halo series of video games Periodicals and news portals Index Magazine, a publication for art and culture Index.hr, a Croatian online newspaper index.hu, a Hungarian-language news and community portal The Index (Kalamazoo College), a student newspaper The Index, an 1860s European propaganda journal created by Henry Hotze to support the Confederate States of America Truman State University Index, a student newspaper Other arts, entertainment and media The Index (band) Indexed, a Web cartoon by Jessica Hagy Index, album by Ana Mena Business enterprises and events Index (retailer), a former UK catalogue retailer INDEX, a market research fair in Lucknow, India Index Corporation, a Japanese video game developer Finance Index fund, a collective investment scheme Stock market index, a statistical average of prices of selected securities Places in the United States Index, Arkansas, an unincorporated community Index, Kentucky, an unincorporated community Index, Missouri, a ghost town Index, New York, a hamlet in Hartwick and Otsego, New York Index, Virginia, an unincorporated community Index, Washington, a town Index, West Virginia, an unincorporated community Publishing and library studies Bibliographic index, a regularly updated publication that lists articles, books, or other information items Citation index The Index, colloquial name for Germany's List of Media Harmful to Young People, published by the Bundesprüfstelle für jugendgefährdende Medien Index card, used for recording and storing small amounts of data Index Librorum Prohibitorum, a list of publications which the Catholic Church censored Index on Censorship, a publishing organization that campaigns for freedom of expression, or its magazine of the same name Index (publishing), an organized list of information in a publication Index (typography), a hand- or fist-shaped punctuation mark Subject indexing, describing the content of a document by keywords Thumb index, a round cut-out in the pages of a publication Web indexing, Internet indexing Science, technology, and mathematics Computer science Index, a key in an associative array Index (typography), a character in Unicode, its code is 132 Index, the dataset maintained by search engine indexing Array index, an integer pointer into an array data structure BitTorrent index, a list of .torrent files available for searches Database index, a data structure that improves the speed of data retrieval Index mapping of raw data for an array Index register, a processor register used for modifying operand addresses during the run of a program Indexed color, in computer imagery Indexed Sequential Access Method (ISAM), used for indexing data for fast retrieval Lookup table, a data structure used to store precomputed information Site map, or site index, a list of pages of a web site accessible to crawlers or users Web indexing, Internet indexing Webserver directory index, a default or index web page in a directory on a web server, such as index.html Economics Index (economics), a single number calculated from an array of prices and quantities Price index, a typical price for some good or service Mathematics and statistics Index, a number or other symbol that specifies an element of an indexed family or set Index, an element of an index set Index, the label of a summand in Σ-notation of a summation Algebra Index of a subgroup, the number of a subgroup's left cosets Index, the degree of an nth root Index of a linear map, the dimension of the map's kernel minus the dimension of its cokernel Index of a matrix Index of a real quadratic form Analysis Index, the winding number of an oriented closed curve on a surface relative to a point on that surface Diversity index, a measure of distribution or variety in fields such as ecology or information science Index of a vector field, an integer that helps to describe the behaviour of a vector field around an isolated zero Number theory Index, or the discrete logarithm of a number Statistics Index (statistics), a type of aggregate measure Scale (social sciences), a method of reporting data in social sciences, sometimes called an index Other uses in science and technology Dental indices, standardized scoring systems for tooth problems Indexicality, in linguistics, the phenomenon of a sign pointing to some object in the context in which it occurs Indexing (motion), in mechanical engineering and machining, movement to a precisely known location Refractive index, a measurement of how light propagates through a material Valve Index, a virtual reality headset Other uses INDEX, earlier name for the Reimei satellite Index:, a Danish nonprofit organization which promotes Design for Life The Index (Dubai), a skyscraper Index (crater), a moon crater See also Indexer (disambiguation)
[ 0.24542568624019623, 0.27062809467315674, 0.587390124797821, 0.7584613561630249, -0.09995537251234055, -0.3863835036754608, -0.16866710782051086, -0.11394476145505905, -0.4344486594200134, -0.4056706130504608, -0.6208668947219849, 0.10355710983276367, 0.13789880275726318, 0.299339234828949...
15271
https://en.wikipedia.org/wiki/Information%20retrieval
Information retrieval
Information retrieval (IR) in computing and information science is the process of obtaining information system resources that are relevant to an information need from a collection of those resources. Searches can be based on full-text or other content-based indexing. Information retrieval is the science of searching for information in a document, searching for documents themselves, and also searching for the metadata that describes data, and for databases of texts, images or sounds. Automated information retrieval systems are used to reduce what has been called information overload. An IR system is a software system that provides access to books, journals and other documents; stores and manages those documents. Web search engines are the most visible IR applications. Overview An information retrieval process begins when a user enters a query into the system. Queries are formal statements of information needs, for example search strings in web search engines. In information retrieval a query does not uniquely identify a single object in the collection. Instead, several objects may match the query, perhaps with different degrees of relevancy. An object is an entity that is represented by information in a content collection or database. User queries are matched against the database information. However, as opposed to classical SQL queries of a database, in information retrieval the results returned may or may not match the query, so results are typically ranked. This ranking of results is a key difference of information retrieval searching compared to database searching. Depending on the application the data objects may be, for example, text documents, images, audio, mind maps or videos. Often the documents themselves are not kept or stored directly in the IR system, but are instead represented in the system by document surrogates or metadata. Most IR systems compute a numeric score on how well each object in the database matches the query, and rank the objects according to this value. The top ranking objects are then shown to the user. The process may then be iterated if the user wishes to refine the query. History The idea of using computers to search for relevant pieces of information was popularized in the article As We May Think by Vannevar Bush in 1945. It would appear that Bush was inspired by patents for a 'statistical machine' - filed by Emanuel Goldberg in the 1920s and '30s - that searched for documents stored on film. The first description of a computer searching for information was described by Holmstrom in 1948, detailing an early mention of the Univac computer. Automated information retrieval systems were introduced in the 1950s: one even featured in the 1957 romantic comedy, Desk Set. In the 1960s, the first large information retrieval research group was formed by Gerard Salton at Cornell. By the 1970s several different retrieval techniques had been shown to perform well on small text corpora such as the Cranfield collection (several thousand documents). Large-scale retrieval systems, such as the Lockheed Dialog system, came into use early in the 1970s. In 1992, the US Department of Defense along with the National Institute of Standards and Technology (NIST), cosponsored the Text Retrieval Conference (TREC) as part of the TIPSTER text program. The aim of this was to look into the information retrieval community by supplying the infrastructure that was needed for evaluation of text retrieval methodologies on a very large text collection. This catalyzed research on methods that scale to huge corpora. The introduction of web search engines has boosted the need for very large scale retrieval systems even further. Applications Areas where information retrieval techniques are employed include (the entries are in alphabetical order within each category): General applications Digital libraries Information filtering Recommender systems Media search Blog search Image retrieval 3D retrieval Music retrieval News search Speech retrieval Video retrieval Search engines Site search Desktop search Enterprise search Federated search Mobile search Social search Web search Domain-specific applications Expert search finding Genomic information retrieval Geographic information retrieval Information retrieval for chemical structures Information retrieval in software engineering Legal information retrieval Vertical search Other retrieval methods Methods/Techniques in which information retrieval techniques are employed include: Adversarial information retrieval Automatic summarization Multi-document summarization Compound term processing Cross-lingual retrieval Document classification Spam filtering Question answering Model types For effectively retrieving relevant documents by IR strategies, the documents are typically transformed into a suitable representation. Each retrieval strategy incorporates a specific model for its document representation purposes. The picture on the right illustrates the relationship of some common models. In the picture, the models are categorized according to two dimensions: the mathematical basis and the properties of the model. First dimension: mathematical basis Set-theoretic models represent documents as sets of words or phrases. Similarities are usually derived from set-theoretic operations on those sets. Common models are: Standard Boolean model Extended Boolean model Fuzzy retrieval Algebraic models represent documents and queries usually as vectors, matrices, or tuples. The similarity of the query vector and document vector is represented as a scalar value. Vector space model Generalized vector space model (Enhanced) Topic-based Vector Space Model Extended Boolean model Latent semantic indexing a.k.a. latent semantic analysis Probabilistic models treat the process of document retrieval as a probabilistic inference. Similarities are computed as probabilities that a document is relevant for a given query. Probabilistic theorems like the Bayes' theorem are often used in these models. Binary Independence Model Probabilistic relevance model on which is based the okapi (BM25) relevance function Uncertain inference Language models Divergence-from-randomness model Latent Dirichlet allocation Feature-based retrieval models view documents as vectors of values of feature functions (or just features) and seek the best way to combine these features into a single relevance score, typically by learning to rank methods. Feature functions are arbitrary functions of document and query, and as such can easily incorporate almost any other retrieval model as just another feature. Second dimension: properties of the model Models without term-interdependencies treat different terms/words as independent. This fact is usually represented in vector space models by the orthogonality assumption of term vectors or in probabilistic models by an independency assumption for term variables. Models with immanent term interdependencies allow a representation of interdependencies between terms. However the degree of the interdependency between two terms is defined by the model itself. It is usually directly or indirectly derived (e.g. by dimensional reduction) from the co-occurrence of those terms in the whole set of documents. Models with transcendent term interdependencies allow a representation of interdependencies between terms, but they do not allege how the interdependency between two terms is defined. They rely an external source for the degree of interdependency between two terms. (For example, a human or sophisticated algorithms.) Performance and correctness measures The evaluation of an information retrieval system' is the process of assessing how well a system meets the information needs of its users. In general, measurement considers a collection of documents to be searched and a search query. Traditional evaluation metrics, designed for Boolean retrieval or top-k retrieval, include precision and recall. All measures assume a ground truth notion of relevancy: every document is known to be either relevant or non-relevant to a particular query. In practice, queries may be ill-posed and there may be different shades of relevancy. Timeline Before the 1900s 1801: Joseph Marie Jacquard invents the Jacquard loom, the first machine to use punched cards to control a sequence of operations. 1880s: Herman Hollerith invents an electro-mechanical data tabulator using punch cards as a machine readable medium. 1890 Hollerith cards, keypunches and tabulators used to process the 1890 US Census data. 1920s-1930s Emanuel Goldberg submits patents for his "Statistical Machine” a document search engine that used photoelectric cells and pattern recognition to search the metadata on rolls of microfilmed documents. 1940s–1950s late 1940s: The US military confronted problems of indexing and retrieval of wartime scientific research documents captured from Germans. 1945: Vannevar Bush's As We May Think appeared in Atlantic Monthly. 1947: Hans Peter Luhn (research engineer at IBM since 1941) began work on a mechanized punch card-based system for searching chemical compounds. 1950s: Growing concern in the US for a "science gap" with the USSR motivated, encouraged funding and provided a backdrop for mechanized literature searching systems (Allen Kent et al.) and the invention of the citation index by Eugene Garfield. 1950: The term "information retrieval" was coined by Calvin Mooers. 1951: Philip Bagley conducted the earliest experiment in computerized document retrieval in a master thesis at MIT. 1955: Allen Kent joined Case Western Reserve University, and eventually became associate director of the Center for Documentation and Communications Research. That same year, Kent and colleagues published a paper in American Documentation describing the precision and recall measures as well as detailing a proposed "framework" for evaluating an IR system which included statistical sampling methods for determining the number of relevant documents not retrieved. 1958: International Conference on Scientific Information Washington DC included consideration of IR systems as a solution to problems identified. See: Proceedings of the International Conference on Scientific Information, 1958 (National Academy of Sciences, Washington, DC, 1959) 1959: Hans Peter Luhn published "Auto-encoding of documents for information retrieval." 1960s: early 1960s: Gerard Salton began work on IR at Harvard, later moved to Cornell. 1960: Melvin Earl Maron and John Lary Kuhns published "On relevance, probabilistic indexing, and information retrieval" in the Journal of the ACM 7(3):216–244, July 1960. 1962: Cyril W. Cleverdon published early findings of the Cranfield studies, developing a model for IR system evaluation. See: Cyril W. Cleverdon, "Report on the Testing and Analysis of an Investigation into the Comparative Efficiency of Indexing Systems". Cranfield Collection of Aeronautics, Cranfield, England, 1962. Kent published Information Analysis and Retrieval. 1963: Weinberg report "Science, Government and Information" gave a full articulation of the idea of a "crisis of scientific information." The report was named after Dr. Alvin Weinberg. Joseph Becker and Robert M. Hayes published text on information retrieval. Becker, Joseph; Hayes, Robert Mayo. Information storage and retrieval: tools, elements, theories. New York, Wiley (1963). 1964: Karen Spärck Jones finished her thesis at Cambridge, Synonymy and Semantic Classification, and continued work on computational linguistics as it applies to IR. The National Bureau of Standards sponsored a symposium titled "Statistical Association Methods for Mechanized Documentation." Several highly significant papers, including G. Salton's first published reference (we believe) to the SMART system. mid-1960s: National Library of Medicine developed MEDLARS Medical Literature Analysis and Retrieval System, the first major machine-readable database and batch-retrieval system. Project Intrex at MIT. 1965: J. C. R. Licklider published Libraries of the Future. 1966: Don Swanson was involved in studies at University of Chicago on Requirements for Future Catalogs. late 1960s: F. Wilfrid Lancaster completed evaluation studies of the MEDLARS system and published the first edition of his text on information retrieval. 1968: Gerard Salton published Automatic Information Organization and Retrieval. John W. Sammon, Jr.'s RADC Tech report "Some Mathematics of Information Storage and Retrieval..." outlined the vector model. 1969: Sammon's "A nonlinear mapping for data structure analysis" (IEEE Transactions on Computers) was the first proposal for visualization interface to an IR system. 1970s early 1970s: First online systems—NLM's AIM-TWX, MEDLINE; Lockheed's Dialog; SDC's ORBIT. Theodor Nelson promoting concept of hypertext, published Computer Lib/Dream Machines. 1971: Nicholas Jardine and Cornelis J. van Rijsbergen published "The use of hierarchic clustering in information retrieval", which articulated the "cluster hypothesis." 1975: Three highly influential publications by Salton fully articulated his vector processing framework and term discrimination model: A Theory of Indexing (Society for Industrial and Applied Mathematics) A Theory of Term Importance in Automatic Text Analysis (JASIS v. 26) A Vector Space Model for Automatic Indexing (CACM 18:11) 1978: The First ACM SIGIR conference. 1979: C. J. van Rijsbergen published Information Retrieval (Butterworths). Heavy emphasis on probabilistic models. 1979: Tamas Doszkocs implemented the CITE natural language user interface for MEDLINE at the National Library of Medicine. The CITE system supported free form query input, ranked output and relevance feedback. 1980s 1980: First international ACM SIGIR conference, joint with British Computer Society IR group in Cambridge. 1982: Nicholas J. Belkin, Robert N. Oddy, and Helen M. Brooks proposed the ASK (Anomalous State of Knowledge) viewpoint for information retrieval. This was an important concept, though their automated analysis tool proved ultimately disappointing. 1983: Salton (and Michael J. McGill) published Introduction to Modern Information Retrieval (McGraw-Hill), with heavy emphasis on vector models. 1985: David Blair and Bill Maron publish: An Evaluation of Retrieval Effectiveness for a Full-Text Document-Retrieval System mid-1980s: Efforts to develop end-user versions of commercial IR systems. 1985–1993: Key papers on and experimental systems for visualization interfaces. Work by Donald B. Crouch, Robert R. Korfhage, Matthew Chalmers, Anselm Spoerri and others. 1989: First World Wide Web proposals by Tim Berners-Lee at CERN. 1990s 1992: First TREC conference. 1997: Publication of Korfhage's Information Storage and Retrieval with emphasis on visualization and multi-reference point systems. 1999: Publication of Ricardo Baeza-Yates and Berthier Ribeiro-Neto's Modern Information Retrieval by Addison Wesley, the first book that attempts to cover all IR. late 1990s: Web search engines implementation of many features formerly found only in experimental IR systems. Search engines become the most common and maybe best instantiation of IR models. Major conferences SIGIR: Conference on Research and Development in Information Retrieval ECIR: European Conference on Information Retrieval CIKM: Conference on Information and Knowledge Management WWW: International World Wide Web Conference WSDM: Conference on Web Search and Data Mining ICTIR: International Conference on Theory of Information Retrieval Awards in the field Tony Kent Strix award Gerard Salton Award Karen Spärck Jones Award See also References Further reading Ricardo Baeza-Yates, Berthier Ribeiro-Neto. Modern Information Retrieval: The Concepts and Technology behind Search (second edition). Addison-Wesley, UK, 2011. Stefan Büttcher, Charles L. A. Clarke, and Gordon V. Cormack. Information Retrieval: Implementing and Evaluating Search Engines. MIT Press, Cambridge, Massachusetts, 2010. Christopher D. Manning, Prabhakar Raghavan, and Hinrich Schütze. Introduction to Information Retrieval. Cambridge University Press, 2008. External links ACM SIGIR: Information Retrieval Special Interest Group BCS IRSG: British Computer Society - Information Retrieval Specialist Group Text Retrieval Conference (TREC) Forum for Information Retrieval Evaluation (FIRE) Information Retrieval (online book) by C. J. van Rijsbergen Information Retrieval Wiki Information Retrieval Facility Information Retrieval @ DUTH TREC report on information retrieval evaluation techniques How eBay measures search relevance Information retrieval performance evaluation tool @ Athena Research Centre Natural language processing
[ 0.1351945996284485, 0.02349105104804039, -0.02839498221874237, 0.5319618582725525, 0.21674594283103943, -0.07443356513977051, -0.24164165556430817, 0.24213442206382751, -0.27598655223846436, -0.5594748258590698, -1.013047218322754, 0.837311327457428, -0.10643379390239716, 0.351177781820297...
15272
https://en.wikipedia.org/wiki/List%20of%20Italian-language%20poets
List of Italian-language poets
List of poets who wrote in Italian (or Italian dialects). A Antonio Abati Luigi Alamanni Aleardo Aleardi Dante Alighieri Cecco Angiolieri Gabriele D'Annunzio Ludovico Ariosto Francis of Assisi B Nanni Balestrini Dario Bellezza Giuseppe Gioacchino Belli (Roman dialect) Attilio Bertolucci Carlo Betocchi Alberta Bigagli Giovanni Boccaccio Maria Alinda Bonacci Brunamonti Carlo Bordini Franco Buffoni Michelangelo Buonarroti Helle Busacca Ignazio Buttitta (Sicilian language) Paolo Buzzi C Dino Campana Giorgio Caproni Giosuè Carducci Guido Cavalcanti Roberto Carifi Gabriello Chiabrera Compagnetto da Prato D Antonio De Santis (Italian and Larinese dialect) Milo de Angelis Fabrizio De André Eugenio De Signoribus E Muzi Epifani F Franco Fortini Ugo Foscolo G Alfonso Gatto Giuseppe Giusti Guido Gozzano Lionello Grifo Giovanni Battista Guarini Amalia Guglielminetti Margherita Guidacci Guido Guinizzelli I Gianni Ianuale L Giacomo da Lentini Jacopo da Leona Giacomo Leopardi Mario Luzi M Lorenzo il Magnifico (sovereign of Florence) Alessandro Manzoni Filippo Tommaso Marinetti Giambattista Marino Alda Merini Metastasio (Pietro Trapassi) Grazyna Miller Eugenio Montale (Nobel Prize in literature, 1975) Vincenzo Monti Marino Moretti Maurizio Moro P Elio Pagliarani Aldo Palazzeschi Giuseppe Parini Giovanni Pascoli Pier Paolo Pasolini Nicoletta Pasquale Cesare Pavese Francesco Petrarca (Petrarch) Assunta Pieralli Poliziano (Angelo Ambrogini) Lorenzo Da Ponte Antonio Porta (author) Carlo Porta Antonia Pozzi Ezra Pound (Italian, English, and others) Luigi Pulci (1432–84) Q Salvatore Quasimodo R Giovanni Raboni Clemente Rebora Amelia Rosselli Gabriele Rossetti S Umberto Saba Giulio Salvadori Edoardo Sanguineti Leonardo Sinisgalli Maria Luisa Spaziani T Rosa Taddei Torquato Tasso Laura Terracina Giovanni Testori Jacopone da Todi Trilussa (Carlo Alberto Salustri) (Roman dialect) Theodor Daubler U Giuseppe Ungaretti V Diego Valeri (poet) Emilio Villa Z Andrea Zanzotto See also List of Italian writers References Italian poets Poets
[ -0.16053515672683716, 0.23545119166374207, -0.6252649426460266, -0.017567450180649757, -0.6858968734741211, 0.49467766284942627, 0.809579074382782, 1.0435127019882202, -0.8312143683433533, -0.5768634676933289, -0.4155474901199341, 0.4185461401939392, 0.22567352652549744, 0.2038419097661972...
15274
https://en.wikipedia.org/wiki/International%20Criminal%20Tribunal%20for%20the%20former%20Yugoslavia
International Criminal Tribunal for the former Yugoslavia
The International Criminal Tribunal for the former Yugoslavia (ICTY) was a body of the United Nations that was established to prosecute the war crimes that had been committed during the Yugoslav Wars and to try their perpetrators. The tribunal was an ad hoc court located in The Hague, Netherlands. It was established by Resolution 827 of the United Nations Security Council, which was passed on 25 May 1993. It had jurisdiction over four clusters of crimes committed on the territory of the former Yugoslavia since 1991: grave breaches of the Geneva Conventions, violations of the laws or customs of war, genocide, and crimes against humanity. The maximum sentence that it could impose was life imprisonment. Various countries signed agreements with the UN to carry out custodial sentences. A total of 161 persons were indicted; the final indictments were issued in December 2004, the last of which were confirmed and unsealed in the spring of 2005. The final fugitive, Goran Hadžić, was arrested on 20 July 2011. The final judgment was issued on 29 November 2017 and the institution formally ceased to exist on 31 December 2017. Residual functions of the ICTY, including oversight of sentences and consideration of any appeal proceedings initiated since 1 July 2013, are under the jurisdiction of a successor body, the International Residual Mechanism for Criminal Tribunals (IRMCT). History Creation United Nations Security Council Resolution 808 of 22 February 1993 decided that "an international tribunal shall be established for the prosecution of persons responsible for serious violations of international humanitarian law committed in the territory of the former Yugoslavia since 1991", and calling on the Secretary-General to "submit for consideration by the Council ... a report on all aspects of this matter, including specific proposals and where appropriate options ... taking into account suggestions put forward in this regard by Member States". The Court was originally proposed by German Foreign Minister Klaus Kinkel. By 25 May 1993, the international community had tried to pressure the leaders of the former Yugoslavian republics diplomatically, militarily, politically, economically, and – with Resolution 827 – through juridical means. Resolution 827 of 25 May 1993 approved S/25704 report of the Secretary-General and adopted the Statute of the International Tribunal annexed to it, formally creating the ICTY. It would have jurisdiction over four clusters of crime committed on the territory of the former SFR Yugoslavia since 1991: grave breaches of the Geneva Conventions, violations of the laws or customs of war, genocide, and crime against humanity. The maximum sentence it could impose was life imprisonment. Implementation In 1993, the ICTY built its internal infrastructure. 17 states had signed an agreement with the ICTY to carry out custodial sentences. 1993–1994: In the first year of its existence, the Tribunal laid foundations for its existence as a judicial organ. It established the legal framework for its operations by adopting the rules of procedure and evidence, as well as its rules of detention and directive for the assignment of defense counsel. Together, these rules established a legal aid system for the Tribunal. As the ICTY was a part of the United Nations and was the first international court for criminal justice, the development of a juridical infrastructure was considered quite a challenge. However, after the first year, the first ICTY judges had drafted and adopted all the rules for court proceedings. 1994–1995: The ICTY established its offices within the Aegon Insurance Building in The Hague (which was, at the time, still partially in use by Aegon) and detention facilities in Scheveningen in The Hague (the Netherlands). The ICTY hired many staff members and by July 1994, the Office of the Prosecutor had sufficient staff to begin field investigations. By November 1994, first indictments were presented and confirmed, and in 1995, the staff numbered over 200 persons from all over the world. Operation In 1994 the first indictment was issued against the Bosnian-Serb concentration camp commander Dragan Nikolić. This was followed on 13 February 1995 by two indictments comprising 21 individuals which were issued against a group of 21 Bosnian-Serbs charged with committing atrocities against Muslim and Croat civilian prisoners. While the war in the former Yugoslavia was still raging, the ICTY prosecutors showed that an international court was viable. However, no accused was arrested. The court confirmed eight indictments against 46 individuals and issued arrest warrants. Bosnian Serb indictee Duško Tadić became the subject of the Tribunal's first trial. Tadić was arrested by German police in Munich in 1994 for his alleged actions in the Prijedor region in Bosnia-Herzegovina (especially his actions in the Omarska, Trnopolje and Keraterm detention camps). He made his first appearance before the ICTY Trial Chamber on 26 April 1995, and pleaded not guilty to all of the charges in the indictment. 1995–1996: Between June 1995 and June 1996, 10 public indictments had been confirmed against a total of 33 individuals. Six of the newly indicted persons were transferred in the Tribunal's detention unit. In addition to Duško Tadic, by June 1996 the tribunal had Tihomir Blaškić, Dražen Erdemović, Zejnil Delalić, Zdravko Mucić, Esad Landžo and Hazim Delić in custody. Erdemović became the first person to enter a guilty plea before the tribunal's court. Between 1995 and 1996, the ICTY dealt with miscellaneous cases involving several detainees, which never reached the trial stage. Accomplishments In 2004, the ICTY published a list of five accomplishments "in justice and law": "Spearheading the shift from impunity to accountability", pointing out that, until very recently, it was the only court judging crimes committed as part of the Yugoslav conflict, since prosecutors in the former Yugoslavia were, as a rule, reluctant to prosecute such crimes; "Establishing the facts", highlighting the extensive evidence-gathering and lengthy findings of fact that Tribunal judgments produced; "Bringing justice to thousands of victims and giving them a voice", pointing out the large number of witnesses that had been brought before the Tribunal; "The accomplishments in international law", describing the fleshing out of several international criminal law concepts which had not been ruled on since the Nuremberg Trials; "Strengthening the Rule of Law", referring to the Tribunal's role in promoting the use of international standards in war crimes prosecutions by former Yugoslav republics. Closure The United Nations Security Council passed resolutions 1503 in August 2003 and 1534 in March 2004, which both called for the completion of all cases at both the ICTY and its sister tribunal, the International Criminal Tribunal for Rwanda (ICTR) by 2010. In December 2010, the Security Council adopted Resolution 1966, which established the International Residual Mechanism for Criminal Tribunals (IRMCT), a body intended to gradually assume residual functions from both the ICTY and the ICTR as they wound down their mandate. Resolution 1966 called upon the Tribunal to finish its work by 31 December 2014 to prepare for its closure and the transfer of its responsibilities. In a Completion Strategy Report issued in May 2011, the ICTY indicated that it aimed to complete all trials by the end of 2012 and complete all appeals by 2015, with the exception of Radovan Karadžić whose trial was expected to end in 2014 and Ratko Mladić and Goran Hadžić, who were still at large at that time and were not arrested until later that year. The IRMCT's ICTY branch began functioning on 1 July 2013. Per the Transitional Arrangements adopted by the UN Security Council, the ICTY was to conduct and complete all outstanding first instance trials, including those of Karadžić, Mladić and Hadžić. The ICTY would also conduct and complete all appeal proceedings for which the notice of appeal against the judgement or sentence was filed before 1 July 2013. The IRMCT will handle any appeals for which notice is filed after that date. The final ICTY trial to be completed in the first instance was that of Ratko Mladić, who was convicted on 22 November 2017. The final case to be considered by the ICTY was an appeal proceeding encompassing six individuals, whose sentences were upheld on 29 November 2017. Organization While operating, the Tribunal employed around 900 staff. Its organisational components were Chambers, Registry and the Office of the Prosecutor (OTP). Prosecutors The Prosecutor was responsible for investigating crimes, gathering evidence and prosecutions and was head of the Office of the Prosecutor (OTP). The Prosecutor was appointed by the UN Security Council upon nomination by the UN Secretary-General. The last prosecutor was Serge Brammertz. Previous Prosecutors have been Ramón Escovar Salom of Venezuela (1993–1994), however, he never took up that office, Richard Goldstone of South Africa (1994–1996), Louise Arbour of Canada (1996–1999), and Carla Del Ponte of Switzerland (1999–2007). Richard Goldstone, Louise Arbour and Carla Del Ponte also simultaneously served as the Prosecutor of the International Criminal Tribunal for Rwanda until 2003. Graham Blewitt of Australia served as the Deputy Prosecutor from 1994 until 2004. David Tolbert, the President of the International Center for Transitional Justice, was also appointed Deputy Prosecutor of the ICTY in 2004. Chambers Chambers encompassed the judges and their aides. The Tribunal operated three Trial Chambers and one Appeals Chamber. The President of the Tribunal was also the presiding Judge of the Appeals Chamber. Judges At the time of the court's dissolution, there were seven permanent judges and one ad hoc judge who served on the Tribunal. A total of 86 judges have been appointed to the Tribunal from 52 United Nations member states. Of those judges, 51 were permanent judges, 36 were ad litem judges, and one was an ad hoc judge. Note that one judge served as both a permanent and ad litem judge, and another served as both a permanent and ad hoc judge. UN member and observer states could each submit up to two nominees of different nationalities to the UN Secretary-General. The UN Secretary-General submitted this list to the UN Security Council which selected from 28 to 42 nominees and submitted these nominees to the UN General Assembly. The UN General Assembly then elected 14 judges from that list. Judges served for four years and were eligible for re-election. The UN Secretary-General appointed replacements in case of vacancy for the remainder of the term of office concerned. On 21 October 2015, Judge Carmel Agius of Malta was elected President of the ICTY and Liu Daqun of China was elected Vice-President; they have assumed their positions on 17 November 2015. His predecessors were Antonio Cassese of Italy (1993–1997), Gabrielle Kirk McDonald of the United States (1997–1999), Claude Jorda of France (1999–2002), Theodor Meron of the United States (2002–2005), Fausto Pocar of Italy (2005–2008), Patrick Robinson of Jamaica (2008–2011), and Theodor Meron (2011–2015). Registry The Registry was responsible for handling the administration of the Tribunal; activities included keeping court records, translating court documents, transporting and accommodating those who appear to testify, operating the Public Information Section, and such general duties as payroll administration, personnel management and procurement. It was also responsible for the Detention Unit for indictees being held during their trial and the Legal Aid program for indictees who cannot pay for their own defence. It was headed by the Registrar, a position occupied over the years by Theo van Boven of the Netherlands (February 1994 to December 1994), Dorothée de Sampayo Garrido-Nijgh of the Netherlands (1995–2000), Hans Holthuis of the Netherlands (2001–2009), and John Hocking of Australia (May 2009 to December 2017). Detention facilities Those defendants on trial and those who were denied a provisional release were detained at the United Nations Detention Unit on the premises of the Penitentiary Institution Haaglanden, location Scheveningen in Belgisch Park, a suburb of The Hague, located some 3 km by road from the courthouse. The indicted were housed in private cells which had a toilet, shower, radio, satellite TV, personal computer (without internet access) and other luxuries. They were allowed to phone family and friends daily and could have conjugal visits. There was also a library, a gym and various rooms used for religious observances. The inmates were allowed to cook for themselves. All of the inmates mixed freely and were not segregated on the basis of nationality. As the cells were more akin to a university residence instead of a jail, some had derisively referred to the ICT as the "Hague Hilton". The reason for this luxury relative to other prisons is that the first president of the court wanted to emphasise that the indictees were innocent until proven guilty. Indictees The Tribunal indicted 161 individuals between 1997 and 2004 and completed proceedings with them as follows: 111 had trials completed by the ICTY: 21 were acquitted by the ICTY: 18 acquittals have stood; 1 was originally acquitted by the ICTY, but convicted on appeal by the IRMCT of one count (and sentenced to time served) 2 were originally acquitted by the ICTY, but following successful appeal by the prosecution the acquittals were overturned and a retrial is being conducted by the IRMCT; and 90 were convicted and sentenced by the ICTY: 87 were transferred to 14 different states where they served their prison sentences, had sentences that amounted to time spent in detention during trial, or died after conviction: 20 remain imprisoned; 58 completed their sentences; 9 died while completing their sentences or after conviction awaiting transfer 2 were convicted and sentenced, and remain in IRMCT detention awaiting transfer; and 1 was convicted and sentenced, but has filed an appeal to the IRMCT that is being considered 13 had their cases transferred to courts in: Bosnia and Herzegovina (10); Croatia (2); and Serbia (1) 37 had their cases terminated prior to trial completion, because the indictments were withdrawn (20); or the indictees died before or after transfer to the Tribunal (17). The indictees ranged from common soldiers to generals and police commanders all the way to prime ministers. Slobodan Milošević was the first sitting head of state indicted for war crimes. Other "high level" indictees included Milan Babić, former President of the Republika Srpska Krajina; Ramush Haradinaj, former Prime Minister of Kosovo; Radovan Karadžić, former President of the Republika Srpska; Ratko Mladić, former Commander of the Bosnian Serb Army; and Ante Gotovina, former General of the Croatian Army. The very first hearing at the ICTY was referral request in the Tadić case on 8 November 1994. Croat Serb General and former President of the Republic of Serbian Krajina Goran Hadžić was the last fugitive wanted by the Tribunal to be arrested on 20 July 2011. An additional 23 individuals have been the subject of contempt proceedings. Controversies Skeptics argued that an international court could not function while the war in the former Yugoslavia was still going on. This would be a huge undertaking for any court, but for the ICTY it would be an even greater one, as the new tribunal still needed judges, a prosecutor, a registrar, investigative and support staff, an extensive interpretation and translation system, a legal aid structure, premises, equipment, courtrooms, detention facilities, guards and all the related funding. Criticisms of the court include: Carla Del Ponte, the chief prosecutor of the tribunal, said in 2021 that the US did not want the ICTY to scrutinise war crimes committed by the Kosovo Liberation Army. According to her, Madeleine Albright, the United States secretary of state at the time, told her to slow down the investigation of Ramush Haradinaj. Michael Mandel, William Blum and others accused the court of having a pro-NATO bias due to its refusal to prosecute NATO officials and politicians for war crimes. On 6 December 2006, the Tribunal at The Hague approved the use of force-feeding of Serbian politician Vojislav Šešelj. They decided it was not "torture, inhuman or degrading treatment if there is a medical necessity to do so... and if the manner in which the detainee is force-fed is not inhuman or degrading". Reducing the indictment charges after the arrest of Ratko Mladić, Croatian officials publicly condemned chief prosecutor Serge Brammertz for his announcement that the former Bosnian Serb General, will be tried solely for crimes allegedly committed in Bosnia, not in Croatia. Critics have questioned whether the Tribunal exacerbates tensions rather than promotes reconciliation, as is claimed by Tribunal supporters. Polls show a generally negative reaction to the Tribunal among both Serbs and Croats. A majority of Serbs and Croats have expressed doubts regarding the ICTY's integrity and question the tenability of its legal procedures. 68% of indictees have been Serbs (or Montenegrins), to the extent that a sizeable portion of the Bosnian Serb and Croatian Serb political and military leaderships have been indicted. Many have seen this as reflecting bias, while the Tribunal's defenders have seen this as indicative of the actual proportion of crimes committed. However, Marko Hoare claimed that, aside from Milošević, only Momčilo Perišić (Chief of the General Staff of the Yugoslav Army), who was acquitted, has been indicted from the Serbian military or political top when it comes to wars in Croatia and Bosnia. According to Hoare, a former employee at the ICTY, an investigative team worked on indictments of senior members of the "joint criminal enterprise", including not only Milošević but also Veljko Kadijević, Blagoje Adžić, Borisav Jović, Branko Kostić, Momir Bulatović and others. However, Hoare claims that, due to Carla del Ponte's intervention, these drafts were rejected, and the indictment limited to Milošević alone. There have been allegations of censorship: in July 2011, the Appeals Chamber of ICTY confirmed the judgment of the Trial Chamber which found journalist and former Tribunal's OTP spokesperson Florence Hartmann guilty of contempt of court and fined her €7,000. She disclosed documents of FR Yugoslavia's Supreme Defense Council meetings and criticized the Tribunal for granting confidentiality of some information in them to protect Serbia's 'vital national interests' during Bosnia's lawsuit against the country for genocide in front of the International Court of Justice. Hartmann argued that Serbia was freed of the charge of genocide because ICTY redacted certain information in the Council meetings. Since these documents have in the meantime been made public by the ICTY itself, a group of organizations and individuals, who supported her, said that the Tribunal in this appellate proceedings "imposed a form of censorship aimed to protect the international judges from any form of criticism". (France refused to extradite Hartmann to serve the prison sentence issued against her by the ICTY after she refused to pay the €7,000 fine.) Klaus-Peter Willsch compared the Ante Gotovina verdict, in which the late Croatian president Franjo Tuđman was posthumously found to have been participating in a Joint Criminal Enterprise, with the 897 Cadaver Synod trial in Rome, when Pope Stephen VI had the corpse of Pope Formosus exhumed, put on trial and posthumously convicted. Some sentences have been considered too mild, even within the Tribunal, complained at small sentences of convicted war criminals in comparison with their crimes. In 2010, Veselin Šljivančanin's sentence for his involvement in the Vukovar massacre was cut from 17 to 10 years, which caused outrage in Croatia. Upon hearing that news, Vesna Bosanac, who had been in charge of the Vukovar hospital during the fall of the city, said that the "ICTY is dead" for her: "For crimes that he [Šljivančanin], had committed in Vukovar, notably at Ovčara, he should have been jailed for life. I'm outraged.... The Hague(-based) tribunal has showed again that it is not a just tribunal." Danijel Rehak, the head of Croatian Association of Prisoners in Serbian Concentration Camps, said, "The shock of families whose beloved ones were killed at Ovčara is unimaginable. The court made a crucial mistake by accepting a statement of a JNA officer to whom Šljivančanin was a commander. I cannot understand that". Pavle Strugar's 8-year sentence for shelling of Dubrovnik, a UNESCO World Heritage Site, also caused outrage in Croatia. Judge Kevin Parker (of Australia) was named in a Croatian journal (Nacional) as a main cause of the system's failure for having dismissed the testimonies of numerous witnesses. Some of the defendants, such as Slobodan Milošević, claimed that the Court has no legal authority because it was established by the UN Security Council instead of the UN General Assembly and so had not been created on a broad international basis. The Tribunal was established on the basis of Chapter VII of the United Nations Charter; the relevant portion of which reads "the Security Council can take measures to maintain or restore international peace and security". The legal criticism has been succinctly stated in a memorandum issued by Austrian Professor Hans Köchler, which was submitted to the President of the Security Council in 1999. British Conservative Party MEP Daniel Hannan has called for the court to be abolished, claiming it is anti-democratic and a violation of national sovereignty. The interactive thematic debate on the role of international criminal justice in reconciliation was convened on 10 April 2013 by the President of the General Assembly during the resumed part of the GA's 67th Session. The debate was scheduled after the convictions of Ante Gotovina and Mladen Markač for inciting war crimes against Serbs in Croatia were overturned by an ICTY Appeals Panel in November 2012. The ICTY president Theodor Meron announced that all three Hague war-crimes courts turned down the invitation of UNGA president to participate in the debate about their work. The President of the General Assembly described Meron's refusal to participate in this debate as scandalous. He emphasized that he does not shy away from criticizing the ICTY, which has "convicted nobody for inciting crimes committed against Serbs in Croatia." Tomislav Nikolić, the president of Serbia criticized the ICTY, claiming it did not contribute but hindered reconciliation in the former Yugoslavia. He added that although there is no significant ethnic disproportion among the number of casualties in the Yugoslav wars, the ICTY sentenced Serbs and ethnic Serbs to a combined total of 1150 years in prison while claiming that members of other ethnic groups have been sentenced to a total of 55 years for crimes against Serbs. Vitaly Churkin, the ambassador of Russia to the UN, criticized the work of the ICTY, especially the overturned convictions of Gotovina and Ramush Haradinaj. Regarding the final case on 29 November 2017 proceeding encompassing six Bosnian-Croat individuals, one of whom, Slobodan Praljak, in protest in court drank a poison and subsequently died, the Prime Minister of Croatia Andrej Plenković claimed the verdict was "unjust" and Praljak's suicide "speaks of deep moral injustice to the six Croats, from Bosnia and Herzegovina and the Croat people". He criticized the verdict because it did not recognize the assistance and support provided by Croatia to Bosnia and Herzegovina and collaboration of both armies at a time when the neighboring state was faced with the "Greater-Serbian aggression" and when its territorial integrity was compromised, as well it alludes to the link between the then leadership of the Republic of Croatia, while in the previous verdict to Bosnian-Serb Ratko Mladić does not recognize the connection with Serbia's state officials at that time. Dutch filmmaker Jos de Putter made a trilogy, The Milosevic Case - Glosses at Trial, for Tegenlicht investigative slot at the VPRO. The main hypothesis of the film is that ICTY prosecution has been struggling and failing to prove any link between Milosevic and the media version of the truth of the bloody break-up of Yugoslavia. The legitimacy of the prosecution methodology in securing the witness accounts and evidence, in general, has been examined by the filmmaker. See also List of people indicted in the International Criminal Tribunal for the former Yugoslavia Command responsibility International Criminal Court Trial of Gotovina et al Notes References Further reading Ackerman, J.E. and O'Sullivan, E.: Practice and procedure of the International Criminal Tribunal for the Former Yugoslavia: with selected materials for the International Criminal Tribunal for Rwanda, The Hague, KLI, 2000. Aldrich, G.H.: Jurisdiction of the International Criminal Tribunal for the Former Yugoslavia, American Journal of International Law, 1996, pp. 64–68h Bachmann, Klaus; Sparrow-Botero, Thomas and Lambertz, Peter: When justice meets politics. Independence and autonomy of ad hoc international criminal tribunals. Peter Lang International 2013. Bassiouni, M.C.: The Law of the International Criminal Tribunal of the Former Yugoslavia, New York, Transnational Publications, 1996. Boelaert-Suominen, S.: The International Criminal Tribunal for the Former Yugoslavia (ICTY) anno 1999: its place in the international legal system, mandate and most notable jurisprudence, Polish Yearbook of International Law, 2001, pp. 95–155. Boelaert-Suominen, S.: The International Criminal Tribunal for the Former Yugoslavia and the Kosovo Conflict, International Review of the Red Cross, 2000, pp. 217–251. Cassese, Antonio: The ICTY: A Living and Vital Reality", Journal of International Criminal Justice Vol.2, 2004, No.2, pp. 585–597 Cisse, C.: The International Tribunals for the Former Yugoslavia and Rwanda: some elements of comparison, Transnational Law and Contemporary Problems, 1997, pp. 103–118. Clark, R.S. and SANN, M.: A critical study of the International Criminal Tribunal for the Former Yugoslavia, European Journal of International Law, 1997, pp. 198–200. Goldstone, R.J.: Assessing the work of the United Nations war crimes tribunals, Stanford Journal of International Law, 1997, pp. 1–8. Ivković, S.K.: Justice by the International Criminal Tribunal for the Former Yugoslavia, Stanford Journal of International Law, 2001, pp. 255–346. Jones, J.W.R.D.: The practice of the international criminal tribunals for the Former Yugoslavia and Rwanda, New York, Transnational, 2000. Kaszubinski, M.: The International Criminal Tribunal for the Former Yugoslavia, in: Bassiouni, M.C. (ed.), Post-conflict justice, New York, Transnational, 2002, pp. 459–585. Kerr, R.: International judicial intervention: the International Criminal Tribunal for the Former Yugoslavia, International Relations, 2000, pp. 17–26. Kerr, R.: The International Criminal Tribunal for the Former Yugoslavia: an exercise in law, politics and diplomacy, Oxford, OUP, 2004. King, F. and La Rosa, A.: Current Developments. International Criminal Tribunal for the Former Yugoslavia, B.T.I.R., 1997, pp. 533–555. Klip, A. and Sluiter, G.: Annotated leading cases of international criminal tribunals; (Vol. III) The International Criminal Tribunal for the Former Yugoslavia 2000–2001, Schoten, Intersentia, 2003. Köchler, Hans: Global Justice or Global Revenge? International Criminal Justice at the Crossroads, Vienna/New York, Springer, 2003, pp. 166–184. Kolb, R.: The jurisprudence of the Yugoslav and Rwandan Criminal Tribunals on their jurisdiction and on international crimes, British Yearbook of International Law, 2001, pp. 259–315. Lamb, S.: The powers of arrest of the International Criminal Tribunal for the Former Yugoslavia, British Yearbook of International Law, 2000, pp. 165–244. Laughland, J.: Travesty: The Trial of Slobodan Milošević and the Corruption of International Justice, London, Pluto Press, 2007. Lescure, K.: International justice for former Yugoslavia: the working of the International Criminal Tribunal of the Hague, The Hague, KLI, 1996. Mak, T.: The Case Against an International War Crimes Tribunal for the former Yugoslavia, (1995) International Peacekeeping, 2:4, 536-563. McAllister, Jacqueline R. 2020. "Deterring Wartime Atrocities: Hard Lessons from the Yugoslav Tribunal." International Security 44(3). Available at: https://doi.org/10.1162/isec_a_00370. McDonald, G.K.: Reflections on the contributions of the International Criminal Tribunal for the Former Yugoslavia, Hastings International and Comparative Law Review, 2001, pp. 155–172. Mettraux, G.: Crimes against humanity in the jurisprudence of the International Criminal Tribunal for the Former Yugoslavia and for Rwanda, Harvard International Law Journal, 2002, pp. 237–316. Morris, V. and Scharf, M.P.: An insider's guide to the International Criminal Tribunal for the Former Yugoslavia, African Yearbook of International Law, 1995, pp. 441–446. Murphy, S.D.: Progress and jurisprudence of the International Criminal Tribunal for the Former Yugoslavia, American Journal of International Law, 1999, pp. 57–96. Panovsky, D.: Some war crimes are not better than others: the failure of the International Criminal Tribunal for the Former Yugoslavia to prosecute war crimes in Macedonia, Northwestern University Law Review, 2004, pp. 623–655. Pilouras, S.: International Criminal Tribunal for the Former Yugoslavia and Milosevic's trial, New York Law School Journal of Human Rights, 2002, pp. 515–525. Pronk, E.: "The ICTY and the people from the former Yugoslavia. A reserved relationship." (thesis) Roberts, K.: The law of persecution before the International Criminal Tribunal for the Former Yugoslavia, Leiden Journal of International Law, 2002, pp. 623–663. Robinson, P.L.: Ensuring fair and expeditious trials at the International Criminal Tribunal for the Former Yugoslavia, European Journal of International Law, 2000, pp. 569–589. Shenk, M.D.: International Criminal Tribunal for the Former Yugoslavia and for Rwanda, The International Lawyer, 1999, pp. 549–554. Shraga, D. and Zackalin, R.: The International Criminal Tribunal for the Former Yugoslavia, European Journal of International Law, 1994, pp. 360–380. Sjocrona, J.M.: The International Criminal Tribunal for the Former Yugoslavia: some introductory remarks from a defence point of view, Leiden Journal of International Law, 1995, pp. 463–474. Tolbert, David: The ICTY: Unforeseen Successes and Foreseeable Shortcomings, The Fletcher Forum of World Affairs, Vol.26, No.2, Summer/Fall 2002, pp. 7–20 Tolbert, David: Reflections on the ICTY Registry, Journal of International Criminal Justice, Vol.2, No.2, 2004, pp. 480–485 Vierucci, L.: The First Steps of the International Criminal Tribunal for the Former Yugoslavia, European Journal of International Law, 1995, pp. 134–143. Warbrick, C. and McGoldrick, D.: Co-operation with the International Criminal Tribunal for the Former Yugoslavia, International and Comparative Law Quarterly, 1996, pp. 947–953. Wilson, Richard Ashby: 'Judging History: the Historical Record of the International Criminal Tribunal for the Former Yugoslavia.' Human Rights Quarterly. 2005. August. Vol. 27, No. 3, pp. 908–942. External links International Center for Transitional Justice, Criminal Justice page International Progress Organization: Monitoring of the ICTY Del Ponte, Carla (2003). The role of international criminal prosecutions in reconstructing divided communities, public lecture by Carla Del Ponte, Prosecutor, International Criminal Tribunal for the Former Yugoslavia, given at the London School of Economics, 20 October 2003. Topical digests of the case law of ICTR and ICTY, Human Rights Watch, 2004 Hague Justice Portal: Academic gateway to The Hague organisations concerning international peace, justice and security. Calendar of court proceedings before the ICTY: Hague Justice Portal Why Journalists Should be Worried by the Rwanda Tribunal Precedents (deals also with ICTY) by Thierry Cruvellier for Reporters Without Borders SENSE News Agency, a special project based in ICTY Complete web-based video archive of the Milosevic trial War Crimes, conditionality and EU integration in the Western Balkans, by Vojin Dimitrijevic, Florence Hartmann, Dejan Jovic, Tija Memisevic, edited by Judy Batt, Jelena Obradović, Chaillot Paper No. 116, June 2009, European Union Institute for Security Studies Introductory note by Fausto Pocar on the Statute of the International Criminal Tribunal for the former Yugoslavia in the Historic Archives of the United Nations Audiovisual Library of International Law Procedural history of the Statute of the International Criminal Tribunal for the former Yugoslavia in the Historic Archives of the United Nations Audiovisual Library of International Law Lecture by Fausto Pocar entitled Completing the Mandate: The Legal Challenges Facing the International Criminal Tribunal for the former Yugoslavia in the Lecture Series of the United Nations Audiovisual Library of International Law Lecture by Fausto Pocar entitled Contribution of the International Criminal Tribunal for the former Yugoslavia to the Development of International Humanitarian Law in the Lecture Series of the United Nations Audiovisual Library of International Law Lecture by Patrick Lipton Robinson, Fairness and Efficiency in the Proceedings of the International Criminal Tribunal for the former Yugoslavia in the Lecture Series of the United Nations Audiovisual Library of International Law Croatian War of Independence Kosovo War Yugoslav Wars War crimes organizations Organisations based in The Hague Organizations established in 1993 Organizations disestablished in 2017 Netherlands and the United Nations United Nations courts and tribunals Incitement to genocide case law
[ 0.20945975184440613, 0.14199860394001007, -0.8877933025360107, -0.1273300051689148, -0.023211367428302765, 0.20473647117614746, -0.03890492394566536, 0.02814643271267414, -0.5805745720863342, 0.5996924042701721, -0.06606274843215942, 0.1496530920267105, -0.9612289667129517, 0.7963838577270...
15275
https://en.wikipedia.org/wiki/ISO%20216
ISO 216
ISO 216 is an international standard for paper sizes, used around the world except in North America and parts of Latin America. The standard defines the "A", "B" and "C" series of paper sizes, including A4, the most commonly available paper size worldwide. Two supplementary standards, ISO 217 and ISO 269, define related paper sizes; the ISO 269 "C" series is commonly listed alongside the A and B sizes. All ISO 216, ISO 217 and ISO 269 paper sizes (except some envelopes) have the same aspect ratio, , within rounding to millimetres. This ratio has the unique property that when cut or folded in half widthways, the halves also have the same aspect ratio. Each ISO paper size is one half of the area of the next larger size in the same series. Dimensions of A, B and C series History The oldest known mention of the advantages of basing a paper size on an aspect ratio of is found in a letter written on 25 October 1786 by the German scientist Georg Christoph Lichtenberg to Johann Beckmann. The formats that became ISO paper sizes A2, A3, B3, B4, and B5 were developed in France. They were listed in a 1798 law on taxation of publications that was based in part on page sizes. Searching for a standard system of paper formats on a scientific basis by the association Die Brücke – Internationales Institut zur Organisierung der geistigen Arbeit (The Bridge – International institute to organise intellectual work), as a replacement for the vast variety of other paper formats that had been used before, in order to make paper stocking and document reproduction cheaper and more efficient, Wilhelm Ostwald proposed in 1911, over a hundred years after the “Loi sur le timbre”, a Weltformat (world format) for paper sizes based on the ratio 1:, referring to the argument advanced by Lichtenberg's 1786 letter, and linking this to the metric system by using 1 centimetre as the width of the base format. W. Porstmann argued in a long article published in 1918, that a firm basis for the system of paper formats, which deal with surfaces, could not be the length, but the surface, i.e. linking the system of paper formats to the metric system of measures by the square metre, using the two formulae of x / y = 1: and x × y = 1. Porstmann also argued that formats for containers of paper like envelopes should be 10% larger than the paper format itself. In 1921, after a long discussion and another intervention by W. Porstmann, the Normenausschuß der deutschen Industrie (NADI, "Standardisation Committee of German Industry", today Deutsches Institut für Normung or short DIN) published German standard DI Norm 476 the specification of 4 series of paper formats with ratio 1:, with series A as the always preferred formats and basis for the other series. All measures are rounded to the nearest millimetre. A0 has a surface area of 1 square metre up to a rounding error, with a width of 841 mm and height of 1189 mm, so an actual area of 0.999949 m2, and A4 recommended as standard paper size for business, administrative and government correspondence and A6 for postcards. Series B is based on B0 with width of 1 metre, C0 is 917 mm × 1297 mm, and D0 771 mm × 1090 mm. Series C is the basis for envelope formats. This German standardisation work was accompanied by contributions from other countries, and the published DIN paper-format concept was soon introduced as a national standard in many other countries, for example, Belgium (1924), Netherlands (1925), Norway (1926), Switzerland (1929), Sweden (1930), Soviet Union (1934), Hungary (1938), Italy (1939), Finland (1942), Uruguay (1942), Argentina (1943), Brazil (1943), Spain (1947), Austria (1948), Romania (1949), Japan (1951), Denmark (1953), Czechoslovakia (1953), Israel (1954), Portugal (1954), Yugoslavia (1956), India (1957), Poland (1957), United Kingdom (1959), Venezuela (1962), New Zealand (1963), Iceland (1964), Mexico (1965), South Africa (1966), France (1967), Peru (1967), Turkey (1967), Chile (1968), Greece (1970), Zimbabwe (1970), Singapore (1970), Bangladesh (1972), Thailand (1973), Barbados (1973), Australia (1974), Ecuador (1974), Colombia (1975) and Kuwait (1975). It finally became both an international standard (ISO 216) as well as the official United Nations document format in 1975 and it is today used in almost all countries on this planet, with the exception of North America (including Mexico), Peru, Colombia, and the Dominican Republic. In 1977, a large German car manufacturer performed a study of the paper formats found in their incoming mail and concluded that out of 148 examined countries, 88 already used the A series formats. Advantages The main advantage of this system is its scaling. Rectangular paper with an aspect ratio of has the unique property that, when cut or folded in half midway between its longer sides, each half has the same aspect ratio as the whole sheet before it was divided. Equivalently, if one lays two same-sized sheets of paper with an aspect ratio of side by side along their longer side, they form a larger rectangle with the aspect ratio of and double the area of each individual sheet. The ISO system of paper sizes exploits these properties of the aspect ratio. In each series of sizes (for example, series A), the largest size is numbered 0 (for example, A0), and each successive size (for example, A1, A2, etc.) has half the area of the preceding sheet and can be cut by halving the length of the preceding size sheet. The new measurement is rounded down to the nearest millimetre. A folded brochure can be made by using a sheet of the next larger size (for example, an A4 sheet is folded in half to make a brochure with size A5 pages. An office photocopier or printer can be designed to reduce a page from A4 to A5 or to enlarge a page from A4 to A3. Similarly, two sheets of A4 can be scaled down to fit one A4 sheet without excess empty paper. This system also simplifies calculating the weight of paper. Under ISO 536, paper's grammage is defined as a sheet's mass in grams (g) per area in square metres (unit symbol g/m2; the nonstandard abbreviation "gsm" is also used). One can derive the grammage of other sizes by arithmetic division in . A standard A4 sheet made from paper weighs , as it is (four halvings, ignoring rounding) of an A0 page. Thus the weight, and the associated postage rate, can be easily approximated by counting the number of sheets used. ISO 216 and its related standards were first published between 1975 and 1995: ISO 216:2007, defining the A and B series of paper sizes ISO 269:1985, defining the C series for envelopes ISO 217:2013, defining the RA and SRA series of raw ("untrimmed") paper sizes Properties A series Paper in the A series format has an aspect ratio of (≈ 1.414, when rounded). A0 is defined so that it has an area of 1 m before rounding to the nearest millimetre. Successive paper sizes in the series (A1, A2, A3, etc.) are defined by halving the area of the preceding paper size and rounding down, so that the long side of is the same length as the short side of An. Hence, each next size is nearly exactly half of the prior size. So, an A1 page can fit two A2 pages inside the same area. The most used of this series is the size A4, which is and thus almost exactly in area. For comparison, the letter paper size commonly used in North America () is about () wider and () shorter than A4. Then, the size of A5 paper is half of A4, as × ( × ). The geometric rationale for using the square root of 2 is to maintain the aspect ratio of each subsequent rectangle after cutting or folding an A-series sheet in half, perpendicular to the larger side. Given a rectangle with a longer side, x, and a shorter side, y, ensuring that its aspect ratio, , will be the same as that of a rectangle half its size, , which means that = , which reduces to = ; in other words, an aspect ratio of 1:. B series The B series is defined in the standard as follows: "A subsidiary series of sizes is obtained by placing the geometrical means between adjacent sizes of the A series in sequence." The use of the geometric mean makes each step in size: B0, A0, B1, A1, B2 ... smaller than the previous one by the same factor. As with the A series, the lengths of the B series have the ratio , and folding one in half (and rounding down to the nearest millimetre) gives the next in the series. The shorter side of B0 is exactly 1 metre. There is also an incompatible Japanese B series which the JIS defines to have 1.5 times the area of the corresponding JIS A series (which is identical to the ISO A series). Thus, the lengths of JIS B series paper are ≈ 1.22 times those of A-series paper. By comparison, the lengths of ISO B series paper are ≈ 1.19 times those of A-series paper. C series The C series formats are geometric means between the B series and A series formats with the same number (e.g., C2 is the geometric mean between B2 and A2). The width to height ratio is as in the A and B series. The C series formats are used mainly for envelopes. An unfolded A4 page will fit into a C4 envelope. C series envelopes follow the same ratio principle as the A series pages. For example, if an A4 page is folded in half so that it is A5 in size, it will fit into a C5 envelope (which will be the same size as a C4 envelope folded in half). The lengths of ISO C series paper are therefore ≈ 1.09 times those of A-series paper. A, B, and C paper fit together as part of a geometric progression, with ratio of successive side lengths of , though there is no size half-way between Bn and : A4, C4, B4, "D4", A3, ...; there is such a D-series in the Swedish extensions to the system. Tolerances The tolerances specified in the standard are: ±1.5 mm for dimensions up to 150 mm, ±2.0 mm for dimensions in the range 150 to 600 mm, and ±3.0 mm for dimensions above 600 mm. These are related to comparison between series A, B and C. Application The ISO 216 formats are organized around the ratio 1:; two sheets next to each other together have the same ratio, sideways. In scaled photocopying, for example, two A4 sheets reduced to A5 size fit exactly onto one A4 sheet, and an A4 sheet in magnified size onto an A3 sheet; in each case, there is neither waste nor want. The principal countries not generally using the ISO paper sizes are the United States and Canada, which use North American paper sizes. Although they have also officially adopted the ISO 216 paper format, Mexico, Panama, Peru, Colombia, the Philippines, and Chile also use mostly U.S. paper sizes. Rectangular sheets of paper with the ratio 1: are popular in paper folding, such as origami, where they are sometimes called "A4 rectangles" or "silver rectangles". In other contexts, the term "silver rectangle" can also refer to a rectangle in the proportion 1:(1 + ), known as the silver ratio. Matching technical pen widths An important adjunct to the ISO paper sizes, particularly the A series, are the technical drawing line widths specified in ISO 128. For example, line type A ("Continuous - thick", used for "visible outlines") has a standard thickness of 0.7 mm on an A0-sized sheet, 0.5 mm on an A1 sheet, and 0.35 mm on A2, A3, or A4. The matching technical pen widths are 0.13, 0.18, 0.25, 0.35, 0.5, 0.7, 1.0, 1.40, and 2.0 mm, as specified in ISO 9175-1. Colour codes are assigned to each size to facilitate easy recognition by the drafter. These sizes again increase by a factor of , so that particular pens can be used on particular sizes of paper, and then the next smaller or larger size can be used to continue the drawing after it has been reduced or enlarged, respectively. {| class="wikitable" |- !style="text-align:left"| Linewidth (mm) |width="9%" colspan=2| 0.10 |width="9%" colspan=2| 0.13 |width="9%" colspan=2| 0.18 |width="9%" colspan=2| 0.25 |width="9%" colspan=2| 0.35 |width="9%" colspan=2| 0.50 |width="9%" colspan=2| 0.70 |width="9%" colspan=2| 1.0 |width="9%" colspan=2| 1.4 |width="9%" colspan=2| 2.0 |- !style="text-align:left"| Colour |width="2%" style="background:maroon"| ||Maroon |width="2%" style="background:orchid"| ||Violet |width="2%" style="background:red"| ||Red |width="2%" style="background:white"| ||White |width="2%" style="background:yellow"| ||Yellow |width="2%" style="background:chocolate"| ||Brown |width="2%" style="background:deepskyblue"| ||Blue |width="2%" style="background:darkorange"| ||Orange |width="2%" style="background:seagreen"| ||Green |width="2%" style="background:silver"| ||Gray |} The earlier DIN 6775 standard upon which ISO 9175-1 is based also specified a term and symbol for easy identification of pens and drawing templates compatible with the standard, called Micronorm, which may still be found on some technical drafting equipment. See also ANSI/ASME Y14.1 International standard envelope sizes Paper density References External links International standard paper sizes: ISO 216 details and rationale ISO 216 at iso.org Articles by Wilhelm Ostwald referencing Lichtenberg's letter, and W. Porstmann specifying a metric system of norms for formats for lengths, surfaces (planes), and volumes, laying the ground for the DIN-Series, in German papersizes.guide Explanation of paper sizes 00216 Stationery Metrication Technical specifications
[ 0.2521513104438782, 0.23434953391551971, 0.1281425654888153, 0.1396118849515915, -0.012800930067896843, -0.12565931677818298, -0.20345638692378998, 0.08639286458492279, -0.778247594833374, 0.08866038173437119, -0.2516823709011078, -0.4058544635772705, -0.1466299444437027, 0.139165103435516...
15276
https://en.wikipedia.org/wiki/ISO%203864
ISO 3864
ISO 3864 specifies international standards for safety signs and markings in workplaces and public facilities. These labels are graphical, to overcome language barriers. The standard is split into four parts: ISO 3864-1:2011 Part 1: Design principles for safety signs and safety ISO 3864-2:2016 Part 2: Design principles for product safety labels ISO 3864-3:2012 Part 3: Design principles for graphical symbols for use in safety signs ISO 3864-4:2011 Part 4: Colorimetric and photometric properties of safety sign materials Colours These are the colours specified in ISO Standard 3864-4 in RAL colour standard. In addition, ISO standard 3864-2:2016 lays out the following colours that correspond to levels of risk. This standard adds "Orange" as an incremental colour to the pallette above. Related standards The corresponding American standard is ANSI Z535. ANSI Z535.1 also explicitly uses multiple levels of hazard, including Yellow (Pantone 109) for 'caution' messages, and Orange (Pantone 151) for stronger 'warning' messages. Like ISO 3864, ANSI Z535 includes multiple sections: ANSI Z535.6-2006 defines an optional accompanying text in one or more languages. ISO 3864 is extended by ISO 7010, which provides a set of symbols based on the principles and properties specified in ISO 3864. See also ISO 7010 - Standard for safety symbols used in ISO 3864. ANSI Z535 - Corresponding American standard for safety signage, product warning labels and product instructions. References 03864
[ 0.6434739828109741, 0.6408778429031372, -0.08532655239105225, 0.10541042685508728, 0.035787176340818405, -0.2605857253074646, -0.05572178587317467, -0.16397741436958313, -0.2782822251319885, -0.2699853777885437, -0.6003084778785706, 0.16861149668693542, -0.23321230709552765, 0.251037091016...
15281
https://en.wikipedia.org/wiki/Isaac%20Abendana
Isaac Abendana
Isaac Abendana (c.1640–1699) was the younger brother of Jacob Abendana, and became hakam of the Spanish Portuguese Synagogue in London after his brother died. Abendana moved to England before his brother, in 1662, and taught Hebrew at Cambridge University. He completed an unpublished Latin translation of the Mishnah for the university in 1671. While he was at Cambridge, Abendana sold Hebrew books to the Bodleian Library of Oxford, and in 1689 he took a teaching position in Magdalen College. In Oxford, he wrote a series of Jewish almanacs for Christians, which he later collected and compiled as the Discourses on the Ecclesiastical and Civil Polity of the Jews (1706). Like his brother, he maintained an extensive correspondence with leading Christian scholars of his time, most notably with the philosopher Ralph Cudworth, master of Christ's College, Cambridge. References 1640s births 1699 deaths Spanish Jews Spanish emigrants to the United Kingdom People associated with Magdalen College, Oxford Academics of the University of Cambridge
[ -0.3136216402053833, 0.9189393520355225, -1.0336487293243408, -0.2488265484571457, -0.7881161570549011, 0.5181556940078735, 0.9322299957275391, 0.441265732049942, -0.47187429666519165, -0.2832040786743164, 0.10893178731203079, 0.006894511636346579, -0.25399962067604065, 0.7057589888572693,...
15284
https://en.wikipedia.org/wiki/List%20of%20intelligence%20agencies
List of intelligence agencies
This is a list of intelligence agencies by country. It includes only currently operational institutions. An intelligence agency is a government agency responsible for the collection, analysis, and exploitation of information in support of law enforcement, national security, military, and foreign policy objectives. Afghanistan General Directorate of Intelligence (GDI) – د استخباراتو لوی ریاست Albania State Intelligence Service (SHISH) – Sherbimi Informativ Shteteror Intelligence Agency of Defense (AISM) – Agjencia e Inteligjencës së Mbrojtjës Algeria Coordination des services de sécurité (CSS) General Directorate for Internal Security (DGSI) General Directorate for Documentation and External Security (DGDSE) General Directorate for Technical Intelligence (DGRT) Argentina President's Office Federal Intelligence Agency (AFI) – Agencia Federal de Inteligencia National Intelligence School (ENI) – Escuela Nacional de Inteligencia Directorate of Judicial Surveillance (DOJ) – Dirección de Observaciones Judiciales Federal Counternarcotics Service (SEFECONAR) – Servicio Federal de Lucha contra el Narcotráfico Argentine National Gendarmerie Intelligence (SIGN) – Inteligencia de la Gendarmería Nacional Argentina Ministry of Defense National Directorate of Strategic Military Intelligence (DNIEM) – Dirección Nacional de Inteligencia Estratégica Militar Ministry of Justice Federal Penitentiary Service Intelligence – Inteligencia del Servicio Penitenciario Federal Airport Security Police Intelligence – Inteligencia de la Policía de Seguridad Aeroportuaria Ministry of Interior National Directorate of Criminal Intelligence (DNIC) – Dirección Nacional de Inteligencia Criminal Argentine Federal Police Intelligence – Inteligencia de la Policía Federal Argentina Buenos Aires Police Intelligence (SIPBA) (Buenos Aires Police Intelligence) – Inteligencia de la Policía Bonaerense Argentine Naval Prefecture Intelligence (SIPN) – Inteligencia de la Prefectura Naval Argentina Ministry of Economy Financial Intelligence Unit (UIF) – Unidad de Inteligencia Financiera Intelligence Department of the Joint General Staff of the Armed Forces (J-2) Military Intelligence Collection Center (CRIM) – Central de Reunión de Inteligencia Militar Army Intelligence Service (SIE) – Servicio de Inteligencia del Ejército Naval Intelligence Service (SIN) – Servicio de Inteligencia Naval Air Force Intelligence Service (SIFA) – Servicio de Inteligencia de la Fuerza Aérea Armenia National Security Service (NSS) Department of Intelligence of the Armed Forces of Armenia Australia Australian Security Intelligence Organisation (ASIO) Australian Secret Intelligence Service (ASIS) Australian Signals Directorate (ASD) Australian Geospatial-Intelligence Organisation (AGO) Defence Intelligence Organisation (DIO) Office of National Intelligence (ONI) Austria Bundesministerium für Landesverteidigung (BMLV): Federal Ministry of Defence Abwehramt (AWA): Military Protective Office Heeresnachrichtenamt (HNA): Army Intelligence Office Bundesministerium für Inneres (BMI): Federal Ministry of the Interior Direktion Staatsschutz und Nachrichtendienst (DSN): State Security and Intelligence Directorate Azerbaijan State Security Service (Dövlət Təhlükəsizliyi Xidməti) Foreign Intelligence Service (Xarici Kəşfiyyat Xidməti) Bahamas Security and Intelligence Branch (SIB) Defence Force Intelligence Branch (DFIB) Financial Intelligence Unit (FIU) National Intelligence Agency (NIA) Bahrain NSA – National Security Agency Bangladesh National Committee for Intelligence Coordination National Security Affairs Cell External Intelligence Directorate General of Forces Intelligence (DGFI) National Security Intelligence (NSI) Internal Intelligence National Security Intelligence (NSI) National Telecommunication Monitoring Centre (NTMC) Special Branch (SB) Counter Terrorism and Transnational Crime (CTTC) Police Bureau of Investigation (PBI) Criminal Investigation Department (CID) Economic Intelligence & Securities Central Intelligence Unit (CIU) Bangladesh Financial Intelligence Unit (BFIU) Bangladesh Securities and Exchange Commission (BSEC) Other Intelligence Special Security Force – Intelligence Bureau (SSF-IB) Rapid Action Battalion – Intelligence Wing (RAB-IW) Military Intelligence Directorate General of Forces Intelligence (DGFI) Barbados Royal Barbados Police Force Special Branch (SB) Financial Intelligence Unit (FIU) Criminal Investigations Department (CID) Military Intelligence Unit (MIU) Belarus Камітэт дзяржаўнай бяспекі / Комитет государственной безопасности (KDB/KGB) (State Security Committee) Belgium VSSE (State Security Service) ADIV / SGRS (ADIV/SGRS) (General Intelligence and Security Service, military intelligence) OCAD / OCAM (Coordination Unit for the Threat Assessment) Bosnia and Herzegovina Intelligence-Security Agency of Bosnia and Herzegovina (OSA) Državna Agencija za Istrage i Zaštitu (State Investigation and Protection Agency, SIPA) Botswana Directorate on Intelligence and Security Services (DISS – Ministry of State President Espionage & Counter Intelligence unit) Crime Intelligence Branch (CRIB – Botswana Police Service Criminal Investigations Department unit) Military Intelligence (MI – Botswana Defence Force unit) Financial Intelligence Agency (FIA – Ministry of Finance department) Brazil Brazilian Intelligence Agency (ABIN) Federal Police Department (DPF) (counterintelligence agency) Army Intelligence Center (CIE) Navy Intelligence Center (CIM) Aeronautics Intelligence Center (CIA) (Air Force Intelligence) Gabinete de Seguranca Institucional (GSI) Responds directly to the president's office and the armed forces. Coordinates some intelligence operations. Secretaria da Receita Federal do Brasil (Federal Revenue Secretariat) (RFB) (General Coordination for Research and Investigations - Coordenação-Geral de Pesquisa e Investigação - Copei) Brunei Internal Security Department (Brunei) (internal) Research Department (external) Bulgaria Държавна агенция „Разузнаване“ (DAR) (State Intelligence Agency) – overseas intelligence gathering service under the supervision of the Council of Ministers of Bulgaria Държавна агенция за национална сигурност State Agency for National Security (DANS) – national security service under the supervision of the Council of Ministers of Bulgaria Служба "Военна информация" (CVI) (Military Intelligence Service) – under Ministry of Defence supervision Burundi Service national de renseignement (SNR) Cambodia Ministry of National Defense General Directorate of Intelligence Canada Canadian Security Intelligence Service (CSIS) Communications Security Establishment (CSE) Canadian Forces Intelligence Command (DND) Criminal Intelligence Service Canada (CISC) Financial Transactions and Reports Analysis Centre of Canada (FINTRAC) Global Affairs Canada (GAC) Bureau of Intelligence Analysis and Security and Bureau of Economic Intelligence Royal Canadian Mounted Police (RCMP) intelligence division Canada Border Services Agency (CBSA) Immigrations Intelligence Canadian Coast Guard (CCG) Intelligence Branch Public Safety Canada Canadian Centre for Cyber Security Cyber intelligence Integrated National Security Enforcement Teams Chile Ministry of Interior National Intelligence Agency (ANI) – Agencia Nacional de Inteligencia Carabineros Intelligence Departament (DIPOLCAR) – Dirección de Inteligencia de Carabineros Police Intelligence Department – Jefatura de Inteligencia Policial Ministry of National Defence Defense Intelligence Departament (DID) – Dirección de Inteligencia de la Defensa Army Intelligence Departament (DINE) – Dirección de Inteligencia del Ejército Air Force Intelligence Departament (DIFA) – Dirección de Inteligencia de la Fuerza Aérea Navy Intelligence Departament – Direccion de Inteligencia de la Armada China (PRC) Central Committee of the Chinese Communist Party (CCCPC) 610 Office International Department (ID) United Front Work Department (UFWD) People's Liberation Army (PLA) Central Security Regiment aka 8341 Unit Joint Staff Department of the Central Military Commission (JSDCMC) Intelligence Bureau of the General Staff aka 2nd Bureau People's Liberation Army Air Force (PLAAF) Sixth Research Institute (SRI) People's Liberation Army General Political Department (GND) China Association for International Friendly Contacts (CAIFC) People's Liberation Army General Staff Department (GSD) Second Intelligence Department Third Department Fourth Department People's Liberation Army Navy (PLAN) Navy Intelligence (์NI) People's Liberation Army Strategic Support Force, particularly the 3rd department ("3PLA"). PLA Unit 61398 aka APT 1 State Council of the People's Republic of China Ministry of Human Resources and Social Security (MOHRSS) State Administration of Foreign Experts Affairs (SAFEA) Ministry of State Security (MSS) Office for Safeguarding National Security of the CPG in the HKSAR (CPGNSO) Hong Kong SAR Criminal Intelligence Bureau (CIB) of the Hong Kong Police Force Joint Financial Intelligence Unit (JFIU) of the Hong Kong Police Force and the Customs and Excise Department Macau SAR Counter-intelligence Section – Research and Information Division of Public Security Police Force of Macau Information Division of Macau Security Force Colombia Dirección Nacional de Inteligencia (DNI) Jefatura de Inteligencia Militar Conjunta Jefatura de Inteligencia Militar (JEIMI) Jefatura de Inteligencia Aérea (JIA) Jefatura de Inteligencia Naval (JINA) Dirección de Inteligencia de la Policía Nacional (DIPOL) Congo (DRC) National Intelligence Agency (ANR) General Staff of Military intelligence (ex-DEMIAP) Directorate of General Information ( Congolese National Police PNC) CENAREF (National Financial Intelligence Unit) Congo (Republic of) Direction Générale de la Sécurité d'État (DGSE) Costa Rica Intelligence and National Security Department (DIS) – Direccion de Inteligencia y Seguridad Nacional Croatia Sigurnosno-obavještajna agencija (SOA) (Security and Intelligence Agency) Vojna sigurnosno-obavještajna agencija (VSOA) (Military Security and Intelligence Agency) Cuba Communist Party of Cuba (PCC) Departmento America (DA) Ministry of the FAR (MINFAR) Military Counterintelligence Directorate Military Intelligence Directorate Ministry of the Interior Dirección General de Inteligencia (DGI) Cyprus Cyprus Intelligence Service (CIS) (Κυπριακή Υπηρεσία Πληροφοριών)(ΚΥΠ), (former Central Intelligence Service-KYP) Czech Republic Security Information Service (Bezpečnostní informační služba, BIS) Office for Foreign Relations and Information (Úřad pro zahraniční styky a informace, ÚZSI) Ministry of Defence Military Intelligence (Vojenské zpravodajství, VZ) Denmark Danish Security and Intelligence Service (Politiets Efterretningstjeneste (PET)). Danish Defence Intelligence Service (Forsvarets Efterretningstjeneste (FE)). Army Intelligence Center (Efterretningsregimentet (EFR)). Djibouti Brigade Spéciale de Recherche de la Gendarmerie (BSRG) Service de Documentation et de Sédimentation (SDS) Dominican Republic (DNI) (National Department of Investigations) Ecuador National Intelligence Secretariat (SENAIN) (Inactive) Egypt Gihaz al-Mukhabarat al-Amma (GIS) (General Intelligence Service) Idarat al-Mukhabarat al-Harbyya wa al-Istitla (OMIR) (Office of Military Intelligence and Reconnaissance) Al-amn al-Watani (GHS) (General Homeland Security) Eritrea National Intelligence Agency (Hagerawi Dhnet) (ሃገራዊ ድሕነት) Eritrea Intelligence Research Centre (EiRC - ሻዕቢያ) (Powered by NationalEr Interest) National Security Office (or National Security Agency) Estonia Estonian Internal Security Service (KaPo) (Kaitsepolitseiamet) Foreign Intelligence Service (Välisluureamet) Military Intelligence Centre of Estonian Defence Forces (Kaitseväe Luurekeskus) Ethiopia Information Network Security Agency (INSA) National Intelligence and Security Service (NISS) Finland Ministry of Defence Finnish Defence Intelligence Agency – Puolustusvoimien tiedustelulaitos (PVTIEDL) / Försvarsmaktens underrättelsetjänst Intelligence Division (Finland) – Pääesikunnan tiedusteluosasto (PE TIEDOS) / Huvudstabens underrättelseavdelning) Ministry of Interior Finnish Security Intelligence Service (SUPO) – Suojelupoliisi / Skyddspolisen France Ministry of Interior General Directorate for Internal Security (DGSI; Direction générale de la sécurité intérieure) – Domestic counter-terrorism and counter-espionage intelligence. Central Directorate of the Judicial Police (DCPJ; Direction centrale de la Police judiciaire) – Organised crime intelligence. Ministry of Defence Directorate-General for External Security (DGSE; Direction générale de la sécurité extérieure) – Foreign intelligence relating to national security. Direction du Renseignement et de la Sécurité de la Défense (DRSD; Direction du Renseignement et de la Sécurité de la Défense) – Foreign intelligence relating to national security. Directorate of Military Intelligence (DRM; Direction du renseignement militaire) – Military intelligence. Gambia State Intelligence Services (the Gambia) (SIS) Georgia State Security Service (SSSG) − სახელმწიფო უშიშროების სამსახური Georgian Intelligence Service (GIS) − საქართველოს დაზვერვის სამსახური Georgian Armed Forces Military Intelligence Department Germany Federal Bundeskanzleramt: Federal Chancellery Bundesnachrichtendienst (BND): Federal Intelligence Service Bundesministerium des Innern (BMI): Federal Ministry of Interior Bundesamt für Verfassungsschutz (BfV): Federal Office for the Protection of the Constitution Bundesamt für Sicherheit in der Informationstechnik (BSI): Federal Office for Information Security Bundespolizei: Federal Police Zentrum für Informations- und Kommunikationstechnik (IKTZ): Center for information and communication technology Bundeswehr: Federal Defense Force Militärischer Abschirmdienst (MAD): Military Counterintelligence Service Kommando Strategische Aufklärung (KSA): Strategic Surveillance Command State Landesministerium des Innern: State Ministry of the Interior (different denominations from state to state) Landesamt für Verfassungsschutz (LfV): (semi-independent) State Authority for the Protection of the Constitution for every single state Ghana National Security Council (Ghana) (Centre of National Security) National Signals Bureau (NSB) – (Cyber Intelligence) Bureau of National Investigations (BNI) – (Internal Intelligence Agency) Research Department Unit – Research Department, Ministry of Foreign Affairs (External Intelligence Agency) Criminal Investigative Department (CID) – (Ghana Police) Military Intelligence Unit (MIU) – (Ghana Armed Forces) Greece Prime Minister of the Hellenic Republic National Intelligence Service (ΕΥΠ) – Εθνική Υπηρεσία Πληροφοριών Hellenic National Defence General Staff E Division – Intelligence Division Haiti Service d'Intelligence National (SIN) (National Intelligence Service) Hungary Információs Hivatal (IH) (Information Office) Alkotmányvédelmi Hivatal (AH) (Constitution Protection Office) Katonai Nemzetbiztonsági Szolgálat (KNBSZ) (Military National Security Service) Nemzetbiztonsági Szakszolgálat (NBSZ) (Special Service for National Security) Terrorelhárítási Központ (TEK) (Counter Terrorism Centre) Iceland National Security Agency – Greiningardeild Ríkislögreglustjóra (GRLS) Military Intelligence Service – Greiningardeild Varnarmálastofnunar Íslands (GVMSÍ) India Joint Intelligence Committee External Intelligence Research and Analysis Wing (RAW) Defence Intelligence Defence Intelligence Agency Directorate of Military Intelligence Directorate of Air Intelligence Directorate of Naval Intelligence Image Processing and Analysis Centre Directorate of Signals Intelligence Joint Cipher Bureau Internal intelligence Intelligence Bureau (IB) Economic Intelligence Directorate of Revenue Intelligence Economic Intelligence Council Enforcement Directorate Directorate General of GST Intelligence (DGGI) Central Economic Intelligence Bureau Directorate of Economic Enforcement Financial Intelligence Unit (FIU-Ind) Other Intelligence Wildlife Crime Control Bureau Narcotics Control Bureau Indonesia Foreign/Domestic Intelligence Badan Intelijen Negara (BIN) (State Intelligence Agency) Military Intelligence Indonesian Strategic Intelligence Agency (BAIS) Badan Intelijen Pertahanan/Badan Instalasi Strategis Nasional (BAINTEL KEMHAN/BAINSTRANAS) (Defence Intelligence Agency/Strategic National Installations Agency) Indonesian Army Intelligence Centre (PUSINTELAD) Signals Intelligence Badan Siber dan Sandi Negara (BSSN) (National Crypto and Cyber Security Agency) Badan Informasi Geospasial (BIG) Criminal Intelligence Badan Intelijen dan Keamanan Polri (BAINTELKAM) (Indonesian National Police Security and Intelligence Agency) Jaksa Agung Muda Bidang Intelijen Kejagung (JAM Intelijen) (Office of the Solicitor General for Intelligence) Direktorat Intelijen Imigrasi (Directorate of Immigration Intelligence) Seksi Intelijen BNN (National Narcotics Agency Intelligence Section) Financial Intelligence Inspektorat Bidang Investigasi Kemkeu (Ministry of Finance Inspectorate of Investigation) Sub Direktorat Intelijen Dirjen Bea Cukai (Customs & Excise Sub-Directorate of Intelligence) Pusat Pelaporan dan Analisis Transaksi Keuangan (PPATK) Iran Ministry of Intelligence (VAJA) Oghab 2 – Nuclear facilities security Iranian Intelligence Community General Staff of the Armed Forces of the Islamic Republic of Iran: Intelligence Protection Organization of General Staff of the Armed Forces Islamic Republic of Iran Army: Intelligence Protection Organization of Iranian Army (SAHEFAJA) Islamic Revolutionary Guard Corps: Intelligence Organization of IRGC Intelligence Protection Organization of IRGC (SAHEFASA) Law Enforcement Force of the Islamic Republic of Iran: Iranian Security Police (PAVA) Intelligence Protection Organization of Iranian Police (SAHEFANAJA) Ministry of Defence and Armed Forces Logistics: Intelligence Protection Organization of Ministry of Defence (SAHEFAVEDJA) Iraq General Security Directorate - (GSD) - (Internal security agency) Iraqi National Intelligence Service - (INIS) - (Foreign intelligence and Special operations) Falcons Intelligence Cell - (FIC) - (Military intelligence) Kurdistan Region Security Council (KRSC) - (Regional security agency) Ireland Foreign & Domestic Military Intelligence (Defence Forces) Directorate of Military Intelligence (G2) Communications and Information Services Corps (CIS) SIGINT Section Domestic Police Intelligence (Garda Síochána) Crime & Security Branch (CSB) Special Detective Unit (SDU) National Surveillance Unit (NSU) Financial Intelligence Unit (FIU) Israel Mossad (Foreign Intelligence and Special Operations) Shin Bet (Internal Security Service) Aman (Military intelligence) Lahav 433 (Police intelligence) Italy Dipartimento delle Informazioni per la Sicurezza (DIS): "Department of Information for Security" Internal Intelligence Agenzia Informazioni e Sicurezza Interna (AISI): "Agency for Internal Information and Security" External Intelligence Agenzia Informazioni e Sicurezza Esterna (AISE): "Agency for External Information and Security" Military Intelligence 2nd Information and Security Unit (II RIS) : "II Reparto Informazioni e Sicurezza" (military intelligence and security command of the Joint General Staff) Reparto per le Informazioni Operative (RIO): "Operational Informations Unit" (information gathering branch). Centro Intelligence Interforze (CII): "Joint Intelligence Center" Centro Interforze di Formazione Intelligence e Guerra Elettronica (CIFI/GE): "Joint Intelligenge and Electronic Warfare Training Center" Reparto per la Sicurezza e le Addettanze Militari: "Security and Military Attaches Unit" (information security and counterintelligence branch). Ufficio Addettanze Militari all'Estero: Military Attaches Abroad Office (military diplomatic intelligence). Ufficio Sicurezza Difesa: "Defense Security Office" (military counterintelligence). Ufficio di Polizia Militare: "Military Police Office" (military information structures security). Centro di Valutazione della Difesa (Ce.Va.Difesa): "Defense Evaluation Center" (military software and systems security evaluation). Reparto per la Politica informativa ed il Telerilevamento Satellitare: "Information Policies and Satellite Remote Sensing Unit" (technical intelligence branch). Centro Interforze Telerilevamento Satellitare (CITS): "Joint Satellite Remote Sensing Center". Ufficio Politica Informativa e Guerra Elettronica: "Information Policies and Electronic Warfare Office". Raggruppamento Unità Difesa (RUD): "Defense Units Group" (high-level security and operations branch). Jamaica Jamaica Defence Force Intelligence Unit National Intelligence Bureau Special Branch of Jamaica Constabulary Force Japan Cabinet Secretariat CIRO (Cabinet Intelligence and Research Office) Cabinet Satellite Intelligence Center (CSICE) Ministry of Defense Defense Intelligence Headquarters (DIH) Intelligence Security Command (JSDF) Military Intelligence Command (JGSDF) Fleet Intelligence Command (JMSDF) Air Intelligence Wing (JASDF) National Public Safety Commission National Police Agency NPA Security Bureau Tokyo Metropolitan Police Department Public Security Bureau Prefectural Police Department Security Bureau Public Security Section Police Station Public Security Section Ministry of Foreign Affairs Intelligence and Analysis Service (IAS) International Counter-Terrorism Intelligence Collection Unit (ICTICU) Ministry of Justice Public Security Intelligence Agency (PSIA) Jordan Da’irat al-Mukhabarat al-’Ammah (GID) (General Intelligence Department) Kazakhstan National Security Committee of the Republic of Kazakhstan General Intelligence Office State Security Service of Kazakhstan Kenya National Intelligence Service (NIS) Directorate of Military Intelligence National Cyber Command Center (NC3) Directorate of Criminal Investigations (DCI) Korea, North (DPRK) Reconnaissance General Bureau Ministry of State Security (North Korea) Korea, South (ROK) Independent agencies Korea Financial Intelligence Unit (KoFIU) National Counter Terrorism Center (NCTC) National Intelligence Service (NIS) Presidential Security Service (PSS) Intelligence & Security Korean National Police (KNP) Intelligence Bureau Ministry of National Defense (MND) Defense Intelligence Agency (DIA) Defense Security Support Command (DSSC) Naval Intelligence Group (NIG) Ministry of Science and ICT (MSIT) Korea Internet & Security Agency (KISA) Kuwait The Ministry of Interior (وزارة الداخلية), Domestic Undercover Police (المباحث الجنائية) Kuwait National Security Bureau (جهاز الأمن الوطني) The Ministry of Defense (وزارة الدفاع), Military Intelligence Agency ( الاستخبارات العسكرية ) The National Guard (الحرس الوطني), National Guard Intelligence Agency (وكالة استخبارات الحرس الوطني) Kyrgyzstan State Committee for National Security (UKMK/GKNB) Latvia Valsts drošības dienests (VDD) (State Security Service) Satversmes aizsardzības birojs (SAB) (Constitution Protection Bureau) Militārās izlūkošanas un drošības dienests (MIDD) (Defence Intelligence and Security Service) Lebanon General Directorate of General Security The Information Branch Lebanese State Security Intelligence Directorate of the Lebanese Army Liberia National Security Agency Lithuania State Security Department / Valstybes saugumo departamentas (VSD) Second Investigation Department / Antrasis operatyvinių tarnybų departamentas (AOTD) Luxembourg Service de Renseignement de l'État Luxembourgeois / Lëtzebuerger Staatlëchen Noriichtendéngscht (SREL, Luxembourg State Intelligence Service, i.e. the Homeland Intelligence Service) Haut Commissariat de la Sécurité Extérieure / Héichkommissariat fir auswäerteg Sëcherheet (HCSE, High Commission for External Security, i.e. the Foreign Intelligence Service) Service de Renseignement de l'Armée Luxembourgeoise / Noriichtendéngscht vun der Lëtzebuerger Arméi (SRAL, Luxembourgish Army Intelligence Service, i.e. the Military Intelligence Service) Madagascar Central Intelligence Service (CIS) Malawi In the Presidents Office National Intelligence Service formerly known as National Intelligence Bureau Malaysia Malaysian Special Branch Defence Intelligence Staff Division Royal Intelligence Corps (Kor Risik DiRaja), Military intelligence, Malaysian Armed Forces Research Division of the Prime Minister's Department (Malaysian External Intelligence Organization) Chief Government Security Office (CGSO) Maldives Maldives National Defence Force (Defence Intelligence Service) Maldives Police Service (Directorate of Intelligence) Mexico Federal government of Mexico Civilian agencies Attorney General of Mexico (FGR) Attorney General's Crime-Combat Planning, Analysis and Information Center ( CENAPI / PGR – Centro de Planeación, Análisis e Información para el Combate a la Delincuencia ) Attorney General's Office for Special Investigations on Organized Crime (SEIDO / PGR ) Financial Intelligence Unit (Mexico) Unidad de Inteligencia Financiera (UIF) Interior Ministry (SEGOB) National Commission for Security (CNS) Federal Police Intelligence Division of the Federal Police (Division de Inteligencia – CNS / Policia Federal) National Intelligence Centre (CNI) Military agencies SEDENA 2nd Section of the National Defense Intelligence Staff (SEDENA S-2 – Seccion 2da: Inteligencia del Estado Mayor) Military Intelligence – National Defense Ministry (Inteligencia Militar – SEDENA / Ejercito y Fuerza Aerea) SEMAR Naval Intelligence – Navy Ministry (Inteligencia Naval – SEMAR / Marina Armada ) Moldova Information of and Security Service (SIS) – Serviciul de Informații și Securitate"https://sis.md/en Mongolia General Intelligence Agency of Mongolia (GIA) Montenegro National Security Agency (ANB) Ministry of Defence Intelligence-security Service Morocco Direction de la Surveillance du Territoire (DST) (Directorate of Territorial Surveillance) Direction Generale pour l'Etude et la Documentation (DGED) (Directorate of Research and Documentation) Bureau Central d'Investigations Judiciaires (BCIJ) (Central Bureau of Judicial Investigations) Mozambique Servico de Informaçãos e Segurança do Estado (SISE) Myanmar Bureau Of Special Investigation (BSI) Military Intelligence of Myanmar (MI) Special Intelligence Department (Special Branch) Criminal Investigation Department (CID) Nepal National Investigation Department (NID) Formerly known as Nepal Guptachar vibhag Directorate of Military Intelligence Netherlands Algemene Inlichtingen- en Veiligheidsdienst (AIVD) (General Intelligence and Security Service) Militaire Inlichtingen- en Veiligheidsdienst (MIVD) (Military Intelligence and Security Service) Joint Sigint Cyber Unit (JSCU) Nationale Coördinator Terrorismebestrijding en Veiligheid (NCTV) (National Coordinator for Counterterrorism and Security), used for the analysis of threats and coordination of counterterrorism measures Koninklijke Marechaussee (Royal Marechaussee) Team Criminal Intelligence (KMar-TCI) Fiscale Inlichtingen- en Opsporingsdienst (Fiscal Information and Investigation Service) Team Criminal Intelligence (FIOD-TCI) Korps Nationale Politie (National Police Corps) Team Criminal Intelligence (TCI) Team Special Witnesses (TSG) (Team Speciale Getuigen) Regional Intelligence Service (Regionale Inlichtingendienst), National Police teams which collect national security intelligence for the AIVD Team Public Order Intelligence (Team Openbare Order Inlichtingen), intelligence unit focused on collecting intelligence to maintain public order and security New Zealand Government Communications Security Bureau New Zealand Security Intelligence Service National Assessments Bureau Nicaragua Dirección de Información para la Defensa (DID) (Directorate of Information for Defense) Nigeria State Security Service (Internal Security) National Intelligence Agency (Foreign Intelligence and Counterintelligence) Defence Intelligence Agency (Military Intelligence) Department Directorate Of Secret Service (Nigeria) Force Intelligence Bureau(FIB) (Intelligence Arm of The Nigerian Police Force) North Macedonia Administration for Security and Counterintelligence (Uprava za bezbednost i kontrarazuznavanje) (Police Agency) Intelligence Agency (Agencija za Razuznavanje) (Civilian Agency) IA Military Service for Security and Intelligence (Voena služba za razuznuvanje i bezbednost) (Military Agency) Norway Nasjonal sikkerhetsmyndighet (NSM) (National Security Authority) Politiets sikkerhetstjeneste (PST) (Police Security Service) Etterretningstjenesten (NIS) (Norwegian Intelligence Service) Forsvarets sikkerhetstjeneste (FOST) – Norwegian Defence Security Service (NORDSS) Oman The Palace Office Internal Security Service Liaison and Coordination Service Pakistan National Intelligence Coordination Committee (NICC) External Intelligence Inter-Services Intelligence (ISI) Defence Intelligence Air Intelligence (AI) Military Intelligence (MI) Naval Intelligence (NI) Internal Intelligence Intelligence Bureau (IB) Federal Investigation Agency (FIA) National Intelligence Directorate (NID) Economic Intelligence & Securities Federal Board of Revenue (FBR) Directorate-General of Intelligence and Investigation (DGII) Financial Monitoring Unit (FMU) National Accountability Bureau (NAB) Security and Exchange Commission Pakistan (SECP) Other Intelligence National Counter Terrorism Authority (NACTA) Counter Terrorism Department (CTD) Anti-Narcotics Force (ANF) National Crises Management Cell (NCMC) Anti-Crime & Anti-Terrorism (ACAT) Panama Consejo de Seguridad Pública y Defensa Nacional (CSPDN) (security, defense and intelligence main government entity) National Police Intelligence Directorate (DNIP) – Dirección Nacional de Inteligencia Policial Direccion de Investigacion Judicial (DIJ) Direccion General de Analisis e Inteligencia Estrategica (DGAIE) Servicio Nacional de Inteligencia y Seguridad (SENIS) Papua New Guinea National Intelligence Organization (NIO) Royal PNG Constabulary – National Criminal Intelligence Unit (NCIU), Financial Intelligence Unit (FIU) PNG Customs Service – Customs Intelligence Department of Prime Minister – Office of Security Coordination & Assessment (OSCA) PNG Defense Force – Defense Intelligence Bureau (DIB) Bank of PNG – Financial Analysis & Supervision Unit (FASU) Paraguay Secretaría Nacional de Inteligencia (SNI) (National Intelligence Secretariat) Peru Dirección Nacional de Inteligencia (DINI) (National Directorate of Intelligence) Philippines Office of the President – Tanggapan ng Pangulo ng PilipinasNational Intelligence Coordinating Agency (NICA) – Pambansang Ahensiya sa Ugnayang IntelihensiyaPhilippine Drug Enforcement Agency (PDEA) – Ahensiya ng Pilipinas sa Pagpapatupad ng Batas Laban sa Bawal na GamotNational Counter-Terrorism Action Group (NACTAG) – Pambansang Lupon ng Pagsasagawa Laban sa TerorismoDepartment of Justice – Kagawaran ng KatarunganNational Bureau of Investigation (NBI) – Pambansang Kawanihan ng PagsisiyasatDepartment of National Defense – Kagawaran ng Tanggulang PambansaIntelligence Service, Armed Forces of the Philippines (ISAFP) Philippine Army – Hukbong Katihan ng PilipinasArmy Intelligence Regiment (AIR) Philippine Air Force – Hukbong Himpapawid ng Pilipinas300th Air Intelligence and Security Wing (AISW) Philippine Navy – Hukbong Dagat ng PilipinasNaval Intelligence and Security Force (NISF) Department of Transportation – Kagawaran ng TransportasyonPhilippine Coast Guard – Tanod Baybayin ng PilipinasCoast Guard Staff for Intelligence Department of the Interior and Local Government – Kagawaran ng Interyor at Pamahalaang LokalPhilippine National Police – Pambansang Pulisya ng PilipinasDirectorate for Intelligence (DI) Philippine National Police – Intelligence Group (PNP-IG) Philippine National Police – Criminal Investigation and Detection Group (PNP-CIDG) Department of Finance – Kagawaran ng PananalapiBureau of Customs (BuCor) – Kawanihan ng AdwanaCustoms Intelligence and Investigation Service (CIIS) Department of Foreign Affairs – Kagawaran ng Ugnayang PanlabasIntelligence and Security Unit (ISU) Poland Agencja Wywiadu (AW) (Foreign Intelligence Agency, also principal SIGINT and IMINT agency) Agencja Bezpieczeństwa Wewnętrznego (ABW) (Internal Security Agency - domestic and counter-intelligence, counter-terrorisn, counter-extremism, domestic SIGINT) Służba Wywiadu Wojskowego (SWW) (Military Intelligence Service including SIGINT and IMINT) Służba Kontrwywiadu Wojskowego (SKW) (Military Counter-intelligence Service including SIGINT) Zarząd Kryminalny Komendy Głównej Żandarmerii Wojskowej (ZK KGŻW) (Criminal Directorate of the Military Gendarmerie Headquarters) - criminal intelligence in Armed Forces Centralne Biuro Antykorupcyjne (CBA) (Central Anticorruption Bureau) Komenda Główna Policji (KGP) (criminal intelligence) Bureau of Criminal Intelligence and Information (each of the Voivodeship Police Commands has also a corresponding department) Centralne Biuro Śledcze Policji (CBŚP) (Central Investigations Bureau of the Police) Zarząd Operacyjno-Śledczy Komendy GłówneJ Straży Granicznej (KGSG) (Operations and Investigations Directorate of the Border Guard Headquarters) (ZOŚ KGSG) - border, immigration, air traffic and related criminal intelligence Służba Ochrony Państwa (SOP) - intelligence concerning personal security of principal state officials Straż Marszałkowska (SM) - intelligence concerning security of the houses of Parliament Tax and Customs Service (SCS) (tax intelligence, as well as other concerning customs, excise, gambling, controlled drugs, controlled hazardous materials, looted cultural property, CITES) General Inspector of Financial Information (GIIF) (financial intelligence) Other military units involved in: IMINT Polish IMINT Centre (ORO) 12th Unmanned Aerial Vehicles Base (12.BBSP) Military Unit NIL "Brigadier General August Emil Fieldorf «Nil»" (JW NIL) SIGINT Reconnaissance Group of 3rd Ship Flotilla (gOR 3.FO) Centre for Radioelectronic Combat Reconnaissance and Support ″Lieutenant Colonel Jan Kowalewski″ (CRiWWRE) 2th Przasnysz Radioelectronic Reconnaissance Regiment (2.ORel) 6th Oliwa Radioelectronic Reconnaissance Regiment ″Admiral Arendt Dickman″ (6.ORel) Military Unit NIL "Brigadier General August Emil Fieldorf «Nil»" (JW NIL) Narodowe Centrum Bezpieczeństwa Cyberprzestrzeni (NCBC - National Centre for Cyberspace Security) (SIGINT, cyberwarfare and cryptology) Portugal Sistema de Informações da República Portuguesa (SIRP) (Intelligence System of the Portuguese Republic) Serviço de Informações de Segurança (SIS) (Security Intelligence Service) Serviço de Informações Estratégicas de Defesa (SIED) (Defense Strategic Intelligence Service) Centro de Informações e Segurança Militares (CISMIL) (Military Intelligence and Security Service) Qatar Qatar State Security Romania Romanian Intelligence Service (SRI) – Serviciul Român de Informații Foreign Intelligence Service (SIE) – Serviciul de Informații ExterneSpecial Telecommunication Service (STS) – Serviciul de Telecomunicații SpecialeProtection and Guard Service (SPP) – Serviciul de Protecţie şi PazăMinistry of National Defence General Directorate for Defense Intelligence (DGIA) – Direcția Generală de Informații a ApărăriiMinistry of Internal Affairs General Directorate for Internal Security (DGPI) – Direcția Generală de Protecție Internă Russia Federal Security Service (FSB) – Федеральная служба безопасности Main Directorate of Special Programs of the President of the Russian Federation (GUSP) – Главное управление специальных программ Президента Российской Федерации Foreign Intelligence Service (Russia) (SVR) – Служба Внешней Разведки Main Intelligence Directorate (GRU) – Главное Разведывательное Управление Federal Protective Service (FSO) – Федеральная служба охраныSpecial Communications Service of Russia – Служба специальной связи и информации Saudi Arabia Council of Political and Security Affairs (CPSA) – مجلس الشؤون السياسية والأمنية General Intelligence Presidency (GIP) – رئاسة الاستخبارات العامة Presidency of State Security (PSS) – رئاسة أمن الدولة Mabahith (GDI) – المباحث العامة Saudi Arabia Ministry of Defense (MOD) – وزارة الدفاع The Armed Forces Intelligence and Security Commission – هيئة استخبارات وأمن القوات المسلحة The Land Forces Intelligence and Security Commission – هيئة استخبارات وأمن القوات البرية The Naval Forces Intelligence and Security Commission – هيئة استخبارات وأمن القوات البحرية The Air Forces Intelligence and Security Commission – هيئة استخبارات وأمن القوات الجوية The Air Defense Forces Intelligence and Security Commission – هيئة استخبارات وأمن قوات الدفاع الجوي The Strategic Missile Force Intelligence and Security Commission – هيئة استخبارات وأمن قوة الصواريخ الاستراتيجية Saudi Arabia Ministry of Interior (MOI) – وزارة الداخلية Saudi Arabia Border Guards Intelligence Directorate – استخبارات حرس الحدود General Directorate of Public Security (GPS) – مديرية الأمن العام General Administration of Financial Investigations (GAFI) – الادارة العامة للتحريات المالية Saudi Arabia National Guard (SANG) – الحرس الوطني السعودي National Guard Intelligence Commission – هيئة الاستخبارات بالحرس الوطني Saudi Royal Guard (SRG) – رئاسة الحرس الملكي Saudi Royal Guard Intelligence Commission – هيئة استخبارات الحرس الملكي السعودي The National Cyber Security Commission (NCSC) – الهيئة الوطنية للأمن السيبراني Saudi Arabian Monetary Authority (SAMA) – مؤسسة النقد العربي السعودي Anti-Money Laundering Committee (AMLC) – اللجنة الدائمة لمكافحة غسل الاموال Serbia National National Security Council and Classified Information Protection Office – Канцеларија Савета за националну безбедност и заштиту тајних податакаMinistry of the Interior Security Intelligence Agency (BIA) – Безбедносно-информативна агенцијаMinistry of Defence Military Intelligence Agency (VOA) – Војнообавештајна агенцијаMilitary Security Agency (VBA) – Војнобезбедносна агенцијаIntelligence and Reconnaissance Directorate (J-2) – Управа за обавештајно-извиђачке послове Ministry of Finance Money Laundering Prevention Administration – Управа за спречавање прања новца Singapore Internal Security Department (ISD) Security and Intelligence Division (SID) Slovakia Slovenská informačná služba (SIS) (Slovak Information Service) Vojenské spravodajstvo (Military Intelligence) Národný bezpečnostný úrad (NBÚ) (National Security Bureau) Slovenia Slovenska Obveščevalno-Varnostna Agencija (SOVA) (Slovenian Intelligence and Security Agency) Obveščevalno Varnostna Služba (OVS) ( Intelligence and Security Service of Slovenian Ministry of Defence) General štab SV – Sektor za obveščevalne zadeve – J2 (GŠSV-J2) ( (General Staff SAF – Section for intelligence matters – J2) Nacionalni Preiskovalni urad (NPU) Somalia National Intelligence and Security Agency (NISA) South Africa State Security Agency (SSA) Domestic Branch Foreign Branch South African National Defence Force Intelligence Division (SANDF-ID) Crime Intelligence Division, South African Police Service Spain Ministry of the Presidency National Security Department (DSN) Ministry of Defence National Intelligence Centre (CNI) Centro Criptológico Nacional (CCN) Spanish Armed Forces Armed Forces Intelligence Center (CIFAS) Joint Cyberspace Command (MCCE) Ministry of the Interior Intelligence Center for Counter-Terrorism and Organized Crime (CITCO) Cuerpo Nacional de Policia Brigada de Investigación Tecnológica (BIT) Comisaría General de la Información (CGI) Comisaría General de Policía Judicial (CGPJ) Civil Guard Servicio de Información de la Guardia Civil (SIGC) Unidad Central Operativa (UCO) Ministry of Economic Affairs and Digital Transformation Customs Surveillance Service (SVA) Sri Lanka Ministry of Defence State Intelligence Service Sri Lanka Armed Forces Directorate of Military Intelligence Military Intelligence Corps (Sri Lanka) Central Bank of Sri Lanka Financial Intelligence Unit (Sri Lanka) Sri Lanka Navy Navy Intelligence Sri Lanka Police Criminal Investigation Department (Sri Lanka) Sri Lanka Customs Central Intelligence Directorate Sudan General Intelligence Service Sweden Swedish Military Intelligence and Security Service (MUST) – Militära underrättelse- och säkerhetstjänstenOffice for Special Acquisition (KSI) – Kontoret för särskild inhämtningIntelligence Office (UNDK) – UnderrättelsekontoretSecurity Office (SÄKK) – SäkerhetskontoretNational Defence Radio Establishment (FRA) – Försvarets RadioanstaltSwedish Security Service (Säpo) – Säkerhetspolisen Switzerland Federal Department of Defence, Civil Protection and Sports Nachrichtendienst des Bundes (NDB) Federal Intelligence Service as of 1 January 2010, created by merger of Strategic Intelligence Service (SND) – Strategischer Nachrichtendienst and Analysis and Prevention Service (DAP) – Dienst für Analyse und PräventionSwiss Armed Forces Military Intelligence Service (MND) – Militärischer NachrichtendienstFederal Department of Justice and Police The Postal Service and Telecommunications Surveillance (UPF) – Überwachung Post- und Fernmeldeverkehr'' Syria Air Force Intelligence Directorate General Security Directorate Political Security Directorate Military Intelligence Service Taiwan (ROC) General Strategy National Security Bureau, National Security Council Civil Ministry of Justice Investigation Bureau (MJIB) National Police Agency, Ministry of Interior Semi-military Coast Guard Administration Military All Service Units Military Police Command, Ministry of National Defense Military Intelligence Bureau, General Staff Headquarters, Ministry of National Defense Military Security General Corps, General Staff Headquarters, Ministry of National Defense Political Warfare General Bureau, Ministry of National Defense Single Branch Units Staff Department of Intelligence (S2), Army Command Staff Department of Intelligence (S2), Navy Command Staff Department of Intelligence (S2), Air Force Command Tajikistan State Committee for National Security (SCNS) – Кумитаи давлатии амнияти милли (КДАМ)/Государственный комитет национальной безопасности (ГКНБ) Tanzania Tanzania Intelligence and Security Service (Usalama wa taifa) Thailand National Intelligence Cooperating Center (NICC) Office of the Prime Minister Anti-Money Laundering Office (AMLO) Financial Intelligence Division (FID) Internal Security Operations Command (ISOC) under the Office of the Prime Minister National Intelligence Agency (NIA) under the Office of the Prime Minister Ministry of Foreign Affairs News Division Ministry of Interior Department of Provincial Administration (DOPA) Internal Security Affairs Bureau (ISAB) Ministry of Justice Department of Special Investigation (DSI) Office of the Narcotics Control Board (ONCB) Ministry of Defence Armed Forces Security Center (AFSC) Army Military Intelligence Command (AMIC) Department of Border Affair (DBA) Directorate of Joint Intelligence (DJI) Directorate of Intelligence Royal Thai Army (DINTRTA) Directorate of Intelligence, RTAF (INTELLRTAF) Naval Intelligence Department (NID) Royal Thai Police Crime Suppression Division (CSD) Drug Intelligence Division (DID) Special Branch Bureau (SBB) Turkey President of Turkey National Intelligence Organization (MİT) (semi-dependent (main), foreign intelligence, counter espionage and special operations) Security İnvestigation Directorate Counter-Intelligence Directorate External Operations Directorate Security Intelligence Directorate Electronic and Technical Intelligence Directorate Signals Intelligence Directorate Ministry of National Defense Joint Chief of Staff Intelligence Bureau (GENKUR-İDB) (semi-dependent, military intelligence and special operations) Army Intelligence Bureau (semi-dependent, military intelligence) Navy Intelligence Bureau (semi-dependent, military intelligence) Air Force Intelligence Bureau (semi-dependent, military intelligence) Ministry of the Interior Coast Guard Intelligence Bureau (semi-dependent, military intelligence) Gendarmerie Intelligence Bureau (semi-dependent, military intelligence Police Intelligence Bureau (semi-dependent, law enforcement) Offices of the Other Ministries Ministry of Treasury and Finance, Financial Crimes Investigation Board (MASAK) (semi-dependent, financial monitoring) Ministry of Trade, Customs Enforcement (Gümrük Muhafaza) (dependent, customs protection) Turkmenistan Ministry of National Security (MNB) Ukraine Central Intelligence DirectorateHolovne Upravlinnya Rozvidky (HUR) Foreign Intelligence Service of UkraineSluzhba Zovnishnioyi Rozvidky Ukrayiny (SZR or SZRU) National Bureau of Investigation (NBI) State Service for Financial Monitoring(Financial Intelligence Unit) External secret agencies (ESC) Security Service of Ukraine Sluzhba Bezpeky Ukrayiny (SBU) United Arab Emirates UAE State Security Signals Intelligence Agency (SIA) formerly known as the National Electronic Security Authority(NESA) United Kingdom Joint Intelligence Organisation (JIO) – Joint intelligence analysis. Criminal Intelligence and Protected Persons National Crime Agency (NCA) – Organised crime intelligence gathering and analysis. In addition to having intelligence and surveillance powers, officers from the National Crime Agency can hold any or all three of the powers of a (armed) police officer, immigration officer and/or customs officer. The Agency and its officers have special powers including acting as an enforcement authority for Unexplained wealth orders and access of internet records through the Investigatory Powers Act 2016. National Crime Agency officers are posted overseas in around 50 countries. They operate the UK Protected Persons Service, which includes witness protection. Gangmasters and Labour Abuse Authority - Human trafficking, slavery, economic, and serious organised crime. Domestic intelligence Security Service/MI5 – Domestic counter terrorism and counter espionage intelligence gathering and analysis. Office for Security and Counter-Terrorism (OSCT) – Counter terrorism and protecting critical national infrastructure. National Domestic Extremism and Disorder Intelligence Unit (NDEDIU) – Domestic counter extremism and public disorder intelligence gathering and analysis. National Ballistics Intelligence Service (NBIS) – Illegal firearms intelligence analysis. National Fraud Intelligence Bureau (NFIB) – Economic crime intelligence gathering and analysis. Foreign intelligence Secret Intelligence Service (SIS)/MI6 – Foreign intelligence gathering and analysis. Defence Intelligence (DI) – Military intelligence analysis. Signals intelligence Government Communications Headquarters (GCHQ) – Signals intelligence gathering and analysis. United States Office of the Director of National Intelligence Independent agencies Central Intelligence Agency (CIA) United States Department of Defense Defense Intelligence Agency (DIA) National Security Agency (NSA) National Geospatial-Intelligence Agency (NGA) National Reconnaissance Office (NRO) Army Intelligence Marine Corps Intelligence Navy Intelligence Air Force Intelligence, Surveillance, and Reconnaissance Enterprise (USAF ISR) Space Force Intelligence, Surveillance, and Reconnaissance Enterprise (USSF ISR) United States Department of Energy Office of Intelligence and Counterintelligence (OICI) United States Department of Homeland Security Office of Intelligence and Analysis (I&A) Coast Guard Intelligence (CGI) United States Department of Justice Federal Bureau of Investigation (FBI) Office of National Security Intelligence (ONSI) United States Department of State Bureau of Intelligence and Research (INR) United States Department of the Treasury Office of Terrorism and Financial Intelligence (TFI) Uruguay Servicio de Inteligencia y Contraespionaje del Estado – State Intelligence and Counterespionage Service Uzbekistan Davlat Xavfsizlik Xizmati, Служба государственной безопасности (СГБ) (State Security Service) Venezuela Servicio Bolivariano de Inteligencia (SEBIN) – Bolivarian Intelligence Service Dirección General de Contrainteligencia Militar (DGCIM) – Military Intelligence General Counterintelligence Office Vietnam Ministry of Defence (Vietnam) Tổng cục Tình báo Quân đội (Tổng cục 2, or TC2) (General Department of Military Intelligence or Second General Department) Zambia Zambia Security Intelligence Service (ZSIS) Zimbabwe Central Intelligence Organisation (CIO) See also List of defunct intelligence agencies List of fictional secret police and intelligence organizations List of intelligence gathering disciplines List of law enforcement agencies List of protective service agencies List of secret police organizations List of counterintelligence organizations References External links World Intelligence and Security Agencies, FAS Map: security services, Europe and the world Lists by country
[ 0.6822121739387512, 0.48864245414733887, -0.5456550121307373, 0.35064753890037537, -0.19309672713279724, 0.21044649183750153, 0.44798925518989563, 0.6882758140563965, -0.8339495062828064, -0.05397781357169151, -0.6785748600959778, 0.13861550390720367, -0.27606210112571716, 0.48641455173492...
15285
https://en.wikipedia.org/wiki/Internet%20Engineering%20Task%20Force
Internet Engineering Task Force
The Internet Engineering Task Force (IETF) is an open standards organization, which develops and promotes voluntary Internet standards, in particular the technical standards that comprise the Internet protocol suite (TCP/IP). It has no formal membership roster or membership requirements. All participants and managers are volunteers, though their work is usually funded by their employers or sponsors. The IETF started out as an activity supported by the federal government of the United States, but since 1993 it has operated as a standards-development function under the auspices of the Internet Society, an international membership-based non-profit organization. Organization The IETF is organized into a large number of working groups and birds of a feather informal discussion groups, each dealing with a specific topic. The IETF operates in a bottom-up task creation mode, largely driven by these working groups. Each working group has an appointed chairperson (or sometimes several co-chairs); a charter that describes its focus; and what it is expected to produce, and when. It is open to all who want to participate and holds discussions on an open mailing list or at IETF meetings, where the entry fee in July 2014 was US$650 per person. As of mid-2018 the fees are: early bird $700, late payment $875, student $150 and a one-day pass for $375. Rough consensus is the primary basis for decision making. There are no formal voting procedures. Because the majority of the IETF's work is done via mailing lists, meeting attendance is not required for contributors. Each working group is intended to complete work on its topic and then disband. In some cases, the working group will instead have its charter updated to take on new tasks as appropriate. The working groups are organized into areas by subject matter. Current areas are Applications, General, Internet, Operations and Management, Real-time Applications and Infrastructure, Routing, Security, and Transport. Each area is overseen by an area director (AD), with most areas having two co-ADs. The ADs are responsible for appointing working group chairs. The area directors, together with the IETF Chair, form the Internet Engineering Steering Group (IESG), which is responsible for the overall operation of the IETF. The Internet Architecture Board (IAB) oversees the IETF's external relationships and relations with the RFC Editor. The IAB provides long-range technical direction for Internet development. The IAB is also jointly responsible for the IETF Administrative Oversight Committee (IAOC), which oversees the IETF Administrative Support Activity (IASA), which provides logistical, etc. support for the IETF. The IAB also manages the Internet Research Task Force (IRTF), with which the IETF has a number of cross-group relations. A Nominating Committee (NomCom) of ten randomly chosen volunteers who participate regularly at meetings is vested with the power to appoint, reappoint, and remove members of the IESG, IAB, IASA, and the IAOC. To date, no one has been removed by a NomCom, although several people have resigned their positions, requiring replacements. In 1993 the IETF changed from an activity supported by the US Federal Government to an independent, international activity associated with the Internet Society, an international membership-based non-profit organization. Because the IETF itself does not have members, nor is it an organization per se, the Internet Society provides the financial and legal framework for the activities of the IETF and its sister bodies (IAB, IRTF). IETF activities are funded by meeting fees, meeting sponsors and by the Internet Society via its organizational membership and the proceeds of the Public Interest Registry. In December 2005 the IETF Trust was established to manage the copyrighted materials produced by the IETF. Steering group The Internet Engineering Steering Group (IESG) is a body composed of the Internet Engineering Task Force (IETF) chair and area directors. It provides the final technical review of Internet standards and is responsible for day-to-day management of the IETF. It receives appeals of the decisions of the working groups, and the IESG makes the decision to progress documents in the standards track. The chair of the IESG is the director of the General Area, who also serves as the overall IETF Chair. Members of the IESG include the two directors of each of the following areas: Applications Area (app) Internet Area (int) Operations & Network Management Area (ops) Routing Area (rtg) Real-time Applications and Infrastructure Area (rai) Security Area (sec) Transport and Services Area (tsv) – frequently also referred to as the "Transport Area" Liaison and ex officio members include: IETF Executive Director IAB Chair Appointed Liaison from the IAB Liaison from the Internet Assigned Numbers Authority (IANA) Liaison from the Request for Comments (RFC) Editor Early leadership and administrative history The Gateway Algorithms and Data Structures (GADS) Task Force was the precursor to the IETF. Its chairman was David L. Mills of the University of Delaware. In January of 1986, the Internet Activities Board (IAB; now called the Internet Architecture Board) decided to divide GADS into two entities: an Internet Architecture (INARC) Task Force chaired by Mills to pursue research goals, and the IETF to handle nearer-term engineering and technology transfer issues. The first IETF chair was Mike Corrigan, who was then the technical program manager for the Defense Data Network (DDN). Also in 1986, after leaving DARPA, Robert E. Kahn founded the Corporation for National Research Initiatives (CNRI), which began providing administrative support to the IETF. In 1987, Corrigan was succeeded as IETF chair by Phill Gross. Effective March 1, 1989, but providing support dating back to late 1988, CNRI and NSF entered into a Cooperative Agreement No. NCR-8820945, wherein CNRI agreed to create and provide a "secretariat" for the "overall coordination, management and support of the work of the IAB, its various task forces and, particularly, the IETF." In 1992, CNRI supported the formation and early funding of the Internet Society, which took on the IETF as a fiscally sponsored project, along with the IAB, the IRTF, and the organization of annual INET meetings. Phill Gross continued to serve as IETF chair throughout this transition. Cerf, Kahn, and Lyman Chapin announced the formation of ISOC as "a professional society to facilitate, support, and promote the evolution and growth of the Internet as a global research communications infrastructure". At the first board meeting of the Internet Society, Vint Cerf, representing CNRI, offered, "In the event a deficit occurs, CNRI has agreed to contribute up to USD102000 to offset it." In 1993, Cerf continued to support the formation of ISOC while working for CNRI, and the role of ISOC in "the official procedures for creating and documenting Internet Standards" was codified in the IETF's . In 1995, IETF's describes ISOC's role in the IETF as being purely administrative, and ISOC as having "no influence whatsoever on the Internet Standards process, the Internet Standards or their technical content". In 1998, CNRI established Foretec Seminars, Inc. (Foretec), a for-profit subsidiary to take over providing Secretariat services to the IETF. Foretec provided these services until at least 2004. By 2013, Foretec was dissolved. In 2003, IETF's described IETFs role in appointing 3 board members to the ISOC's Board of Directors. In 2018, ISOC established The IETF Administration LLC, a separate LLC to handle the administration of the IETF. In 2019, the LLC issued a call for proposals to provide secretariat services to the IETF. Meetings The first IETF meeting was attended by 21 US Federal Government-funded researchers on 16 January 1986. It was a continuation of the work of the earlier GADS Task Force. Representatives from non-governmental entities (such as gateway vendors) were invited to attend starting with the fourth IETF meeting in October 1986. Since that time all IETF meetings have been open to the public. Initially, the IETF met quarterly, but from 1991, it has been meeting three times a year. The initial meetings were very small, with fewer than 35 people in attendance at each of the first five meetings. The maximum attendance during the first 13 meetings was only 120 attendees. This occurred at the 12th meeting held during January 1989. These meetings have grown in both participation and scope a great deal since the early 1990s; it had a maximum attendance of 2,810 at the December 2000 IETF held in San Diego, California. Attendance declined with industry restructuring during the early 2000s, and is currently around 1,200. The location for IETF meetings vary greatly. A list of past and future meeting locations can be found on the IETF meetings page. The IETF strives to hold its meetings near where most of the IETF volunteers are located. For many years, the goal was three meetings a year, with two in North America and one in either Europe or Asia, alternating between them every other year. The current goal is to hold three meetings in North America, two in Europe and one in Asia during a two-year period. However, corporate sponsorship of the meetings is also an important factor and the schedule has been modified from time to time in order to decrease operational costs. The IETF also organizes hackathons during the IETF meetings. The focus is on implementing code that will improve standards in terms of quality and interoperability. Operations The details of IETF operations have changed considerably as the organization has grown, but the basic mechanism remains publication of proposed specifications, development based on the proposals, review and independent testing by participants, and republication as a revised proposal, a draft proposal, or eventually as an Internet Standard. IETF standards are developed in an open, all-inclusive process in which any interested individual can participate. All IETF documents are freely available over the Internet and can be reproduced at will. Multiple, working, useful, interoperable implementations are the chief requirement before an IETF proposed specification can become a standard. Most specifications are focused on single protocols rather than tightly interlocked systems. This has allowed the protocols to be used in many different systems, and its standards are routinely re-used by bodies which create full-fledged architectures (e.g. 3GPP IMS). Because it relies on volunteers and uses "rough consensus and running code" as its touchstone, results can be slow whenever the number of volunteers is either too small to make progress, or so large as to make consensus difficult, or when volunteers lack the necessary expertise. For protocols like SMTP, which is used to transport e-mail for a user community in the many hundreds of millions, there is also considerable resistance to any change that is not fully backward compatible, except for IPv6. Work within the IETF on ways to improve the speed of the standards-making process is ongoing but, because the number of volunteers with opinions on it is very great, consensus on improvements has been slow to develop. The IETF cooperates with the W3C, ISO/IEC, ITU, and other standards bodies. Statistics are available that show who the top contributors by RFC publication are. While the IETF only allows for participation by individuals, and not by corporations or governments, sponsorship information is available from these statistics. Chairs The IETF Chairperson is selected by the Nominating Committee (NomCom) process for a 2-year renewable term. Before 1993, the IETF Chair was selected by the IAB. A list of the past and current Chairs of the IETF follows: Mike Corrigan (1986) Phill Gross (1986–1994) Paul Mockapetris (1994–1996) Fred Baker (1996–2001) Harald Tveit Alvestrand (2001–2005) Brian Carpenter (2005–2007) Russ Housley (2007–2013) Jari Arkko (2013–2017) Alissa Cooper (2017–2021) Lars Eggert (2021- ) Topics of interest The IETF works on a broad range of networking technologies which provide foundation for the Internet's growth and evolution. Automated network management It aims to improve the efficiency in management of networks as they grow in size and complexity. The IETF is also standardizing protocols for autonomic networking that enables networks to be self managing. Internet of things It is a network of physical objects or things that are embedded with electronics, sensors, software and also enables objects to exchange data with operator, manufacturer and other connected devices. Several IETF working groups are developing protocols that are directly relevant to IoT. New transport technology Its development provides the ability of internet applications to send data over the Internet. There are some well-established transport protocols such as TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) which are continuously getting extended and refined to meet the needs of the global Internet. IETF areas It divides its work into a number of areas that have Working groups that have a relation to an area's focus. Area Directors handle the primary task of area management. Area Directors may be advised by one or more Directorates. The area structure is defined by the Internet Engineering Steering Group. The Nominations Committee can be used to add new members. Token Binding Protocol In October 2018, Microsoft and Google engineers introduced a plan to create the Token Binding Protocol in order to stop replay attacks on OAuth tokens. See also Internet governance References External links Steering group IETF Online Proceedings Early IETF Proceedings (note: large pdf files, one for each volume) Past Meetings of the IETF Past IESG Members and IETF Chairs The Tao of the IETF: details on how IETF is organized Internet properties established in 1986 Organizations established in 1986 Internet governance organizations Internet Standard organizations Internet-related organizations History of the Internet Task forces 1986 establishments in the United States
[ 0.525098443031311, 0.3503803014755249, 0.10309617221355438, 0.31268271803855896, -0.1076168343424797, -0.6294757127761841, -0.25440987944602966, 0.20734138786792755, -0.2381274551153183, -0.6697606444358826, -0.4602232873439789, 0.36433711647987366, -0.11019250750541687, -0.218647927045822...
15286
https://en.wikipedia.org/wiki/ISM%20radio%20band
ISM radio band
The ISM radio bands are portions of the radio spectrum reserved internationally for industrial, scientific and medical (ISM) purposes, excluding applications in telecommunications. Examples of applications for the use of radio frequency (RF) energy in these bands include radio-frequency process heating, microwave ovens, and medical diathermy machines. The powerful emissions of these devices can create electromagnetic interference and disrupt radio communication using the same frequency, so these devices are limited to certain bands of frequencies. In general, communications equipment operating in ISM bands must tolerate any interference generated by ISM applications, and users have no regulatory protection from ISM device operation in these bands. Despite the intent of the original allocations, in recent years the fastest-growing use of these bands has been for short-range, low power wireless communications systems, since these bands are often approved for such devices, which can be used without a government license, as would otherwise be required for transmitters; ISM frequencies are often chosen for this purpose as they already must tolerate interference issues. Cordless phones, Bluetooth devices, near field communication (NFC) devices, garage door openers, baby monitors and wireless computer networks (Wi-Fi) may all use the ISM frequencies, although these low power transmitters are not considered to be ISM devices. Definition The ISM bands are defined by the ITU Radio Regulations (article 5) in footnotes 5.138, 5.150, and 5.280 of the Radio Regulations. Individual countries' use of the bands designated in these sections may differ due to variations in national radio regulations. Because communication devices using the ISM bands must tolerate any interference from ISM equipment, unlicensed operations are typically permitted to use these bands, since unlicensed operation typically needs to be tolerant of interference from other devices anyway. The ISM bands share allocations with unlicensed and licensed operations; however, due to the high likelihood of harmful interference, licensed use of the bands is typically low. In the United States, uses of the ISM bands are governed by Part 18 of the Federal Communications Commission (FCC) rules, while Part 15 contains the rules for unlicensed communication devices, even those that share ISM frequencies. In Europe, the ETSI is responsible for regulating the use of Short Range Devices, some of which operate in ISM bands. Frequency allocations The allocation of radio frequencies is provided according to Article 5 of the ITU Radio Regulations (edition 2012). In order to improve harmonisation in spectrum utilisation, the majority of service-allocations stipulated in this document were incorporated in national Tables of Frequency Allocations and Utilisations which is within the responsibility of the appropriate national administration. The allocation might be primary, secondary, exclusive, and shared. primary allocation: is indicated by writing in capital letters (see example below) secondary allocation: is indicated by small letters exclusive or shared utilization: is within the responsibility of administrations ITU frequency allocations Type A (footnote 5.138) = frequency bands are designated for ISM applications. The use of these frequency bands for ISM applications shall be subject to special authorization by the administration concerned, in agreement with other administrations whose radiocommunication services might be affected. In applying this provision, administrations shall have due regard to the latest relevant ITU-R Recommendations. Type B (footnote 5.150) = frequency bands are also designated for ISM applications. Radiocommunication services operating within these bands must accept harmful interference which may be caused by these applications. ITU RR, (Footnote 5.280) = In Germany, Austria, Bosnia and Herzegovina, Croatia, Macedonia, Liechtenstein, Montenegro, Portugal, Serbia, Slovenia and Switzerland, the band 433.05-434.79 MHz (center frequency 433.92 MHz) is designated for ISM applications. Radio communication services of these countries operating within this band must accept harmful interference which may be caused by these applications. Footnote AU = Australia is part of ITU Region 3. The band 433.05 to 434.79 MHz is not a designated ISM band in Australia, however the operation of low powered devices in the radio frequency band 433.05 to 434.79 MHz is supported through Radio communications class licence for low interference potential devices (LIPDs). History The ISM bands were first established at the International Telecommunications Conference of the ITU in Atlantic City, 1947. The American delegation specifically proposed several bands, including the now commonplace 2.4 GHz band, to accommodate the then nascent process of microwave heating; however, FCC annual reports of that time suggest that much preparation was done ahead of these presentations. The report of the August 9th 1947 meeting of the Allocation of Frequencies committee includes the remark: "The delegate of the United States, referring to his request that the frequency 2450 Mc/s be allocated for I.S.M., indicated that there was in existence in the United States, and working on this frequency a diathermy machine and an electronic cooker, and that the latter might eventually be installed in transatlantic ships and airplanes. There was therefore some point in attempting to reach world agreement on this subject." Radio frequencies in the ISM bands have been used for communication purposes, although such devices may experience interference from non-communication sources. In the United States, as early as 1958 Class D Citizens Band, a Part 95 service, was allocated to frequencies that are also allocated to ISM. [1] In the U.S., the FCC first made unlicensed spread spectrum available in the ISM bands in rules adopted on May 9, 1985. Many other countries later developed similar regulations, enabling use of this technology. The FCC action was proposed by Michael Marcus of the FCC staff in 1980 and the subsequent regulatory action took five more years. It was part of a broader proposal to allow civil use of spread spectrum technology and was opposed at the time by mainstream equipment manufacturers and many radio system operators. Applications Industrial, scientific and medical (ISM) applications (of radio frequency energy) (short: ISM applications) are – according to article 1.15 of the International Telecommunication Union´s (ITU) ITU Radio Regulations (RR) – defined as «Operation of equipment or appliances designed to generate and use locally radio frequency energy for industrial, scientific, medical, domestic or similar purposes, excluding applications in the field of telecommunications.» The original ISM specifications envisioned that the bands would be used primarily for noncommunication purposes, such as heating. The bands are still widely used for these purposes. For many people, the most commonly encountered ISM device is the home microwave oven operating at 2.45 GHz which uses microwaves to cook food. Industrial heating is another big application area; such as induction heating, microwave heat treating, plastic softening, and plastic welding processes. In medical settings, shortwave and microwave diathermy machines use radio waves in the ISM bands to apply deep heating to the body for relaxation and healing. More recently hyperthermia therapy uses microwaves to heat tissue to kill cancer cells. However, as detailed below, the increasing congestion of the radio spectrum, the increasing sophistication of microelectronics, and the attraction of unlicensed use, has in recent decades led to an explosion of uses of these bands for short range communication systems for wireless devices, which are now by far the largest uses of these bands. These are sometimes called "non ISM" uses since they do not fall under the originally envisioned "industrial", "scientific", and "medical" application areas. One of the largest applications has been wireless networking (Wi-Fi). The IEEE 802.11 wireless networking protocols, the standards on which almost all wireless systems are based, use the ISM bands. Virtually all laptops, tablet computers, computer printers and cellphones now have 802.11 wireless modems using the 2.4 and 5.7 GHz ISM bands. Bluetooth is another networking technology using the 2.4 GHz band, which can be problematic given the probability of interference. Near field communication devices such as proximity cards and contactless smart cards use the lower frequency 13 and 27 MHz ISM bands. Other short range devices using the ISM bands are: wireless microphones, baby monitors, garage door openers, wireless doorbells, keyless entry systems for vehicles, radio control channels for UAVs (drones), wireless surveillance systems, RFID systems for merchandise, and wild animal tracking systems. Some electrodeless lamp designs are ISM devices, which use RF emissions to excite fluorescent tubes. Sulfur lamps are commercially available plasma lamps, which use a 2.45 GHz magnetron to heat sulfur into a brightly glowing plasma. Long-distance wireless power systems have been proposed and experimented with which would use high-power transmitters and rectennas, in lieu of overhead transmission lines and underground cables, to send power to remote locations. NASA has studied using microwave power transmission on 2.45 GHz to send energy collected by solar power satellites back to the ground. Also in space applications, a Helicon Double Layer ion thruster is a prototype spacecraft propulsion engine which uses a 13.56 MHz transmission to break down and heat gas into plasma. Common non-ISM uses In recent years ISM bands have also been shared with (non-ISM) license-free error-tolerant communications applications such as wireless sensor networks in the 915 MHz and 2.450 GHz bands, as well as wireless LANs and cordless phones in the 915 MHz, 2.450 GHz, and 5.800 GHz bands. Because unlicensed devices are required to be tolerant of ISM emissions in these bands, unlicensed low power users are generally able to operate in these bands without causing problems for ISM users. ISM equipment does not necessarily include a radio receiver in the ISM band (e.g. a microwave oven does not have a receiver). In the United States, according to 47 CFR Part 15.5, low power communication devices must accept interference from licensed users of that frequency band, and the Part 15 device must not cause interference to licensed users. Note that the 915 MHz band should not be used in countries outside Region 2, except those that specifically allow it, such as Australia and Israel, especially those that use the GSM-900 band for cellphones. The ISM bands are also widely used for Radio-frequency identification (RFID) applications with the most commonly used band being the 13.56 MHz band used by systems compliant with ISO/IEC 14443 including those used by biometric passports and contactless smart cards. In Europe, the use of the ISM band is covered by Short Range Device regulations issued by European Commission, based on technical recommendations by CEPT and standards by ETSI. In most of Europe, LPD433 band is allowed for license-free voice communication in addition to PMR446. Wireless network devices use wavebands as follows: IEEE 802.11/Wi-Fi 2450 MHz and 5800 MHz bands Bluetooth 2450 MHz band falls under WPAN IEEE 802.15.4, ZigBee and other personal area networks may use the and ISM bands because of frequency sharing between different allocations. Wireless LANs and cordless phones can also use bands other than those shared with ISM, but such uses require approval on a country by country basis. DECT phones use allocated spectrum outside the ISM bands that differs in Europe and North America. Ultra-wideband LANs require more spectrum than the ISM bands can provide, so the relevant standards such as IEEE 802.15.4a are designed to make use of spectrum outside the ISM bands. Despite the fact that these additional bands are outside the official ITU-R ISM bands, because they are used for the same types of low power personal communications, they are sometimes incorrectly referred to as ISM bands as well. Several brands of radio control equipment use the band range for low power remote control of toys, from gas powered cars to miniature aircraft. Worldwide Digital Cordless Telecommunications or WDCT is a technology that uses the radio spectrum. Google's Project Loon used ISM bands (specifically 2.4 and 5.8 GHz bands) for balloon-to-balloon and balloon-to-ground communications. Pursuant to 47 CFR Part 97 some ISM bands are used by licensed amateur radio operators for communication - including amateur television. See also Frequency allocation Fixed wireless LPD433 Electromagnetic interference at 2.4 GHz Notes References External links Cordless phone frequencies ITU page on definitions of ISM bands ITU page on Radio Regulations European Radiocommunications Office frequency information system In the US, CFR 07/47cfr18 07.html Title 47 Part 18 describes the regulation of the ISM bands. contains some of the regulations for wireless LAN devices operating in three of the low power communication, Part 15, bands. Bandplans Radio regulations
[ 0.37715932726860046, 0.0947207659482956, 0.11029276251792908, 0.17398600280284882, 0.03232613205909729, -0.5816389322280884, 0.07604755461215973, 0.06160881742835045, 0.031176909804344177, -0.3892306685447693, -0.4527452886104584, 0.8571577072143555, -0.4508008062839508, 0.091090127825737,...
15287
https://en.wikipedia.org/wiki/Series%20%28mathematics%29
Series (mathematics)
In mathematics, a series is, roughly speaking, a description of the operation of adding infinitely many quantities, one after the other, to a given starting quantity. The study of series is a major part of calculus and its generalization, mathematical analysis. Series are used in most areas of mathematics, even for studying finite structures (such as in combinatorics) through generating functions. In addition to their ubiquity in mathematics, infinite series are also widely used in other quantitative disciplines such as physics, computer science, statistics and finance. For a long time, the idea that such a potentially infinite summation could produce a finite result was considered paradoxical. This paradox was resolved using the concept of a limit during the 17th century. Zeno's paradox of Achilles and the tortoise illustrates this counterintuitive property of infinite sums: Achilles runs after a tortoise, but when he reaches the position of the tortoise at the beginning of the race, the tortoise has reached a second position; when he reaches this second position, the tortoise is at a third position, and so on. Zeno concluded that Achilles could never reach the tortoise, and thus that movement does not exist. Zeno divided the race into infinitely many sub-races, each requiring a finite amount of time, so that the total time for Achilles to catch the tortoise is given by a series. The resolution of the paradox is that, although the series has an infinite number of terms, it has a finite sum, which gives the time necessary for Achilles to catch up with the tortoise. In modern terminology, any (ordered) infinite sequence of terms (that is, numbers, functions, or anything that can be added) defines a series, which is the operation of adding the one after the other. To emphasize that there are an infinite number of terms, a series may be called an infinite series. Such a series is represented (or denoted) by an expression like or, using the summation sign, The infinite sequence of additions implied by a series cannot be effectively carried on (at least in a finite amount of time). However, if the set to which the terms and their finite sums belong has a notion of limit, it is sometimes possible to assign a value to a series, called the sum of the series. This value is the limit as tends to infinity (if the limit exists) of the finite sums of the first terms of the series, which are called the th partial sums of the series. That is, When this limit exists, one says that the series is convergent or summable, or that the sequence is summable. In this case, the limit is called the sum of the series. Otherwise, the series is said to be divergent. The notation denotes both the series—that is the implicit process of adding the terms one after the other indefinitely—and, if the series is convergent, the sum of the series—the result of the process. This is a generalization of the similar convention of denoting by both the addition—the process of adding—and its result—the sum of and . Generally, the terms of a series come from a ring, often the field of the real numbers or the field of the complex numbers. In this case, the set of all series is itself a ring (and even an associative algebra), in which the addition consists of adding the series term by term, and the multiplication is the Cauchy product. Basic properties An infinite series or simply a series is an infinite sum, represented by an infinite expression of the form where is any ordered sequence of terms, such as numbers, functions, or anything else that can be added (an abelian group). This is an expression that is obtained from the list of terms by laying them side by side, and conjoining them with the symbol "+". A series may also be represented by using summation notation, such as If an abelian group of terms has a concept of limit (e.g., if it is a metric space), then some series, the convergent series, can be interpreted as having a value in , called the sum of the series. This includes the common cases from calculus, in which the group is the field of real numbers or the field of complex numbers. Given a series , its th partial sum is By definition, the series converges to the limit (or simply sums to ), if the sequence of its partial sums has a limit . In this case, one usually writes A series is said to be convergent if it converges to some limit, or divergent when it does not. The value of this limit, if it exists, is then the value of the series. Convergent series A series is said to converge or to be convergent when the sequence of partial sums has a finite limit. If the limit of is infinite or does not exist, the series is said to diverge. When the limit of partial sums exists, it is called the value (or sum) of the series An easy way that an infinite series can converge is if all the are zero for sufficiently large. Such a series can be identified with a finite sum, so it is only infinite in a trivial sense. Working out the properties of the series that converge, even if infinitely many terms are nonzero, is the essence of the study of series. Consider the example It is possible to "visualize" its convergence on the real number line: we can imagine a line of length 2, with successive segments marked off of lengths 1, 1/2, 1/4, etc. There is always room to mark the next segment, because the amount of line remaining is always the same as the last segment marked: When we have marked off 1/2, we still have a piece of length 1/2 unmarked, so we can certainly mark the next 1/4. This argument does not prove that the sum is equal to 2 (although it is), but it does prove that it is at most 2. In other words, the series has an upper bound. Given that the series converges, proving that it is equal to 2 requires only elementary algebra. If the series is denoted , it can be seen that Therefore, The idiom can be extended to other, equivalent notions of series. For instance, a recurring decimal, as in encodes the series Since these series always converge to real numbers (because of what is called the completeness property of the real numbers), to talk about the series in this way is the same as to talk about the numbers for which they stand. In particular, the decimal expansion 0.111... can be identified with 1/9. This leads to an argument that , which only relies on the fact that the limit laws for series preserve the arithmetic operations; for more detail on this argument, see 0.999.... Examples of numerical series A geometric series is one where each successive term is produced by multiplying the previous term by a constant number (called the common ratio in this context). For example: In general, the geometric series converges if and only if , in which case it converges to . The harmonic series is the series The harmonic series is divergent. An alternating series is a series where terms alternate signs. Examples: (alternating harmonic series) and A telescoping series converges if the sequence bn converges to a limit L—as n goes to infinity. The value of the series is then b1 − L. An arithmetico-geometric series is a generalization of the geometric series, which has coefficients of the common ratio equal to the terms in an arithmetic sequence. Example: The p-series converges if p > 1 and diverges for p ≤ 1, which can be shown with the integral criterion described below in convergence tests. As a function of p, the sum of this series is Riemann's zeta function. Hypergeometric series: and their generalizations (such as basic hypergeometric series and elliptic hypergeometric series) frequently appear in integrable systems and mathematical physics. There are some elementary series whose convergence is not yet known/proven. For example, it is unknown whether the Flint Hills series converges or not. The convergence depends on how well can be approximated with rational numbers (which is unknown as of yet). More specifically, the values of n with large numerical contributions to the sum are the numerators of the continued fraction convergents of , a sequence beginning with 1, 3, 22, 333, 355, 103993, ... . These are integers that are close to for some integer n, so that is close to 0 and its reciprocal is large. Alekseyev (2011) proved that if the series converges, then the irrationality measure of is smaller than 2.5, which is much smaller than the current known bound of 7.10320533.... π Natural logarithm of 2 Natural logarithm base e Calculus and partial summation as an operation on sequences Partial summation takes as input a sequence, (an), and gives as output another sequence, (SN). It is thus a unary operation on sequences. Further, this function is linear, and thus is a linear operator on the vector space of sequences, denoted Σ. The inverse operator is the finite difference operator, denoted Δ. These behave as discrete analogues of integration and differentiation, only for series (functions of a natural number) instead of functions of a real variable. For example, the sequence (1, 1, 1, ...) has series (1, 2, 3, 4, ...) as its partial summation, which is analogous to the fact that In computer science, it is known as prefix sum. Properties of series Series are classified not only by whether they converge or diverge, but also by the properties of the terms an (absolute or conditional convergence); type of convergence of the series (pointwise, uniform); the class of the term an (whether it is a real number, arithmetic progression, trigonometric function); etc. Non-negative terms When an is a non-negative real number for every n, the sequence SN of partial sums is non-decreasing. It follows that a series Σan with non-negative terms converges if and only if the sequence SN of partial sums is bounded. For example, the series is convergent, because the inequality and a telescopic sum argument implies that the partial sums are bounded by 2. The exact value of the original series is the Basel problem. Absolute convergence A series converges absolutely if the series of absolute values converges. This is sufficient to guarantee not only that the original series converges to a limit, but also that any reordering of it converges to the same limit. Conditional convergence A series of real or complex numbers is said to be conditionally convergent (or semi-convergent) if it is convergent but not absolutely convergent. A famous example is the alternating series which is convergent (and its sum is equal to ), but the series formed by taking the absolute value of each term is the divergent harmonic series. The Riemann series theorem says that any conditionally convergent series can be reordered to make a divergent series, and moreover, if the are real and is any real number, that one can find a reordering so that the reordered series converges with sum equal to . Abel's test is an important tool for handling semi-convergent series. If a series has the form where the partial sums are bounded, has bounded variation, and exists: then the series is convergent. This applies to the point-wise convergence of many trigonometric series, as in with . Abel's method consists in writing , and in performing a transformation similar to integration by parts (called summation by parts), that relates the given series to the absolutely convergent series Evaluation of truncation errors The evaluation of truncation errors is an important procedure in numerical analysis (especially validated numerics and computer-assisted proof). Alternating series When conditions of the alternating series test are satisfied by , there is an exact error evaluation. Set to be the partial sum of the given alternating series . Then the next inequality holds: Taylor series Taylor's theorem is a statement that includes the evaluation of the error term when the Taylor series is truncated. Hypergeometric series By using the ratio, we can obtain the evaluation of the error term when the hypergeometric series is truncated. Matrix exponential For the matrix exponential: the following error evaluation holds (scaling and squaring method): Convergence tests There exist many tests that can be used to determine whether particular series converge or diverge. n-th term test: If , then the series diverges; if , then the test is inconclusive. Comparison test 1 (see Direct comparison test): If is an absolutely convergent series such that for some number and for sufficiently large , then converges absolutely as well. If diverges, and for all sufficiently large , then also fails to converge absolutely (though it could still be conditionally convergent, for example, if the alternate in sign). Comparison test 2 (see Limit comparison test): If is an absolutely convergent series such that for sufficiently large , then converges absolutely as well. If diverges, and for all sufficiently large , then also fails to converge absolutely (though it could still be conditionally convergent, for example, if the alternate in sign). Ratio test: If there exists a constant such that for all sufficiently large , then converges absolutely. When the ratio is less than , but not less than a constant less than , convergence is possible but this test does not establish it. Root test: If there exists a constant such that for all sufficiently large , then converges absolutely. Integral test: if is a positive monotone decreasing function defined on the interval with for all , then converges if and only if the integral is finite. Cauchy's condensation test: If is non-negative and non-increasing, then the two series and are of the same nature: both convergent, or both divergent. Alternating series test: A series of the form (with ) is called alternating. Such a series converges if the sequence is monotone decreasing and converges to . The converse is in general not true. For some specific types of series there are more specialized convergence tests, for instance for Fourier series there is the Dini test. Series of functions A series of real- or complex-valued functions converges pointwise on a set E, if the series converges for each x in E as an ordinary series of real or complex numbers. Equivalently, the partial sums converge to ƒ(x) as N → ∞ for each x ∈ E. A stronger notion of convergence of a series of functions is the uniform convergence. A series converges uniformly if it converges pointwise to the function ƒ(x), and the error in approximating the limit by the Nth partial sum, can be made minimal independently of x by choosing a sufficiently large N. Uniform convergence is desirable for a series because many properties of the terms of the series are then retained by the limit. For example, if a series of continuous functions converges uniformly, then the limit function is also continuous. Similarly, if the ƒn are integrable on a closed and bounded interval I and converge uniformly, then the series is also integrable on I and can be integrated term-by-term. Tests for uniform convergence include the Weierstrass' M-test, Abel's uniform convergence test, Dini's test, and the Cauchy criterion. More sophisticated types of convergence of a series of functions can also be defined. In measure theory, for instance, a series of functions converges almost everywhere if it converges pointwise except on a certain set of measure zero. Other modes of convergence depend on a different metric space structure on the space of functions under consideration. For instance, a series of functions converges in mean on a set E to a limit function ƒ provided as N → ∞. Power series A power series is a series of the form The Taylor series at a point c of a function is a power series that, in many cases, converges to the function in a neighborhood of c. For example, the series is the Taylor series of at the origin and converges to it for every x. Unless it converges only at x=c, such a series converges on a certain open disc of convergence centered at the point c in the complex plane, and may also converge at some of the points of the boundary of the disc. The radius of this disc is known as the radius of convergence, and can in principle be determined from the asymptotics of the coefficients an. The convergence is uniform on closed and bounded (that is, compact) subsets of the interior of the disc of convergence: to wit, it is uniformly convergent on compact sets. Historically, mathematicians such as Leonhard Euler operated liberally with infinite series, even if they were not convergent. When calculus was put on a sound and correct foundation in the nineteenth century, rigorous proofs of the convergence of series were always required. Formal power series While many uses of power series refer to their sums, it is also possible to treat power series as formal sums, meaning that no addition operations are actually performed, and the symbol "+" is an abstract symbol of conjunction which is not necessarily interpreted as corresponding to addition. In this setting, the sequence of coefficients itself is of interest, rather than the convergence of the series. Formal power series are used in combinatorics to describe and study sequences that are otherwise difficult to handle, for example, using the method of generating functions. The Hilbert–Poincaré series is a formal power series used to study graded algebras. Even if the limit of the power series is not considered, if the terms support appropriate structure then it is possible to define operations such as addition, multiplication, derivative, antiderivative for power series "formally", treating the symbol "+" as if it corresponded to addition. In the most common setting, the terms come from a commutative ring, so that the formal power series can be added term-by-term and multiplied via the Cauchy product. In this case the algebra of formal power series is the total algebra of the monoid of natural numbers over the underlying term ring. If the underlying term ring is a differential algebra, then the algebra of formal power series is also a differential algebra, with differentiation performed term-by-term. Laurent series Laurent series generalize power series by admitting terms into the series with negative as well as positive exponents. A Laurent series is thus any series of the form If such a series converges, then in general it does so in an annulus rather than a disc, and possibly some boundary points. The series converges uniformly on compact subsets of the interior of the annulus of convergence. Dirichlet series A Dirichlet series is one of the form where s is a complex number. For example, if all an are equal to 1, then the Dirichlet series is the Riemann zeta function Like the zeta function, Dirichlet series in general play an important role in analytic number theory. Generally a Dirichlet series converges if the real part of s is greater than a number called the abscissa of convergence. In many cases, a Dirichlet series can be extended to an analytic function outside the domain of convergence by analytic continuation. For example, the Dirichlet series for the zeta function converges absolutely when Re(s) > 1, but the zeta function can be extended to a holomorphic function defined on with a simple pole at 1. This series can be directly generalized to general Dirichlet series. Trigonometric series A series of functions in which the terms are trigonometric functions is called a trigonometric series: The most important example of a trigonometric series is the Fourier series of a function. History of the theory of infinite series Development of infinite series Greek mathematician Archimedes produced the first known summation of an infinite series with a method that is still used in the area of calculus today. He used the method of exhaustion to calculate the area under the arc of a parabola with the summation of an infinite series, and gave a remarkably accurate approximation of π. Mathematicians from Kerala, India studied infinite series around 1350 CE. In the 17th century, James Gregory worked in the new decimal system on infinite series and published several Maclaurin series. In 1715, a general method for constructing the Taylor series for all functions for which they exist was provided by Brook Taylor. Leonhard Euler in the 18th century, developed the theory of hypergeometric series and q-series. Convergence criteria The investigation of the validity of infinite series is considered to begin with Gauss in the 19th century. Euler had already considered the hypergeometric series on which Gauss published a memoir in 1812. It established simpler criteria of convergence, and the questions of remainders and the range of convergence. Cauchy (1821) insisted on strict tests of convergence; he showed that if two series are convergent their product is not necessarily so, and with him begins the discovery of effective criteria. The terms convergence and divergence had been introduced long before by Gregory (1668). Leonhard Euler and Gauss had given various criteria, and Colin Maclaurin had anticipated some of Cauchy's discoveries. Cauchy advanced the theory of power series by his expansion of a complex function in such a form. Abel (1826) in his memoir on the binomial series corrected certain of Cauchy's conclusions, and gave a completely scientific summation of the series for complex values of and . He showed the necessity of considering the subject of continuity in questions of convergence. Cauchy's methods led to special rather than general criteria, and the same may be said of Raabe (1832), who made the first elaborate investigation of the subject, of De Morgan (from 1842), whose logarithmic test DuBois-Reymond (1873) and Pringsheim (1889) have shown to fail within a certain region; of Bertrand (1842), Bonnet (1843), Malmsten (1846, 1847, the latter without integration); Stokes (1847), Paucker (1852), Chebyshev (1852), and Arndt (1853). General criteria began with Kummer (1835), and have been studied by Eisenstein (1847), Weierstrass in his various contributions to the theory of functions, Dini (1867), DuBois-Reymond (1873), and many others. Pringsheim's memoirs (1889) present the most complete general theory. Uniform convergence The theory of uniform convergence was treated by Cauchy (1821), his limitations being pointed out by Abel, but the first to attack it successfully were Seidel and Stokes (1847–48). Cauchy took up the problem again (1853), acknowledging Abel's criticism, and reaching the same conclusions which Stokes had already found. Thomae used the doctrine (1866), but there was great delay in recognizing the importance of distinguishing between uniform and non-uniform convergence, in spite of the demands of the theory of functions. Semi-convergence A series is said to be semi-convergent (or conditionally convergent) if it is convergent but not absolutely convergent. Semi-convergent series were studied by Poisson (1823), who also gave a general form for the remainder of the Maclaurin formula. The most important solution of the problem is due, however, to Jacobi (1834), who attacked the question of the remainder from a different standpoint and reached a different formula. This expression was also worked out, and another one given, by Malmsten (1847). Schlömilch (Zeitschrift, Vol.I, p. 192, 1856) also improved Jacobi's remainder, and showed the relation between the remainder and Bernoulli's function Genocchi (1852) has further contributed to the theory. Among the early writers was Wronski, whose "loi suprême" (1815) was hardly recognized until Cayley (1873) brought it into prominence. Fourier series Fourier series were being investigated as the result of physical considerations at the same time that Gauss, Abel, and Cauchy were working out the theory of infinite series. Series for the expansion of sines and cosines, of multiple arcs in powers of the sine and cosine of the arc had been treated by Jacob Bernoulli (1702) and his brother Johann Bernoulli (1701) and still earlier by Vieta. Euler and Lagrange simplified the subject, as did Poinsot, Schröter, Glaisher, and Kummer. Fourier (1807) set for himself a different problem, to expand a given function of x in terms of the sines or cosines of multiples of x, a problem which he embodied in his Théorie analytique de la chaleur (1822). Euler had already given the formulas for determining the coefficients in the series; Fourier was the first to assert and attempt to prove the general theorem. Poisson (1820–23) also attacked the problem from a different standpoint. Fourier did not, however, settle the question of convergence of his series, a matter left for Cauchy (1826) to attempt and for Dirichlet (1829) to handle in a thoroughly scientific manner (see convergence of Fourier series). Dirichlet's treatment (Crelle, 1829), of trigonometric series was the subject of criticism and improvement by Riemann (1854), Heine, Lipschitz, Schläfli, and du Bois-Reymond. Among other prominent contributors to the theory of trigonometric and Fourier series were Dini, Hermite, Halphen, Krause, Byerly and Appell. Generalizations Asymptotic series Asymptotic series, otherwise asymptotic expansions, are infinite series whose partial sums become good approximations in the limit of some point of the domain. In general they do not converge, but they are useful as sequences of approximations, each of which provides a value close to the desired answer for a finite number of terms. The difference is that an asymptotic series cannot be made to produce an answer as exact as desired, the way that convergent series can. In fact, after a certain number of terms, a typical asymptotic series reaches its best approximation; if more terms are included, most such series will produce worse answers. Divergent series Under many circumstances, it is desirable to assign a limit to a series which fails to converge in the usual sense. A summability method is such an assignment of a limit to a subset of the set of divergent series which properly extends the classical notion of convergence. Summability methods include Cesàro summation, (C,k) summation, Abel summation, and Borel summation, in increasing order of generality (and hence applicable to increasingly divergent series). A variety of general results concerning possible summability methods are known. The Silverman–Toeplitz theorem characterizes matrix summability methods, which are methods for summing a divergent series by applying an infinite matrix to the vector of coefficients. The most general method for summing a divergent series is non-constructive, and concerns Banach limits. Summations over arbitrary index sets Definitions may be given for sums over an arbitrary index set There are two main differences with the usual notion of series: first, there is no specific order given on the set ; second, this set may be uncountable. The notion of convergence needs to be strengthened, because the concept of conditional convergence depends on the ordering of the index set. If is a function from an index set to a set then the "series" associated to is the formal sum of the elements over the index elements denoted by the When the index set is the natural numbers the function is a sequence denoted by A series indexed on the natural numbers is an ordered formal sum and so we rewrite as in order to emphasize the ordering induced by the natural numbers. Thus, we obtain the common notation for a series indexed by the natural numbers Families of non-negative numbers When summing a family of non-negative real numbers, define When the supremum is finite then the set of such that is countable. Indeed, for every the cardinality of the set is finite because If is countably infinite and enumerated as then the above defined sum satisfies provided the value is allowed for the sum of the series. Any sum over non-negative reals can be understood as the integral of a non-negative function with respect to the counting measure, which accounts for the many similarities between the two constructions. Abelian topological groups Let be a map, also denoted by from some non-empty set into is a Hausdorff abelian topological group Let be the collection of all finite subsets of with viewed as a directed set, ordered under inclusion with union as join. The family is said to be if the following limit, which is denoted by and is called the of exists in Saying that the sum is the limit of finite partial sums means that for every neighborhood of the origin in there exists a finite subset of such that Because is not totally ordered, this is not a limit of a sequence of partial sums, but rather of a net. For every neighborhood of the origin in there is a smaller neighborhood such that It follows that the finite partial sums of an unconditionally summable family form a , that is, for every neighborhood of the origin in there exists a finite subset of such that which implies that for every (by taking and ). When is complete, a family is unconditionally summable in if and only if the finite sums satisfy the latter Cauchy net condition. When is complete and is unconditionally summable in then for every subset the corresponding subfamily is also unconditionally summable in When the sum of a family of non-negative numbers, in the extended sense defined before, is finite, then it coincides with the sum in the topological group If a family in is unconditionally summable then for every neighborhood of the origin in there is a finite subset such that for every index not in If is a first-countable space then it follows that the set of such that is countable. This need not be true in a general abelian topological group (see examples below). Unconditionally convergent series Suppose that If a family is unconditionally summable in a Hausdorff abelian topological group then the series in the usual sense converges and has the same sum, By nature, the definition of unconditional summability is insensitive to the order of the summation. When is unconditionally summable, then the series remains convergent after any permutation of the set of indices, with the same sum, Conversely, if every permutation of a series converges, then the series is unconditionally convergent. When is complete then unconditional convergence is also equivalent to the fact that all subseries are convergent; if is a Banach space, this is equivalent to say that for every sequence of signs , the series converges in Series in topological vector spaces If is a topological vector space (TVS) and is a (possibly uncountable) family in then this family is summable if the limit of the net converges in where is the directed set of all finite subsets of directed by inclusion and It is called absolutely summable if in addition, for every continuous seminorm on the family is summable. If is a normable space and if is an absolutely summable family in then necessarily all but a countable collection of 's are zero. Hence, in normed spaces, it is usually only ever necessary to consider series with countably many terms. Summable families play an important role in the theory of nuclear spaces. Series in Banach and seminormed spaces The notion of series can be easily extended to the case of a seminormed space. If is a sequence of elements of a normed space and if then the series converges to in if the sequence of partial sums of the series converges to in ; to wit, More generally, convergence of series can be defined in any abelian Hausdorff topological group. Specifically, in this case, converges to if the sequence of partial sums converges to If is a seminormed space, then the notion of absolute convergence becomes: A series of vectors in converges absolutely if in which case all but at most countably many of the values are necessarily zero. If a countable series of vectors in a Banach space converges absolutely then it converges unconditionally, but the converse only holds in finite-dimensional Banach spaces (theorem of ). Well-ordered sums Conditionally convergent series can be considered if is a well-ordered set, for example, an ordinal number In this case, define by transfinite recursion: and for a limit ordinal if this limit exists. If all limits exist up to then the series converges. Examples Given a function into an abelian topological group define for every a function whose support is a singleton Then in the topology of pointwise convergence (that is, the sum is taken in the infinite product group ). In the definition of partitions of unity, one constructs sums of functions over arbitrary index set While, formally, this requires a notion of sums of uncountable series, by construction there are, for every given only finitely many nonzero terms in the sum, so issues regarding convergence of such sums do not arise. Actually, one usually assumes more: the family of functions is locally finite, that is, for every there is a neighborhood of in which all but a finite number of functions vanish. Any regularity property of the such as continuity, differentiability, that is preserved under finite sums will be preserved for the sum of any subcollection of this family of functions. On the first uncountable ordinal viewed as a topological space in the order topology, the constant function given by satisfies (in other words, copies of 1 is ) only if one takes a limit over all countable partial sums, rather than finite partial sums. This space is not separable. See also Continued fraction Convergence tests Convergent series Divergent series Infinite compositions of analytic functions Infinite expression Infinite product Iterated binary operation List of mathematical series Prefix sum Sequence transformation Series expansion References Bibliography Bromwich, T. J. An Introduction to the Theory of Infinite Series MacMillan & Co. 1908, revised 1926, reprinted 1939, 1942, 1949, 1955, 1959, 1965. Walter Rudin, Principles of Mathematical Analysis (McGraw-Hill: New York, 1964). External links Infinite Series Tutorial Calculus
[ 0.256676584482193, 0.17976857721805573, 0.1701381653547287, 0.19420430064201355, -0.3213381767272949, 0.2201763242483139, 0.041457388550043106, -0.3384515345096588, -0.3535248339176178, -0.3317718207836151, -0.24095676839351654, 0.16261377930641174, -0.08303742110729218, 0.6865610480308533...
15289
https://en.wikipedia.org/wiki/Interrupt
Interrupt
In digital computers, an interrupt (sometimes referred to as a trap) is a request for the processor to interrupt currently executing code (when permitted), so that the event can be processed in a timely manner. If the request is accepted, the processor will suspend its current activities, save its state, and execute a function called an interrupt handler (or an interrupt service routine, ISR) to deal with the event. This interruption is often temporary, allowing the software to resume normal activities after the interrupt handler finishes, although the interrupt could instead indicate a fatal error. Interrupts are commonly used by hardware devices to indicate electronic or physical state changes that require time-sensitive attention. Interrupts are also commonly used to implement computer multitasking, especially in real-time computing. Systems that use interrupts in these ways are said to be interrupt-driven. Types Interrupt signals may be issued in response to hardware or software events. These are classified as hardware interrupts or software interrupts, respectively. For any particular processor, the number of interrupt types is limited by the architecture. Hardware interrupts A hardware interrupt is a condition related to the state of the hardware that may be signaled by an external hardware device, e.g., an interrupt request (IRQ) line on a PC, or detected by devices embedded in processor logic (e.g., the CPU timer in IBM System/370), to communicate that the device needs attention from the operating system (OS) or, if there is no OS, from the "bare-metal" program running on the CPU. Such external devices may be part of the computer (e.g., disk controller) or they may be external peripherals. For example, pressing a keyboard key or moving a mouse plugged into a PS/2 port triggers hardware interrupts that cause the processor to read the keystroke or mouse position. Hardware interrupts can arrive asynchronously with respect to the processor clock, and at any time during instruction execution. Consequently, all incoming hardware interrupt signals are conditioned by synchronizing them to the processor clock, and acted upon only at instruction execution boundaries. In many systems, each device is associated with a particular IRQ signal. This makes it possible to quickly determine which hardware device is requesting service, and to expedite servicing of that device. On some older systems, such as the 1964 CDC 3600, all interrupts went to the same location, and the OS used a specialized instruction to determine the highest-priority outstanding unmasked interrupt. On contemporary systems, there is generally a distinct interrupt routine for each type of interrupt (or for each interrupt source), often implemented as one or more interrupt vector tables. Masking To mask an interrupt is to disable it, while to unmask an interrupt is to enable it. Processors typically have an internal interrupt mask register, which allows selective enabling (and disabling) of hardware interrupts. Each interrupt signal is associated with a bit in the mask register. On some systems, the interrupt is enabled when the bit is set, and disabled when the bit is clear. On others, the reverse is true, and a set bit disables the interrupt. When the interrupt is disabled, the associated interrupt signal may be ignored by the processor, or it may remain pending. Signals which are affected by the mask are called maskable interrupts. Some interrupt signals are not affected by the interrupt mask and therefore cannot be disabled; these are called non-maskable interrupts (NMIs). These indicate high-priority events which cannot be ignored under any circumstances, such as the timeout signal from a watchdog timer. Spurious interrupts A spurious interrupt is a hardware interrupt for which no source can be found. The term "phantom interrupt" or "ghost interrupt" may also used to describe this phenomenon. Spurious interrupts tend to be a problem with a wired-OR interrupt circuit attached to a level-sensitive processor input. Such interrupts may be difficult to identify when a system misbehaves. In a wired-OR circuit, parasitic capacitance charging/discharging through the interrupt line's bias resistor will cause a small delay before the processor recognizes that the interrupt source has been cleared. If the interrupting device is cleared too late in the interrupt service routine (ISR), there won't be enough time for the interrupt circuit to return to the quiescent state before the current instance of the ISR terminates. The result is the processor will think another interrupt is pending, since the voltage at its interrupt request input will be not high or low enough to establish an unambiguous internal logic 1 or logic 0. The apparent interrupt will have no identifiable source, hence the "spurious" moniker. A spurious interrupt may also be the result of electrical anomalies due to faulty circuit design, high noise levels, crosstalk, timing issues, or more rarely, device errata. A spurious interrupt may result in system deadlock or other undefined operation if the ISR doesn't account for the possibility of such an interrupt occurring. As spurious interrupts are mostly a problem with wired-OR interrupt circuits, good programming practice in such systems is for the ISR to check all interrupt sources for activity and take no action (other than possibly logging the event) if none of the sources is interrupting. Software interrupts A software interrupt is requested by the processor itself upon executing particular instructions or when certain conditions are met. Every software interrupt signal is associated with a particular interrupt handler. A software interrupt may be intentionally caused by executing a special instruction which, by design, invokes an interrupt when executed. Such instructions function similarly to subroutine calls and are used for a variety of purposes, such as requesting operating system services and interacting with device drivers (e.g., to read or write storage media). Software interrupts may also be triggered by program execution errors or by the virtual memory system. Typically, the operating system kernel will catch and handle such interrupts. Some interrupts are handled transparently to the program - for example, the normal resolution of a page fault is to make the required page accessible in physical memory. But in other cases such as a segmentation fault the operating system executes a process callback. On Unix-like operating systems this involves sending a signal such as SIGSEGV, SIGBUS, SIGILL or SIGFPE, which may either call a signal handler or execute a default action (terminating the program). On Windows the callback is made using Structured Exception Handling with an exception code such as STATUS_ACCESS_VIOLATION or STATUS_INTEGER_DIVIDE_BY_ZERO. In a kernel process, it is often the case that some types of software interrupts are not supposed to happen. If they occur nonetheless, an operating system crash may result. Terminology The terms interrupt, trap, exception, fault, and abort are used to distinguish types of interrupts, although "there is no clear consensus as the exact meaning of these terms". The term trap may refer to any interrupt, to any software interrupt, to any synchronous software interrupt, or only to interrupts caused by instructions with trap in their names. In some usages, the term trap refers specifically to a breakpoint intended to initiate a context switch to a monitor program or debugger. It may also refer to a synchronous interrupt caused by an exceptional condition (e.g., division by zero, invalid memory access, illegal opcode), although the term exception is more common for this. x86 divides interrupts into (hardware) interrupts and software exceptions, and identifies three types of exceptions: faults, traps, and aborts. (Hardware) interrupts are interrupts triggered asynchronously by an I/O device, and allow the program to be restarted with no loss of continuity. A fault is restartable as well but is tied to the synchronous execution of an instruction - the return address points to the faulting instruction. A trap is similar to a fault except that the return address points to the instruction to be executed after the trapping instruction; one prominent use is to implement system calls. An abort is used for severe errors, such as hardware errors and illegal values in system tables, and often does not allow a restart of the program. ARM uses the term exception to refer to all types of interrupts, and divides exceptions into (hardware) interrupts, aborts, reset, and exception-generating instructions. Aborts correspond to x86 exceptions and may be prefetch aborts (failed instruction fetches) or data aborts (failed data accesses), and may be synchronous or asynchronous. Asynchronous aborts may be precise or imprecise. MMU aborts (page faults) are synchronous. Triggering methods Each interrupt signal input is designed to be triggered by either a logic signal level or a particular signal edge (level transition). Level-sensitive inputs continuously request processor service so long as a particular (high or low) logic level is applied to the input. Edge-sensitive inputs react to signal edges: a particular (rising or falling) edge will cause a service request to be latched; the processor resets the latch when the interrupt handler executes. Level-triggered A level-triggered interrupt is requested by holding the interrupt signal at its particular (high or low) active logic level. A device invokes a level-triggered interrupt by driving the signal to and holding it at the active level. It negates the signal when the processor commands it to do so, typically after the device has been serviced. The processor samples the interrupt input signal during each instruction cycle. The processor will recognize the interrupt request if the signal is asserted when sampling occurs. Level-triggered inputs allow multiple devices to share a common interrupt signal via wired-OR connections. The processor polls to determine which devices are requesting service. After servicing a device, the processor may again poll and, if necessary, service other devices before exiting the ISR. Edge-triggered An edge-triggered interrupt is an interrupt signaled by a level transition on the interrupt line, either a falling edge (high to low) or a rising edge (low to high). A device wishing to signal an interrupt drives a pulse onto the line and then releases the line to its inactive state. If the pulse is too short to be detected by polled I/O then special hardware may be required to detect it. The important part of edge triggering is that if (say) the interrupt was triggered by a high to low edge transition, that if the level remained low it would not trigger a further interrupt. It must return to the high level before falling again in order to trigger a further interrupt. This contrasts with a level trigger where the low level would continue to create interrupts (if they are enabled) until the signal returns to its high level. Computers with edge-triggered interrupts may include an interrupt register that retains the status of pending interrupts. Systems with interrupt registers generally have interrupt mask registers as well. Processor response The processor samples the interrupt trigger signals or interrupt register during each instruction cycle, and will process the highest priority enabled interrupt found. Regardless of the triggering method, the processor will begin interrupt processing at the next instruction boundary following a detected trigger, thus ensuring: The processor status is saved in a known manner. Typically the status is stored in a known location, but on some systems it is stored on a stack. All instructions before the one pointed to by the PC have fully executed. No instruction beyond the one pointed to by the PC has been executed, or any such instructions are undone before handling the interrupt. The execution state of the instruction pointed to by the PC is known. System implementation Interrupts may be implemented in hardware as a distinct component with control lines, or they may be integrated into the . If implemented in hardware as a distinct component, an interrupt controller circuit such as the IBM PC's Programmable Interrupt Controller (PIC) may be connected between the interrupting device and the processor's interrupt pin to multiplex several sources of interrupt onto the one or two CPU lines typically available. If implemented as part of the memory controller, interrupts are mapped into the system's memory address space. Shared IRQs Multiple devices may share an edge-triggered interrupt line if they are designed to. The interrupt line must have a pull-down or pull-up resistor so that when not actively driven it settles to its inactive state, which is the default state of it. Devices signal an interrupt by briefly driving the line to its non-default state, and let the line float (do not actively drive it) when not signaling an interrupt. This type of connection is also referred to as open collector. The line then carries all the pulses generated by all the devices. (This is analogous to the pull cord on some buses and trolleys that any passenger can pull to signal the driver that they are requesting a stop.) However, interrupt pulses from different devices may merge if they occur close in time. To avoid losing interrupts the CPU must trigger on the trailing edge of the pulse (e.g. the rising edge if the line is pulled up and driven low). After detecting an interrupt the CPU must check all the devices for service requirements. Edge-triggered interrupts do not suffer the problems that level-triggered interrupts have with sharing. Service of a low-priority device can be postponed arbitrarily, while interrupts from high-priority devices continue to be received and get serviced. If there is a device that the CPU does not know how to service, which may raise spurious interrupts, it won't interfere with interrupt signaling of other devices. However, it is easy for an edge-triggered interrupt to be missed - for example, when interrupts are masked for a period - and unless there is some type of hardware latch that records the event it is impossible to recover. This problem caused many "lockups" in early computer hardware because the processor did not know it was expected to do something. More modern hardware often has one or more interrupt status registers that latch interrupts requests; well-written edge-driven interrupt handling code can check these registers to ensure no events are missed. The elderly Industry Standard Architecture (ISA) bus uses edge-triggered interrupts, without mandating that devices be able to share IRQ lines, but all mainstream ISA motherboards include pull-up resistors on their IRQ lines, so well-behaved ISA devices sharing IRQ lines should just work fine. The parallel port also uses edge-triggered interrupts. Many older devices assume that they have exclusive use of IRQ lines, making it electrically unsafe to share them. There are 3 ways multiple devices "sharing the same line" can be raised. First is by exclusive conduction (switching) or exclusive connection (to pins). Next is by bus (all connected to the same line listening): cards on a bus must know when they are to talk and not talk (i.e., the ISA bus). Talking can be triggered in two ways: by accumulation latch or by logic gates. Logic gates expect a continual data flow that is monitored for key signals. Accumulators only trigger when the remote side excites the gate beyond a threshold, thus no negotiated speed is required. Each has its speed versus distance advantages. A trigger, generally, is the method in which excitation is detected: rising edge, falling edge, threshold (oscilloscope can trigger a wide variety of shapes and conditions). Triggering for software interrupts must be built into the software (both in OS and app). A 'C' app has a trigger table (a table of functions) in its header, which both the app and OS know of and use appropriately that is not related to hardware. However do not confuse this with hardware interrupts which signal the CPU (the CPU enacts software from a table of functions, similarly to software interrupts). Difficulty with sharing interrupt lines Multiple devices sharing an interrupt line (of any triggering style) all act as spurious interrupt sources with respect to each other. With many devices on one line, the workload in servicing interrupts grows in proportion to the square of the number of devices. It is therefore preferred to spread devices evenly across the available interrupt lines. Shortage of interrupt lines is a problem in older system designs where the interrupt lines are distinct physical conductors. Message-signaled interrupts, where the interrupt line is virtual, are favored in new system architectures (such as PCI Express) and relieve this problem to a considerable extent. Some devices with a poorly designed programming interface provide no way to determine whether they have requested service. They may lock up or otherwise misbehave if serviced when they do not want it. Such devices cannot tolerate spurious interrupts, and so also cannot tolerate sharing an interrupt line. ISA cards, due to often cheap design and construction, are notorious for this problem. Such devices are becoming much rarer, as hardware logic becomes cheaper and new system architectures mandate shareable interrupts. Hybrid Some systems use a hybrid of level-triggered and edge-triggered signaling. The hardware not only looks for an edge, but it also verifies that the interrupt signal stays active for a certain period of time. A common use of a hybrid interrupt is for the NMI (non-maskable interrupt) input. Because NMIs generally signal major – or even catastrophic – system events, a good implementation of this signal tries to ensure that the interrupt is valid by verifying that it remains active for a period of time. This 2-step approach helps to eliminate false interrupts from affecting the system. Message-signaled A message-signaled interrupt does not use a physical interrupt line. Instead, a device signals its request for service by sending a short message over some communications medium, typically a computer bus. The message might be of a type reserved for interrupts, or it might be of some pre-existing type such as a memory write. Message-signalled interrupts behave very much like edge-triggered interrupts, in that the interrupt is a momentary signal rather than a continuous condition. Interrupt-handling software treats the two in much the same manner. Typically, multiple pending message-signaled interrupts with the same message (the same virtual interrupt line) are allowed to merge, just as closely spaced edge-triggered interrupts can merge. Message-signalled interrupt vectors can be shared, to the extent that the underlying communication medium can be shared. No additional effort is required. Because the identity of the interrupt is indicated by a pattern of data bits, not requiring a separate physical conductor, many more distinct interrupts can be efficiently handled. This reduces the need for sharing. Interrupt messages can also be passed over a serial bus, not requiring any additional lines. PCI Express, a serial computer bus, uses message-signaled interrupts exclusively. Doorbell In a push button analogy applied to computer systems, the term doorbell or doorbell interrupt is often used to describe a mechanism whereby a software system can signal or notify a computer hardware device that there is some work to be done. Typically, the software system will place data in some well-known and mutually agreed upon memory locations, and "ring the doorbell" by writing to a different memory location. This different memory location is often called the doorbell region, and there may even be multiple doorbells serving different purposes in this region. It is this act of writing to the doorbell region of memory that "rings the bell" and notifies the hardware device that the data are ready and waiting. The hardware device would now know that the data are valid and can be acted upon. It would typically write the data to a hard disk drive, or send them over a network, or encrypt them, etc. The term doorbell interrupt is usually a misnomer. It is similar to an interrupt, because it causes some work to be done by the device; however, the doorbell region is sometimes implemented as a polled region, sometimes the doorbell region writes through to physical device registers, and sometimes the doorbell region is hardwired directly to physical device registers. When either writing through or directly to physical device registers, this may cause a real interrupt to occur at the device's central processor unit (CPU), if it has one. Doorbell interrupts can be compared to Message Signaled Interrupts, as they have some similarities. Multiprocessor IPI In multiprocessor systems, a processor may send an interrupt request to another processor via inter-processor interrupts (IPI). Performance Interrupts provide low overhead and good latency at low load, but degrade significantly at high interrupt rate unless care is taken to prevent several pathologies. The phenomenon where the overall system performance is severely hindered by excessive amounts of processing time spent handling interrupts is called an interrupt storm. There are various forms of livelocks, when the system spends all of its time processing interrupts to the exclusion of other required tasks. Under extreme conditions, a large number of interrupts (like very high network traffic) may completely stall the system. To avoid such problems, an operating system must schedule network interrupt handling as carefully as it schedules process execution. With multi-core processors, additional performance improvements in interrupt handling can be achieved through receive-side scaling (RSS) when multiqueue NICs are used. Such NICs provide multiple receive queues associated to separate interrupts; by routing each of those interrupts to different cores, processing of the interrupt requests triggered by the network traffic received by a single NIC can be distributed among multiple cores. Distribution of the interrupts among cores can be performed automatically by the operating system, or the routing of interrupts (usually referred to as IRQ affinity) can be manually configured. A purely software-based implementation of the receiving traffic distribution, known as receive packet steering (RPS), distributes received traffic among cores later in the data path, as part of the interrupt handler functionality. Advantages of RPS over RSS include no requirements for specific hardware, more advanced traffic distribution filters, and reduced rate of interrupts produced by a NIC. As a downside, RPS increases the rate of inter-processor interrupts (IPIs). Receive flow steering'' (RFS) takes the software-based approach further by accounting for application locality; further performance improvements are achieved by processing interrupt requests by the same cores on which particular network packets will be consumed by the targeted application. Typical uses Interrupts are commonly used to service hardware timers, transfer data to and from storage (e.g., disk I/O) and communication interfaces (e.g., UART, Ethernet), handle keyboard and mouse events, and to respond to any other time-sensitive events as required by the application system. Non-maskable interrupts are typically used to respond to high-priority requests such as watchdog timer timeouts, power-down signals and traps. Hardware timers are often used to generate periodic interrupts. In some applications, such interrupts are counted by the interrupt handler to keep track of absolute or elapsed time, or used by the OS task scheduler to manage execution of running processes, or both. Periodic interrupts are also commonly used to invoke sampling from input devices such as analog-to-digital converters, incremental encoder interfaces, and GPIO inputs, and to program output devices such as digital-to-analog converters, motor controllers, and GPIO outputs. A disk interrupt signals the completion of a data transfer from or to the disk peripheral; this may cause a process to run which is waiting to read or write. A power-off interrupt predicts imminent loss of power, allowing the computer to perform an orderly shut-down while there still remains enough power to do so. Keyboard interrupts typically cause keystrokes to be buffered so as to implement typeahead. Interrupts are sometimes used to emulate instructions which are unimplemented on some computers in a product family. For example floating point instructions may be implemented in hardware on some systems and emulated on lower-cost systems. In the latter case, execution of an unimplemented floating point instruction will cause an "illegal instruction" exception interrupt. The interrupt handler will implement the floating point function in software and then return to the interrupted program as if the hardware-implemented instruction had been executed. This provides application software portability across the entire line. Interrupts are similar to signals, the difference being that signals are used for inter-process communication (IPC), mediated by the kernel (possibly via system calls) and handled by processes, while interrupts are mediated by the processor and handled by the kernel. The kernel may pass an interrupt as a signal to the process that caused it (typical examples are SIGSEGV, SIGBUS, SIGILL and SIGFPE). History Hardware interrupts were introduced as an optimization, eliminating unproductive waiting time in polling loops, waiting for external events. The first system to use this approach was the DYSEAC, completed in 1954, although earlier systems provided error trap functions. The UNIVAC 1103A computer is generally credited with the earliest use of interrupts in 1953. Earlier, on the UNIVAC I (1951) "Arithmetic overflow either triggered the execution of a two-instruction fix-up routine at address 0, or, at the programmer's option, caused the computer to stop." The IBM 650 (1954) incorporated the first occurrence of interrupt masking. The National Bureau of Standards DYSEAC (1954) was the first to use interrupts for I/O. The IBM 704 was the first to use interrupts for debugging, with a "transfer trap", which could invoke a special routine when a branch instruction was encountered. The MIT Lincoln Laboratory TX-2 system (1957) was the first to provide multiple levels of priority interrupts. See also Advanced Programmable Interrupt Controller (APIC) BIOS interrupt call Event-driven programming Exception handling INT (x86 instruction) Interrupt coalescing Interrupt handler Interrupt latency Interrupts in 65xx processors Ralf Brown's Interrupt List Interrupts on IBM System/360 architecture Time-triggered system Autonomous peripheral operation Notes References External links Interrupts Made Easy Interrupts for Microchip PIC Microcontroller IBM PC Interrupt Table University of Alberta CMPUT 296 Concrete Computing Notes on Interrupts, archived from the original on March 13, 2012
[ 0.22408170998096466, -0.08594737201929092, -0.40337517857551575, 0.2515576481819153, 0.31497541069984436, -0.04994109645485878, 0.23811395466327667, 0.29740750789642334, -0.05108872801065445, -0.2840668261051178, -0.6118339896202087, 0.4583517014980316, -0.4098950922489166, 0.1929050385951...
15290
https://en.wikipedia.org/wiki/Intercalation%20%28timekeeping%29
Intercalation (timekeeping)
Intercalation or embolism in timekeeping is the insertion of a leap day, week, or month into some calendar years to make the calendar follow the seasons or moon phases. Lunisolar calendars may require intercalations of both days and months. Solar calendars The solar or tropical year does not have a whole number of days (it is about 365.24 days), but a calendar year must have a whole number of days. The most common way to reconcile the two is to vary the number of days in the calendar year. In solar calendars, this is done by adding to a common year of 365 days, an extra day ("leap day" or "intercalary day") about every four years, causing a leap year to have 366 days (Julian, Gregorian and Indian national calendars). The Decree of Canopus, which was issued by the pharaoh Ptolemy III Euergetes of Ancient Egypt in 239 BCE, decreed a solar leap day system; an Egyptian leap year was not adopted until 25 BC, when the Roman Emperor Augustus successfully instituted a reformed Alexandrian calendar. In the Julian calendar, as well as in the Gregorian calendar, which improved upon it, intercalation is done by adding an extra day to February in each leap year. In the Julian calendar this was done every four years. In the Gregorian, years divisible by 100 but not 400 were exempted in order to improve accuracy. Thus, 2000 was a leap year; 1700, 1800, and 1900 were not. Epagomenal days are days within a solar calendar that are outside any regular month. Usually five epagomenal days are included within every year (Egyptian, Coptic, Ethiopian, Mayan Haab' and French Republican Calendars), but a sixth epagomenal day is intercalated every four years in some (Coptic, Ethiopian and French Republican calendars). The Bahá'í calendar includes enough epagomenal days (usually 4 or 5) before the last month (, ʿalāʾ) to ensure that the following year starts on the March equinox. These are known as the Ayyám-i-Há. Lunisolar calendars The solar year does not have a whole number of lunar months (it is about 365/29.5 = 12.37 lunations), so a lunisolar calendar must have a variable number of months in a year. Regular years have 12 months, but embolismic years insert a 13th "intercalary" or "leap" or "embolismic" month every second or third year (see blue moon). Whether to insert an intercalary month in a given year may be determined using regular cycles such as the 19-year Metonic cycle (Hebrew calendar and in the determination of Easter) or using calculations of lunar phases (Hindu lunisolar and Chinese calendars). The Buddhist calendar adds both an intercalary day and month on a usually regular cycle. Lunar calendars The tabular Islamic calendar usually has 12 lunar months that alternate between 30 and 29 days every year, but an intercalary day is added to the last month of the year 11 times within a 30-year cycle. Some historians also linked the pre-Islamic practice of Nasi' to intercalation. The Solar Hijri calendar are based on solar calculations and is similar to the Gregorian calendar in its structure, and hence the intercalation, with the exception that the year date starts with the Hegira. Leap seconds The International Earth Rotation and Reference Systems Service can insert or remove leap seconds from the last day of any month (June and December are preferred). These are sometimes described as intercalary. Other uses ISO 8601 includes a specification for a 52/53-week year. Any year that has 53 Thursdays has 53 weeks; this extra week may be regarded as intercalary. The xiuhpōhualli (year count) system of the Aztec calendar had five intercalary days after the eighteenth and final month, the nēmontēmi, in which the people reflect on the past year and do fasting. See also Lunisolar calendar Egyptian, Coptic, and Ethiopian calendars Iranian calendar Islamic calendar Celtic calendar Thai lunar calendar Bengali calendar Igbo calendar World Calendar Intercalated Games References Calendars Units of time
[ 0.01982739195227623, -0.02539851889014244, 0.03251682221889496, 0.23404651880264282, -0.1684236079454422, 0.12022940069437027, 0.14360307157039642, 0.12815484404563904, -0.6784266829490662, -0.4964413642883301, -0.1052170842885971, -0.3590049147605896, -0.52131187915802, 0.467826247215271,...
15291
https://en.wikipedia.org/wiki/Intercourse
Intercourse
Intercourse may refer to: Sexual intercourse, the most common penetrative sex Interpersonal communication, talk, any kind of human communication and/or interaction Places Intercourse, Alabama, US Intercourse, Pennsylvania, US Intercourse Island, in Western Australia Arts and media Books Intercourse (book), the title of a 1987 book by author Andrea Dworkin InterCourses: An Aphrodisiac Cookbook, a 1997 book by Martha Hopkins and Randall Lockridge with photography by Ben Fink Music Intercourse (The Tokens album), a 1971 album by American vocal group the Tokens Intercourse (S'Express album), a 1991 studio album by English dance music act S'Express "Intercourse", a 2020 song by Megan Thee Stallion featuring Popcaan and Mustard from Good News Other arts and media The Intercourse (arts center), an arts center in Red Hook, Brooklyn, New York Intercourse (magazine), a literary magazine published in Montreal from 1966 to 1971 See also Non-Intercourse Act (1809), regarding trade Nonintercourse Act, a collective name given to six statutes to set Amerindian boundaries of reservations, instituted between 1790 and 1834
[ 0.27831363677978516, 0.4394698143005371, -0.2545468509197235, 0.0006151997367851436, -0.11786030232906342, 0.6545654535293579, 0.7318584322929382, 0.3201730251312256, -0.30501487851142883, -0.2035469114780426, -0.13632552325725555, 0.3601216971874237, -0.19839191436767578, -0.1573633253574...
15292
https://en.wikipedia.org/wiki/Ink
Ink
Ink is a gel, sol, or solution that contains at least one colourant, such as a dye or pigment, and is used to color a surface to produce an image, text, or design. Ink is used for drawing or writing with a pen, brush, reed pen, or quill. Thicker inks, in paste form, are used extensively in letterpress and lithographic printing. Ink can be a complex medium, composed of solvents, pigments, dyes, resins, lubricants, solubilizers, surfactants, particulate matter, fluorescents, and other materials. The components of inks serve many purposes; the ink's carrier, colorants, and other additives affect the flow and thickness of the ink and its dry appearance. In 2011, worldwide consumption of printing inks generated revenues of more than 20 billion US dollars. Demand by traditional print media is shrinking; on the other hand, more and more printing inks are consumed for packaging. History Many ancient cultures around the world have independently discovered and formulated inks for the purposes of writing and drawing. The knowledge of the inks, their recipes and the techniques for their production comes from archaeological analysis or from written text itself. The earliest inks from all civilizations are believed to have been made with lampblack, a kind of soot, as this would have been easily collected as a by-product of fire. Ink was used in Ancient Egypt for writing and drawing on papyrus from at least the 26th century BC. Egyptian red and black inks included iron and ocher as a pigment, in addition to phosphate, sulfate, chloride, and carboxylate ions; meanwhile, lead was used as a drier. Chinese inks may go back as far as three or maybe four millennia, to the Chinese Neolithic Period. These used plants, animal, and mineral inks based on such materials as graphite that were ground with water and applied with ink brushes. Direct evidence for the earliest Chinese inks, similar to modern inksticks, is around 256 BC in the end of the Warring States period and produced from soot and animal glue. The best inks for drawing or painting on paper or silk are produced from the resin of the pine tree. They must be between 50 and 100 years old. The Chinese inkstick is produced with a fish glue, whereas Japanese glue (膠 "nikawa") is from cow or stag. India ink was first invented in China, though materials were often traded from India, hence the name. The traditional Chinese method of making the ink was to grind a mixture of hide glue, carbon black, lampblack, and bone black pigment with a pestle and mortar, then pouring it into a ceramic dish to dry. To use the dry mixture, a wet brush would be applied until it reliquified. The manufacture of India ink was well-established by the Cao Wei Dynasty (220–265 AD). Indian documents written in Kharosthi with ink have been unearthed in Chinese Turkestan. The practice of writing with ink and a sharp pointed needle was common in early South India. Several Buddhist and Jain sutras in India were compiled in ink. In ancient Rome, atramentum was used; in an article for the Christian Science Monitor, Sharon J. Huntington describes these other historical inks: About 1,600 years ago, a popular ink recipe was created. The recipe was used for centuries. Iron salts, such as ferrous sulfate (made by treating iron with sulfuric acid), were mixed with tannin from gallnuts (they grow on trees) and a thickener. When first put to paper, this ink is bluish-black. Over time it fades to a dull brown. Scribes in medieval Europe (about AD 800 to 1500) wrote principally on parchment or vellum. One 12th century ink recipe called for hawthorn branches to be cut in the spring and left to dry. Then the bark was pounded from the branches and soaked in water for eight days. The water was boiled until it thickened and turned black. Wine was added during boiling. The ink was poured into special bags and hung in the sun. Once dried, the mixture was mixed with wine and iron salt over a fire to make the final ink. The reservoir pen, which may have been the first fountain pen, dates back to 953, when Ma'ād al-Mu'izz, the caliph of Egypt, demanded a pen that would not stain his hands or clothes, and was provided with a pen that held ink in a reservoir. In the 15th century, a new type of ink had to be developed in Europe for the printing press by Johannes Gutenberg. According to Martyn Lyons in his book Books: A Living History, Gutenberg's dye was indelible, oil-based, and made from the soot of lamps (lamp-black) mixed with varnish and egg white. Two types of ink were prevalent at the time: the Greek and Roman writing ink (soot, glue, and water) and the 12th century variety composed of ferrous sulfate, gall, gum, and water. Neither of these handwriting inks could adhere to printing surfaces without creating blurs. Eventually an oily, varnish-like ink made of soot, turpentine, and walnut oil was created specifically for the printing press. Types Ink formulas vary, but commonly involve two components: Colorants Vehicles (binders) Inks generally fall into four classes: Aqueous Liquid Paste Powder Colorants Pigments Pigment inks are used more frequently than dyes because they are more color-fast, but they are also more expensive, less consistent in color, and have less of a color range than dyes. Pigments are solid, opaque particles suspended in ink to provide color. Pigment molecules typically link together in crystalline structures that are 0.1–2 µm in size and comprise 5–30 percent of the ink volume. Qualities such as hue, saturation, and lightness vary depending on the source and type of pigment. Dyes Dye-based inks are generally much stronger than pigment-based inks and can produce much more color of a given density per unit of mass. However, because dyes are dissolved in the liquid phase, they have a tendency to soak into paper, potentially allowing the ink to bleed at the edges of an image. To circumvent this problem, dye-based inks are made with solvents that dry rapidly or are used with quick-drying methods of printing, such as blowing hot air on the fresh print. Other methods include harder paper sizing and more specialized paper coatings. The latter is particularly suited to inks used in non-industrial settings (which must conform to tighter toxicity and emission controls), such as inkjet printer inks. Another technique involves coating the paper with a charged coating. If the dye has the opposite charge, it is attracted to and retained by this coating, while the solvent soaks into the paper. Cellulose, the wood-derived material most paper is made of, is naturally charged, and so a compound that complexes with both the dye and the paper's surface aids retention at the surface. Such a compound is commonly used in ink-jet printing inks. An additional advantage of dye-based ink systems is that the dye molecules can interact with other ink ingredients, potentially allowing greater benefit as compared to pigmented inks from optical brighteners and color-enhancing agents designed to increase the intensity and appearance of dyes. Dye-based inks can be used for anti-counterfeit purposes and can be found in some gel inks, fountain pen inks, and inks used for paper currency. These inks react with cellulose to bring about a permanent color change. Health and environmental aspects There is a misconception that ink is non-toxic even if swallowed. Once ingested, ink can be hazardous to one's health. Certain inks, such as those used in digital printers, and even those found in a common pen can be harmful. Though ink does not easily cause death, repeated skin contact or ingestion can cause effects such as severe headaches, skin irritation, or nervous system damage. These effects can be caused by solvents, or by pigment ingredients such as p-Anisidine, which helps create some inks' color and shine. Three main environmental issues with ink are: Heavy metals Non-renewable oils Volatile organic compounds Some regulatory bodies have set standards for the amount of heavy metals in ink. There is a trend toward vegetable oils rather than petroleum oils in recent years in response to a demand for better environmental sustainability performance. Ink uses up non-renewable oils and metals, which has a negative impact on the environment. Carbon Carbon inks were commonly made from lampblack or soot and a binding agent such as gum arabic or animal glue. The binding agent keeps carbon particles in suspension and adhered to paper. Carbon particles do not fade over time even when bleached or when in sunlight. One benefit is that carbon ink does not harm paper. Over time, the ink is chemically stable and therefore does not threaten the paper's strength. Despite these benefits, carbon ink is not ideal for permanence and ease of preservation. Carbon ink tends to smudge in humid environments and can be washed off surfaces. The best method of preserving a document written in carbon ink is to store it in a dry environment (Barrow 1972). Recently, carbon inks made from carbon nanotubes have been successfully created. They are similar in composition to traditional inks in that they use a polymer to suspend the carbon nanotubes. These inks can be used in inkjet printers and produce electrically conductive patterns. Iron gall (common ink) Iron gall inks became prominent in the early 12th century; they were used for centuries and were widely thought to be the best type of ink. However, iron gall ink is corrosive and damages paper over time (Waters 1940). Items containing this ink can become brittle and the writing fades to brown. The original scores of Johann Sebastian Bach are threatened by the destructive properties of iron gall ink. The majority of his works are held by the German State Library, and about 25% of those are in advanced stages of decay (American Libraries 2000). The rate at which the writing fades is based on several factors, such as proportions of ink ingredients, amount deposited on the paper, and paper composition (Barrow 1972:16). Corrosion is caused by acid catalysed hydrolysis and iron(II)-catalysed oxidation of cellulose (Rouchon-Quillet 2004:389). Treatment is a controversial subject. No treatment undoes damage already caused by acidic ink. Deterioration can only be stopped or slowed. Some think it best not to treat the item at all for fear of the consequences. Others believe that non-aqueous procedures are the best solution. Yet others think an aqueous procedure may preserve items written with iron gall ink. Aqueous treatments include distilled water at different temperatures, calcium hydroxide, calcium bicarbonate, magnesium carbonate, magnesium bicarbonate, and calcium phytate. There are many possible side effects from these treatments. There can be mechanical damage, which further weakens the paper. Paper color or ink color may change, and ink may bleed. Other consequences of aqueous treatment are a change of ink texture or formation of plaque on the surface of the ink (Reibland & de Groot 1999). Iron gall inks require storage in a stable environment, because fluctuating relative humidity increases the rate that formic acid, acetic acid, and furan derivatives form in the material the ink was used on. Sulfuric acid acts as a catalyst to cellulose hydrolysis, and iron (II) sulfate acts as a catalyst to cellulose oxidation. These chemical reactions physically weaken the paper, causing brittleness. Indelible ink Indelible means "unremovable". Some types of indelible ink have a very short shelf life because of the quickly evaporating solvents used. India, Mexico, Indonesia, Malaysia and other developing countries have used indelible ink in the form of electoral stain to prevent electoral fraud. Election ink based on silver nitrate was first applied in the 1962 Indian general election, after being developed at the National Physical Laboratory of India. The Election Commission in India has used indelible ink for many elections. Indonesia used it in its last election in Aceh. In Mali, the ink is applied to the fingernail. Indelible ink itself is not infallible as it can be used to commit electoral fraud by marking opponent party members before they have chances to cast their votes. There are also reports of "indelible" ink washing off voters' fingers in Afghanistan. See also Blue Wool Scale De-inked pulp Election ink Fountain pen inks Gel pen Ink eraser Lightfastness Inksaving typeface Invisible ink Pharmaceutical ink Preservation (library and archival science) Preservation of illuminated manuscripts Soy ink Squid ink Stark's ink Tattoo ink Toner Inkjet printing References "Think Ink!" by Sharon J. Huntington, Christian Science Monitor, September 21, 2004, retrieved January 17, 2006. "A History of Technology and Invention" by Maurice Audin, page 630. Ainsworth, Mitchell, C., "Inks and Their Composition and Manufacture," Charles Griffin and Company Ltd, 1904. Martín-Gil J, Ramos-Sánchez MC, Martín-Gil FJ and José-Yacamán M. "Chemical composition of a fountain pen ink". Journal of Chemical Education, 2006, 83, 1476–78 Banerji, Sures Chandra (1989). A Companion to Sanskrit Literature. Motilal Banarsidass. . Sircar, D.C. (1996).Indian epigraphy. Motilal Banarsidass. . "Ink Chemistry" Joy T. Kunjappu, https://www.chemistryworld.com/news/ink-chemistry/3002158.article "Essays in Ink Chemistry (For Paints and Coatings Too)" Joy T. Kunjappu, Nova Science Publishers, New York, 2001 Sources Further reading Cueppers, Christoph (1989). "On the Manufacture of Ink." Ancient Nepal – Journal of the Department of Archaeology, Number 113, August–September 1989, pp. 1–7. [The Tibetan text and translation of a section of the work called, Bzo gnas nyer mkho'i za ma tog by 'Jam-mgon 'Ju Mi-pham-rgya-mtsho (1846–1912) describing various traditional Tibetan techniques of making inks from different sources of soot, and from earth, puffballs, dung, ser-sha – a yellow fungus, and the fruit of tsi dra ka (Ricinus communis).] External links Forty Centuries of Ink (David N. Carvalho); A detailed online textbook Roman ink article by Alexander Allen In Smith's Dictionary Greek and Roman Antiquities (1875), in LacusCurtius Ancient and Modern Ink Recipes (David N. Carvalho) Gorgeous Portrayal Of How Ink Is Made – video at The Huffington Post "A Light Note on the Science of Writing and Inks" is a manuscript, in Arabic, from 1852. It discusses the process of making inks. Printing materials
[ 0.6068297028541565, 0.11774314939975739, 0.11783444881439209, 0.2831352949142456, 0.1650175303220749, -0.022456999868154526, -0.13524094223976135, 0.17195409536361694, -0.0180701594799757, -0.9430803656578064, -0.44826528429985046, 0.5231667757034302, -0.17344947159290314, 0.05727609619498...
15294
https://en.wikipedia.org/wiki/Islamabad%20Capital%20Territory
Islamabad Capital Territory
Islamabad Capital Territory () is the only federal territory of Pakistan. Located between Punjab and Khyber Pakhtunkhwa province. It includes the country's federal capital Islamabad. The territory is represented in the National Assembly constituencies NA-52, NA-53 and NA-54. History In 1960, land was transferred from Rawalpindi District of Punjab province to establish Pakistan's new capital. According to the 1960s master plan, the Capital Territory included Rawalpindi, and was to be composed of the following parts: Rawalpindi, Islamabad, Margalla Hills, Islamabad rural, However, Rawalpindi was eventually excluded from the Islamabad master plan in the 1980s. Administration Zones Islamabad is subdivided into five zones: Zone I: Designated for urban development and federal government institutions Zone II: Designated for urban development Zone III: Designated for rural development Zone IV: Designated for rural development Zone V: Designated for rural development Sectors Union Councils Islamabad Capital Territory comprises urban and rural areas. The rural consists of 23 union councils, comprising 133 villages, while urban has 27 union councils. Climate The climate of Islamabad has a humid subtropical climate (Köppen: Cwa), with five seasons: Winter (November–February), Spring (March and April), Summer (May and June), Rainy Monsoon (July and August) and Autumn (September and October). The hottest month is June, where average highs routinely exceed . Wettest month is July, with heavy rainfalls and evening thunderstorms with the possibility of cloudburst and flooding. Coolest month is January. Islamabad's micro-climate is regulated by three artificial reservoirs: Rawal, Simli, and Khanpur Dam. Last one is located on the Haro River near the town of Khanpur, about from Islamabad. Simli Dam is north of Islamabad. of the city consists of Margalla Hills National Park. Loi Bher Forest is situated along the Islamabad Highway, covering an area of . Highest monthly rainfall of was recorded during July 1995. Winters generally feature dense fog in the mornings and sunny afternoons. In the city, temperatures stay mild, with snowfall over the higher elevations points on nearby hill stations, notably Murree and Nathia Gali. The temperatures range from in January to in June. The highest recorded temperature was on 23 June 2005 while the lowest temperature was on 17 January 1967. The city has "recorded" snowfall. On 23 July 2001, Islamabad received a record breaking of rainfall in just 10 hours. It was the heaviest rainfall in Islamabad in the past 100 years and the highest rainfall in 24 hours as well. Cityscape Civic administration The main administrative authority of the city is Islamabad Capital Territory Administration with some help from Metropolitan Corporation Islamabad and Capital Development Authority (CDA), which oversees the planning, development, construction, and administration of the city. Islamabad Capital Territory is divided into eight zones: Administrative Zone, Commercial District, Educational Sector, Industrial Sector, Diplomatic Enclave, Residential Areas, Rural Areas and Green Area. Islamabad city is divided into five major zones: Zone I, Zone II, Zone III, Zone IV, and Zone V. Out of these, Zone IV is the largest in area. All sectors of Ghouri town (1, 2, 3, VIP, 5, 4-A, 4-B, 4-C, 5-A, 5-B and sector 7) are located in this zone. Zone I consists mainly of all the developed residential sectors, while Zone II consists of the under-developed residential sectors. Each residential sector is identified by a letter of the alphabet and a number, and covers an area of approximately 4 square kilometres. The sectors are lettered from A to I, and each sector is divided into four numbered sub-sectors. Series A, B, and C are still underdeveloped. The D series has seven sectors (D-11 to D-17), of which only sector D-12 is completely developed. This series is located at the foot of Margalla Hills. The E Sectors are named from E-7 to E-17. Many foreigners and diplomatic personnel are housed in these sectors. In the revised Master Plan of the city, CDA has decided to develop a park on the pattern of Fatima Jinnah Park in sector E-14. Sectors E-8 and E-9 contain the campuses of Bahria University, Air University, and the National Defence University. The F and G series contains the most developed sectors. F series contains sectors F-5 to F-17; some sectors are still under-developed. F-5 is an important sector for the software industry in Islamabad, as the two software technology parks are located here. The entire F-9 sector is covered with Fatima Jinnah Park. The Centaurus complex will be one of the major landmarks of the F-8 sector. G sectors are numbered G-5 through G-17. Some important places include the Jinnah Convention Center and Serena Hotel in G-5, the Red Mosque in G-6, and the Pakistan Institute of Medical Sciences, the largest medical complex in the capital, located in G-8. The H sectors are numbered H-8 through H-17. The H sectors are mostly dedicated to educational and health institutions. National University of Sciences and Technology covers a major portion of sector H-12. The I sectors are numbered from I-8 to I-18. With the exception of I-8, which is a well-developed residential area, these sectors are primarily part of the industrial zone. Currently two sub-sectors of I-9 and one sub-sector of I-10 are used as industrial areas. CDA is planning to set up Islamabad Railway Station in Sector I-18 and Industrial City in sector I-17. Zone III consists primarily of the Margalla Hills and Margalla Hills National Park. Rawal Lake is in this zone. Zone IV and V consist of Islamabad Park, and rural areas of the city. The Soan River flows into the city through Zone V. Demographics Language While urban Islamabad is home to people from all over Pakistan as well as expatriates, in the rural areas a number of Pothohari speaking tribal communities can still be recognised. Religion Islamabad-Rawalpindi metropolitan area When the master plan for Islamabad was drawn up in 1960, Islamabad and Rawalpindi, along with the adjoining areas, was to be integrated to form a large metropolitan area called Islamabad/Rawalpindi Metropolitan Area. The area would consist of the developing Islamabad, the old colonial cantonment city of Rawalpindi, and Margalla Hills National Park, including surrounding rural areas. However, Islamabad city is part of the Islamabad Capital Territory, while Rawalpindi is part of Rawalpindi District, which is part of province of Punjab. Initially, it was proposed that the three areas would be connected by four major highways: Murree Highway, Islamabad Highway, Soan Highway, and Capital Highway. However, to date only two highways have been constructed: Kashmir Highway (the former Murree Highway) and Islamabad Highway. Plans of constructing Margalla Avenue are also underway. Islamabad is the hub all the governmental activities while Rawalpindi is the centre of all industrial, commercial, and military activities. The two cities are considered sister cities and are highly interdependent. Economy Islamabad is a net contributor to the Pakistani economy, as whilst having only 0.8% of the country's population, it contributes 1% to the country's GDP. Islamabad Stock Exchange, founded in 1989, is Pakistan's third largest stock exchange after Karachi Stock Exchange and Lahore Stock Exchange. The exchange has 118 members with 104 corporate bodies and 18 individual members. The average daily turnover of the stock exchange is over 1 million shares. As of 2012, Islamabad LTU (Large Tax Unit) was responsible for Rs 371 billion in tax revenue, which amounts to 20% of all the revenue collected by Federal Board of Revenue. Islamabad has seen an expansion in information and communications technology with the addition two Software Technology Parks, which house numerous national and foreign technological and information technology companies. The tech parks are located in Evacuee Trust Complex and Awami Markaz. Awami Markaz houses 36 IT companies while Evacuee Trust house 29 companies. Call centres for foreign companies have been targeted as another significant area of growth, with the government making efforts to reduce taxes by as much as 10% to encourage foreign investments in the information technology sector. Most of Pakistan's state-owned companies like PIA, PTV, PTCL, OGDCL, and Zarai Taraqiati Bank Ltd. are based in Islamabad. Headquarters of all major telecommunication operators such as PTCL, Mobilink, Telenor, Ufone, and China Mobile are located in Islamabad. Being an expensive city, the prices of most of fruits, vegetable and poultry items increased in Islamabad during the year 2015-2020 Tourism Transport Airport Islamabad is connected to major destinations around the world through Islamabad International Airport. The airport is the largest in Pakistan, handling 9 million passengers per annum. The airport was built at a cost of $400 million and opened on 3 May 2018, replacing the former Benazir Bhutto International Airport. It is the first greenfield airport in Pakistan with an area of . Metrobus The Rawalpindi-Islamabad Metrobus is a bus rapid transit system that serves the twin cities of Rawalpindi and Islamabad in Pakistan. It uses dedicated bus lanes for all of its route covering 24 bus stations. Islamabad is well connected with other parts of the country through car rental services such as Alvi Transport Network and Pakistan Car Rentals. Motorways All major cities and towns are accessible through regular trains and bus services running mostly from the neighbouring city of Rawalpindi. Lahore and Peshawar are linked to Islamabad through a network of motorways, which has significantly reduced travelling times between these cities. M-2 Motorway is long and connect Islamabad and Lahore. M-1 Motorway connects Islamabad with Peshawar and is long. Islamabad is linked to Rawalpindi through the Faizabad Interchange, which has a daily traffic volume of about 48,000 vehicles. Education Islamabad has the highest literacy rate of Pakistan at 95%. Islamabad also has some of Pakistan's major universities, including Quaid-i-Azam University, the International Islamic University, and the National University of Sciences and Technology and Pakistan Institute of Engineering and Applied Sciences Private School Network Islamabad is working for private educational institutions. The president of PSN is Dr. Muhammad Afzal Babur from Bhara Kahu. PSN is divided into eight zones in Islamabad. In Tarlai Zone Chaudhary Faisal Ali from Faisal Academy Tarlai Kalan is Zonal General Sectary of PSN. Quaid-e-Azam University has several faculties. The institute is located in a semi-hilly area, east of the Secretariat buildings and near the base of Margalla Hills. This Post-Graduate institute is spread over . The nucleus of the campus has been designed as an axial spine with a library as its center. Other universities include the following: Bahria University Air University Quaid-e-Azam University Allama Iqbal Open University (AIOU) Alkauthar Islamic University COMSATS Institute of Information Technology (CIIT) Capital University of Science and Technology (CUST) [Formally Mohammad Ali Jinnah University, Islamabad Campus] Federal Urdu University of Arts, Science & Technology (FUUAST) National University of Sciences and Technology (NUST) National Defense University, Islamabad(NDU) National University of Modern Languages (NUML) Institute of Space Technology International Islamic University Islamabad Institute of Cost and Management Accountants of Pakistan (ICMAP) Pakistan Institute of Development Economics (PIDE) Pakistan Institute of Engineering and Applied Sciences (PIEAS) Shifa College of Medicine Foundation University Islamabad (FUI) National University of Computer & Emerging Sciences(FAST-NUCES) Riphah International University University of Lahore Center for Advanced Studies in Engineering Preston University Islamabad Campus Iqra University Islamabad Campus Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology (ZABIST) Hamdard University Islamabad Campus The Millennium Universal College Islamabad Campus Sports Islamabad United became the first ever team to win Pakistan Super League in 2016. And now the federal team Is participating in the Pakistan Cup. The team is under the captaincy of Misbah-ul-Haq, former captain of Pakistan, The Islamabad United was also under Misbah. See also Islamabad Capital Territory Administration List of cultural heritage sites in Islamabad Capital Territory Developments in Islamabad Model Town Humak References External links Islamabad Capital Territory Administration website Capital Development Authority Subdivisions of Pakistan Capital districts and territories States and territories established in 1960 1960 establishments in Pakistan
[ 0.5399013757705688, -0.3024250566959381, -0.12496945261955261, -0.2617569863796234, -0.4634465277194977, 0.18666550517082214, 0.21692301332950592, 0.46782442927360535, -0.6265090703964233, -0.502871572971344, -0.5550500154495239, -0.5640940070152283, -0.39306893944740295, 0.367365390062332...
15295
https://en.wikipedia.org/wiki/Intelligent%20design
Intelligent design
Intelligent design (ID) is a pseudoscientific argument for the existence of God, presented by its proponents as "an evidence-based scientific theory about life's origins". Proponents claim that "certain features of the universe and of living things are best explained by an intelligent cause, not an undirected process such as natural selection." ID is a form of creationism that lacks empirical support and offers no testable or tenable hypotheses, and is therefore not science. The leading proponents of ID are associated with the Discovery Institute, a Christian, politically conservative think tank based in the United States. Although the phrase intelligent design had featured previously in theological discussions of the argument from design, its first publication in its present use as an alternative term for creationism was in Of Pandas and People, a 1989 creationist textbook intended for high school biology classes. The term was substituted into drafts of the book, directly replacing references to creation science and creationism, after the 1987 Supreme Court's Edwards v. Aguillard decision barred the teaching of creation science in public schools on constitutional grounds. From the mid-1990s, the intelligent design movement (IDM), supported by the Discovery Institute, advocated inclusion of intelligent design in public school biology curricula. This led to the 2005 Kitzmiller v. Dover Area School District trial, which found that intelligent design was not science, that it "cannot uncouple itself from its creationist, and thus religious, antecedents," and that the public school district's promotion of it therefore violated the Establishment Clause of the First Amendment to the United States Constitution. ID presents two main arguments against evolutionary explanations: irreducible complexity and specified complexity, asserting that certain biological and informational features of living things are too complex to be the result of natural selection. Detailed scientific examination has rebutted several examples for which evolutionary explanations are claimed to be impossible. ID seeks to challenge the methodological naturalism inherent in modern science, though proponents concede that they have yet to produce a scientific theory. As a positive argument against evolution, ID proposes an analogy between natural systems and human artifacts, a version of the theological argument from design for the existence of God. ID proponents then conclude by analogy that the complex features, as defined by ID, are evidence of design. Critics of ID find a false dichotomy in the premise that evidence against evolution constitutes evidence for design. History Origin of the concept In 1910, evolution was not a topic of major religious controversy in America, but in the 1920s, the Fundamentalist–Modernist Controversy in theology resulted in Fundamentalist Christian opposition to teaching evolution, and the origins of modern creationism. Teaching of evolution was effectively suspended in U.S. public schools until the 1960s, and when evolution was then reintroduced into the curriculum, there was a series of court cases in which attempts were made to get creationism taught alongside evolution in science classes. Young Earth creationists (YEC) promoted creation science as "an alternative scientific explanation of the world in which we live". This frequently invoked the argument from design to explain complexity in nature as demonstrating the existence of God. The argument from design, also known as the teleological argument or "argument from intelligent design", has been advanced in theology for centuries. It can be summarised briefly as "Wherever complex design exists, there must have been a designer; nature is complex; therefore nature must have had an intelligent designer." Thomas Aquinas presented it in his fifth proof of God's existence as a syllogism. In 1802, William Paley's Natural Theology presented examples of intricate purpose in organisms. His version of the watchmaker analogy argued that, in the same way that a watch has evidently been designed by a craftsman, complexity and adaptation seen in nature must have been designed, and the perfection and diversity of these designs shows the designer to be omnipotent, the Christian God. Like creation science, intelligent design centers on Paley's religious argument from design, but while Paley's natural theology was open to deistic design through God-given laws, intelligent design seeks scientific confirmation of repeated miraculous interventions in the history of life. Creation science prefigured the intelligent design arguments of irreducible complexity, even featuring the bacterial flagellum. In the United States, attempts to introduce creation science in schools led to court rulings that it is religious in nature, and thus cannot be taught in public school science classrooms. Intelligent design is also presented as science, and shares other arguments with creation science but avoids literal Biblical references to such things as the Flood story from the Book of Genesis or using Bible verses to age the Earth. Barbara Forrest writes that the intelligent design movement began in 1984 with the book The Mystery of Life's Origin: Reassessing Current Theories, co-written by creationist Charles B. Thaxton, a chemist, with two other authors, and published by Jon A. Buell's Foundation for Thought and Ethics. In March 1986, Stephen C. Meyer published a review of the book, discussing how information theory could suggest that messages transmitted by DNA in the cell show "specified complexity" specified by intelligence, and must have originated with an intelligent agent. He also argued that science is based upon "foundational assumptions" of naturalism which were as much a matter of faith as those of "creation theory". In November of that year, Thaxton described his reasoning as a more sophisticated form of Paley's argument from design. At the "Sources of Information Content in DNA" conference which Thaxton held in 1988, he said that his intelligent cause view was compatible with both metaphysical naturalism and supernaturalism. Intelligent design avoids identifying or naming the intelligent designer—it merely states that one (or more) must exist—but leaders of the movement have said the designer is the Christian God. Whether this lack of specificity about the designer's identity in public discussions is a genuine feature of the concept, or just a posture taken to avoid alienating those who would separate religion from the teaching of science, has been a matter of great debate between supporters and critics of intelligent design. The Kitzmiller v. Dover Area School District court ruling held the latter to be the case. Origin of the term Since the Middle Ages, discussion of the religious "argument from design" or "teleological argument" in theology, with its concept of "intelligent design", has persistently referred to the theistic Creator God. Although ID proponents chose this provocative label for their proposed alternative to evolutionary explanations, they have de-emphasized their religious antecedents and denied that ID is natural theology, while still presenting ID as supporting the argument for the existence of God. While intelligent design proponents have pointed out past examples of the phrase intelligent design that they said were not creationist and faith-based, they have failed to show that these usages had any influence on those who introduced the label in the intelligent design movement. Variations on the phrase appeared in Young Earth creationist publications: a 1967 book co-written by Percival Davis referred to "design according to which basic organisms were created". In 1970, A. E. Wilder-Smith published The Creation of Life: A Cybernetic Approach to Evolution which defended Paley's design argument with computer calculations of the improbability of genetic sequences, which he said could not be explained by evolution but required "the abhorred necessity of divine intelligent activity behind nature", and that "the same problem would be expected to beset the relationship between the designer behind nature and the intelligently designed part of nature known as man." In a 1984 article as well as in his affidavit to Edwards v. Aguillard, Dean H. Kenyon defended creation science by stating that "biomolecular systems require intelligent design and engineering know-how", citing Wilder-Smith. Creationist Richard B. Bliss used the phrase "creative design" in Origins: Two Models: Evolution, Creation (1976), and in Origins: Creation or Evolution (1988) wrote that "while evolutionists are trying to find non-intelligent ways for life to occur, the creationist insists that an intelligent design must have been there in the first place." The first systematic use of the term, defined in a glossary and claimed to be other than creationism, was in Of Pandas and People, co-authored by Davis and Kenyon. Of Pandas and People The most common modern use of the words "intelligent design" as a term intended to describe a field of inquiry began after the United States Supreme Court ruled in June 1987 in the case of Edwards v. Aguillard that it is unconstitutional for a state to require the teaching of creationism in public school science curricula. A Discovery Institute report says that Charles B. Thaxton, editor of Pandas, had picked the phrase up from a NASA scientist, and thought, "That's just what I need, it's a good engineering term." In two successive 1987 drafts of the book, over one hundred uses of the root word "creation", such as "creationism" and "Creation Science", were changed, almost without exception, to "intelligent design", while "creationists" was changed to "design proponents" or, in one instance, "cdesign proponentsists". In June 1988, Thaxton held a conference titled "Sources of Information Content in DNA" in Tacoma, Washington. Stephen C. Meyer was at the conference, and later recalled that "The term intelligent design came up..." In December 1988 Thaxton decided to use the label "intelligent design" for his new creationist movement. Of Pandas and People was published in 1989, and in addition to including all the current arguments for ID, was the first book to make systematic use of the terms "intelligent design" and "design proponents" as well as the phrase "design theory", defining the term intelligent design in a glossary and representing it as not being creationism. It thus represents the start of the modern intelligent design movement. "Intelligent design" was the most prominent of around fifteen new terms it introduced as a new lexicon of creationist terminology to oppose evolution without using religious language. It was the first place where the phrase "intelligent design" appeared in its primary present use, as stated both by its publisher Jon A. Buell, and by William A. Dembski in his expert witness report for Kitzmiller v. Dover Area School District. The National Center for Science Education (NCSE) has criticized the book for presenting all of the basic arguments of intelligent design proponents and being actively promoted for use in public schools before any research had been done to support these arguments. Although presented as a scientific textbook, philosopher of science Michael Ruse considers the contents "worthless and dishonest". An American Civil Liberties Union lawyer described it as a political tool aimed at students who did not "know science or understand the controversy over evolution and creationism". One of the authors of the science framework used by California schools, Kevin Padian, condemned it for its "sub-text", "intolerance for honest science" and "incompetence". Concepts Irreducible complexity The term "irreducible complexity" was introduced by biochemist Michael Behe in his 1996 book Darwin's Black Box, though he had already described the concept in his contributions to the 1993 revised edition of Of Pandas and People. Behe defines it as "a single system which is composed of several well-matched interacting parts that contribute to the basic function, wherein the removal of any one of the parts causes the system to effectively cease functioning". Behe uses the analogy of a mousetrap to illustrate this concept. A mousetrap consists of several interacting pieces—the base, the catch, the spring and the hammer—all of which must be in place for the mousetrap to work. Removal of any one piece destroys the function of the mousetrap. Intelligent design advocates assert that natural selection could not create irreducibly complex systems, because the selectable function is present only when all parts are assembled. Behe argued that irreducibly complex biological mechanisms include the bacterial flagellum of E. coli, the blood clotting cascade, cilia, and the adaptive immune system. Critics point out that the irreducible complexity argument assumes that the necessary parts of a system have always been necessary and therefore could not have been added sequentially. They argue that something that is at first merely advantageous can later become necessary as other components change. Furthermore, they argue, evolution often proceeds by altering preexisting parts or by removing them from a system, rather than by adding them. This is sometimes called the "scaffolding objection" by an analogy with scaffolding, which can support an "irreducibly complex" building until it is complete and able to stand on its own. Behe has acknowledged using "sloppy prose", and that his "argument against Darwinism does not add up to a logical proof." Irreducible complexity has remained a popular argument among advocates of intelligent design; in the Dover trial, the court held that "Professor Behe's claim for irreducible complexity has been refuted in peer-reviewed research papers and has been rejected by the scientific community at large." Specified complexity In 1986, Charles B. Thaxton, a physical chemist and creationist, used the term "specified complexity" from information theory when claiming that messages transmitted by DNA in the cell were specified by intelligence, and must have originated with an intelligent agent. The intelligent design concept of "specified complexity" was developed in the 1990s by mathematician, philosopher, and theologian William A. Dembski. Dembski states that when something exhibits specified complexity (i.e., is both complex and "specified", simultaneously), one can infer that it was produced by an intelligent cause (i.e., that it was designed) rather than being the result of natural processes. He provides the following examples: "A single letter of the alphabet is specified without being complex. A long sentence of random letters is complex without being specified. A Shakespearean sonnet is both complex and specified." He states that details of living things can be similarly characterized, especially the "patterns" of molecular sequences in functional biological molecules such as DNA. Dembski defines complex specified information (CSI) as anything with a less than 1 in 10150 chance of occurring by (natural) chance. Critics say that this renders the argument a tautology: complex specified information cannot occur naturally because Dembski has defined it thus, so the real question becomes whether or not CSI actually exists in nature. The conceptual soundness of Dembski's specified complexity/CSI argument has been discredited in the scientific and mathematical communities. Specified complexity has yet to be shown to have wide applications in other fields, as Dembski asserts. John Wilkins and Wesley R. Elsberry characterize Dembski's "explanatory filter" as eliminative because it eliminates explanations sequentially: first regularity, then chance, finally defaulting to design. They argue that this procedure is flawed as a model for scientific inference because the asymmetric way it treats the different possible explanations renders it prone to making false conclusions. Richard Dawkins, another critic of intelligent design, argues in The God Delusion (2006) that allowing for an intelligent designer to account for unlikely complexity only postpones the problem, as such a designer would need to be at least as complex. Other scientists have argued that evolution through selection is better able to explain the observed complexity, as is evident from the use of selective evolution to design certain electronic, aeronautic and automotive systems that are considered problems too complex for human "intelligent designers". Fine-tuned universe Intelligent design proponents have also occasionally appealed to broader teleological arguments outside of biology, most notably an argument based on the fine-tuning of universal constants that make matter and life possible and which are argued not to be solely attributable to chance. These include the values of fundamental physical constants, the relative strength of nuclear forces, electromagnetism, and gravity between fundamental particles, as well as the ratios of masses of such particles. Intelligent design proponent and Center for Science and Culture fellow Guillermo Gonzalez argues that if any of these values were even slightly different, the universe would be dramatically different, making it impossible for many chemical elements and features of the Universe, such as galaxies, to form. Thus, proponents argue, an intelligent designer of life was needed to ensure that the requisite features were present to achieve that particular outcome. Scientists have generally responded that these arguments are poorly supported by existing evidence. Victor J. Stenger and other critics say both intelligent design and the weak form of the anthropic principle are essentially a tautology; in his view, these arguments amount to the claim that life is able to exist because the Universe is able to support life. The claim of the improbability of a life-supporting universe has also been criticized as an argument by lack of imagination for assuming no other forms of life are possible. Life as we know it might not exist if things were different, but a different sort of life might exist in its place. A number of critics also suggest that many of the stated variables appear to be interconnected and that calculations made by mathematicians and physicists suggest that the emergence of a universe similar to ours is quite probable. Intelligent designer The contemporary intelligent design movement formulates its arguments in secular terms and intentionally avoids identifying the intelligent agent (or agents) they posit. Although they do not state that God is the designer, the designer is often implicitly hypothesized to have intervened in a way that only a god could intervene. Dembski, in The Design Inference (1998), speculates that an alien culture could fulfill these requirements. Of Pandas and People proposes that SETI illustrates an appeal to intelligent design in science. In 2000, philosopher of science Robert T. Pennock suggested the Raëlian UFO religion as a real-life example of an extraterrestrial intelligent designer view that "make[s] many of the same bad arguments against evolutionary theory as creationists". The authoritative description of intelligent design, however, explicitly states that the Universe displays features of having been designed. Acknowledging the paradox, Dembski concludes that "no intelligent agent who is strictly physical could have presided over the origin of the universe or the origin of life." The leading proponents have made statements to their supporters that they believe the designer to be the Christian God, to the exclusion of all other religions. Beyond the debate over whether intelligent design is scientific, a number of critics argue that existing evidence makes the design hypothesis appear unlikely, irrespective of its status in the world of science. For example, Jerry Coyne asks why a designer would "give us a pathway for making vitamin C, but then destroy it by disabling one of its enzymes" (see pseudogene) and why a designer would not "stock oceanic islands with reptiles, mammals, amphibians, and freshwater fish, despite the suitability of such islands for these species". Coyne also points to the fact that "the flora and fauna on those islands resemble that of the nearest mainland, even when the environments are very different" as evidence that species were not placed there by a designer. Previously, in Darwin's Black Box, Behe had argued that we are simply incapable of understanding the designer's motives, so such questions cannot be answered definitively. Odd designs could, for example, "...have been placed there by the designer for a reason—for artistic reasons, for variety, to show off, for some as-yet-undetected practical purpose, or for some unguessable reason—or they might not." Coyne responds that in light of the evidence, "either life resulted not from intelligent design, but from evolution; or the intelligent designer is a cosmic prankster who designed everything to make it look as though it had evolved." Intelligent design proponents such as Paul Nelson avoid the problem of poor design in nature by insisting that we have simply failed to understand the perfection of the design. Behe cites Paley as his inspiration, but he differs from Paley's expectation of a perfect Creation and proposes that designers do not necessarily produce the best design they can. Behe suggests that, like a parent not wanting to spoil a child with extravagant toys, the designer can have multiple motives for not giving priority to excellence in engineering. He says that "Another problem with the argument from imperfection is that it critically depends on a psychoanalysis of the unidentified designer. Yet the reasons that a designer would or would not do anything are virtually impossible to know unless the designer tells you specifically what those reasons are." This reliance on inexplicable motives of the designer makes intelligent design scientifically untestable. Retired UC Berkeley law professor, author and intelligent design advocate Phillip E. Johnson puts forward a core definition that the designer creates for a purpose, giving the example that in his view AIDS was created to punish immorality and is not caused by HIV, but such motives cannot be tested by scientific methods. Asserting the need for a designer of complexity also raises the question "What designed the designer?" Intelligent design proponents say that the question is irrelevant to or outside the scope of intelligent design. Richard Wein counters that "...scientific explanations often create new unanswered questions. But, in assessing the value of an explanation, these questions are not irrelevant. They must be balanced against the improvements in our understanding which the explanation provides. Invoking an unexplained being to explain the origin of other beings (ourselves) is little more than question-begging. The new question raised by the explanation is as problematic as the question which the explanation purports to answer." Richard Dawkins sees the assertion that the designer does not need to be explained as a thought-terminating cliché. In the absence of observable, measurable evidence, the very question "What designed the designer?" leads to an infinite regression from which intelligent design proponents can only escape by resorting to religious creationism or logical contradiction. Movement The intelligent design movement is a direct outgrowth of the creationism of the 1980s. The scientific and academic communities, along with a U.S. federal court, view intelligent design as either a form of creationism or as a direct descendant that is closely intertwined with traditional creationism; and several authors explicitly refer to it as "intelligent design creationism". The movement is headquartered in the Center for Science and Culture, established in 1996 as the creationist wing of the Discovery Institute to promote a religious agenda calling for broad social, academic and political changes. The Discovery Institute's intelligent design campaigns have been staged primarily in the United States, although efforts have been made in other countries to promote intelligent design. Leaders of the movement say intelligent design exposes the limitations of scientific orthodoxy and of the secular philosophy of naturalism. Intelligent design proponents allege that science should not be limited to naturalism and should not demand the adoption of a naturalistic philosophy that dismisses out-of-hand any explanation that includes a supernatural cause. The overall goal of the movement is to "reverse the stifling dominance of the materialist worldview" represented by the theory of evolution in favor of "a science consonant with Christian and theistic convictions". Phillip E. Johnson stated that the goal of intelligent design is to cast creationism as a scientific concept. All leading intelligent design proponents are fellows or staff of the Discovery Institute and its Center for Science and Culture. Nearly all intelligent design concepts and the associated movement are the products of the Discovery Institute, which guides the movement and follows its wedge strategy while conducting its "Teach the Controversy" campaign and their other related programs. Leading intelligent design proponents have made conflicting statements regarding intelligent design. In statements directed at the general public, they say intelligent design is not religious; when addressing conservative Christian supporters, they state that intelligent design has its foundation in the Bible. Recognizing the need for support, the Institute affirms its Christian, evangelistic orientation: Barbara Forrest, an expert who has written extensively on the movement, describes this as being due to the Discovery Institute's obfuscating its agenda as a matter of policy. She has written that the movement's "activities betray an aggressive, systematic agenda for promoting not only intelligent design creationism, but the religious worldview that undergirds it." Religion and leading proponents Although arguments for intelligent design by the intelligent design movement are formulated in secular terms and intentionally avoid positing the identity of the designer, the majority of principal intelligent design advocates are publicly religious Christians who have stated that, in their view, the designer proposed in intelligent design is the Christian conception of God. Stuart Burgess, Phillip E. Johnson, William A. Dembski, and Stephen C. Meyer are evangelical Protestants; Michael Behe is a Roman Catholic; Paul Nelson supports young Earth creationism; and Jonathan Wells is a member of the Unification Church. Non-Christian proponents include David Klinghoffer, who is Jewish, Michael Denton and David Berlinski, who are agnostic, and Muzaffar Iqbal, a Pakistani-Canadian Muslim. Phillip E. Johnson has stated that cultivating ambiguity by employing secular language in arguments that are carefully crafted to avoid overtones of theistic creationism is a necessary first step for ultimately reintroducing the Christian concept of God as the designer. Johnson explicitly calls for intelligent design proponents to obfuscate their religious motivations so as to avoid having intelligent design identified "as just another way of packaging the Christian evangelical message." Johnson emphasizes that "...the first thing that has to be done is to get the Bible out of the discussion. ...This is not to say that the biblical issues are unimportant; the point is rather that the time to address them will be after we have separated materialist prejudice from scientific fact." The strategy of deliberately disguising the religious intent of intelligent design has been described by William A. Dembski in The Design Inference. In this work, Dembski lists a god or an "alien life force" as two possible options for the identity of the designer; however, in his book Intelligent Design: The Bridge Between Science and Theology (1999), Dembski states: Dembski also stated, "ID is part of God's general revelation [...] Not only does intelligent design rid us of this ideology materialism , which suffocates the human spirit, but, in my personal experience, I've found that it opens the path for people to come to Christ." Both Johnson and Dembski cite the Bible's Gospel of John as the foundation of intelligent design. Barbara Forrest contends such statements reveal that leading proponents see intelligent design as essentially religious in nature, not merely a scientific concept that has implications with which their personal religious beliefs happen to coincide. She writes that the leading proponents of intelligent design are closely allied with the ultra-conservative Christian Reconstructionism movement. She lists connections of (current and former) Discovery Institute Fellows Phillip E. Johnson, Charles B. Thaxton, Michael Behe, Richard Weikart, Jonathan Wells and Francis J. Beckwith to leading Christian Reconstructionist organizations, and the extent of the funding provided the Institute by Howard Ahmanson, Jr., a leading figure in the Reconstructionist movement. Reaction from other creationist groups Not all creationist organizations have embraced the intelligent design movement. According to Thomas Dixon, "Religious leaders have come out against ID too. An open letter affirming the compatibility of Christian faith and the teaching of evolution, first produced in response to controversies in Wisconsin in 2004, has now been signed by over ten thousand clergy from different Christian denominations across America." Hugh Ross of Reasons to Believe, a proponent of Old Earth creationism, believes that the efforts of intelligent design proponents to divorce the concept from Biblical Christianity make its hypothesis too vague. In 2002, he wrote: "Winning the argument for design without identifying the designer yields, at best, a sketchy origins model. Such a model makes little if any positive impact on the community of scientists and other scholars. [...] ...the time is right for a direct approach, a single leap into the origins fray. Introducing a biblically based, scientifically verifiable creation model represents such a leap." Likewise, two of the most prominent YEC organizations in the world have attempted to distinguish their views from those of the intelligent design movement. Henry M. Morris of the Institute for Creation Research (ICR) wrote, in 1999, that ID, "even if well-meaning and effectively articulated, will not work! It has often been tried in the past and has failed, and it will fail today. The reason it won't work is because it is not the Biblical method." According to Morris: "The evidence of intelligent design ... must be either followed by or accompanied by a sound presentation of true Biblical creationism if it is to be meaningful and lasting." In 2002, Carl Wieland, then of Answers in Genesis (AiG), criticized design advocates who, though well-intentioned, "'left the Bible out of it'" and thereby unwittingly aided and abetted the modern rejection of the Bible. Wieland explained that "AiG's major 'strategy' is to boldly, but humbly, call the church back to its Biblical foundations ... [so] we neither count ourselves a part of this movement nor campaign against it." Reaction from the scientific community The unequivocal consensus in the scientific community is that intelligent design is not science and has no place in a science curriculum. The U.S. National Academy of Sciences has stated that "creationism, intelligent design, and other claims of supernatural intervention in the origin of life or of species are not science because they are not testable by the methods of science." The U.S. National Science Teachers Association and the American Association for the Advancement of Science have termed it pseudoscience. Others in the scientific community have denounced its tactics, accusing the ID movement of manufacturing false attacks against evolution, of engaging in misinformation and misrepresentation about science, and marginalizing those who teach it. More recently, in September 2012, Bill Nye warned that creationist views threaten science education and innovations in the United States. In 2001, the Discovery Institute published advertisements under the heading "A Scientific Dissent From Darwinism", with the claim that listed scientists had signed this statement expressing skepticism: The ambiguous statement did not exclude other known evolutionary mechanisms, and most signatories were not scientists in relevant fields, but starting in 2004 the Institute claimed the increasing number of signatures indicated mounting doubts about evolution among scientists. The statement formed a key component of Discovery Institute campaigns to present intelligent design as scientifically valid by claiming that evolution lacks broad scientific support, with Institute members continued to cite the list through at least 2011. As part of a strategy to counter these claims, scientists organised Project Steve, which gained more signatories named Steve (or variants) than the Institute's petition, and a counter-petition, "A Scientific Support for Darwinism", which quickly gained similar numbers of signatories. Polls Several surveys were conducted prior to the December 2005 decision in Kitzmiller v. Dover School District, which sought to determine the level of support for intelligent design among certain groups. According to a 2005 Harris poll, 10% of adults in the United States viewed human beings as "so complex that they required a powerful force or intelligent being to help create them." Although Zogby polls commissioned by the Discovery Institute show more support, these polls suffer from considerable flaws, such as having a very low response rate (248 out of 16,000), being conducted on behalf of an organization with an expressed interest in the outcome of the poll, and containing leading questions. The 2017 Gallup creationism survey found that 38% of adults in the United States hold the view that "God created humans in their present form at one time within the last 10,000 years" when asked for their views on the origin and development of human beings, which was noted as being at the lowest level in 35 years. Previously, a series of Gallup polls in the United States from 1982 through 2014 on "Evolution, Creationism, Intelligent Design" found support for "human beings have developed over millions of years from less advanced formed of life, but God guided the process" of between 31% and 40%, support for "God created human beings in pretty much their present form at one time within the last 10,000 years or so" varied from 40% to 47%, and support for "human beings have developed over millions of years from less advanced forms of life, but God had no part in the process" varied from 9% to 19%. The polls also noted answers to a series of more detailed questions. Allegations of discrimination against ID proponents There have been allegations that ID proponents have met discrimination, such as being refused tenure or being harshly criticized on the Internet. In the documentary film Expelled: No Intelligence Allowed, released in 2008, host Ben Stein presents five such cases. The film contends that the mainstream science establishment, in a "scientific conspiracy to keep God out of the nation's laboratories and classrooms", suppresses academics who believe they see evidence of intelligent design in nature or criticize evidence of evolution. Investigation into these allegations turned up alternative explanations for perceived persecution. The film portrays intelligent design as motivated by science, rather than religion, though it does not give a detailed definition of the phrase or attempt to explain it on a scientific level. Other than briefly addressing issues of irreducible complexity, Expelled examines it as a political issue. The scientific theory of evolution is portrayed by the film as contributing to fascism, the Holocaust, communism, atheism, and eugenics. Expelled has been used in private screenings to legislators as part of the Discovery Institute intelligent design campaign for Academic Freedom bills. Review screenings were restricted to churches and Christian groups, and at a special pre-release showing, one of the interviewees, PZ Myers, was refused admission. The American Association for the Advancement of Science describes the film as dishonest and divisive propaganda aimed at introducing religious ideas into public school science classrooms, and the Anti-Defamation League has denounced the film's allegation that evolutionary theory influenced the Holocaust. The film includes interviews with scientists and academics who were misled into taking part by misrepresentation of the topic and title of the film. Skeptic Michael Shermer describes his experience of being repeatedly asked the same question without context as "surreal". Criticism Scientific criticism Advocates of intelligent design seek to keep God and the Bible out of the discussion, and present intelligent design in the language of science as though it were a scientific hypothesis. For a theory to qualify as scientific, it is expected to be: Consistent Parsimonious (sparing in its proposed entities or explanations; see Occam's razor) Useful (describes and explains observed phenomena, and can be used in a predictive manner) Empirically testable and falsifiable (potentially confirmable or disprovable by experiment or observation) Based on multiple observations (often in the form of controlled, repeated experiments) Correctable and dynamic (modified in the light of observations that do not support it) Progressive (refines previous theories) Provisional or tentative (is open to experimental checking, and does not assert certainty) For any theory, hypothesis, or conjecture to be considered scientific, it must meet most, and ideally all, of these criteria. The fewer criteria are met, the less scientific it is; if it meets only a few or none at all, then it cannot be treated as scientific in any meaningful sense of the word. Typical objections to defining intelligent design as science are that it lacks consistency, violates the principle of parsimony, is not scientifically useful, is not falsifiable, is not empirically testable, and is not correctable, dynamic, progressive, or provisional. Intelligent design proponents seek to change this fundamental basis of science by eliminating "methodological naturalism" from science and replacing it with what the leader of the intelligent design movement, Phillip E. Johnson, calls "theistic realism". Intelligent design proponents argue that naturalistic explanations fail to explain certain phenomena and that supernatural explanations provide a very simple and intuitive explanation for the origins of life and the universe. Many intelligent design followers believe that "scientism" is itself a religion that promotes secularism and materialism in an attempt to erase theism from public life, and they view their work in the promotion of intelligent design as a way to return religion to a central role in education and other public spheres. It has been argued that methodological naturalism is not an assumption of science, but a result of science well done: the God explanation is the least parsimonious, so according to Occam's razor, it cannot be a scientific explanation. The failure to follow the procedures of scientific discourse and the failure to submit work to the scientific community that withstands scrutiny have weighed against intelligent design being accepted as valid science. The intelligent design movement has not published a properly peer-reviewed article supporting ID in a scientific journal, and has failed to publish supporting peer-reviewed research or data. The only article published in a peer-reviewed scientific journal that made a case for intelligent design was quickly withdrawn by the publisher for having circumvented the journal's peer-review standards. The Discovery Institute says that a number of intelligent design articles have been published in peer-reviewed journals, but critics, largely members of the scientific community, reject this claim and state intelligent design proponents have set up their own journals with peer review that lack impartiality and rigor, consisting entirely of intelligent design supporters. Further criticism stems from the fact that the phrase intelligent design makes use of an assumption of the quality of an observable intelligence, a concept that has no scientific consensus definition. The characteristics of intelligence are assumed by intelligent design proponents to be observable without specifying what the criteria for the measurement of intelligence should be. Critics say that the design detection methods proposed by intelligent design proponents are radically different from conventional design detection, undermining the key elements that make it possible as legitimate science. Intelligent design proponents, they say, are proposing both searching for a designer without knowing anything about that designer's abilities, parameters, or intentions (which scientists do know when searching for the results of human intelligence), as well as denying the very distinction between natural/artificial design that allows scientists to compare complex designed artifacts against the background of the sorts of complexity found in nature. Among a significant proportion of the general public in the United States, the major concern is whether conventional evolutionary biology is compatible with belief in God and in the Bible, and how this issue is taught in schools. The Discovery Institute's "Teach the Controversy" campaign promotes intelligent design while attempting to discredit evolution in United States public high school science courses. The scientific community and science education organizations have replied that there is no scientific controversy regarding the validity of evolution and that the controversy exists solely in terms of religion and politics. Arguments from ignorance Eugenie C. Scott, along with Glenn Branch and other critics, has argued that many points raised by intelligent design proponents are arguments from ignorance. In the argument from ignorance, a lack of evidence for one view is erroneously argued to constitute proof of the correctness of another view. Scott and Branch say that intelligent design is an argument from ignorance because it relies on a lack of knowledge for its conclusion: lacking a natural explanation for certain specific aspects of evolution, we assume intelligent cause. They contend most scientists would reply that the unexplained is not unexplainable, and that "we don't know yet" is a more appropriate response than invoking a cause outside science. Particularly, Michael Behe's demands for ever more detailed explanations of the historical evolution of molecular systems seem to assume a false dichotomy, where either evolution or design is the proper explanation, and any perceived failure of evolution becomes a victory for design. Scott and Branch also contend that the supposedly novel contributions proposed by intelligent design proponents have not served as the basis for any productive scientific research. In his conclusion to the Kitzmiller trial, Judge John E. Jones III wrote that "ID is at bottom premised upon a false dichotomy, namely, that to the extent evolutionary theory is discredited, ID is confirmed." This same argument had been put forward to support creation science at the McLean v. Arkansas (1982) trial, which found it was "contrived dualism", the false premise of a "two model approach". Behe's argument of irreducible complexity puts forward negative arguments against evolution but does not make any positive scientific case for intelligent design. It fails to allow for scientific explanations continuing to be found, as has been the case with several examples previously put forward as supposed cases of irreducible complexity. Possible theological implications Intelligent design proponents often insist that their claims do not require a religious component. However, various philosophical and theological issues are naturally raised by the claims of intelligent design. Intelligent design proponents attempt to demonstrate scientifically that features such as irreducible complexity and specified complexity could not arise through natural processes, and therefore required repeated direct miraculous interventions by a Designer (often a Christian concept of God). They reject the possibility of a Designer who works merely through setting natural laws in motion at the outset, in contrast to theistic evolution (to which even Charles Darwin was open). Intelligent design is distinct because it asserts repeated miraculous interventions in addition to designed laws. This contrasts with other major religious traditions of a created world in which God's interactions and influences do not work in the same way as physical causes. The Roman Catholic tradition makes a careful distinction between ultimate metaphysical explanations and secondary, natural causes. The concept of direct miraculous intervention raises other potential theological implications. If such a Designer does not intervene to alleviate suffering even though capable of intervening for other reasons, some imply the designer is not omnibenevolent (see problem of evil and related theodicy). Further, repeated interventions imply that the original design was not perfect and final, and thus pose a problem for any who believe that the Creator's work had been both perfect and final. Intelligent design proponents seek to explain the problem of poor design in nature by insisting that we have simply failed to understand the perfection of the design (for example, proposing that vestigial organs have unknown purposes), or by proposing that designers do not necessarily produce the best design they can, and may have unknowable motives for their actions. In 2005, the director of the Vatican Observatory, the Jesuit astronomer George Coyne, set out theological reasons for accepting evolution in an August 2005 article in The Tablet, and said that "Intelligent design isn't science even though it pretends to be". It should not be included in the science curriculum for public schools. "If you want to teach it in schools, intelligent design should be taught when religion or cultural history is taught, not science." In 2006, he "condemned ID as a kind of ‘crude creationism’ which reduced God to a mere engineer." Critics state that the wedge strategy's "ultimate goal is to create a theocratic state". God of the gaps Intelligent design has also been characterized as a God-of-the-gaps argument, which has the following form: There is a gap in scientific knowledge. The gap is filled with acts of God (or intelligent designer) and therefore proves the existence of God (or intelligent designer). A God-of-the-gaps argument is the theological version of an argument from ignorance. A key feature of this type of argument is that it merely answers outstanding questions with explanations (often supernatural) that are unverifiable and ultimately themselves subject to unanswerable questions. Historians of science observe that the astronomy of the earliest civilizations, although astonishing and incorporating mathematical constructions far in excess of any practical value, proved to be misdirected and of little importance to the development of science because they failed to inquire more carefully into the mechanisms that drove the heavenly bodies across the sky. It was the Greek civilization that first practiced science, although not yet as a formally defined experimental science, but nevertheless an attempt to rationalize the world of natural experience without recourse to divine intervention. In this historically motivated definition of science any appeal to an intelligent creator is explicitly excluded for the paralysing effect it may have on scientific progress. Legal challenges in the United States Kitzmiller trial Kitzmiller v. Dover Area School District was the first direct challenge brought in the United States federal courts against a public school district that required the presentation of intelligent design as an alternative to evolution. The plaintiffs successfully argued that intelligent design is a form of creationism, and that the school board policy thus violated the Establishment Clause of the First Amendment to the United States Constitution. Eleven parents of students in Dover, Pennsylvania, sued the Dover Area School District over a statement that the school board required be read aloud in ninth-grade science classes when evolution was taught. The plaintiffs were represented by the American Civil Liberties Union (ACLU), Americans United for Separation of Church and State (AU) and Pepper Hamilton LLP. The National Center for Science Education acted as consultants for the plaintiffs. The defendants were represented by the Thomas More Law Center. The suit was tried in a bench trial from September 26 to November 4, 2005, before Judge John E. Jones III. Kenneth R. Miller, Kevin Padian, Brian Alters, Robert T. Pennock, Barbara Forrest and John F. Haught served as expert witnesses for the plaintiffs. Michael Behe, Steve Fuller and Scott Minnich served as expert witnesses for the defense. On December 20, 2005, Judge Jones issued his 139-page findings of fact and decision, ruling that the Dover mandate was unconstitutional, and barring intelligent design from being taught in Pennsylvania's Middle District public school science classrooms. On November 8, 2005, there had been an election in which the eight Dover school board members who voted for the intelligent design requirement were all defeated by challengers who opposed the teaching of intelligent design in a science class, and the current school board president stated that the board did not intend to appeal the ruling. In his finding of facts, Judge Jones made the following condemnation of the "Teach the Controversy" strategy: Reaction to Kitzmiller ruling Judge Jones himself anticipated that his ruling would be criticized, saying in his decision that: As Jones had predicted, John G. West, Associate Director of the Center for Science and Culture, said: Newspapers have noted that the judge is "a Republican and a churchgoer". The decision has been examined in a search for flaws and conclusions, partly by intelligent design supporters aiming to avoid future defeats in court. In its Winter issue of 2007, the Montana Law Review published three articles. In the first, David K. DeWolf, John G. West and Casey Luskin, all of the Discovery Institute, argued that intelligent design is a valid scientific theory, the Jones court should not have addressed the question of whether it was a scientific theory, and that the Kitzmiller decision will have no effect at all on the development and adoption of intelligent design as an alternative to standard evolutionary theory. In the second Peter H. Irons responded, arguing that the decision was extremely well reasoned and spells the death knell for the intelligent design efforts to introduce creationism in public schools, while in the third, DeWolf, et al., answer the points made by Irons. However, fear of a similar lawsuit has resulted in other school boards abandoning intelligent design "teach the controversy" proposals. Anti-evolution legislation A number of anti-evolution bills have been introduced in the United States Congress and State legislatures since 2001, based largely upon language drafted by the Discovery Institute for the Santorum Amendment. Their aim has been to expose more students to articles and videos produced by advocates of intelligent design that criticise evolution. They have been presented as supporting "academic freedom", on the supposition that teachers, students, and college professors face intimidation and retaliation when discussing scientific criticisms of evolution, and therefore require protection. Critics of the legislation have pointed out that there are no credible scientific critiques of evolution, and an investigation in Florida of allegations of intimidation and retaliation found no evidence that it had occurred. The vast majority of the bills have been unsuccessful, with the one exception being Louisiana's Louisiana Science Education Act, which was enacted in 2008. In April 2010, the American Academy of Religion issued Guidelines for Teaching About Religion in K‐12 Public Schools in the United States, which included guidance that creation science or intelligent design should not be taught in science classes, as "Creation science and intelligent design represent worldviews that fall outside of the realm of science that is defined as (and limited to) a method of inquiry based on gathering observable and measurable evidence subject to specific principles of reasoning." However, these worldviews as well as others "that focus on speculation regarding the origins of life represent another important and relevant form of human inquiry that is appropriately studied in literature or social sciences courses. Such study, however, must include a diversity of worldviews representing a variety of religious and philosophical perspectives and must avoid privileging one view as more legitimate than others." Status outside the United States Europe In June 2007, the Council of Europe's Committee on Culture, Science and Education issued a report, The dangers of creationism in education, which states "Creationism in any of its forms, such as 'intelligent design', is not based on facts, does not use any scientific reasoning and its contents are pathetically inadequate for science classes." In describing the dangers posed to education by teaching creationism, it described intelligent design as "anti-science" and involving "blatant scientific fraud" and "intellectual deception" that "blurs the nature, objectives and limits of science" and links it and other forms of creationism to denialism. On October 4, 2007, the Council of Europe's Parliamentary Assembly approved a resolution stating that schools should "resist presentation of creationist ideas in any discipline other than religion", including "intelligent design", which it described as "the latest, more refined version of creationism", "presented in a more subtle way". The resolution emphasises that the aim of the report is not to question or to fight a belief, but to "warn against certain tendencies to pass off a belief as science". In the United Kingdom, public education includes religious education as a compulsory subject, and there are many faith schools that teach the ethos of particular denominations. When it was revealed that a group called Truth in Science had distributed DVDs produced by Illustra Media featuring Discovery Institute fellows making the case for design in nature, and claimed they were being used by 59 schools, the Department for Education and Skills (DfES) stated that "Neither creationism nor intelligent design are taught as a subject in schools, and are not specified in the science curriculum" (part of the National Curriculum, which does not apply to independent schools or to education in Scotland). The DfES subsequently stated that "Intelligent design is not a recognised scientific theory; therefore, it is not included in the science curriculum", but left the way open for it to be explored in religious education in relation to different beliefs, as part of a syllabus set by a local Standing Advisory Council on Religious Education. In 2006, the Qualifications and Curriculum Authority produced a "Religious Education" model unit in which pupils can learn about religious and nonreligious views about creationism, intelligent design and evolution by natural selection. On June 25, 2007, the UK Government responded to an e-petition by saying that creationism and intelligent design should not be taught as science, though teachers would be expected to answer pupils' questions within the standard framework of established scientific theories. Detailed government "Creationism teaching guidance" for schools in England was published on September 18, 2007. It states that "Intelligent design lies wholly outside of science", has no underpinning scientific principles, or explanations, and is not accepted by the science community as a whole. Though it should not be taught as science, "Any questions about creationism and intelligent design which arise in science lessons, for example as a result of media coverage, could provide the opportunity to explain or explore why they are not considered to be scientific theories and, in the right context, why evolution is considered to be a scientific theory." However, "Teachers of subjects such as RE, history or citizenship may deal with creationism and intelligent design in their lessons." The British Centre for Science Education lobbying group has the goal of "countering creationism within the UK" and has been involved in government lobbying in the UK in this regard. Northern Ireland's Department for Education says that the curriculum provides an opportunity for alternative theories to be taught. The Democratic Unionist Party (DUP)—which has links to fundamentalist Christianity—has been campaigning to have intelligent design taught in science classes. A DUP former Member of Parliament, David Simpson, has sought assurances from the education minister that pupils will not lose marks if they give creationist or intelligent design answers to science questions. In 2007, Lisburn city council voted in favor of a DUP recommendation to write to post-primary schools asking what their plans are to develop teaching material in relation to "creation, intelligent design and other theories of origin". Plans by Dutch Education Minister Maria van der Hoeven to "stimulate an academic debate" on the subject in 2005 caused a severe public backlash. After the 2006 elections, she was succeeded by Ronald Plasterk, described as a "molecular geneticist, staunch atheist and opponent of intelligent design". As a reaction on this situation in the Netherlands, the Director General of the Flemish Secretariat of Catholic Education () in Belgium, , declared that: "Catholic scientists already accepted the theory of evolution for a long time and that intelligent design and creationism doesn't belong in Flemish Catholic schools. It's not the tasks of the politics to introduce new ideas, that's task and goal of science." Australia The status of intelligent design in Australia is somewhat similar to that in the UK (see Education in Australia). In 2005, the Australian Minister for Education, Science and Training, Brendan Nelson, raised the notion of intelligent design being taught in science classes. The public outcry caused the minister to quickly concede that the correct forum for intelligent design, if it were to be taught, is in religion or philosophy classes. The Australian chapter of Campus Crusade for Christ distributed a DVD of the Discovery Institute's documentary Unlocking the Mystery of Life (2002) to Australian secondary schools. Tim Hawkes, the head of The King's School, one of Australia's leading private schools, supported use of the DVD in the classroom at the discretion of teachers and principals. Relation to Islam Muzaffar Iqbal, a notable Pakistani-Canadian Muslim, signed "A Scientific Dissent From Darwinism", a petition from the Discovery Institute. Ideas similar to intelligent design have been considered respected intellectual options among Muslims, and in Turkey many intelligent design books have been translated. In Istanbul in 2007, public meetings promoting intelligent design were sponsored by the local government, and David Berlinski of the Discovery Institute was the keynote speaker at a meeting in May 2007. Relation to ISKCON In 2011, the International Society for Krishna Consciousness (ISKCON) Bhaktivedanta Book Trust published an intelligent design book titled Rethinking Darwin: A Vedic Study of Darwinism and Intelligent Design. The book included contributions from intelligent design advocates William A. Dembski, Jonathan Wells and Michael Behe as well as from Hindu creationists Leif A. Jensen and Michael Cremo. See also Abiogenesis Buddhism and evolution Clockwork universe Creation and evolution in public education Day-age creationism Evolution as fact and theory Gap creationism Genetic entropy Haldane's dilemma Hindu views on evolution History of evolutionary thought History of the creation–evolution controversy Intelligent design in politics Intelligent design and science Intelligent falling International Society for Complexity, Information, and Design Islamic views on evolution Jainism and non-creationism List of topics characterized as pseudoscience List of works on intelligent design Materialism Modern evolutionary synthesis Naturalism (philosophy) Neo-creationism Neo-Darwinism Objections to evolution Philosophy of science Progressive creationism Raëlian intelligent design Santorum Amendment Scientific method Scientific skepticism Social Darwinism Sternberg peer review controversy "Strengths and weaknesses of evolution" The eclipse of Darwinism Unintelligent design Notes References Further reading Books The book is available in the PDF format from The Complete Work of Charles Darwin Online. Non-ID perspectives ACLU site on Intelligent Design "Are There Any Important Differences between Intelligent Design and Creationism?" by Jason Rosenhouse for the Committee for Skeptical Inquiry, February 24, 2006 "The Design Argument" (PDF) by Elliott Sober, 2004 "Design Arguments for the Existence of God" An entry in the Internet Encyclopedia of Philosophy (), founded by James Fieser "Intelligent Design?" Special report prepared by Richard Milner and Vittorio Maestro for Natural History magazine "Kitzmiller: An Intelligent Ruling on 'Intelligent Design'" by JURIST guest columnist Stephen G. Gey, December 29, 2005 Kitzmiller v. Dover Area School District (PDF) A 139-page in-depth opinion of intelligent design, irreducible complexity, and the book Of Pandas and People by U.S. District Judge John E. Jones III "Natural 'Knowledge' and Natural 'Design'" by Richard Dawkins, May 15, 2006 TalkOrigins Archive Archive of the Usenet discussion group talk.origins "What Is Intelligent Design Creationism?" National Center for Science Education, October 17, 2008 Media articles and audio video resources Arguments for the existence of God Creationist objections to evolution Denialism Theocracy
[ 0.5284734964370728, 0.5347571969032288, -0.6951183676719666, 0.5083321332931519, -0.01962745189666748, 0.22014401853084564, 0.17618975043296814, 0.47064143419265747, 0.4175700545310974, -0.2911794185638428, -0.34000450372695923, 0.5580607652664185, -0.670783519744873, 0.4565063714981079, ...
15302
https://en.wikipedia.org/wiki/Integrin
Integrin
Integrins are transmembrane receptors that facilitate cell-cell and cell-extracellular matrix (ECM) adhesion. Upon ligand binding, integrins activate signal transduction pathways that mediate cellular signals such as regulation of the cell cycle, organization of the intracellular cytoskeleton, and movement of new receptors to the cell membrane. The presence of integrins allows rapid and flexible responses to events at the cell surface (e.g. signal platelets to initiate an interaction with coagulation factors). Several types of integrins exist, and one cell generally has multiple different types on its surface. Integrins are found in all animals while integrin-like receptors are found in plant cells. Integrins work alongside other proteins such as cadherins, the immunoglobulin superfamily cell adhesion molecules, selectins and syndecans, to mediate cell–cell and cell–matrix interaction. Ligands for integrins include fibronectin, vitronectin, collagen and laminin. Structure Integrins are obligate heterodimers composed of α and β subunits. Several genes code for multiple isoforms of these subunits, which gives rise to an array of unique integrins with varied activity. In mammals, integrins are assembled from eighteen α and eight β subunits, in Drosophila five α and two β subunits, and in Caenorhabditis nematodes two α subunits and one β subunit. The α and β subunits are both class I transmembrane proteins, so each penetrates the plasma membrane once, and can possess several cytoplasmic domains. Variants of some subunits are formed by differential RNA splicing; for example, four variants of the beta-1 subunit exist. Through different combinations of the α and β subunits, 24 unique mammalian integrins are generated, excluding splice- and glycosylation variants. Integrin subunits span the cell membrane and have short cytoplasmic domains of 40–70 amino acids. The exception is the beta-4 subunit, which has a cytoplasmic domain of 1,088 amino acids, one of the largest of any membrane protein. Outside the cell membrane, the α and β chains lie close together along a length of about 23 nm; the final 5 nm N-termini of each chain forms a ligand-binding region for the ECM. They have been compared to lobster claws, although they don't actually "pinch" their ligand, they chemically interact with it at the insides of the "tips" of their "pinchers". The molecular mass of the integrin subunits can vary from 90 kDa to 160 kDa. Beta subunits have four cysteine-rich repeated sequences. Both α and β subunits bind several divalent cations. The role of divalent cations in the α subunit is unknown, but may stabilize the folds of the protein. The cations in the β subunits are more interesting: they are directly involved in coordinating at least some of the ligands that integrins bind. Integrins can be categorized in multiple ways. For example, some α chains have an additional structural element (or "domain") inserted toward the N-terminal, the alpha-A domain (so called because it has a similar structure to the A-domains found in the protein von Willebrand factor; it is also termed the α-I domain). Integrins carrying this domain either bind to collagens (e.g. integrins α1 β1, and α2 β1), or act as cell-cell adhesion molecules (integrins of the β2 family). This α-I domain is the binding site for ligands of such integrins. Those integrins that don't carry this inserted domain also have an A-domain in their ligand binding site, but this A-domain is found on the β subunit. In both cases, the A-domains carry up to three divalent cation binding sites. One is permanently occupied in physiological concentrations of divalent cations, and carries either a calcium or magnesium ion, the principal divalent cations in blood at median concentrations of 1.4 mM (calcium) and 0.8 mM (magnesium). The other two sites become occupied by cations when ligands bind—at least for those ligands involving an acidic amino acid in their interaction sites. An acidic amino acid features in the integrin-interaction site of many ECM proteins, for example as part of the amino acid sequence Arginine-Glycine-Aspartic acid ("RGD" in the one-letter amino acid code). Structure Despite many years of effort, discovering the high-resolution structure of integrins proved to be challenging, as membrane proteins are classically difficult to purify, and as integrins are large, complex and linked to many sugar trees ("highly glycosylated"). Low-resolution images of detergent extracts of intact integrin GPIIbIIIa, obtained using electron microscopy, and even data from indirect techniques that investigate the solution properties of integrins using ultracentrifugation and light scattering, were combined with fragmentary high-resolution crystallographic or NMR data from single or paired domains of single integrin chains, and molecular models postulated for the rest of the chains. The X-ray crystal structure obtained for the complete extracellular region of one integrin, αvβ3, shows the molecule to be folded into an inverted V-shape that potentially brings the ligand-binding sites close to the cell membrane. Perhaps more importantly, the crystal structure was also obtained for the same integrin bound to a small ligand containing the RGD-sequence, the drug cilengitide. As detailed above, this finally revealed why divalent cations (in the A-domains) are critical for RGD-ligand binding to integrins. The interaction of such sequences with integrins is believed to be a primary switch by which ECM exerts its effects on cell behaviour. The structure poses many questions, especially regarding ligand binding and signal transduction. The ligand binding site is directed towards the C-terminal of the integrin, the region where the molecule emerges from the cell membrane. If it emerges orthogonally from the membrane, the ligand binding site would apparently be obstructed, especially as integrin ligands are typically massive and well cross-linked components of the ECM. In fact, little is known about the angle that membrane proteins subtend to the plane of the membrane; this is a problem difficult to address with available technologies. The default assumption is that they emerge rather like little lollipops, but the evidence for this sweet supposition is noticeable by its absence. The integrin structure has drawn attention to this problem, which may have general implications for how membrane proteins work. It appears that the integrin transmembrane helices are tilted (see "Activation" below), which hints that the extracellular chains may also not be orthogonal with respect to the membrane surface. Although the crystal structure changed surprisingly little after binding to cilengitide, the current hypothesis is that integrin function involves changes in shape to move the ligand-binding site into a more accessible position, away from the cell surface, and this shape change also triggers intracellular signaling. There is a wide body of cell-biological and biochemical literature that supports this view. Perhaps the most convincing evidence involves the use of antibodies that only recognize integrins when they have bound to their ligands, or are activated. As the "footprint" that an antibody makes on its binding target is roughly a circle about 3 nm in diameter, the resolution of this technique is low. Nevertheless, these so-called LIBS (Ligand-Induced-Binding-Sites) antibodies unequivocally show that dramatic changes in integrin shape routinely occur. However, how the changes detected with antibodies look on the structure is still unknown. Activation When released into the cell membrane, newly synthesized integrin dimers are speculated to be found in the same "bent" conformation revealed by the structural studies described above. One school of thought claims that this bent form prevents them from interacting with their ligands, although bent forms can predominate in high-resolution EM structures of integrin bound to an ECM ligand. Therefore, at least in biochemical experiments, integrin dimers must apparently not be 'unbent' in order to prime them and allow their binding to the ECM. In cells, the priming is accomplished by a protein talin, which binds to the β tail of the integrin dimer and changes its conformation. The α and β integrin chains are both class-I transmembrane proteins: they pass the plasma membrane as single transmembrane alpha-helices. Unfortunately, the helices are too long, and recent studies suggest that, for integrin gpIIbIIIa, they are tilted with respect both to one another and to the plane of the membrane. Talin binding alters the angle of tilt of the β3 chain transmembrane helix in model systems and this may reflect a stage in the process of inside-out signalling which primes integrins. Moreover, talin proteins are able to dimerize and thus are thought to intervene in the clustering of integrin dimers which leads to the formation of a focal adhesion. Recently, the Kindlin-1 and Kindlin-2 proteins have also been found to interact with integrin and activate it. Function Integrins have two main functions, attachment of the cells to the ECM and signal transduction from the ECM to the cells. They are also involved in a wide range of other biological activities, including extravasation, cell-to-cell adhesion, cell migration, and as receptors for certain viruses, such as adenovirus, echovirus, hantavirus, and foot-and-mouth disease, polio virus and other viruses. A prominent function of the integrins is seen in the molecule GpIIb/IIIa, an integrin on the surface of blood platelets (thrombocytes) responsible for attachment to fibrin within a developing blood clot. This molecule dramatically increases its binding affinity for fibrin/fibrinogen through association of platelets with exposed collagens in the wound site. Upon association of platelets with collagen, GPIIb/IIIa changes shape, allowing it to bind to fibrin and other blood components to form the clot matrix and stop blood loss. Attachment of cell to the ECM Integrins couple the ECM outside a cell to the cytoskeleton (in particular, the microfilaments) inside the cell. Which ligand in the ECM the integrin can bind to is defined by which α and β subunits the integrin is made of. Among the ligands of integrins are fibronectin, vitronectin, collagen, and laminin. The connection between the cell and the ECM may help the cell to endure pulling forces without being ripped out of the ECM. The ability of a cell to create this kind of bond is also of vital importance in ontogeny. Cell attachment to the ECM is a basic requirement to build a multicellular organism. Integrins are not simply hooks, but give the cell critical signals about the nature of its surroundings. Together with signals arising from receptors for soluble growth factors like VEGF, EGF, and many others, they enforce a cellular decision on what biological action to take, be it attachment, movement, death, or differentiation. Thus integrins lie at the heart of many cellular biological processes. The attachment of the cell takes place through formation of cell adhesion complexes, which consist of integrins and many cytoplasmic proteins, such as talin, vinculin, paxillin, and alpha-actinin. These act by regulating kinases such as FAK (focal adhesion kinase) and Src kinase family members to phosphorylate substrates such as p130CAS thereby recruiting signaling adaptors such as CRK. These adhesion complexes attach to the actin cytoskeleton. The integrins thus serve to link two networks across the plasma membrane: the extracellular ECM and the intracellular actin filamentous system. Integrin α6β4 is an exception: it links to the keratin intermediate filament system in epithelial cells. Focal adhesions are large molecular complexes, which are generated following interaction of integrins with ECM, then their clustering. The clusters likely provide sufficient intracellular binding sites to permit the formation of stable signaling complexes on the cytoplasmic side of the cell membrane. So the focal adhesions contain integrin ligand, integrin molecule, and associate plaque proteins. Binding is propelled by changes in free energy. As previously stated, these complexes connect the extracellular matrix to actin bundles. Cryo-electron tomography reveals that the adhesion contains particles on the cell membrane with diameter of 25 +/- 5 nm and spaced at approximately 45 nm. Treatment with Rho-kinase inhibitor Y-27632 reduces the size of the particle, and it is extremely mechanosensitive. One important function of integrins on cells in tissue culture is their role in cell migration. Cells adhere to a substrate through their integrins. During movement, the cell makes new attachments to the substrate at its front and concurrently releases those at its rear. When released from the substrate, integrin molecules are taken back into the cell by endocytosis; they are transported through the cell to its front by the endocytic cycle, where they are added back to the surface. In this way they are cycled for reuse, enabling the cell to make fresh attachments at its leading front. The cycle of integrin endocytosis and recycling back to the cell surface is important also for not migrating cells and during animal development. Signal transduction Integrins play an important role in cell signaling by modulating the cell signaling pathways of transmembrane protein kinases such as receptor tyrosine kinases (RTK). While the interaction between integrin and receptor tyrosine kinases originally was thought of as uni-directional and supportive, recent studies indicate that integrins have additional, multi-faceted roles in cell signaling. Integrins can regulate the receptor tyrosine kinase signaling by recruiting specific adaptors to the plasma membrane. For example, β1c integrin recruits Gab1/Shp2 and presents Shp2 to IGF1R, resulting in dephosphorylation of the receptor. In a reverse direction, when a receptor tyrosine kinase is activated, integrins co-localise at focal adhesion with the receptor tyrosine kinases and their associated signaling molecules. The repertoire of integrins expressed on a particular cell can specify the signaling pathway due to the differential binding affinity of ECM ligands for the integrins. The tissue stiffness and matrix composition can initiate specific signaling pathways regulating cell behavior. Clustering and activation of the integrins/actin complexes strengthen the focal adhesion interaction and initiate the framework for cell signaling through assembly of adhesomes. Depending on the integrin's regulatory impact on specific receptor tyrosine kinases, the cell can experience: cell growth cell division cell survival cellular differentiation apoptosis (programmed cell death) Knowledge of the relationship between integrins and receptor tyrosine kinase has laid a foundation for new approaches to cancer therapy. Specifically, targeting integrins associated with RTKs is an emerging approach for inhibiting angiogenesis. Integrins and nerve repair Integrins have an important function in neuroregeneration after injury of the peripheral nervous system (PNS). Integrins are present at the growth cone of damaged PNS neurons and attach to ligands in the ECM to promote axon regeneration. It is unclear whether integrins can promote axon regeneration in the adult central nervous system (CNS). There are two obstacles that prevent integrin-mediated regeneration in the CNS: 1) integrins are not localised in the axon of most adult CNS neurons and 2) integrins become inactivated by molecules in the scar tissue after injury. Vertebrate integrins The following are 16 of the ~24 integrins found in vertebrates: Beta-1 integrins interact with many alpha integrin chains. Gene knockouts of integrins in mice are not always lethal, which suggests that during embryonal development, one integrin may substitute its function for another in order to allow survival. Some integrins are on the cell surface in an inactive state, and can be rapidly primed, or put into a state capable of binding their ligands, by cytokines. Integrins can assume several different well-defined shapes or "conformational states". Once primed, the conformational state changes to stimulate ligand binding, which then activates the receptors — also by inducing a shape change — to trigger outside-in signal transduction. References External links Talin substrate for calpain – PMAP The Proteolysis Map animation. Transmembrane proteins Cell adhesion proteins
[ -0.4246731996536255, 0.09102339297533035, 0.27444276213645935, -0.10785370320081711, -0.6226158738136292, 0.4486021101474762, -0.030323194339871407, -0.39599746465682983, 0.13017041981220245, -0.5998631119728088, -0.08813956379890442, 0.6185475587844849, -0.5703770518302917, 0.271595478057...
15303
https://en.wikipedia.org/wiki/Ion%20channel
Ion channel
Ion channels are pore-forming membrane proteins that allow ions to pass through the channel pore. Their functions include establishing a resting membrane potential, shaping action potentials and other electrical signals by gating the flow of ions across the cell membrane, controlling the flow of ions across secretory and epithelial cells, and regulating cell volume. Ion channels are present in the membranes of all cells. Ion channels are one of the two classes of ionophoric proteins, the other being ion transporters. The study of ion channels often involves biophysics, electrophysiology, and pharmacology, while using techniques including voltage clamp, patch clamp, immunohistochemistry, X-ray crystallography, fluoroscopy, and RT-PCR. Their classification as molecules is referred to as channelomics. Basic features There are two distinctive features of ion channels that differentiate them from other types of ion transporter proteins: The rate of ion transport through the channel is very high (often 106 ions per second or greater). Ions pass through channels down their electrochemical gradient, which is a function of ion concentration and membrane potential, "downhill", without the input (or help) of metabolic energy (e.g. ATP, co-transport mechanisms, or active transport mechanisms). Ion channels are located within the membrane of all excitable cells, and of many intracellular organelles. They are often described as narrow, water-filled tunnels that allow only ions of a certain size and/or charge to pass through. This characteristic is called selective permeability. The archetypal channel pore is just one or two atoms wide at its narrowest point and is selective for specific species of ion, such as sodium or potassium. However, some channels may be permeable to the passage of more than one type of ion, typically sharing a common charge: positive (cations) or negative (anions). Ions often move through the segments of the channel pore in single file nearly as quickly as the ions move through free solution. In many ion channels, passage through the pore is governed by a "gate", which may be opened or closed in response to chemical or electrical signals, temperature, or mechanical force. Ion channels are integral membrane proteins, typically formed as assemblies of several individual proteins. Such "multi-subunit" assemblies usually involve a circular arrangement of identical or homologous proteins closely packed around a water-filled pore through the plane of the membrane or lipid bilayer. For most voltage-gated ion channels, the pore-forming subunit(s) are called the α subunit, while the auxiliary subunits are denoted β, γ, and so on. Biological role Because channels underlie the nerve impulse and because "transmitter-activated" channels mediate conduction across the synapses, channels are especially prominent components of the nervous system. Indeed, numerous toxins that organisms have evolved for shutting down the nervous systems of predators and prey (e.g., the venoms produced by spiders, scorpions, snakes, fish, bees, sea snails, and others) work by modulating ion channel conductance and/or kinetics. In addition, ion channels are key components in a wide variety of biological processes that involve rapid changes in cells, such as cardiac, skeletal, and smooth muscle contraction, epithelial transport of nutrients and ions, T-cell activation and pancreatic beta-cell insulin release. In the search for new drugs, ion channels are a frequent target. Diversity There are over 300 types of ion channels just in the cells of the inner ear. Ion channels may be classified by the nature of their gating, the species of ions passing through those gates, the number of gates (pores) and localization of proteins. Further heterogeneity of ion channels arises when channels with different constitutive subunits give rise to a specific kind of current. Absence or mutation of one or more of the contributing types of channel subunits can result in loss of function and, potentially, underlie neurologic diseases. Classification by gating Ion channels may be classified by gating, i.e. what opens and closes the channels. For example, voltage-gated ion channels open or close depending on the voltage gradient across the plasma membrane, while ligand-gated ion channels open or close depending on binding of ligands to the channel. Voltage-gated Voltage-gated ion channels open and close in response to membrane potential. Voltage-gated sodium channels: This family contains at least 9 members and is largely responsible for action potential creation and propagation. The pore-forming α subunits are very large (up to 4,000 amino acids) and consist of four homologous repeat domains (I-IV) each comprising six transmembrane segments (S1-S6) for a total of 24 transmembrane segments. The members of this family also coassemble with auxiliary β subunits, each spanning the membrane once. Both α and β subunits are extensively glycosylated. Voltage-gated calcium channels: This family contains 10 members, though these are known to coassemble with α2δ, β, and γ subunits. These channels play an important role in both linking muscle excitation with contraction as well as neuronal excitation with transmitter release. The α subunits have an overall structural resemblance to those of the sodium channels and are equally large. Cation channels of sperm: This small family of channels, normally referred to as Catsper channels, is related to the two-pore channels and distantly related to TRP channels. Voltage-gated potassium channels (KV): This family contains almost 40 members, which are further divided into 12 subfamilies. These channels are known mainly for their role in repolarizing the cell membrane following action potentials. The α subunits have six transmembrane segments, homologous to a single domain of the sodium channels. Correspondingly, they assemble as tetramers to produce a functioning channel. Some transient receptor potential channels: This group of channels, normally referred to simply as TRP channels, is named after their role in Drosophila phototransduction. This family, containing at least 28 members, is incredibly diverse in its method of activation. Some TRP channels seem to be constitutively open, while others are gated by voltage, intracellular Ca2+, pH, redox state, osmolarity, and mechanical stretch. These channels also vary according to the ion(s) they pass, some being selective for Ca2+ while others are less selective, acting as cation channels. This family is subdivided into 6 subfamilies based on homology: classical (TRPC), vanilloid receptors (TRPV), melastatin (TRPM), polycystins (TRPP), mucolipins (TRPML), and ankyrin transmembrane protein 1 (TRPA). Hyperpolarization-activated cyclic nucleotide-gated channels: The opening of these channels is due to hyperpolarization rather than the depolarization required for other cyclic nucleotide-gated channels. These channels are also sensitive to the cyclic nucleotides cAMP and cGMP, which alter the voltage sensitivity of the channel's opening. These channels are permeable to the monovalent cations K+ and Na+. There are 4 members of this family, all of which form tetramers of six-transmembrane α subunits. As these channels open under hyperpolarizing conditions, they function as pacemaking channels in the heart, particularly the SA node. Voltage-gated proton channels: Voltage-gated proton channels open with depolarization, but in a strongly pH-sensitive manner. The result is that these channels open only when the electrochemical gradient is outward, such that their opening will only allow protons to leave cells. Their function thus appears to be acid extrusion from cells. Another important function occurs in phagocytes (e.g. eosinophils, neutrophils, macrophages) during the "respiratory burst." When bacteria or other microbes are engulfed by phagocytes, the enzyme NADPH oxidase assembles in the membrane and begins to produce reactive oxygen species (ROS) that help kill bacteria. NADPH oxidase is electrogenic, moving electrons across the membrane, and proton channels open to allow proton flux to balance the electron movement electrically. Ligand-gated (neurotransmitter) Also known as ionotropic receptors, this group of channels open in response to specific ligand molecules binding to the extracellular domain of the receptor protein. Ligand binding causes a conformational change in the structure of the channel protein that ultimately leads to the opening of the channel gate and subsequent ion flux across the plasma membrane. Examples of such channels include the cation-permeable "nicotinic" Acetylcholine receptor, ionotropic glutamate-gated receptors, acid sensing ion channels (ASICs), ATP-gated P2X receptors, and the anion-permeable γ-aminobutyric acid-gated GABAA receptor. Ion channels activated by second messengers may also be categorized in this group, although ligands and second messengers are otherwise distinguished from each other. Lipid-gated This group of channels opens in response to specific lipid molecules binding to the channel's transmembrane domain typically near the inner leaflet of the plasma membrane. Phosphatidylinositol 4,5-bisphosphate (PIP2) and phosphatidic acid (PA) are the best-characterized lipids to gate these channels. Many of the leak potassium channels are gated by lipids including the inward-rectifier potassium channels and two pore domain potassium channels TREK-1 and TRAAK. KCNQ potassium channel family are gated by PIP2. The voltage activated potassium channel (Kv) is regulated by PA. Its midpoint of activation shifts +50 mV upon PA hydrolysis, near resting membrane potentials. This suggests Kv could be opened by lipid hydrolysis independent of voltage and may qualify this channel as dual lipid and voltage gated channel. Other gating Gating also includes activation and inactivation by second messengers from the inside of the cell membrane – rather than from outside the cell, as in the case for ligands. Some potassium channels: Inward-rectifier potassium channels: These channels allow potassium ions to flow into the cell in an "inwardly rectifying" manner: potassium flows more efficiently into than out of the cell. This family is composed of 15 official and 1 unofficial member and is further subdivided into 7 subfamilies based on homology. These channels are affected by intracellular ATP, PIP2, and G-protein βγ subunits. They are involved in important physiological processes such as pacemaker activity in the heart, insulin release, and potassium uptake in glial cells. They contain only two transmembrane segments, corresponding to the core pore-forming segments of the KV and KCa channels. Their α subunits form tetramers. Calcium-activated potassium channels: This family of channels is activated by intracellular Ca2+ and contains 8 members. Tandem pore domain potassium channel: This family of 15 members form what are known as leak channels, and they display Goldman-Hodgkin-Katz (open) rectification. Contrary to their common name of 'Two-pore-domain potassium channels', these channels have only one pore but two pore domains per subunit. Two-pore channels include ligand-gated and voltage-gated cation channels, so-named because they contain two pore-forming subunits. As their name suggests, they have two pores. Light-gated channels like channelrhodopsin are directly opened by photons. Mechanosensitive ion channels open under the influence of stretch, pressure, shear, and displacement. Cyclic nucleotide-gated channels: This superfamily of channels contains two families: the cyclic nucleotide-gated (CNG) channels and the hyperpolarization-activated, cyclic nucleotide-gated (HCN) channels. This grouping is functional rather than evolutionary. Cyclic nucleotide-gated channels: This family of channels is characterized by activation by either intracellular cAMP or cGMP. These channels are primarily permeable to monovalent cations such as K+ and Na+. They are also permeable to Ca2+, though it acts to close them. There are 6 members of this family, which is divided into 2 subfamilies. Hyperpolarization-activated cyclic nucleotide-gated channels Temperature-gated channels: Members of the transient receptor potential ion channel superfamily, such as TRPV1 or TRPM8, are opened either by hot or cold temperatures. Classification by type of ions Chloride channels: This superfamily of channels consists of approximately 13 members. They include ClCs, CLICs, Bestrophins and CFTRs. These channels are non-selective for small anions; however chloride is the most abundant anion, and hence they are known as chloride channels. Potassium channels Voltage-gated potassium channels e.g., Kvs, Kirs etc. Calcium-activated potassium channels e.g., BKCa or MaxiK, SK, etc. Inward-rectifier potassium channels Two-pore-domain potassium channels: This family of 15 members form what is known as leak channels, and they display Goldman-Hodgkin-Katz (open) rectification. Sodium channels Voltage-gated sodium channels (NaVs) Epithelial sodium channels (ENaCs) Calcium channels (CaVs) Proton channels Voltage-gated proton channels Non-selective cation channels: These non-selectively allow many types of cations, mainly Na+, K+ and Ca2+, through the channel. Most transient receptor potential channels Classification by cellular localization Ion channels are also classified according to their subcellular localization. The plasma membrane accounts for around 2% of the total membrane in the cell, whereas intracellular organelles contain 98% of the cell's membrane. The major intracellular compartments are endoplasmic reticulum, Golgi apparatus, and mitochondria. On the basis of localization, ion channels are classified as: Plasma membrane channels Examples: Voltage-gated potassium channels (Kv), Sodium channels (Nav), Calcium channels (Cav) and Chloride channels (ClC) Intracellular channels, which are further classified into different organelles Endoplasmic reticulum channels: RyR, SERCA, ORAi Mitochondrial channels: mPTP, KATP, BK, IK, CLIC5, Kv7.4 at the inner membrane and VDAC and CLIC4 as outer membrane channels. Other classifications Some ion channels are classified by the duration of their response to stimuli: Transient receptor potential channels: This group of channels, normally referred to simply as TRP channels, is named after their role in Drosophila visual phototransduction. This family, containing at least 28 members, is diverse in its mechanisms of activation. Some TRP channels remain constitutively open, while others are gated by voltage, intracellular Ca2+, pH, redox state, osmolarity, and mechanical stretch. These channels also vary according to the ion(s) they pass, some being selective for Ca2+ while others are less selective cation channels. This family is subdivided into 6 subfamilies based on homology: canonical TRP (TRPC), vanilloid receptors (TRPV), melastatin (TRPM), polycystins (TRPP), mucolipins (TRPML), and ankyrin transmembrane protein 1 (TRPA). Detailed structure Channels differ with respect to the ion they let pass (for example, Na+, K+, Cl−), the ways in which they may be regulated, the number of subunits of which they are composed and other aspects of structure. Channels belonging to the largest class, which includes the voltage-gated channels that underlie the nerve impulse, consists of four subunits with six transmembrane helices each. On activation, these helices move about and open the pore. Two of these six helices are separated by a loop that lines the pore and is the primary determinant of ion selectivity and conductance in this channel class and some others. The existence and mechanism for ion selectivity was first postulated in the late 1960s by Bertil Hille and Clay Armstrong. The idea of the ionic selectivity for potassium channels was that the carbonyl oxygens of the protein backbones of the "selectivity filter" (named by Bertil Hille) could efficiently replace the water molecules that normally shield potassium ions, but that sodium ions were smaller and cannot be completely dehydrated to allow such shielding, and therefore could not pass through. This mechanism was finally confirmed when the first structure of an ion channel was elucidated. A bacterial potassium channel KcsA, consisting of just the selectivity filter, "P" loop and two transmembrane helices was used as a model to study the permeability and the selectivity of ion channels in the Mackinnon lab. The determination of the molecular structure of KcsA by Roderick MacKinnon using X-ray crystallography won a share of the 2003 Nobel Prize in Chemistry. Because of their small size and the difficulty of crystallizing integral membrane proteins for X-ray analysis, it is only very recently that scientists have been able to directly examine what channels "look like." Particularly in cases where the crystallography required removing channels from their membranes with detergent, many researchers regard images that have been obtained as tentative. An example is the long-awaited crystal structure of a voltage-gated potassium channel, which was reported in May 2003. One inevitable ambiguity about these structures relates to the strong evidence that channels change conformation as they operate (they open and close, for example), such that the structure in the crystal could represent any one of these operational states. Most of what researchers have deduced about channel operation so far they have established through electrophysiology, biochemistry, gene sequence comparison and mutagenesis. Channels can have single (CLICs) to multiple transmembrane (K channels, P2X receptors, Na channels) domains which span plasma membrane to form pores. Pore can determine the selectivity of the channel. Gate can be formed either inside or outside the pore region. Pharmacology Chemical substances can modulate the activity of ion channels, for example by blocking or activating them. Ion channel blockers A variety of ion channel blockers (inorganic and organic molecules) can modulate ion channel activity and conductance. Some commonly used blockers include: Tetrodotoxin (TTX), used by puffer fish and some types of newts for defense. It blocks sodium channels. Saxitoxin is produced by a dinoflagellate also known as "red tide". It blocks voltage-dependent sodium channels. Conotoxin is used by cone snails to hunt prey. Lidocaine and Novocaine belong to a class of local anesthetics which block sodium ion channels. Dendrotoxin is produced by mamba snakes, and blocks potassium channels. Iberiotoxin is produced by the Hottentotta tamulus (Eastern Indian scorpion) and blocks potassium channels. Heteropodatoxin is produced by Heteropoda venatoria (brown huntsman spider or laya) and blocks potassium channels. Ion channel activators Several compounds are known to promote the opening or activation of specific ion channels. These are classified by the channel on which they act: Calcium channel openers, such as Bay K8644 Chloride channel openers, such as phenanthroline Potassium channel openers, such as minoxidil Sodium channel openers, such as DDT Diseases There are a number of disorders which disrupt normal functioning of ion channels and have disastrous consequences for the organism. Genetic and autoimmune disorders of ion channels and their modifiers are known as channelopathies. See :Category:Channelopathies for a full list. Shaker gene mutations cause a defect in the voltage gated ion channels, slowing down the repolarization of the cell. Equine hyperkalaemic periodic paralysis as well as human hyperkalaemic periodic paralysis (HyperPP) are caused by a defect in voltage-dependent sodium channels. Paramyotonia congenita (PC) and potassium-aggravated myotonias (PAM) Generalized epilepsy with febrile seizures plus (GEFS+) Episodic ataxia (EA), characterized by sporadic bouts of severe discoordination with or without myokymia, and can be provoked by stress, startle, or heavy exertion such as exercise. Familial hemiplegic migraine (FHM) Spinocerebellar ataxia type 13 Long QT syndrome is a ventricular arrhythmia syndrome caused by mutations in one or more of presently ten different genes, most of which are potassium channels and all of which affect cardiac repolarization. Brugada syndrome is another ventricular arrhythmia caused by voltage-gated sodium channel gene mutations. Polymicrogyria is a developmental brain malformation caused by voltage-gated sodium channel and NMDA receptor gene mutations. Cystic fibrosis is caused by mutations in the CFTR gene, which is a chloride channel. Mucolipidosis type IV is caused by mutations in the gene encoding the TRPML1 channel Mutations in and overexpression of ion channels are important events in cancer cells. In Glioblastoma multiforme, upregulation of gBK potassium channels and ClC-3 chloride channels enables glioblastoma cells to migrate within the brain, which may lead to the diffuse growth patterns of these tumors. History The fundamental properties of currents mediated by ion channels were analyzed by the British biophysicists Alan Hodgkin and Andrew Huxley as part of their Nobel Prize-winning research on the action potential, published in 1952. They built on the work of other physiologists, such as Cole and Baker's research into voltage-gated membrane pores from 1941. The existence of ion channels was confirmed in the 1970s by Bernard Katz and Ricardo Miledi using noise analysis. It was then shown more directly with an electrical recording technique known as the "patch clamp", which led to a Nobel Prize to Erwin Neher and Bert Sakmann, the technique's inventors. Hundreds if not thousands of researchers continue to pursue a more detailed understanding of how these proteins work. In recent years the development of automated patch clamp devices helped to increase significantly the throughput in ion channel screening. The Nobel Prize in Chemistry for 2003 was awarded to Roderick MacKinnon for his studies on the physico-chemical properties of ion channel structure and function, including x-ray crystallographic structure studies. Culture Roderick MacKinnon commissioned Birth of an Idea, a tall sculpture based on the KcsA potassium channel. The artwork contains a wire object representing the channel's interior with a blown glass object representing the main cavity of the channel structure. See also Alpha helix Ion channel family as defined in Pfam and InterPro Ki Database Lipid bilayer ion channels Magnesium transport Neurotoxin Passive transport Synthetic ion channels Transmembrane receptor References External links Cell communication Electrophysiology Integral membrane proteins Neurochemistry Protein families
[ -0.0894279032945633, 0.2347557544708252, 0.41963645815849304, -0.12184501439332962, -0.022655505686998367, -0.06404989957809448, 0.25294724106788635, -0.28913912177085876, -0.33070141077041626, -0.6465873718261719, 0.057159531861543655, 0.03237361088395119, -0.8468477725982666, 0.468066543...
15304
https://en.wikipedia.org/wiki/IDE
IDE
IDE, iDE, or Ide may refer to: Organisations Institut für Dokumentologie und Editorik, a German think tank for the application of digital methods on historical documents Institute of Developing Economies, a semi-governmental research institute in Japan Institute for Democratic Education, founded by Yaacov Hecht Instituto de Desenvolvimento Educacional, a Brazilian institution linked with Fundação Getúlio Vargas International Development Enterprises, a development NGO based in Denver, Colorado Party of Internet Democracy, a political party in Hungary Science and technology Biology and medicine Ide (fish), a freshwater fish Intact dilation and extraction, a form of abortion Insulin-degrading enzyme, Insulysin, an enzyme Infectious disease epidemiology, the study of the patterns of communicable diseases at the population level Investigational Device Exemption, a US Food and Drug Administration regulatory status Chemistry Suffix -ide for some molecules in the IUPAC nomenclature of inorganic chemistry Computing Integrated development environment, a software application for software development Integrated Drive Electronics, a computer hardware bus for disk drives, retroactively termed Parallel ATA Places Ide, Devon, a village in England Ide, Kyoto, a town in Japan Greek mythology Ida (mother of Minos), daughter of Corybas, the wife of Lycastus king of Crete, and the mother of the "second" king Minos of Crete Ida (nurse of Zeus), who along with her sister Adrasteia, nursed Zeus on Crete People Samuel Krafsur (1913–1983), (KGB codename) Ide Schelling (born 1998), Dutch cyclist Given name Íde, a feminine name of Gaelic origin Surname Charlie Ide (born 1988), English footballer , Japanese footballer Henry Clay Ide (1844–1921), American commissioner to Samoa and the Philippines , Japanese shogi player , Japanese triathlete , Japanese speed skater , Japanese screenwriter William B. Ide (1796–1852), author of the California Republic's proclamation of independence from Mexico Yuji Ide (born 1975), Japanese racing driver Yasunori Ide, Japanese anime creator See also Eid (disambiguation) Ides (disambiguation) Japanese-language surnames
[ 0.4241845905780792, 0.31933656334877014, -0.5407425761222839, 0.49601244926452637, -0.011334785260260105, 0.40563592314720154, -0.062273699790239334, 0.09506222605705261, 0.05115917697548866, -0.3710917532444, -0.3134046494960785, 0.07057931274175644, -0.022557582706212997, 0.4850467145442...
15305
https://en.wikipedia.org/wiki/Integrated%20development%20environment
Integrated development environment
An integrated development environment (IDE) is a software application that provides comprehensive facilities to computer programmers for software development. An IDE normally consists of at least a source code editor, build automation tools and a debugger. Some IDEs, such as NetBeans and Eclipse, contain the necessary compiler, interpreter, or both; others, such as SharpDevelop and Lazarus, do not. The boundary between an IDE and other parts of the broader software development environment is not well-defined; sometimes a version control system or various tools to simplify the construction of a graphical user interface (GUI) are integrated. Many modern IDEs also have a class browser, an object browser, and a class hierarchy diagram for use in object-oriented software development. Overview Integrated development environments are designed to maximize programmer productivity by providing tight-knit components with similar user interfaces. IDEs present a single program in which all development is done. This program typically provides many features for authoring, modifying, compiling, deploying and debugging software. This contrasts with software development using unrelated tools, such as vi, GDB, GCC, or make. One aim of the IDE is to reduce the configuration necessary to piece together multiple development utilities, instead, it provides the same set of capabilities as one cohesive unit. Reducing setup time can increase developer productivity, especially in cases where learning to use the IDE is faster than manually integrating and learning all of the individual tools. Tighter integration of all development tasks has the potential to improve overall productivity beyond just helping with setup tasks. For example, code can be continuously parsed while it is being edited, providing instant feedback when syntax errors are introduced, thus allowing developers to debug code much faster and more easily with an IDE. Some IDEs are dedicated to a specific programming language, allowing a feature set that most closely matches the programming paradigms of the language. However, there are many multiple-language IDEs. While most modern IDEs are graphical, text-based IDEs such as Turbo Pascal were in popular use before the availability of windowing systems like Microsoft Windows and the X Window System (X11). They commonly use function keys or hotkeys to execute frequently used commands or macros. History IDEs initially became possible when developing via a console or terminal. Early systems could not support one, since programs were prepared using flowcharts, entering programs with punched cards (or paper tape, etc.) before submitting them to a compiler. Dartmouth BASIC was the first language to be created with an IDE (and was also the first to be designed for use while sitting in front of a console or terminal). Its IDE (part of the Dartmouth Time Sharing System) was command-based, and therefore did not look much like the menu-driven, graphical IDEs popular after the advent of the Graphical User Interface. However it integrated editing, file management, compilation, debugging and execution in a manner consistent with a modern IDE. Maestro I is a product from Softlab Munich and was the world's first integrated development environment for software. Maestro I was installed for 22,000 programmers worldwide. Until 1989, 6,000 installations existed in the Federal Republic of Germany. Maestro was arguably the world leader in this field during the 1970s and 1980s. Today one of the last Maestro I can be found in the Museum of Information Technology at Arlington in Texas. One of the first IDEs with a plug-in concept was Softbench. In 1995 Computerwoche commented that the use of an IDE was not well received by developers since it would fence in their creativity. As of January 2021, the three IDEs whose download pages are most commonly searched for are Visual Studio, Eclipse and Android Studio. Topics Syntax highlighting The IDE editor usually provides syntax highlighting, it can show both the structures, the language keywords and the syntax errors with visually distinct colors and font effects. Code completion Code completion is an important IDE feature, intended to speed up programming. Modern IDEs even have intelligent code completion. Refactoring Advanced IDEs provide support for automated refactoring. Version control An IDE is expected to provide integrated version control, in order to interact with source repositories. Debugging IDEs are also used for debugging, using an integrated debugger, with support for setting breakpoints in the editor, visual rendering of steps, etc. Code search IDEs may provide support for code search. Code search has two different meanings. First, it means searching for class and function declarations, usages, variable and field read/write, etc. IDEs can use different kinds of user interface for code search, for example form-based widgets and natural-language based interfaces. Second, it means searching for a concrete implementation of some specified functionality. This can be done both with formal or neural techniques. Visual programming Visual programming is a usage scenario in which an IDE is generally required. Visual Basic allows users to create new applications by moving programming, building blocks, or code nodes to create flowcharts or structure diagrams that are then compiled or interpreted. These flowcharts often are based on the Unified Modeling Language. This interface has been popularized with the Lego Mindstorms system and is being actively perused by a number of companies wishing to capitalize on the power of custom browsers like those found at Mozilla. KTechlab supports flowcode and is a popular open-source IDE and Simulator for developing software for microcontrollers. Visual programming is also responsible for the power of distributed programming (cf. LabVIEW and EICASLAB software). An early visual programming system, Max, was modeled after analog synthesizer design and has been used to develop real-time music performance software since the 1980s. Another early example was Prograph, a dataflow-based system originally developed for the Macintosh. The graphical programming environment "Grape" is used to program qfix robot kits. This approach is also used in specialist software such as Openlab, where the end-users want the flexibility of a full programming language, without the traditional learning curve associated with one. Language support Some IDEs support multiple languages, such as GNU Emacs based on C and Emacs Lisp; IntelliJ IDEA, Eclipse, MyEclipse or NetBeans, based on Java; MonoDevelop, based on C#; or PlayCode. Support for alternative languages is often provided by plugins, allowing them to be installed on the same IDE at the same time. For example, Flycheck is a modern on-the-fly syntax checking extension for GNU Emacs 24 with support for 39 languages. Eclipse, and Netbeans have plugins for C/C++, Ada, GNAT (for example AdaGIDE), Perl, Python, Ruby, and PHP, which are selected between automatically based on file extension, environment or project settings. Attitudes across different computing platforms Unix programmers can combine command-line POSIX tools into a complete development environment, capable of developing large programs such as the Linux kernel and its environment. In this sense, the entire Unix system functions as an IDE. The free software GNU tools (GNU Compiler Collection (GCC), GNU Debugger (GDB), and GNU make) are available on many platforms, including Windows. The pervasive Unix philosophy of "everything is a text stream" enables developers who favor command-line oriented tools to use editors with support for many of the standard Unix and GNU build tools, building an IDE with programs like Emacs or Vim. Data Display Debugger is intended to be an advanced graphical front-end for many text-based debugger standard tools. Some programmers prefer managing makefiles and their derivatives to the similar code building tools included in a full IDE. For example, most contributors to the PostgreSQL database use make and GDB directly to develop new features. Even when building PostgreSQL for Microsoft Windows using Visual C++, Perl scripts are used as a replacement for make rather than relying on any IDE features. Some Linux IDEs such as Geany attempt to provide a graphical front end to traditional build operations. On the various Microsoft Windows platforms, command-line tools for development are seldom used. Accordingly, there are many commercial and non-commercial products. However, each has a different design commonly creating incompatibilities. Most major compiler vendors for Windows still provide free copies of their command-line tools, including Microsoft (Visual C++, Platform SDK, .NET Framework SDK, nmake utility). IDEs have always been popular on the Apple Macintosh's classic Mac OS and macOS, dating back to Macintosh Programmer's Workshop, Turbo Pascal, THINK Pascal and THINK C environments of the mid-1980s. Currently macOS programmers can choose between native IDEs like Xcode and open-source tools such as Eclipse and Netbeans. ActiveState Komodo is a proprietary multilanguage IDE supported on macOS. Artificial intelligence Some features of IDEs can benefit from advances in AI. In particular, one can collect information from IDE actions across developers in order to augment IDE features. For instance, a data-driven approach to code completion results in intelligent code completion. Web integrated development environment An web integrated development environment (Web IDE), also known as an Online IDE or Cloud IDE, is a browser based IDE that allows for software development or web development. A web IDE can be accessed from a web browser allowing for a portable work environment. A web IDE does not usually contain all of the same features as a traditional, or desktop, IDE, although all of the basic IDE features, such as syntax highlighting, are typically present. See also References
[ 0.3204423785209656, 0.31391602754592896, -0.508932888507843, 0.22336401045322418, 0.34727829694747925, -0.1769976019859314, -0.02205435000360012, 0.08037586510181427, 0.04352575168013573, -0.7661325931549072, -0.5852493047714233, 0.8155168294906616, -0.22952663898468018, -0.070647336542606...
15308
https://en.wikipedia.org/wiki/Ian%20McKellen
Ian McKellen
Sir Ian Murray McKellen (born 25 May 1939) is an English actor. His career spans seven decades, having performed in genres ranging from Shakespearean and modern theatre to popular fantasy and science fiction. Over his career he has received numerous awards including seven Laurence Olivier Awards, a Tony Award, a Golden Globe Award, and a Screen Actors Guild Award. He has also received nominations for two Academy Awards, five Primetime Emmy Awards, and four BAFTAs. He achieved worldwide fame for his film roles, including the titular King in Richard III (1995), James Whale in Gods and Monsters (1998), Magneto in the X-Men films, and Gandalf in The Lord of the Rings and The Hobbit trilogies. The BBC states that his "performances have guaranteed him a place in the canon of English stage and film actors". A recipient of every major theatrical award in the UK, McKellen is regarded as a British cultural icon. He started his professional career in 1961 at the Belgrade Theatre as a member of their highly regarded repertory company. In 1965, McKellen made his first West End appearance. In 1969, he was invited to join the Prospect Theatre Company to play the lead parts in Shakespeare's Richard II and Marlowe's Edward II, and he firmly established himself as one of the country's foremost classical actors. In the 1970s, McKellen became a stalwart of the Royal Shakespeare Company and the National Theatre of Great Britain. In 1981 he received his first Tony Award nomination and win for Best Actor in a Play for his role as Antonio Salieri in Amadeus. McKellen was knighted in the 1980 New Year Honours for services to the performing arts, and made a Companion of Honour for services to drama and to equality in the 2008 New Year Honours. He came out as gay in 1988, and has since championed LGBT social movements worldwide. He was awarded the Freedom of the City of London in October 2014. Early life and education McKellen was born on 25 May 1939 in Burnley, Lancashire, the son of Margery Lois (née Sutcliffe) and Denis Murray McKellen. He was their second child, with a sister, Jean, five years his senior. Shortly before the outbreak of the Second World War in September 1939, his family moved to Wigan. They lived there until Ian was twelve years old, before relocating to Bolton in 1951, after his father had been promoted. The experience of living through the war as a young child had a lasting impact on him, and he later said that "only after peace resumed ... did I realise that war wasn't normal." When an interviewer remarked that he seemed quite calm in the aftermath of the 11 September attacks, McKellen said: "Well, darling, you forget—I slept under a steel plate until I was four years old." McKellen's father was a civil engineer and lay preacher, and was of Protestant Irish and Scottish descent. Both of McKellen's grandfathers were preachers, and his great-great-grandfather, James McKellen, was a "strict, evangelical Protestant minister" in Ballymena, County Antrim. His home environment was strongly Christian, but non-orthodox. "My upbringing was of low nonconformist Christians who felt that you led the Christian life in part by behaving in a Christian manner to everybody you met." When he was 12, his mother died of breast cancer; his father died when he was 24. After his coming out as gay to his stepmother, Gladys McKellen, who was a Quaker, he said, "Not only was she not fazed, but as a member of a society which declared its indifference to people's sexuality years back, I think she was just glad for my sake that I wasn't lying anymore." His great-great-grandfather Robert J. Lowes was an activist and campaigner in the ultimately successful campaign for a Saturday half-holiday in Manchester, the forerunner to the modern five-day work week, thus making Lowes a "grandfather of the modern weekend". McKellen attended Bolton School (Boys' Division), of which he is still a supporter, attending regularly to talk to pupils. McKellen's acting career started at Bolton Little Theatre, of which he is now the patron. An early fascination with the theatre was encouraged by his parents, who took him on a family outing to Peter Pan at the Opera House in Manchester when he was three. When he was nine, his main Christmas present was a fold-away wood and bakelite Victorian theatre from Pollocks Toy Theatres, with cardboard scenery and wires to push on the cut-outs of Cinderella and of Laurence Olivier's Hamlet. His sister took him to his first Shakespeare play, Twelfth Night, by the amateurs of Wigan's Little Theatre, shortly followed by their Macbeth and Wigan High School for Girls' production of A Midsummer Night's Dream, with music by Mendelssohn, with the role of Bottom played by Jean McKellen, who continued to act, direct, and produce amateur theatre until her death. In 1958, McKellen, at the age of 18, won a scholarship to St Catharine's College, Cambridge, where he read English literature. He has since been made an Honorary Fellow of the College. While at Cambridge, McKellen was a member of the Marlowe Society, where he appeared in 23 plays over the course of 3 years. At that young age he was already giving performances that have since become legendary such as his Justice Shallow in Henry IV alongside Trevor Nunn and Derek Jacobi (March 1959), Cymbeline (as Posthumus, opposite Margaret Drabble as Imogen) and Doctor Faustus. During this period McKellen had already been directed by Peter Hall, John Barton and Dadie Rylands, all of whom would have a significant impact on McKellen's future career. Career Theatre 1965–1969: Theatre debut and early roles McKellen made his first professional appearance in 1961 at the Belgrade Theatre, as Roper in A Man for All Seasons, although an audio recording of the Marlowe Society's Cymbeline had gone on commercial sale as part of the Argo Shakespeare series. After four years in regional repertory theatres, McKellen made his first West End appearance, in A Scent of Flowers, regarded as a "notable success". In 1965 he was a member of Laurence Olivier's National Theatre Company at the Old Vic, which led to roles at the Chichester Festival. With the Prospect Theatre Company, McKellen made his breakthrough performances of Richard II (directed by Richard Cottrell) and Marlowe's Edward II (directed by Toby Robertson) at the Edinburgh festival in 1969, the latter causing a storm of protest over the enactment of the homosexual Edward's lurid death. 1970–1985: National Theatre roles and Broadway debut In the 1970s, McKellen became a well-known figure in British theatre, performing frequently at the Royal Shakespeare Company and the Royal National Theatre, where he played several leading Shakespearean roles. Through 1973 to 1974, McKellen toured the United Kingdom and Brooklyn Academy of Music portraying Lady Wishfort's Footman, Kruschov, and Edgar in the William Congreve comedy The Way of the World, Anton Chekov's comedic three act play The Wood Demon and William Shakespeare tragedy King Lear. The following year, he starred in Shakespeare's King John, George Colman's The Clandestine Marriage, and George Bernard Shaw's Too True to Be Good. From 1976 to 1977 he portrayed Romeo in the Shakespeare romance Romeo & Juliet at the Royal Shakespeare Theatre. The following year he played King Leontes in The Winter's Tale. In 1976, he played the title role in William Shakespeare's Macbeth (which he had first played for Trevor Nunn in a "gripping...out of the ordinary" production, with Judi Dench, at Stratford in 1976 and Iago in Othello, in award-winning productions directed by Nunn. Both of these productions were adapted into television films, also directed by Nunn. In 1978 through 1979 he toured in a double feature production of Shakespeare's Twelfth Night, and Anton Chekov's Three Sisters portraying Sir Toby Belch and Andrei, respectively. In 1979, McKellen gained acclaim for his role as Antonio Salieri in the Broadway transfer production of Peter Shaffer's play Amadeus. The play was an immensely popular play produced by the National Theatre originally starring Paul Scofield. The transfer starred McKellen, Tim Curry as Wolfgang Amadeus Mozart, and Jane Seymour as Constanze Mozart. The New York Times theatre critic Frank Rich wrote of McKellen's performance "In Mr. McKellen's superb performance, Salieri's descent into madness was portrayed in dark notes of almost bone-rattling terror." For his performance, McKellen received the Tony Award for Best Actor in a Play. 1986–2001: Roles on Broadway and the West End In 1986, he returned to Broadway in revival of Anton Chekhov's first play Wild Honey alongside Kim Cattrall and Kate Burton. The play concerned a local Russian schoolteacher who struggles to remain faithful to his wife, despite the attentions of three other women. McKellen received mixed reviews from critics in particular Frank Rich of The New York Times who praised him for his "bravura and athletically graceful technique that provides everything except, perhaps, the thing that matters most - sustained laughter." He later wrote, "Mr. McKellen finds himself in the peculiar predicament of the star who strains to carry a frail supporting cast." In 1989 he played Iago in production of Othello by the Royal Shakespeare Company. From 1990 to 1992, he acted in a world tour of a lauded revival of Richard III, playing the title character. The production played at the Brooklyn Academy of Music for two weeks before continuing its tour where Frank Rich of New York Times was able to review it. In his piece, he praised McKellen's performance writing, "Mr. McKellen's highly sophisticated sense of theatre and fun drives him to reveal the secrets of how he pulls his victims' strings whether he is addressing the audience in a soliloquy of not". For his performance he received the Laurence Olivier Award for Best Actor. In 1992, he acted in Pam Gems' revival of Chekov's Uncle Vanya at the Royal National Theatre alongside Antony Sher, and Janet McTeer. From 1993 to 1997 McKellen toured in a one man show entitled, A Knights Out, about coming out as a gay man. Laurie Winer from The Los Angeles Times wrote, "Even if he is preaching to the converted, McKellen makes us aware of the vast and powerful intolerance outside the comfortable walls of the theater. Endowed with a rare technique, he is a natural storyteller, an admirable human being and a hands-on activist." From 1997 to 1998, he starred as Dr. Tomas Stockmann in a revival of Henrik Ibsen's An Enemy of the People. Later that year he played Garry Essendine in the Noël Coward comedy Present Laughter at the West Yorkshire Playhouse. McKellen returned to the Broadway stage in 2001 in a August Strindberg play The Dance of Death alongside Helen Mirren, and David Strathairn at the Broadhurst Theatre. The New York Times Theatre critic Ben Brantley praised McKellen's performance writing, "[McKellen] returns to Broadway to serve up an Elysian concoction we get to sample too little these days: a mixture of heroic stage presence, actorly intelligence, and rarefied theatrical technique". McKellen toured with the production at the Lyric Theatre in London's West End and to the Sydney Art's Festival in Australia. 2007–2021: Return to the theatre In 2007, he returned to the Royal Shakespeare Company, in productions of King Lear and The Seagull, both directed by Trevor Nunn. In 2009, he appeared in a very popular revival of Waiting for Godot at London's Haymarket Theatre, directed by Sean Mathias, and playing opposite Patrick Stewart. From 2013 to 2014, McKellen and Stewart starred in a double production of Samuel Beckett's Waiting for Godot and Harold Pinter's No Man's Land on Broadway at the Cort Theatre. Variety theatre critic Marilyn Stasio praised the dual production writing, "McKellen and Stewart find plenty of consoling comedy in two masterpieces of existential despair." In both production of Stasio claims, "the two thespians play the parts they were meant to play." He is Patron of English Touring Theatre and also President and Patron of the Little Theatre Guild of Great Britain, an association of amateur theatre organisations throughout the UK. In late August 2012, he took part in the opening ceremony of the London Paralympics, portraying Prospero from The Tempest. In October 2017, McKellen played King Lear at Chichester Festival Theatre, a role which he said was likely to be his "last big Shakespearean part". He performed the play at the Duke of York's Theatre in London's West End during the summer of 2018. To celebrate his 80th birthday, in 2019 McKellen performed in a one man stage show titled Ian McKellen on Stage: With Tolkien, Shakespeare, Others and YOU celebrating the various performances throughout his career. The show toured across the UK and Ireland (raising money for each venue and organisation's charity) before a West End run at the Harold Pinter Theatre and was performed for one night only on Broadway at the Hudson Theatre. In 2021, he will play the title role in an age-blind production of Hamlet (having previously played the part in a UK and European tour in 1971), followed by the role of Firs in Chekov's The Cherry Orchard at the Theatre Royal, Windsor. Film 1969–1989: Film debut and character actor In 1969, McKellen starred in three films, Michael Hayes' The Promise, Clive Donner's epic film Alfred the Great, and Waris Hussein's A Touch of Love. In 1981, McKellen portrayed writer and poet D. H. Lawrence in the Christopher Miles directed biographical film, Priest of Love. He followed up with Michael Mann's horror film The Keep (1983). In 1985, he starred in Plenty, the film adaptation of the David Hare play of the same name. The film was directed by Fred Schepisi and starred Meryl Streep, Charles Dance, John Gielgud, and Sting. The film spans nearly 20 years from the early 1940s to the 1960s, around an Englishwoman's experiences as a fighter for the French Resistance during World War II when she has a one-night stand with a British intelligence agent. The film received mixed review with Roger Ebert of The Chicago Sun-Times praising the film's ensemble cast writing, "The performances in the movie supply one brilliant solo after another; most of the big moments come as characters dominate the scenes they are in." McKellen starred in the British drama Scandal a fictionalised account of the Profumo affair that rocked the government of British prime minister Harold Macmillan. McKellen portrayed John Profumo. The film starred Joanne Whalley, and John Hurt. The film premiered at the 1989 Cannes Film Festival and competed for the Palme d'Or. 1990–1998: Richard III and Critical acclaim In 1993, he starred in the film Six Degrees of Separation based on the Pulitzer Prize and Tony Award nominated play of the same name. McKellen starred alongside Will Smith, Donald Sutherland and Stockard Channing. The film was a critical success. That same year, he also appeared in the western The Ballad of Little Jo opposite Bob Hoskins and the action comedy Last Action Hero starring Arnold Schwarzenegger. The following year, he appeared in the superhero film The Shadow with Alec Baldwin and the James L. Brooks directed comedy I'll Do Anything starring Nick Nolte. In 1995, McKellen made his screenwriting debut with Richard III, an ambitious adaptation of William Shakespeare's play of the same name, directed by Richard Loncraine. The film reimagines the play's story and characters to a setting based on 1930s Britain, with Richard depicted as a fascist plotting to usurp the throne. McKellen stars in the title role alongside an ensemble cast including Annette Bening, Robert Downey Jr., Jim Broadbent, Kristen Scott Thomas, Nigel Hawthorne and Dame Maggie Smith. As executive producer he returned his £50,000 fee to complete the filming of the final battle. In his review of the film, The Washington Post film critic Hal Hinson called McKellen's performance a "lethally flamboyant incarnation" and said his "florid mastery ... dominates everything". Film critic Roger Ebert of the Chicago Sun-Times praised McKellen's adaptation and his performance in his four star review writing, "McKellen has a deep sympathy for the playwright...Here he brings to Shakespeare's most tortured villain a malevolence we are moved to pity. No man should be so evil, and know it. Hitler and others were more evil, but denied out to themselves. There is no escape for Richard. He is one of the first self-aware characters in the theater, and for that distinction he must pay the price." His performance in the title role garnered BAFTA and Golden Globe nominations for Best Actor and won the European Film Award for Best Actor. His screenplay was nominated for the BAFTA Award for Best Adapted Screenplay. That same year, he appeared in the historical drama Restoration (1995) also starring Downey Jr., as well as Meg Ryan, Hugh Grant, and David Thewlis. He also appeared in the British romantic comedy Jack and Sarah (1995) starring Richard E. Grant, Samantha Mathis, and Dame Judi Dench. In 1998, he appeared in the modestly acclaimed psychological thriller Apt Pupil, which was directed by Bryan Singer and based on a story by Stephen King. McKellen portrayed a fugitive Nazi officer living under a false name in the US who is befriended by a curious teenager (Brad Renfro) who threatens to expose him unless he tells his story in detail. That same year, he played James Whale, the director of Frankenstein in the Bill Condon directed period drama Gods and Monsters, a role for which he was subsequently nominated for the Academy Award for Best Actor, losing it to Roberto Benigni in Life is Beautiful (1998). 2000–2007: The Lord of the Rings and X-Men In 1999, McKellen was cast, again under the direction of Bryan Singer, to play the comic book supervillain Magneto in the 2000 film X-Men and its sequels X2: X-Men United (2003) and X-Men: The Last Stand (2006). He later reprised his role of Magneto in 2014's X-Men: Days of Future Past, sharing the role with Michael Fassbender, who played a younger version of the character in 2011's X-Men: First Class. While filming the first X-Men film in 1999, McKellen was cast as the wizard Gandalf in Peter Jackson's film trilogy adaptation of The Lord of the Rings (consisting of The Fellowship of the Ring, The Two Towers, and The Return of the King), released between 2001 and 2003. He received honours from the Screen Actors Guild for Best Supporting Actor in a Motion Picture for his work in The Fellowship of the Ring and was nominated for the Academy Award for Best Supporting Actor for the same role. He provided the voice of Gandalf for several video game adaptations of the Lord of the Rings films. McKellen has appeared in limited release films, such as Emile (which was shot in three weeks following the X2 shoot), Neverwas and Asylum. In 2006, He appeared as Sir Leigh Teabing in The Da Vinci Code opposite Tom Hanks as Robert Langdon. During a 17 May 2006 interview on The Today Show with the Da Vinci Code cast and director Ron Howard, Matt Lauer posed a question to the group about how they would have felt if the film had borne a prominent disclaimer that it is a work of fiction, as some religious groups wanted. McKellen responded, "I've often thought the Bible should have a disclaimer in the front saying 'This is fiction.' I mean, walking on water? It takes... an act of faith. And I have faith in this movie—not that it's true, not that it's factual, but that it's a jolly good story." He continued, "And I think audiences are clever enough and bright enough to separate out fact and fiction, and discuss the thing when they've seen it". In 2007, McKellen narrated the romantic fantasy adventure film Stardust starring Charlie Cox and Claire Danes, which was a critical and financial success. That same year, he lent his voice to the armored bear Iorek Byrnison in the Chris Weitz-directed fantasy film The Golden Compass based on the acclaimed Philip Pullman novel Northern Lights and starred Nicole Kidman and Daniel Craig. The film received mixed reviews but was a financial success. 2012–2019: The Hobbit, X-Men and other roles McKellen reprised the role of Gandalf on screen in Peter Jackson's three-part film adaptation of The Hobbit starting with The Hobbit: An Unexpected Journey (2012), followed by The Hobbit: The Desolation of Smaug (2013), and finally The Hobbit: The Battle of the Five Armies (2014). Despite the series receiving mixed reviews, it emerged as a financial success. McKellen also reprised his dual role as Erik Lehnsherr and Magneto in James Mangold's The Wolverine (2013), and Singer's X-Men: Days of Future Past (2014). In 2015, McKellen reunited with director Bill Condon playing an elderly Sherlock Holmes in the mystery film Mr. Holmes alongside Laura Linney. In the film based on the novel A Slight Trick of the Mind (2005), Holmes now 93, struggles to recall the details of his final case because his mind is slowly deteriorating. The film premiered at the 65th Berlin International Film Festival with McKellen receiving acclaim for his performance. Rolling Stone film critic Peter Travers praised his performance writing, "Don't think you can take another Hollywood version of Sherlock Holmes? Snap out of it. Apologies to Robert Downey Jr. and Benedict Cumberbatch, but what Ian McKellen does with Arthur Conan Doyle's fictional detective in Mr. Holmes is nothing short of magnificent...Director Bill Condon, who teamed superbly with McKellen on the Oscar-winning Gods and Monsters, brings us a riveting character study of a lion not going gentle into winter." In 2017, McKellen portrayed in a supporting role as Cogsworth (originally voiced by David Ogden Stiers in the 1991 animated film) in the live-action adaptation of Disney's Beauty and the Beast, directed by Bill Condon (which marked the third collaboration between Condon and McKellen, after Gods and Monsters and Mr. Holmes) and co-starred alongside Emma Watson and Dan Stevens. The film was released to positive reviews and grossed $1.2billion worldwide, making it the highest-grossing live-action musical film, the second highest-grossing film of 2017, and the 17th highest-grossing film of all time. The following year, he appeared in Kenneth Branagh's historical drama All is True (2018) portraying Henry Wriothesley, 3rd Earl of Southampton, opposite Branagh and Judi Dench. In 2019, he reunited with Condon for a fourth time in the mystery thriller The Good Liar opposite Helen Mirren, who received praise for their onscreen chemistry. That same year, he appeared as Gus the Theatre Cat in the ill fated movie musical adaptation of Cats directed by Tom Hooper. The film featured performances from Jennifer Hudson, James Corden, Rebel Wilson, Idris Elba, and Judi Dench. The film was widely panned for its poor visual effects, editing, performances, screenplay, and was a box office disaster. Television 1966–1981: Television debut and early roles One of McKellen's first major roles on television was as the title character in the BBC's 1966 adaptation of David Copperfield, which achieved 12 million viewers on its initial airings. After some rebroadcasting in the late 60s, the master videotapes for the serial were wiped, and only four scattered episodes (3, 8, 9 and 11) survive as telerecordings, three of which feature McKellen as adult David. McKellen had taken film roles throughout his career—beginning in 1969 with his role of George Matthews in A Touch of Love, and his first leading role was in 1980 as D. H. Lawrence in Priest of Love, but it was not until the 1990s that he became more widely recognised in this medium after several roles in blockbuster Hollywood films. 1990–1999: HBO Projects and awards success In 1993, he appeared in minor roles in the television miniseries Tales of the City, based on the novel by his friend Armistead Maupin. Later that year, McKellen appeared in the HBO television film And the Band Played On based on the acclaimed novel of the same name about the discovery of HIV. For his performance as gay rights activist Bill Kraus, McKellen received the CableACE Award for Supporting Actor in a Movie or Miniseries and was nominated for the Primetime Emmy Award for Outstanding Supporting Actor in a Miniseries or a Movie. In 1995, he appeared in the BBC television comedy film Cold Comfort Farm starring Kate Beckinsale, Rufus Sewell, and Stephen Fry. The following year he starred as Tsar Nicholas II in the HBO made for television movie Rasputin: Dark Servant of Destiny (1996) starring Alan Rickman as Rasputin. For his performance McKellen earned a Primetime Emmy Award for Outstanding Supporting Actor in a Limited Series or Movie nomination and received a Golden Globe Award for Best Supporting Actor – Series, Miniseries or Television Film win. McKellen appeared as Mr Creakle in the BBC series David Copperfield based on the Charles Dickens classic novel. The miniseries starred a pre-Harry Potter Daniel Radcliffe, Bob Hoskins, and Dame Maggie Smith. 2003–2017: Dramas, Guest roles and Sitcom On 16 March 2002, he hosted Saturday Night Live. In 2003, McKellen made a guest appearance as himself on the American cartoon show The Simpsons in a special British-themed episode entitled "The Regina Monologues", along with the then UK Prime Minister Tony Blair and author J. K. Rowling. In April and May 2005, he played the role of Mel Hutchwright in Granada Television's long running British soap opera, Coronation Street, fulfilling a lifelong ambition. He narrated Richard Bell's film Eighteen as a grandfather who leaves his World War II memoirs on audio-cassette for his teenage grandson. McKellen appeared in the 2006 BBC series of Ricky Gervais' comedy series Extras, where he played himself directing Gervais' character Andy Millman in a play about gay lovers. McKellen received a 2007 Primetime Emmy Award for Outstanding Guest Actor – Comedy Series nomination for his performance. In 2009 he portrayed Number Two in The Prisoner, a remake of the 1967 cult series The Prisoner. In November 2013, McKellen appeared in the Doctor Who 50th anniversary comedy homage The Five(ish) Doctors Reboot. From 2013 to 2016 McKellen co-starred in the ITV sitcom Vicious as Freddie Thornhill, alongside Derek Jacobi. The series revolves around an elderly gay couple who have been together for 50 years. The show’s original title was “Vicious Old Queens.” There are ongoing jokes about McKellen’s career as a relatively unsuccessful character actor who owns a tux because he stole it after doing a guest spot on “Downton Abbey” and that he holds the title of “10th Most Popular ‘Doctor Who’ Villain.” Liz Shannon Miller of IndieWire noted while the concept seemed, "weird as hell", that "Once you come to accept McKellen and Jacobi in a multi-camera format, there is a lot to respect about their performances; specifically, the way that those decades of classical training adapt themselves to the sitcom world. Much has been written before about how the tradition of the multi-cam, filmed in front of a studio audience, relates to theater, and McKellen and Jacobi know how to play to a live crowd." In October 2015, McKellen appeared as Norman to Anthony Hopkins' Sir in a BBC Two production of Ronald Harwood's The Dresser, alongside Edward Fox, Vanessa Kirby, and Emily Watson. Television critic Tim Goodman of The Hollywood Reporter praised the film and the central performances writing, "there’s no escaping that Hopkins and McKellen are the central figures here, giving wonderfully nuanced performances, onscreen together for their first time in their acclaimed careers." For his performance McKellen received a British Academy Television Award nomination for his performance. In 2017, McKellen appeared in the documentary McKellen: Playing the Part, directed by director Joe Stephenson. The documentary explores McKellen's life and career as an actor. Personal life McKellen and his first partner, Brian Taylor, a history teacher from Bolton, began their relationship in 1964. Their relationship lasted for eight years, ending in 1972. They lived in London, where McKellen continued to pursue his career as an actor. In 1978 he met his second partner, Sean Mathias, at the Edinburgh Festival. This relationship lasted until 1988, and according to Mathias it was tempestuous, with conflicts over McKellen's success in acting versus Mathias's somewhat less-successful career. The two remained friends, with Mathias later directing McKellen in Waiting for Godot at the Theatre Royal Haymarket in 2009. The pair entered into a business partnership with Evgeny Lebedev, purchasing the lease of The Grapes public house in Narrow Street. As of 2005, McKellen had been living in Narrow Street, Limehouse for more than 25 years, more than a decade of which had been spent in a five-story Victorian conversion. McKellen is an atheist. In the late 1980s, he lost his appetite for every kind of meat but fish, and has since followed a mainly pescetarian diet. In 2001, Ian McKellen received the Artist Citizen of the World Award (France). McKellen has a tattoo of the Elvish number nine, written using J. R. R. Tolkien's constructed script of Tengwar, on his shoulder in reference to his involvement in the Lord of the Rings and the fact that his character was one of the original nine companions of the Fellowship of the Ring. The other actors of "The Fellowship" (Elijah Wood, Sean Astin, Orlando Bloom, Billy Boyd, Sean Bean, Dominic Monaghan and Viggo Mortensen) have the same tattoo. John Rhys-Davies, whose character was also one of the original nine companions, did not get the tattoo, his stunt double was offered it instead. McKellen was diagnosed with prostate cancer in 2006. In 2012, he stated on his blog that "There is no cause for alarm. I am examined regularly and the cancer is contained. I've not needed any treatment." McKellen became an ordained minister of the Universal Life Church in early 2013 in order to preside over the marriage of his friend and X-Men co-star Patrick Stewart to the singer Sunny Ozell. McKellen was awarded an honorary Doctorate of Letters by Cambridge University on 18 June 2014. He was made a Freeman of the City of London on Thursday 30 October 2014. The ceremony took place at Guildhall in London. He was nominated by London's Lord Mayor Fiona Woolf, who said he was an "exceptional actor" and "tireless campaigner for equality". He is also an Emeritus Fellow of St Catherine's College, Oxford. Activism LGBT rights While McKellen had made his sexual orientation known to fellow actors early on in his stage career, it was not until 1988 that he came out to the general public, in a programme on BBC Radio. The context that prompted McKellen's decision, overriding any concerns about a possible negative effect on his career, was that the controversial Section 28 of the Local Government Bill, known simply as Section 28, was then under consideration in the British Parliament. Section 28 proposed prohibiting local authorities from promoting homosexuality "... as a kind of pretended family relationship". McKellen became active in fighting the proposed law, and, during a BBC Radio 3 programme where he debated Section 28 with the conservative journalist Peregrine Worsthorne, came out as gay. McKellen has stated that he was influenced in his decision by the advice and support of his friends, among them noted gay author Armistead Maupin. In a 1998 interview that discusses the 29th anniversary of the Stonewall riots, McKellen commented, I have many regrets about not having come out earlier, but one of them might be that I didn't engage myself in the politicking. He has said of this period: My own participating in that campaign was a focus for people [to] take comfort that if Ian McKellen was on board for this, perhaps it would be all right for other people to be as well, gay and straight. Section 28 was, however, enacted and remained on the statute books until 2000 in Scotland and 2003 in England and Wales. Section 28 never applied in Northern Ireland. In 2003, during an appearance on Have I Got News For You, McKellen claimed when he visited Michael Howard, then Environment Secretary (responsible for local government), in 1988 to lobby against Section 28, Howard refused to change his position but did ask him to leave an autograph for his children. McKellen agreed, but wrote, "Fuck off, I'm gay." McKellen described Howard's junior ministers, Conservatives David Wilshire and Jill Knight, who were the architects of Section 28, as the 'ugly sisters' of a political pantomime. McKellen has continued to be very active in LGBT rights efforts. In a statement on his website regarding his activism, the actor commented: McKellen is a co-founder of Stonewall, an LGBT rights lobby group in the United Kingdom, named after the Stonewall riots. McKellen is also patron of LGBT History Month, Pride London, Oxford Pride, GAY-GLOS, LGBT Foundation and FFLAG where he appears in their video "Parents Talking". In 1994, at the closing ceremony of the Gay Games, he briefly took the stage to address the crowd, saying, "I'm Sir Ian McKellen, but you can call me Serena": This nickname, given to him by Stephen Fry, had been circulating within the gay community since McKellen's knighthood was conferred. In 2002, he was the Celebrity Grand Marshal of the San Francisco Pride Parade and he attended the Academy Awards with his then-boyfriend, New Zealander Nick Cuthell. In 2006, McKellen spoke at the pre-launch of the 2007 LGBT History Month in the UK, lending his support to the organisation and its founder, Sue Sanders. In 2007, he became a patron of The Albert Kennedy Trust, an organisation that provides support to young, homeless and troubled LGBT people. In 2006, he became a patron of Oxford Pride, stating:I send my love to all members of Oxford Pride, their sponsors and supporters, of which I am proud to be one... Onlookers can be impressed by our confidence and determination to be ourselves and gay people, of whatever age, can be comforted by the occasion to take the first steps towards coming out and leaving the closet forever behind. McKellen has taken his activism internationally, and caused a major stir in Singapore, where he was invited to do an interview on a morning show and shocked the interviewer by asking if they could recommend him a gay bar; the programme immediately ended. In December 2008, he was named in [[Out (magazine)|Out]] annual Out 100 list. In 2010, McKellen extended his support for Liverpool's Homotopia festival in which a group of gay and lesbian Merseyside teenagers helped to produce an anti-homophobia campaign pack for schools and youth centres across the city. In May 2011, he called Sergey Sobyanin, Moscow's mayor, a "coward" for refusing to allow gay parades in the city. In 2014, he was named in the top 10 on the World Pride Power list. Charity work In April 2010, along with actors Brian Cox and Eleanor Bron, McKellen appeared in a series of TV advertisements to support Age UK, the charity recently formed from the merger of Age Concern and Help the Aged. All three actors gave their time free of charge. A cricket fan since childhood, McKellen umpired in March 2011 for a charity cricket match in New Zealand to support earthquake victims of the February 2011 Christchurch earthquake. McKellen is an honorary board member for the New York- and Washington, D.C.-based organization Only Make Believe. Only Make Believe creates and performs interactive plays in children's hospitals and care facilities. He was honoured by the organisation in 2012 and hosted their annual Make Believe on Broadway Gala in November 2013. He garnered publicity for the organisation by stripping down to his Lord of the Rings underwear on stage. McKellen also has a history of supporting individual theatres. While in New Zealand filming The Hobbit in 2012, he announced a special New Zealand tour "Shakespeare, Tolkien and You!", with proceeds going to help save the Isaac Theatre Royal, which suffered extensive damage during the 2011 Christchurch earthquake. McKellen said he opted to help save the building as it was the last theatre he played in New Zealand (Waiting for Godot in 2010) and the locals' love for it made it a place worth supporting. In July 2017, he performed a new one-man show for a week at Park Theatre (London), donating the proceeds to the theatre. Together with a number of his Lord of the Rings co-stars (plus writer Philippa Boyens and director Peter Jackson), on 1 June 2020 McKellen joined Josh Gad's YouTube series Reunited Apart which reunites the cast of popular movies through video-conferencing, and promotes donations to non-profit charities. Other work A friend of Ian Charleson and an admirer of his work, McKellen contributed an entire chapter to For Ian Charleson: A Tribute. A recording of McKellen's voice is heard before performances at the Royal Festival Hall, reminding patrons to ensure their mobile phones and watch alarms are switched off and to keep coughing to a minimum. He also took part in the 2012 Summer Paralympics opening ceremony in London as Prospero from Shakespeare's The Tempest. Acting credits Accolades and honours McKellen has received two Academy Award nominations for his performances in Gods and Monsters (1999), and The Lord of the Rings: The Fellowship of the Ring (2001). He has also received 5 Primetime Emmy Award nominations. McKellen has received two Tony Award nominations winning for Best Actor in a Play for his performance in Amadeus in 1981. He has also received 12 Laurence Olivier Awards nominations winning 6 awards for his performances in Pillars of the Community (1977), The Alchemist (1978), Bent (1979), Wild Honey (1984), Richard III (1991), and Ian McKellen on Stage: With Tolkien, Shakespeare, Others and YOU (2020). He has also received various honorary awards including Pride International Film Festival's Lifetime Achievement & Distinction Award in 2004, Olivier Awards's Society's Special Award in 2006. He also received Evening Standard Awards The Lebedev Special Award in 2009. The following year he received an Empire Award's Empire Icon Award In 2017 he received the Honorary Award from the Istanbul International Film Festival. See also List of British Academy Award nominees and winners List of actors with Academy Award nominations List of actors with two or more Academy Award nominations in acting categories List of LGBTQ Academy Award winners and nominees References Sources External links The papers of Sir Ian McKellen, actor are held by the Victoria and Albert Museum Theatre and Performance Department. Biography of Sir Ian McKellen, CH, CBE, Debrett's 1939 births Living people 20th-century English male actors 21st-century English male actors 2012 Summer Olympics cultural ambassadors Actors awarded knighthoods Alumni of St Catharine's College, Cambridge Annie Award winners Audiobook narrators Back Stage West Garland Award recipients Best Supporting Actor Golden Globe (television) winners Commanders of the Order of the British Empire Critics' Circle Theatre Award winners Drama Desk Award winners Honorary Golden Bear recipients English atheists English male film actors English male radio actors English male Shakespearean actors English male stage actors English male television actors English male video game actors English male voice actors English people of Scottish descent English people of Ulster-Scottish descent European Film Award for Best Actor winners Fellows of St Catherine's College, Oxford Former Protestants English gay actors Independent Spirit Award for Best Male Lead winners Knights Bachelor Laurence Olivier Award winners LGBT rights activists from the United Kingdom Male actors from Lancashire Members of the Order of the Companions of Honour Outstanding Performance by a Cast in a Motion Picture Screen Actors Guild Award winners Outstanding Performance by a Male Actor in a Supporting Role Screen Actors Guild Award winners People educated at Bolton School People from Burnley People from Wigan Actors from Bolton Royal Shakespeare Company members Tony Award winners Shorty Award winners
[ -0.5696573853492737, 0.07168614119291306, -0.6266286373138428, -0.8026134371757507, 0.11087372153997421, 0.8264018893241882, 0.6268536448478699, -0.1046169251203537, -0.34662073850631714, 0.36615458130836487, -0.7287071943283081, 0.8176314830780029, -0.16071443259716034, 0.4124490320682525...
15309
https://en.wikipedia.org/wiki/Intellivision
Intellivision
The Intellivision is a home video game console released by Mattel Electronics in 1979. The name is a portmanteau of "intelligent television". Development began in 1977, the same year as the launch of its main competitor, the Atari 2600. In 1984, Mattel sold its video game assets to a former Mattel Electronics executive and investors, eventually becoming INTV Corporation. Game development ran from 1978 to 1990 when the Intellivision was discontinued. From 1980 to 1983, more than 3 million consoles were sold. In 2009, IGN ranked the Intellivision No. 14 of the greatest video game consoles of all time. It remained Mattel's only video game console until the HyperScan in 2006. History and development Master Component The Intellivision was developed at Mattel in Hawthorne, California along with the Mattel Electronics line of handheld electronic games. Mattel's Design and Development group began investigating a home video game system in 1977. It was to have rich graphics and long lasting gameplay to distinguish itself from its competitors. Mattel identified a new but expensive chipset from National Semiconductor and negotiated better pricing for a simpler design. Its consultant, APh Technological Consulting, suggested a General Instrument chipset, listed as the Gimini programmable set in the GI 1977 catalog. The GI chipset lacked reprogrammable graphics and Mattel worked with GI to implement changes. GI published an updated chipset in its 1978 catalog. After having chosen National in August 1977, Mattel waited for two months before ultimately choosing the proposed GI chipset in late 1977. A team at Mattel, headed by David Chandler, began engineering the hardware, including the hand controllers. In 1978, David Rolfe of APh developed the onboard executive control software named Exec, and with a group of Caltech summer student employees programmed the first games. Graphics were designed by a group of artists at Mattel led by Dave James. The Intellivision was introduced at the 1979 Las Vegas CES in January as a modular home computer with the Master Component priced at and a soon-to-follow Keyboard Component also at . At Chicago CES in June, prices were revised to $250 for each component. A shortage of key chips from manufacturer General Instrument resulted in a limited number of Intellivision Master Components produced that year. In Fall 1979, Sylvania marketed its own branded Intellivision at $280 in its GTE stores at Philadelphia, Baltimore, and Washington, D.C. On December 3, Mattel delivered consoles to the Gottschalks department store chain headquartered in Fresno, California with a suggested list price of $275. The Intellivision was also listed in the nationally distributed JCPenney Christmas 1979 catalog along with seven cartridges. It was in stores nationwide by mid-1980 with the pack-in game Las Vegas Poker & Blackjack, and a library of ten cartridges. Mattel Electronics became a subsidiary in 1981. Though the Intellivision is not the first system to have challenged Warner Communications's Atari, it is the first to have posed a serious threat to the market leader. A series of advertisements starring George Plimpton use side-by-side game comparisons to demonstrate the superior graphics and sound of Intellivision over the Atari 2600. One slogan calls Intellivision "the closest thing to the real thing". One example compares golf games where the other console's games have a blip sound and cruder graphics, while the Intellivision features a realistic swing sound and striking of the ball, and a more 3D look. There is an advertisement comparing to the Atari 2600, with the slogan "I didn't know". In its first year, Mattel sold out its initial 175,000 production run of Intellivision Master Components. In 1981, more than one million Intellivision consoles were sold, five times as many as in 1980. The Intellivision Master Component was branded and distributed by various companies. Before Mattel shifted manufacturing to Hong Kong, Mattel Intellivision consoles were manufactured by GTE Sylvania. GTE Sylvania Intellivision consoles were produced along with Mattel's, differing only by the brand name. The Sears Super Video Arcade, manufactured by Mattel in Hong Kong, has a restyled beige top cover and detachable controllers. Its default title screen lacks the "Mattel Electronics" captioning. In 1982, Radio Shack marketed the Tandyvision One, similar to the original console but with the gold plates replaced with more wood trim. In Japan, Intellivision consoles were branded by Bandai in 1982, and in Brazil there were Digimed and Digiplay consoles manufactured by Sharp in 1983. Software Inside every Intellivision console is 4K of ROM containing the Exec software. It provides two benefits: reusable code that can effectively make a 4K cartridge an 8K game, and a software framework for new programmers to develop games more easily and quickly. It also allows other programmers to more easily review and continue another's project. Under the supervision of David Rolfe at APh, and with graphics from Mattel artist Dave James, APh was able to quickly create the Intellivision launch game library using mostly summer students. The drawback is that to be flexible and handle many different types of games, the Exec runs less efficiently than a dedicated program. Intellivision games that leverage the Exec run at a 20 Hz frame rate instead of the 60 Hz frame rate for which the Intellivision was designed. Using the Exec framework is optional, but almost all Intellivision games released by Mattel Electronics use it, and thus run at 20 Hz. The limited ROM space in the early years of Intellivision game releases also means there is no space for a computer player, so many early multiplayer games require two human players. Initially, all Intellivision games were programmed by an outside firm, APh Technological Consulting, with 19 cartridges produced before Christmas 1980. Once the Intellivision project became successful, software development was brought in-house. Mattel formed its own software development group and began hiring programmers. The original five members of that Intellivision team were Mike Minkoff, Rick Levine, John Sohl, Don Daglow, and manager Gabriel Baum. Levine and Minkoff, a long-time Mattel Toys veteran, both transferred from the hand-held Mattel game engineering team. During 1981, Mattel hired programmers as fast as possible. Early in 1982 Mattel Electronics relocated from Mattel headquarters to an unused industrial building. Offices were renovated as new staff moved in. To keep these programmers from being hired away by rival Atari, their identities and work location was kept a closely guarded secret. In public, the programmers were referred to collectively as the Blue Sky Rangers. Most of the early games are based on traditional real-world concepts such as sports, with an emphasis on realism and depth of play within the technology of the time. The Intellivision was not marketed as a toy; as such, games such as Sea Battle and B-17 Bomber are not made in the pick-up-and-play format like arcade games. Reading the instructions is often a prerequisite. Every cartridge produced by Mattel Electronics includes two plastic controller overlays to help navigate the 12-button keypad, although not every game uses it. Game series, or networks, are Major League Sports, Action, Strategy, Gaming, Children's Learning, and later Space Action and Arcade. The network concept was dropped in 1983, as was the convenient gate-fold style box for storing the cartridge, instructions, and overlays. Starting in 1981 programmers looking for credit and royalties on sales began leaving both APh and Mattel Electronics to create Intellivision cartridges for third-party publishers. They helped form Imagic in 1981, and in 1982 others joined Activision and Atari. Cheshire Engineering was formed by a few senior APh programmers including David Rolfe, author of the Exec, and Tom Loughry, creator of one of the most popular Intellivision games Advanced Dungeons and Dragons. Cheshire created Intellivision games for Activision. Third-party developers Activision, Imagic, and Coleco started producing Intellivision cartridges in 1982, and Atari, Parker Brothers, Sega, and Interphase followed in 1983. The third-party developers, not having legal access to Exec knowledge, often bypassed the Exec framework to create smooth 30 Hz and 60 Hz Intellivision games such as The Dreadnaught Factor. Cheaper ROM prices also allowed for progressively larger games as 8K, 12K, and 16K cartridges became common. The first Mattel Electronics Intellivision game to run at 60 Hz is Masters of the Universe in 1983. Marketing dubbed the term "Super Graphics" on the game's packaging and marketing. Mattel Electronics had a competitive advantage in its team of experienced and talented programmers. As competitors often depended on licensing well known trademarks to sell video games, Mattel focused on original ideas. Don Daglow was a key early programmer at Mattel and became director of Intellivision game development. Daglow created Utopia, a precursor to the sim genre and, with Eddie Dombrower, the ground breaking sports simulation World Series Major League Baseball. Daglow was also involved with the popular Intellivision games Tron Deadly Discs and Shark! Shark!. After Mattel Electronics closed in 1984, its programmers continued to make significant contributions to the videogame industry. Don Daglow and Eddie Dombrower went on to Electronic Arts to create Earl Weaver Baseball, and Don Daglow founded Stormfront Studios. Bill Fisher, Steve Roney, and Mike Breen founded Quicksilver Software, and David Warhol founded Realtime Associates. Keyboard Component The Intellivision was designed as a modular home computer, so from the beginning, its packaging, promotional materials, and television commercials, promised the addition of a forthcoming accessory called the Keyboard Component. The Master Component was packaged as a stand-alone video game system to which the Keyboard Component could be added, providing the computer keyboard and tape drive. Not meant to be a hobbyist or business computer, the Intellivision home computer was meant to run pre-programmed software and bring "data flow" (Videotex) into the home. The Keyboard Component adds an 8-bit 6502 processor, making the Intellivision a dual-processor computer. It has 16K 10-bit shared RAM that can load and execute both Intellivision CP1610 and 6502 program code from tape, which is a large amount as typical contemporary cartridges are 4K. The cassettes have two tracks of digital data and two tracks of analog audio, completely controlled by the computer. Two tracks are read-only for the software, and two tracks are for user data. The tape drive is block addressed with high speed indexing. A high resolution 40x24 monochrome text display can overlay regular Intellivision graphics. There is a microphone port and two expansion ports for peripherals and RAM. The Microsoft BASIC programming cartridge uses one of these ports. Expanded memory cartridges support 1000 pages of 8KB each. A third pass-through cartridge port is for regular Intellivision cartridges. It uses the Intellivision's power supply. A 40-column thermal printer was available, and a telephone modem was planned along with voice synthesis and voice recognition. David Rolfe of APh wrote a control program for the Keyboard Component called PicSe (Picture Sequencer) specifically for the development of multimedia applications. PicSe synchronizes the graphics and analog audio while concurrently saving or loading tape data. Productivity software for home finances, personal improvement, and self education were planned. Subject experts were consulted and their voices recorded and used in the software. Three applications using the PicSe system were released on cassette tape: Conversational French, Jack Lalanne's Physical Conditioning, and Spelling Challenge. Programs written in BASIC do not have access to Intellivision graphics and were sold at a lower price. Five BASIC applications were released on tape: Family Budgeting, Geography Challenge, and Crosswords I, II, and III. The Keyboard Component is an ambitious piece of engineering for its time, and it was repeatedly delayed as the engineers tried to reduce manufacturing costs. In August 1979 the Intellivision Keyboard Component, in breadboard form, was successfully entered into the Sears Market Research Program. In December 1979, Mattel had production design working units but decided on a significant internal design change to consolidate circuit boards. In September 1980, it was test marketed in Fresno, California but without software, except for the BASIC programming cartridge. In the late 1981, design changes were finally implemented and the Keyboard Component was released at in Seattle and New Orleans only. Customers who complained in writing could buy a Keyboard Component directly from Mattel. The printer, a rebadged Alphacom Sprinter 40, was only available by mail order. The keyboard component's repeated delays became so notorious around Mattel headquarters that comedian Jay Leno, when performing at Mattel's 1981 Christmas party, got his biggest response of the evening with the line: "You know what the three big lies are, don't you? 'The check is in the mail', 'I'll still respect you in the morning', and 'The keyboard will be out in spring.'" Complaints from consumers who had chosen to buy the Intellivision specifically on the promise of a "coming soon" personal-computer upgrade, eventually caught the attention of the Federal Trade Commission (FTC), who started investigating Mattel Electronics for fraud and false advertising. In mid-1982, the FTC ordered Mattel to pay a monthly fine (said to be $10,000) until the promised computer upgrade was in full retail distribution. To end the ongoing fines, the Keyboard Component was officially canceled in August 1982 and the Entertainment Computer System (ECS) module offered in its place. Part of Mattel's settlement with the FTC involved offering to buy back all of the existing Keyboard Components from customers. Mattel provided a full refund, but customers without a receipt received $550 for the Keyboard Component, $60 for the BASIC cartridge, and $30 for each cassette software. Any customer who opted to keep the products was required to sign a waiver with the understanding that no more software would be written for the system and absolving Mattel of any future responsibility for technical support. They were also compensated with $1000 worth of Mattel Electronics products. Though approximately 4,000 Keyboard Components were manufactured, it is not clear how many of them were sold and they are rare. Many of the units were dismantled for parts. Others were used by Mattel Electronics programmers as part of their development system. A Keyboard Component could be interfaced with an Intellivision development system in place of the hand-built Magus board RAM cartridge. Data transfer to the Keyboard Component RAM is done serially and is slower than the Magus board parallel interface. The keyboard component debacle was ranked as No. 11 on GameSpys "25 dumbest moments in gaming". Entertainment Computer System (ECS) In mid-1981, Mattel's upper management was becoming concerned that the keyboard component division would never be able to produce a sellable product. As a result, Mattel Electronics set up a competing internal engineering team whose stated mission was to produce an inexpensive add-on called the "Basic Development System", or BDS, to be sold as an educational device to introduce kids to the concepts of computer programming. The rival BDS engineering group, who had to keep the project's real purpose a secret among themselves, fearing that if David Chandler, the head of the keyboard component team, found out about it he would use his influence to end the project, eventually came up with a much less expensive alternative. Originally dubbed the "Lucky", from LUCKI: Low User-Cost Keyboard Interface, it lacked many of the sophisticated features envisioned for the original keyboard component. Gone, for example, was the 16K (8MB max) of RAM, the secondary CPU, and high resolution text; instead, the ECS offered a mere 2KB RAM expansion, a built-in BASIC that was marginally functional, plus a much-simplified cassette and printer interface. Ultimately, this fulfilled the original promises of turning the Intellivision into a computer, making it possible to write programs and store them to tape, and interfacing with a printer well enough to allow Mattel to claim that they had delivered the promised computer upgrade and stop the FTC's mounting fines. It even offered, via an additional sound chip (AY-3-8917) inside the ECS module and an optional 49-key music synthesizer keyboard, the possibility of turning the Intellivision into a multi-voice synthesizer which could be used to play or learn music. In the fall of 1982, the LUCKI, now renamed the Entertainment Computer System (ECS), was presented at the annual sales meeting, officially ending the ill-fated keyboard component project. A new advertising campaign was aired in time for the 1982 Christmas season, and the ECS itself was shown to the public at the January 1983 Consumer Electronics Show (CES) in Las Vegas. A few months later, the ECS hit the market, and the FTC agreed to drop the $10K per month fines. By the time the ECS made its retail debut as the Intellivision Computer Module, an internal shake-up at the top levels of Mattel Electronics' management had caused the company's focus to shift away from hardware add-ons in favor of software, and the ECS received very little in terms of furthering the marketing push. Further hardware developments, including a planned Program Expander that would have added another 16K of RAM and a more intricate, fully featured Extended-BASIC to the system, were halted. In the end, six games were released for the ECS; a few more were completed but not released. The ECS also offered four player game-play with the optional addition of two extra hand controllers. Four player games were in development when Mattel Electronics closed in 1984. World Cup Soccer was later completed and released in 1985 by Dextel in Europe and then INTV Corporation in North America. The documentation does not mention it but when the ECS Computer Adapter is used, World Cup Soccer can be played with one to four players, or two players cooperatively against the computer. Intellivoice In 1982 Mattel introduced the Intellivoice Voice Synthesis Module, a speech synthesizer for compatible cartridges. The Intellivoice is novel in two respects: human sounding male and female voices with distinct accents, and the speech-supporting games were designed with speech being an integral part of the game-play. Like the Intellivision chipset, the Intellivoice chipset was developed by General Instrument. The SP0256-012 orator chip has 2KB ROM inside, and is used to store the speech for numerical digits, some common words, and the phrase "Mattel Electronics presents". Speech can also be processed from the Intellivoice's SP650 buffer chip, stored and loaded from cartridge memory. That buffer chip has its own I/O and the Intellivoice has a 30-pin expansion port under a removable top plate. Mattel Electronics planned to use that connector for wireless hand controllers. Mattel Electronics built a state of the art voice processing lab to produce the phrases used in Intellivoice games. However, the amount of speech that could be compressed into an 8K or 12K cartridge and still leave room for a game was limited. Intellivoice cartridges Space Spartans and B-17 Bomber did sell about 300,000 copies each, priced a few dollars more than regular Intellivision cartridges. However, at $79 the Intellivoice did not sell as well as Mattel expected, and Intellivoices were later offered free with the purchase of a Master Component. In August 1983 the Intellivoice system was quietly phased out. A children's title called Magic Carousel, and foreign language versions of Space Spartans were completed but shelved. Additional games Woody Woodpecker and Space Shuttle went unfinished with the voice recordings unused. Four Intellivoice games were released: Space Spartans, B-17 Bomber, Bomb Squad, and Tron: Solar Sailer. A fifth game, Intellivision World Series Major League Baseball, developed as part of the Entertainment Computer System series, also supports the Intellivoice if both the ECS and Intellivoice are connected concurrently. Unlike the Intellivoice-specific games, however, World Series Major League Baseball is also playable without the Intellivoice module (but not without the ECS). Intellivision II In the spring of 1983, Mattel introduced the Intellivision II, a cheaper, more compact redesign of the original, that was designed to be less expensive to manufacture and service, with updated styling. It also had longer controller cords. The Intellivision II was initially released without a pack-in game but was later packaged with BurgerTime in the United States and Lock'N'Chase in Canada. In 1984 the Digiplay Intellivision II was introduced in Brazil. Brazil was the only country outside North America to have the redesigned Intellivision II. Using an external AC Adapter (16.2VAC), consolidating some ICs, and taking advantage of relaxed FCC emission standards, the Intellivision II has a significantly smaller footprint than the original. The controllers, now detachable, have a different feel, with plastic rather than rubber side buttons and a flat membrane keypad. Users of the original Intellivision missed the ability to find keypad buttons by the tactile feel of the original controller bubble keypad. One functional difference was the addition of a video input to the cartridge port, added specifically to support the System Changer, an accessory also released in 1983 by Mattel that played Atari 2600 cartridges through the Intellivision. The Intellivision hand controllers could be used to play Atari 2600 games. The System Changer also had two controller ports compatible with Atari joysticks. The original Intellivision required a hardware modification, a service provided by Mattel, to work with the System Changer. Otherwise the Intellivision II was promoted to be compatible with the original. It was discovered that a few Coleco Intellivision games did not work on the Intellivision II. Mattel secretly changed the Exec internal ROM program in an attempt to lock out third party games. A few of Coleco's early games were affected but the 3rd party developers quickly figured out how to get around it. Mattel's own Electric Company Word Fun, however, will not run on the Intellivision II due to this change. In an unrelated issue but also due to Exec changes, Super Pro Football experiences a minor glitch where the quarterback does not appear until after the ball is hiked. There were also some minor changes to the sound chip (AY-3-8914A/AY-3-8916) affecting sound effects in some games. Programmers at Mattel discovered the audio differences and avoided the problem in future games. Decade As early as 1981 Dave Chandler's group began designing what would have been Mattel's next generation console, codenamed Decade and now referred to as the Intellivision IV. It would have been based on the 32-bit MC68000 processor and a 16-bit custom designed advanced graphic interface chip. Specifications called for dual display support, 240x192 bitmap resolution, 16 programmable 12-bit colors (4096 colors), antialiasing, 40x24 tiled graphics modes, four colors per tile (16 with shading), text layer and independent scrolling, 16 multicolored 16x16 sprites per scan-line, 32 level hardware sprite scaling. Line interrupts for reprogramming sprite and color registers would allow for many more sprites and colors on screen at the same time. It was intended as a machine that could lead Mattel Electronics into the 1990s, however on August 4, 1983, most hardware people at Mattel Electronics were laid off. Intellivision III In 1982, with new machines introduced by competitors, Mattel marketing wanted to bring an upgraded system to market sooner. The Intellivision III was to be an upgraded but backward-compatible system, based on a similar CP1610 processor and with an improved graphics STIC chip producing double the resolution with more sprites and colors. The Intellivision III never proceeded past the prototype stage; a new EXEC was written for it, but no games. It was cancelled in mid-1983. A Mattel document titled Target Specification Intellivision III has the following. CPU: CP1610-2 at 3.56 MHz (2x original CPU speed) separate 16-bit data bus and address bus multiplexed data/address mode for backward compatibility with existing cartridges Graphics: STIC 1B tiled graphics, 20 cards by 24 rows 2-color 16x8 pixel cards for a resolution of 320x192 4-color 8x8 pixel cards for a resolution of 160x192 40 x 24 alphanumerics 16 programmable colors color palette selectable per card 12-bit RGB definition for 4096 possible colors 8 sprites per scanline reusable on different scanlines 16 pixels wide in 1 color, 8 pixels wide in 3 colors up-to 255 lines high overlap detect of individual colors fine pixel horizontal and vertical scrolling (backward compatible) single data bus allows graphics rom/ram storage on cartridges STIC 1 backwards compatible mode RAM: 4K words, 16-bit, DRAM (upgradable to 65K words) five channel sound with improved frequency range (backward compatible) integrated Intellivoice Competition and market crash According to the company's 1982 Form 10-K, Mattel had almost 20% of the domestic video-game market. Mattel Electronics provided 25% of revenue and 50% of operating income in fiscal 1982. Although the Atari 2600 had more third-party development, Creative Computing Video & Arcade Games reported after visiting the summer 1982 Consumer Electronics Show that "the momentum is tremendous". Activision and Imagic began releasing games for the Intellivision, as did hardware rival Coleco. Mattel created "M Network" branded games for Atari's system. The company's advertisement budget increased to over $20 million for the year. In its October 1982 stockholders' report Mattel announced that Electronics had, so far that year, posted a nearly $100 million profit on nearly $500 million sales; a threefold increase over October 1981. However, the same report predicted a loss for the upcoming quarter. Hiring still continued, as did the company's optimism that the investment in software and hardware development would pay off. The M Network brand expanded to personal computers. An office in Taiwan was opened to handle Apple II programming. The original five-person Mattel game development team had grown to 110 people under new vice president Baum, while Daglow led Intellivision development and top engineer Minkoff directed all work on all other platforms. In February 1983, Mattel Electronics opened an office in the south of France to provide European input to Intellivision games and develop games for the ColecoVision. At its peak Mattel Electronics employed 1800 people. Amid the flurry of new hardware and software development, there was trouble for the Intellivision. New game systems (ColecoVision and Atari 5200) introduced in 1982 took advantage of falling RAM prices to offer graphics closer to arcade quality. In 1983, the price of home computers, particularly the Commodore 64, came down drastically to compete with video game system sales. The market became flooded with hardware and software, and retailers were ill-equipped to cope. In spring 1983, hiring at Mattel Electronics came to a halt. At the June 1983 Consumer Electronics Show in Chicago, Mattel Electronics had the opportunity to show off all their new products. The response was underwhelming. Several people in top management positions were replaced due to massive losses. On July 12, 1983, Mattel Electronics President Josh Denham was replaced with outsider Mack Morris. Morris brought in former Mattel Electronics president and marketing director Jeff Rochlis as a consultant and all projects were under review. The Intellivision III was cancelled and then all new hardware development was stopped when 660 jobs were cut on August 4. The price of the Intellivision II (which launched at $150 earlier that year) was lowered to $69, and Mattel Electronics was to be a software company. However, by October 1983, Electronics' losses were over $280 million for the year and one third of the programming staff were laid off. Another third were gone by November, and on January 20, 1984 the remaining programming staff were laid-off. The Taiwan and French offices continued a little while longer due to contract and legal obligations. On February 4, 1984, Mattel sold the Intellivision business for $20 million. In 1983, 750,000 Intellivision Master Components were sold, more than three million units from 1980 to 1983. INTV Corporation (1984–1990) Former Mattel Electronics Senior Vice President of Marketing, Terrence Valeski, understood that although losses were huge, the demand for video games increased in 1983. Valeski found investors and purchased the rights to Intellivision, the games, and inventory from Mattel. A new company, Intellivision Inc, was formed and by the end of 1984 Valeski bought out the other investors and changed the name to INTV Corporation. They continued to supply the large toy stores and sold games through direct mail order. At first they sold the existing inventory of games and Intellivision II systems. When the inventory of games sold out they produced more, but without the Mattel name or unnecessary licenses on the printed materials. To lower costs, the boxes, instructions, and overlays were produced at lower quality compared to Mattel. In France, the Mattel Electronics office found investors and became Nice Ideas in April 1984. They continued to work on Intellivision, Colecovision, and other computer games. They produced Intellivision World Cup Soccer and Championship Tennis, both released in 1985 by European publisher Dextel. In 1985, INTV Corporation introduced the INTV System III, also branded as the Intellivision Super Pro System, using the same design as the original Intellivision model but in black and silver. That same year INTV Corp introduced two new games that were completed at Mattel but not released: Thunder Castle and World Championship Baseball. With their early success INTV Corp decided to produce new games and in 1986 introduced Super Pro Football, an update of Mattel NFL Football. INTV Corp continued a relationship that Mattel had with Data East and produced all new cartridges such as Commando in 1987 and Body Slam Wrestling in 1988. Also in 1987, INTV Corp released Dig Dug, purchased from Atari where the game was completed but not released in 1984. They also got into producing next generation games with the production of Monster Truck Rally for Nintendo Entertainment System (NES) in 1991, also released as Stadium Mud Buggies for Intellivision in 1989. Licensing agreements with Nintendo and Sega required INTV Corporation to discontinue the Intellivision in 1990. INTV Corporation did publish 21 new Intellivision cartridges bringing the Intellivision library to a total of 124 cartridges plus one compilation cartridge. Tutorvision In 1989, INTV Corp and World Book Encyclopedia entered into an agreement to manufacture an educational video game system called Tutorvision. It is a modified Intellivision, the case molded in light beige with gold and blue trim. The Exec ROM expanded, system RAM increased to 1.75K, and graphics RAM increased to 2KB. That is enough graphics RAM to define unique graphic tiles for the entire screen. Games were designed by World Book, J. Hakansson Associates, and programmed by Realtime Associates. Sixteen games were in production, plus one Canadian variation. However, the cartridges and the Tutorvision were never released; instead World Book and INTV Corporation sued each other. In 1990, INTV Corporation filed for bankruptcy protection and closed in 1991. An unknown number of later Intellivision SuperPro systems have Tutorvision hardware inside. A subset of these units contain the full Tutorvision EXEC and can play Tutorvision games. Intellivision Productions (1997 to 2018) Intellivision Lives! Intellivision games became readily available again when Keith Robinson and Stephen Roney, both former Intellivision programmers at Mattel Electronics, obtained exclusive rights to the Intellivision and games in 1997. That year they formed a new company, Intellivision Productions, and made Intellivision for PC Volume 1 available as a free download. Intellivision games could be played on a modern computer for the first time. That download includes three Intellivision games and an MS-DOS Intellivision emulator that plays original game code. It was followed by Volume 2 and another three games including Deep Pockets Super Pro Pool & Billiards; a game completed in 1990 but never released until this download in 1997. In 2000 the Intellipack 3 download was available with another four Intellivision games and emulators for Windows or Macintosh. Intellivision Productions released Intellivision Lives! and Intellivision Rocks on compact disc in 1998 and 2001. These compilation CDs play the original game code through emulators for MS-DOS, Windows, and Macintosh computers. Together they have over 100 Intellivision games including never before released King of the Mountain, Takeover, Robot Rubble, League of Light, and others. Intellivision Rocks includes Intellivision games made by Activision and Imagic. Some games could not be included due to licensing, others simply used different titles to avoid trademarked names. The CDs are also a resource for development history, box art, hidden features, programmer biographies, video interviews, and original commercials. Also in 1997 Intellivision Productions announced they would sell development tools allowing customers to program their own Intellivision games. They were to provide documentation, PC compatible cross-assemblers, and the Magus II PC Intellivision cartridge interface. Unfortunately, the project was cancelled but they did provide copies of "Your Friend the EXEC", the programmers guide to the Intellivision Executive control software. By 2000 Intellivision hobbyists ultimately created their own development tools, including Intellivision memory cartridges. In 2005 Intellivision Productions announced that new Intellivision cartridges were to be produced. "Deep Pockets and Illusions will be the first two releases in a series of new cartridges for the Intellivision. The printed circuit boards, the cartridge casings, the boxes are all being custom manufactured for this special series." Illusions was completed at Mattel Electronics' French office in 1983 but never released. Deep Pockets Super Pro Pool & Billiards was programmed for INTV Corporation in 1990 and only released as a ROM file in 1998. However, no cartridges were produced. Previously, in 2000, Intellivision Productions did release new cartridges for the Atari 2600 and Colecovision. Sea Battle and Swordfight were Atari 2600 games created by Mattel Electronics in the early 1980s but not previously released. Steamroller (Colecovision) was developed for Activision in 1984 and not previously released. Licensing Intellivision Games Also in 1999, Activision released A Collection of Intellivision Classic Games for PlayStation. Also known as Intellivision Classics, it has 30 emulated Intellivision games as well as video interviews of some of the original programmers. All of the games were licensed from Intellivision Productions and none of the Activision or Imagic Intellivision games were included. In 2003, Crave Entertainment released a PlayStation 2 version of Intellivision Lives! and then Xbox and GameCube version in 2004. In 2010, Virtual Play Games released Intellivision Lives! for the Nintendo DS including one never before released game, Blow Out. In 2008 Microsoft made Intellivision Lives! an available download on the Xbox Live Marketplace as an Xbox Original and playable on the Xbox 360. In 2003, the Intellivision 25 and Intellivision 15 direct-to-TV systems were released by Techno Source Ltd. These are an all-in-one single controller design that plugs directly into a television. One includes 25 games the other ten. These Intellivision games were not emulated but rewritten for the native processor (Nintendo Entertainment System compatible) and adapted to a contemporary controller. As such they look and play differently than Intellivision. In 2005 they were updated for two-player play as the Intellivision X2 with 15 games. They were commercially very successful altogether selling about 4 million units by end of 2006. Several licensed Intellivision games became available to Windows computers through the GameTap subscription gaming service in 2005 including Astrosmash, Buzz Bombers, Hover Force, Night Stalker, Pinball, Shark! Shark!, Skiing and Snafu. Installation of the GameTap Player software was required to access the emulator and games. The VH1 Online Arcade made nine Intellivision games available in 2007. Using a Shockwave emulator these Intellivision games could be played directly through a web browser with Shockwave Player. In 2010, VH1 Classic and MTV Networks released 6 Intellivision games to iOS. Intellivision games were first adapted to mobile phones and published by THQ Wireless in 2001. On March 24, 2010, Microsoft launched the Game Room service for Xbox Live and Games for Windows Live. This service includes support for Intellivision games and allows players to compete for high scores via online leaderboards. At the 2011 Consumer Electronics Show, Microsoft announced a version of Game Room for Windows Phone, promising a catalog of 44 Intellivision games. AtGames and its Direct2Drive digital store has Windows compatible Intellivision compilations available for download purchase. Intellivision Flashback The number of Intellivision games that can be played effectively with contemporary game controllers is limited. On October 1, 2014, AtGames Digital Media, Inc., under license from Intellivision Productions, Inc., released the Intellivision Flashback classic game console. It is a miniature sized Intellivision console with two original sized Intellivision controllers. While adapters have been available to interface original Intellivision controllers to personal computers, the Intellivision Flashback includes two new Intellivision controllers identical in layout and function to the originals. It comes with 60 (61 at Dollar General) emulated Intellivision games built into ROM and a sample set of plastic overlays for 10 games. The Advanced Dungeons & Dragons games were included as Crown of Kings and Minotaur. As with many of the other Intellivision compilations, no games requiring third party licensing were included. Intellivision Entertainment In May 2018, Tommy Tallarico announced that he acquired the rights to the Intellivision brand and games with plans to launch a new home video game console. A new company, Intellivision Entertainment, was formed with Tallarico serving as president. Intellivision Productions has been renamed Blue Sky Rangers Inc. and their video game intellectual property has been transferred to Intellivision Entertainment. At the Portland Retro Gaming Expo, in October 2018, the Intellivision Amico was officially revealed. Reviews and game guides Ken Uston published Ken Uston's Guide to Buying and Beating the Home Video Games in 1982 as a guide to potential buyers of console systems/cartridges, as well as a brief strategy guide to numerous cartridge games then in existence. He described Intellivision as "the most mechanically reliable of the systems… The controller (used during "many hours of experimentation") worked with perfect consistency. The unit never had overheating problems, nor were loose wires or other connections encountered." However, Uston rated the controls and control system as "below average" and the worst of the consoles he tested (including Atari 2600, Magnavox Odyssey², Astrovision, and Fairchild Channel F). Jeff Rovin lists Intellivision as one of the seven major suppliers of videogames in 1982, and mentions it as "the unchallenged king of graphics", however stating that the controllers can be "difficult to operate", the fact that if a controller breaks the entire unit must be shipped off for repairs (since they did not detach at first), and that the overlays "are sometimes so stubborn as to tempt one's patience" . A 1996 article in Next Generation said the Intellivision "had greater graphics power than the dominant Atari 2600. It was slower than the 2600 and had less software available, but it was known for its superior sports titles." A year later, Electronic Gaming Monthly assessed the Intellivision in an overview of older gaming consoles, remarking that the controllers "were as comfortable as they were practical. The unique disk-shaped directional pad provided unprecedented control for the time, and the numeric keypad opened up new options previously unavailable in console gaming." They praised the breadth of the software library but said there was a lack of genuinely stand-out games. Innovations Intellivision can be considered the first 16-bit game console, as it has a 16-bit microprocessor. The first home console and one of the first video games to use a tile-based playfield. It allowed for the display of detailed graphics and colour with very little RAM. The Intellivision was also the first system to feature downloadable games with PlayCable in 1981. Intellivision was the first game console to provide real-time human voices in the middle of gameplay, courtesy of the Intellivoice module. The first game controller with a directional thumb pad. The Intellivision was also the first game console or home computer to offer a musical synthesizer keyboard. Intellivision was also the first console to have a complete built-in character font. While Odyssey² had a limited character font (uppercase alphabet, numerals, and some other characters), Intellivision's system font had complete upper- and lowercase alphabets, numerals, and almost all of the punctuation and symbols found on standard computer keyboards. Utopia (1982) is credited as the game that spawned the construction and management simulation genre. World Series Major League Baseball (1983) is considered to be the first sports simulation video game with a number of innovations: multiple views of a 3D calculated virtual play-field, statistical based game-play using real historical baseball player statistics, manager player substitutions, play-by-play speech, and save games or lineups to tape storage. Technical specifications Master Component Intellivision, Super Video Arcade, Tandyvision One, Intellivision II, INTV System III, Super Pro System General Instrument CP1610 16-bit microprocessor CPU 1 microsecond cycle time, 2 MHz 2-phase clock (1.117 µs and 1.7897725 MHz NTSC) 16-bit multiplexed data/address bus 1456 bytes of RAM (SRAM): 240 × 8-bit scratchpad memory 352 × 16-bit (704 bytes) system memory, General Instrument RA-3-9600 dual ported, bridges CPU and STIC buses, 240 words used for graphics 512 × 8-bit graphics RAM 7168 bytes of ROM: 4096 × 10-bit (5120 bytes) executive ROM (4352 x 10-bit Intellivision II) 2048 × 8-bit graphics ROM (344 bytes used by Exec program) Standard Television Interface Chip (STIC): General Instrument AY-3-8900/AY-3-8900-1 operates at 4 MHz or 3.579545 MHz (NTSC) 14-bit multiplexed data/address bus shared with CPU 20x12 tiled playfield, tiles are 8x8 pixels for a resolution of 159x96 (right pixel not displayed) 16 color palette, two colors per tile Foreground/Background mode; all 16 colors available for background and colors 1–8 available for foreground per tile; grom cards limited to the first 64 Color Stack mode; all 16 colors available for foreground per tile; background colour from a four colour rotating stack of any four colors, all 277 grom and gram cards available Colored Squares mode allows each tile to have four different colored 4x4 blocks as in Snafu); first seven colors available for foreground blocks; background colour from the color stack 8 sprites (all visible on the same scanline). Hardware supports the following features per-sprite: coordinate addressable off screen for smooth edge entries and exits Size selection: 8x16 or 8 pixels wide by 8 half-pixels high Stretching: horizontal (1× or 2×) and vertical (1×, 2×, 4× or 8×) Mirroring: horizontal and vertical Collision detection: sprite to sprite, sprite to background, and sprite to screen border Priority: selects whether sprite appears in front of or behind background. fine horizontal and vertical pixel scrolling all STIC attributes and GRAM re-programmable at VBLANK, 60 times a second Three-channel sound, with one noise generator, audio chip: General Instrument AY-3-8914 (AY-3-8914A/AY-3-8916 Intellivision II) Connections: 44-pin cartridge/expansion port 64K addressable (approx 50K available), more with memory bank switching typical cartridges: 4K, 6K, 8K, 12K, 16K, 24K (10-bit ROMs) 2 x 9-pin controller connectors inline pin connectors internally accessible on original Intellivision and INTV systems DE-9 connectors externally accessible on Super Video Arcade and Intellivision II RF/RCA audio/video connector; RGB/scart/péritel in France Intellivision II only: external power adapter 16.7Vac 1amp or 16.2Vac 955mA Game controller The Intellivision controller features: 12-button numeric keypad (0–9, clear, and enter) Four side-located action buttons (two for left handed players, two for right handed players) top two side buttons are electronically the same, giving three distinct buttons A directional pad, capable of detecting 16 directions of movement Plastic overlays that slide into place as an extra layer on the keypad to show game-specific key functions The directional pad was called a "control disc" and marketed as having the "functionality of both a joystick and a paddle". The controller was ranked the fourth worst video game controller by IGN editor Craig Harris. Peripherals Keyboard Component (limited availability) 6502 CPU, 16K x 10-bit SRAM, 40x24 text overlay, tape-drive, microphone input, two expansion ports PlayCable (availability through cable TV provider 1981–1983) Mattel and General Instrument joint venture, manufactured by GI/Jerrold 8K x 10bit RAM Intellivoice Voice Synthesis Module General Instrument SP0256-012 Computer Module (includes the following) Computer Adapter 2K x 8-bit SRAM, 12K ECS Exec/BASIC ROM, memory expansion port (discontinued) AY-3-8917 sound generator two DE-9 hand controller connectors audio tape recorder data storage interface, two 3.5mm mono jacks and one 2.5mm jack for optional tape control auxiliary jack for a serial printer connection (Mattel Aquarius compatible), 3.5mm stereo jack that is RS-232C compatible, where tip is data transmit, ring is DSR/DCD, sleeve is ground, 1200 baud, 8 data bits, 2 stop bits, and no parity external power adapter 10Vac 1amp Computer Keyboard Music Synthesizer (requires Computer Adapter) 49 key piano keyboard System Changer Atari 2600 compatible cartridge slot two DE-9 Atari 2600 compatible controller connectors Videoplexer (from Compro Electronics) cartridge switching accessory with eight cartridge slots See also Entertainment Computer System Intellivision Lives! Intellivoice List of Intellivision games PlayCable TV POWWW (interactive TV game show that used Intellivision) References External links Intellivision retrogaming company homepage, run by Keith Robinson and The Blue Sky Rangers (the Intellivision game programmers) The history of the Intellivision , at The Dot Eaters Video Game Console Library entry TheGameConsole.com entry Old-Computers.com entry 8-bit Central.com entry & images Science Museum Group entry Games Database.org entry. Console Passion UK entry & games catalog Gamasutra – A History of Gaming Platforms: Mattel Intellivision, by Bill Loguidice and Matt Barton (Backup copy) 1980 ad of Atari 2600 & Intellivision comparison at MSN Home video game consoles Second-generation video game consoles Computer-related introductions in 1979 Mattel 1980s toys
[ -0.9442178606987, -0.20548060536384583, 0.6203667521476746, 0.7014789581298828, 0.24550241231918335, 0.2673327326774597, -0.510794997215271, 0.583609938621521, 0.36968204379081726, -0.3958469033241272, 0.03427908569574356, 0.9415832757949829, -0.027761634439229965, -0.0904788002371788, -...
15316
https://en.wikipedia.org/wiki/Imperialism
Imperialism
Imperialism is a policy or ideology of extending rule over peoples and other countries, for extending political and economic access, power and control, often through employing hard power, especially military force, but also soft power. While related to the concepts of colonialism and empire, imperialism is a distinct concept that can apply to other forms of expansion and many forms of government. Etymology and usage The word imperialism originated from the Latin word imperium, which means supreme power, "sovereignty", or simply "rule". It first became common in the current sense in Great Britain during the 1870s, when it was used with a negative connotation. Previously, the term had been used to describe what was perceived as Napoleon III's attempts at obtaining political support through foreign military interventions. The term was and is mainly applied to Western and Japanese political and economic dominance, especially in Asia and Africa, in the 19th and 20th centuries. Its precise meaning continues to be debated by scholars. Some writers, such as Edward Said, use the term more broadly to describe any system of domination and subordination organized around an imperial core and a periphery. This definition encompasses both nominal empires and neocolonialism. Colonialism versus imperialism The term "imperialism" is often conflated with "colonialism"; however, many scholars have argued that each has its own distinct definition. Imperialism and colonialism have been used in order to describe one's perceived superiority, domination and influence upon a person or group of people. Robert Young writes that while imperialism operates from the centre, is a state policy and is developed for ideological as well as financial reasons, it is simply development for settlement or commercial intentions. However, colonialism still includes invasion. Colonialism in modern usage also tends to imply a degree of geographic separation between the colony and the imperial power. Particularly, Edward Said distinguishes the difference between imperialism and colonialism by stating; "imperialism involved 'the practice, the theory and the attitudes of a dominating metropolitan center ruling a distant territory', while colonialism refers to the 'implanting of settlements on a distant territory.' Contiguous land empires such as the Russian or Ottoman have traditionally been excluded from discussions of colonialism, though this is beginning to change, since it is accepted that they also sent populations into the territories they ruled. Imperialism and colonialism both dictate the political and economic advantage over a land and the indigenous populations they control, yet scholars sometimes find it difficult to illustrate the difference between the two. Although imperialism and colonialism focus on the suppression of another, if colonialism refers to the process of a country taking physical control of another, imperialism refers to the political and monetary dominance, either formally or informally. Colonialism is seen to be the architect deciding how to start dominating areas and then imperialism can be seen as creating the idea behind conquest cooperating with colonialism. Colonialism is when the imperial nation begins a conquest over an area and then eventually is able to rule over the areas the previous nation had controlled. Colonialism's core meaning is the exploitation of the valuable assets and supplies of the nation that was conquered and the conquering nation then gaining the benefits from the spoils of the war. The meaning of imperialism is to create an empire, by conquering the other state's lands and therefore increasing its own dominance. Colonialism is the builder and preserver of the colonial possessions in an area by a population coming from a foreign region. Colonialism can completely change the existing social structure, physical structure, and economics of an area; it is not unusual that the characteristics of the conquering peoples are inherited by the conquered indigenous populations. Few colonies remain remote from their mother country. Thus, most will eventually establish a separate nationality or remain under complete control of their mother colony. The Soviet leader Vladimir Lenin suggested that "imperialism was the highest form of capitalism, claiming that imperialism developed after colonialism, and was distinguished from colonialism by monopoly capitalism". This idea from Lenin stresses how important new political world order has become in the modern era. Geopolitics now focuses on states becoming major economic players in the market; some states today are viewed as empires due to their political and economic authority over other nations. European expansion caused the world to be divided by how developed and developing nations are portrayed through the world systems theory. The two main regions are the core and the periphery. The core consists of areas of high income and profit; the periphery is on the opposing side of the spectrum consisting of areas of low income and profit. These critical theories of geo-politics have led to increased discussion of the meaning and impact of imperialism on the modern post-colonial world. Age of Imperialism The Age of Imperialism, a time period beginning around 1760, saw European industrializing nations, engaging in the process of colonizing, influencing, and annexing other parts of the world. 19th century episodes included the "Scramble for Africa." In the 1970s British historians John Gallagher (1919–1980) and Ronald Robinson (1920–1999) argued that European leaders rejected the notion that "imperialism" required formal, legal control by one government over a colonial region. Much more important was informal control of independent areas. According to Wm. Roger Louis, "In their view, historians have been mesmerized by formal empire and maps of the world with regions colored red. The bulk of British emigration, trade, and capital went to areas outside the formal British Empire. Key to their thinking is the idea of empire 'informally if possible and formally if necessary.'" Oron Hale says that Gallagher and Robinson looked at the British involvement in Africa where they "found few capitalists, less capital, and not much pressure from the alleged traditional promoters of colonial expansion. Cabinet decisions to annex or not to annex were made, usually on the basis of political or geopolitical considerations." Looking at the main empires from 1875 to 1914, there was a mixed record in terms of profitability. At first, planners expected that colonies would provide an excellent captive market for manufactured items. Apart from the Indian subcontinent, this was seldom true. By the 1890s, imperialists saw the economic benefit primarily in the production of inexpensive raw materials to feed the domestic manufacturing sector. Overall, Great Britain did very well in terms of profits from India, especially Mughal Bengal, but not from most of the rest of its empire. To understand the scale of the wealth transfer from India from 1765 to 1938 an estimated $45 Trillion was taken. This is 15-times the $3 Trillion (2019) annual GNI of the UK. The Netherlands did very well in the East Indies. Germany and Italy got very little trade or raw materials from their empires. France did slightly better. The Belgian Congo was notoriously profitable when it was a capitalistic rubber plantation owned and operated by King Leopold II as a private enterprise. However, scandal after scandal regarding very badly mistreated labour led the international community to force the government of Belgium to take it over in 1908, and it became much less profitable. The Philippines cost the United States much more than expected because of military action against rebels. Because of the resources made available by imperialism, the world's economy grew significantly and became much more interconnected in the decades before World War I, making the many imperial powers rich and prosperous. Europe's expansion into territorial imperialism was largely focused on economic growth by collecting resources from colonies, in combination with assuming political control by military and political means. The colonization of India in the mid-18th century offers an example of this focus: there, the "British exploited the political weakness of the Mughal state, and, while military activity was important at various times, the economic and administrative incorporation of local elites was also of crucial significance" for the establishment of control over the subcontinent's resources, markets, and manpower. Although a substantial number of colonies had been designed to provide economic profit and to ship resources to home ports in the 17th and 18th centuries, D. K. Fieldhouse suggests that in the 19th and 20th centuries in places such as Africa and Asia, this idea is not necessarily valid: During this time, European merchants had the ability to "roam the high seas and appropriate surpluses from around the world (sometimes peaceably, sometimes violently) and to concentrate them in Europe". European expansion greatly accelerated in the 19th century. To obtain raw materials, Europe expanded imports from other countries and from the colonies. European industrialists sought raw materials such as dyes, cotton, vegetable oils, and metal ores from overseas. Concurrently, industrialization was quickly making Europe the centre of manufacturing and economic growth, driving resource needs. Communication became much more advanced during European expansion. With the invention of railroads and telegraphs, it became easier to communicate with other countries and to extend the administrative control of a home nation over its colonies. Steam railroads and steam-driven ocean shipping made possible the fast, cheap transport of massive amounts of goods to and from colonies. Along with advancements in communication, Europe also continued to advance in military technology. European chemists made new explosives that made artillery much more deadly. By the 1880s, the machine gun had become a reliable battlefield weapon. This technology gave European armies an advantage over their opponents, as armies in less-developed countries were still fighting with arrows, swords, and leather shields (e.g. the Zulus in Southern Africa during the Anglo-Zulu War of 1879). Some exceptions of armies that managed to get nearly on par with the European expeditions and standards include the Ethiopian armies at the Battle of Adwa, and the Japanese Imperial Army of Japan, but these still relied heavily on weapons imported from Europe and often on European military advisors. Theories of imperialism Anglophone academic studies often base their theories regarding imperialism on the British experience of Empire. The term imperialism was originally introduced into English in its present sense in the late 1870s by opponents of the allegedly aggressive and ostentatious imperial policies of British Prime Minister Benjamin Disraeli. Supporters of "imperialism" such as Joseph Chamberlain quickly appropriated the concept. For some, imperialism designated a policy of idealism and philanthropy; others alleged that it was characterized by political self-interest, and a growing number associated it with capitalist greed. In Imperialism: A Study (1902), John A. Hobson developed a highly influential interpretation of imperialism that expanded on his belief that free enterprise capitalism had a negative impact on the majority of the population. In Imperialism he argued that the financing of overseas empires drained money that was needed at home. It was invested abroad because of lower wages paid to the workers overseas made for higher profits and higher rates of return, compared to domestic wages. So although domestic wages remained higher, they did not grow nearly as fast as they might have otherwise. Exporting capital, he concluded, put a lid on the growth of domestic wages in the domestic standard of living. By the 1970s, historians such as David K. Fieldhouse and Oron Hale could argue that "the Hobsonian foundation has been almost completely demolished." The British experience failed to support it. However, European Socialists picked up Hobson's ideas and made it into their own theory of imperialism, most notably in Lenin's Imperialism, the Highest Stage of Capitalism (1916). Lenin portrayed Imperialism as the closure of the world market and the end of capitalist free-competition that arose from the need for capitalist economies to constantly expand investment, material resources and manpower in such a way that necessitated colonial expansion. Later Marxist theoreticians echo this conception of imperialism as a structural feature of capitalism, which explained the World War as the battle between imperialists for control of external markets. Lenin's treatise became a standard textbook that flourished until the collapse of communism in 1989–91. Some theoreticians on the non-Communist left have emphasized the structural or systemic character of "imperialism". Such writers have expanded the period associated with the term so that it now designates neither a policy, nor a short space of decades in the late 19th century, but a world system extending over a period of centuries, often going back to Christopher Columbus and, in some accounts, to the Crusades. As the application of the term has expanded, its meaning has shifted along five distinct but often parallel axes: the moral, the economic, the systemic, the cultural, and the temporal. Those changes reflect—among other shifts in sensibility—a growing unease, even great distaste, with the pervasiveness of such power, specifically, Western power. Historians and political theorists have long debated the correlation between capitalism, class and imperialism. Much of the debate was pioneered by such theorists as J. A. Hobson (1858–1940), Joseph Schumpeter (1883–1950), Thorstein Veblen (1857–1929), and Norman Angell (1872–1967). While these non-Marxist writers were at their most prolific before World War I, they remained active in the interwar years. Their combined work informed the study of imperialism and its impact on Europe, as well as contributing to reflections on the rise of the military-political complex in the United States from the 1950s. Hobson argued that domestic social reforms could cure the international disease of imperialism by removing its economic foundation. Hobson theorized that state intervention through taxation could boost broader consumption, create wealth, and encourage a peaceful, tolerant, multipolar world order. Walter Rodney, in his 1972 classic How Europe Underdeveloped Africa, proposes the idea that imperialism is a phase of capitalism "in which Western European capitalist countries, the US, and Japan established political, economic, military and cultural hegemony over other parts of the world which were initially at a lower level and therefore could not resist domination." As a result, Imperialism "for many years embraced the whole world – one part being the exploiters and the other the exploited, one part being dominated and the other acting as overlords, one part making policy and the other being dependent." Imperialism has also been identified in newer phenomena like space development and its governing context. Issues Orientalism and imaginative geography Imperial control, territorial and cultural, is justified through discourses about the imperialists' understanding of different spaces. Conceptually, imagined geographies explain the limitations of the imperialist understanding of the societies (human reality) of the different spaces inhabited by the non–European Other. In Orientalism (1978), Edward Said said that the West developed the concept of The Orient—an imagined geography of the Eastern world—which functions as an essentializing discourse that represents neither the ethnic diversity nor the social reality of the Eastern world. That by reducing the East into cultural essences, the imperial discourse uses place-based identities to create cultural difference and psychologic distance between "We, the West" and "They, the East" and between "Here, in the West" and "There, in the East". That cultural differentiation was especially noticeable in the books and paintings of early Oriental studies, the European examinations of the Orient, which misrepresented the East as irrational and backward, the opposite of the rational and progressive West. Defining the East as a negative vision of the Western world, as its inferior, not only increased the sense-of-self of the West, but also was a way of ordering the East, and making it known to the West, so that it could be dominated and controlled. Therefore, Orientalism was the ideological justification of early Western imperialism—a body of knowledge and ideas that rationalized social, cultural, political, and economic control of other, non-white peoples. Cartography One of the main tools used by imperialists was cartography. Cartography is "the art, science and technology of making maps" but this definition is problematic. It implies that maps are objective representations of the world when in reality they serve very political means. For Harley, maps serve as an example of Foucault's power and knowledge concept. To better illustrate this idea, Bassett focuses his analysis of the role of 19th-century maps during the "scramble for Africa". He states that maps "contributed to empire by promoting, assisting, and legitimizing the extension of French and British power into West Africa". During his analysis of 19th-century cartographic techniques, he highlights the use of blank space to denote unknown or unexplored territory. This provided incentives for imperial and colonial powers to obtain "information to fill in blank spaces on contemporary maps". Although cartographic processes advanced through imperialism, further analysis of their progress reveals many biases linked to eurocentrism. According to Bassett, "[n]ineteenth-century explorers commonly requested Africans to sketch maps of unknown areas on the ground. Many of those maps were highly regarded for their accuracy" but were not printed in Europe unless Europeans verified them. Expansionism Imperialism in pre-modern times was common in the form of expansionism through vassalage and conquest. Cultural imperialism The concept of cultural imperialism refers to the cultural influence of one dominant culture over others, i.e. a form of soft power, which changes the moral, cultural, and societal worldview of the subordinate country. This means more than just "foreign" music, television or film becoming popular with young people; rather that a populace changes its own expectations of life, desiring for their own country to become more like the foreign country depicted. For example, depictions of opulent American lifestyles in the soap opera Dallas during the Cold War changed the expectations of Romanians; a more recent example is the influence of smuggled South Korean drama series in North Korea. The importance of soft power is not lost on authoritarian regimes, fighting such influence with bans on foreign popular culture, control of the internet and unauthorised satellite dishes etc. Nor is such a usage of culture recent, as part of Roman imperialism local elites would be exposed to the benefits and luxuries of Roman culture and lifestyle, with the aim that they would then become willing participants. Imperialism has been subject to moral or immoral censure by its critics, and thus the term is frequently used in international propaganda as a pejorative for expansionist and aggressive foreign policy. Social imperialism The political concept social imperialism is a Marxist expression first used in the early 20th century by Lenin as "socialist in words, imperialist in deeds" describing the Fabian Society and other socialist organizations. Later, in a split with the Soviet Union, Mao Zedong criticized its leaders as social imperialists. Justification Stephen Howe has summarized his view on the beneficial effects of the colonial empires: A controversial aspect of imperialism is the defense and justification of empire-building based on seemingly rational grounds. In ancient China, Tianxia denoted the lands, space, and area divinely appointed to the Emperor by universal and well-defined principles of order. The center of this land was directly apportioned to the Imperial court, forming the center of a world view that centered on the Imperial court and went concentrically outward to major and minor officials and then the common citizens, tributary states, and finally ending with the fringe "barbarians". Tianxia's idea of hierarchy gave Chinese a privileged position and was justified through the promise of order and peace. J. A. Hobson identifies this justification on general grounds as: "It is desirable that the earth should be peopled, governed, and developed, as far as possible, by the races which can do this work best, i.e. by the races of highest 'social efficiency'". Many others argued that imperialism is justified for several different reasons. Friedrich Ratzel believed that in order for a state to survive, imperialism was needed. Halford Mackinder felt that Great Britain needed to be one of the greatest imperialists and therefore justified imperialism. The purportedly scientific nature of "Social Darwinism" and a theory of races formed a supposedly rational justification for imperialism. Under this doctrine, the French politician Jules Ferry could declare in 1883 that "Superior races have a right, because they have a duty. They have the duty to civilize the inferior races." The rhetoric of colonizers being racially superior appears to have achieved its purpose, for example throughout Latin America "whiteness" is still prized today and various forms of blanqueamiento (whitening) are common. The Royal Geographical Society of London and other geographical societies in Europe had great influence and were able to fund travelers who would come back with tales of their discoveries. These societies also served as a space for travellers to share these stories. Political geographers such as Friedrich Ratzel of Germany and Halford Mackinder of Britain also supported imperialism. Ratzel believed expansion was necessary for a state's survival while Mackinder supported Britain's imperial expansion; these two arguments dominated the discipline for decades. Geographical theories such as environmental determinism also suggested that tropical environments created uncivilized people in need of European guidance. For instance, American geographer Ellen Churchill Semple argued that even though human beings originated in the tropics they were only able to become fully human in the temperate zone. Tropicality can be paralleled with Edward Said's Orientalism as the west's construction of the east as the "other". According to Said, orientalism allowed Europe to establish itself as the superior and the norm, which justified its dominance over the essentialized Orient. Technology and economic efficiency were often improved in territories subjected to imperialism through the building of roads, other infrastructure and introduction of new technologies. The principles of imperialism are often generalizable to the policies and practices of the British Empire "during the last generation, and proceeds rather by diagnosis than by historical description". British imperialism in some sparsely-inhabited regions appears to have applied a principle now termed Terra nullius (Latin expression which stems from Roman law meaning 'no man's land'). The country of Australia serves as a case study in relation to British settlement and colonial rule of the continent in the 18th century, that was arguably premised on terra nullius, as its settlers considered it unused by its original inhabitants. Environmental determinism The concept of environmental determinism served as a moral justification for the domination of certain territories and peoples. The environmental determinist school of thought held that the environment in which certain people lived determined those persons' behaviours; and thus validated their domination. For example, the Western world saw people living in tropical environments as "less civilized", therefore justifying colonial control as a civilizing mission. Across the three major waves of European colonialism (the first in the Americas, the second in Asia and the last in Africa), environmental determinism served to place categorically indigenous people in a racial hierarchy. This takes two forms, orientalism and tropicality. Some geographic scholars under colonizing empires divided the world into climatic zones. These scholars believed that Northern Europe and the Mid-Atlantic temperate climate produced a hard-working, moral, and upstanding human being. In contrast, tropical climates allegedly yielded lazy attitudes, sexual promiscuity, exotic culture, and moral degeneracy. The people of these climates were believed to be in need of guidance and intervention from a European empire to aid in the governing of a more evolved social structure; they were seen as incapable of such a feat. Similarly, orientalism could promote a view of a people based on their geographical location. Anti-imperialism Anti-imperialism gained a wide currency after the Second World War and at the onset of the Cold War as political movements in colonies of European powers promoted national sovereignty. Some anti-imperialist groups who opposed the United States supported the power of the Soviet Union, such as in Guevarism, while in Maoism this was criticized as social imperialism. Imperialism by country Roman Ming Mongolian Mali Austria-Hungary Belgium Brazil Britain England England's imperialist ambitions can be seen as early as the 16th century as the Tudor conquest of Ireland began in the 1530s. In 1599 the British East India Company was established and was chartered by Queen Elizabeth in the following year. With the establishment of trading posts in India, the British were able to maintain strength relative to other empires such as the Portuguese who already had set up trading posts in India. Scotland Between 1621 and 1699, the Kingdom of Scotland authorised several colonies in the Americas. Most of these colonies were either aborted or collapsed quickly for various reasons. Great Britain Under the Acts of Union 1707, the English and Scottish kingdoms were merged, and their colonies collectively became subject to Great Britain (also known as the United Kingdom). In 1767, the Anglo-Mysore Wars and other political activity caused exploitation of the East India Company causing the plundering of the local economy, almost bringing the company into bankruptcy. By the year 1670 Britain's imperialist ambitions were well off as she had colonies in Virginia, Massachusetts, Bermuda, Honduras, Antigua, Barbados, Jamaica and Nova Scotia. Due to the vast imperialist ambitions of European countries, Britain had several clashes with France. This competition was evident in the colonization of what is now known as Canada. John Cabot claimed Newfoundland for the British while the French established colonies along the St. Lawrence River and claiming it as "New France". Britain continued to expand by colonizing countries such as New Zealand and Australia, both of which were not empty land as they had their own locals and cultures. Britain's nationalistic movements were evident with the creation of the commonwealth countries where there was a shared nature of national identity. Following the proto-industrialization, the "First" British Empire was based on mercantilism, and involved colonies and holdings primarily in North America, the Caribbean, and India. Its growth was reversed by the loss of the American colonies in 1776. Britain made compensating gains in India, Australia, and in constructing an informal economic empire through control of trade and finance in Latin America after the independence of Spanish and Portuguese colonies in about 1820. By the 1840s, Britain had adopted a highly successful policy of free trade that gave it dominance in the trade of much of the world. After losing its first Empire to the Americans, Britain then turned its attention towards Asia, Africa, and the Pacific. Following the defeat of Napoleonic France in 1815, Britain enjoyed a century of almost unchallenged dominance and expanded its imperial holdings around the globe. Unchallenged at sea, British dominance was later described as Pax Britannica ("British Peace"), a period of relative peace in Europe and the world (1815–1914) during which the British Empire became the global hegemon and adopted the role of global policeman. However, this peace was mostly a perceived one from Europe, and the period was still an almost uninterrupted series of colonial wars and disputes. The British Conquest of India, its intervention against Mehemet Ali, the Anglo-Burmese Wars, the Crimean War, the Opium Wars and the Scramble for Africa to name the most notable conflicts mobilised ample military means to press Britain's lead in the global conquest Europe led across the century. In the early 19th century, the Industrial Revolution began to transform Britain; by the time of the Great Exhibition in 1851 the country was described as the "workshop of the world". The British Empire expanded to include India, large parts of Africa and many other territories throughout the world. Alongside the formal control it exerted over its own colonies, British dominance of much of world trade meant that it effectively controlled the economies of many regions, such as Asia and Latin America. Domestically, political attitudes favoured free trade and laissez-faire policies and a gradual widening of the voting franchise. During this century, the population increased at a dramatic rate, accompanied by rapid urbanisation, causing significant social and economic stresses. To seek new markets and sources of raw materials, the Conservative Party under Disraeli launched a period of imperialist expansion in Egypt, South Africa, and elsewhere. Canada, Australia, and New Zealand became self-governing dominions. A resurgence came in the late 19th century with the Scramble for Africa and major additions in Asia and the Middle East. The British spirit of imperialism was expressed by Joseph Chamberlain and Lord Rosebury, and implemented in Africa by Cecil Rhodes. The pseudo-sciences of Social Darwinism and theories of race formed an ideological underpinning and legitimation during this time. Other influential spokesmen included Lord Cromer, Lord Curzon, General Kitchener, Lord Milner, and the writer Rudyard Kipling. The British Empire was the largest Empire that the world has ever seen both in terms of landmass and population. Its power, both military and economic, remained unmatched for a few decades. After the First Boer War, the South African Republic and Orange Free State were recognised by Britain but eventually re-annexed after the Second Boer War. But British power was fading, as the reunited German state founded by the Kingdom of Prussia posed a growing threat to Britain's dominance. As of 1913, Britain was the world's fourth economy, behind the U.S, Russia and Germany. Irish War of Independence in 1919-1921 led to the сreation of the Irish Free State. But Britain gained control of former German and Ottoman colonies with the League of Nations mandate. Britain now had a practically continuous line of controlled territories from Egypt to Burma and another one from Cairo to Cape Town. However, this period was also the one of the emergence of independence movements based on nationalism and new experiences the colonists had gained in the war. World War II decisively weakened Britain's position in the world, especially financially. Decolonization movements arose nearly everywhere in the Empire, resulting in Indian independence and partition in 1947 and the establishment of independent states in the 1950s. British imperialism showed its frailty in Egypt during the Suez Crisis in 1956. However, with the United States and Soviet Union emerging from World War II as the sole superpowers, Britain's role as a worldwide power declined significantly and rapidly. China China was one of the world's oldest empires. Due to its long history of imperialist expansion, China has been seen by its neighboring countries as a threat due to its large population, giant economy, large military force as well as its territorial evolution throughout history. Starting with the unification of China under the Qin dynasty, later Chinese dynasties continued to follow its form of expansions. The most successful Chinese imperial dynasties in terms of territorial expansion were the Han, Tang, Yuan, and Qing dynasties. Denmark Danish overseas colonies that Denmark–Norway (Denmark after 1814) possessed from 1536 until 1953. At its apex there were colonies on four continents: Europe, North America, Africa and Asia. In the 17th century, following territorial losses on the Scandinavian Peninsula, Denmark-Norway began to develop colonies, forts, and trading posts in West Africa, the Caribbean, and the Indian subcontinent. Christian IV first initiated the policy of expanding Denmark-Norway's overseas trade, as part of the mercantilist wave that was sweeping Europe. Denmark-Norway's first colony was established at Tranquebar on India's southern coast in 1620. Admiral Ove Gjedde led the expedition that established the colony. After 1814, when Norway was ceded to Sweden, Denmark retained what remained of Norway's great medieval colonial holdings. One by one the smaller colonies were lost or sold. Tranquebar was sold to the British in 1845. The United States purchased the Danish West Indies in 1917. Iceland became independent in 1944. Today, the only remaining vestiges are two originally Norwegian colonies that are currently within the Danish Realm, the Faroe Islands and Greenland; the Faroes were a Danish county until 1948, while Greenland's colonial status ceased in 1953. They are now autonomous territories. France From the 16th to the 17th centuries, the First French colonial empire stretched from a total area at its peak in 1680 to over 10,000,000 square kilometres (3,900,000 sq. miles), the second largest empire in the world at the time behind only the Spanish Empire. It was followed by French East India Company's trading posts in Africa and Asia in the 17th century. France had its "First colonial empire" from 1534 until 1814, including New France (Canada, Acadia, Newfoundland and Louisiana), French West Indies (Saint-Domingue, Guadeloupe, Martinique), French Guiana, Senegal (Gorée), Mascarene Islands (Mauritius Island, Réunion) and French India. Its "Second colonial empire" began with the seizure of Algiers in 1830 and came for the most part to an end with the granting of independence to Algeria in 1962. The French imperial history was marked by numerous wars, large and small, and also by significant help to France itself from the colonials in the world wars. France took control of Algeria in 1830 but began in earnest to rebuild its worldwide empire after 1850, concentrating chiefly in North and West Africa (French North Africa, French West Africa, French Equatorial Africa), as well as South-East Asia (French Indochina), with other conquests in the South Pacific (New Caledonia, French Polynesia). France also twice attempted to make Mexico a colony in 1838–39 and in 1861-67 (see Pastry War and Second French intervention in Mexico). French Republicans, at first hostile to empire, only became supportive when Germany started to build her own colonial empire. As it developed, the new empire took on roles of trade with France, supplying raw materials and purchasing manufactured items, as well as lending prestige to the motherland and spreading French civilization and language as well as Catholicism. It also provided crucial manpower in both World Wars. It became a moral justification to lift the world up to French standards by bringing Christianity and French culture. In 1884 the leading exponent of colonialism, Jules Ferry declared France had a civilising mission: "The higher races have a right over the lower races, they have a duty to civilize the inferior". Full citizenship rights – assimilation – were offered, although in reality assimilation was always on the distant horizon. Contrasting from Britain, France sent small numbers of settlers to its colonies, with the only notable exception of Algeria, where French settlers nevertheless always remained a small minority. In the 19th and 20th centuries, the French colonial empire was the second-largest colonial empire in the world behind the British Empire, extending over 13,500,000 km2 (5,212,000 sq. miles) at its height in the 1920s and 1930s. France controlled 1/10th of the Earth's land area, with a population of 150 million people on the eve of World War II (8% of the world's population at the time). In World War II, Charles de Gaulle and the Free French used the overseas colonies as bases from which they fought to liberate France. However, after 1945 anti-colonial movements began to challenge the Empire. France fought and lost a bitter war in Vietnam in the 1950s. Whereas they won the war in Algeria, de Gaulle decided to grant Algeria independence anyway in 1962. French settlers and many local supporters relocated to France. Nearly all of France's colonies gained independence by 1960, but France retained great financial and diplomatic influence. It has repeatedly sent troops to assist its former colonies in Africa in suppressing insurrections and coups d'état. Education policy French colonial officials, influenced by the revolutionary ideal of equality, standardized schools, curricula, and teaching methods as much as possible. They did not establish colonial school systems with the idea of furthering the ambitions of the local people, but rather simply exported the systems and methods in vogue in the mother nation. Having a moderately trained lower bureaucracy was of great use to colonial officials. The emerging French-educated indigenous elite saw little value in educating rural peoples. After 1946 the policy was to bring the best students to Paris for advanced training. The result was to immerse the next generation of leaders in the growing anti-colonial diaspora centered in Paris. Impressionistic colonials could mingle with studious scholars or radical revolutionaries or so everything in between. Ho Chi Minh and other young radicals in Paris formed the French Communist party in 1920. Tunisia was exceptional. The colony was administered by Paul Cambon, who built an educational system for colonists and indigenous people alike that was closely modeled on mainland France. He emphasized female and vocational education. By independence, the quality of Tunisian education nearly equalled that in France. African nationalists rejected such a public education system, which they perceived as an attempt to retard African development and maintain colonial superiority. One of the first demands of the emerging nationalist movement after World War II was the introduction of full metropolitan-style education in French West Africa with its promise of equality with Europeans. In Algeria, the debate was polarized. The French set up schools based on the scientific method and French culture. The Pied-Noir (Catholic migrants from Europe) welcomed this. Those goals were rejected by the Moslem Arabs, who prized mental agility and their distinctive religious tradition. The Arabs refused to become patriotic and cultured Frenchmen and a unified educational system was impossible until the Pied-Noir and their Arab allies went into exile after 1962. In South Vietnam from 1955 to 1975 there were two competing colonial powers in education, as the French continued their work and the Americans moved in. They sharply disagreed on goals. The French educators sought to preserving French culture among the Vietnamese elites and relied on the Mission Culturelle – the heir of the colonial Direction of Education – and its prestigious high schools. The Americans looked at the great mass of people and sought to make South Vietnam a nation strong enough to stop communism. The Americans had far more money, as USAID coordinated and funded the activities of expert teams, and particularly of academic missions. The French deeply resented the American invasion of their historical zone of cultural imperialism. Germany German expansion into Slavic lands begins in the 12th-13th-century (see Drang Nach Osten). The concept of Drang Nach Osten was a core element of German nationalism and a major element of Nazi ideology. However, the German involvement in the seizure of overseas territories was negligible until the end of the 19th century. Prussia unified the other states into the second German Empire in 1871. Its Chancellor, Otto von Bismarck (1862–90), long opposed colonial acquisitions, arguing that the burden of obtaining, maintaining, and defending such possessions would outweigh any potential benefits. He felt that colonies did not pay for themselves, that the German bureaucratic system would not work well in the tropics and the diplomatic disputes over colonies would distract Germany from its central interest, Europe itself. However, public opinion and elite opinion in Germany demanded colonies for reasons of international prestige, so Bismarck was forced to oblige. In 1883–84 Germany began to build a colonial empire in Africa and the South Pacific. The establishment of the German colonial empire started with German New Guinea in 1884. German colonies included the present territories of in Africa: Tanzania, Rwanda, Burundi, Namibia, Cameroon, Ghana and Togo; in Oceania: New Guinea, Solomon islands, Nauru, Marshall Islands, Mariana Islands, Caroline Islands and Samoa; and in Asia: Tsingtao, Chefoo and the Jiaozhou Bay. The Treaty of Versailles made them mandates temporarily operated by the Allied victors. Germany also lost part of the Eastern territories that became part of independent Poland as a result of the Treaty of Versailles in 1919. Finally, the Eastern territories captured in the Middle Ages were torn from Germany and became part of Poland and the USSR as a result of the territorial reorganization established by the Potsdam conference of the great powers in 1945. Italy The Italian Empire (Impero italiano) comprised the overseas possessions of the Kingdom of Italy primarily in northeast Africa. It began with the purchase in 1869 of Assab Bay on the Red Sea by an Italian navigation company which intended to establish a coaling station at the time the Suez Canal was being opened to navigation. This was taken over by the Italian government in 1882, becoming modern Italy's first overseas territory. By the start of the First World War in 1914, Italy had acquired in Africa the colony of Eritrea on the Red Sea coast, a large protectorate and later colony in Somalia, and authority in formerly Ottoman Tripolitania and Cyrenaica (gained after the Italo-Turkish War) which were later unified in the colony of Libya. Outside Africa, Italy possessed the Dodecanese Islands off the coast of Turkey (following the Italo-Turkish War) and a small concession in Tianjin in China following the Boxer War of 1900. During the First World War, Italy occupied southern Albania to prevent it from falling to Austria-Hungary. In 1917, it established a protectorate over Albania, which remained in place until 1920. The Fascist government that came to power with Benito Mussolini in 1922 sought to increase the size of the Italian empire and to satisfy the claims of Italian irredentists. In its second invasion of Ethiopia in 1935–36, Italy was successful and it merged its new conquest with its older east African colonies to create Italian East Africa. In 1939, Italy invaded Albania and incorporated it into the Fascist state. During the Second World War (1939–1945), Italy occupied British Somaliland, parts of south-eastern France, western Egypt and most of Greece, but then lost those conquests and its African colonies, including Ethiopia, to the invading allied forces by 1943. It was forced in the peace treaty of 1947 to relinquish sovereignty over all its colonies. It was granted a trust to administer former Italian Somaliland under United Nations supervision in 1950. When Somalia became independent in 1960, Italy's eight-decade experiment with colonialism ended. Islamic Japan For over 200 years, Japan maintained a feudal society during a period of relative isolation from the rest of the world. However, in the 1850s, military pressure from the United States and other world powers coerced Japan to open itself to the global market, resulting in an end to the country's isolation. A period of conflicts and political revolutions followed due to socioeconomic uncertainty, ending in 1868 with the reunification of political power under the Japanese Emperor during the Meiji Restoration. This sparked a period of rapid industrialization driven in part by a Japanese desire for self-sufficiency. By the early 1900s, Japan was a naval power that could hold its own against an established European power as it defeated Russia. Despite its rising population and increasingly industrialized economy, Japan lacked significant natural resources. As a result, the country turned to imperialism and expansionism in part as a means of compensating for these shortcomings, adopting the national motto "Fukoku kyōhei" (富国強兵, "Enrich the state, strengthen the military"). And Japan was eager to take every opportunity. In 1869 they took advantage of the defeat of the rebels of the Republic of Ezo to incorporate definitely the island of Hokkaido to Japan. For centuries, Japan viewed the Ryukyu Islands as one of its provinces. In 1871 the Mudan incident happened: Taiwanese aborigines murdered 54 Ryūkyūan sailors that became shipwrecked. At that time the Ryukyu Islands were claimed by both Qing China and Japan, and the Japanese interpreted the incident as an attack on their citizens. They took steps to bring the islands in their jurisdiction: in 1872 the Japanese Ryukyu Domain was declared, and in 1874 a retaliatory incursion to Taiwan was sent, which was a success. The success of this expedition emboldened the Japanese: not even the Americans could defeat the Taiwanese in the Formosa Expedition of 1867. Very few gave it much thought at the time, but this was the first move in the Japanese expansionism series. Japan occupied Taiwan for the rest of 1874 and then left owing to Chinese pressures, but in 1879 it finally annexed the Ryukyu Islands. In 1875 Qing China sent a 300-men force to subdue the Taiwanese, but unlike the Japanese the Chinese were routed, ambushed and 250 of their men were killed; the failure of this expedition exposed once more the failure of Qing China to exert effective control in Taiwan, and acted as another incentive for the Japanese to annex Taiwan. Eventually, the spoils for winning the First Sino-Japanese War in 1894 included Taiwan. In 1875 Japan took its first operation against Joseon Korea, another territory that for centuries it coveted; the Ganghwa Island incident made Korea open to international trade. Korea was annexed in 1910. As a result of winning the Russo-Japanese War in 1905, Japan took part of Sakhalin Island from Russia. Precisely, the victory against the Russian Empire shook the world: never before had an Asian nation defeated a European power, and in Japan it was seen as a feat. Japan's victory against Russia would act as an antecedent for Asian countries in the fight against the Western powers for Decolonization. During World War I, Japan took German-leased territories in China's Shandong Province, as well as the Mariana, Caroline, and Marshall Islands, and kept the islands as League of nations mandates. At first, Japan was in good standing with the victorious Allied powers of World War I, but different discrepancies and dissatisfaction with the rewards of the treaties cooled the relations with them, for example American pressure forced it to return the Shandong area. By the '30s, economic depression, urgency of resources and a growing distrust in the Allied powers made Japan lean to a hardened militaristic stance. Through the decade, it would grow closer to Germany and Italy, forming together the Axis alliance. In 1931 Japan took Manchuria from China. International reactions condemned this move, but Japan's already strong skepticism against Allied nations meant that it nevertheless carried on. During the Second Sino-Japanese War in 1937, Japan's military invaded central China. Also, in 1938-1939 Japan made an attempt to seize the territory of Soviet Russia and Mongolia, but suffered a serious defeats (see Battle of Lake Khasan, Battles of Khalkhin Gol). By now, relations with the Allied powers were at the bottom, and an international boycott against Japan to deprive it of natural resources was enforced. Thus a military move to gain access to them was needed, and so Japan attacked Pearl Harbor, bringing the United States to World War II. Using its superior technological advances in naval aviation and its modern doctrines of amphibious and naval warfare, Japan achieved one of the fastest maritime expansions in history. By 1942 Japan had conquered much of East Asia and the Pacific, including the east of China, Hong Kong, Thailand, Vietnam, Cambodia, Burma (Myanmar), Malaysia, the Philippines, Indonesia, part of New Guinea and many islands of the Pacific Ocean. Just as Japan's late industrialization success and victory against the Russian Empire was seen as an example among underdeveloped Asia-Pacific nations, the Japanese took advantage of this and promoted among its conquered the goal to jointly create an anti-European "Greater East Asia Co-Prosperity Sphere". This plan helped the Japanese gain support from native populations during its conquests especially in Indonesia. However, the United States had a vastly stronger military and industrial base and defeated Japan, stripping it of conquests and returning its settlers back to Japan. Netherlands The most notable example of Dutch imperialism is regarding Indonesia. Ottoman Empire The Ottoman Empire was an imperial state that lasted from 1299 to 1922. In 1453, Mehmed the Conqueror captured Constantinople and made it his capital. During the 16th and 17th centuries, in particular at the height of its power under the reign of Suleiman the Magnificent, the Ottoman Empire was a powerful multinational, multilingual empire, which invaded and colonized much of Southeast Europe, Western Asia, the Caucasus, North Africa, and the Horn of Africa. Its repeated invasions, and brutal treatment of Slavs led to the Great Migrations of the Serbs to escape persecution. At the beginning of the 17th century the empire contained 32 provinces and numerous vassal states. Some of these were later absorbed into the empire, while others were granted various types of autonomy during the course of centuries. Following a long period of military setbacks against European powers, the Ottoman Empire gradually declined, losing control of much of its territory in Europe and Africa. By 1810 Egypt was effectively independent. In 1821-1829 the Greeks in the Greek War of Independence were assisted by Russia, Britain and France. In 1815 to 1914 the Ottoman Empire could exist only in the conditions of acute rivalry of the great powers, with Britain its main supporter, especially in the Crimean war 1853–1856, against Russia. After Ottoman defeat in the Russo-Turkish War (1877–1878), Bulgaria, Serbia and Montenegro gained independence and Britain took colonial control of Cyprus, while Bosnia and Herzegovina were occupied and annexed by Austro-Hungarian Empire in 1908. The empire allied with Germany in World War I with the imperial ambition of recovering its lost territories, but it dissolved in the aftermath of its decisive defeat. The Kemalist national movement, supported by Soviet Russia, achieved victory in the course of the Turkish War of Independence, and the parties signed and ratified the Treaty of Lausanne in 1923 and 1924. The Republic of Turkey was established. Portugal The Russian Empire & the Soviet Union By the 18th century, the Russian Empire extended its control to the Pacific, peacefully forming a common border with the Qing Empire and Empire of Japan. This took place in a large number of military invasions of the lands east, west, and south of it. The Polish–Russian War of 1792 took place after Polish nobility from the Polish–Lithuanian Commonwealth wrote the Constitution of 3 May 1791. The war resulted in eastern Poland being conquered by Imperial Russia as a colony until 1918. The southern campaigns involved a series of Russo-Persian Wars, which began with the Persian Expedition of 1796, resulting in the acquisition of Georgia (country) as a protectorate. Between 1800 and 1864, Imperial armies invaded south in the Russian conquest of the Caucasus, the Murid War, and the Russo-Circassian War. This last conflict led to the ethnic cleansing of Circassians from their lands. The Russian conquest of Siberia over the Khanate of Sibir took place in the 16th and 17th centuries, and resulted in the slaughter of various indigenous tribes by Russians, including the Daur, the Koryaks, the Itelmens, Mansi people and the Chukchi. The Russian colonization of Central and Eastern Europe and Siberia and treatment of the resident indigenous peoples has been compared to European colonization of the Americas, with similar negative impacts on the indigenous Siberians as upon the indigenous peoples of the Americas. The extermination of indigenous Siberian tribes was so complete that a relatively small population of only 180,000 are said to exist today. The Russian Empire exploited and suppressed Cossacks hosts during this period, before turning them into the special military estate Sosloviye in the late 18th century. Cossacks were then used in Imperial Russian campaigns against other tribes. But it would be a strong simplification to reduce expansion of Russia only to military conquests. The acquisition of Ukraine by Russia commenced in 1654, when Polish rule brought the population of Ukraine to revolts (see Pereyaslav Council). Another example is Georgia's accession to Russia in 1783. Given Georgia's history of invasions from the south, an alliance with Russia may have been seen as the only way to discourage or resist Persian and Ottoman aggression, while also establishing a link to Western Europe (see Treaty of Georgievsk). Russia's support helped establish independent Mongolia (independent from China) (see Mongolian Revolution of 1911). Bolshevik leaders had effectively reestablished a polity with roughly the same extent as that empire by 1921, however with an internationalist ideology: Lenin in particular asserted the right to limited self-determination for national minorities within the new territory. Beginning in 1923, the policy of "Indigenization" [korenizatsiya] was intended to support non-Russians develop their national cultures within a socialist framework. Never formally revoked, it stopped being implemented after 1932. After World War II, the Soviet Union installed socialist regimes modeled on those it had installed in 1919–20 in the old Russian Empire, in areas its forces occupied in Eastern Europe. The Soviet Union and later the People's Republic of China supported revolutionary and communist movements in foreign nations and colonies to advance their own interests, but were not always successful. The USSR provided great assistance to Kuomintang in 1926–1928 in the formation of a unified Chinese government (see Northern Expedition). Although then relations with the USSR deteriorated, but the USSR was the only world power that provided military assistance to China against Japanese aggression in 1937-1941 (see Sino-Soviet Non-Aggression Pact). The victory of the Chinese Communists in the civil war of 1946-1949 relied on the great help of the USSR (see Chinese Civil War). Trotsky, and others, believed that the revolution could only succeed in Russia as part of a world revolution. Lenin wrote extensively on the matter and famously declared that Imperialism was the highest stage of capitalism. However, after Lenin's death, Joseph Stalin established 'socialism in one country' for the Soviet Union, creating the model for subsequent inward looking Stalinist states and purging the early Internationalist elements. The internationalist tendencies of the early revolution would be abandoned until they returned in the framework of a client state in competition with the Americans during the Cold War. In the post-Stalin period in the late 1950s, the new political leader Nikita Khrushchev put pressure on the Soviet-American relations starting a new wave of anti-imperialist propaganda. In his speech on the UN conference in 1960, he announced the continuation of the war on imperialism, stating that soon the people of different countries will come together and overthrow their imperialist leaders. Although the Soviet Union declared itself anti-imperialist, critics argue that it exhibited traits common to historic empires. Some scholars hold that the Soviet Union was a hybrid entity containing elements common to both multinational empires and nation states. Some also argued that the USSR practiced colonialism as did other imperial powers and was carrying on the old Russian tradition of expansion and control. Mao Zedong once argued that the Soviet Union had itself become an imperialist power while maintaining a socialist façade. Moreover, the ideas of imperialism were widely spread in action on the higher levels of government. Some Marxists within the Russian Empire and later the USSR, like Sultan Galiev and Vasyl Shakhrai, considered the Soviet regime a renewed version of the Russian imperialism and colonialism. Soviet imperialism involved invasion of Hungary in 1956 to destroy democratic forces. Soviet imperialism was roundly condemned In 1979 when the USSR invaded Afghanistan to keep a friendly government in power. The invasion "alerted the Third World, as no earlier Soviet intervention had done, to the nature of Soviet imperialism. It must be said that the USSR never called itself an "Empire" unlike other world powers and the use of such a name carries a negative connotation. United States Made up of former colonies itself, the early United States expressed its opposition to Imperialism, at least in a form distinct from its own Manifest Destiny, through policies such as the Monroe Doctrine. However the US may have unsuccessfully attempted to capture Canada in the War of 1812. The United States achieved very significant territorial concessions from Mexico during the Mexican-American War. Beginning in the late 19th and early 20th century, policies such as Theodore Roosevelt’s interventionism in Central America and Woodrow Wilson’s mission to "make the world safe for democracy" changed all this. They were often backed by military force, but were more often affected from behind the scenes. This is consistent with the general notion of hegemony and imperium of historical empires. In 1898, Americans who opposed imperialism created the Anti-Imperialist League to oppose the US annexation of the Philippines and Cuba. One year later, a war erupted in the Philippines causing business, labor and government leaders in the US to condemn America's occupation in the Philippines as they also denounced them for causing the deaths of many Filipinos. American foreign policy was denounced as a "racket" by Smedley Butler, a former American general who had become a spokesman for the far left. At the start of World War II, President Franklin D. Roosevelt was opposed to European colonialism, especially in India. He pulled back when Britain's Winston Churchill demanded that victory in the war be the first priority. Roosevelt expected that the United Nations would take up the problem of decolonization. Some have described the internal strife between various people groups as a form of imperialism or colonialism. This internal form is distinct from informal U.S. imperialism in the form of political and financial hegemony. This internal form of imperialism is also distinct from the United States' formation of "colonies" abroad. Through the treatment of its indigenous peoples during westward expansion, the United States took on the form of an imperial power prior to any attempts at external imperialism. This internal form of empire has been referred to as "internal colonialism". Participation in the African slave trade and the subsequent treatment of its 12 to 15 million Africans is viewed by some to be a more modern extension of America's "internal colonialism". However, this internal colonialism faced resistance, as external colonialism did, but the anti-colonial presence was far less prominent due to the nearly complete dominance that the United States was able to assert over both indigenous peoples and African-Americans. In his lecture on April 16, 2003, Edward Said made a bold statement on modern imperialism in the United States, whom he described as using aggressive means of attack towards the contemporary Orient, "due to their backward living, lack of democracy and the violation of women’s rights. The western world forgets during this process of converting the other that enlightenment and democracy are concepts that not all will agree upon". Spain Spanish imperialism in the colonial era corresponds with the rise and decline of the Spanish Empire, conventionally recognized as emerging in 1402 with the conquest of the Canary Islands. Following the successes of exploratory maritime voyages conducted during the Age of Discovery, such as those undertaken by Christopher Columbus, Spain committed considerable financial and military resources towards developing a robust navy capable of conducting large-scale, transatlantic expeditionary operations in order to establish and solidify a firm imperial presence across large portions of North America, South America, and the geographic regions comprising the Caribbean basin. Concomitant with Spanish endorsement and sponsorship of transatlantic expeditionary voyages was the deployment of Conquistadors, which further expanded Spanish imperial boundaries through the acquisition and development of territories and colonies. Imperialism in the Caribbean basin In congruence with the colonialist activities of competing European imperial powers throughout the 15th – 19th centuries, the Spanish were equally engrossed in extending geopolitical power. The Caribbean basin functioned as a key geographic focal point for advancing Spanish imperialism. Similar to the strategic prioritization Spain placed towards achieving victory in the conquests of the Aztec Empire and Inca Empire, Spain placed equal strategic emphasis on expanding the nation's imperial footprint within the Caribbean basin. Echoing the prevailing ideological perspectives regarding colonialism and imperialism embraced by Spain's European rivals during the colonial era, including the English, French, and the Dutch, the Spanish utilized colonialism as a means of expanding imperial geopolitical borders and securing the defense of maritime trade routes in the Caribbean basin. While leveraging colonialism in the same geographic operating theater as its imperial rivals, Spain maintained distinct imperial objectives and instituted a unique form of colonialism in support of its imperial agenda. Spain placed significant strategic emphasis on the acquisition, extraction, and exportation of precious metals (primarily gold and silver). A second objective was the evangelization of subjugated indigenous populations residing in mineral-rich and strategically favorable locations. Notable examples of these indigenous groups include the Taίno populations inhabiting Puerto Rico and segments of Cuba. Compulsory labor and slavery were widely institutionalized across Spanish-occupied territories and colonies, with an initial emphasis on directing labor towards mining activity and related methods of procuring semi-precious metals. The emergence of the Encomienda system during the 16th–17th centuries in occupied colonies within the Caribbean basin reflects a gradual shift in imperial prioritization, increasingly focusing on large-scale production and exportation of agricultural commodities. Scholarly debate and controversy The scope and scale of Spanish participation in imperialism within the Caribbean basin remains a subject of scholarly debate among historians. A fundamental source of contention stems from the inadvertent conflation of theoretical conceptions of imperialism and colonialism. Furthermore, significant variation exists in the definition and interpretation of these terms as expounded by historians, anthropologists, philosophers, and political scientists. Among historians, there is substantial support in favor of approaching imperialism as a conceptual theory emerging during the 18th–19th centuries, particularly within Britain, propagated by key exponents such as Joseph Chamberlain and Benjamin Disraeli. In accordance with this theoretical perspective, the activities of the Spanish in the Caribbean are not components of a preeminent, ideologically-driven form of imperialism. Rather, these activities are more accurately classified as representing a form of colonialism. Further divergence among historians can be attributed to varying theoretical perspectives regarding imperialism that are proposed by emerging academic schools of thought. Noteworthy examples include cultural imperialism, whereby proponents such as John Downing and Annabelle Sreberny-Modammadi define imperialism as "...the conquest and control of one country by a more powerful one." Cultural imperialism signifies the dimensions of the process that go beyond economic exploitation or military force." Moreover, colonialism is understood as "...the form of imperialism in which the government of the colony is run directly by foreigners." In spite of diverging perspectives and the absence of a unilateral scholarly consensus regarding imperialism among historians, within the context of Spanish expansion in the Caribbean basin during the colonial era, imperialism can be interpreted as an overarching ideological agenda that is perpetuated through the institution of colonialism. In this context, colonialism functions as an instrument designed to achieve specific imperialist objectives. Sweden See also Hegemony Historiography of the British Empire Imperialism, the Highest Stage of Capitalism 1917 book by Lenin International relations of the Great Powers (1814–1919) International relations, 1648–1814 List of empires List of largest empires Political history of the world Postcolonialism Scramble for Africa, in the late 19th century Super-imperialism Ultra-imperialism Analysis of Western European colonialism and colonization 14 Points esp. V and XII References Further reading Abernethy, David P. The Dynamics of Global Dominance: European Overseas Empires, 1425–1980 (Yale UP, 2000), political science approach. online review Ankerl, Guy. Coexisting Contemporary Civilizations: Arabo-Muslim, Bharatai, Chinese, and Western, Geneva, INU Press, 2000, . Bayly, C.A. ed. Atlas of the British Empire (1989). survey by scholars; heavily illustrated Brendon, Piers. "A Moral Audit of the British Empire". History Today, (Oct 2007), Vol. 57 Issue 10, pp. 44–47 Brendon, Piers. The Decline and Fall of the British Empire, 1781–1997 (2008), , wide-ranging survey Bickers, Robert and Christian Henriot, New Frontiers: Imperialism's New Communities in East Asia, 1842–1953, Manchester, Manchester University Press, 2000, Blanken, Leo. Rational Empires: Institutional Incentives and Imperial Expansion, University Of Chicago Press, 2012 Bush, Barbara. Imperialism and Postcolonialism (History: Concepts, Theories and Practice), Longmans, 2006, Comer, Earl of. Ancient and Modern Imperialism, John Murray, 1910. Cotterell, Arthur. Western Power in Asia: Its Slow Rise and Swift Fall, 1415 - 1999 (2009) popular history excerpts Dabhoiwala, Fara, "Imperial Delusions" (review of Priya Satia, Time's Monster: How History Makes History, Belknap Press/Harvard University Press, 2020, 363 pp.; Mahmood Mamdani, Neither Settler nor Native: The Making and Unmaking of Permanent Minorities, Belknap Press/Harvard University Press, 2020, 401 pp.; and Adom Getachew, Worldmaking after Empire: The Rise and Fall of Self-Determination, Princeton University Press, 2021 [?], 271 pp.), The New York Review of Books, vol. LXVIII, no. 11 (1 July 2021), pp. 59–62. Darwin, John. After Tamerlane: The Rise and Fall of Global Empires, 1400–2000, (Penguin Books, 2008), 576 pp Darwin, John. The Empire Project (2011) 811pp free viewing Fay, Richard B. and Daniel Gaido (ed. and trans.), Discovering Imperialism: Social Democracy to World War I. Chicago: Haymarket Books, 2012. Niall Ferguson, Empire: How Britain Made the Modern World, Penguin Books, 2004, Gotteland, Mathieu. What Is Informal Imperialism?, The Middle Ground Journal (2017). Michael Hardt and Toni Negri, Empire, Harvard University Press, 2000, E.J. Hobsbawm, The Age of Empire, 1875–1914, Abacus Books, 1989, E.J. Hobsbawm, On Empire: America, War, and Global Supremacy, Pantheon Books, 2008, J.A. Hobson, Imperialism: A Study, Cosimo Classics, 2005, Hodge, Carl Cavanagh. Encyclopedia of the Age of Imperialism, 1800–1914 (2 vol. 2007), online Howe, Stephen Howe, ed., The New Imperial Histories Reader (2009) online review. Kumar, Krishan. Visions of Empire: How Five Imperial Regimes Shaped the World (2017). Gabriel Kuhn, Oppressor and Oppressed Nations: Sketching a Taxonomy of Imperialism, Kersplebedeb, June 2017. Lawrence, Adria K. Imperial Rule and the Politics of Nationalism: Anti-Colonial Protest in the French Empire (Cambridge UP, 2013) online reviews Jackson Lears, "Imperial Exceptionalism" (review of Victor Bulmer-Thomas, Empire in Retreat: The Past, Present, and Future of the United States, Yale University Press, 2018, , 459 pp.; and David C. Hendrickson, Republic in Peril: American Empire and the Liberal Tradition, Oxford University Press, 2017, , 287 pp.), The New York Review of Books, vol. LXVI, no. 2 (February 7, 2019), pp. 8–10. Bulmer-Thomas writes: "Imperial retreat is not the same as national decline, as many other countries can attest. Indeed, imperial retreat can strengthen the nation-state just as imperial expansion can weaken it." (NYRB, cited on p. 10.) Merriman, Roger Bigelow. The Rise of the Spanish Empire in the Old World and in the New (4 vol 1918–1933) online. Moon, Parker T. Imperialism and world politics (1926); 583 pp; Wide-ranging historical survey; online Ness, Immanuel and Zak Cope, eds. The Palgrave Encyclopedia of Imperialism and Anti-Imperialism (2 vol 2015), 1456 pp Page, Melvin E. et al. eds. Colonialism: An International Social, Cultural, and Political Encyclopedia (2 vol 2003) Thomas Pakenham. The Scramble for Africa: White Man's Conquest of the Dark Continent from 1876–1912 (1992), Poddar, Prem, and Lars Jensen, eds., A historical companion to postcolonial literatures: Continental Europe and Its Empires (Edinburgh UP, 2008) excerpt also entire text online Rothermund, Dietmar. Memories of Post-Imperial Nations: The Aftermath of Decolonization, 1945–2013 (2015), ; Compares the impact on Great Britain, the Netherlands, Belgium, France, Portugal, Italy and Japan Edward Said, Culture and Imperialism, Vintage Books, 1998, Simms, Brendan. Three victories and a defeat: the rise and fall of the first British Empire (Hachette UK, 2008). to 1783. Smith, Simon C. British Imperialism 1750–1970, Cambridge University Press, 1998, Stuchtey, Benedikt. Colonialism and Imperialism, 1450–1950, European History Online, Mainz: Institute of European History, 2011. U.S. Tariff Commission. Colonial tariff policies (1922), worldwide; 922 pp Vandervort, Bruce. Wars of Imperial Conquest in Africa, 1830―1914 (Indiana UP, 2009) Primary sources V. I. Lenin, Imperialism: The Highest Stage of Capitalism, International Publishers, New York, 1997, Rosa Luxemburg, The Accumulation of Capital: A Contribution to an Economic Explanation of Imperialism External links J.A Hobson, Imperialism a Study 1902. The Paradox of Imperialism by Hans-Hermann Hoppe. November 2006. Imperialism Quotations State, Imperialism and Capitalism by Joseph Schumpeter Economic Imperialism by A.J.P. Taylor Imperialism Entry in The Columbia Electronic Encyclopedia, 6th ed., Columbia University Press. Imperialism by Emile Perreau-Saussine The Nation-State, Core and Periphery: A Brief sketch of Imperialism in the 20th century. Mehmet Akif Okur, :Rethinking Empire After 9/11: Towards A New Ontological Image of World Order", Perceptions, Journal of International Affairs, Volume XII, Winter 2007, pp. 61–93 Imperialism 101, Against Empire By Michael Parenti Published by City Lights Books, 1995, , 217 pages Authoritarianism History of colonialism Marxian economics Political systems Political theories Invasions
[ 0.11243712157011032, -0.21134158968925476, -0.5571970343589783, 0.2330608367919922, -0.11014322936534882, -0.020898519083857536, 0.3431384861469269, 0.7317594885826111, 0.04302603751420975, -0.4530218839645386, -0.3964795470237732, 0.015248161740601063, -0.321898877620697, 1.00822079181671...
15317
https://en.wikipedia.org/wiki/IPv4
IPv4
Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 was the first version deployed for production on SATNET in 1982 and on the ARPANET in January 1983. It is still used to route most Internet traffic today, even with the ongoing deployment of Internet Protocol version 6 (IPv6), its successor. IPv4 uses a 32-bit address space which provides 4,294,967,296 (232) unique addresses, but large blocks are reserved for special networking purposes. History Internet Protocol version 4 is described in IETF publication RFC 791 (September 1981), replacing an earlier definition of January 1980 (RFC 760). In March 1982, the US Department of Defense decided on the Internet Protocol Suite (TCP/IP) as the standard for all military computer networking. Purpose The Internet Protocol is the protocol that defines and enables internetworking at the internet layer of the Internet Protocol Suite. In essence it forms the Internet. It uses a logical addressing system and performs routing, which is the forwarding of packets from a source host to the next router that is one hop closer to the intended destination host on another network. IPv4 is a connectionless protocol, and operates on a best-effort delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission Control Protocol (TCP). Addressing IPv4 uses 32-bit addresses which limits the address space to (232) addresses. IPv4 reserves special address blocks for private networks (~18 million addresses) and multicast addresses (~270 million addresses). Address representations IPv4 addresses may be represented in any notation expressing a 32-bit integer value. They are most often written in dot-decimal notation, which consists of four octets of the address expressed individually in decimal numbers and separated by periods. For example, the quad-dotted IP address 192.0.2.235 represents the 32-bit decimal number 3221226219, which in hexadecimal format is 0xC00002EB. CIDR notation combines the address with its routing prefix in a compact format, in which the address is followed by a slash character (/) and the count of leading consecutive 1 bits in the routing prefix (subnet mask). Other address representations were in common use when classful networking was practiced. For example, the loopback address 127.0.0.1 is commonly written as 127.1, given that it belongs to a class-A network with eight bits for the network mask and 24 bits for the host number. When fewer than four numbers are specified in the address in dotted notation, the last value is treated as an integer of as many bytes as are required to fill out the address to four octets. Thus, the address 127.65530 is equivalent to 127.0.255.250. Allocation In the original design of IPv4, an IP address was divided into two parts: the network identifier was the most significant octet of the address, and the host identifier was the rest of the address. The latter was also called the rest field. This structure permitted a maximum of 256 network identifiers, which was quickly found to be inadequate. To overcome this limit, the most-significant address octet was redefined in 1981 to create network classes, in a system which later became known as classful networking. The revised system defined five classes. Classes A, B, and C had different bit lengths for network identification. The rest of the address was used as previously to identify a host within a network. Because of the different sizes of fields in different classes, each network class had a different capacity for addressing hosts. In addition to the three classes for addressing hosts, Class D was defined for multicast addressing and Class E was reserved for future applications. Dividing existing classful networks into subnets began in 1985 with the publication of . This division was made more flexible with the introduction of variable-length subnet masks (VLSM) in in 1987. In 1993, based on this work, introduced Classless Inter-Domain Routing (CIDR), which expressed the number of bits (from the most significant) as, for instance, /24, and the class-based scheme was dubbed classful, by contrast. CIDR was designed to permit repartitioning of any address space so that smaller or larger blocks of addresses could be allocated to users. The hierarchical structure created by CIDR is managed by the Internet Assigned Numbers Authority (IANA) and the regional Internet registries (RIRs). Each RIR maintains a publicly searchable WHOIS database that provides information about IP address assignments. Special-use addresses The Internet Engineering Task Force (IETF) and IANA have restricted from general use various reserved IP addresses for special purposes. Notably these addresses are used for multicast traffic and to provide addressing space for unrestricted uses on private networks. {| class="wikitable sortable" |+ Special address blocks !Address block !Address range !Number of addresses !Scope !Description |- |0.0.0.0/8 |0.0.0.0–0.255.255.255 |align="right"| |Software |Current network |- |10.0.0.0/8 |10.0.0.0–10.255.255.255 |align="right"| |Private network |Used for local communications within a private network. |- |100.64.0.0/10 |100.64.0.0–100.127.255.255 |align="right"| |Private network |Shared address space for communications between a service provider and its subscribers when using a carrier-grade NAT. |- |127.0.0.0/8 |127.0.0.0–127.255.255.255 |align="right"| |Host |Used for loopback addresses to the local host. |- |169.254.0.0/16 |169.254.0.0–169.254.255.255 |align="right"| |Subnet |Used for link-local addresses between two hosts on a single link when no IP address is otherwise specified, such as would have normally been retrieved from a DHCP server. |- |172.16.0.0/12 |172.16.0.0–172.31.255.255 |align="right"| |Private network |Used for local communications within a private network. |- |- |192.0.0.0/24 |192.0.0.0–192.0.0.255 |align="right"| |Private network |IETF Protocol Assignments. |- |192.0.2.0/24 |192.0.2.0–192.0.2.255 |align="right"| |Documentation |Assigned as TEST-NET-1, documentation and examples. |- |192.88.99.0/24 |192.88.99.0–192.88.99.255 |align="right"| |Internet |Reserved. Formerly used for IPv6 to IPv4 relay (included IPv6 address block 2002::/16). |- |192.168.0.0/16 |192.168.0.0–192.168.255.255 |align="right"| |Private network |Used for local communications within a private network. |- |198.18.0.0/15 |198.18.0.0–198.19.255.255 |align="right"| |Private network |Used for benchmark testing of inter-network communications between two separate subnets. |- |198.51.100.0/24 |198.51.100.0–198.51.100.255 |align="right"| |Documentation |Assigned as TEST-NET-2, documentation and examples. |- |203.0.113.0/24 |203.0.113.0–203.0.113.255 |align="right"| |Documentation |Assigned as TEST-NET-3, documentation and examples. |- |224.0.0.0/4 |224.0.0.0–239.255.255.255 |align="right"| |Internet |In use for IP multicast. (Former Class D network.) |- |233.252.0.0/24 |233.252.0.0-233.252.0.255 |align="right"| |Documentation |Assigned as MCAST-TEST-NET, documentation and examples. |- |240.0.0.0/4 |240.0.0.0–255.255.255.254 |align="right"| |Internet |Reserved for future use. (Former Class E network.) |- |255.255.255.255/32 |255.255.255.255 |align="right"| |Subnet |Reserved for the "limited broadcast" destination address. |} Private networks Of the approximately four billion addresses defined in IPv4, about 18 million addresses in three ranges are reserved for use in private networks. Packets addresses in these ranges are not routable in the public Internet; they are ignored by all public routers. Therefore, private hosts cannot directly communicate with public networks, but require network address translation at a routing gateway for this purpose. {| class="wikitable" |+ Reserved private IPv4 network ranges |- !Name!!CIDR block!!Address range!!Number of addresses!!Classful description |- |24-bit block||10.0.0.0/8||10.0.0.0 – 10.255.255.255||align="right"|||Single Class A. |- |20-bit block|||172.16.0.0/12||172.16.0.0 – 172.31.255.255||align="right"|||Contiguous range of 16 Class B blocks. |- |16-bit block||192.168.0.0/16||192.168.0.0 – 192.168.255.255||align="right"|||Contiguous range of 256 Class C blocks. |} Since two private networks, e.g., two branch offices, cannot directly interoperate via the public Internet, the two networks must be bridged across the Internet via a virtual private network (VPN) or an IP tunnel, which encapsulates packets, including their headers containing the private addresses, in a protocol layer during transmission across the public network. Additionally, encapsulated packets may be encrypted for transmission across public networks to secure the data. Link-local addressing RFC 3927 defines the special address block 169.254.0.0/16 for link-local addressing. These addresses are only valid on the link (such as a local network segment or point-to-point connection) directly connected to a host that uses them. These addresses are not routable. Like private addresses, these addresses cannot be the source or destination of packets traversing the internet. These addresses are primarily used for address autoconfiguration (Zeroconf) when a host cannot obtain an IP address from a DHCP server or other internal configuration methods. When the address block was reserved, no standards existed for address autoconfiguration. Microsoft created an implementation called Automatic Private IP Addressing (APIPA), which was deployed on millions of machines and became a de facto standard. Many years later, in May 2005, the IETF defined a formal standard in RFC 3927, entitled Dynamic Configuration of IPv4 Link-Local Addresses. Loopback The class A network 127.0.0.0 (classless network 127.0.0.0/8) is reserved for loopback. IP packets whose source addresses belong to this network should never appear outside a host. Packets received on a non-loopback interface with a loopback source or destination address must be dropped. First and last subnet addresses The first address in a subnet is used to identify the subnet itself. In this address all host bits are 0. To avoid ambiguity in representation, this address is reserved. The last address has all host bits set to 1. It is used as a local broadcast address for sending messages to all devices on the subnet simultaneously. For networks of size /24 or larger, the broadcast address always ends in 255. For example, in the subnet 192.168.5.0/24 (subnet mask 255.255.255.0) the identifier 192.168.5.0 is used to refer to the entire subnet. The broadcast address of the network is 192.168.5.255. However, this does not mean that every address ending in 0 or 255 cannot be used as a host address. For example, in the /16 subnet 192.168.0.0/255.255.0.0, which is equivalent to the address range 192.168.0.0–192.168.255.255, the broadcast address is 192.168.255.255. One can use the following addresses for hosts, even though they end with 255: 192.168.1.255, 192.168.2.255, etc. Also, 192.168.0.0 is the network identifier and must not be assigned to an interface. The addresses 192.168.1.0, 192.168.2.0, etc., may be assigned, despite ending with 0. In the past, conflict between network addresses and broadcast addresses arose because some software used non-standard broadcast addresses with zeros instead of ones. In networks smaller than /24, broadcast addresses do not necessarily end with 255. For example, a CIDR subnet 203.0.113.16/28 has the broadcast address 203.0.113.31. As a special case, a /31 network has capacity for just two hosts. These networks are typically used for point-to-point connections. There is no network identifier or broadcast address for these networks. Address resolution Hosts on the Internet are usually known by names, e.g., www.example.com, not primarily by their IP address, which is used for routing and network interface identification. The use of domain names requires translating, called resolving, them to addresses and vice versa. This is analogous to looking up a phone number in a phone book using the recipient's name. The translation between addresses and domain names is performed by the Domain Name System (DNS), a hierarchical, distributed naming system that allows for the subdelegation of namespaces to other DNS servers. Unnumbered interface A unnumbered point-to-point (PtP) link, also called a transit link, is a link that doesn't have any IP network or subnet number associated with it, but still have a IP address. First introduced in 1993. The only purposes of a transit link is to route datagrams. Unnumbered link is used to free IP addresses, when having a scarce IP address space, or reduce the management of assigning IP and configuration of interfaces. Previous every link needs to dedicated /30 or /31 subnet using 2-4 IP addresses per point to point link. When a link is unnumbered a router-id is used, router-id is IP address /32 borrowed from a defined (normally a loopback) interface. The same router-id can be used on multiple interfaces. One of the disadvantage to unnumbered interface, is that is harder to do remote testing and management. Phil Karn from Qualcomm is credit as original designer. Address space exhaustion Since the 1980s, it was apparent that the pool of available IPv4 addresses was depleting at a rate that was not initially anticipated in the original design of the network. The main market forces that accelerated address depletion included the rapidly growing number of Internet users, who increasingly used mobile computing devices, such as laptop computers, personal digital assistants (PDAs), and smart phones with IP data services. In addition, high-speed Internet access was based on always-on devices. The threat of exhaustion motivated the introduction of a number of remedial technologies, such as: Classless Inter-Domain Routing (CIDR), for smaller ISP allocations Unnumbered interface, removed the need on transit links. network address translation, removed the need for end-to-end principle. By the mid-1990s, pervasive use of network address translation (NAT) in network access provider systems, and strict usage-based allocation policies at the regional and local Internet registries. The primary address pool of the Internet, maintained by IANA, was exhausted on 3 February 2011, when the last five blocks were allocated to the five RIRs. APNIC was the first RIR to exhaust its regional pool on 15 April 2011, except for a small amount of address space reserved for the transition technologies to IPv6, which is to be allocated under a restricted policy. The long-term solution to address exhaustion was the 1998 specification of a new version of the Internet Protocol, IPv6. It provides a vastly increased address space, but also allows improved route aggregation across the Internet, and offers large subnetwork allocations of a minimum of 264 host addresses to end users. However, IPv4 is not directly interoperable with IPv6, so that IPv4-only hosts cannot directly communicate with IPv6-only hosts. With the phase-out of the 6bone experimental network starting in 2004, permanent formal deployment of IPv6 commenced in 2006. Completion of IPv6 deployment is expected to take considerable time, so that intermediate transition technologies are necessary to permit hosts to participate in the Internet using both versions of the protocol. Packet structure An IP packet consists of a header section and a data section. An IP packet has no data checksum or any other footer after the data section. Typically the link layer encapsulates IP packets in frames with a CRC footer that detects most errors, many transport-layer protocols carried by IP also have their own error checking. Header The IPv4 packet header consists of 14 fields, of which 13 are required. The 14th field is optional and aptly named: options. The fields in the header are packed with the most significant byte first (big endian), and for the diagram and discussion, the most significant bits are considered to come first (MSB 0 bit numbering). The most significant bit is numbered 0, so the version field is actually found in the four most significant bits of the first byte, for example. The first header field in an IP packet is the four-bit version field. For IPv4, this is always equal to 4. The IPv4 header is variable in size due to the optional 14th field (options). The IHL field contains the size of the IPv4 header, it has 4 bits that specify the number of 32-bit words in the header. The minimum value for this field is 5, which indicates a length of 5 × 32 bits = 160 bits = 20 bytes. As a 4-bit field, the maximum value is 15, this means that the maximum size of the IPv4 header is 15 × 32 bits = 480 bits = 60 bytes. Differentiated Services Code Point () Originally defined as the type of service (ToS), this field specifies differentiated services (DiffServ) per RFC 2474. Real-time data streaming makes use of the DSCP field. An example is Voice over IP (VoIP), which is used for interactive voice services. Explicit Congestion Notification () This field is defined in RFC 3168 and allows end-to-end notification of network congestion without dropping packets. ECN is an optional feature available when both endpoints support it and effective when also supported by the underlying network. This 16-bit field defines the entire packet size in bytes, including header and data. The minimum size is 20 bytes (header without data) and the maximum is 65,535 bytes. All hosts are required to be able to reassemble datagrams of size up to 576 bytes, but most modern hosts handle much larger packets. Links may impose further restrictions on the packet size, in which case datagrams must be fragmented. Fragmentation in IPv4 is performed in either the sending host or in routers. Reassembly is performed at the receiving host. This field is an identification field and is primarily used for uniquely identifying the group of fragments of a single IP datagram. Some experimental work has suggested using the ID field for other purposes, such as for adding packet-tracing information to help trace datagrams with spoofed source addresses, but RFC 6864 now prohibits any such use. A three-bit field follows and is used to control or identify fragments. They are (in order, from most significant to least significant): bit 0: Reserved; must be zero. bit 1: Don't Fragment (DF) bit 2: More Fragments (MF) If the DF flag is set, and fragmentation is required to route the packet, then the packet is dropped. This can be used when sending packets to a host that does not have resources to perform reassembly of fragments. It can also be used for path MTU discovery, either automatically by the host IP software, or manually using diagnostic tools such as ping or traceroute. For unfragmented packets, the MF flag is cleared. For fragmented packets, all fragments except the last have the MF flag set. The last fragment has a non-zero Fragment Offset field, differentiating it from an unfragmented packet. This field specifies the offset of a particular fragment relative to the beginning of the original unfragmented IP datagram in units of eight-byte blocks. The first fragment has an offset of zero. The 13 bit field allows a maximum offset of (213 – 1) × 8 = 65,528 bytes, which, with the header length included (65,528 + 20 = 65,548 bytes), supports fragmentation of packets exceeding the maximum IP length of 65,535 bytes. An eight-bit time to live field limits a datagram's lifetime to prevent network failure in the event of a routing loop. It is specified in seconds, but time intervals less than 1 second are rounded up to 1. In practice, the field is used as a hop count—when the datagram arrives at a router, the router decrements the TTL field by one. When the TTL field hits zero, the router discards the packet and typically sends an ICMP time exceeded message to the sender. The program traceroute sends messages with adjusted TTL values and uses these ICMP time exceeded messages to identify the routers traversed by packets from the source to the destination. This field defines the protocol used in the data portion of the IP datagram. IANA maintains a list of IP protocol numbers as directed by RFC 790. The 16-bit IPv4 header checksum field is used for error-checking of the header. When a packet arrives at a router, the router calculates the checksum of the header and compares it to the checksum field. If the values do not match, the router discards the packet. Errors in the data field must be handled by the encapsulated protocol. Both UDP and TCP have separate checksums that apply to their data. When a packet arrives at a router, the router decreases the TTL field in the header. Consequently, the router must calculate a new header checksum. This field is the IPv4 address of the sender of the packet. Note that this address may be changed in transit by a network address translation device. This field is the IPv4 address of the receiver of the packet. As with the source address, this may be changed in transit by a network address translation device. The options field is not often used. Packets containing some options may be considered as dangerous by some routers and be blocked. Note that the value in the IHL field must include enough extra 32-bit words to hold all the options plus any padding needed to ensure that the header contains an integer number of 32-bit words. If IHL is greater than 5 (i.e., it is from 6 to 15) it means that the options field is present and must be considered. The list of options may be terminated with an EOOL (End of Options List, 0x00) option; this is only necessary if the end of the options would not otherwise coincide with the end of the header. The possible options that can be put in the header are as follows: {| class=wikitable ! Field !! Size (bits) !! Description |- | Copied || 1 || Set to 1 if the options need to be copied into all fragments of a fragmented packet. |- | Option Class || 2 || A general options category. 0 is for control options, and 2 is for debugging and measurement. 1 and 3 are reserved. |- | Option Number || 5 || Specifies an option. |- | Option Length || 8 || Indicates the size of the entire option (including this field). This field may not exist for simple options. |- | Option Data || Variable || Option-specific data. This field may not exist for simple options. |} The table below shows the defined options for IPv4. The Option Type column is derived from the Copied, Option Class, and Option Number bits as defined above. {| class=wikitable style="text-align: center;" ! Option Type (decimal / hexadecimal) !! Option Name !! Description |- | 0 / 0x00 || EOOL || End of Option List |- | 1 / 0x01 || NOP || No Operation |- | 2 / 0x02 || SEC || Security (defunct) |- | 7 / 0x07 || RR || Record Route |- | 10 / 0x0A || ZSU || Experimental Measurement |- | 11 / 0x0B || MTUP || MTU Probe |- | 12 / 0x0C || MTUR || MTU Reply |- | 15 / 0x0F || ENCODE || ENCODE |- | 25 / 0x19 || QS || Quick-Start |- | 30 / 0x1E || EXP || RFC3692-style Experiment |- | 68 / 0x44 || TS || Time Stamp |- | 82 / 0x52 || TR || Traceroute |- | 94 / 0x5E || EXP || RFC3692-style Experiment |- | 130 / 0x82 || SEC || Security (RIPSO) |- | 131 / 0x83 || LSR || Loose Source Route |- | 133 / 0x85 || E-SEC || Extended Security (RIPSO) |- | 134 / 0x86 || CIPSO || Commercial IP Security Option |- | 136 / 0x88 || SID || Stream ID |- | 137 / 0x89 || SSR || Strict Source Route |- | 142 / 0x8E || VISA || Experimental Access Control |- | 144 / 0x90 || IMITD || IMI Traffic Descriptor |- | 145 / 0x91 || EIP || Extended Internet Protocol |- | 147 / 0x93 || ADDEXT || Address Extension |- | 148 / 0x94 || RTRALT || Router Alert |- | 149 / 0x95 || SDB || Selective Directed Broadcast |- | 151 / 0x97 || DPS || Dynamic Packet State |- | 152 / 0x98 || UMP || Upstream Multicast Pkt. |- | 158 / 0x9E || EXP || RFC3692-style Experiment |- | 205 / 0xCD || FINN || Experimental Flow Control |- | 222 / 0xDE || EXP || RFC3692-style Experiment |} Data The packet payload is not included in the checksum. Its contents are interpreted based on the value of the Protocol header field. List of IP protocol numbers contains a complete list of payload protocol types. Some of the common payload protocols include: Fragmentation and reassembly The Internet Protocol enables traffic between networks. The design accommodates networks of diverse physical nature; it is independent of the underlying transmission technology used in the link layer. Networks with different hardware usually vary not only in transmission speed, but also in the maximum transmission unit (MTU). When one network wants to transmit datagrams to a network with a smaller MTU, it may fragment its datagrams. In IPv4, this function was placed at the Internet Layer and is performed in IPv4 routers limiting exposure to these issues by hosts. In contrast, IPv6, the next generation of the Internet Protocol, does not allow routers to perform fragmentation; hosts must perform Path MTU Discovery before sending datagrams. Fragmentation When a router receives a packet, it examines the destination address and determines the outgoing interface to use and that interface's MTU. If the packet size is bigger than the MTU, and the Do not Fragment (DF) bit in the packet's header is set to 0, then the router may fragment the packet. The router divides the packet into fragments. The maximum size of each fragment is the outgoing MTU minus the IP header size (20 bytes minimum; 60 bytes maximum). The router puts each fragment into its own packet, each fragment packet having the following changes: The total length field is the fragment size. The more fragments (MF) flag is set for all fragments except the last one, which is set to 0. The fragment offset field is set, based on the offset of the fragment in the original data payload. This is measured in units of 8-byte blocks. The header checksum field is recomputed. For example, for an MTU of 1,500 bytes and a header size of 20 bytes, the fragment offsets would be multiples of (0, 185, 370, 555, 740, etc.). It is possible that a packet is fragmented at one router, and that the fragments are further fragmented at another router. For example, a packet of 4,520 bytes, including a 20 bytes IP header is fragmented to two packets on a link with an MTU of 2,500 bytes: The total data size is preserved: 2,480 bytes + 2,020 bytes = 4,500 bytes. The offsets are and . When forwarded to a link with an MTU of 1,500 bytes, each fragment is fragmented into two fragments: Again, the data size is preserved: 1,480 + 1,000 = 2,480, and 1,480 + 540 = 2,020. Also in this case, the More Fragments bit remains 1 for all the fragments that came with 1 in them and for the last fragment that arrives, it works as usual, that is the MF bit is set to 0 only in the last one. And of course, the Identification field continues to have the same value in all re-fragmented fragments. This way, even if fragments are re-fragmented, the receiver knows they have initially all started from the same packet. The last offset and last data size are used to calculate the total data size: . Reassembly A receiver knows that a packet is a fragment, if at least one of the following conditions is true: The flag more fragments is set, which is true for all fragments except the last. The field fragment offset is nonzero, which is true for all fragments except the first. The receiver identifies matching fragments using the source and destination addresses, the protocol ID, and the identification field. The receiver reassembles the data from fragments with the same ID using both the fragment offset and the more fragments flag. When the receiver receives the last fragment, which has the more fragments flag set to 0, it can calculate the size of the original data payload, by multiplying the last fragment's offset by eight and adding the last fragment's data size. In the given example, this calculation was bytes. When the receiver has all fragments, they can be reassembled in the correct sequence according to the offsets to form the original datagram. Assistive protocols IP addresses are not tied in any permanent manner to hardware identifications and, indeed, a network interface can have multiple IP addresses in modern operating systems. Hosts and routers need additional mechanisms to identify the relationship between device interfaces and IP addresses, in order to properly deliver an IP packet to the destination host on a link. The Address Resolution Protocol (ARP) performs this IP-address-to-hardware-address translation for IPv4. (A hardware address is also called a MAC address.) In addition, the reverse correlation is often necessary. For example, when an IP host is booted or connected to a network it needs to determine its IP address, unless an address is preconfigured by an administrator. Protocols for such inverse correlations exist in the Internet Protocol Suite. Currently used methods are Dynamic Host Configuration Protocol (DHCP), Bootstrap Protocol (BOOTP) and, infrequently, reverse ARP. See also History of the Internet List of assigned /8 IPv4 address blocks List of IP protocol numbers Notes References External links Internet Assigned Numbers Authority (IANA) IP, Internet Protocol — IP Header Breakdown, including specific options — IPv4 Mobility IPv6 vs. carrier-grade NAT/squeezing more out of IPv4 RIPE report on address consumption as of October 2003 Official current state of IPv4 /8 allocations, as maintained by IANA Dynamically generated graphs of IPv4 address consumption with predictions of exhaustion dates—Geoff Huston IP addressing in China and the myth of address shortage Countdown of remaining IPv4 available addresses (estimated) Internet Standards Internet layer protocols Network layer protocols Articles containing video clips
[ -0.1854505091905594, 0.026879852637648582, 0.46421298384666443, 0.12055227160453796, -0.25640809535980225, -0.15932896733283997, 0.28446340560913086, 0.025184055790305138, -0.9003798365592957, -0.08836140483617783, -0.21175967156887054, 0.09962084889411926, -0.5983343124389648, -0.01135318...
15318
https://en.wikipedia.org/wiki/IPv6
IPv6
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion, and is intended to replace IPv4. In December 1998, IPv6 became a Draft Standard for the IETF, which subsequently ratified it as an Internet Standard on 14 July 2017. Devices on the Internet are assigned a unique IP address for identification and location definition. With the rapid growth of the Internet after commercialization in the 1990s, it became evident that far more addresses would be needed to connect devices than the IPv4 address space had available. By 1998, the IETF had formalized the successor protocol. IPv6 uses 128-bit addresses, theoretically allowing 2128, or approximately total addresses. The actual number is slightly smaller, as multiple ranges are reserved for special use or completely excluded from use. The two protocols are not designed to be interoperable, and thus direct communication between them is impossible, complicating the move to IPv6. However, several transition mechanisms have been devised to rectify this. IPv6 provides other technical benefits in addition to a larger addressing space. In particular, it permits hierarchical address allocation methods that facilitate route aggregation across the Internet, and thus limit the expansion of routing tables. The use of multicast addressing is expanded and simplified, and provides additional optimization for the delivery of services. Device mobility, security, and configuration aspects have been considered in the design of the protocol. IPv6 addresses are represented as eight groups of four hexadecimal digits each, separated by colons. The full representation may be shortened; for example, 2001:0db8:0000:0000:0000:8a2e:0370:7334 becomes 2001:db8::8a2e:370:7334. Main features IPv6 is an Internet Layer protocol for packet-switched internetworking and provides end-to-end datagram transmission across multiple IP networks, closely adhering to the design principles developed in the previous version of the protocol, Internet Protocol Version 4 (IPv4). In addition to offering more addresses, IPv6 also implements features not present in IPv4. It simplifies aspects of address configuration, network renumbering, and router announcements when changing network connectivity providers. It simplifies processing of packets in routers by placing the responsibility for packet fragmentation into the end points. The IPv6 subnet size is standardized by fixing the size of the host identifier portion of an address to 64 bits. The addressing architecture of IPv6 is defined in and allows three different types of transmission: unicast, anycast and multicast. Motivation and origin IPv4 address exhaustion Internet Protocol Version 4 (IPv4) was the first publicly used version of the Internet Protocol. IPv4 was developed as a research project by the Defense Advanced Research Projects Agency (DARPA), a United States Department of Defense agency, before becoming the foundation for the Internet and the World Wide Web. IPv4 includes an addressing system that uses numerical identifiers consisting of 32 bits. These addresses are typically displayed in dot-decimal notation as decimal values of four octets, each in the range 0 to 255, or 8 bits per number. Thus, IPv4 provides an addressing capability of 232 or approximately 4.3 billion addresses. Address exhaustion was not initially a concern in IPv4 as this version was originally presumed to be a test of DARPA's networking concepts. During the first decade of operation of the Internet, it became apparent that methods had to be developed to conserve address space. In the early 1990s, even after the redesign of the addressing system using a classless network model, it became clear that this would not suffice to prevent IPv4 address exhaustion, and that further changes to the Internet infrastructure were needed. The last unassigned top-level address blocks of 16 million IPv4 addresses were allocated in February 2011 by the Internet Assigned Numbers Authority (IANA) to the five regional Internet registries (RIRs). However, each RIR still has available address pools and is expected to continue with standard address allocation policies until one /8 Classless Inter-Domain Routing (CIDR) block remains. After that, only blocks of 1,024 addresses (/22) will be provided from the RIRs to a local Internet registry (LIR). As of September 2015, all of Asia-Pacific Network Information Centre (APNIC), the Réseaux IP Européens Network Coordination Centre (RIPE_NCC), Latin America and Caribbean Network Information Centre (LACNIC), and American Registry for Internet Numbers (ARIN) have reached this stage. This leaves African Network Information Center (AFRINIC) as the sole regional internet registry that is still using the normal protocol for distributing IPv4 addresses. As of November 2018, AFRINIC's minimum allocation is /22 or 1024 IPv4 addresses. A LIR may receive additional allocation when about 80% of all the address space has been utilized. RIPE NCC announced that it had fully run out of IPv4 addresses on 25 November 2019, and called for greater progress on the adoption of IPv6. It is widely expected that the Internet will use IPv4 alongside IPv6 for the foreseeable future. Comparison with IPv4 On the Internet, data is transmitted in the form of network packets. IPv6 specifies a new packet format, designed to minimize packet header processing by routers. Because the headers of IPv4 packets and IPv6 packets are significantly different, the two protocols are not interoperable. However, most transport and application-layer protocols need little or no change to operate over IPv6; exceptions are application protocols that embed Internet-layer addresses, such as File Transfer Protocol (FTP) and Network Time Protocol (NTP), where the new address format may cause conflicts with existing protocol syntax. Larger address space The main advantage of IPv6 over IPv4 is its larger address space. The size of an IPv6 address is 128 bits, compared to 32 bits in IPv4. The address space therefore has 2128 = 340,282,366,920,938,463,463,374,607,431,768,211,456 addresses (approximately ). Some blocks of this space and some specific addresses are reserved for special uses. While this address space is very large, it was not the intent of the designers of IPv6 to assure geographical saturation with usable addresses. Rather, the longer addresses simplify allocation of addresses, enable efficient route aggregation, and allow implementation of special addressing features. In IPv4, complex Classless Inter-Domain Routing (CIDR) methods were developed to make the best use of the small address space. The standard size of a subnet in IPv6 is 264 addresses, about four billion times the size of the entire IPv4 address space. Thus, actual address space utilization will be small in IPv6, but network management and routing efficiency are improved by the large subnet space and hierarchical route aggregation. Multicasting Multicasting, the transmission of a packet to multiple destinations in a single send operation, is part of the base specification in IPv6. In IPv4 this is an optional (although commonly implemented) feature. IPv6 multicast addressing has features and protocols in common with IPv4 multicast, but also provides changes and improvements by eliminating the need for certain protocols. IPv6 does not implement traditional IP broadcast, i.e. the transmission of a packet to all hosts on the attached link using a special broadcast address, and therefore does not define broadcast addresses. In IPv6, the same result is achieved by sending a packet to the link-local all nodes multicast group at address ff02::1, which is analogous to IPv4 multicasting to address 224.0.0.1. IPv6 also provides for new multicast implementations, including embedding rendezvous point addresses in an IPv6 multicast group address, which simplifies the deployment of inter-domain solutions. In IPv4 it is very difficult for an organization to get even one globally routable multicast group assignment, and the implementation of inter-domain solutions is arcane. Unicast address assignments by a local Internet registry for IPv6 have at least a 64-bit routing prefix, yielding the smallest subnet size available in IPv6 (also 64 bits). With such an assignment it is possible to embed the unicast address prefix into the IPv6 multicast address format, while still providing a 32-bit block, the least significant bits of the address, or approximately 4.2 billion multicast group identifiers. Thus each user of an IPv6 subnet automatically has available a set of globally routable source-specific multicast groups for multicast applications. Stateless address autoconfiguration (SLAAC) IPv6 hosts configure themselves automatically. Every interface has a self-generated link-local address and, when connected to a network, conflict resolution is performed and routers provide network prefixes via router advertisements. Stateless configuration of routers can be achieved with a special router renumbering protocol. When necessary, hosts may configure additional stateful addresses via Dynamic Host Configuration Protocol version 6 (DHCPv6) or static addresses manually. Like IPv4, IPv6 supports globally unique IP addresses. The design of IPv6 intended to re-emphasize the end-to-end principle of network design that was originally conceived during the establishment of the early Internet by rendering network address translation obsolete. Therefore, every device on the network is globally addressable directly from any other device. A stable, unique, globally addressable IP address would facilitate tracking a device across networks. Therefore, such addresses are a particular privacy concern for mobile devices, such as laptops and cell phones. To address these privacy concerns, the SLAAC protocol includes what are typically called "privacy addresses" or, more correctly, "temporary addresses", codified in RFC 4941, "Privacy Extensions for Stateless Address Autoconfiguration in IPv6". Temporary addresses are random and unstable. A typical consumer device generates a new temporary address daily and will ignore traffic addressed to an old address after one week. Temporary addresses are used by default by Windows since XP SP1, macOS since (Mac OS X) 10.7, Android since 4.0, and iOS since version 4.3. Use of temporary addresses by Linux distributions varies. Renumbering an existing network for a new connectivity provider with different routing prefixes is a major effort with IPv4. With IPv6, however, changing the prefix announced by a few routers can in principle renumber an entire network, since the host identifiers (the least-significant 64 bits of an address) can be independently self-configured by a host. The SLAAC address generation method is implementation-dependent. IETF recommends that addresses be deterministic but semantically opaque. IPsec Internet Protocol Security (IPsec) was originally developed for IPv6, but found widespread deployment first in IPv4, for which it was re-engineered. IPsec was a mandatory part of all IPv6 protocol implementations, and Internet Key Exchange (IKE) was recommended, but with RFC 6434 the inclusion of IPsec in IPv6 implementations was downgraded to a recommendation because it was considered impractical to require full IPsec implementation for all types of devices that may use IPv6. However, as of RFC 4301 IPv6 protocol implementations that do implement IPsec need to implement IKEv2 and need to support a minimum set of cryptographic algorithms. This requirement will help to make IPsec implementations more interoperable between devices from different vendors. The IPsec Authentication Header (AH) and the Encapsulating Security Payload header (ESP) are implemented as IPv6 extension headers. Simplified processing by routers The packet header in IPv6 is simpler than the IPv4 header. Many rarely used fields have been moved to optional header extensions. With the simplified IPv6 packet header the process of packet forwarding by routers has been simplified. Although IPv6 packet headers are at least twice the size of IPv4 packet headers, processing of packets that only contain the base IPv6 header by routers may, in some cases, be more efficient, because less processing is required in routers due to the headers being aligned to match common word sizes. However, many devices implement IPv6 support in software (as opposed to hardware), thus resulting in very bad packet processing performance. Additionally, for many implementations, the use of Extension Headers causes packets to be processed by a router's CPU, leading to poor performance or even security issues. Moreover, an IPv6 header does not include a checksum. The IPv4 header checksum is calculated for the IPv4 header, and has to be recalculated by routers every time the time to live (called hop limit in the IPv6 protocol) is reduced by one. The absence of a checksum in the IPv6 header furthers the end-to-end principle of Internet design, which envisioned that most processing in the network occurs in the leaf nodes. Integrity protection for the data that is encapsulated in the IPv6 packet is assumed to be assured by both the link layer or error detection in higher-layer protocols, namely the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) on the transport layer. Thus, while IPv4 allowed UDP datagram headers to have no checksum (indicated by 0 in the header field), IPv6 requires a checksum in UDP headers. IPv6 routers do not perform IP fragmentation. IPv6 hosts are required either to perform path MTU discovery, perform end-to-end fragmentation, or send packets no larger than the default maximum transmission unit (MTU), which is 1280 octets. Mobility Unlike mobile IPv4, mobile IPv6 avoids triangular routing and is therefore as efficient as native IPv6. IPv6 routers may also allow entire subnets to move to a new router connection point without renumbering. Extension headers The IPv6 packet header has a minimum size of 40 octets (320 bits). Options are implemented as extensions. This provides the opportunity to extend the protocol in the future without affecting the core packet structure. However, RFC 7872 notes that some network operators drop IPv6 packets with extension headers when they traverse transit autonomous systems. Jumbograms IPv4 limits packets to 65,535 (216−1) octets of payload. An IPv6 node can optionally handle packets over this limit, referred to as jumbograms, which can be as large as 4,294,967,295 (232−1) octets. The use of jumbograms may improve performance over high-MTU links. The use of jumbograms is indicated by the Jumbo Payload Option extension header. IPv6 packets An IPv6 packet has two parts: a header and payload. The header consists of a fixed portion with minimal functionality required for all packets and may be followed by optional extensions to implement special features. The fixed header occupies the first 40 octets (320 bits) of the IPv6 packet. It contains the source and destination addresses, traffic class, hop count, and the type of the optional extension or payload which follows the header. This Next Header field tells the receiver how to interpret the data which follows the header. If the packet contains options, this field contains the option type of the next option. The "Next Header" field of the last option points to the upper-layer protocol that is carried in the packet's payload. The current use of the IPv6 Traffic Class field divides this between a 6 bit Differentiated Services Code Point and a 2-bit Explicit Congestion Notification field. Extension headers carry options that are used for special treatment of a packet in the network, e.g., for routing, fragmentation, and for security using the IPsec framework. Without special options, a payload must be less than . With a Jumbo Payload option (in a Hop-By-Hop Options extension header), the payload must be less than 4 GB. Unlike with IPv4, routers never fragment a packet. Hosts are expected to use Path MTU Discovery to make their packets small enough to reach the destination without needing to be fragmented. See IPv6 packet fragmentation. Addressing IPv6 addresses have 128 bits. The design of the IPv6 address space implements a different design philosophy than in IPv4, in which subnetting was used to improve the efficiency of utilization of the small address space. In IPv6, the address space is deemed large enough for the foreseeable future, and a local area subnet always uses 64 bits for the host portion of the address, designated as the interface identifier, while the most-significant 64 bits are used as the routing prefix. While the myth has existed regarding IPv6 subnets being impossible to scan, RFC 7707 notes that patterns resulting from some IPv6 address configuration techniques and algorithms allow address scanning in many real-world scenarios. Address representation The 128 bits of an IPv6 address are represented in 8 groups of 16 bits each. Each group is written as four hexadecimal digits (sometimes called hextets or more formally hexadectets and informally a quibble or quad-nibble) and the groups are separated by colons (:). An example of this representation is . For convenience and clarity, the representation of an IPv6 address may be shortened with the following rules. One or more leading zeros from any group of hexadecimal digits are removed, which is usually done to all of the leading zeros. For example, the group is converted to . Consecutive sections of zeros are replaced with two colons (::). This may only be used once in an address, as multiple use would render the address indeterminate. requires that a double colon not be used to denote an omitted single section of zeros. An example of application of these rules: Initial address: . After removing all leading zeros in each group: . After omitting consecutive sections of zeros: . The loopback address is defined in and is abbreviated to by using both rules. As an IPv6 address may have more than one representation, the IETF has issued a proposed standard for representing them in text. Because IPv6 addresses contain colons, and URLs use colons to separate the host from the port number, RFC2732 specifies that an IPv6 address used as the host-part of a URL should be enclosed in square brackets, e.g. http://[2001:db8:4006:812::200e] or http://[2001:db8:4006:812::200e]:8080/path/page.html. Link-local address All interfaces of IPv6 hosts require a link-local address, which have the prefix . This prefix is combined with a 64-bit suffix, which the host can compute and assign by itself without the presence or cooperation of an external network component like a DHCP server, in a process called link-local address autoconfiguration. The lower 64 bits of the link-local address (the suffix) were originally derived from the MAC address of the underlying network interface card. As this method of assigning addresses would cause undesirable address changes when faulty network cards were replaced, and as it also suffered from a number of security and privacy issues, RFC 8064 has replaced the original MAC-based method with the hash-based method specified in RFC 7217. Address uniqueness and router solicitation IPv6 uses a new mechanism for mapping IP addresses to link-layer addresses (MAC addresses), because it does not support the broadcast addressing method, on which the functionality of the Address Resolution Protocol (ARP) in IPv4 is based. IPv6 implements the Neighbor Discovery Protocol (NDP, ND) in the link layer, which relies on ICMPv6 and multicast transmission. IPv6 hosts verify the uniqueness of their IPv6 addresses in a local area network (LAN) by sending a neighbor solicitation message asking for the link-layer address of the IP address. If any other host in the LAN is using that address, it responds. A host bringing up a new IPv6 interface first generates a unique link-local address using one of several mechanisms designed to generate a unique address. Should a non-unique address be detected, the host can try again with a newly generated address. Once a unique link-local address is established, the IPv6 host determines whether the LAN is connected on this link to any router interface that supports IPv6. It does so by sending out an ICMPv6 router solicitation message to the all-routers multicast group with its link-local address as source. If there is no answer after a predetermined number of attempts, the host concludes that no routers are connected. If it does get a response, known as a router advertisement, from a router, the response includes the network configuration information to allow establishment of a globally unique address with an appropriate unicast network prefix. There are also two flag bits that tell the host whether it should use DHCP to get further information and addresses: The Manage bit, which indicates whether or not the host should use DHCP to obtain additional addresses rather than rely on an auto-configured address from the router advertisement. The Other bit, which indicates whether or not the host should obtain other information through DHCP. The other information consists of one or more prefix information options for the subnets that the host is attached to, a lifetime for the prefix, and two flags: On-link: If this flag is set, the host will treat all addresses on the specific subnet as being on-link and send packets directly to them instead of sending them to a router for the duration of the given lifetime. Address: This flag tells the host to actually create a global address. Global addressing The assignment procedure for global addresses is similar to local-address construction. The prefix is supplied from router advertisements on the network. Multiple prefix announcements cause multiple addresses to be configured. Stateless address autoconfiguration (SLAAC) requires a address block, as defined in . Local Internet registries are assigned at least blocks, which they divide among subordinate networks. The initial recommendation stated assignment of a subnet to end-consumer sites (). This was replaced by , which "recommends giving home sites significantly more than a single , but does not recommend that every home site be given a either". s are specifically considered. It remains to be seen whether ISPs will honor this recommendation. For example, during initial trials, Comcast customers were given a single network. IPv6 in the Domain Name System In the Domain Name System (DNS), hostnames are mapped to IPv6 addresses by AAAA ("quad-A") resource records. For reverse resolution, the IETF reserved the domain ip6.arpa, where the name space is hierarchically divided by the 1-digit hexadecimal representation of nibble units (4 bits) of the IPv6 address. This scheme is defined in . When a dual-stack host queries a DNS server to resolve a fully qualified domain name (FQDN), the DNS client of the host sends two DNS requests, one querying A records and the other querying AAAA records. The host operating system may be configured with a preference for address selection rules . An alternate record type was used in early DNS implementations for IPv6, designed to facilitate network renumbering, the A6 records for the forward lookup and a number of other innovations such as bit-string labels and DNAME records. It is defined in and its references (with further discussion of the pros and cons of both schemes in ), but has been deprecated to experimental status (). Transition mechanisms IPv6 is not foreseen to supplant IPv4 instantaneously. Both protocols will continue to operate simultaneously for some time. Therefore, IPv6 transition mechanisms are needed to enable IPv6 hosts to reach IPv4 services and to allow isolated IPv6 hosts and networks to reach each other over IPv4 infrastructure. According to Silvia Hagen, a dual-stack implementation of the IPv4 and IPv6 on devices is the easiest way to migrate to IPv6. Many other transition mechanisms use tunneling to encapsulate IPv6 traffic within IPv4 networks and vice versa. This is an imperfect solution, which reduces the maximum transmission unit (MTU) of a link and therefore complicates Path MTU Discovery, and may increase latency. Dual-stack IP implementation Dual-stack IP implementations provide complete IPv4 and IPv6 protocol stacks in the operating system of a computer or network device on top of the common physical layer implementation, such as Ethernet. This permits dual-stack hosts to participate in IPv6 and IPv4 networks simultaneously. The method is defined in . A device with dual-stack implementation in the operating system has an IPv4 and IPv6 address, and can communicate with other nodes in the LAN or the Internet using either IPv4 or IPv6. The Domain Name System (DNS) protocol is used by both IP protocols to resolve fully qualified domain names (FQDN) and IP addresses, but dual stack requires that the resolving DNS server can resolve both types of addresses. Such a dual stack DNS server would hold IPv4 addresses in the A records, and IPv6 addresses in the AAAA records. Depending on the destination that is to be resolved, a DNS name server may return an IPv4 or IPv6 IP address, or both. A default address selection mechanism, or preferred protocol, needs to be configured either on hosts or the DNS server. The IETF has published Happy Eyeballs to assist dual stack applications, so that they can connect using both IPv4 and IPv6, but prefer an IPv6 connection if it is available. However, dual-stack also needs to be implemented on all routers between the host and the service for which the DNS server has returned an IPv6 address. Dual-stack clients should only be configured to prefer IPv6, if the network is able to forward IPv6 packets using the IPv6 versions of routing protocols. When dual stack networks protocols are in place the application layer can be migrated to IPv6. While dual-stack is supported by major operating system and network device vendors, legacy networking hardware and servers don't support IPv6. ISP customers with public-facing IPv6 Internet service providers (ISPs) are increasingly providing their business and private customers with public-facing IPv6 global unicast addresses. If IPv4 is still used in the local area network (LAN), however, and the ISP can only provide one public-facing IPv6 address, the IPv4 LAN addresses are translated into the public facing IPv6 address using NAT64, a network address translation (NAT) mechanism. Some ISPs cannot provide their customers with public-facing IPv4 and IPv6 addresses, thus supporting dual-stack networking, because some ISPs have exhausted their globally routable IPv4 address pool. Meanwhile, ISP customers are still trying to reach IPv4 web servers and other destinations. A significant percentage of ISPs in all regional Internet registry (RIR) zones have obtained IPv6 address space. This includes many of the world's major ISPs and mobile network operators, such as Verizon Wireless, StarHub Cable, Chubu Telecommunications, Kabel Deutschland, Swisscom, T-Mobile, Internode and Telefonica. While some ISPs still allocate customers only IPv4 addresses, many ISPs allocate their customers only an IPv6 or dual-stack IPv4 and IPv6. ISPs report the share of IPv6 traffic from customers over their network to be anything between 20% and 40%, but by mid-2017 IPv6 traffic still only accounted for a fraction of total traffic at several large Internet exchange points (IXPs). AMS-IX reported it to be 2% and SeattleIX reported 7%. A 2017 survey found that many DSL customers that were served by a dual stack ISP did not request DNS servers to resolve fully qualified domain names into IPv6 addresses. The survey also found that the majority of traffic from IPv6-ready web-server resources were still requested and served over IPv4, mostly due to ISP customers that did not use the dual stack facility provided by their ISP and to a lesser extent due to customers of IPv4-only ISPs. Tunneling The technical basis for tunneling, or encapsulating IPv6 packets in IPv4 packets, is outlined in RFC 4213. When the Internet backbone was IPv4-only, one of the frequently used tunneling protocols was 6to4. Teredo tunneling was also frequently used for integrating IPv6 LANs with the IPv4 Internet backbone. Teredo is outlined in RFC 4380 and allows IPv6 local area networks to tunnel over IPv4 networks, by encapsulating IPv6 packets within UDP. The Teredo relay is an IPv6 router that mediates between a Teredo server and the native IPv6 network. It was expected that 6to4 and Teredo would be widely deployed until ISP networks would switch to native IPv6, but by 2014 Google Statistics showed that the use of both mechanisms had dropped to almost 0. IPv4-mapped IPv6 addresses Hybrid dual-stack IPv6/IPv4 implementations recognize a special class of addresses, the IPv4-mapped IPv6 addresses. These addresses are typically written with a 96-bit prefix in the standard IPv6 format, and the remaining 32 bits are written in the customary dot-decimal notation of IPv4. Addresses in this group consist of an 80-bit prefix of zeros, the next 16 bits are ones, and the remaining, least-significant 32 bits contain the IPv4 address. For example, represents the IPv4 address . A previous format, called "IPv4-compatible IPv6 address", was ; however, this method is deprecated. Because of the significant internal differences between IPv4 and IPv6 protocol stacks, some of the lower-level functionality available to programmers in the IPv6 stack does not work the same when used with IPv4-mapped addresses. Some common IPv6 stacks do not implement the IPv4-mapped address feature, either because the IPv6 and IPv4 stacks are separate implementations (e.g., Microsoft Windows 2000, XP, and Server 2003), or because of security concerns (OpenBSD). On these operating systems, a program must open a separate socket for each IP protocol it uses. On some systems, e.g., the Linux kernel, NetBSD, and FreeBSD, this feature is controlled by the socket option IPV6_V6ONLY. The address prefix is a class of IPv4-embedded IPv6 addresses for use in NAT64 transition methods. For example, represents the IPv4 address . Security A number of security implications may arise from the use of IPv6. Some of them may be related with the IPv6 protocols themselves, while others may be related with implementation flaws. Shadow networks The addition of nodes having IPv6 enabled by default by the software manufacturer, may result in the inadvertent creation of shadow networks, causing IPv6 traffic flowing into networks having only IPv4 security management in place. This may also occur with operating system upgrades, when the newer operating system enables IPv6 by default, while the older one did not. Failing to update the security infrastructure to accommodate IPv6 can lead to IPv6 traffic bypassing it. Shadow networks have occurred on business networks in which enterprises are replacing Windows XP systems that do not have an IPv6 stack enabled by default, with Windows 7 systems, that do. Some IPv6 stack implementors have therefore recommended disabling IPv4 mapped addresses and instead using a dual-stack network where supporting both IPv4 and IPv6 is necessary. IPv6 packet fragmentation Research has shown that the use of fragmentation can be leveraged to evade network security controls, similar to IPv4. As a result, requires that the first fragment of an IPv6 packet contains the entire IPv6 header chain, such that some very pathological fragmentation cases are forbidden. Additionally, as a result of research on the evasion of RA-Guard in , has deprecated the use of fragmentation with Neighbor Discovery, and discouraged the use of fragmentation with Secure Neighbor Discovery (SEND). Standardization through RFCs Working-group proposals Due to the anticipated global growth of the Internet, the Internet Engineering Task Force (IETF) in the early 1990s started an effort to develop a next generation IP protocol. By the beginning of 1992, several proposals appeared for an expanded Internet addressing system and by the end of 1992 the IETF announced a call for white papers. In September 1993, the IETF created a temporary, ad hoc IP Next Generation (IPng) area to deal specifically with such issues. The new area was led by Allison Mankin and Scott Bradner, and had a directorate with 15 engineers from diverse backgrounds for direction-setting and preliminary document review: The working-group members were J. Allard (Microsoft), Steve Bellovin (AT&T), Jim Bound (Digital Equipment Corporation), Ross Callon (Wellfleet), Brian Carpenter (CERN), Dave Clark (MIT), John Curran (NEARNET), Steve Deering (Xerox), Dino Farinacci (Cisco), Paul Francis (NTT), Eric Fleischmann (Boeing), Mark Knopper (Ameritech), Greg Minshall (Novell), Rob Ullmann (Lotus), and Lixia Zhang (Xerox). The Internet Engineering Task Force adopted the IPng model on 25 July 1994, with the formation of several IPng working groups. By 1996, a series of RFCs was released defining Internet Protocol version 6 (IPv6), starting with . (Version 5 was used by the experimental Internet Stream Protocol.) RFC standardization The first RFC to standardize IPv6 was the in 1995, which became obsoleted by in 1998. In July 2017 this RFC was superseded by , which elevated IPv6 to "Internet Standard" (the highest maturity level for IETF protocols). Deployment The 1993 introduction of Classless Inter-Domain Routing (CIDR) in the routing and IP address allocation for the Internet, and the extensive use of network address translation (NAT), delayed IPv4 address exhaustion to allow for IPv6 deployment, which began in the mid-2000s. Universities were among the early adopters of IPv6. Virginia Tech deployed IPv6 at a trial location in 2004 and later expanded IPv6 deployment across the campus network. By 2016, 82% of the traffic on their network used IPv6. Imperial College London began experimental IPv6 deployment in 2003 and by 2016 the IPv6 traffic on their networks averaged between 20% and 40%. A significant portion of this IPv6 traffic was generated through their high energy physics collaboration with CERN, which relies entirely on IPv6. The Domain Name System (DNS) has supported IPv6 since 2008. In the same year, IPv6 was first used in a major world event during the Beijing 2008 Summer Olympics. By 2011, all major operating systems in use on personal computers and server systems had production-quality IPv6 implementations. Cellular telephone systems presented a large deployment field for Internet Protocol devices as mobile telephone service made the transition from 3G to 4G technologies, in which voice is provisioned as a voice over IP (VoIP) service that would leverage IPv6 enhancements. In 2009, the US cellular operator Verizon released technical specifications for devices to operate on its "next-generation" networks. The specification mandated IPv6 operation according to the 3GPP Release 8 Specifications (March 2009), and deprecated IPv4 as an optional capability. The deployment of IPv6 in the Internet backbone continued. In 2018 only 25.3% of the about 54,000 autonomous systems advertised both IPv4 and IPv6 prefixes in the global Border Gateway Protocol (BGP) routing database. A further 243 networks advertised only an IPv6 prefix. Internet backbone transit networks offering IPv6 support existed in every country globally, except in parts of Africa, the Middle East and China. By mid-2018 some major European broadband ISPs had deployed IPv6 for the majority of their customers. Sky UK provided over 86% of its customers with IPv6, Deutsche Telekom had 56% deployment of IPv6, XS4ALL in the Netherlands had 73% deployment and in Belgium the broadband ISPs VOO and Telenet had 73% and 63% IPv6 deployment respectively. In the United States the broadband ISP Comcast had an IPv6 deployment of about 66%. In 2018 Comcast reported an estimated 36.1 million IPv6 users, while AT&T reported 22.3 million IPv6 users. See also China Next Generation Internet Comparison of IPv6 support in operating systems Comparison of IPv6 support in common applications DoD IPv6 product certification List of IPv6 tunnel brokers University of New Hampshire InterOperability Laboratory References External links IPv6 in the Linux Kernel by Rami Rosen An Introduction and Statistics about IPv6 by Google The standard document ratifying IPv6 – RFC 8200 document ratifying IPv6 as an Internet Standard Computer-related introductions in 1996 Internet layer protocols Network layer protocols
[ 0.09419940412044525, -0.05147355794906616, 0.17028337717056274, 0.10487306863069534, -0.0863942876458168, -0.24149394035339355, 0.15308979153633118, 0.09136249125003815, -0.631599485874176, -0.44829750061035156, -0.1982627809047699, -0.07012172788381577, -0.48028337955474854, 0.25950938463...
15319
https://en.wikipedia.org/wiki/Inca%20Empire
Inca Empire
The Inca Empire, also known as Incan Empire and the Inka Empire, and at the time known as the Realm of the Four Parts, was the largest empire in pre-Columbian America. The administrative, political and military center of the empire was in the city of Cusco. The Inca civilization arose from the Peruvian highlands sometime in the early 13th century. The Spanish began the conquest of the Inca Empire in 1532 and its last stronghold was conquered in 1572. From 1438 to 1533, the Incas incorporated a large portion of western South America, centered on the Andean Mountains, using conquest and peaceful assimilation, among other methods. At its largest, the empire joined Peru, western Ecuador, western and south central Bolivia, northwest Argentina, a large portion of what is today Chile, and the southwesternmost tip of Colombia into a state comparable to the historical empires of Eurasia. Its official language was Quechua. The Inca Empire was unique in that it lacked many of the features associated with civilization in the Old World. Anthropologist Gordon McEwan wrote that the Incas were able to construct "one of the greatest imperial states in human history" without the use of the wheel, draft animals, knowledge of iron or steel, or even a system of writing. Notable features of the Inca Empire included its monumental architecture, especially stonework, extensive road network reaching all corners of the empire, finely-woven textiles, use of knotted strings () for record keeping and communication, agricultural innovations and production in a difficult environment, and the organization and management fostered or imposed on its people and their labor. The Inca Empire functioned largely without money and without markets. Instead, exchange of goods and services was based on reciprocity between individuals and among individuals, groups, and Inca rulers. "Taxes" consisted of a labour obligation of a person to the Empire. The Inca rulers (who theoretically owned all the means of production) reciprocated by granting access to land and goods and providing food and drink in celebratory feasts for their subjects. Many local forms of worship persisted in the empire, most of them concerning local sacred Huacas, but the Inca leadership encouraged the sun worship of Inti – their sun god – and imposed its sovereignty above other cults such as that of Pachamama. The Incas considered their king, the Sapa Inca, to be the "son of the sun." The Incan economy has been described in contradictory ways by scholars; Darrell E. La Lone, in his work The Inca as a Nonmarket Economy, noted that the Inca economy has been described as "feudal, slave, [and] socialist", and added "here one may choose between socialist paradise or socialist tyranny." Etymology The Inca referred to their empire as Tawantinsuyu, "the four suyu". In Quechua, tawa is four and -ntin is a suffix naming a group, so that a tawantin is a quartet, a group of four things taken together, in this case the four suyu ("regions" or "provinces") whose corners met at the capital. The four suyu were: Chinchaysuyu (north), Antisuyu (east; the Amazon jungle), Qullasuyu (south) and Kuntisuyu (west). The name Tawantinsuyu was, therefore, a descriptive term indicating a union of provinces. The Spanish transliterated the name as Tahuatinsuyo or Tahuatinsuyu. The term Inka means "ruler" or "lord" in Quechua and was used to refer to the ruling class or the ruling family. The Incas were a very small percentage of the total population of the empire, probably numbering only 15,000 to 40,000, but ruling a population of around 10 million people. The Spanish adopted the term (transliterated as Inca in Spanish) as an ethnic term referring to all subjects of the empire rather than simply the ruling class. As such, the name Imperio inca ("Inca Empire") referred to the nation that they encountered and subsequently conquered. History Antecedents The Inca Empire was the last chapter of thousands of years of Andean civilizations. The Andean civilization is one of five civilizations in the world deemed by scholars to be "pristine", that is indigenous and not derivative from other civilizations. The Inca Empire was preceded by two large-scale empires in the Andes: the Tiwanaku (c. 300–1100 AD), based around Lake Titicaca, and the Wari or Huari (c. 600–1100 AD), centered near the city of Ayacucho. The Wari occupied the Cuzco area for about 400 years. Thus, many of the characteristics of the Inca Empire derived from earlier multi-ethnic and expansive Andean cultures. To those earlier civilizations may be owed some of the accomplishments cited for the Inca Empire: "thousands of miles of roads and dozens of large administrative centers with elaborate stone construction...terraced mountainsides and filled in valleys," and the production of "vast quantities of goods." Carl Troll has argued that the development of the Inca state in the central Andes was aided by conditions that allow for the elaboration of the staple food chuño. Chuño, which can be stored for long periods, is made of potato dried at the freezing temperatures that are common at nighttime in the southern Peruvian highlands. Such a link between the Inca state and chuño may be questioned, as other crops such as maize can also be dried with only sunlight. Troll also argued that llamas, the Incas' pack animal, can be found in their largest numbers in this very same region. The maximum extent of the Inca Empire roughly coincided with the distribution of llamas and alpacas, the only large domesticated animals in Pre-Hispanic America. As a third point Troll pointed out irrigation technology as advantageous to Inca state-building. While Troll theorized environmental influences on the Inca Empire, he opposed environmental determinism, arguing that culture lay at the core of the Inca civilization. Origin The Inca people were a pastoral tribe in the Cusco area around the 12th century. Peruvian oral history tells an origin story of three caves. The center cave at Tampu T'uqu (Tambo Tocco) was named Qhapaq T'uqu ("principal niche", also spelled Capac Tocco). The other caves were Maras T'uqu (Maras Tocco) and Sutiq T'uqu (Sutic Tocco). Four brothers and four sisters stepped out of the middle cave. They were: Ayar Manco, Ayar Cachi, Ayar Awqa (Ayar Auca) and Ayar Uchu; and Mama Ocllo, Mama Raua, Mama Huaco and Mama Qura (Mama Cora). Out of the side caves came the people who were to be the ancestors of all the Inca clans. Ayar Manco carried a magic staff made of the finest gold. Where this staff landed, the people would live. They traveled for a long time. On the way, Ayar Cachi boasted about his strength and power. His siblings tricked him into returning to the cave to get a sacred llama. When he went into the cave, they trapped him inside to get rid of him. Ayar Uchu decided to stay on the top of the cave to look over the Inca people. The minute he proclaimed that, he turned to stone. They built a shrine around the stone and it became a sacred object. Ayar Auca grew tired of all this and decided to travel alone. Only Ayar Manco and his four sisters remained. Finally, they reached Cusco. The staff sank into the ground. Before they arrived, Mama Ocllo had already borne Ayar Manco a child, Sinchi Roca. The people who were already living in Cusco fought hard to keep their land, but Mama Huaca was a good fighter. When the enemy attacked, she threw her bolas (several stones tied together that spun through the air when thrown) at a soldier (gualla) and killed him instantly. The other people became afraid and ran away. After that, Ayar Manco became known as Manco Cápac, the founder of the Inca. It is said that he and his sisters built the first Inca homes in the valley with their own hands. When the time came, Manco Cápac turned to stone like his brothers before him. His son, Sinchi Roca, became the second emperor of the Inca. Kingdom of Cusco Under the leadership of Manco Cápac, the Inca formed the small city-state Kingdom of Cusco (Quechua Qusqu', Qosqo). In 1438, they began a far-reaching expansion under the command of Sapa Inca (paramount leader) Pachacuti-Cusi Yupanqui, whose name meant "earth-shaker." The name of Pachacuti was given to him after he conquered the Tribe of Chancas (modern Apurímac). During his reign, he and his son Tupac Yupanqui brought much of the modern-day territory of Peru under Inca control. Reorganization and formation Pachacuti reorganized the kingdom of Cusco into the Tahuantinsuyu, which consisted of a central government with the Inca at its head and four provincial governments with strong leaders: Chinchasuyu (NW), Antisuyu (NE), Kuntisuyu (SW) and Qullasuyu (SE). Pachacuti is thought to have built Machu Picchu, either as a family home or summer retreat, although it may have been an agricultural station. Pachacuti sent spies to regions he wanted in his empire and they brought to him reports on political organization, military strength and wealth. He then sent messages to their leaders extolling the benefits of joining his empire, offering them presents of luxury goods such as high quality textiles and promising that they would be materially richer as his subjects. Most accepted the rule of the Inca as a fait accompli and acquiesced peacefully. Refusal to accept Inca rule resulted in military conquest. Following conquest the local rulers were executed. The ruler's children were brought to Cusco to learn about Inca administration systems, then return to rule their native lands. This allowed the Inca to indoctrinate them into the Inca nobility and, with luck, marry their daughters into families at various corners of the empire. Expansion and consolidation Traditionally the son of the Inca ruler led the army. Pachacuti's son Túpac Inca Yupanqui began conquests to the north in 1463 and continued them as Inca ruler after Pachacuti's death in 1471. Túpac Inca's most important conquest was the Kingdom of Chimor, the Inca's only serious rival for the Peruvian coast. Túpac Inca's empire then stretched north into modern-day Ecuador and Colombia. Túpac Inca's son Huayna Cápac added a small portion of land to the north in modern-day Ecuador. At its height, the Inca Empire included Peru, western and south central Bolivia, southwest Ecuador and a large portion of what is today Chile, north of the Maule River. Traditional historiography claims the advance south halted after the Battle of the Maule where they met determined resistance from the Mapuche. This view is challenged by historian Osvaldo Silva who argues instead that it was the social and political framework of the Mapuche that posed the main difficulty in imposing imperial rule. Silva does accept that the battle of the Maule was a stalemate, but argues the Incas lacked incentives for conquest they had had when fighting more complex societies such as the Chimú Empire. Silva also disputes the date given by traditional historiography for the battle: the late 15th century during the reign of Topa Inca Yupanqui (1471–93). Instead, he places it in 1532 during the Inca Civil War. Nevertheless, Silva agrees on the claim that the bulk of the Incan conquests were made during the late 15th century. At the time of the Incan Civil War an Inca army was, according to Diego de Rosales, subduing a revolt among the Diaguitas of Copiapó and Coquimbo. The empire's push into the Amazon Basin near the Chinchipe River was stopped by the Shuar in 1527. The empire extended into corners of Argentina and Colombia. However, most of the southern portion of the Inca empire, the portion denominated as Qullasuyu, was located in the Altiplano. The Inca Empire was an amalgamation of languages, cultures and peoples. The components of the empire were not all uniformly loyal, nor were the local cultures all fully integrated. The Inca empire as a whole had an economy based on exchange and taxation of luxury goods and labour. The following quote describes a method of taxation: For as is well known to all, not a single village of the highlands or the plains failed to pay the tribute levied on it by those who were in charge of these matters. There were even provinces where, when the natives alleged that they were unable to pay their tribute, the Inca ordered that each inhabitant should be obliged to turn in every four months a large quill full of live lice, which was the Inca's way of teaching and accustoming them to pay tribute. Inca Civil War and Spanish conquest Spanish conquistadors led by Francisco Pizarro and his brothers explored south from what is today Panama, reaching Inca territory by 1526. It was clear that they had reached a wealthy land with prospects of great treasure, and after another expedition in 1529 Pizarro traveled to Spain and received royal approval to conquer the region and be its viceroy. This approval was received as detailed in the following quote: "In July 1529 the Queen of Spain signed a charter allowing Pizarro to conquer the Incas. Pizarro was named governor and captain of all conquests in Peru, or New Castile, as the Spanish now called the land." When the conquistadors returned to Peru in 1532, a war of succession between the sons of Sapa Inca Huayna Capac, Huáscar and Atahualpa, and unrest among newly conquered territories weakened the empire. Perhaps more importantly, smallpox, influenza, typhus and measles had spread from Central America. The first epidemic of European disease in the Inca Empire was probably in the 1520s, killing Huayna Capac, his designated heir, and an unknown, probably large, number of other Incan subjects. The forces led by Pizarro consisted of 168 men, one cannon, and 27 horses. Conquistadors ported lances, arquebuses, steel armor and long swords. In contrast, the Inca used weapons made out of wood, stone, copper and bronze, while using an Alpaca fiber based armor, putting them at significant technological disadvantage—none of their weapons could pierce the Spanish steel armor. In addition, due to the absence of horses in Peru, the Inca did not develop tactics to fight cavalry. However, the Inca were still effective warriors, being able to successfully fight the Mapuche, which later would strategically defeat the Spanish as they expanded further south. The first engagement between the Inca and the Spanish was the Battle of Puná, near present-day Guayaquil, Ecuador, on the Pacific Coast; Pizarro then founded the city of Piura in July 1532. Hernando de Soto was sent inland to explore the interior and returned with an invitation to meet the Inca, Atahualpa, who had defeated his brother in the civil war and was resting at Cajamarca with his army of 80,000 troops, that were at the moment armed only with hunting tools (knives and lassos for hunting llamas). Pizarro and some of his men, most notably a friar named Vincente de Valverde, met with the Inca, who had brought only a small retinue. The Inca offered them ceremonial chicha in a golden cup, which the Spanish rejected. The Spanish interpreter, Friar Vincente, read the "Requerimiento" that demanded that he and his empire accept the rule of King Charles I of Spain and convert to Christianity. Atahualpa dismissed the message and asked them to leave. After this, the Spanish began their attack against the mostly unarmed Inca, captured Atahualpa as hostage, and forced the Inca to collaborate. Atahualpa offered the Spaniards enough gold to fill the room he was imprisoned in and twice that amount of silver. The Inca fulfilled this ransom, but Pizarro deceived them, refusing to release the Inca afterwards. During Atahualpa's imprisonment Huáscar was assassinated elsewhere. The Spaniards maintained that this was at Atahualpa's orders; this was used as one of the charges against Atahualpa when the Spaniards finally executed him, in August 1533. Although "defeat" often implies an unwanted loss in battle, many of the diverse ethnic groups ruled by the Inca "welcomed the Spanish invaders as liberators and willingly settled down with them to share rule of Andean farmers and miners." Many regional leaders, called Kurakas, continued to serve the Spanish overlords, called encomenderos, as they had served the Inca overlords. Other than efforts to spread the religion of Christianity, the Spanish benefited from and made little effort to change the society and culture of the former Inca Empire until the rule of Francisco de Toledo as viceroy from 1569 to 1581. Last Incas The Spanish installed Atahualpa's brother Manco Inca Yupanqui in power; for some time Manco cooperated with the Spanish while they fought to put down resistance in the north. Meanwhile, an associate of Pizarro, Diego de Almagro, attempted to claim Cusco. Manco tried to use this intra-Spanish feud to his advantage, recapturing Cusco in 1536, but the Spanish retook the city afterwards. Manco Inca then retreated to the mountains of Vilcabamba and established the small Neo-Inca State, where he and his successors ruled for another 36 years, sometimes raiding the Spanish or inciting revolts against them. In 1572 the last Inca stronghold was conquered and the last ruler, Túpac Amaru, Manco's son, was captured and executed. This ended resistance to the Spanish conquest under the political authority of the Inca state. After the fall of the Inca Empire many aspects of Inca culture were systematically destroyed, including their sophisticated farming system, known as the vertical archipelago model of agriculture. Spanish colonial officials used the Inca mita corvée labor system for colonial aims, sometimes brutally. One member of each family was forced to work in the gold and silver mines, the foremost of which was the titanic silver mine at Potosí. When a family member died, which would usually happen within a year or two, the family was required to send a replacement. The effects of smallpox on the Inca empire were even more devastating. Beginning in Colombia, smallpox spread rapidly before the Spanish invaders first arrived in the empire. The spread was probably aided by the efficient Inca road system. Smallpox was only the first epidemic. Other diseases, including a probable Typhus outbreak in 1546, influenza and smallpox together in 1558, smallpox again in 1589, diphtheria in 1614, and measles in 1618, all ravaged the Inca people. There would be periodic attempts by indigenous leaders to expel the Spanish colonists and re-create the Inca Empire until the late 18th century. See Juan Santos Atahualpa and Túpac Amaru II. Society Population The number of people inhabiting Tawantinsuyu at its peak is uncertain, with estimates ranging from 4–37 million. Most population estimates are in the range of 6 to 14 million. In spite of the fact that the Inca kept excellent census records using their quipus, knowledge of how to read them was lost as almost all fell into disuse and disintegrated over time or were destroyed by the Spaniards. Languages The empire was extremely linguistically diverse. Some of the most important languages were Quechua, Aymara, Puquina and Mochica, respectively mainly spoken in the Central Andes, the Altiplano or (Qullasuyu), the south Peruvian coast (Kuntisuyu), and the area of the north Peruvian coast (Chinchaysuyu) around Chan Chan, today Trujillo. Other languages included Quignam, Jaqaru, Leco, Uru-Chipaya languages, Kunza, Humahuaca, Cacán, Mapudungun, Culle, Chachapoya, Catacao languages, Manta, and Barbacoan languages, as well as numerous Amazonian languages on the frontier regions. The exact linguistic topography of the pre-Columbian and early colonial Andes remains incompletely understood, owing to the extinction of several languages and the loss of historical records. In order to manage this diversity, the Inca lords promoted the usage of Quechua, especially the variety of what is now Lima as the Qhapaq Runasimi ("great language of the people"), or the official language/lingua franca. Defined by mutual intelligibility, Quechua is actually a family of languages rather than one single language, parallel to the Romance or Slavic languages in Europe. Most communities within the empire, even those resistant to Inca rule, learned to speak a variety of Quechua (forming new regional varieties with distinct phonetics) in order to communicate with the Inca lords and mitma colonists, as well as the wider integrating society, but largely retained their native languages as well. The Incas also had their own ethnic language, referred to as Qhapaq simi ("royal language"), which is thought to have been closely related to or a dialect of Puquina. The split between Qhapaq simi and Qhapaq Runasimi exemplifies the larger split between hatun and hunin (high and low) society in general. There are several common misconceptions about the history of Quechua, as it is frequently identified as the "Inca language". Quechua did not originate with the Incas, had been a lingua franca in multiple areas before the Inca expansions, was diverse before the rise of the Incas, and it was not the native or original language of the Incas. However, the Incas left an impressive linguistic legacy, in that they introduced Quechua to many areas where it is still widely spoken today, including Ecuador, southern Bolivia, southern Colombia, and parts of the Amazon basin. The Spanish conquerors continued the official usage of Quechua during the early colonial period, and transformed it into a literary language. The Incas were not known to develop a written form of language; however, they visually recorded narratives through paintings on vases and cups (qirus). These paintings are usually accompanied by geometric patterns known as toqapu, which are also found in textiles. Researchers have speculated that toqapu patterns could have served as a form of written communication (e.g.: heraldry, or glyphs), however this remains unclear. The Incas also kept records by using quipus. Age and defining gender The high infant mortality rates that plagued the Inca Empire caused all newborn infants to be given the term 'wawa' when they were born. Most families did not invest very much into their child until they reached the age of two or three years old. Once the child reached the age of three, a "coming of age" ceremony occurred, called the rutuchikuy. For the Incas, this ceremony indicated that the child had entered the stage of "ignorance". During this ceremony, the family would invite all relatives to their house for food and dance, and then each member of the family would receive a lock of hair from the child. After each family member had received a lock, the father would shave the child's head. This stage of life was categorized by a stage of "ignorance, inexperience, and lack of reason, a condition that the child would overcome with time." For Incan society, in order to advance from the stage of ignorance to development the child must learn the roles associated with their gender. The next important ritual was to celebrate the maturity of a child. Unlike the coming of age ceremony, the celebration of maturity signified the child's sexual potency. This celebration of puberty was called warachikuy for boys and qikuchikuy for girls. The warachikuy ceremony included dancing, fasting, tasks to display strength, and family ceremonies. The boy would also be given new clothes and taught how to act as an unmarried man. The qikuchikuy signified the onset of menstruation, upon which the girl would go into the forest alone and return only once the bleeding had ended. In the forest she would fast, and, once returned, the girl would be given a new name, adult clothing, and advice. This "folly" stage of life was the time young adults were allowed to have sex without being a parent. Between the ages of 20 and 30, people were considered young adults, "ripe for serious thought and labor." Young adults were able to retain their youthful status by living at home and assisting in their home community. Young adults only reached full maturity and independence once they had married. At the end of life, the terms for men and women denote loss of sexual vitality and humanity. Specifically, the "decrepitude" stage signifies the loss of mental well-being and further physical decline. Marriage In the Incan Empire, the age of marriage differed for men and women: men typically married at the age of 20, while women usually got married about four years earlier at the age of 16. Men who were highly ranked in society could have multiple wives, but those lower in the ranks could only take a single wife. Marriages were typically within classes and resembled a more business-like agreement. Once married, the women were expected to cook, collect food and watch over the children and livestock. Girls and mothers would also work around the house to keep it orderly to please the public inspectors. These duties remained the same even after wives became pregnant and with the added responsibility of praying and making offerings to Kanopa, who was the god of pregnancy. It was typical for marriages to begin on a trial basis with both men and women having a say in the longevity of the marriage. If the man felt that it wouldn't work out or if the woman wanted to return to her parents' home the marriage would end. Once the marriage was final, the only way the two could be divorced was if they did not have a child together. Marriage within the Empire was crucial for survival. A family was considered disadvantaged if there was not a married couple at the center because everyday life centered around the balance of male and female tasks. Gender roles According to some historians, such as Terence N. D'Altroy, male and female roles were considered equal in Inca society. The "indigenous cultures saw the two genders as complementary parts of a whole." In other words, there was not a hierarchical structure in the domestic sphere for the Incas. Within the domestic sphere, women came to be known as weavers, although there is significant evidence to suggest that this gender role did not appear until colonizing Spaniards realized women's productive talents in this sphere and used it to their economic advantage. There is evidence to suggest that both men and women contributed equally to the weaving tasks in pre-Hispanic Andean culture. Women's everyday tasks included: spinning, watching the children, weaving cloth, cooking, brewing chichi, preparing fields for cultivation, planting seeds, bearing children, harvesting, weeding, hoeing, herding, and carrying water. Men on the other hand, "weeded, plowed, participated in combat, helped in the harvest, carried firewood, built houses, herded llama and alpaca, and spun and wove when necessary". This relationship between the genders may have been complementary. Unsurprisingly, onlooking Spaniards believed women were treated like slaves, because women did not work in Spanish society to the same extent, and certainly did not work in fields. Women were sometimes allowed to own land and herds because inheritance was passed down from both the mother's and father's side of the family. Kinship within the Inca society followed a parallel line of descent. In other words, women ascended from women and men ascended from men. Due to the parallel descent, a woman had access to land and other necessities through her mother. Religion Inca myths were transmitted orally until early Spanish colonists recorded them; however, some scholars claim that they were recorded on quipus, Andean knotted string records. The Inca believed in reincarnation. After death, the passage to the next world was fraught with difficulties. The spirit of the dead, camaquen, would need to follow a long road and during the trip the assistance of a black dog that could see in the dark was required. Most Incas imagined the after world to be like an earthly paradise with flower-covered fields and snow-capped mountains. It was important to the Inca that they not die as a result of burning or that the body of the deceased not be incinerated. Burning would cause their vital force to disappear and threaten their passage to the after world. The Inca nobility practiced cranial deformation. They wrapped tight cloth straps around the heads of newborns to shape their soft skulls into a more conical form, thus distinguishing the nobility from other social classes. The Incas made human sacrifices. As many as 4,000 servants, court officials, favorites and concubines were killed upon the death of the Inca Huayna Capac in 1527. The Incas performed child sacrifices around important events, such as the death of the Sapa Inca or during a famine. These sacrifices were known as qhapaq hucha. Deities The Incas were polytheists who worshipped many gods. These included: Viracocha (also Pachacamac) – Created all living things Apu Illapu – Rain God, prayed to when they need rain Ayar Cachi – Hot-tempered God, causes earthquakes Illapa – Goddess of lightning and thunder (also Yakumama water goddess) Inti – sun god and patron deity of the holy city of Cusco (home of the sun) Kuychi – Rainbow God, connected with fertility Mama Killa – Wife of Inti, called Moon Mother Mama Occlo – Wisdom to civilize the people, taught women to weave cloth and build houses Manco Cápac – known for his courage and sent to earth to become first king of the Incas. Taught people how to grow plants, make weapons, work together, share resources and worship the Gods Pachamama – The Goddess of earth and wife of Viracocha. People give her offerings of coca leaves and beer and pray to her for major agricultural occasions Quchamama – Goddess of the sea Sachamama – Means Mother Tree, goddess in the shape of a snake with two heads Yakumama – Means mother Water. Represented as a snake. When she came to earth she transformed into a great river (also Illapa). Economy The Inca Empire employed central planning. The Inca Empire traded with outside regions, although they did not operate a substantial internal market economy. While axe-monies were used along the northern coast, presumably by the provincial mindaláe trading class, most households in the empire lived in a traditional economy in which households were required to pay taxes, usually in the form of the mit'a corvée labor, and military obligations, though barter (or trueque) was present in some areas. In return, the state provided security, food in times of hardship through the supply of emergency resources, agricultural projects (e.g. aqueducts and terraces) to increase productivity, and occasional feasts hosted by Inca officials for their subjects. While mit'a was used by the state to obtain labor, individual villages had a pre-inca system of communal work, known as mink'a. This system survives to the modern day, known as mink'a or faena. The economy rested on the material foundations of the vertical archipelago, a system of ecological complementarity in accessing resources and the cultural foundation of ayni, or reciprocal exchange. Government Beliefs The Sapa Inca was conceptualized as divine and was effectively head of the state religion. The Willaq Umu (or Chief Priest) was second to the emperor. Local religious traditions continued and in some cases such as the Oracle at Pachacamac on the Peruvian coast, were officially venerated. Following Pachacuti, the Sapa Inca claimed descent from Inti, who placed a high value on imperial blood; by the end of the empire, it was common to incestuously wed brother and sister. He was "son of the sun," and his people the intip churin, or "children of the sun," and both his right to rule and mission to conquer derived from his holy ancestor. The Sapa Inca also presided over ideologically important festivals, notably during the Inti Raymi, or "Sunfest" attended by soldiers, mummified rulers, nobles, clerics and the general population of Cusco beginning on the June solstice and culminating nine days later with the ritual breaking of the earth using a foot plow by the Inca. Moreover, Cusco was considered cosmologically central, loaded as it was with huacas and radiating ceque lines as the geographic center of the Four-Quarters; Inca Garcilaso de la Vega called it "the navel of the universe". Organization of the empire The Inca Empire was a federalist system consisting of a central government with the Inca at its head and four-quarters, or suyu: Chinchay Suyu (NW), Anti Suyu (NE), Kunti Suyu (SW) and Qulla Suyu (SE). The four corners of these quarters met at the center, Cusco. These suyu were likely created around 1460 during the reign of Pachacuti before the empire reached its largest territorial extent. At the time the suyu were established they were roughly of equal size and only later changed their proportions as the empire expanded north and south along the Andes. Cusco was likely not organized as a wamani, or province. Rather, it was probably somewhat akin to a modern federal district, like Washington, DC or Mexico City. The city sat at the center of the four suyu and served as the preeminent center of politics and religion. While Cusco was essentially governed by the Sapa Inca, his relatives and the royal panaqa lineages, each suyu was governed by an Apu, a term of esteem used for men of high status and for venerated mountains. Both Cusco as a district and the four suyu as administrative regions were grouped into upper hanan and lower hurin divisions. As the Inca did not have written records, it is impossible to exhaustively list the constituent wamani. However, colonial records allow us to reconstruct a partial list. There were likely more than 86 wamani, with more than 48 in the highlands and more than 38 on the coast. Suyu The most populous suyu was Chinchaysuyu, which encompassed the former Chimu empire and much of the northern Andes. At its largest extent, it extended through much of modern Ecuador and into modern Colombia. The largest suyu by area was Qullasuyu, named after the Aymara-speaking Qulla people. It encompassed the Bolivian Altiplano and much of the southern Andes, reaching Argentina and as far south as the Maipo or Maule river in Central Chile. Historian José Bengoa singled out Quillota as likely being the foremost Inca settlement in Chile. The second smallest suyu, Antisuyu, was northwest of Cusco in the high Andes. Its name is the root of the word "Andes." Kuntisuyu was the smallest suyu, located along the southern coast of modern Peru, extending into the highlands towards Cusco. Laws The Inca state had no separate judiciary or codified laws. Customs, expectations and traditional local power holders governed behavior. The state had legal force, such as through tokoyrikoq (lit. "he who sees all"), or inspectors. The highest such inspector, typically a blood relative to the Sapa Inca, acted independently of the conventional hierarchy, providing a point of view for the Sapa Inca free of bureaucratic influence. The Inca had three moral precepts that governed their behavior: Ama sua: Do not steal Ama llulla: Do not lie Ama quella: Do not be lazy Administration Colonial sources are not entirely clear or in agreement about Inca government structure, such as exact duties and functions of government positions. But the basic structure can be broadly described. The top was the Sapa Inca. Below that may have been the Willaq Umu, literally the "priest who recounts", the High Priest of the Sun. However, beneath the Sapa Inca also sat the Inkap rantin, who was a confidant and assistant to the Sapa Inca, perhaps similar to a Prime Minister. Starting with Topa Inca Yupanqui, a "Council of the Realm" was composed of 16 nobles: 2 from hanan Cusco; 2 from hurin Cusco; 4 from Chinchaysuyu; 2 from Cuntisuyu; 4 from Collasuyu; and 2 from Antisuyu. This weighting of representation balanced the hanan and hurin divisions of the empire, both within Cusco and within the Quarters (hanan suyukuna and hurin suyukuna). While provincial bureaucracy and government varied greatly, the basic organization was decimal. Taxpayers – male heads of household of a certain age range – were organized into corvée labor units (often doubling as military units) that formed the state's muscle as part of mit'a service. Each unit of more than 100 tax-payers were headed by a kuraka, while smaller units were headed by a kamayuq, a lower, non-hereditary status. However, while kuraka status was hereditary and typically served for life, the position of a kuraka in the hierarchy was subject to change based on the privileges of superiors in the hierarchy; a pachaka kuraka could be appointed to the position by a waranqa kuraka. Furthermore, one kuraka in each decimal level could serve as the head of one of the nine groups at a lower level, so that a pachaka kuraka might also be a waranqa kuraka, in effect directly responsible for one unit of 100 tax-payers and less directly responsible for nine other such units. Arts and technology Monumental architecture Architecture was the most important of the Incan arts, with textiles reflecting architectural motifs. The most notable example is Machu Picchu, which was constructed by Inca engineers. The prime Inca structures were made of stone blocks that fit together so well that a knife could not be fitted through the stonework. These constructs have survived for centuries, with no use of mortar to sustain them. This process was first used on a large scale by the Pucara (c. 300 BC–AD 300) peoples to the south in Lake Titicaca and later in the city of Tiwanaku (c. AD 400–1100) in present-day Bolivia. The rocks were sculpted to fit together exactly by repeatedly lowering a rock onto another and carving away any sections on the lower rock where the dust was compressed. The tight fit and the concavity on the lower rocks made them extraordinarily stable, despite the ongoing challenge of earthquakes and volcanic activity. Measures, calendrics and mathematics Physical measures used by the Inca were based on human body parts. Units included fingers, the distance from thumb to forefinger, palms, cubits and wingspans. The most basic distance unit was thatkiy or thatki, or one pace. The next largest unit was reported by Cobo to be the topo or tupu, measuring 6,000 thatkiys, or about ; careful study has shown that a range of is likely. Next was the wamani, composed of 30 topos (roughly ). To measure area, 25 by 50 wingspans were used, reckoned in topos (roughly ). It seems likely that distance was often interpreted as one day's walk; the distance between tambo way-stations varies widely in terms of distance, but far less in terms of time to walk that distance. Inca calendars were strongly tied to astronomy. Inca astronomers understood equinoxes, solstices and zenith passages, along with the Venus cycle. They could not, however, predict eclipses. The Inca calendar was essentially lunisolar, as two calendars were maintained in parallel, one solar and one lunar. As 12 lunar months fall 11 days short of a full 365-day solar year, those in charge of the calendar had to adjust every winter solstice. Each lunar month was marked with festivals and rituals. Apparently, the days of the week were not named and days were not grouped into weeks. Similarly, months were not grouped into seasons. Time during a day was not measured in hours or minutes, but in terms of how far the sun had travelled or in how long it had taken to perform a task. The sophistication of Inca administration, calendrics and engineering required facility with numbers. Numerical information was stored in the knots of quipu strings, allowing for compact storage of large numbers. These numbers were stored in base-10 digits, the same base used by the Quechua language and in administrative and military units. These numbers, stored in quipu, could be calculated on yupanas, grids with squares of positionally varying mathematical values, perhaps functioning as an abacus. Calculation was facilitated by moving piles of tokens, seeds or pebbles between compartments of the yupana. It is likely that Inca mathematics at least allowed division of integers into integers or fractions and multiplication of integers and fractions. According to mid-17th-century Jesuit chronicler Bernabé Cobo, the Inca designated officials to perform accounting-related tasks. These officials were called quipo camayos. Study of khipu sample VA 42527 (Museum für Völkerkunde, Berlin) revealed that the numbers arranged in calendrically significant patterns were used for agricultural purposes in the "farm account books" kept by the khipukamayuq (accountant or warehouse keeper) to facilitate the closing of accounting books. Tunics Tunics were created by skilled Incan textile-makers as a piece of warm clothing, but they also symbolized cultural and political status and power. Cumbi was the fine, tapestry-woven woolen cloth that was produced and necessary for the creation of tunics. Cumbi was produced by specially-appointed women and men. Generally, textile-making was practiced by both men and women. As emphasized by certain historians, only with European conquest was it deemed that women would become the primary weavers in society, as opposed to Incan society where specialty textiles were produced by men and women equally. Complex patterns and designs were meant to convey information about order in Andean society as well as the Universe. Tunics could also symbolize one's relationship to ancient rulers or important ancestors. These textiles were frequently designed to represent the physical order of a society, for example, the flow of tribute within an empire. Many tunics have a "checkerboard effect" which is known as the collcapata. According to historians Kenneth Mills, William B. Taylor, and Sandra Lauderdale Graham, the collcapata patterns "seem to have expressed concepts of commonality, and, ultimately, unity of all ranks of people, representing a careful kind of foundation upon which the structure of Inkaic universalism was built." Rulers wore various tunics throughout the year, switching them out for different occasions and feasts. The symbols present within the tunics suggest the importance of "pictographic expression" within Inkan and other Andean societies far before the iconographies of the Spanish Christians. Uncu Uncu was a men's garment similar to a tunic. It was an upper-body garment of knee-length; Royals wore it with a mantle cloth called ''yacolla.'' Ceramics, precious metals and textiles Ceramics were painted using the polychrome technique portraying numerous motifs including animals, birds, waves, felines (popular in the Chavin culture) and geometric patterns found in the Nazca style of ceramics. In a culture without a written language, ceramics portrayed the basic scenes of everyday life, including the smelting of metals, relationships and scenes of tribal warfare. The most distinctive Inca ceramic objects are the Cusco bottles or "aryballos". Many of these pieces are on display in Lima in the Larco Archaeological Museum and the National Museum of Archaeology, Anthropology and History. Almost all of the gold and silver work of the Incan empire was melted down by the conquistadors, and shipped back to Spain. Communication and medicine The Inca recorded information on assemblages of knotted strings, known as Quipu, although they can no longer be decoded. Originally it was thought that Quipu were used only as mnemonic devices or to record numerical data. Quipus are also believed to record history and literature. The Inca made many discoveries in medicine. They performed successful skull surgery, by cutting holes in the skull to alleviate fluid buildup and inflammation caused by head wounds. Many skull surgeries performed by Inca surgeons were successful. Survival rates were 80–90%, compared to about 30% before Inca times. Coca The Incas revered the coca plant as sacred/magical. Its leaves were used in moderate amounts to lessen hunger and pain during work, but were mostly used for religious and health purposes. The Spaniards took advantage of the effects of chewing coca leaves. The Chasqui, messengers who ran throughout the empire to deliver messages, chewed coca leaves for extra energy. Coca leaves were also used as an anaesthetic during surgeries. Weapons, armor and warfare The Inca army was the most powerful at that time, because any ordinary villager or farmer could be recruited as a soldier as part of the mit'a system of mandatory public service. Every able bodied male Inca of fighting age had to take part in war in some capacity at least once and to prepare for warfare again when needed. By the time the empire reached its largest size, every section of the empire contributed in setting up an army for war. The Incas had no iron or steel and their weapons were not much more effective than those of their opponents so they often defeated opponents by sheer force of numbers, or else by persuading them to surrender beforehand by offering generous terms. Inca weaponry included "hardwood spears launched using throwers, arrows, javelins, slings, the bolas, clubs, and maces with star-shaped heads made of copper or bronze." Rolling rocks downhill onto the enemy was a common strategy, taking advantage of the hilly terrain. Fighting was sometimes accompanied by drums and trumpets made of wood, shell or bone. Armor included: Helmets made of wood, cane, or animal skin, often lined with copper or bronze; some were adorned with feathers Round or square shields made from wood or hide Cloth tunics padded with cotton and small wooden planks to protect the spine Ceremonial metal breastplates, of copper, silver, and gold, have been found in burial sites, some of which may have also been used in battle. Roads allowed quick movement (on foot) for the Inca army and shelters called tambo and storage silos called qullqas were built one day's travelling distance from each other, so that an army on campaign could always be fed and rested. This can be seen in names of ruins such as Ollantay Tambo, or My Lord's Storehouse. These were set up so the Inca and his entourage would always have supplies (and possibly shelter) ready as they traveled. Banner of the Inca Chronicles and references from the 16th and 17th centuries support the idea of a banner. However, it represented the Inca (emperor), not the empire. Francisco López de Jerez wrote in 1534: () Chronicler Bernabé Cobo wrote: ()-Bernabé Cobo, Historia del Nuevo Mundo (1653) Guaman Poma's 1615 book, El primer nueva corónica y buen gobierno, shows numerous line drawings of Inca flags. In his 1847 book A History of the Conquest of Peru, "William H. Prescott ... says that in the Inca army each company had its particular banner and that the imperial standard, high above all, displayed the glittering device of the rainbow, the armorial ensign of the Incas." A 1917 world flags book says the Inca "heir-apparent ... was entitled to display the royal standard of the rainbow in his military campaigns." In modern times the rainbow flag has been wrongly associated with the Tawantinsuyu and displayed as a symbol of Inca heritage by some groups in Peru and Bolivia. The city of Cusco also flies the Rainbow Flag, but as an official flag of the city. The Peruvian president Alejandro Toledo (2001–2006) flew the Rainbow Flag in Lima's presidential palace. However, according to Peruvian historiography, the Inca Empire never had a flag. Peruvian historian María Rostworowski said, "I bet my life, the Inca never had that flag, it never existed, no chronicler mentioned it". Also, to the Peruvian newspaper El Comercio, the flag dates to the first decades of the 20th century, and even the Congress of the Republic of Peru has determined that flag is a fake by citing the conclusion of National Academy of Peruvian History: "The official use of the wrongly called 'Tawantinsuyu flag' is a mistake. In the Pre-Hispanic Andean World there did not exist the concept of a flag, it did not belong to their historic context". National Academy of Peruvian History Adaptations to altitude The people of the Andes, including the Incas, were able to adapt to high-altitude living through successful acclimatization, which is characterized by increasing oxygen supply to the blood tissues. For the native living in the Andean highlands, this was achieved through the development of a larger lung capacity, and an increase in red blood cell counts, hemoglobin concentration, and capillary beds. Compared to other humans, the Andeans had slower heart rates, almost one-third larger lung capacity, about 2 L (4 pints) more blood volume and double the amount of hemoglobin, which transfers oxygen from the lungs to the rest of the body. While the Conquistadors may have been taller, the Inca had the advantage of coping with the extraordinary altitude. The Tibetans in Asia living in the Himalayas are also adapted to living in high-altitudes, although the adaptation is different from that of the Andeans. See also Incan archeological sites Choquequirao Cojitambo El Fuerte de Samaipata Huánuco Pampa Huchuy Qosqo Inca-Caranqui Llaqtapata Moray Ollantaytambo Oroncota Pambamarca Fortress Complex Písac Pukara of La Compañia Quispiguanca Rumicucho Tampukancha Tumebamba Vitcos Incan-related Aclla, the "chosen women" Amauta, Inca teachers Amazonas before the Inca Empire Anden, agricultural terrace Inca army Inca cuisine Incan aqueducts Felipe Guaman Poma de Ayala Paria, Bolivia Religion in the Inca Empire Tampukancha, Inca religious site Society of the Spanish-Americans in the Spanish Colonial Americas General Ancient Peru Cultural periods of Peru Population history of indigenous peoples of the Americas History of Peru History of smallpox § Epidemics in the Americas Muisca Confederation Notes References Bibliography External links "Guaman Poma – El Primer Nueva Corónica Y Buen Gobierno" – A high-quality digital version of the Corónica, scanned from the original manuscript. Conquest nts.html Inca Land by Hiram Bingham (published 1912–1922). Inca Artifacts, Peru and Machu Picchu 360-degree movies of inca artifacts and Peruvian landscapes. Ancient Civilizations – Inca "Ice Treasures of the Inca" National Geographic site. "The Sacred Hymns of Pachacutec," poetry of an Inca emperor. Incan Religion Engineering in the Andes Mountains, lecture on Inca suspension bridges A Map and Timeline of Inca Empire events Ancient Peruvian art: contributions to the archaeology of the empire of the Incas, a four volume work from 1902 (fully available online as PDF) Indigenous culture of the Americas Andean civilizations Post-Classic period in the Americas 16th-century disestablishments in the Inca civilization States and territories established in 1438 History of Ecuador History of Peru Inca states History of indigenous peoples of the Americas 15th century in South America 16th century in South America Former empires in the Americas 15th-century establishments in the Inca civilization Former countries
[ -0.2929949462413788, -0.015206653624773026, -0.24319937825202942, 0.2660922110080719, -0.27056804299354553, 0.1288129985332489, 0.32293590903282166, 0.8858679533004761, -0.7140640616416931, 0.02546641230583191, 0.4637896418571472, -0.31733447313308716, -0.25160136818885803, 0.5166701674461...
15321
https://en.wikipedia.org/wiki/Inca%20%28disambiguation%29
Inca (disambiguation)
The Inca Empire was the largest empire in pre-Columbian America. Inca, Inka, or İncə may also refer to: Inca civilization, centered in what is now Peru Inca people, the people of the Inca Empire Quechua people, the people of the Inca civilization Inca language, the Quechuan languages Sapa Inca or Inka, the main ruler of the Inca Empire People Glacinei Martins or Inca (born 1973), Brazilian footballer Edwin Valero or El Inca (1981-2010), Venezuela boxer Garcilaso de la Vega (chronicler) or El Inca (1539–1616), Spanish Peruvian writer INCA (singer) (born 1985), French singer Inka, nom de guerre of Danuta Siedzikówna (1928–1946), Polish national heroine, medical orderly in the Home Army Inka Bause (born 1968), German singer, TV presenter and actress Inka Essenhigh (born 1969), American painter Inka Friedrich (born 1965), German actress Inka Grings (born 1978), German footballer Inka Parei (born 1967), German writer Inka Wesely (born 1991), German footballer Places Inka (La Paz), a mountain in the La Paz Department, Bolivia İncə, Goychay, Azerbaijan İncə, Shaki, Azerbaijan Inca, Spain, a town on the island of Majorca in the Mediterranean Sea Transportation Los Incas - Parque Chas (Buenos Aires Underground), metro subway station SEAT Inca, a panel van Industri Kereta Api (INKA), a rolling stock manufacturer in Indonesia Ships Inca (schooner), the first five-masted schooner built on the United States western coast, in 1896 , U.S. Navy ship name USS Inca (1898), a screw steamer USS Inca (1911), a steam ferry USS Inca (SP-1212), a motor boat built in 1917 USS Inca (ID-3219), an iron tugboat built in 1879 USS Inca (IX-229), an unclassified miscellaneous vessel Biology Inca (beetle), a genus of beetles in the subfamily Cetoniinae Inca (hummingbird), the common name for several hummingbirds in the genus Coeligena Computing Inca (video game), a 1992 adventure game by Coktel Vision INCA (software), measurement, calibration and diagnostic software published by ETAS INCA Internet, South Korean company Food Inka (drink), a Polish roasted grain drink Inca Kola, a carbonated soft drink from Peru Other uses Inka (dharma), dharma transmission in Zen Buddhism El Inca (film), 2016 Venezuelan drama film directed by Ignacio Castillo Cottin Los Incas, Andean folk music group Inka shōmei, a form of dharma transmission in Zen Buddhism Ion and Neutral Camera (INCA), an instrument aboard the Cassini–Huygens spacecraft See also Incan (disambiguation) CNIB Foundation () INKAS, Canadian armoured transport, strongbox, security services company Quechua (disambiguation)
[ -0.14669610559940338, 0.3858319818973541, -0.37949296832084656, 0.12370571494102478, -0.23783941566944122, -0.15172123908996582, 0.4818515181541443, 0.6597700119018555, -0.6841124892234802, 0.09378761053085327, 0.3822961747646332, -0.1439780592918396, -0.10573382675647736, 0.37502688169479...
15323
https://en.wikipedia.org/wiki/Internet%20Protocol
Internet Protocol
The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers. For this purpose, IP defines packet structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram with source and destination information. IP was the connectionless datagram service in the original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974, which was complemented by a connection-oriented service that became the basis for the Transmission Control Protocol (TCP). The Internet protocol suite is therefore often referred to as TCP/IP. The first major version of IP, Internet Protocol Version 4 (IPv4), is the dominant protocol of the Internet. Its successor is Internet Protocol Version 6 (IPv6), which has been in increasing deployment on the public Internet since c. 2006. Function The Internet Protocol is responsible for addressing host interfaces, encapsulating data into datagrams (including fragmentation and reassembly) and routing datagrams from a source host interface to a destination host interface across one or more IP networks. For these purposes, the Internet Protocol defines the format of packets and provides an addressing system. Each datagram has two components: a header and a payload. The IP header includes source IP address, destination IP address, and other metadata needed to route and deliver the datagram. The payload is the data that is transported. This method of nesting the data payload in a packet with a header is called encapsulation. IP addressing entails the assignment of IP addresses and associated parameters to host interfaces. The address space is divided into subnetworks, involving the designation of network prefixes. IP routing is performed by all hosts, as well as routers, whose main function is to transport packets across network boundaries. Routers communicate with one another via specially designed routing protocols, either interior gateway protocols or exterior gateway protocols, as needed for the topology of the network. Version history In May 1974, the Institute of Electrical and Electronics Engineers (IEEE) published a paper entitled "A Protocol for Packet Network Intercommunication". The paper's authors, Vint Cerf and Bob Kahn, described an internetworking protocol for sharing resources using packet switching among network nodes. A central control component of this model was the "Transmission Control Program" that incorporated both connection-oriented links and datagram services between hosts. The monolithic Transmission Control Program was later divided into a modular architecture consisting of the Transmission Control Protocol and User Datagram Protocol at the transport layer and the Internet Protocol at the internet layer. The model became known as the Department of Defense (DoD) Internet Model and Internet protocol suite, and informally as TCP/IP. IP versions 1 to 3 were experimental versions, designed between 1973 and 1978. The following Internet Experiment Note (IEN) documents describe version 3 of the Internet Protocol, prior to the modern version of IPv4: IEN 2 (Comments on Internet Protocol and TCP), dated August 1977 describes the need to separate the TCP and Internet Protocol functionalities (which were previously combined.) It proposes the first version of the IP header, using 0 for the version field. IEN 26 (A Proposed New Internet Header Format), dated February 1978 describes a version of the IP header that uses a 1-bit version field. IEN 28 (Draft Internetwork Protocol Description Version 2), dated February 1978 describes IPv2. IEN 41 (Internetwork Protocol Specification Version 4), dated June 1978 describes the first protocol to be called IPv4. The IP header is different from the modern IPv4 header. IEN 44 (Latest Header Formats), dated June 1978 describes another version of IPv4, also with a header different from the modern IPv4 header. IEN 54 (Internetwork Protocol Specification Version 4), dated September 1978 is the first description of IPv4 using the header that would be standardized in . The dominant internetworking protocol in the Internet Layer in use is IPv4; the number 4 identifies the protocol version, carried in every IP datagram. IPv4 is described in (1981). Version number 5 was used by the Internet Stream Protocol, an experimental streaming protocol that was not adopted. The successor to IPv4 is IPv6. IPv6 was a result of several years of experimentation and dialog during which various protocol models were proposed, such as TP/IX (), PIP () and TUBA (TCP and UDP with Bigger Addresses, ). Its most prominent difference from version 4 is the size of the addresses. While IPv4 uses 32 bits for addressing, yielding c. 4.3 billion () addresses, IPv6 uses 128-bit addresses providing ca. addresses. Although adoption of IPv6 has been slow, , most countries in the world show significant adoption of IPv6, with over 35% of Google's traffic being carried over IPv6 connections. The assignment of the new protocol as IPv6 was uncertain until due diligence assured that IPv6 had not been used previously. Other Internet Layer protocols have been assigned version numbers, such as 7 (IP/TX), 8 and 9 (historic). Notably, on April 1, 1994, the IETF published an April Fools' Day joke about IPv9. IPv9 was also used in an alternate proposed address space expansion called TUBA. A 2004 Chinese proposal for an "IPv9" protocol appears to be unrelated to all of these, and is not endorsed by the IETF. Reliability The design of the Internet protocol suite adheres to the end-to-end principle, a concept adapted from the CYCLADES project. Under the end-to-end principle, the network infrastructure is considered inherently unreliable at any single network element or transmission medium and is dynamic in terms of the availability of links and nodes. No central monitoring or performance measurement facility exists that tracks or maintains the state of the network. For the benefit of reducing network complexity, the intelligence in the network is purposely located in the end nodes. As a consequence of this design, the Internet Protocol only provides best-effort delivery and its service is characterized as unreliable. In network architectural parlance, it is a connectionless protocol, in contrast to connection-oriented communication. Various fault conditions may occur, such as data corruption, packet loss and duplication. Because routing is dynamic, meaning every packet is treated independently, and because the network maintains no state based on the path of prior packets, different packets may be routed to the same destination via different paths, resulting in out-of-order delivery to the receiver. All fault conditions in the network must be detected and compensated by the participating end nodes. The upper layer protocols of the Internet protocol suite are responsible for resolving reliability issues. For example, a host may buffer network data to ensure correct ordering before the data is delivered to an application. IPv4 provides safeguards to ensure that the header of an IP packet is error-free. A routing node discards packets that fail a header checksum test. Although the Internet Control Message Protocol (ICMP) provides notification of errors, a routing node is not required to notify either end node of errors. IPv6, by contrast, operates without header checksums, since current link layer technology is assumed to provide sufficient error detection. Link capacity and capability The dynamic nature of the Internet and the diversity of its components provide no guarantee that any particular path is actually capable of, or suitable for, performing the data transmission requested. One of the technical constraints is the size of data packets possible on a given link. Facilities exist to examine the maximum transmission unit (MTU) size of the local link and Path MTU Discovery can be used for the entire intended path to the destination. The IPv4 internetworking layer automatically fragments a datagram into smaller units for transmission when the link MTU is exceeded. IP provides re-ordering of fragments received out of order. An IPv6 network does not perform fragmentation in network elements, but requires end hosts and higher-layer protocols to avoid exceeding the path MTU. The Transmission Control Protocol (TCP) is an example of a protocol that adjusts its segment size to be smaller than the MTU. The User Datagram Protocol (UDP) and ICMP disregard MTU size, thereby forcing IP to fragment oversized datagrams. Security During the design phase of the ARPANET and the early Internet, the security aspects and needs of a public, international network could not be adequately anticipated. Consequently, many Internet protocols exhibited vulnerabilities highlighted by network attacks and later security assessments. In 2008, a thorough security assessment and proposed mitigation of problems was published. The IETF has been pursuing further studies. See also ICANN IP routing List of IP protocol numbers Next-generation network References External links Internet layer protocols Internet
[ 0.0212036594748497, -0.0014391683507710695, 0.24174600839614868, 0.16734744608402252, -0.07337435334920883, -0.512527585029602, 0.04115509241819382, 0.16914896667003632, -0.44132280349731445, -0.8369132876396179, -0.2582594156265259, -0.03420666605234146, -0.5400662422180176, 0.22280426323...
15328
https://en.wikipedia.org/wiki/Impeachment
Impeachment
Impeachment is the process by which a legislative body or other legally constituted tribunal initiates charges against a public official for misconduct. It may be understood as a unique process involving both political and legal elements. In Europe and Latin America impeachment tends to be confined to ministerial officials as the unique nature of their positions may place ministers beyond the reach of the law to prosecute, or their misconduct is not codified into law as an offense except through the unique expectations of their high office. Both "peers and commoners" have been subject to the process however. From 1990 to 2020 there have been at least 272 impeachment charges against 132 different heads of state in 63 countries. Most democracies (with the notable exception of the United States) involve the courts (often a national constitutional court) in some way. In Latin America, which includes almost 40% of the world's presidential systems, ten presidents from six countries were removed from office by their national legislatures via impeachments or declarations of incapacity between 1978 and 2019. National legislations differ regarding both the consequences and definition of impeachment, but the intent is nearly always to expeditiously vacate the office. In most nations the process begins in the lower house of a bicameral assembly who bring charges of misconduct, then the upper house administers a trial and sentencing. Most commonly, an official is considered impeached after the house votes to accept the charges, and impeachment itself does not remove the official from office. Because impeachment involves a departure from the normal constitutional procedures by which individuals achieve high office (election, ratification, or appointment) and because it generally requires a supermajority, they are usually reserved for those deemed to have committed serious abuses of their office. In the United States, for example, impeachment at the federal level is limited to those who may have committed "Treason, Bribery, or other high crimes and misdemeanors"—the latter phrase referring to offenses against the government or the constitution, grave abuses of power, violations of the public trust, or other political crimes, even if not indictable criminal offenses. Under the United States Constitution, the House of Representatives has the sole power of impeachments while the Senate has the sole power to try impeachments (i.e., to acquit or convict); the validity of an impeachment trial is a political question that is nonjusticiable (i.e.., is not reviewable by the courts). In the United States, impeachment is a remedial rather than penal process, intended to "effectively 'maintain constitutional government' by removing individuals unfit for office"; persons subject to impeachment and removal remain "liable and subject to Indictment, Trial, Judgment and Punishment, according to Law." Impeachment is provided for in the constitutional laws of many countries including Brazil, France, India, Ireland, the Philippines, Russia, South Korea, and the United States. It is distinct from the motion of no confidence procedure available some countries whereby a motion of censure can be used to remove a government and its ministers from office. Such a procedure is not applicable in countries with presidential forms of government like the United States. Etymology and history The word "impeachment" likely derives from Old French empeechier from Latin word impedīre expressing the idea of catching or ensnaring by the 'foot' (pes, pedis), and has analogues in the modern French verb empêcher (to prevent) and the modern English impede. Medieval popular etymology also associated it (wrongly) with derivations from the Latin impetere (to attack). The process was first used by the English "Good Parliament" against William Latimer, 4th Baron Latimer in the second half of the 14th century. Following the English example, the constitutions of Virginia (1776), Massachusetts (1780) and other states thereafter adopted the impeachment mechanism, but they restricted the punishment to removal of the official from office. In West Africa, Kings of the Ashanti Empire who violated any of the oaths taken during his or her enstoolment, were destooled by Kingmakers. For instance, if a king punished citizens arbitrarily or was exposed to be corrupt, he would be destooled. Destoolment entailed Kingmakers removing the sandals of the king and bumping his buttocks on the ground three times. Once destooled from office, his sanctity and thus reverence are lost as he cannot exercise any powers he had as king; this includes Chief administrator, Judge, and Military Commander. The now previous king is disposed of the Stool, swords and other regalia which symbolize his office and authority. He also loses the position as custodian of the land. However, despite being destooled from office, the king remains a member of the Royal Family from which he was elected. In various jurisdictions Brazil In Brazil, as in most other Latin American countries, "impeachment" refers to the definitive removal from office. The president of Brazil may be provisionally removed from office by the Chamber of Deputies and then tried and definitely removed from office by the Federal Senate. The Brazilian Constitution requires that two-thirds of the Deputies vote in favor of the opening of the impeachment process of the President and that two-thirds of the Senators vote for impeachment. State governors and municipal mayors can also be impeached by the respective legislative bodies. Article 2 of Law nº 1.079, from 10 April 1950, or “The Law of Impeachment,” states that “The crimes defined in this law, even when simply attempted, are subject to the penalty of loss of office, with disqualification for up to five years for the exercise of any public function, to be imposed by the Federal Senate in proceedings against the President of the Republic, Ministers of State, Ministers of the Supreme Federal Tribunal, or the Attorney General.” Initiation: An accusation of a responsibility crime against the President may be brought by any Brazilian citizen however the President of the Chamber of Deputies holds prerogative to accept the charge, which if accepted will be read at the next session and reported to the President of the Republic. Extraordinary Committee: An extraordinary committee is elected with member representation from each political party proportional to that party's membership. The President is then allowed ten parliamentary sessions for defense, which lead to two legislative sessions to form a rapporteur's legal opinion as to if impeachment proceedings will or will not be sent for a trial in the Senate. The rapporteur's opinion is voted on in the Committee; and on a simple majority it may be accepted. Failing that, the Committee adopts an opinion produced by the majority. For example, if the rapporteur's opinion is that no impeachment is warranted, and the Committee vote fails to accept it, then the Committee adopts the opinion to proceed with impeachment. Likewise, if the rapporteur's opinion is to proceed with impeachment, but it fails to achieve majority in the Committee, then the Committee adopts the opinion not to impeach. If the vote succeeds, then the rapporteur's opinion is adopted. Chamber of Deputies: The Chamber issues a call-out vote to accept the opinion of the Committee, requiring either a supermajority of two thirds in favor of an impeachment opinion (or a supermajority of two thirds against a dismissal opinion) of the Committee, in order to authorize the Senate impeachment proceedings. The President is suspended (provisionally removed) from office as soon as the Senate receives and accepts from the Chamber of Deputies the impeachment charges and decides to proceed with a trial. The Senate: The process in the Senate had been historically lacking in procedural guidance until 1992, when the Senate published in the Official Diary of the Union the step-by-step procedure of the Senate's impeachment process, which involves the formation of another special committee and closely resembles the lower house process, with time constraints imposed on the steps taken. The committee's opinion must be presented within 10 days, after which it is put to a call-out vote at the next session. The vote must proceed within a single session; the vote on President Rousseff took over 20 hours. A simple majority vote in the Senate begins formal deliberation on the complaint, immediately suspends the President from office, installs the Vice President as acting president, and begins a 20-day period for written defense as well as up to 180-days for the trial. In the event the trial proceeds slowly and exceeds 180 days, the Brazilian Constitution determines that the President is entitled to return and stay provisionally in office until the trial comes to its decision. Senate plenary deliberation: The committee interrogates the accused or their counsel, from which they have a right to abstain, and also a probative session which guarantees the accused rights to contradiction, or audiatur et altera pars, allowing access to the courts and due process of law under Article 5 of the constitution. The accused has 15 days to present written arguments in defense and answer to the evidence gathered, and then the committee shall issue an opinion on the merits within ten days. The entire package is published for each senator before a single plenary session issues a call-out vote, which shall proceed to trial on a simple majority and close the case otherwise. Senate trial: A hearing for the complainant and the accused convenes within 48 hours of notification from deliberation, from which a trial is scheduled by the president of the Supreme Court no less than ten days after the hearing. The senators sit as judges, while witnesses are interrogated and cross-examined; all questions must be presented to the president of the Supreme Court, who, as prescribed in the Constitution, presides over the trial. The president of the Supreme Court allots time for debate and rebuttal, after which time the parties leave the chamber and the senators deliberate on the indictment. The President of the Supreme Court reads the summary of the grounds, the charges, the defense and the evidence to the Senate. The senators in turn issue their judgement. On conviction by a supermajority of two thirds, the president of the Supreme Court pronounces the sentence and the accused is immediately notified. If there is no supermajority for conviction, the accused is acquitted. Upon conviction, the officeholder has his or her political rights revoked for eight years, which bars them from running for any office during that time. Fernando Collor de Mello, the 32nd President of Brazil, resigned in 1992 amidst impeachment proceedings. Despite his resignation, the Senate nonetheless voted to convict him and bar him from holding any office for eight years, due to evidence of bribery and misappropriation. In 2016, the Chamber of Deputies initiated an impeachment case against President Dilma Rousseff on allegations of budgetary mismanagement, a crime of responsibility under the Constitution. On 12 May 2016, after 20 hours of deliberation, the admissibility of the accusation was approved by the Senate with 55 votes in favor and 22 against (an absolute majority would have been sufficient for this step) and Vice President Michel Temer was notified to assume the duties of the President pending trial. On August 31, 61 senators voted in favor of impeachment and 20 voted against it, thus achieving the 2/3 majority needed for Rousseff's definitive removal. A vote to disqualify her for five years was taken and failed (in spite of the Constitution not separating disqualification from removal) having less than two thirds in favor. Croatia The process of impeaching the president of Croatia can be initiated by a two-thirds majority vote in favor in the Sabor and is thereafter referred to the Constitutional Court, which must accept such a proposal with a two-thirds majority vote in favor in order for the president to be removed from office. This has never occurred in the history of the Republic of Croatia. In case of a successful impeachment motion a president's constitutional term of five years would be terminated and an election called within 60 days of the vacancy occurring. During the period of vacancy the presidential powers and duties would be carried out by the speaker of the Croatian Parliament in his/her capacity as Acting President of the Republic. Czech Republic In 2013, the constitution was changed. Since 2013, the process can be started by at least three-fifths of present senators, and must be approved by at least three-fifths of all members of the Chamber of Deputies. Also, the President can be impeached for high treason (newly defined in the Constitution) or any serious infringement of the Constitution. The process starts in the Senate of the Czech Republic which has the right to only impeach the president, and the Senate passes the case to the Constitutional Court of the Czech Republic, which has to decide the verdict against the president. If the Court finds the President guilty, then the President is removed from office and is permanently barred from being elected President of the Czech Republic again. No Czech president has ever been impeached, though members of the Senate sought to impeach President Václav Klaus in 2013. This case was dismissed by the court, which reasoned that his mandate had expired. Denmark In Denmark the possibility for current and former ministers being impeached was established with the Danish Constitution of 1849. Unlike many other countries Denmark does not have a Constitutional Court who would normally handle these types of cases. Instead Denmark has a special Court of Impeachment (In Danish: Rigsretten) which is called upon every time a current and former minister have been impeached. The role of the Impeachment Court is to process and deliver judgments against current and former ministers who are accused of unlawful conduct in office. The legal content of ministerial responsibility is laid down in the Ministerial Accountability Act which has its background in section 13 of the Danish Constitution, according to which the ministers' accountability is determined in more detail by law. In Denmark the normal practice in terms of impeachment cases is that it needs to be brought up in the Danish Parliament (Folketing) first for debate between the different members and parties in the parliament. After the debate the members of the Danish Parliament vote on whether a current or former minister needs to be impeached. If there is a majority in the Danish Parliament for an impeachment case against a current or former minister, an Impeachment Court is called into session. In Denmark the Impeachment Court consists of up to 15 Supreme Court judges and 15 parliament members appointed by the Danish Parliament. The members of the Impeachment Court in Denmark serve a six-year term in this position. In 1995 the former Minister of Justice Erik Ninn-Hansen from the Conservative People's Party was impeached in connection with the Tamil Case. The case was centered around the illegal processing of family reunification applications. From September 1987 to January 1989 applications for family reunification of Tamil refugees from civil war-torn Sri Lanka were put on hold in violation of Danish and International law. On 22 June 1995, Ninn-Hansen was found guilty of violating paragraph five subsection one of the Danish Ministerial Responsibility Act which says: A minister is punished if he intentionally or through gross negligence neglects the duties incumbent on him under the constitution or legislation in general or according to the nature of his post. A majority of the judges in that impeachment case voted for former Minister of Justice Erik Ninn-Hansen to receive a suspended sentence of four months with one year of probation. The reason why the sentence was made suspended was especially in relation to Ninn-Hansen's personal circumstances, in particular, his health and age - Ninn-Hansen was 73 years old when the sentence was handed down. After the verdict, Ninn-Hansen complained to the European Court of Human Rights and complained, among other things, that the Court of Impeachment was not impartial. The European Court of Human Rights dismissed the complaint on 18 May 1999. As a direct result and consequence of this case, the Conservative-led government and Prime Minister at that time Poul Schlüter was forced to step down from power. In February 2021 the former Minister for Immigration and Integration Inger Støjberg at that time member of the Danish Liberal Party Venstre was impeached when it was discovered that she had possibly against both Danish and International law tried to separate couples in refugee centres in Denmark, as the wives of the couples were under legal age. According to a commission report Inger Støjberg had also lied in the Danish Parliament and failed to report relevant details to the Parliamentary Ombudsman The decision to initiate an impeachment case was adopted by the Danish Parliament with a 141-30 vote and decision (In Denmark 90 members of the parliament need to vote for impeachment before it can be implemented). On 13 December 2021 former Minister for Immigration and Integration Inger Støjberg was convicted by the special Court of Impeachment of separating asylum seeker families illegally according to Danish and international law and sentenced to 60 days in prison. The majority of the judges in the special Court of Impeachment (25 out of 26 judges) found that it had been proven that Inger Støjberg on 10 February 2016 decided that an accommodation scheme should apply without the possibility of exceptions, so that all asylum-seeking spouses and cohabiting couples where one was a minor aged 15-17, had to be separated and accommodated separately in separate asylum centers. On 21 December, a majority in the Folketing voted that the sentence means that she is no longer worthy of sitting in the Folketing and she therefore immediately lost her seat. France In France the comparable procedure is called destitution. The president of France can be impeached by the French Parliament for willfully violating the Constitution or the national laws. The process of impeachment is written in the 68th article of the French Constitution. A group of senators or a group of members of the National Assembly can begin the process. Then, both the National Assembly and the Senate must acknowledge the impeachment. After the upper and lower houses' agreement, they unite to form the High Court. Finally, the High Court must decide to declare the impeachment of the president of France—or not. Germany The federal president of Germany can be impeached both by the Bundestag and by the Bundesrat for willfully violating federal law. Once the Bundestag or the Bundesrat impeaches the president, the Federal Constitutional Court decides whether the President is guilty as charged and, if this is the case, whether to remove him or her from office. The Federal Constitutional Court also has the power to remove federal judges from office for willfully violating core principles of the federal constitution or a state constitution. The impeachment procedure is regulated in Article 61 of the Basic Law for the Federal Republic of Germany. There is no formal impeachment process for the chancellor of Germany, however the Bundestag can replace the chancellor at any time by voting for a new chancellor (constructive vote of no confidence, Article 67 of the Basic Law). There has never been an impeachment against the President so far. Constructive votes of no confidence against the chancellor occurred in 1972 and 1982, with only the second one being successful. Hong Kong The chief executive of Hong Kong can be impeached by the Legislative Council. A motion for investigation, initiated jointly by at least one-fourth of all the legislators charging the Chief Executive with "serious breach of law or dereliction of duty" and refusing to resign, shall first be passed by the council. An independent investigation committee, chaired by the chief justice of the Court of Final Appeal, will then carry out the investigation and report back to the council. If the Council find the evidence sufficient to substantiate the charges, it may pass a motion of impeachment by a two-thirds majority. However, the Legislative Council does not have the power to actually remove the chief executive from office, as the chief executive is appointed by the Central People's Government (State Council of China). The council can only report the result to the Central People's Government for its decision. Hungary Article 13 of Hungary's Fundamental Law (constitution) provides for the process of impeaching and removing the president. The president enjoys immunity from criminal prosecution while in office, but may be charged with crimes committed during his term afterwards. Should the president violate the constitution while discharging his duties or commit a willful criminal offense, he may be removed from office. Removal proceedings may be proposed by the concurring recommendation of one-fifth of the 199 members of the country's unicameral Parliament. Parliament votes on the proposal by secret ballot, and if two thirds of all representatives agree, the president is impeached. Once impeached, the president's powers are suspended, and the Constitutional Court decides whether or not the President should be removed from office. India The president and judges, including the chief justice of the supreme court and high courts, can be impeached by the parliament before the expiry of the term for violation of the Constitution. Other than impeachment, no other penalty can be given to a president in position for the violation of the Constitution under Article 361 of the constitution. However a president after his/her term/removal can be punished for his already proven unlawful activity under disrespecting the constitution, etc. No president has faced impeachment proceedings. Hence, the provisions for impeachment have never been tested. The sitting president cannot be charged and needs to step down in order for that to happen. Ireland In the Republic of Ireland formal impeachment applies only to the Irish president. Article 12 of the Irish Constitution provides that, unless judged to be "permanently incapacitated" by the Supreme Court, the president can be removed from office only by the houses of the Oireachtas (parliament) and only for the commission of "stated misbehaviour". Either house of the Oireachtas may impeach the president, but only by a resolution approved by a majority of at least two thirds of its total number of members; and a house may not consider a proposal for impeachment unless requested to do so by at least thirty of its number. Where one house impeaches the president, the remaining house either investigates the charge or commissions another body or committee to do so. The investigating house can remove the president if it decides, by at least a two-thirds majority of its members, both that the president is guilty of the charge and that the charge is sufficiently serious as to warrant the president's removal. To date no impeachment of an Irish president has ever taken place. The president holds a largely ceremonial office, the dignity of which is considered important, so it is likely that a president would resign from office long before undergoing formal conviction or impeachment. Italy In Italy, according to Article 90 of the Constitution, the President of Italy can be impeached through a majority vote of the Parliament in joint session for high treason and for attempting to overthrow the Constitution. If impeached, the president of the Republic is then tried by the Constitutional Court integrated with sixteen citizens older than forty chosen by lot from a list compiled by the Parliament every nine years. Italian press and political forces made use of the term "impeachment" for the attempt by some members of parliamentary opposition to initiate the procedure provided for in Article 90 against Presidents Francesco Cossiga (1991), Giorgio Napolitano (2014) and Sergio Mattarella (2018). Japan By Article 78 of the Constitution of Japan, judges can be impeached. The voting method is specified by laws. The National Diet has two organs and they are 裁判官訴追委員会(Saibankan sotsui iinkai) and 裁判官弾劾裁判所(Saibankan dangai saibansho), which is established by Article 64 of the Constitution. The former has a role similar to prosecutor and the latter is analogous to Court. Seven judges were removed by them. Liechtenstein Members of the Liechtenstein Government can be impeached before the State Court for breaches of the Constitution or of other laws. As a hereditary monarchy the Sovereign Prince can not be impeached as he "is not subject to the jurisdiction of the courts and does not have legal responsibility". The same is true of any member of the Princely House who exercises the function of head of state should the Prince be temporarily prevented or in preparation for the Succession. Lithuania In the Republic of Lithuania, the president may be impeached by a three-fifths majority in the Seimas. President Rolandas Paksas was removed from office by impeachment on 6 April 2004 after the Constitutional Court of Lithuania found him guilty of having violated his oath and the constitution. He was the first European head of state to have been impeached. Norway Members of government, representatives of the national assembly (Stortinget) and Supreme Court judges can be impeached for criminal offenses tied to their duties and committed in office, according to the Constitution of 1814, §§ 86 and 87. The procedural rules were modeled after the U.S. rules and are quite similar to them. Impeachment has been used eight times since 1814, last in 1927. Many argue that impeachment has fallen into desuetude. In cases of impeachment, an appointed court (Riksrett) takes effect. Philippines Impeachment in the Philippines follows procedures similar to the United States. Under Sections2 and 3, Article XI, Constitution of the Philippines, the House of Representatives of the Philippines has the exclusive power to initiate all cases of impeachment against the president, vice president, members of the Supreme Court, members of the Constitutional Commissions (Commission on Elections, Civil Service Commission and the Commission on Audit), and the ombudsman. When a third of its membership has endorsed the impeachment articles, it is then transmitted to the Senate of the Philippines which tries and decide, as impeachment tribunal, the impeachment case. A main difference from U.S. proceedings however is that only one third of House members are required to approve the motion to impeach the president (as opposed to a simple majority of those present and voting in their U.S. counterpart). In the Senate, selected members of the House of Representatives act as the prosecutors and the senators act as judges with the Senate president presiding over the proceedings (the chief justice jointly presides with the Senate president if the president is on trial). Like the United States, to convict the official in question requires that a minimum of two thirds (i.e. 16 of 24 members) of all the members of the Senate vote in favor of conviction. If an impeachment attempt is unsuccessful or the official is acquitted, no new cases can be filed against that impeachable official for at least one full year. Impeachment proceedings and attempts President Joseph Estrada was the first official impeached by the House in 2000, but the trial ended prematurely due to outrage over a vote to open an envelope where that motion was narrowly defeated by his allies. Estrada was deposed days later during the 2001 EDSA Revolution. In 2005, 2006, 2007 and 2008, impeachment complaints were filed against President Gloria Macapagal Arroyo, but none of the cases reached the required endorsement of of the members for transmittal to, and trial by, the Senate. In March 2011, the House of Representatives impeached Ombudsman Merceditas Gutierrez, becoming the second person to be impeached. In April, Gutierrez resigned prior to the Senate's convening as an impeachment court. In December 2011, in what was described as "blitzkrieg fashion", 188 of the 285 members of the House of Representatives voted to transmit the 56-page Articles of Impeachment against Supreme Court chief justice Renato Corona. To date, three officials had been successfully impeached by the House of Representatives, and two were not convicted. The latter, Chief Justice Renato C. Corona, was convicted on 29 May 2012, by the Senate under Article II of the Articles of Impeachment (for betraying public trust), with 20–3 votes from the Senator Judges. Peru The first impeachment process against Pedro Pablo Kuczynski, then the incumbent President of Peru since 2016, was initiated by the Congress of Peru on 15 December 2017. According to Luis Galarreta, the President of the Congress, the whole process of impeachment could have taken as little as a week to complete. This event was part of the second stage of the political crisis generated by the confrontation between the Government of Pedro Pablo Kuczynski and the Congress, in which the opposition Popular Force has an absolute majority. The impeachment request was rejected by the congress on 21 December 2017, for failing to obtain sufficient votes for the deposition. Romania The president can be impeached by Parliament and is then suspended. A referendum then follows to determine whether the suspended President should be removed from office. President Traian Băsescu was impeached twice by the Parliament: in 2007 and then again in July 2012. A referendum was held on 19 May 2007 and a large majority of the electorate voted against removing the president from office. For the most recent suspension a referendum was held on July 29, 2012; the results were heavily against the president, but the referendum was invalidated due to low turnout. Russia In 1999, members of the State Duma of Russia, led by the Communist Party of the Russian Federation, unsuccessfully attempted to impeach President Boris Yeltsin on charges relating to his role in the 1993 Russian constitutional crisis and launching the First Chechen War (1995–96); efforts to launch impeachment proceedings failed. Singapore The Constitution of Singapore allows the impeachment of a sitting president on charges of treason, violation of the Constitution, corruption, or attempting to mislead the Presidential Elections Committee for the purpose of demonstrating eligibility to be elected as president. The prime minister or at least one-quarter of all members of Parliament (MPs) can pass an impeachment motion, which can succeed only if at least half of all MPs (excluding nominated members) vote in favor, whereupon the chief justice of the Supreme Court will appoint a tribunal to investigate allegations against the president. If the tribunal finds the president guilty, or otherwise declares that the president is "permanently incapable of discharging the functions of his office by reason of mental or physical infirmity", Parliament will hold a vote on a resolution to remove the president from office, which requires a three-quarters majority to succeed. No president has ever been removed from office in this fashion. South Africa When the Union of South Africa was established in 1910, the only officials who could be impeached (though the term itself was not used) were the chief justice and judges of the Supreme Court of South Africa. The scope was broadened when the country became a republic in 1961, to include the state president. It was further broadened in 1981 to include the new office of vice state president; and in 1994 to include the executive deputy presidents, the public protector and the Auditor-General. Since 1997, members of certain commissions established by the Constitution can also be impeached. The grounds for impeachment, and the procedures to be followed, have changed several times over the years. South Korea According to the Article 65 Clause 1 of Constitution of South Korea, if President, Prime Minister, or other state council members including Supreme Court and Constitutional court members, violate the Constitution or other laws of official duty, the National Assembly can impeach them. Clause2 states the impeachment bill may be proposed by one third or more of the total members of the National Assembly, and shall require majority voting and approved by two thirds or more of the total members of the National Assembly. This article also states that any person against whom a motion for impeachment has been passed shall be suspended from exercising his power until the impeachment has been adjudicated and shall not extend further than removal from public office, provided that it shall not exempt the person impeached from civil or criminal liability. Two presidents have been impeached since the establishing of the Republic of Korea in 1948. Roh Moo-hyun in 2004 was impeached by the National Assembly but was overturned by the Constitutional Court. Park Geun-hye in 2016 was impeached by the National Assembly, and the impeachment was confirmed by the Constitutional Court on March 10, 2017. In February 2021, Judge Lim Seong-geun of the Busan High Court was impeached by the National Assembly for meddling in politically sensitive trials, the first ever impeachment of a judge in Korean history. Unlike presidential impeachments, only a simple majority is required to impeach. Turkey In Turkey, according to the Constitution, the Grand National Assembly may initiate an investigation of the president, the vice president or any member of the Cabinet upon the proposal of simple majority of its total members, and within a period less than a month, the approval of three-fifths of the total members. The investigation would be carried out by a commission of fifteen members of the Assembly, each nominated by the political parties in proportion to their representation therein. The commission would submit its report indicating the outcome of the investigation to the speaker within two months. If the investigation is not completed within this period, the commission's time may be renewed for another month. Within ten days of its submission to the speaker, the report would be distributed to all members of the Assembly, and ten days after its distribution, the report would be discussed on the floor. Upon the approval of two thirds of the total number of the Assembly by secret vote, the person or persons, about whom the investigation was conducted, may be tried before the Constitutional Court. The trial would be finalized within three months, and if not, a one-time additional period of three months shall be granted. The president, about whom an investigation has been initiated, may not call for an election. The president, who is convicted by the Court, would be removed from office. The provision of this article shall also apply to the offenses for which the president allegedly worked during his term of office. Ukraine During the crisis which started in November 2013, the increasing political stress of the face-down between the protestors occupying Independence Square in Kyiv and the State Security forces under the control of President Yanukovych led to deadly armed force being used on the protestors. Following the negotiated return of Kyiv's City Hall on 16 February 2014, occupied by the protesters since November 2013, the security forces thought they could also retake "Maidan", Independence Square. The ensuing fighting from 17 through 21 February 2014 resulted in a considerable number of deaths and a more generalised alienation of the population, and the withdrawal of President Yanukovych to his support area in the East of Ukraine. In the wake of the president's departure, Parliament convened on 22 February; it reinstated the 2004 Constitution, which reduced presidential authority, and voted impeachment of President Yanukovych as de facto recognition of his departure from office as President of an integrated Ukraine. The president riposted that Parliament's acts were illegal as they could pass into law only by presidential signature. United Kingdom In the United Kingdom, in principle, anybody may be prosecuted and tried by the two Houses of Parliament for any crime. The first recorded impeachment is that of William Latimer, 4th Baron Latimer during the Good Parliament of 1376. The latest was that of Henry Dundas, 1st Viscount Melville which started in 1805 and which ended with his acquittal in June 1806. Over the centuries, the procedure has been supplemented by other forms of oversight including select committees, confidence motions, and judicial review, while the privilege of peers to trial only in the House of Lords was abolished in 1948, and thus impeachment, which has not kept up with modern norms of democracy or procedural fairness, is generally considered obsolete. United States In the federal system, the Article One of the United States Constitution provides that the House of Representatives has the "sole Power of Impeachment" and the Senate has "the sole Power to try all Impeachments." Article Two provides that "The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors." In the United States, impeachment is the first of two stages; an official may be impeached by a majority vote of the House, but conviction and removal from office in the Senate requires "the concurrence of two thirds of the members present". Impeachment is analogous to an indictment. According to the House practice manual, "Impeachment is a constitutional remedy to address serious offenses against the system of government. It is the first step in a remedial process—that of removal from public office and possible disqualification from holding further office. The purpose of impeachment is not punishment; rather, its function is primarily to maintain constitutional government." Impeachment may be understood as a unique process involving both political and legal elements. The Constitution provides that "Judgment in Cases of Impeachment shall not extend further than to removal from Office, and disqualification to hold and enjoy any Office of honor, Trust or Profit under the United States: but the Party convicted shall nevertheless be liable and subject to Indictment, Trial, Judgment and Punishment, according to Law." It is generally accepted that "a former President may be prosecuted for crimes of which he was acquitted by the Senate." The U.S. House of Representatives has impeached an official 21 times since 1789: four times for presidents, 15 times for federal judges, once for a Cabinet secretary, and once for a senator. Of the 21, the Senate voted to remove 8 (all federal judges) from office. The four impeachments of presidents were: Andrew Johnson in 1868, Bill Clinton in 1998, and Donald Trump twice: first in 2019, and a second time in 2021. All four impeachments were followed by acquittal in the Senate. An impeachment process was also commenced against Richard Nixon, but he resigned in 1974 to avoid likely removal from office. Almost all state constitutions set forth parallel impeachment procedures for state governments, allowing the state legislature to impeach officials of the state government. From 1789 through 2008, 14 governors have been impeached (including two who were impeached twice), of whom seven governors were convicted. See also List of impeachments of heads of state References Further reading Accountability Political terminology of the United States
[ -0.01526336558163166, 0.41120395064353943, -0.5713981986045837, 0.4495820999145508, -0.6644183993339539, -0.11260046064853668, 0.2469147890806198, 0.17670921981334686, -0.7498581409454346, 0.1554369330406189, -0.3179328739643097, 0.564287543296814, -0.5037152767181396, 0.5519396662712097, ...
15334
https://en.wikipedia.org/wiki/Ibizan%20Hound
Ibizan Hound
The Ibizan Hound (, ) is a lean, agile dog of the hound family. There are two hair types of the breed: smooth and wire. The more commonly seen type is the smooth. Some consider there to be a third type, long, but the longhair is most likely a variation of the wire. Description Looks The Ibizan Hound is an elegant and agile breed, with an athletic and attractive outline and a ground-covering springy trot. Though graceful in appearance, it has good bone girth and is a rugged/hardy breed. Its large upright ears — a hallmark of the breed — are broad at the base and frame a long and elegant headpiece. The neck is long and lean. It has a unique front assembly with well laid-back shoulders and relatively straight upper arm. Coming in both smooth and wire-coated varieties, their coat is a combination of red and white with the nose, ears, eye rims, and pads of feet being a light tan color. Its eyes are a striking amber color and have an alert and intelligent expression. The Ibizan may range in height, depending on which Standard you follow, from and weigh from , males being larger than females. Temperament Ibizan Hounds are intelligent, active, and engaging by nature. They rank 53rd in Stanley Coren's book The Intelligence of Dogs, considered average working/obedience intelligence, but many Ibizan owners enjoy recounting a multitude of examples of their problem-solving abilities. They are true "clowns" of the dog world, delighting in entertaining their people with their antics. Though somewhat independent and stubborn at times, they do take well to training if positive methods are used, but they will balk at punitive training methods. They are generally quiet but will alarm bark if necessary, so they make good watch dogs. They are sensitive hounds, and very good around children and other dogs alike. They generally make good house dogs but are active and athletic, therefore need a lot of daily exercise. They do not make good kennel dogs. Ibizan hounds are sweet, but they are very stubborn and independent. Ibizan Hounds are "escapologists": they are able to jump incredible heights from a standstill, so they need very tall fences. They also have been known to climb, and many can escape from crates and can open baby gates and even locks. They have a strong prey drive, therefore they cannot be trusted off leash unless in a safely enclosed area. Once off the leash, they might not come back for a long time. A hound that knows where its home is and the surrounding area will usually return unscathed. Health The Ibizan Hound is typical of the hound group in that it rarely suffers from hereditary illness. Minor health concerns for the breed include seizures and allergies; very rarely, one will see axonal dystrophy, cataract, retinal dysplasia and deafness in the breed. Ibizan Hound owners should have their dogs' eyes tested by a veterinarian before breeding. CERF and BAER testing is recommended for the breed. Ibizan Hounds are sensitive to barbiturate anesthesia, and typically live between 12 and 14 years. History DNA analysis indicates that the breed was formed recently from other breeds. The Ibizan Hound is similar in function and type to several breeds, such as the Pharaoh Hound, the Cirneco dell'Etna, the Portuguese Podengo, and the Podenco Canario. The Ibizan Hound is the largest of these breeds, classified by the Fédération Cynologique Internationale as primitive types. Use This breed originates in the island of Ibiza and has been traditionally used in the Catalan-speaking areas of Spain, and France where it was known under the name of le charnigue, to hunt rabbits and other small game. The Ibizan Hound is a fast dog that can hunt on all types of terrain, working by scent, sound and sight. Hunters run these dogs in mostly female packs, with perhaps a male or two, as the female is considered the better hunter. Traditionally a farmer may have one dog and a very well off farmer two dogs to catch rabbits for food. However, in the last twenty years it is seen as a sport where between five and fifteen dogs can be seen in the chase of one rabbit. The Ibizan Hound authority Miquel Rosselló has provided a detailed description of a working trial which characterises their typical hunting technique and action, strikingly illustrated with action photos by Charles Camberoque which demonstrate hunt behaviour and typical hunt terrain. While local hunters will at times use one dog or a brace, and frequently packs of six to eight or as many as fifteen, the working trial requires an evaluation of one or two braces. A brace is called a colla. The couples should be tested on at least two to five rabbits (not hares), without the use of any other hunting aid. An inspection and evaluation of the exterior, fitness, character and obedience of the dogs is recommended prior to the hunt. The trial is qualified as having 5 parts. The dogs should show: (1) careful tracking and scenting of the rabbit, without being distracted in the least, 0-30 points; (2) correct signalling of the game, patient stand, strong jump into the air, obedience 0-10 points; (3) chase, giving tongue, speed, sureness, anticipation 0-30 points; (4) putting the game to cover at close quarters, listening, waiting, obedience, correct attack 0-10 point; and (5) good catch, or correct indication of the game's location, retrieval, obedience 0-20 points. Individual dogs are expected to show a great degree of discipline, obedience and co-operation. They should be extremely agile, have good speed and a powerful vertical jump from a stationary position in rough and often heavily covered ground. They should have excellent scent-tracking abilities, give tongue at the right time when approaching the game closely, and otherwise be silent so that they can locate the game by sound. In the United States, the Ibizan Hound is frequently competed in lure coursing through the AKC and ASFA, and also competes in LGRA straight racing and NOTRA oval track racing. Some parts of the country also use them for coursing live prey, generally jackrabbits. The Ibizan Hound breed is recognized by the Fédération Cynologique Internationale, Continental Kennel Club, American Kennel Club, United Kennel Club, Kennel Club of Great Britain, Canadian Kennel Club, National Kennel Club, New Zealand Kennel Club, Australian National Kennel Council, America's Pet Registry, and American Canine Registry. It was fully recognized by the American Kennel Club in 1979. In folk culture According to journalist Norman Lewis, when an owner no longer wants to own one of these dogs (having too much of an appetite, for instance), it is considered very bad luck to kill the dog. Instead, they release the dog on the other side of the island, so that someone else might 'adopt' the animal. See also Dogs portal List of dog breeds References External links Sighthound Sanctuary & Animal Services Ibizan Hound Photos Charles Camberoque: photos of Ibizans at work Video: How Ibizans hunt Ibizan Hound Club (Eivissa) Norwegian Ibizan Hound Club Swiss Ibizan Hound Club German Ibizan Hound Club Ibizan Hound Rescue in Spain Ibizan Hounds in the UK Additional information on the German language Wikipedia.(In German: "Podenco Ibicenco") Animals of Ibiza Dog breeds originating in the Balearic Islands FCI breeds Rare dog breeds Sighthounds
[ -0.07333887368440628, 0.422305166721344, -0.7255512475967407, -0.6596572399139404, -0.21770529448986053, 0.21313369274139404, 0.6580170392990112, -0.5992061495780945, -0.22658240795135498, -0.019079025834798813, -0.5684090256690979, 0.33412966132164, -0.7207930088043213, -0.061839774250984...
15335
https://en.wikipedia.org/wiki/Irish%20Wolfhound
Irish Wolfhound
The Irish Wolfhound is a historic sighthound dog breed from Ireland that has, by its presence and substantial size, inspired literature, poetry and mythology. Like all sighthounds, it is used to hunt game by speed, and historically has also been famed as a guard dog specialising in protection against and for the hunting of wolves, from which its name derives. The original dog-type was presumed extinct by most authors of the 18th and 19th century, but was re-introduced by George Graham in the late 19th century, crossing the descendants of the original breed with various similar breeds. The modern breed, classified by recent genetic research into the Sighthound United Kingdom Rural Clade (Fig. S2), has been used by coursing hunters who have prized it for its ability to kill game caught by other, swifter sighthounds. History Pre-19th century In 391, there is a reference to large dogs by Quintus Aurelius Symmachus, a Roman Consul who received seven "canes Scotici" as a gift to be used for fighting lions and bears, and who wrote "all Rome viewed (them) with wonder". Scoti is a Latin name for the Gaels (ancient Irish). Dansey, the early 19th century translator of the first complete version of Arrian's work in English, On Coursing, suggested the Irish and Scottish "greyhounds" were derived from the same ancestor, the vertragus, and had expanded with the Scoti from Ireland across the Western Isles and into what is today Scotland. The dog-type is imagined by some to be very old. Wolfhounds were used as hunting dogs by the Gaels, who called them Cú Faoil ( , "hound" of "wolf" or wolfhound). Dogs are mentioned as cú in Irish laws and literature dating from the 6th century or, in the case of the Sagas, from the old Irish period, AD 600–900. The word cú was often used as an epithet for warriors as well as kings, denoting that they were worthy of the respect and loyalty of a hound. Cú Chulainn, a mythical warrior whose name means "hound of Culann", is supposed to have gained this name as a child when he slew the ferocious guard dog of Culann. As recompense he offered himself as a replacement. In discussing the systematic evidence of historic dog sizes in Ireland, the Irish zooarchaeologist Finbar McCormick stressed that no dogs of Irish Wolfhound size are known from sites of the Iron Age period of 1000 BC through to the early Christian period to 1200 AD, and on the basis of the historic dog bones available, dogs of current Irish Wolfhound size seem to be a relatively modern development: "it must be concluded that the dog of CúChulainn was no larger than an Alsatian and not the calf-sized beast of the popular imagination". Hunting dogs were coveted and were frequently given as gifts to important personages and foreign nobles. King John of England, in about 1210, presented an Irish hound named Gelert to Llywelyn, the Prince of Wales. The poet The Hon William Robert Spencer immortalized this hound in a poem. In his Historie of Ireland completed 1571, Edmund Campion gives a description of the hounds used for hunting wolves in the Dublin and Wicklow mountains. He says: "They (the Irish) are not without wolves and greyhounds to hunt them, bigger of bone and limb than a colt". Due to their popularity overseas many were exported to European royal houses leaving numbers in Ireland depleted. This led to a declaration by Oliver Cromwell being published in Kilkenny on 27 April 1652 to ensure that sufficient numbers remained to control the wolf population. The early 18th century engraving (see picture) from Entwurf einiger Thiere by Johann Elias Ridinger is the oldest known image of the original wolfhound. References to the Irish Wolfhound in the 18th century tell of its great size, strength and greyhound shape as well as its scarcity. Writing in 1790, Bewick described it as the largest and most beautiful of the dog kind; about 36 inches high, generally of a white or cinnamon colour, somewhat like the Greyhound but more robust. He said that their aspect was mild, disposition peaceful, and strength so great that in combat the Mastiff or Bulldog was far from being an equal to them. The last wolf in Ireland was killed in Co. Carlow in 1786. It is thought to have been killed at Myshall, on the slopes of Mount Leinster, by a pack of wolfdogs kept by a Mr Watson of Ballydarton. The wolfhounds that remained in the hands of a few families, who were mainly descendants of the old Irish chieftains, were now symbols of status rather than used as hunters, and these were said to be the last of their race. Thomas Pennant (1726–1798) reported that he could find no more than three wolfdogs when he visited Ireland. During the 1836 meeting of the Geological Society of Dublin, Dr. Scouler presented the "Notices of Animals which have disappeared from Ireland", with the wolfdog mentioned. Modern wolfhound Captain George Augustus Graham (1833–1909) of Rednock House, Dursley, Gloucestershire was responsible for creating the modern Irish wolfhound breed. He stated that he could not find the breed "in its original integrity" to work with: Based on the writings of others, Graham had formed the opinion that a dog resembling the original wolfhound could be recreated through using the biggest and best examples of the Scottish Deerhound and the Great Dane, two breeds which he believed had been derived earlier from the wolfhound. Into the mix went the Scottish Deerhound, the Great Dane, and Kathleen Pelham-Clinton, Duchess of Newcastle's Borzoi "Korotai", who had proved his wolf hunting abilities earlier in his native Russia. For an outbreed a "huge shaggy dog" was added, which may have possibly been a Tibetan Mastiff. The famous English Mastiff "Garnier's Lion" was bred to the Deerhound "Lufra", and their offspring "Marquis" entered wolfhound pedigrees through his granddaughter "Young Donagh". Graham included "a single outcross of Tibetan Wolf Dog". This was long assumed to have been a Tibetan Mastiff. However, a photograph of "Wolf" shows a bearded, long-coated dog—what would now be called a Tibetan kyi apso. In 1885 Captain Graham with other breeders founded the Irish Wolfhound Club, and the Breed Standard of Points to establish and agree the ideal to which breeders should aspire. The Wolfhound has been adopted as a symbol by both rugby codes. The national rugby league team is nicknamed the Wolfhounds, and the Irish Rugby Football Union, which governs rugby union, changed the name of the country's A (second-level) national team in that code to the Ireland Wolfhounds in 2010. One of the symbols that the tax authorities in both Ireland and Northern Ireland on their revenue stamps, have been the Irish wolfhound. In the video game Skyrim, the Irish Wolfhound is the breed of dog for all dogs in the base game. DNA analysis Genomic analysis indicates that although there has been some DNA sharing between the Irish wolfhound with the Deerhound, Whippet, and Greyhound, there has been significant sharing of DNA between the Irish Wolfhound with the Great Dane. One writer has stated that for the Irish Wolfhound, "the Great Dane appearance is strongly marked too prominently before the 20th Century". George Augustus Graham created the modern Irish wolfhound breed that retained the appearance of the original form but not its genetic ancestry. Description Appearance The Irish Wolfhound is characterised by its large size; it is often described as the tallest dog breed in the world. According to the FCI standard, the expected range of heights at the withers is ; minimum heights and weights are / and / for dogs and bitches respectively. It is more massively built than the Scottish Deerhound, but less so than the Great Dane. The coat is hard and rough on the head, body and legs, with the beard and the hair over the eyes particularly wiry. It may be black, brindle, fawn, grey, red, pure white, or any colour seen in the Deerhound. The Irish Wolfhound is a sighthound, and hunts by visual perception alone. The neck is muscular and fairly long, and the head is carried high. It should appear to be longer than it is tall, and to be capable of catching and killing a wolf. Temperament An Irish wolfhound is most easily described by its historical motto, "gentle when stroked, fierce when provoked". They have a varied range of personalities and are most often noted for their personal quirks and individualism. An Irish Wolfhound, however, is rarely mindless, and, despite its large size, is usually not found to be too destructive. This is because the breed is generally introverted, intelligent, and reserved in character. An easygoing animal, the Irish Wolfhound is quiet and thoughtful by nature. Wolfhounds often create a strong bond with their family and can become quite destructive or morose if left alone for long periods of time. An Irish Wolfhound is an effective and imposing watch dog, able to ward off would-be wrongdoers, and can also be a good guard or protection dog. This is due to the Irish wolfhound’s profound loyalty and willingness to protect its family from any threat, however they are not ideal for guarding houses or the owner's possessions as wolfhounds are typically not territorial, because they were bred primarily for hunting and therefore more independent. The breed becomes attached to both owners and other dogs they are raised with and is therefore not the most adaptable of breeds. They should not be territorially aggressive to other domestic dogs but are born with specialized skills and, it is common for hounds at play to course another dog. This is a specific hunting behavior, not a fighting or territorial domination behavior. However, male dogs can be aloof and aggressive towards other males. Most Wolfhounds are very gentle with children. The Irish Wolfhound is relatively easy to train. They respond well to firm, but gentle, consistent leadership. However, historically these dogs were required to work at great distances from their masters and think independently when hunting rather than waiting for detailed commands and this can still be seen in the breed. Irish Wolfhounds are often favored for their loyalty, affection, patience, and devotion. Although at some points in history they have been used as protection dogs, unlike other guard dog breeds, the Irish Wolfhound can be unreliable in this role as they are often indifferent toward strangers, although their size can be a natural deterrent. However, when protection is required this dog is never found wanting. When they or their family are in any perceived danger they will act decisively in fearless nature. There have been several cases of Irish Wolfhound attacks, which are deadly, however they are atypical of the breed. Author and Irish Wolfhound breeder Linda Glover believes the dogs' close affinity with humans makes them acutely aware and sensitive to ill will or malicious intentions leading to their excelling as a guardian rather than guard dog. Health Like many large dog breeds, Irish Wolfhounds have a relatively short lifespan. Published lifespan estimations vary between 6 and 10 years with 7 years being the average. Dilated cardiomyopathy and bone cancer are the leading cause of death and like all deep-chested dogs, gastric torsion (bloat) is common; the breed is affected by hereditary intrahepatic portosystemic shunt. In a privately funded study conducted under the auspices of the Irish Wolfhound Club of America and based on an owner survey, Irish Wolfhounds in the United States from 1966 to 1986 lived to a mean age of 6.47 and died most frequently of bone cancer. A more recent study by the UK Kennel Club puts the average age of death at 7 years. Studies have shown that neutering is associated with a higher risk of bone cancer in various breeds, with one study suggesting that castration of male Irish Wolfhounds should be avoided at least until the dog is fully grown. See also Dogs portal List of dog breeds References Further reading External links Irish Wolfhound Pedigree Database Dog breeds originating in Ireland FCI breeds National symbols of Ireland Royal Irish Regiment (1992) Sighthounds Wolf hunting
[ -0.06107424572110176, 0.48180878162384033, -0.9550220966339111, -0.6934901475906372, 0.0012485088082030416, 0.5996304154396057, 0.6827511787414551, 0.4252378046512604, -0.4084029197692871, -0.06986870616674423, -0.6864744424819946, 0.2944796681404114, -0.46193310618400574, 0.23419250547885...
15336
https://en.wikipedia.org/wiki/Italian%20Greyhound
Italian Greyhound
The Italian Greyhound () is an Italian breed of small sighthound. It may also be called the Italian Sighthound. History Small dogs of sighthound type have long been popular with nobility and royalty. Among those believed to have kept them are Frederick II, Duke of Swabia; members of the D'Este, Medici and Visconti families; the French kings Louis XI, Charles VIII, Charles IX, Louis XIII and Louis XIV; Frederick the Great of Prussia; Anne of Denmark; Catherine the Great and Queen Victoria. Dogs of this type have often been represented in paintings, notably by Giotto, Sassetta and Tiepolo. Dogs of this kind were taken in the first half of the nineteenth century to the United Kingdom, where they were known as Italian Greyhounds. The first volume of The Kennel Club Calendar and Stud Book, published in 1874, lists forty of them. The first breed association was the Italian Greyhound Club, founded in Britain in 1900. In the nine years from 2011 to 2019, the Ente Nazionale della Cinofilia Italiana recorded a total of 2557 new registrations of the Piccolo Levriero, with a minimum of 213 and a maximum of 333 per year. Characteristics The Italian Greyhound is the smallest of the sighthounds. It weighs no more than and stands at the withers. It is deep in the chest, with a tucked-up abdomen, long slender legs and a long neck that tapers down to a small head. The head is long and pointed. The gait should be high-stepping and well-sprung, with good forward extension in the trot, and a fast gallop. The coat may be solid black, grey or isabelline; white markings are accepted on the chest and feet only. Life expectancy is about 14 years. The Ortheopedic Foundation for Animals has found the Italian Greyhound to be the least affected by hip dysplasia of 157 breeds studied, with an incidence of 0. Use The original function of the Piccolo Levriero was to hunt hare and rabbit; it is capable of bursts of speed up to . Although assigned to the sighthound or hare-coursing groups by the Fédération Cynologique Internationale and the Ente Nazionale della Cinofilia Italiana, the Italian Sighthound is – as it was in the past – kept mostly as a companion dog. It is classified as a toy breed by the American Kennel Club and the Kennel Club of the United Kingdom. See also Dogs portal List of dog breeds References Further reading Maria Luisa Incontri Della Stufa (1956). Il piccolo levriero italiano nell'arte e nella storia . Firenze: Sansoni. [s.n.] (2004). Le razze italiane . Milano: Ente Nazionale della Cinofilia. External links Companion dogs Dog breeds originating in Italy FCI breeds Sighthounds
[ 0.2660876214504242, -0.29140815138816833, -0.43660837411880493, -0.12761317193508148, 0.33996057510375977, 0.20505478978157043, 0.1901029646396637, 0.23974911868572235, -0.2532929480075836, -0.3683808445930481, -0.37628528475761414, 0.7365166544914246, -0.235608771443367, 0.442835777997970...
15341
https://en.wikipedia.org/wiki/Into%20the%20Woods
Into the Woods
Into the Woods is a musical with music and lyrics by Stephen Sondheim, and a book by James Lapine. The musical intertwines the plots of several Brothers Grimm fairy tales, exploring the consequences of the characters' wishes and quests. The main characters are taken from "Little Red Riding Hood" (spelled "ridinghood" in the script), "Jack and the Beanstalk", "Rapunzel", and "Cinderella", as well as several others. The musical is tied together by a story involving a childless baker and his wife and their quest to begin a family (the original beginning of the Grimm Brothers' "Rapunzel"), their interaction with a witch who has placed a curse on them, and their interaction with other storybook characters during their journey. The musical debuted in San Diego at the Old Globe Theatre in 1986 and premiered on Broadway on November 5, 1987, where it won three major Tony Awards (Best Score, Best Book, and Best Actress in a Musical for Joanna Gleason), in a year dominated by The Phantom of the Opera (1988). The musical has since been produced many times, with a 1988 US national tour, a 1990 West End production, a 1997 tenth anniversary concert, a 2002 Broadway revival, a 2010 London revival, and in 2012 as part of New York City's outdoor Shakespeare in the Park series. A Disney film adaptation, directed by Rob Marshall, was released in 2014. The film grossed over $213 million worldwide, and received three nominations at both the Academy Awards and the Golden Globe Awards. Plot Act 1 A Narrator introduces four characters: Cinderella, who wishes to attend the King's festival; Jack who wishes his cow, Milky White, would give milk; a Baker; and his Wife, both of whom wish to have a child. Cinderella's step-family mocks her wish and Jack's mother laments that she wishes for wealth. Little Red Ridinghood appears at the bakery wishing for bread and sweets to bring to her grandmother's house. Cinderella's stepmother dumps a pot of lentils into the fireplace for Cinderella to clean up, promising that only then will they let her go to the festival. To help her, she calls for birds in the skies. Meanwhile, a witch appears at the bakery revealing to the baker and his wife that they are infertile because of a spell she placed on the baker's father many years ago. She explains that his father stole vegetables from the Witch's garden to appease his wife's appetite as she was pregnant. As he was leaving, he stole some beans for himself that he did not realize were magic. When they were taken from the garden, the Witch lost her beauty. In return, she stole their daughter Rapunzel and caused the spell over their family. She explains that the only way to lift the spell is to find four ingredients in the woods: a cow as white as milk, a cape as red as blood, hair as yellow as corn, and a slipper as pure as gold and bring them to her before three days is up. As Cinderella's step-family prepares to leave for the festival, they once again refuse Cinderella's wish to go with them. As he is preparing to leave, the Baker finds six magic beans in his father's old jacket. All begin their journeys into the woods: Jack to sell his beloved cow; Cinderella to seek advice from her mother's grave; Little Red to her grandmother's house; and the Baker, refusing his Wife's help, to find the ingredients ("Prologue: Into the Woods"). When she gets to her mother's grave, Cinderella repeats her wish to attend the festival and the spirit of her mother gifts her with a gown and golden slippers ("Cinderella at the Grave"). A Mysterious Man mocks Jack for valuing his cow more than a "sack of beans". Little Red meets a hungry Wolf who distracts her from her path, hatching a plan to eat both her and her grandmother ("Hello Little Girl"). The Baker, secretly followed by his Wife, meets Jack. Together, they convince Jack that the beans found in the jacket are magic, trade them for the cow and Jack bids Milky White a tearful farewell ("I Guess This Is Goodbye"). The Baker feels guilty about their deceit, but his wife reassures him that it will pay off when they get their child ("Maybe They're Magic"). It is revealed that the Witch has raised Rapunzel in a tall tower, only accessible by climbing Rapunzel's long, golden hair ("Our Little World"); a Prince spies Rapunzel and plans to meet her. When the Baker passes by Little Red's grandmother's house, he finds that the Wolf has eaten them both. In pursuit of her red cape, he stabs the Wolf and rescues Little Red and her grandmother. In return, Little Red gives him her cape, and reflects on her experiences ("I Know Things Now"). When Jack's Mother sees the exchange Jack has made for Milky White, she angrily tosses his beans aside, which grow into an enormous stalk. Cinderella flees the Festival, pursued by another Prince, and the Baker's Wife helps to hide her. When asked about the ball, Cinderella is unimpressed ("A Very Nice Prince"). Spotting Cinderella's gold slippers, the Baker's Wife chases her and loses Milky White as a clock chimes twelve times ("First Midnight"). Jack describes his adventure climbing the beanstalk ("Giants in the Sky") and gives the Baker gold he stole from the giants to buy back his cow. The Baker is hesitant about selling so Jack returns up the beanstalk to find more. The Mysterious Man questions what the Baker cares more about, the money or his child, and takes the money. Cinderella's Prince and Rapunzel's Prince lament over their loves ("Agony") and the Baker's Wife overhears their talk of a girl with golden hair. As she takes hair from Rapunzel, the Baker finds Milky White, aided by the Mysterious Man. The Baker admits they must work together and they hatch a plan to finally seize Cinderella's slipper ("It Takes Two"). Jack arrives with a golden egg as more money for the Baker but Milky White dies as midnight chimes ("Second Midnight"). The Witch discovers the Prince's visits and demands Rapunzel stay sheltered from the world ("Stay with Me"). Rapunzel refuses, and the Witch cuts off her hair, banishing her to a desert. Jack meets Little Red, now sporting a wolf skin cape and knife. He brags about his adventures in the sky, and mentions a golden harp owned by the Giant. She skeptically goads him into returning to the Giant's home to retrieve it. Cinderella, torn between staying with her Prince or escaping, leaves him one of her slippers, putting the decision into his hands ("On the Steps of the Palace"), and trades shoes with the Baker's Wife for the last magic bean, though she throws it away in the process. The Baker arrives with another cow and they rejoice over having all four objects, however, the Witch discovers that the Baker has covered a cow in flour to make it appear white. The Witch resurrects Milky White and Jack returns with the harp. A great crash is heard, and Jack's mother reports a dead Giant in her backyard, though no one pays attention. The Witch instructs the Baker to feed the objects to Milky White, though no milk is produced. The Witch learns that the hair is Rapunzel's and will not work because she had touched it. When the Mysterious Man proposes using corn silk instead, Milky White produces the potion and the Witch drinks it, making her young and beautiful once again. She also reveals that the Mysterious Man is the Baker's father, though he dies as soon as she drinks the potion. Cinderella's Prince seeks the girl who fits the slipper and the desperate stepsisters mutilate their feet, though the Prince sees through it, eventually seeing Cinderella and realizing that she is the one ("Careful My Toe"). Rapunzel is found by her Prince and as the Witch attempts to curse her, she realizes that in exchange for her beauty, she has lost her powers. At Cinderella's wedding, her stepsisters are blinded by birds, and the Baker's Wife, now pregnant, thanks Cinderella for her help. Congratulating themselves on living happily ("Ever After"), the characters fail to notice another beanstalk growing. Act 2 The Narrator continues, "Once Upon a Time... Later". Everyone still has wishes: the Baker and his Wife face new frustrations with their infant son; newly rich Jack misses the kingdom in the sky; Cinderella is bored with life in the palace ("So Happy"); but all are still relatively content. With a tremendous crash, a Giant's foot destroys the Witch's garden, and damages the Baker's home. The Baker travels to the palace, but his warning is ignored by the Prince's Steward. Returning home, he finds Little Red on her way to Granny's; he and his Wife escort her. Jack decides to slay the Giant and Cinderella investigates her mother's disturbed grave. Everyone returns to the woods, but now "the skies are strange, the winds are strong" ("Into the Woods" Reprise). Rapunzel, driven mad, also flees to the woods. Her Prince follows and meets his brother; they confess their lust for two new women, Snow White and Sleeping Beauty ("Agony" Reprise). The Baker, his Wife, and Little Red find Cinderella's family and the Steward, who reveal the castle was set upon by the Giant. The Witch brings news that the Giant destroyed the village and the Baker's house. The Giantess – widow of the Giant who Jack killed – appears, seeking revenge. The group decides to offer up the Narrator as a sacrifice. Jack's mother defends her son. This angers the Giantess, and the Steward keeps Jack's mother quiet and ends up killing her. As the Giantess leaves to try and find Jack, Rapunzel gets trampled ("Witch's Lament"). The Baker pleas for The Royal Family to stay and fight. However, they decide to flee instead.The Witch vows to find Jack and give him to the Giantess. Not wanting anything to happen to Jack, the Baker and his Wife split up to find him first. Cinderella's Prince then seduces the Baker's Wife ("Any Moment"). The Baker ends up finding Cinderella and convinces her to join their group. The Baker's Wife reflects on her affair with the Prince ("Moments in the Woods"), but ends up stumbling into the arms of the Giantess and is killed. The Baker, Little Red, and Cinderella await the return of the Baker's Wife when the Witch arrives with Jack, found weeping over the Baker's Wife's body. The Baker blames Jack and the two, along with Cinderella and Little Red argue and blame each other before all turning on the Witch ("Your Fault"). Chastising their inability to accept the consequences of their own actions, the Witch throws away the rest of her beans, thus regaining her powers so that she can vanish, abandoning the group ("Last Midnight"). Grief-stricken, the Baker flees, but is convinced by his father's spirit to face his responsibilities ("No More"). He returns and lays out a plan to kill the Giantess. Cinderella stays behind with the Baker's child and confronts her Prince over his infidelity; he explains his feelings of unfulfillment and that he was only raised to be charming, but not sincere, and she asks him to leave, which he reluctantly does. Little Red discovers her grandmother has been killed by the Giantess, as the Baker tells Jack that his mother is dead. Jack vows to kill the Steward but the Baker dissuades and comforts him, while Cinderella comforts Little Red. The Baker and Cinderella explain that choices have consequences, and everyone is connected ("No One Is Alone"). The four together slay the Giantess. The other characters – including the Royal Family, most of whom have starved to death, and the Princes with their new paramours (Sleeping Beauty and Snow White) – return to share one last set of morals. The survivors band together, the Baker, Cinderella, Jack and Little Red decide to live together, and the spirit of the Baker's Wife comforts her mourning husband, encouraging him to tell their child their story. The Baker begins to tell his son the tale, while the Witch and the rest of the characters, dead and alive, offer a final lesson: "Careful the things you say: Children will listen" ("Finale"). Musical numbers Act I Prologue: "Into the Woods" – Narrator, Cinderella, Jack, Baker, Baker's Wife, Stepmother, Florinda, Lucinda, Jack's Mother, Little Red Ridinghood, Witch, Cinderella's Father "Cinderella at the Grave" – Cinderella, Cinderella's Mother "Hello, Little Girl" – Wolf, Little Red Ridinghood "The Cow as White as Milk" – Baker, Baker's Wife* "I Guess This Is Goodbye" – Jack "Maybe They're Magic" – Baker's Wife "Rapunzel's Song" – Rapunzel* "Our Little World" – Witch, Rapunzel** "Maybe They're Magic" (reprise) – Baker* "I Know Things Now" – Little Red Ridinghood "A Very Nice Prince" – Cinderella, Baker's Wife "First Midnight" – Company "Giants in the Sky" – Jack "Rapunzel's Song" (reprise I) – Rapunzel* "Agony" – Cinderella's Prince, Rapunzel's Prince "Rapunzel's Song" (reprise II) – Rapunzel* "A Very Nice Prince" (reprise) – Cinderella* "It Takes Two" – Baker, Baker's Wife "Second Midnight" – Company* "Stay with Me" – Witch "On the Steps of the Palace" – Cinderella "Careful My Toe" – Narrator, Lucinda, Florinda, Stepmother, Cinderella's Mother* "So Happy" (Prelude) – Cinderella, Cinderella's Prince, Baker, Baker's Wife* "Ever After" – Narrator, Lucinda, Florinda, Witch, Company Act II Prologue: "So Happy" – Narrator, Cinderella, Jack, Baker, Baker's Wife, Cinderella's Prince, Jack's Mother, Stepmother, Florinda, Lucinda, Little Red Ridinghood "Agony" (reprise) – Cinderella's Prince, Rapunzel's Prince "Lament" – Witch "Any Moment" – Cinderella's Prince, Baker's Wife "Moments in the Woods" – Baker's Wife "Your Fault" – Jack, Baker, Witch, Cinderella, Little Red Ridinghood "Last Midnight" – Witch "No More" – Baker, Mysterious Man "No One Is Alone" – Cinderella, Little Red Ridinghood, Baker, Jack Finale: "Midnight/No One Is Alone/Children Will Listen/Into the Woods" – Baker's Wife, Witch, Company *Not included in the original Broadway cast recording **Added for the 1990 London production Productions Pre-Broadway San Diego production Into the Woods premiered at the Old Globe Theatre in San Diego, California, on December 4, 1986, and ran for 50 performances, under the direction of James Lapine. Many of the performers from that production appeared in the Broadway cast, but John Cunningham, who played the Narrator, Wolf and Steward, and George Coe, as the Mysterious Man and Cinderella's Father, were replaced by Tom Aldredge, among others. Kenneth Marshall as Cinderella's Prince was replaced by Robert Westenberg (who also played the Wolf); LuAnne Ponce, who played Little Red Ridinghood, was replaced by Danielle Ferland; Ellen Foley, the Witch, was replaced by Bernadette Peters; Kay McClelland, who played both Rapunzel and the Stepsister Florinda, stayed with the cast but only played Florinda, with Rapunzel being played by Pamela Winslow. The show evolved, and the most notable change was the addition of the song "No One Is Alone" in the middle of the run. Original Broadway production Into the Woods opened on Broadway at the Martin Beck Theatre on November 5, 1987, and closed on September 3, 1989, after 765 performances. It starred Bernadette Peters, Joanna Gleason, Chip Zien, Kim Crosby, Ben Wright, Danielle Ferland, Chuck Wagner, Merle Louise, Tom Aldredge, and Robert Westenberg. The musical was directed by James Lapine, with musical staging by Lar Lubovitch, settings by Tony Straiges, lighting by Richard Nelson, costumes by Ann Hould-Ward (based on original concepts by Patricia Zipprodt and Ann Hould-Ward), and makeup by Jeff Raum. The original production won the 1988 New York Drama Critics' Circle Award and the Drama Desk Award for Best Musical, and the original cast recording won a Grammy Award. The show was nominated for ten Tony Awards, and won three: Best Score (Stephen Sondheim), Best Book (James Lapine) and Best Actress in a Musical (Joanna Gleason). Peters left the show after almost five months due to a prior commitment to film the movie Slaves of New York. The Witch was then played by: Betsy Joslyn (from March 30, 1988); Phylicia Rashad (from April 14, 1988); Betsy Joslyn (from July 5, 1988); Nancy Dussault (from December 13, 1988); and Ellen Foley (from August 1, 1989, until the closing). Understudies for the part included Joslyn, Marin Mazzie, Lauren Vélez, Suzzanne Douglas, and Joy Franz. Other cast replacements included Dick Cavett as the Narrator (as of July 19, 1988) (for a temporary engagement after which Tom Aldredge returned), Edmund Lyndeck as the Mysterious Man, Patricia Ben Peterson as Cinderella, LuAnne Ponce returning to the role of Little Red Ridinghood, Jeff Blumenkrantz as Jack, Marin Mazzie as Rapunzel (as of March 7, 1989), Dean Butler as Rapunzel's Prince and Kay McClelland, Lauren Mitchell, Cynthia Sikes and Mary Gordon Murray as the Baker's Wife. In 1989, from May 23 to May 25 the full original cast (with the exception of Cindy Robinson as Snow White instead of Jean Kelly) reunited for three performances to tape the musical in its entirety for the Season 10 premiere episode of PBS’s American Playhouse, which first aired on March 15, 1991. The show was filmed professionally with seven cameras on the set of the Martin Beck Theater in front of an audience with certain elements changed from its standard production only slightly for the recording in order to better fit the screen rather than the stage such as the lighting, minor costume differences, and others. There were also pick up shots not filmed in front of an audience for various purposes. This video has since been released on Tape and DVD and on occasion, remastered and re-released. Tenth Anniversary benefit performances were held on November 9, 1997, at the Broadway Theatre (New York), with most of the original cast. Original cast understudies Chuck Wagner and Jeff Blumenkrantz played Cinderella's Prince/Wolf and the Steward in place of Robert Westenberg and Philip Hoffmann, while Jonathan Dokuchitz (who joined the Broadway production as an understudy in 1989) played Rapunzel's Prince in place of Wagner. This concert featured the duet "Our Little World," written for the first London production of the show. On November 9, 2014, most of the original cast reunited for two reunion concerts and discussion in Costa Mesa, California. Mo Rocca hosted the reunion and interviewed Stephen Sondheim and James Lapine as well as each cast member. Appearing were Bernadette Peters, Joanna Gleason, Chip Zien, Danielle Ferland, Ben Wright and real life husband and wife, Robert Westenberg and Kim Crosby. The same group presented this discussion/concert on June 21, 2015, at the Brooklyn Academy of Music, New York City. 1988 US tour production A United States tour began on November 22, 1988, with Cleo Laine playing the Witch, replaced by Betsy Joslyn in May 1989. Rex Robbins played the Narrator and Mysterious Man, Charlotte Rae played Jack's Mother, and the Princes were played by Chuck Wagner and Douglas Sills. The set was almost completely reconstructed, and there were certain changes to the script, changing certain story elements. The 10-month tour played cities around the country, such as Fort Lauderdale, Florida, Los Angeles, and Atlanta. The tour ran at the John F. Kennedy Center for the Performing Arts from June 1989 to July 16, 1989, with the reviewer for The Washington Post writing: "his lovely score – poised between melody and dissonance – is the perfect measure of our tenuous condition. The songs invariably follow the characters' thinking patterns, as they weigh their options and digest their experience. Needless to say, that doesn't make for traditional show-stoppers. But it does make for vivacity of another kind. And Sondheim's lyrics...are brilliant.... I think you'll find these cast members alert and engaging." Original London production The original West End production opened on September 25, 1990 at the Phoenix Theatre and closed on February 23, 1991 after 197 performances. It was directed by Richard Jones, and produced by David Mirvish, with set design by Richard Hudson, choreography by Anthony Van Laast, costumes by Sue Blane and orchestrations by Jonathan Tunick. The cast featured Julia McKenzie as the Witch, Ian Bartholomew as the Baker, Imelda Staunton as the Baker's Wife and Clive Carter as the Wolf/Cinderella's Prince. The show received seven Olivier Award nominations in 1991, winning for Best Actress in a Musical (Staunton) and Best Director of a Musical (Jones). The song "Our Little World" was added. This song was a duet sung between the Witch and Rapunzel giving further insight into the care the Witch has for her self-proclaimed daughter and the desire Rapunzel has to see the world outside of her tower. The overall feel of the show was a lot darker than that of the original Broadway production. Critic Michael Billington wrote, "But the evening's triumph belongs also to director Richard Jones, set designer Richard Hudson and costume designer Sue Blane who evoke exactly the right mood of haunted theatricality. Old-fashioned footlights give the faces a sinister glow. The woods themselves are a semi-circular, black-and-silver screen punctuated with nine doors and a crazy clock: they achieve exactly the 'agreeable terror' of Gustave Dore's children's illustrations. And the effects are terrific: doors open to reveal the rotating magnified eyeball or the admonitory finger of the predatory giant." 1998 London revival production A new intimate production of the show opened (billed as the first London revival) at the Donmar Warehouse on 16 November 1998, closing on 13 February 1999. This revival was directed by John Crowley and designed by his brother, Bob Crowley. The cast included Clare Burt as the Witch, Nick Holder as the Baker, Sophie Thompson as the Baker's Wife, Jenna Russell as Cinderella, Sheridan Smith as Little Red Ridinghood and Frank Middlemass as the Narrator/Mysterious Man. Russell later appeared as the Baker's Wife in the 2010 Regent's Park production. Thompson won the 1999 Olivier Award for Best Actress in a Musical for her performance, while the production itself was nominated for Outstanding Musical Production. 2002 Broadway revival production A revival opened at the Ahmanson Theatre in Los Angeles, running from February 1, 2002 to March 24, 2002. This production was directed and choreographed with the same principal cast that later ran on Broadway. The 2002 Broadway revival, directed by James Lapine and choreographed by John Carrafa, began previews on April 13, 2002 and opened April 30, 2002 at the Broadhurst Theatre, closing on December 29 after a run of 18 previews and 279 regular performances. It starred Vanessa Williams as the Witch, John McMartin as the Narrator, Stephen DeRosa as the Baker, Kerry O'Malley as the Baker's Wife, Gregg Edelman as Cinderella's Prince/Wolf, Christopher Sieber as Rapunzel's Prince/Wolf, Molly Ephraim as Little Red Ridinghood, Adam Wylie as Jack, and Laura Benanti as Cinderella. Judi Dench provided the pre-recorded voice of the Giant. Lapine revised the script slightly for this production, with a cameo appearance of the Three Little Pigs restored from the earlier San Diego production. Other changes, apart from numerous small dialogue changes, included the addition of the song "Our Little World," a duet for the Witch and Rapunzel written for the first London production, the addition of a second wolf in the song "Hello Little Girl" who competes for Little Red's attention with the first Wolf, the portrayal of Jack's cow by a live performer (Chad Kimball) in an intricate costume and new lyrics were written for "Last Midnight," now a menacing lullaby sung by the Witch to the Baker's baby. This production featured scenic design by Douglas W. Schmidt, costume design by Susan Hilferty, lighting design by Brian MacDevitt, sound design by Dan Moses Schreier and projection design by Elaine J. McCarthy. The revival won the Tony Awards for the Best Revival of a Musical and Best Lighting Design. This Broadway revival wardrobe is on display at the Costume World in South Florida. London Royal Opera House, 2007 A revival at the Royal Opera House's Linbury Studio in Covent Garden had a limited run from June 14 through June 30, 2007 followed by a short stint at The Lowry theatre, Salford Quays, Manchester between 4–7 July. The production mixed Opera singers, Musical Theatre actors as well as Film and television actors; including Anne Reid as Jack's Mother and Gary Waldhorn as the Narrator. The production itself, directed by Will Tuckett, was met with mixed reviews; although there were clear stand out performances. The production completely sold out three weeks before opening. As this was an 'opera' production, the show and its performers were overlooked for the 'musical' nominations in the 2008 Olivier Awards. This production featured Suzie Toase (Little Red), Peter Caulfield (Jack), Beverley Klein (Witch), Anna Francolini (Baker's Wife), Clive Rowe (Baker), Nicholas Garrett (Wolf), and Lara Pulver (Lucinda). This was the second Sondheim musical to be staged by the Opera House, following 2003's Sweeney Todd. Regent's Park Open Air Theatre production, 2010 The Olivier Award-winning Regent's Park Open Air Theatre production, directed by Timothy Sheader and choreographed by Liam Steel, ran for a six-week limited season from 6 August to 11 September 2010. The cast included Hannah Waddingham as the Witch, Mark Hadfield as the Baker, Jenna Russell as the Baker's wife, Helen Dallimore as Cinderella, and Judi Dench as the recorded voice of the Giant. Gareth Valentine was the Musical Director. The musical was performed outdoors in a wooded area. Whilst the book remained mostly unchanged, the subtext of the plot was dramatically altered by casting the role of the Narrator as a young school boy lost in the woods following a family argument – a device used to further illustrate the musical's themes of parenting and adolescence. The production opened to wide critical acclaim, much of the press commenting on the effectiveness of the open air setting. The Telegraph reviewer, for example, wrote: "It is an inspired idea to stage this show in the magical, sylvan surroundings of Regent's Park, and designer Soutra Gilmour has come up with a marvellously rickety, adventure playground of a set, all ladders, stairs and elevated walkways, with Rapunzel discovered high up in a tree." The New York Times reviewer commented: "The natural environment makes for something genuinely haunting and mysterious as night falls on the audience..." Stephen Sondheim attended twice, reportedly extremely pleased with the production. The production also won the Laurence Olivier Award for Best Musical Revival and Michael Xavier, who played Cinderella's Prince and the Wolf, was nominated for the Laurence Olivier Award for Best Performance in a Supporting Role in a Musical. The production was recorded in its entirety, available to download and watch from Digital Theatre. Central Park Delacorte Theater production, 2012 The Regent's Park Open Air Theatre production transferred to the Public Theater's 2012 summer series of free performances Shakespeare in the Park at the Delacorte Theater in Central Park, New York, with an American cast as well as new designers. Sheader again was the director and Steel served as co-director and choreographer. Performances were originally to run from July 24 (delayed from July 23 due to the weather) to August 25, 2012, but the show was extended till September 1, 2012. The cast included Amy Adams as the Baker's Wife, Donna Murphy as the Witch, Denis O'Hare as the Baker, Chip Zien as the Mysterious Man/Cinderella's Father, Jack Broderick as the young Narrator, Gideon Glick as Jack, Cooper Grodin as Rapunzel's Prince, Ivan Hernandez as Cinderella's Prince/Wolf, Tina Johnson as Granny, Josh Lamon as the Steward, Jessie Mueller as Cinderella, Laura Shoop as Cinderella's Mother, Tess Soltau as Rapunzel, and Glenn Close as the Voice of the Giant. The set was a "collaboration between original Open Air Theatre designer Soutra Gilmour and...John Lee Beatty, [and] rises over 50 feet in the air, with a series of tree-covered catwalks and pathways." The production was dedicated to Nora Ephron, who died earlier in 2012. In February 2012 and in May 2012, reports of a possible Broadway transfer surfaced with the production's principal actors in negotiations to reprise their roles. In January 2013, it was announced that the production will not transfer to Broadway due to scheduling conflicts. Hollywood Bowl production, 2019 For its annual fully staged musical event, the Hollywood Bowl produced a limited run of Into the Woods from July 26–28, 2019, directed and choreographed by Robert Longbottom. The cast included Skylar Astin as the Baker, Sierra Boggess as Cinderella, Chris Carmack as Rapunzel's Prince, Anthony Crivello as the Mysterious Man, Sutton Foster as the Baker's Wife, Edward Hibbert as the Narrator, Cheyenne Jackson as Cinderella's Prince and the Wolf, Hailey Kilgore as Rapunzel, Gaten Matarazzo as Jack, Patina Miller as the Witch, Rebecca Spencer as Jack's Mother, Shanice Williams as Little Red Ridinghood, and Whoopi Goldberg as the voice of the Giant. Other productions A production played in Sydney from 19 March 1993 to 5 June 1993 at the Drama Theatre, Sydney Opera House. It starred Judi Connelli, Geraldine Turner, Tony Sheldon, Philip Quast, Pippa Grandison, and D. J. Foster. A Melbourne Theatre Company played from 17 January 1998 to 21 February 1998 at the Playhouse, Victorian Arts Centre. It starred Rhonda Burchmore, John McTernan, Gina Riley, Lisa McCune, Peter Carroll, Tamsin Carroll and Robert Grubb. The first professional Spanish language production, Dentro del Bosque, was produced by University of Puerto Rico Repertory Theatre and premiered in San Juan at Teatro de la Universidad (University Theatre) on March 14, 2013. The cast included Víctor Santiago as Baker, Ana Isabelle as Baker's Wife and Lourdes Robles as the Witch A 25th anniversary co-production between Baltimore's Center Stage and Westport Country Playhouse directed by Mark Lamos was notable for casting original Little Red Ridinghood, Danielle Ferland, as the Baker's Wife. The cast included Erik Liberman, Lauren Kennedy, Jeffry Denman, Cheryl Stern, Dana Steingold, Justin Scott Brown, Jenny Latimer, Alma Cuervo, Nikka Lanzarone, Eleni Delopoulos, Nik Walker, Robert Lenzi, Britney Coleman, and Jeremy Lawrence. The production received 2011-2012 Connecticut Critics Circle Awards for Best Production, Best Ensemble, and Steingold's Little Red Ridinghood. The Roundabout Theatre production, directed by Noah Brody and Ben Steinfeld, began performances Off-Broadway at the Laura Pels Theatre on December 19, 2014 in previews, officially on January 22, 2015, and closed on April 12, 2015. Like the original Broadway production 28 years prior, this production had a try-out run at the Old Globe Theatre in San Diego, California from July 12, 2014 – August 17, 2014 with the opening night taking place on July 17. This new version is completely minimalistically reimagined by the Fiasco Theater Company, featuring only ten actors playing multiple parts, and one piano accompanist. The DreamCatcher Theatre production opened in January 2015 and played a sold-out run at the Adrienne Arsht Center in Miami, Florida. Tituss Burgess starred as the Witch, the first male actor to do so. The cast also included Arielle Jacobs as the Baker's Wife. The musical had a production at The Muny in Forest Park, St. Louis, Missouri running from July 21 through 28 2015. The cast included Heather Headley (Witch), Erin Dilly (Baker's Wife), Rob McClure (Baker), Ken Page (Narrator), Elena Shaddow (Cinderella). The Hart House Theatre production in Toronto, Ontario from January 15, 2016 to January 30, 2016. A production ran at the West Yorkshire Playhouse in Leeds in a collaboration with Opera North from 2 June 2016 to 25 June 2016. 2016 Tel Aviv production The Israeli premiere, אל תוך היער (El Toch Ha-ya-ar), opened in Tel Aviv in August 2016 for a limited run produced by The Tramp Productions and Stuff Like That, starring Roi Dolev as the Witch, the second male actor to do so. Characters The main and supporting characters of Into the Woods. The Witch: Mezzo-Soprano The Baker: Baritone The Baker's Wife: Mezzo-Soprano Cinderella: Soprano Little Red Riding Hood: Mezzo-Soprano Jack: Tenor Rapunzel: Soprano Cinderella's Prince / The Wolf: Baritone Rapunzel's Prince: Bass-Baritone The Narrator / The Mysterious Man: Bass Casting history The principal original casts of notable stage productions of Into the Woods. Notable Broadway replacements The Witch: Phylicia Rashad, Betsy Joslyn, Nancy Dussault, Ellen Foley The Baker's Wife: Cynthia Sikes Yorkin The Narrator/Mysterious Man: Dick Cavett Cinderella: Patricia Ben Peterson Jack: Jeff Blumenkrantz Rapunzel: Marin Mazzie Rapunzel's Prince: Dean Butler Notable Broadway revival replacements Cinderella: Erin Dilly Additional The Witch: Tituss Burgess, Heather Headley, Lauren Kennedy, Lourdes Robles, Lea Salonga The Baker: Rob McClure The Baker's Wife: Erin Dilly, Ana Isabelle Cinderella: Elena Shaddow Cinderella's Prince/The Wolf: Philip Quast, Hayden Tee Adaptations Junior version The musical has been adapted into a child-friendly version for use by schools and young companies, with the second act completely removed, as well as almost half the material from the first. The show is shortened from the original 2 and a half hours to fit in a 50-minute range, and the music transposed into keys that more easily fit young voices. It is licensed through Music Theatre International Broadway Junior musicals. Film A theatrical film adaptation of the musical was produced by Walt Disney Pictures, directed by Rob Marshall, and starring Meryl Streep, Emily Blunt, James Corden, Anna Kendrick, Chris Pine, Tracey Ullman, Christine Baranski, Lilla Crawford, Daniel Huttlestone, MacKenzie Mauzy, Billy Magnussen, and Johnny Depp. The film was released on December 25, 2014. It was a critical and commercial hit, grossing over $213 million worldwide. For her performance as the Witch, Streep was nominated for the Academy Award for Best Supporting Actress. The film also received Academy Award nominations for Best Production Design and Best Costume Design. Analysis of book and music In most productions of Into the Woods, including the original Broadway production, several parts are doubled. Cinderella's Prince and the Wolf, who share the characteristic of being unable to control their appetites, are usually played by the same actor. Similarly, so are the Narrator and the Mysterious Man, who share the characteristic of commenting on the story while avoiding any personal involvement or responsibility. Granny and Cinderella's Mother, who are both matriarchal characters in the story, are also typically played by the same person, who also gives voice to the nurturing but later murderous Giant's Wife. The show covers multiple themes: growing up, parents and children, accepting responsibility, morality, and finally, wish fulfillment and its consequences. The Time Magazine reviewers wrote that the play's "basic insight... is at heart, most fairy tales are about the loving yet embattled relationship between parents and children. Almost everything that goes wrong—which is to say, almost everything that can—arises from a failure of parental or filial duty, despite the best intentions." Stephen Holden wrote that the themes of the show include parent-child relationships and the individual's responsibility to the community. The witch isn't just a scowling old hag, but a key symbol of moral ambivalence. James Lapine said that the most unpleasant person (the Witch) would have the truest things to say and the "nicer" people would be less honest. In the Witch's words: "I'm not good; I'm not nice; I'm just right." Given the show's debut during the 1980s, the height of the US AIDS crisis, the work has been interpreted to be a parable about AIDS. In this interpretation, the Giant's Wife serves as a metaphor for HIV/AIDS, killing good and bad characters indiscriminately and forcing the survivors to band together to stop the threat and move on from the devastation, reflecting the devastation to many communities during the AIDS crisis. When asked about the thematic connection, Sondheim acknowledged that initial audiences interpreted it as an AIDS metaphor, but stated that the work was not intended to be specific. The score is also notable in Sondheim's output, because of its intricate reworking and development of small musical motifs. In particular, the opening words, "I wish", are set to the interval of a rising major second and this small unit is both repeated and developed throughout the show, just as Lapine's book explores the consequences of self-interest and "wishing". The dialogue in the show is characterized by the heavy use of syncopated speech. In many instances, the characters' lines are delivered with a fixed beat that follows natural speech rhythms, but is also purposely composed in eighth, sixteenth, and quarter note rhythms as part of a spoken song. Like many Sondheim/Lapine productions, the songs contain thought-process narrative, where characters converse or think aloud. Sondheim drew on parts of his troubled childhood when writing the show. In 1987, he told Time Magazine that the "father uncomfortable with babies [was] his father, and [the] mother who regrets having had children [was] his mother." Awards and nominations Original Broadway production Original London production 1999 London revival 2002 Broadway revival 2010 London revival 2012 New York revival 2014 Australian production 2015 Off-Broadway production References External links Into the Woods 2012 lortel.org Into the Woods 2015 lortel.org Libretto for Into the Woods Into the Woods on The Stephen Sondheim Reference Guide Illustrated Book of Into the Woods article, Sondheim.com (2004) Into the Woods at the Music Theatre International website Into the Woods JR. at the Music Theatre International website "Profile: Into the Woods", Ovrtur: International Database of Musicals 1987 musicals Broadway musicals Drama Desk Award-winning musicals Musicals based on secular traditions Laurence Olivier Award-winning musicals Musicals by James Lapine Musicals by Stephen Sondheim West End musicals Plays based on fairy tales Works based on European myths and legends Musicals based on works by Charles Perrault Fantasy theatre Tony Award-winning musicals American Playhouse Works based on Grimms' Fairy Tales
[ -0.08642080426216125, 0.30076125264167786, -0.584395706653595, -0.05819714069366455, 0.5304673910140991, -0.385057657957077, 1.1430963277816772, -0.2724679708480835, 0.16662649810314178, -0.2432897984981537, -0.40028709173202515, -0.017925996333360672, -0.1511005312204361, 0.32495346665382...
15342
https://en.wikipedia.org/wiki/Isaac%20Klein
Isaac Klein
Isaac Klein (September 5, 1905 – January 23, 1979) was a prominent rabbi and halakhic authority within Conservative Judaism. Personal life, education, and career Klein was born in the small village of Várpalánka, today part of Mukachevo, in what was then Hungary. He emigrated with his family to the United States in 1921. He earned a BA from City College of New York in 1931. Although nearing ordination at the Yeshiva University's Rabbi Isaac Elchanan Theological Seminary, he transferred to the Jewish Theological Seminary of America (JTSA), where he was ordained in 1934 and received the advanced Jewish legal degree of Hattarat Hora’ah under the great talmudic scholar Rabbi Professor Louis Ginzberg. He was one of only three people, along with Boaz Cohen and Louis Finkelstein, to ever to receive this degree from JTSA. Klein subsequently earned a PhD from Harvard under the pioneering academic of Judaic studies Harry Wolfson. He married the former Henriette Levine in 1932 and had three daughters, Hannah, Miriam, and Rivke. Devoted to his family, he dedicated his major work, A Guide to Jewish Religious Practice to his children, sons-in-law and 13 grandchildren listing each by name. Klein served as rabbi at Kadimoh Congregation in Springfield, Massachusetts from 1934 to 1953; Temple Emanu-El, Buffalo, New York, 1953–1968; Temple Shaarey Zedek, Buffalo, (which was created from the merger of Emanu-El with Temple Beth David in 1968), 1968–1972. A beloved Rabbi, he influenced generations of congregants and visiting students and, together with his wife who was an educator, founded Jewish day schools in both Springfield and Buffalo. Despite the difficulties facing a congregational Rabbi raising a family, Klein volunteered for the U.S. Army during World War II as a chaplain, motivated by a cause he saw as clearly right with important implications for the Jewish People. He served over 4 years, rising to the rank of Major and was an advisor to the high commissioner of the Occupation government. He also served on special assignments for Jewish soldiers in the U.S. Army in the 1950s, receiving the simulated rank of Brigadier General for these missions. His experiences in the war are described in his book The Anguish and the Ecstasy of a Jewish Chaplain. Role within Conservative Judaism Klein was a leader of the right-wing of the Conservative movement. He was president of the Rabbinical Assembly, 1958–1960, and a member of its Committee on Jewish Law and Standards, 1948–1979. He was the author of several books, notably, A Guide to Jewish Religious Practice. One of the outstanding halakhists of the movement, he served as a leading member of the Committee on Jewish Law and Standards from 1948 until his death in 1979. As a leading authority on halakha he authored many important teshuvot (responsa), many of which were published in his influential "Responsa and Halakhic Studies". From the 1950s to 1970s, he wrote a comprehensive guide to Jewish law that was used to teach halakha at the JTSA. In 1979 he assembled this into A Guide to Jewish Religious Practice, which is used widely by laypeople and rabbis within Conservative Judaism. Rabbinic thought The philosophy upon which A Guide to Jewish Religious Practice is written is stated in the foreword: "The premise on which Torah is based is that all aspects of life - leisure no less than business, worship or rites of passage (birth, bar mitzvah, marriage, divorce, death) - are part of the covenant and mandate under which every Jew is to serve God in everything he does. In the eyes of Torah there is, strictly speaking, no such thing as the purely private domain, for even in solitude - be it the privacy of the bath or the unconsciousness of sleep - one has the capacity and the duty to serve God." This message, of life seen in consonance with the dictates of Judaism, permeates many pages of the book. Rabbi Louis Finkelstein, scholar of the JTSA, wrote: "There are those who would think that we have but two alternatives, to reject or to accept the law, but in either case to treat it as a dead letter. Both of these alternatives are repugnant to the whole tradition of Judaism. Jewish law must be preserved but it is subject to interpretation by those who have mastered it, and the interpretation placed upon it by duly authorized masters in every generation must be accepted with as much reverence as those which were given in previous generations." This understanding of traditional preservation of the law through its continuous interpretation lies at the heart of Klein's extensive study of Jewish law. Klein's papers are located at the University Archives, State University of New York at Buffalo (see finding aid). The archives include fourteen reels of microfilm. The collection consists of extensive writings by Klein on traditional Jewish practice and law. This includes manuscript material for his books Guide to Jewish Religious Practice (1979), The Ten Commandments in a Changing World (1963), The Anguish and the Ecstasy of a Jewish Chaplain (1974), and his translation of The Code of Maimonides (Mishneh Torah): Book 7, The Book of Agriculture (1979). The collection also contains speeches, sermons, articles, and remarks from the Conservative Jewish viewpoint on subjects such as Jewish medical ethics, dietary laws, adoption, and marriage and divorce. Meeting minutes, annual reports, bulletins, and sermons relating to Klein's rabbinical vocations in Springfield, Massachusetts and Buffalo, New York are also included. The papers contain photographs, wartime letters, and military records of Klein documenting his service in World War II as a director of Jewish religious affairs in Germany. External links About Klein's "A Guide to Jewish Religious Practice" Excerpts from "A Guide to Jewish Religious Practice" Isaac Klein Finding Aid for the Rabbi Isaac Klein Papers, 1925-1979. University Archives, The State University of New York at Buffalo. Images of Rabbi Isaac Klein on New York Heritage American Conservative rabbis Harvard University alumni Hungarian Jews Hungarian emigrants to the United States Hungarian rabbis American people of Hungarian-Jewish descent People from Springfield, Massachusetts Religious leaders from Buffalo, New York World War II chaplains 1905 births 1979 deaths City College of New York alumni 20th-century American rabbis
[ 0.11005257815122604, 0.47679415345191956, -0.7602993249893188, -0.29576098918914795, -0.7514510750770569, 0.5197654366493225, 0.8060963749885559, -0.15758630633354187, 0.36236366629600525, -0.5357705354690552, -0.12391982227563858, -0.18676245212554932, 0.04995046928524971, 0.5356913208961...
15343
https://en.wikipedia.org/wiki/Intron
Intron
An intron (for intragenic region) is any nucleotide sequence within a gene that is removed by RNA splicing during maturation of the final RNA product. In other words, introns are non-coding regions of an RNA transcript, or the DNA encoding it, that are eliminated by splicing before translation. The word intron is derived from the term intragenic region, i.e. a region inside a gene. The term intron refers to both the DNA sequence within a gene and the corresponding sequence in RNA transcripts. Sequences that are joined in the final mature RNA after RNA splicing are exons. Introns are found in the genes of most organisms and many viruses and can be located in a wide range of genes, including those that generate proteins, ribosomal RNA (rRNA) and transfer RNA (tRNA). When proteins are generated from intron-containing genes, RNA splicing takes place as part of the RNA processing pathway that follows transcription and precedes translation. Discovery and etymology Introns were first discovered in protein-coding genes of adenovirus, and were subsequently identified in genes encoding transfer RNA and ribosomal RNA genes. Introns are now known to occur within a wide variety of genes throughout organisms, bacteria, and viruses within all of the biological kingdoms. The fact that genes were split or interrupted by introns was discovered independently in 1977 by Phillip Allen Sharp and Richard J. Roberts, for which they shared the Nobel Prize in Physiology or Medicine in 1993. The term intron was introduced by American biochemist Walter Gilbert: "The notion of the cistron [i.e., gene] ... must be replaced by that of a transcription unit containing regions which will be lost from the mature messenger – which I suggest we call introns (for intragenic regions) – alternating with regions which will be expressed – exons." (Gilbert 1978) The term intron also refers to intracistron, i.e., an additional piece of DNA that arises within a cistron. Although introns are sometimes called intervening sequences, the term "intervening sequence" can refer to any of several families of internal nucleic acid sequences that are not present in the final gene product, including inteins, untranslated regions (UTR), and nucleotides removed by RNA editing, in addition to introns. Distribution The frequency of introns within different genomes is observed to vary widely across the spectrum of biological organisms. For example, introns are extremely common within the nuclear genome of jawed vertebrates (e.g. humans and mice), where protein-coding genes almost always contain multiple introns, while introns are rare within the nuclear genes of some eukaryotic microorganisms, for example baker's/brewer's yeast (Saccharomyces cerevisiae). In contrast, the mitochondrial genomes of vertebrates are entirely devoid of introns, while those of eukaryotic microorganisms may contain many introns. A particularly extreme case is the Drosophila dhc7 gene containing a ≥3.6 megabase (Mb) intron, which takes roughly three days to transcribe. On the other extreme, a recent study suggests that the shortest known metazoan intron length is 30 base pairs (bp) belonging to the human MST1L gene. The shortest known introns belong to the heterotrich ciliates, such as Stentor coeruleus, in which most (> 95%) introns are 15 or 16 bp long. Classification Splicing of all intron-containing RNA molecules is superficially similar, as described above. However, different types of introns were identified through the examination of intron structure by DNA sequence analysis, together with genetic and biochemical analysis of RNA splicing reactions. At least four distinct classes of introns have been identified: Introns in nuclear protein-coding genes that are removed by spliceosomes (spliceosomal introns) Introns in nuclear and archaeal transfer RNA genes that are removed by proteins (tRNA introns) Self-splicing group I introns that are removed by RNA catalysis Self-splicing group II introns that are removed by RNA catalysis Group III introns are proposed to be a fifth family, but little is known about the biochemical apparatus that mediates their splicing. They appear to be related to group II introns, and possibly to spliceosomal introns. Spliceosomal introns Nuclear pre-mRNA introns (spliceosomal introns) are characterized by specific intron sequences located at the boundaries between introns and exons. These sequences are recognized by spliceosomal RNA molecules when the splicing reactions are initiated. In addition, they contain a branch point, a particular nucleotide sequence near the 3' end of the intron that becomes covalently linked to the 5' end of the intron during the splicing process, generating a branched (lariat) intron. Apart from these three short conserved elements, nuclear pre-mRNA intron sequences are highly variable. Nuclear pre-mRNA introns are often much longer than their surrounding exons. tRNA introns Transfer RNA introns that depend upon proteins for removal occur at a specific location within the anticodon loop of unspliced tRNA precursors, and are removed by a tRNA splicing endonuclease. The exons are then linked together by a second protein, the tRNA splicing ligase. Note that self-splicing introns are also sometimes found within tRNA genes. Group I and group II introns Group I and group II introns are found in genes encoding proteins (messenger RNA), transfer RNA and ribosomal RNA in a very wide range of living organisms., Following transcription into RNA, group I and group II introns also make extensive internal interactions that allow them to fold into a specific, complex three-dimensional architecture. These complex architectures allow some group I and group II introns to be self-splicing, that is, the intron-containing RNA molecule can rearrange its own covalent structure so as to precisely remove the intron and link the exons together in the correct order. In some cases, particular intron-binding proteins are involved in splicing, acting in such a way that they assist the intron in folding into the three-dimensional structure that is necessary for self-splicing activity. Group I and group II introns are distinguished by different sets of internal conserved sequences and folded structures, and by the fact that splicing of RNA molecules containing group II introns generates branched introns (like those of spliceosomal RNAs), while group I introns use a non-encoded guanosine nucleotide (typically GTP) to initiate splicing, adding it on to the 5'-end of the excised intron. Biological functions and evolution While introns do not encode protein products, they are integral to gene expression regulation. Some introns themselves encode functional RNAs through further processing after splicing to generate noncoding RNA molecules. Alternative splicing is widely used to generate multiple proteins from a single gene. Furthermore, some introns play essential roles in a wide range of gene expression regulatory functions such as nonsense-mediated decay and mRNA export. The biological origins of introns are obscure. After the initial discovery of introns in protein-coding genes of the eukaryotic nucleus, there was significant debate as to whether introns in modern-day organisms were inherited from a common ancient ancestor (termed the introns-early hypothesis), or whether they appeared in genes rather recently in the evolutionary process (termed the introns-late hypothesis). Another theory is that the spliceosome and the intron-exon structure of genes is a relic of the RNA world (the introns-first hypothesis). There is still considerable debate about the extent to which of these hypotheses is most correct. The popular consensus at the moment is that introns arose within the eukaryote lineage as selfish elements. Early studies of genomic DNA sequences from a wide range of organisms show that the intron-exon structure of homologous genes in different organisms can vary widely. More recent studies of entire eukaryotic genomes have now shown that the lengths and density (introns/gene) of introns varies considerably between related species. For example, while the human genome contains an average of 8.4 introns/gene (139,418 in the genome), the unicellular fungus Encephalitozoon cuniculi contains only 0.0075 introns/gene (15 introns in the genome). Since eukaryotes arose from a common ancestor (common descent), there must have been extensive gain or loss of introns during evolutionary time. This process is thought to be subject to selection, with a tendency towards intron gain in larger species due to their smaller population sizes, and the converse in smaller (particularly unicellular) species. Biological factors also influence which genes in a genome lose or accumulate introns. Alternative splicing of exons within a gene after intron excision acts to introduce greater variability of protein sequences translated from a single gene, allowing multiple related proteins to be generated from a single gene and a single precursor mRNA transcript. The control of alternative RNA splicing is performed by a complex network of signaling molecules that respond to a wide range of intracellular and extracellular signals. Introns contain several short sequences that are important for efficient splicing, such as acceptor and donor sites at either end of the intron as well as a branch point site, which are required for proper splicing by the spliceosome. Some introns are known to enhance the expression of the gene that they are contained in by a process known as intron-mediated enhancement (IME). Actively transcribed regions of DNA frequently form R-loops that are vulnerable to DNA damage. In highly expressed yeast genes, introns inhibit R-loop formation and the occurrence of DNA damage. Genome-wide analysis in both yeast and humans revealed that intron-containing genes have decreased R-loop levels and decreased DNA damage compared to intronless genes of similar expression. Insertion of an intron within an R-loop prone gene can also suppress R-loop formation and recombination. Bonnet et al. (2017) speculated that the function of introns in maintaining genetic stability may explain their evolutionary maintenance at certain locations, particularly in highly expressed genes. Starvation adaptation The physical presence of introns promotes cellular resistance to starvation via intron enhanced repression of ribosomal protein genes of nutrient-sensing pathways. As mobile genetic elements Introns may be lost or gained over evolutionary time, as shown by many comparative studies of orthologous genes. Subsequent analyses have identified thousands of examples of intron loss and gain events, and it has been proposed that the emergence of eukaryotes, or the initial stages of eukaryotic evolution, involved an intron invasion. Two definitive mechanisms of intron loss, reverse transcriptase-mediated intron loss (RTMIL) and genomic deletions, have been identified, and are known to occur. The definitive mechanisms of intron gain, however, remain elusive and controversial. At least seven mechanisms of intron gain have been reported thus far: intron transposition, transposon insertion, tandem genomic duplication, intron transfer, intron gain during double-strand break repair (DSBR), insertion of a group II intron, and intronization. In theory it should be easiest to deduce the origin of recently gained introns due to the lack of host-induced mutations, yet even introns gained recently did not arise from any of the aforementioned mechanisms. These findings thus raise the question of whether or not the proposed mechanisms of intron gain fail to describe the mechanistic origin of many novel introns because they are not accurate mechanisms of intron gain, or if there are other, yet to be discovered, processes generating novel introns. In intron transposition, the most commonly purported intron gain mechanism, a spliced intron is thought to reverse splice into either its own mRNA or another mRNA at a previously intron-less position. This intron-containing mRNA is then reverse transcribed and the resulting intron-containing cDNA may then cause intron gain via complete or partial recombination with its original genomic locus. Transposon insertions can also result in intron creation. Such an insertion could intronize the transposon without disrupting the coding sequence when a transposon inserts into the sequence AGGT, resulting in the duplication of this sequence on each side of the transposon. It is not yet understood why these elements are spliced, whether by chance, or by some preferential action by the transposon. In tandem genomic duplication, due to the similarity between consensus donor and acceptor splice sites, which both closely resemble AGGT, the tandem genomic duplication of an exonic segment harboring an AGGT sequence generates two potential splice sites. When recognized by the spliceosome, the sequence between the original and duplicated AGGT will be spliced, resulting in the creation of an intron without alteration of the coding sequence of the gene. Double-stranded break repair via non-homologous end joining was recently identified as a source of intron gain when researchers identified short direct repeats flanking 43% of gained introns in Daphnia. These numbers must be compared to the number of conserved introns flanked by repeats in other organisms, though, for statistical relevance. For group II intron insertion, the retrohoming of a group II intron into a nuclear gene was proposed to cause recent spliceosomal intron gain. Intron transfer has been hypothesized to result in intron gain when a paralog or pseudogene gains an intron and then transfers this intron via recombination to an intron-absent location in its sister paralog. Intronization is the process by which mutations create novel introns from formerly exonic sequence. Thus, unlike other proposed mechanisms of intron gain, this mechanism does not require the insertion or generation of DNA to create a novel intron. The only hypothesized mechanism of recent intron gain lacking any direct evidence is that of group II intron insertion, which when demonstrated in vivo, abolishes gene expression. Group II introns are therefore likely the presumed ancestors of spliceosomal introns, acting as site-specific retroelements, and are no longer responsible for intron gain. Tandem genomic duplication is the only proposed mechanism with supporting in vivo experimental evidence: a short intragenic tandem duplication can insert a novel intron into a protein-coding gene, leaving the corresponding peptide sequence unchanged. This mechanism also has extensive indirect evidence lending support to the idea that tandem genomic duplication is a prevalent mechanism for intron gain. The testing of other proposed mechanisms in vivo, particularly intron gain during DSBR, intron transfer, and intronization, is possible, although these mechanisms must be demonstrated in vivo to solidify them as actual mechanisms of intron gain. Further genomic analyses, especially when executed at the population level, may then quantify the relative contribution of each mechanism, possibly identifying species-specific biases that may shed light on varied rates of intron gain amongst different species. See also Structure: Exon mRNA Eukaryotic chromosome fine structure Small t intron Splicing: Alternative splicing Exitron Minor spliceosome Outron Function MicroRNA Others: Exon shuffling Intein Interrupted gene Noncoding DNA Noncoding RNA Selfish DNA Twintron Exon-intron database References External links A search engine for exon/intron sequences defined by NCBI Bruce Alberts, Alexander Johnson, Julian Lewis, Martin Raff, Keith Roberts, and Peter Walter Molecular Biology of the Cell, 2007, . Fourth edition is available online through the NCBI Bookshelf: link Jeremy M Berg, John L Tymoczko, and Lubert Stryer, Biochemistry 5th edition, 2002, W H Freeman. Available online through the NCBI Bookshelf: link Intron finding tool for plant genomic sequences Exon-intron graphic maker Gene expression DNA Spliceosome RNA splicing Non-coding DNA
[ -0.09138847887516022, 0.014317478984594345, -0.4361141324043274, -0.232697993516922, 0.294523149728775, -0.16024872660636902, 0.1605260968208313, 0.55919349193573, 0.43169233202934265, -0.4503060281276703, -0.12471672147512436, 0.06714174151420593, -0.6552234888076782, 0.6315032839775085, ...
15345
https://en.wikipedia.org/wiki/IEE
IEE
IEE may stand for: Industrial Electronics Engineers, an aerospace display manufacturer; see nimo tube Initial Environmental Evaluation, a preliminary environmental impact assessment Institute for Energy Efficiency, a research institute at the University of California, Santa Barbara Institute for Energy & Environment, at New Mexico State University Institution of Electrical Engineers, a British professional organisation now part of the Institution of Engineering and Technology Instituto de Estudos Empresariais, a Brazilian non-profit Intuitive Ethical Extrovert, in socionics Intelligent Energy Europe, CIP Operational programme See also Institute of Electrical and Electronics Engineers (IEEE)
[ 0.5914619565010071, 0.10077624022960663, -0.0849481001496315, 0.16238421201705933, 0.11424592137336731, -0.1656997799873352, -0.14066490530967712, 0.2631203532218933, 0.15901252627372742, -0.3114578127861023, -0.5148369073867798, 0.3210415840148926, -0.046868473291397095, 0.154846251010894...
15346
https://en.wikipedia.org/wiki/Institute%20of%20National%20Remembrance
Institute of National Remembrance
The Institute of National Remembrance – Commission for the Prosecution of Crimes against the Polish Nation (, abbreviated IPN) is a Polish state research institute in charge of education and archives with investigative and lustration powers. The IPN was established by the Polish parliament by the Act on the Institute of National Remembrance of 18 December 1998, which incorporated the earlier Main Commission for the Prosecution of Crimes against the Polish Nation of 1991. IPN itself had replaced a body on Nazi crimes established in 1945. In 2018, IPN's mission statement was amended by the controversial Amendment to the Act on the Institute of National Remembrance to include "protecting the reputation of the Republic of Poland and the Polish Nation". The IPN investigates Nazi and Communist crimes committed between 1917 and 1990, documents its findings, and disseminates them to the public. Some scholars have criticized the IPN for politicization, especially under Law and Justice governments. The IPN began its activities on 1 July 2000. The IPN is a founding member of the Platform of European Memory and Conscience. Since 2020, the IPN headquarters have been located at Postępu 18 Street in Warsaw. The IPN has eleven branches in other cities and seven delegation offices. Purpose The IPN's main areas of activity, in line with its original mission statement, include researching and documenting the losses which were suffered by the Polish Nation as a result of World War II and during the post-war totalitarian period. The IPN informs about the patriotic traditions of resistance against the occupational forces, and the Polish citizens' fight for sovereignty of the nation, including their efforts in defence of freedom and human dignity in general. The IPN investigates crimes committed on Polish soil against Polish citizens as well as people of other citizenships wronged in the country. War crimes which are not affected by statute of limitations according to Polish law include: Crimes of the Soviet and Polish Communist regimes committed in the country from 17 September 1939 until the Fall of Communism on 31 December 1989. Deportations to the Soviet Union of Polish soldiers of Armia Krajowa, and other Polish resistance organizations as well as Polish inhabitants of the former Polish eastern territories. Pacifications of Polish communities between Vistula and Bug rivers in the years 1944 to 1947 by UB-NKVD, Crimes committed by the law enforcement agencies of the Polish People's Republic, particularly Ministry of Public Security of Poland and Main Directorate of Information of the Polish Army. Crimes under the category of war crimes and crimes against humanity. According to the IPN, it is its duty to prosecute crimes against peace and humanity, as much as war crimes. Its mission includes the need to compensate for damages which were suffered by the repressed and harmed people at a time when human rights were disobeyed by the state, and educate the public about recent history of Poland. IPN collects, organises and archives all documents about the Polish Communist security apparatus active from 22 July 1944 to 31 December 1989. Following the election of the Law and Justice party, the government formulated in 2016 a new IPN law. The 2016 law stipulated that the IPN should oppose publications of false information that dishonors or harms the Polish nation. It also called for popularizing history as part of "an element of patriotic education". The new law also removed the influence of academia and the judiciary on the IPN. A 2018 amendment to the law, added article 55a that attempts to defend the "good name" of Poland. Initially conceived as a criminal offense (3 years of jail) with an exemption for arts and research, following an international outcry, the article was modified to a civil offense that may be tried in civil courts and the exemption was deleted. Defamation charges under the act may be made by the IPN as well as by accredited NGOs such as the Polish League Against Defamation. By the same law, the institution's mission statement was changed to include "protecting the reputation of the Republic of Poland and the Polish Nation". Organisation IPN was created by special legislation on 18 December 1998. The IPN is divided into: Main Commission for the Prosecution of Crimes against the Polish Nation (Główna Komisja Ścigania Zbrodni Przeciwko Narodowi Polskiemu) Bureau of Provision and Archivization of Documents (Biuro Udostępniania i Archiwizacji Dokumentów) Bureau of Public Education (or Public Education Office, Biuro Edukacji Publicznej) Lustration Bureau (Biuro Lustracyjne) (new bureau, since October 2006) local chapters. On 29 April 2010, acting president Bronislaw Komorowski signed into law a parliamentary act that reformed the Institute of National Remembrance. Director IPN is governed by the director, who has a sovereign position that is independent of the Polish state hierarchy. The director may not be dismissed during his term unless he commits a harmful act. Prior to 2016, the election of the director was a complex procedure, which involves the selection of a panel of candidates by the IPN Collegium (members appointed by the Polish Parliament and judiciary). The Polish Parliament (Sejm) then elects one of the candidates, with a required supermajority (60%). The director has a 5-year term of office. Following 2016 legislation in the PiS controlled parliament, the former pluralist Collegium was replaced with a nine-member Collegium composed of PiS supporters, and the Sejm appoints the director after consulting with the College without an election between candidates. Leon Kieres The first director of the IPN was Leon Kieres, elected by the Sejm for five years on 8 June 2000 (term 30 June 2000 – 29 December 2005). The IPN granted some 6,500 people the "victim of communism" status and gathered significant archive material. The IPN faced difficulties since it was new and also since the Democratic Left Alliance (containing former communists) attempted to close the IPN. The publication of Neighbors: The Destruction of the Jewish Community in Jedwabne, Poland by Jan T. Gross, proved to be a lifeline for the IPN as Polish president Aleksander Kwaśniewski intervened to save the IPN since he deemed the IPN's research to be important as part of Jewish-Polish reconciliation and "apology diplomacy". Janusz Kurtyka The second director was Janusz Kurtyka, elected on 9 December 2005 with a term that started 29 December 2005 until his death in the Smolensk airplane crash on 10 April 2010. The elections were controversial, as during the elections a leak against Andrzej Przewoźnik accusing him of collaboration with Służba Bezpieczeństwa caused him to withdraw his candidacy. Przewoźnik was cleared of the accusations only after he had lost the election. In 2006, the IPN opened a "Lustration Bureau" that increased the director's power. The bureau was assigned the task of examining the past of all candidates to public office. Kurtyka widened archive access to the public and shifted focus from compensating victims to researching collaboration. Franciszek Gryciuk In 1999, historian Franciszek Gryciuk was appointed to the Collegium of the IPN, which he chaired 2003–2004. From June 2008 to June 2011, he was Vice President of the IPN. He was acting director 2010–2011, between the death of the IPN's second President, Janusz Kurtyka, in the 2010 Polish Air Force Tu-154 crash and the election of Łukasz Kamiński by the Polish Parliament as the third director. Łukasz Kamiński Łukasz Kamiński, was elected by the Sejm in 2011 following the death of his predecessor. Kamiński headed the Wroclaw Regional Bureau of Public Education prior to his election. During his term, the IPN faced a wide array of criticism calling for an overhaul or even replacement. Critics founds fault in the IPN being a state institution, the lack of historical knowledge of its prosecutors, a relatively high number of microhistories with a debatable methodology, overuse of the martyrology motif, research methodology, and isolationism from the wider research community. In response, Kamiński implemented several changes, including organizing public debates with outside historians to counter the charge of isolationism and has suggested refocusing on victims as opposed to agents. Jarosław Szarek On 22 July 2016 Jarosław Szarek was appointed to head IPN. He dismissed Krzysztof Persak, co-author of the 2002 two-volume IPN study on the Jedwabne pogrom. In subsequent months, IPN featured in media headlines for releasing controversial documents, including some relating to Lech Wałęsa, for memory politics conducted in schools, for efforts to change Communist street names, and for legislation efforts. According to historian Idesbald Goddeeris, this marks a return of politics to the IPN. Karol Nawrocki On 23 July 2021 Karol Nawrocki was appointed to head IPN. Activities Research The research conducted by IPN from December 2000 falls into four main topic areas: Security Apparatus and Civil Resistance (with separate sub-projects devoted to Political Processes and Prisoners 1944–1956, Soviet Repressions and Crimes committed against Polish Citizens and Martial Law: a Glance after Twenty Years); Functioning of the repression apparatus (state security and justice organs) – its organizational structure, cadres and relations with other state authority and party organs Activities of the repression apparatus directed against particular selected social groups and organizations Structure and methods of functioning of the People's Poland security apparatus Security apparatus in combat with the political and military underground 1944–1956 Activities of the security apparatus against political emigreés Security apparatus in combat with the Church and freedom of belief Authorities dealing with social crises and democratic opposition in the years 1956–1989 f) List of those repressed and sentenced to death Bibliography of the conspiracy, resistance and repression 1944–1989 War, Occupation and the Polish Underground; deepening of knowledge about the structures and activities of the Polish Underground State examination of the human fates in the territories occupied by the Soviet regime and of Poles displaced into the Soviet Union assessment of sources on the living conditions under the Soviet and German Nazi occupations evaluation of the state of research concerning the victims of the war activities and extermination policy of the Soviet and German Nazi occupiers examining the Holocaust (Extermination of Jews) conducted by Nazis in the Polish territories Response of the Polish Underground State to the extermination of Jewish population The Polish Underground press and the Jewish question during the German Nazi occupation Poles and Other Nations in the Years 1939–1989 (with a part on Poles and Ukrainians); Poles and Ukrainians Poles and Lithuanians Poles and Germans Communist authorities – Belarusians – Underground Fate of Jewish people in the People's Republic of Poland Gypsies in Poland Peasants and the People's Authority 1944–1989 (on the situation of peasants and the rural policy in the years 1944–1989) inhabitants of the rural areas during the creation of the totalitarian regime in Poland; peasant life during the Sovietisation of Poland in the years 1948–1956; attitudes of the inhabitants of rural areas towards the state-Church conflict in the years 1956–1970; the role of peasants in the anti-Communist opposition of the 1970s and 1980s. Education The IPN's Public Education Office (BEP) vaguely defined role in the IPN act is to inform society of Communist and Nazi crimes and institutions. This vaguely defined role allowed Paweł Machcewicz, BEP's director in 2000, freedom to create a wide range of activities. Researchers at the IPN conduct not only research but are required to take part in public outreach. BEP has published music CDs, DVDs, and serials. It has founded "historical clubs" for debates and lectures. It has also organized outdoor historical fairs, picnic, and games. The IPN Bulletin () is a high circulation popular-scientific journal, intended for lay readers and youth. Some 12,000 of 15,000 copies of the Bulletin are distributed free of charge to secondary schools in Poland, and the rest are sold in bookstores. The Bulletin contains: popular-scientific and academic articles, polemics, manifestos, appeals to readers, promotional material on the IPN and BEP, denials and commentary on reports in the news, as well as multimedia supplements. The IPN also publishes the Remembrance and Justice () scientific journal. The IPN has issued several board games to help educate people about recent Polish history, including: 303 – a game about the Battle of Britain that focuses on the Polish 303 Squadron. Kolejka – a game about being forced to queue for basic household products during the Communist era. Lustration On 15 March 2007, an amendment to the Polish law regulating the IPN (enacted on 18 December 2006) came into effect. The change gave the IPN new lustration powers and expanded IPN’s file access. The change was enacted by Law and Justice government in a series of legislative amendments during 2006 and the beginning of 2007. However, several articles of the 2006-7 amendments were held unconstitutional by Poland's Constitutional Court on 11 May 2007, though the IPN's lustration power was still wider than under the original 1997 law. These powers include loss of position for those who submitted false lustration declarations as well as a lustration process of candidates for senior office. An incident which caused controversy involved the "Wildstein list", a partial list of persons who allegedly worked for the communist-era Polish intelligence service, copied in 2004 from IPN archives (without IPN permission) by journalist Bronisław Wildstein and published on the Internet in 2005. The list gained much attention in Polish media and politics, and IPN security procedures and handling of the matter came under criticism. In 2008, two IPN employees, Sławomir Cenckiewicz and Piotr Gontarczyk, published a book, SB a Lech Wałęsa. Przyczynek do biografii (The Security Service and Lech Wałęsa: A Contribution to a Biography) which caused a major controversy. The book's premise was that in the 1970s the Solidarity leader and later President of Poland Lech Wałęsa was a secret informant of the Polish Communist Security Service. Naming of monuments In 2008, the chairman of the IPN wrote to local administrations, calling for the addition of the word "German" before "Nazi" to all monuments and tablets commemorating Germany's victims, stating that "Nazis" is not always understood to relate specifically to Germans. Several scenes of atrocities conducted by Germany were duly updated with commemorative plaques clearly indicating the nationality of the perpetrators. The IPN also requested better documentation and commemoration of crimes that had been perpetrated by the Soviet Union. The Polish government also asked UNESCO to officially change the name "Auschwitz Concentration Camp" to "Former Nazi German Concentration Camp Auschwitz-Birkenau", to clarify that the camp had been built and operated by Nazi Germany. In 2007, UNESCO's World Heritage Committee changed the camp's name to "Auschwitz Birkenau German Nazi Concentration and Extermination Camp (1940–1945)." Previously some German media, including Der Spiegel, had called the camp "Polish". Publications Since 2019, the Institute publishes the Institute of National Remembrance Review (), a yearly peer-reviewed academic journal in English, with Anna Karolina Piekarska as editor-in-chief.. Criticism According to , common criticisms of the IPN include its dominance in the Polish research field, which is guaranteed by a budget that far supersedes that of any similar academic institution; the "thematic monotony ... of micro-historical studies ... of no real scientific interest" of its research; its focus on "martyrology"; and various criticisms of methodology and ethics. Some of these criticisms have been addressed by Director Łukasz Kamiński during his tenure and who according to Mink "has made significant changes"; however, Minsk, writing in 2017, was also concerned with the recent administrative and personnel changes in IPN, including the election of Jarosław Szarek as director, which he posits are likely to result in further the politicization of the IPN. According to Valentin Behr, IPN research into the Communist era is valuable, positing that "the resources at its disposal have made it unrivalled as a research centre in the academic world"; at the same time, he said that the research is mostly focused on the era's negative aspects, and that it "is far from producing a critical approach to history, one that asks its own questions and is methodologically pluralistic." He added that in recent years that problem is being ameliorated as the IPN's work "has somewhat diversified as its administration has taken note of criticism on the part of academics." According to Robert Traba, "under the ... IPN, tasks related to the 'national politics of memory' were – unfortunately – merged with the mission of independent academic research. In the public mind, there could be only one message flowing from the institute's name: memory and history as a science are one. The problem is that nothing could be further from the truth, and nothing could be more misleading. What the IPN’s message presents, in fact, is the danger that Polish history will be grossly over-simplified." Traba states that "at the heart of debate today is a confrontation between those who support traditional methods and categories of research, and those who support newly defined methods and categories. ... Broadening the research perspective means the enrichment of the historian's instrumentarium.'" He puts the IPN research, in a broad sense, in the former; he states that "[a] solid, workshop-oriented, traditional, and positivist historiography ... which defends itself by the integrity of its analysis and its diversified source base" but criticizes its approach for leading to a "falsely conceived mission to find 'objective truth' at the expense of 'serious study of event history', and a 'simplified claim that only 'secret' sources, not accessible to ordinary mortals', can lead to that objective truth." Traba quotes historian Wiktoria Śliwowska, who wrote: "The historian must strive not only to reconstruct a given reality, but also to understand the background of events, the circumstances in which people acted. It is easy to condemn, but difficult to understand a complicated past. ... [Meanwhile, in the IPN] thick volumes are being produced, into which are being thrown, with no real consideration, further evidence in criminating various persons now deceased (and therefore not able to defend themselves), and elderly people still alive – known and unknown." Traba posits that "there is ... a need for genuine debate that does not revolve around [the files] in the IPN archives, 'lustration,' or short-term and politically inspired discussions designed to establish the 'only real' truth", and suggests that adopting varied perspectives and diverse methodologies might contribute to such debate. During PiS's control of the government between 2005 and 2007, the IPN was the focus of heated public controversies, in particular in regard to the pasts of Solidarity leader Lech Wałęsa and PZPR secretary Wojciech Jaruzelski. As a result, the IPN has been referred to as "a political institution at the centre of 'memory games'". Organizational and methodological concerns Valentin Behr writes that the IPN is most "concerned with the production of an official narrative about Poland's recent past" and therefore lacks innovation in its research, while noting that situation is being remedied under recent leadership. He writes that the IPN "has mainly taken in historians from the fringes of the academic field" who were either unable to obtain a prominent academic position or ideologically drawn to the IPN's approach, and that "in the academic field, being an 'IPN historian' can be a stigma"; Behr explains this by pointing to a generational divide in Polish academia, visible when comparing IPN to other Polish research outlets, and claims: "Hiring young historians was done deliberately to give the IPN greater autonomy from the academic world, considered as too leftist to describe the dark sides of the communist regime." He praises IPN for creating hiring opportunities for many history specialists who can carry dedicated research there without the need for an appointment at another institution, and for training young historians, noting that "the IPN is now the leading employer of young PhD students and PhDs in history specialized in contemporary history, ahead of Polish universities". Historian Dariusz Stola states that the IPN is very bureaucratic in nature, comparing it to a "regular continental European bureaucracy, with usual deficiencies of its kind", and posits that in this aspect the IPN resembles the former Communist institutions it is supposed to deal with, equally "bureaucratic, centralist, heavy, inclined to extensive growth and quantity rather than quality of production". See also Laws against Holocaust denial Notes External links IPN Home Page (English) old Act of 18 December 1998 on the Institute of National Remembrance – Commission for Prosecution of Crimes against the Polish Nation (Ustawa z dnia 18 grudnia 1998 r. o Instytucie Pamięci Narodowej – Komisji Ścigania Zbrodni przeciwko Narodowi Polskiemu) old Act of 18 December 1998 on the Institute of National Remembrance – Commission for Prosecution of Crimes against the Polish Nation
[ 0.7006329894065857, 0.4923095107078552, -0.37806397676467896, 0.012107529677450657, -0.08480408787727356, 0.052205462008714676, 0.672778844833374, 0.0690450668334961, -0.14896759390830994, -0.17063695192337036, -0.07397645711898804, -0.06403439491987228, 0.34755614399909973, 0.595606923103...
15347
https://en.wikipedia.org/wiki/Intelligence%20%28disambiguation%29
Intelligence (disambiguation)
Intelligence is one or more capacities of the mind. Intelligence may also refer to: Information Intelligence (information), information collected for use Business intelligence, data transformed into meaningful and useful information for business analysis purposes Espionage, or intelligence, the clandestine acquisition of confidential information Intelligence assessment, the evaluation of sensitive commercial, military, scientific, or state information Intelligence cycle, the stages of intelligence information processing Military intelligence, the gathering and assessment of policy, strategic, and tactical, information Strategic intelligence (STRATINT), the collection, processing, analysis, and dissemination of intelligence that is required for forming policy and military plans at the national and international level Police intelligence, the gathering of information about crime in order to track and predict it with a view to curbing it Media Music "Intelligence", a song by ...And You Will Know Us by the Trail of Dead from their EP The Secret of Elena's Tomb (2003) The Intelligence, a noise rock band from Seattle with releases on In the Red Records Periodicals Intelligence (journal), a scientific journal dealing with intelligence and psychometrics Intelligence (newspaper), an Australian newspaper Television Intelligence (Canadian TV series), a Canadian television show that ran 2006–2007 on CBC Television Intelligence (American TV series), a 2014 American cyber-themed action/adventure television series Intelligence (British TV series), a 2020 British sitcom set in GCHQ Film Inttelligent, a 2018 Indian Telugu-language film Other uses Intelligence (solitaire), a card game Nous (intelligence), in classical and medieval philosophy, cosmology, and theology See also Artificial intelligence (disambiguation) Emotional intelligence Intellect (disambiguation) Intelligence analysis Multiple intelligence Signals intelligence Social intelligence
[ -0.039244260638952255, 0.2911215126514435, -0.6293333768844604, 0.4903663694858551, -0.2666659951210022, 0.2428925335407257, 0.6401771306991577, 0.20891804993152618, 0.1224980354309082, -0.508834719657898, -0.2573801279067993, 0.5998184084892273, -0.3491988778114319, 0.1923746019601822, ...
15352
https://en.wikipedia.org/wiki/Identical%20particles
Identical particles
In quantum mechanics, identical particles (also called indistinguishable or indiscernible particles) are particles that cannot be distinguished from one another, even in principle. Species of identical particles include, but are not limited to, elementary particles (such as electrons), composite subatomic particles (such as atomic nuclei), as well as atoms and molecules. Quasiparticles also behave in this way. Although all known indistinguishable particles only exist at the quantum scale, there is no exhaustive list of all possible sorts of particles nor a clear-cut limit of applicability, as explored in quantum statistics. There are two main categories of identical particles: bosons, which can share quantum states, and fermions, which cannot (as described by the Pauli exclusion principle). Examples of bosons are photons, gluons, phonons, helium-4 nuclei and all mesons. Examples of fermions are electrons, neutrinos, quarks, protons, neutrons, and helium-3 nuclei. The fact that particles can be identical has important consequences in statistical mechanics, where calculations rely on probabilistic arguments, which are sensitive to whether or not the objects being studied are identical. As a result, identical particles exhibit markedly different statistical behaviour from distinguishable particles. For example, the indistinguishability of particles has been proposed as a solution to Gibbs' mixing paradox. Distinguishing between particles There are two methods for distinguishing between particles. The first method relies on differences in the intrinsic physical properties of the particles, such as mass, electric charge, and spin. If differences exist, it is possible to distinguish between the particles by measuring the relevant properties. However, it is an empirical fact that microscopic particles of the same species have completely equivalent physical properties. For instance, every electron in the universe has exactly the same electric charge; this is why it is possible to speak of such a thing as "the charge of the electron". Even if the particles have equivalent physical properties, there remains a second method for distinguishing between particles, which is to track the trajectory of each particle. As long as the position of each particle can be measured with infinite precision (even when the particles collide), then there would be no ambiguity about which particle is which. The problem with the second approach is that it contradicts the principles of quantum mechanics. According to quantum theory, the particles do not possess definite positions during the periods between measurements. Instead, they are governed by wavefunctions that give the probability of finding a particle at each position. As time passes, the wavefunctions tend to spread out and overlap. Once this happens, it becomes impossible to determine, in a subsequent measurement, which of the particle positions correspond to those measured earlier. The particles are then said to be indistinguishable. Quantum mechanical description Symmetrical and antisymmetrical states What follows is an example to make the above discussion concrete, using the formalism developed in the article on the mathematical formulation of quantum mechanics. Let n denote a complete set of (discrete) quantum numbers for specifying single-particle states (for example, for the particle in a box problem, take n to be the quantized wave vector of the wavefunction.) For simplicity, consider a system composed of two particles that are not interacting with each other. Suppose that one particle is in the state n1, and the other is in the state n2. Intuitively, the quantum state of the system is written as where the state writing order matters such as the firstly written state is for the particle 1 and the secondly written state is for the particle 2 (so, if , then the particle 1 occupies the state n2 while the particle 2 occupies the state n1). This is simply the canonical way of constructing a basis for a tensor product space of the combined system from the individual spaces. This expression is valid for distinguishable particles, however, it is not appropriate for indistinguishable particles since and as a result of exchanging the particles are generally different states. "the particle 1 occupies the n1 state and the particle 2 occupies the n2 state" ≠ "the particle 1 occupies the n2 state and the particle 2 occupies the n1 state". Two states are physically equivalent only if they differ at most by a complex phase factor. For two indistinguishable particles, a state before the particle exchange must be physically equivalent to the state after the exchange, so these two state differ at most by a complex phase factor. This fact suggests that a state for two indistinguishable (and non-interacting) particles is given by following two possibilities: States where it is a sum are known as symmetric, while states involving the difference are called antisymmetric. More completely, symmetric states have the form while antisymmetric states have the form Note that if n1 and n2 are the same, the antisymmetric expression gives zero, which cannot be a state vector since it cannot be normalized. In other words, more than one identical particle cannot occupy an antisymmetric state (one antisymmetric state can be occupied only by one particle). This is known as the Pauli exclusion principle, and it is the fundamental reason behind the chemical properties of atoms and the stability of matter. Exchange symmetry The importance of symmetric and antisymmetric states is ultimately based on empirical evidence. It appears to be a fact of nature that identical particles do not occupy states of a mixed symmetry, such as There is actually an exception to this rule, which will be discussed later. On the other hand, it can be shown that the symmetric and antisymmetric states are in a sense special, by examining a particular symmetry of the multiple-particle states known as exchange symmetry. Define a linear operator P, called the exchange operator. When it acts on a tensor product of two state vectors, it exchanges the values of the state vectors: P is both Hermitian and unitary. Because it is unitary, it can be regarded as a symmetry operator. This symmetry may be described as the symmetry under the exchange of labels attached to the particles (i.e., to the single-particle Hilbert spaces). Clearly, (the identity operator), so the eigenvalues of P are +1 and −1. The corresponding eigenvectors are the symmetric and antisymmetric states: In other words, symmetric and antisymmetric states are essentially unchanged under the exchange of particle labels: they are only multiplied by a factor of +1 or −1, rather than being "rotated" somewhere else in the Hilbert space. This indicates that the particle labels have no physical meaning, in agreement with the earlier discussion on indistinguishability. It will be recalled that P is Hermitian. As a result, it can be regarded as an observable of the system, which means that, in principle, a measurement can be performed to find out if a state is symmetric or antisymmetric. Furthermore, the equivalence of the particles indicates that the Hamiltonian can be written in a symmetrical form, such as It is possible to show that such Hamiltonians satisfy the commutation relation According to the Heisenberg equation, this means that the value of P is a constant of motion. If the quantum state is initially symmetric (antisymmetric), it will remain symmetric (antisymmetric) as the system evolves. Mathematically, this says that the state vector is confined to one of the two eigenspaces of P, and is not allowed to range over the entire Hilbert space. Thus, that eigenspace might as well be treated as the actual Hilbert space of the system. This is the idea behind the definition of Fock space. Fermions and bosons The choice of symmetry or antisymmetry is determined by the species of particle. For example, symmetric states must always be used when describing photons or helium-4 atoms, and antisymmetric states when describing electrons or protons. Particles which exhibit symmetric states are called bosons. The nature of symmetric states has important consequences for the statistical properties of systems composed of many identical bosons. These statistical properties are described as Bose–Einstein statistics. Particles which exhibit antisymmetric states are called fermions. Antisymmetry gives rise to the Pauli exclusion principle, which forbids identical fermions from sharing the same quantum state. Systems of many identical fermions are described by Fermi–Dirac statistics. Parastatistics are also possible. In certain two-dimensional systems, mixed symmetry can occur. These exotic particles are known as anyons, and they obey fractional statistics. Experimental evidence for the existence of anyons exists in the fractional quantum Hall effect, a phenomenon observed in the two-dimensional electron gases that form the inversion layer of MOSFETs. There is another type of statistic, known as braid statistics, which are associated with particles known as plektons. The spin-statistics theorem relates the exchange symmetry of identical particles to their spin. It states that bosons have integer spin, and fermions have half-integer spin. Anyons possess fractional spin. N particles The above discussion generalizes readily to the case of N particles. Suppose there are N particles with quantum numbers n1, n2, ..., nN. If the particles are bosons, they occupy a totally symmetric state, which is symmetric under the exchange of any two particle labels: Here, the sum is taken over all different states under permutations p acting on N elements. The square root left to the sum is a normalizing constant. The quantity mn stands for the number of times each of the single-particle states n appears in the N-particle state. Note that Σn mn = N. In the same vein, fermions occupy totally antisymmetric states: Here, is the sign of each permutation (i.e. if is composed of an even number of transpositions, and if odd). Note that there is no term, because each single-particle state can appear only once in a fermionic state. Otherwise the sum would again be zero due to the antisymmetry, thus representing a physically impossible state. This is the Pauli exclusion principle for many particles. These states have been normalized so that Measurement Suppose there is a system of N bosons (fermions) in the symmetric (antisymmetric) state and a measurement is performed on some other set of discrete observables, m. In general, this yields some result m1 for one particle, m2 for another particle, and so forth. If the particles are bosons (fermions), the state after the measurement must remain symmetric (antisymmetric), i.e. The probability of obtaining a particular result for the m measurement is It can be shown that which verifies that the total probability is 1. The sum has to be restricted to ordered values of m1, ..., mN to ensure that each multi-particle state is not counted more than once. Wavefunction representation So far, the discussion has included only discrete observables. It can be extended to continuous observables, such as the position x. Recall that an eigenstate of a continuous observable represents an infinitesimal range of values of the observable, not a single value as with discrete observables. For instance, if a particle is in a state |ψ⟩, the probability of finding it in a region of volume d3x surrounding some position x is As a result, the continuous eigenstates |x⟩ are normalized to the delta function instead of unity: Symmetric and antisymmetric multi-particle states can be constructed from continuous eigenstates in the same way as before. However, it is customary to use a different normalizing constant: A many-body wavefunction can be written, where the single-particle wavefunctions are defined, as usual, by The most important property of these wavefunctions is that exchanging any two of the coordinate variables changes the wavefunction by only a plus or minus sign. This is the manifestation of symmetry and antisymmetry in the wavefunction representation: The many-body wavefunction has the following significance: if the system is initially in a state with quantum numbers n1, ..., nN, and a position measurement is performed, the probability of finding particles in infinitesimal volumes near x1, x2, ..., xN is The factor of N! comes from our normalizing constant, which has been chosen so that, by analogy with single-particle wavefunctions, Because each integral runs over all possible values of x, each multi-particle state appears N! times in the integral. In other words, the probability associated with each event is evenly distributed across N! equivalent points in the integral space. Because it is usually more convenient to work with unrestricted integrals than restricted ones, the normalizing constant has been chosen to reflect this. Finally, antisymmetric wavefunction can be written as the determinant of a matrix, known as a Slater determinant: The operator approach and parastatistics The Hilbert space for particles is given by the tensor product . The permutation group of acts on this space by permuting the entries. By definition the expectation values for an observable of indistinguishable particles should be invariant under these permutation. This means that for all and or equivalently for each . Two states are equivalent whenever their expectation values coincide for all observables. If we restrict to observables of identical particles, and hence observables satisfying the equation above, we find that the following states (after normalization) are equivalent . The equivalence classes are in bijective relation with irreducible subspaces of under . Two obvious irreducible subspaces are the one dimensional symmetric/bosonic subspace and anti-symmetric/fermionic subspace. There are however more types of irreducible subspaces. States associated with these other irreducible subspaces are called parastatistic states. Young tableaux provide a way to classify all of these irreducible subspaces. Statistical properties Statistical effects of indistinguishability The indistinguishability of particles has a profound effect on their statistical properties. To illustrate this, consider a system of N distinguishable, non-interacting particles. Once again, let nj denote the state (i.e. quantum numbers) of particle j. If the particles have the same physical properties, the nj's run over the same range of values. Let ε(n) denote the energy of a particle in state n. As the particles do not interact, the total energy of the system is the sum of the single-particle energies. The partition function of the system is where k is Boltzmann's constant and T is the temperature. This expression can be factored to obtain where If the particles are identical, this equation is incorrect. Consider a state of the system, described by the single particle states [n1, ..., nN]. In the equation for Z, every possible permutation of the ns occurs once in the sum, even though each of these permutations is describing the same multi-particle state. Thus, the number of states has been over-counted. If the possibility of overlapping states is neglected, which is valid if the temperature is high, then the number of times each state is counted is approximately N!. The correct partition function is Note that this "high temperature" approximation does not distinguish between fermions and bosons. The discrepancy in the partition functions of distinguishable and indistinguishable particles was known as far back as the 19th century, before the advent of quantum mechanics. It leads to a difficulty known as the Gibbs paradox. Gibbs showed that in the equation Z = ξN, the entropy of a classical ideal gas is where V is the volume of the gas and f is some function of T alone. The problem with this result is that S is not extensive – if N and V are doubled, S does not double accordingly. Such a system does not obey the postulates of thermodynamics. Gibbs also showed that using Z = ξN/N! alters the result to which is perfectly extensive. However, the reason for this correction to the partition function remained obscure until the discovery of quantum mechanics Statistical properties of bosons and fermions There are important differences between the statistical behavior of bosons and fermions, which are described by Bose–Einstein statistics and Fermi–Dirac statistics respectively. Roughly speaking, bosons have a tendency to clump into the same quantum state, which underlies phenomena such as the laser, Bose–Einstein condensation, and superfluidity. Fermions, on the other hand, are forbidden from sharing quantum states, giving rise to systems such as the Fermi gas. This is known as the Pauli Exclusion Principle, and is responsible for much of chemistry, since the electrons in an atom (fermions) successively fill the many states within shells rather than all lying in the same lowest energy state. The differences between the statistical behavior of fermions, bosons, and distinguishable particles can be illustrated using a system of two particles. The particles are designated A and B. Each particle can exist in two possible states, labelled and , which have the same energy. The composite system can evolve in time, interacting with a noisy environment. Because the and states are energetically equivalent, neither state is favored, so this process has the effect of randomizing the states. (This is discussed in the article on quantum entanglement.) After some time, the composite system will have an equal probability of occupying each of the states available to it. The particle states are then measured. If A and B are distinguishable particles, then the composite system has four distinct states: , , , and . The probability of obtaining two particles in the state is 0.25; the probability of obtaining two particles in the state is 0.25; and the probability of obtaining one particle in the state and the other in the state is 0.5. If A and B are identical bosons, then the composite system has only three distinct states: , , and . When the experiment is performed, the probability of obtaining two particles in the state is now 0.33; the probability of obtaining two particles in the state is 0.33; and the probability of obtaining one particle in the state and the other in the state is 0.33. Note that the probability of finding particles in the same state is relatively larger than in the distinguishable case. This demonstrates the tendency of bosons to "clump." If A and B are identical fermions, there is only one state available to the composite system: the totally antisymmetric state . When the experiment is performed, one particle is always in the state and the other is in the state. The results are summarized in Table 1: As can be seen, even a system of two particles exhibits different statistical behaviors between distinguishable particles, bosons, and fermions. In the articles on Fermi–Dirac statistics and Bose–Einstein statistics, these principles are extended to large number of particles, with qualitatively similar results. The homotopy class To understand why particle statistics work the way that they do, note first that particles are point-localized excitations and that particles that are spacelike separated do not interact. In a flat d-dimensional space M, at any given time, the configuration of two identical particles can be specified as an element of M × M. If there is no overlap between the particles, so that they do not interact directly, then their locations must belong to the space the subspace with coincident points removed. The element describes the configuration with particle I at x and particle II at y, while describes the interchanged configuration. With identical particles, the state described by ought to be indistinguishable from the state described by . Now consider the homotopy class of continuous paths from to , within the space . If M is Rd where , then this homotopy class only has one element. If M is R2, then this homotopy class has countably many elements (i.e. a counterclockwise interchange by half a turn, a counterclockwise interchange by one and a half turns, two and a half turns, etc., a clockwise interchange by half a turn, etc.). In particular, a counterclockwise interchange by half a turn is not homotopic to a clockwise interchange by half a turn. Lastly, if M is R, then this homotopy class is empty. Suppose first that . The universal covering space of which is none other than itself, only has two points which are physically indistinguishable from , namely itself and . So, the only permissible interchange is to swap both particles. This interchange is an involution, so its only effect is to multiply the phase by a square root of 1. If the root is +1, then the points have Bose statistics, and if the root is −1, the points have Fermi statistics. In the case M = R2, the universal covering space of has infinitely many points that are physically indistinguishable from . This is described by the infinite cyclic group generated by making a counterclockwise half-turn interchange. Unlike the previous case, performing this interchange twice in a row does not recover the original state; so such an interchange can generically result in a multiplication by exp(iθ) for any real θ (by unitarity, the absolute value of the multiplication must be 1). This is called anyonic statistics. In fact, even with two distinguishable particles, even though is now physically distinguishable from , the universal covering space still contains infinitely many points which are physically indistinguishable from the original point, now generated by a counterclockwise rotation by one full turn. This generator, then, results in a multiplication by exp(iφ). This phase factor here is called the mutual statistics. Finally, in the case M = R', the space is not connected, so even if particle I and particle II are identical, they can still be distinguished via labels such as "the particle on the left" and "the particle on the right". There is no interchange symmetry here. See also Quasi-set theory DeBroglie hypothesis Footnotes References External links Exchange of Identical and Possibly Indistinguishable Particles by John S. Denker Identity and Individuality in Quantum Theory (Stanford Encyclopedia of Philosophy) Many-Electron States in E. Pavarini, E. Koch, and U. Schollwöck: Emergent Phenomena in Correlated Matter, Jülich 2013, Particle statistics Pauli exclusion principle Probabilistic arguments
[ 0.06898750364780426, 0.22477979958057404, -0.46768757700920105, 0.335730642080307, -0.4732223153114319, -0.08393166959285736, 0.35151588916778564, -0.027752019464969635, -0.14728853106498718, -0.6847981810569763, -0.13264186680316925, -0.13437438011169434, -0.5683799982070923, 0.7670363187...
15354
https://en.wikipedia.org/wiki/Interstitial%20cystitis
Interstitial cystitis
Interstitial cystitis (IC), a type of bladder pain syndrome (BPS), is chronic pain that affects the bladder and pelvic floor. Together with Chronic prostatitis/chronic pelvic pain syndrome, it makes up urologic chronic pelvic pain syndrome (UCPPS). Symptoms include feeling the need to urinate right away, needing to urinate often, and pain with sex. IC/BPS is associated with depression and lower quality of life. Many of those affected also have irritable bowel syndrome and fibromyalgia. The cause of interstitial cystitis is unknown. While it can, it does not typically run in a family. The diagnosis is usually based on the symptoms after ruling out other conditions. Typically the urine culture is negative. Ulceration or inflammation may be seen on cystoscopy. Other conditions which can produce similar symptoms include overactive bladder, urinary tract infection (UTI), sexually transmitted infections, prostatitis, endometriosis in females, and bladder cancer. There is no cure for interstitial cystitis and management of this condition can be challenging. Treatments that may improve symptoms include lifestyle changes, medications, or procedures. Lifestyle changes may include stopping smoking and reducing stress. Medications may include ibuprofen, pentosan polysulfate, or amitriptyline. Procedures may include bladder distention, nerve stimulation, or surgery. Pelvic floor exercises and long term antibiotics are not recommended. In the United States and Europe, it is estimated that around 0.5% of people are affected. Women are affected about five times as often as men. Onset is typically in middle age. The term "interstitial cystitis" first came into use in 1887. Signs and symptoms The most common symptoms of IC/BPS are suprapubic pain, urinary frequency, painful sexual intercourse, and waking up from sleep to urinate. In general, symptoms may include painful urination described as a burning sensation in the urethra during urination, pelvic pain that is worsened with the consumption of certain foods or drinks, urinary urgency, and pressure in the bladder or pelvis. Other frequently described symptoms are urinary hesitancy (needing to wait for the urinary stream to begin, often caused by pelvic floor dysfunction and tension), and discomfort and difficulty driving, working, exercising, or traveling. Pelvic pain experienced by those with IC typically worsens with filling of the urinary bladder and may improve with urination. During cystoscopy, 5–10% of people with IC are found to have Hunner's ulcers. A person with IC may have discomfort only in the urethra, while another might struggle with pain in the entire pelvis. Interstitial cystitis symptoms usually fall into one of two patterns: significant suprapubic pain with little frequency or a lesser amount of suprapubic pain but with increased urinary frequency. Association with other conditions Some people with IC/BPS have been diagnosed with other conditions such as irritable bowel syndrome (IBS), fibromyalgia, chronic fatigue syndrome, allergies, Sjögren syndrome, which raises the possibility that interstitial cystitis may be caused by mechanisms that cause these other conditions. There is also some evidence of an association between urologic pain syndromes, such as IC/BPS and CP/CPPS, with non-celiac gluten sensitivity in some people. In addition, men with IC/PBS are frequently diagnosed as having chronic nonbacterial prostatitis, and there is an extensive overlap of symptoms and treatment between the two conditions, leading researchers to posit that the conditions may share the same cause and pathology. Causes The cause of IC/BPS is not known. However, several explanations have been proposed and include the following: autoimmune theory, nerve theory, mast cell theory, leaky lining theory, infection theory, and a theory of production of a toxic substance in the urine. Other suggested etiological causes are neurologic, allergic, genetic, and stress-psychological. In addition, recent research shows that those with IC may have a substance in the urine that inhibits the growth of cells in the bladder epithelium. An infection may then predispose those people to develop IC. Evidence from clinical and laboratory studies confirms that mast cells play a central role in IC/BPS possibly due to their ability to release histamine and cause pain, swelling, scarring, and interfere with healing. Research has shown a proliferation of nerve fibers is present in the bladders of people with IC which is absent in the bladders of people who have not been diagnosed with IC. Regardless of the origin, most people with IC/BPS struggle with a damaged urothelium, or bladder lining. When the surface glycosaminoglycan (GAG) layer is damaged (via a urinary tract infection (UTI), excessive consumption of coffee or sodas, traumatic injury, etc.), urinary chemicals can "leak" into surrounding tissues, causing pain, inflammation, and urinary symptoms. Oral medications like pentosan polysulfate and medications placed directly into the bladder via a catheter sometimes work to repair and rebuild this damaged/wounded lining, allowing for a reduction in symptoms. Most literature supports the belief that IC's symptoms are associated with a defect in the bladder epithelium lining, allowing irritating substances in the urine to penetrate into the bladder—a breakdown of the bladder lining (also known as the adherence theory). Deficiency in this glycosaminoglycan layer on the surface of the bladder results in increased permeability of the underlying submucosal tissues. GP51 has been identified as a possible urinary biomarker for IC with significant variations in GP51 levels in those with IC when compared to individuals without interstitial cystitis. Numerous studies have noted the link between IC, anxiety, stress, hyper-responsiveness, and panic. Another proposed cause for interstitial cystitis is that the body's immune system attacks the bladder. Biopsies on the bladder walls of people with IC usually contain mast cells. Mast cells containing histamine packets gather when an allergic reaction is occurring. The body identifies the bladder wall as a foreign agent, and the histamine packets burst open and attack. The body attacks itself, which is the basis of autoimmune disorders. Additionally, IC may be triggered by an unknown toxin or stimulus which causes nerves in the bladder wall to fire uncontrollably. When they fire, they release substances called neuropeptides that induce a cascade of reactions that cause pain in the bladder wall. Genes Some genetic subtypes, in some people, have been linked to the disorder. An antiproliferative factor is secreted by the bladders of people with IC/BPS which inhibits bladder cell proliferation, thus possibly causing the missing bladder lining. PAND, at gene map locus 13q22–q32, is associated with a constellation of disorders (a "pleiotropic syndrome") including IC/BPS and other bladder and kidney problems, thyroid diseases, serious headaches/migraines, panic disorder, and mitral valve prolapse. Diagnosis A diagnosis of IC/BPS is one of exclusion, as well as a review of clinical symptoms. The American Urological Association Guidelines recommend starting with a careful history of the person, physical examination and laboratory tests to assess and document symptoms of interstitial cytitis, as well as other potential disorders. The KCl test, also known as the potassium sensitivity test, is no longer recommended. The test uses a mild potassium solution to evaluate the integrity of the bladder wall. Though the latter is not specific for IC/BPS, it has been determined to be helpful in predicting the use of compounds, such as pentosan polysulphate, which are designed to help repair the GAG layer. For complicated cases, the use of hydrodistention with cystoscopy may be helpful. Researchers, however, determined that this visual examination of the bladder wall after stretching the bladder was not specific for IC/BPS and that the test, itself, can contribute to the development of small glomerulations (petechial hemorrhages) often found in IC/BPS. Thus, a diagnosis of IC/BPS is one of exclusion, as well as a review of clinical symptoms. In 2006, the ESSIC society proposed more rigorous and demanding diagnostic methods with specific classification criteria so that it cannot be confused with other, similar conditions. Specifically, they require that a person must have pain associated with the bladder, accompanied by one other urinary symptom. Thus, a person with just frequency or urgency would be excluded from a diagnosis. Secondly, they strongly encourage the exclusion of confusable diseases through an extensive and expensive series of tests including (A) a medical history and physical exam, (B) a dipstick urinalysis, various urine cultures, and a serum PSA in men over 40, (C) flowmetry and post-void residual urine volume by ultrasound scanning and (D) cystoscopy. A diagnosis of IC/BPS would be confirmed with a hydrodistention during cystoscopy with biopsy. They also propose a ranking system based upon the physical findings in the bladder. People would receive a numeric and letter based score based upon the severity of their disease as found during the hydrodistention. A score of 1–3 would relate to the severity of the disease and a rating of A–C represents biopsy findings. Thus, a person with 1A would have very mild symptoms and disease while a person with 3C would have the worst possible symptoms. Widely recognized scoring systems such as the O'Leary Sant symptom and problem score have emerged to evaluate the severity of IC symptoms such as pain and urinary symptoms. Differential diagnosis The symptoms of IC/BPS are often misdiagnosed as a urinary tract infection. However, IC/BPS has not been shown to be caused by a bacterial infection and antibiotics are an ineffective treatment. IC/BPS is commonly misdiagnosed as chronic prostatitis/chronic pelvic pain syndrome (CP/CPPS) in men, and endometriosis and uterine fibroids (in women). Treatment In 2011, the American Urological Association released consensus-based guideline for the diagnosis and treatment of interstital cystitis. They include treatments ranging from conservative to more invasive: First-line treatments — education, self care (diet modification), stress management Second-line treatments — physical therapy, oral medications (amitriptyline, cimetidine or hydroxyzine, pentosan polysulfate), bladder instillations (DMSO, heparin, or lidocaine) Third-line treatments — treatment of Hunner's lesions (laser, fulguration or triamcinolone injection), hydrodistention (low pressure, short duration) Fourth-line treatments — neuromodulation (sacral or pudendal nerve) Fifth-line treatments — cyclosporine A, botulinum toxin (BTX-A) Sixth-line treatments — surgical intervention (urinary diversion, augmentation, cystectomy) The American Urological Association guidelines also listed several discontinued treatments, including long-term oral antibiotics, intravesical bacillus Calmette Guerin, intravesical resiniferatoxin), high-pressure and long-duration hydrodistention, and systemic glucocorticoids. Bladder distension Bladder distension while under general anesthesia, also known as hydrodistention (a procedure which stretches the bladder capacity), has shown some success in reducing urinary frequency and giving short-term pain relief to those with IC. However, it is unknown exactly how this procedure causes pain relief. Recent studies show pressure on pelvic trigger points can relieve symptoms. The relief achieved by bladder distensions is only temporary (weeks or months), so is not viable as a long-term treatment for IC/BPS. The proportion of people with IC/BPS who experience relief from hydrodistention is currently unknown and evidence for this modality is limited by a lack of properly controlled studies. Bladder rupture and sepsis may be associated with prolonged, high-pressure hydrodistention. Bladder instillations Bladder instillation of medication is one of the main forms of treatment of interstitial cystitis, but evidence for its effectiveness is currently limited. Advantages of this treatment approach include direct contact of the medication with the bladder and low systemic side effects due to poor absorption of the medication. Single medications or a mixture of medications are commonly used in bladder instillation preparations. Dimethyl sulfoxide (DMSO) is the only approved bladder instillation for IC/BPS yet it is much less frequently used in urology clinics. A 50% solution of DMSO had the potential to create irreversible muscle contraction. However, a lesser solution of 25% was found to be reversible. Long-term use of DMSO is questionable, as its mechanism of action is not fully understood though DMSO is thought to inhibit mast cells and may have anti-inflammatory, muscle-relaxing, and analgesic effects. Other agents used for bladder instillations to treat interstitial cystitis include: heparin, lidocaine, chondroitin sulfate, hyaluronic acid, pentosan polysulfate, oxybutynin, and botulinum toxin A. Preliminary evidence suggests these agents are efficacious in reducing symptoms of interstitial cystitis, but further study with larger, randomized, controlled clinical trials is needed. Diet Diet modification is often recommended as a first-line method of self-treatment for interstitial cystitis, though rigorous controlled studies examining the impact diet has on interstitial cystitis signs and symptoms are currently lacking. An increase in fiber intake may alleviate symptoms. Individuals with interstitial cystitis often experience an increase in symptoms when they consume certain foods and beverages. Avoidance of these potential trigger foods and beverages such as caffeine-containing beverages including coffee, tea, and soda, alcoholic beverages, chocolate, citrus fruits, hot peppers, and artificial sweeteners may be helpful in alleviating symptoms. Diet triggers vary between individuals with IC; the best way for a person to discover his or her own triggers is to use an elimination diet. Sensitivity to trigger foods may be reduced if calcium glycerophosphate and/or sodium bicarbonate is consumed. The foundation of therapy is a modification of diet to help people avoid those foods which can further irritate the damaged bladder wall. The mechanism by which dietary modification benefits people with IC is unclear. Integration of neural signals from pelvic organs may mediate the effects of diet on symptoms of IC. Medications The antihistamine hydroxyzine failed to demonstrate superiority over placebo in treatment of people with IC in a randomized, controlled, clinical trial. Amitriptyline has been shown to be effective in reducing symptoms such as chronic pelvic pain and nocturia in many people with IC/BPS with a median dose of 75 mg daily. In one study, the antidepressant duloxetine was found to be ineffective as a treatment, although a patent exists for use of duloxetine in the context of IC, and is known to relieve neuropathic pain. The calcineurin inhibitor cyclosporine A has been studied as a treatment for interstitial cystitis due to its immunosuppressive properties. A prospective randomized study found cyclosporine A to be more effective at treating IC symptoms than pentosan polysulfate, but also had more adverse effects. Oral pentosan polysulfate is believed to repair the protective glycosaminoglycan coating of the bladder, but studies have encountered mixed results when attempting to determine if the effect is statistically significant compared to placebo. Pelvic floor treatments Urologic pelvic pain syndromes, such as IC/BPS and CP/CPPS, are characterized by pelvic muscle tenderness, and symptoms may be reduced with pelvic myofascial physical therapy. This may leave the pelvic area in a sensitized condition, resulting in a loop of muscle tension and heightened neurological feedback (neural wind-up), a form of myofascial pain syndrome. Current protocols, such as the Wise–Anderson Protocol, largely focus on stretches to release overtensed muscles in the pelvic or anal area (commonly referred to as trigger points), physical therapy to the area, and progressive relaxation therapy to reduce causative stress. Pelvic floor dysfunction is a fairly new area of specialty for physical therapists worldwide. The goal of therapy is to relax and lengthen the pelvic floor muscles, rather than to tighten and/or strengthen them as is the goal of therapy for people with urinary incontinence. Thus, traditional exercises such as Kegel exercises, which are used to strengthen pelvic muscles, can provoke pain and additional muscle tension. A specially trained physical therapist can provide direct, hands on evaluation of the muscles, both externally and internally. A therapeutic wand can also be used to perform pelvic floor muscle myofascial release to provide relief. Surgery Surgery is rarely used for IC/BPS. Surgical intervention is very unpredictable, and is considered a treatment of last resort for severe refractory cases of interstitial cystitis. Some people who opt for surgical intervention continue to experience pain after surgery. Typical surgical interventions for refractory cases of IC/BPS include: bladder augmentation, urinary diversion, transurethral fulguration and resection of ulcers, and bladder removal (cystectomy). Neuromodulation can be successful in treating IC/BPS symptoms, including pain. One electronic pain-killing option is TENS. Percutaneous tibial nerve stimulation stimulators have also been used, with varying degrees of success. Percutaneous sacral nerve root stimulation was able to produce statistically significant improvements in several parameters, including pain. Alternative medicine There is little evidence looking at the effects of alternative medicine though their use is common. There is tentative evidence that acupuncture may help pain associated with IC/BPS as part of other treatments. Despite a scarcity of controlled studies on alternative medicine and IC/BPS, "rather good results have been obtained" when acupuncture is combined with other treatments. Biofeedback, a relaxation technique aimed at helping people control functions of the autonomic nervous system, has shown some benefit in controlling pain associated with IC/BPS as part of a multimodal approach that may also include medication or hydrodistention of the bladder. Prognosis IC/BPS has a profound impact on quality of life. A 2007 Finnish epidemiologic study showed that two-thirds of women at moderate to high risk of having interstitial cystitis reported impairment in their quality of life and 35% of people with IC reported an impact on their sexual life. A 2012 survey showed that among a group of adult women with symptoms of interstitial cystitis, 11% reported suicidal thoughts in the past two weeks. Other research has shown that the impact of IC/BPS on quality of life is severe and may be comparable to the quality of life experienced in end-stage kidney disease or rheumatoid arthritis. International recognition of interstitial cystitis has grown and international urology conferences to address the heterogeneity in diagnostic criteria have recently been held. IC/PBS is now recognized with an official disability code in the United States of America. Epidemiology IC/BPS affects men and women of all cultures, socioeconomic backgrounds, and ages. Although the disease was previously believed to be a condition of menopausal women, growing numbers of men and women are being diagnosed in their twenties and younger. IC/BPS is not a rare condition. Early research suggested that the number of IC/BPS cases ranged from 1 in 100,000 to 5.1 in 1,000 of the general population. In recent years, the scientific community has achieved a much deeper understanding of the epidemiology of interstitial cystitis. Recent studies have revealed that between 2.7 and 6.53 million women in the USA have symptoms of IC and up to 12% of women may have early symptoms of IC/BPS. Further study has estimated that the condition is far more prevalent in men than previously thought ranging from 1.8 to 4.2 million men having symptoms of interstitial cystitis. The condition is officially recognized as a disability in the United States. History Philadelphia surgeon Joseph Parrish published the earliest record of interstitial cystitis in 1836 describing three cases of severe lower urinary tract symptoms without the presence of a bladder stone. The term "interstitial cystitis" was coined by Dr. Alexander Skene in 1887 to describe the disease. In 2002, the United States amended the Social Security Act to include interstitial cystitis as a disability. The first guideline for diagnosis and treatment of interstitial cystitis is released by a Japanese research team in 2009. The American Urological Association released the first American clinical practice guideline for diagnosing and treating IC/BPS in 2011. Names Originally called interstitial cystitis, this disorder was renamed to interstitial cystitis/bladder pain syndrome (IC/BPS) in the 2002–2010 timeframe. In 2007, the National Institute of Diabetes and Digestive and Kidney Diseases (NIDDK) began using the umbrella term urologic chronic pelvic pain syndrome (UCPPS) to refer to pelvic pain syndromes associated with the bladder (e.g., interstitial cystitis/bladder pain syndrome) and with the prostate gland or pelvis (e.g., chronic prostatitis/chronic pelvic pain syndrome). In 2008, terms currently in use in addition to IC/BPS include painful bladder syndrome, bladder pain syndrome and hypersensitive bladder syndrome, alone and in a variety of combinations. These different terms are being used in different parts of the world. The term "interstitial cystitis" is the primary term used in ICD-10 and MeSH. Grover et al. said, "The International Continence Society named the disease interstitial cystitis/painful bladder syndrome (IC/PBS) in 2002 [Abrams et al. 2002], while the Multinational Interstitial Cystitis Association have labeled it as painful bladder syndrome/interstitial cystitis (PBS/IC) [Hanno et al. 2005]. Recently, the European Society for the study of Interstitial Cystitis (ESSIC) proposed the moniker, 'bladder pain syndrome' (BPS) [van de Merwe et al. 2008]." See also Chronic prostatitis/chronic pelvic pain syndrome—women have vestigial prostate glands that may cause IC/BPS-like symptoms. Men with IC/BPS may have prostatitis, and vice versa. Overactive bladder Trigger point—a key to myofascial pain syndrome. References External links The National Kidney and Urologic Diseases Information Clearinghouse (NKUDIC) European Urology Ailments of unknown cause Urologic pelvic pain syndrome Urinary bladder disorders Chronic pain syndromes Wikipedia medicine articles ready to translate
[ -0.025108059868216515, 0.6015777587890625, 0.1541242152452469, 0.09583999961614609, 0.05537518486380577, 0.42462092638015747, 0.08051035553216934, 0.3296462595462799, -0.4625658392906189, -0.8629457354545593, -0.4349987506866455, 0.2934475839138031, -0.059366099536418915, 0.669623076915741...
15355
https://en.wikipedia.org/wiki/ICI
ICI
ICI or Ici may refer to: Companies and organisations ICI Homes, homebuilder in Florida. US Imperial Chemical Industries, former British chemicals, paints and pharmaceuticals company ICI Australia, a subsidiary which became Australian company Orica Independent Curators International, a non-profit headquartered in New York City, US Indian Concrete Institute, a national organisation in India Indian Citation Index, an online bibliographic database containing abstracts and citations from academic journals , in the Goutte d'Or district in Paris, France Institute of Cultural Inquiry, an American non-profit which sponsors art projects International Colonial Institute, an Brussels-based think tank on administration and development of colonies International Compact with Iraq, a 2007 joint initiative of Iraq and the United Nations Investment Company Institute, an American investment company trade organization A Woman's Place (bookstore), also referred to as ICI and Information Center Incorporate Media Ici (magazine), a former alternative French language weekly newspaper in Montreal, Canada Ici Radio-Canada, branding of Radio-Canada, the French language service of the Canadian Broadcasting Corporation beginning in 2013 ICI (TV channel) (International Channel/Canal International), Montreal ethnic / multicultural television channel Science and technology ICI (programming language), a computer programming language developed in 1992 Inter Carrier Interface, a telecommunications transport protocol for use with SMDS Interactive Compilation Interface, a framework for compiler research Immune checkpoint inhibitor, a form of cancer immunotherapy Intracervical insemination, a form of artificial insemination Other uses Istanbul Cooperation Initiative, an initiative launched during NATO's 2004 Istanbul Summit
[ 0.69613116979599, -0.06477408111095428, 0.031448982656002045, 0.06988582760095596, 0.590766191482544, 0.06007300317287445, -0.2338501363992691, 0.11532919108867645, -0.5026551485061646, -0.1736716479063034, -0.24118803441524506, 0.17831096053123474, 0.10074211657047272, 0.4103131592273712,...
15356
https://en.wikipedia.org/wiki/Imperial%20Chemical%20Industries
Imperial Chemical Industries
Imperial Chemical Industries (ICI) was a British chemical company. It was, for much of its history, the largest manufacturer in Britain. It was formed by the merger of four leading British chemical companies in 1926. Its headquarters were at Millbank in London. ICI was a constituent of the FT 30 and later the FTSE 100 indices. ICI made general chemicals, plastics, paints, pharmaceuticals and speciality products, including food ingredients, speciality polymers, electronic materials, fragrances and flavourings. In 2008, it was acquired by AkzoNobel, which immediately sold parts of ICI to Henkel, and integrated ICI's remaining operations within its existing organisation. History Development of the business (1926–1944) The company was founded in December 1926 from the merger of four companies: Brunner Mond, Nobel Explosives, the United Alkali Company, and British Dyestuffs Corporation. It established its head office at Millbank in London in 1928. Competing with DuPont and IG Farben, the new company produced chemicals, explosives, fertilisers, insecticides, dyestuffs, non-ferrous metals, and paints. In its first year turnover was £27 million. In the 1920s and 1930s, the company played a key role in the development of new chemical products, including the dyestuff phthalocyanine (1929), the acrylic plastic Perspex (1932), Dulux paints (1932, co-developed with DuPont), polyethylene (1937), and polyethylene terephthalate fibre known as Terylene (1941). In 1940, ICI started British Nylon Spinners as a joint venture with Courtaulds. ICI also owned the Sunbeam motorcycle business, which had come with Nobel Industries, and continued to build motorcycles until 1937. During the Second World War, ICI was involved with the United Kingdom's nuclear weapons programme codenamed Tube Alloys. Postwar innovation (1945–1990) In the 1940s and 1950s, the company established its pharmaceutical business and developed a number of key products, including Paludrine (1940s, an anti-malarial drug), halothane (1951, an inhalational anaesthetic agent), propofol (1977, an intravenous anaesthetic agent), Inderal (1965, a beta-blocker), tamoxifen (1978, a frequently used drug for breast cancer), and PEEK (1979, a high performance thermoplastic). ICI formed ICI Pharmaceuticals in 1957. ICI developed a fabric in the 1950s known as Crimplene, a thick polyester yarn used to make a fabric of the same name. The resulting cloth is heavy and wrinkle-resistant, and retains its shape well. The California-based fashion designer Edith Flagg was the first to import this fabric from Britain to the United States. During the first two years, ICI gave Flagg a large advertising budget to popularise the fabric across America. In 1960, Paul Chambers became the first chairman appointed from outside the company. Chambers employed the consultancy firm McKinsey to help with reorganising the company. His eight-year tenure saw export sales double, but his reputation was severely damaged by a failed takeover bid for Courtaulds in 1961–62. ICI was confronted with the nationalisation of its operations in Burma on 1 August 1962 as a consequence of the military coup. In 1964, ICI acquired British Nylon Spinners (BNS), the company it had jointly set up in 1940 with Courtaulds. ICI surrendered its 37.5 per cent holding in Courtaulds and paid Courtaulds £2 million a year for five years, "to take account of the future development expenditure of Courtaulds in the nylon field." In return, Courtaulds transferred to ICI their 50 per cent holding in BNS. BNS was absorbed into ICI's existing polyester operation, ICI Fibres. The acquisition included BNS production plants in Pontypool, Gloucester and Doncaster, together with research and development in Pontypool. Early pesticide development under ICI Plant Protection Division, with its plant at Yalding, Kent, research station at Jealott's Hill and HQ at Fernhurst Research Station included paraquat (1962, a herbicide), the insecticides pirimiphos-methyl in 1967 and pirimicarb in 1970, brodifacoum (a rodenticide) was developed in 1974; in the late 1970s, ICI was involved in the early development of synthetic pyrethroid insecticides such as lambda-cyhalothrin. Peter Allen was appointed chairman between 1968 and 1971. He presided over the purchase of Viyella. Profits shrank under his tenure. During his tenure, ICI created the wholly owned subsidiary Cleveland Potash Ltd, for the construction of Boulby Mine in Redcar and Cleveland, North Yorkshire. The first shaft was dug in 1968, with full production from 1976. ICI jointly owned the mine with Anglo American, and then with De Beers, before complete ownership was transferred to Israel Chemicals Ltd in 2002. Jack Callard was appointed chairman from 1971 to 1975. He almost doubled company profits between 1972 and 1974, and made ICI Britain's largest exporter. In 1971, the company acquired Atlas Chemical Industries Inc., a major American competitor. In 1977, Imperial Metal Industries was divested as an independent quoted company. From 1982 to 1987, the company was led by the charismatic John Harvey-Jones. Under his leadership, the company acquired the Beatrice Chemical Division in 1985 and Glidden Coatings & Resins, a leading paints business, in 1986. Reorganisation of the business (1991–2007) In 1991, ICI sold the agricultural and merchandising operations of BritAg and Scottish Agricultural Industries to Norsk Hydro, and fought off a hostile takeover bid from Hanson, who had acquired 2.8 percent of the company. It also divested its soda ash products arm to Brunner Mond, ending an association with the trade that had existed since the company's inception, one that had been inherited from the original Brunner, Mond & Co. Ltd. In 1992, the company sold its nylon business to DuPont. In 1993, the company de-merged its pharmaceutical bio-science businesses: pharmaceuticals, agrochemicals, specialities, seeds and biological products were all transferred into a new and independent company called Zeneca. Zeneca subsequently merged with Astra AB to form AstraZeneca. Charles Miller Smith was appointed CEO in 1994, one of the few times that someone from outside ICI had been appointed to lead the company, Smith having previously been a director at Unilever. Shortly afterwards, the company acquired a number of former Unilever businesses in an attempt to move away from its historical reliance on commodity chemicals. In 1995, ICI acquired the American paint companies Devoe Paints, Fuller-O'Brien Paints and Grow Group. In 1997, ICI acquired National Starch & Chemical, Quest International, Unichema, and Crosfield, the speciality chemicals businesses of Unilever for $8 billion. This step was part of a strategy to move away from cyclical bulk chemicals and to progress up the value chain to become a higher growth, higher margin business. Later that year it went on to buy Rutz & Huber, a Swiss paints business. Having taken on some £4 billion of debt to finance these acquisitions, the company had to sell off its commodity chemicals businesses: Disposals of bulk chemicals businesses at that time included the sale of its Australian subsidiary, ICI Australia, for £1 billion in 1997, and of its polyester chemicals business to DuPont for $3 billion also in 1997. In 1998, it bought Acheson Industries Inc., an electronic chemicals business. In 2000, ICI sold its diisocyanate, advanced materials, and speciality chemicals businesses on Teesside and worldwide (including plants at Rozenburg in the Netherlands, and South Africa, Malaysia and Taiwan), and Tioxide, its titanium dioxide subsidiary, to Huntsman Corporation for £1.7 billion. It also sold the last of its industrial chemicals businesses to Ineos for £325 million. In 2002, the ICI wholly transferred ownership of Boulby Mine to Israel Chemicals Ltd. In 2006, the Company sold Quest International, its flavours and fragrances business, to Givaudan, for £1.2 billion and Uniqema, its oleochemical business, to Croda International, for £410 million. Having sold much of its historically profitable commodities businesses, and many of the new speciality businesses which it had failed to integrate, the company consisted mainly of the Dulux paints business, which quickly found itself the subject of a takeover by AkzoNobel. Takeover by AkzoNobel Dutch firm AkzoNobel (owner of Crown Berger paints) bid £7.2 billion (€10.66 billion or $14.5 billion) for ICI in June 2007. An area of concern about a potential deal was ICI's British pension fund, which had future liabilities of more than £9 billion at the time. Regulatory issues in the UK and other markets where Dulux and Crown Paints brands each have significant market share were also a cause for concern for the boards of ICI and AkzoNobel. In the UK, any combined operation without divestments would have seen AkzoNobel have a 54 per cent market share in the paint market. The initial bid was rejected by the ICI board and the majority of shareholders. However, a subsequent bid for £8 billion (€11.82 billion) was accepted by ICI in August 2007, pending approval by regulators. On 2 January 2008, completion of the takeover of ICI plc by AkzoNobel was announced. Shareholders of ICI received either £6.70 in cash or AkzoNobel loan notes to the value of £6.70 per one nominal ICI share. The adhesives business of ICI was transferred to Henkel as a result of the deal, while AkzoNobel agreed to sell its Crown Paints subsidiary to satisfy the concerns of the European Commissioner for Competition. The areas of concern regarding the ICI UK pension scheme were addressed by ICI and AkzoNobel. Operations ICI operated a number of chemical sites around the world. In the UK, the main plants were as follows: Billingham Manufacturing Plant (in Stockton-on-Tees) and Wilton (in present-day Redcar and Cleveland): ICI used the Billingham site to manufacture fertilisers in the 1920s and went on to produce plastics at Billingham in 1934. During World War II it manufactured Synthonia, a synthetic ammonia for explosives. The Wilton R&D site was built to support the plastics division with R&D and chemical engineering facilities. The ICI Billingham Division was split into the ICI Heavy Organic Chemicals Division and ICI Agricultural Division in the 1960s. From 1971 to 1988 ICI Physics and Radioisotopes Section (later known as Tracerco) operated a small General Atomics TRIGA Mark I nuclear reactor at its Billingham factory for the production of radioisotopes used in the manufacture of flow and level instruments, among other products. The Agricultural Division was noted for the development of the world's largest bioreactor at the time – the 1.5 million litre Pruteen Reactor, used for the cultivation of animal feed. Engineering models of components and the builder's model of the complete plant are now in the collection of the Science Museum London. Pruteen had limited economic success but was followed by the much more successful development of Quorn. Blackley (in Manchester) and Huddersfield: ICI used the sites to manufacture dyestuffs. The dye business, known as the ICI Dyestuffs Division in the 1960s, went through several reorganisations. Huddersfield was tied in with Wilton with the production of nitrobenzene and nitrotoluene. Huddersfield also produced insecticides. (Syngenta still manufacture insecticides at Huddersfield). Proxel Biocide was made at Huddersfield from the 80's onwards. Additives also made at Huddersield. Huddersfield became Zeneca then AstraZeneca, in 2004 Huddersfield was Syngenta, Avecia, Arch and Lubrizol running what were all ICI plants at one time. Through the years it was combined with other speciality chemicals businesses and became Organics Division. Then became ICI Colours and Fine Chemicals and then ICI Specialties. Runcorn (in Cheshire): ICI operated a number of separate sites within the Runcorn area, including Castner-Kellner site, where ICI manufactured chlorine and sodium hydroxide (caustic soda). Adjacent to Castner-Kellner site was Rocksavage works, where a variety of chemicals based on chlorine products were manufactured, including Chloromethanes, Arklone dry cleaning fluid, Trichloethylene degreasing fluid and the Arcton range of CFCs. Also on that site were PVC manufacture and HF (Hydrogen fluoride) manufacture. At Runcorn Heath Research Laboratories, technical support, research and development for Mond Division products was carried out, and the support sections included chemical plan design and engineering sections. Just to the north of Runcorn, on an island between the Manchester Ship Canal and the River Mersey could be found the Wigg Works, which had been erected originally for producing poison gas in wartime. In Widnes could also be found several factories producing weedkillers and other products. For many years it was known as ICI Mond Division but later became part of the ICI Chemicals and Polymers Division. The Runcorn site was also responsible for the development of the HiGEE and Spinning Disc Reactor concepts. These were originated by Professor Colin Ramshaw and led to the concept of Process Intensification; research into these novel technologies is now being pursued by the Process Intensification Group at Newcastle University. Winnington and Wallerscote (in Northwich, Cheshire): It was here that ICI manufactured sodium carbonate (soda ash) and its various by-products such as sodium bicarbonate (bicarbonate of soda), and sodium sesquicarbonate. The Winnington site, built in 1873 by the entrepreneurs John Tomlinson Brunner and Ludwig Mond, was also the base for the former company Brunner, Mond & Co. Ltd. and, after the merger which created ICI, the powerful and influential Alkali Division. It was at the laboratories on this site that polythene was discovered by accident in 1933 during experiments into high pressure reactions. Wallerscote was built in 1926, its construction delayed by the First World War, and became one of the largest factories devoted to a single product (soda ash) in the world. However, the decreasing importance of the soda ash trade to ICI in favour of newer products such as paints and plastics, meant that in 1984 the Wallerscote site was closed, and thereafter mostly demolished. The laboratory where polythene was discovered was sold off and the building became home to a variety of businesses including a go-kart track and paintballing, and the Winnington Works were divested to the newly formed company, Brunner Mond, in 1991. It was again sold in 2006, to Tata (an Indian-based company) and in 2011 was re branded as Tata Chemicals Europe. The Winnington plant closed in February 2014, with the last shift on 2 February bringing to a close 140 years of soda ash production in this Northwich site. Ardeer (in Stevenston, Ayrshire): ICI Nobel used the site to manufacture dynamite and other explosives and nitrocellulose-based products. For a time, the site also produced nylon and nitric acid. Nobel Enterprises was sold in 2002 to Inabata. Penrhyndeudraeth (Gwynedd, North Wales): Cooke’s Works, part of ICI’s Nobel’s Explosives Company division produced nitroglycerine-based explosives up until the site’s closure in 1995. Slough (in Berkshire): Headquarters of ICI Paints Division. Welwyn Garden City (in Hertfordshire): Headquarters of ICI Plastics Division until the early 1990s. Argentina An ICI subsidiary called Duperial operated in Argentine from 1928 to 1995, when it was renamed ICI. Established in the city of San Lorenzo, Santa Fe, it operates an integrated production site with commercial offices in Buenos Aires. Since 2009 it has made sulphuric acid with ISO certification under the company name Akzo Nobel Functional Chemicals S.A. It also had an operation at Palmira, Mendoza, for its Wine Chemicals Division, that manufactured tartaric acid, wine alcohol and grapeseed oil from natural raw material coming from the wine industry in the provinces of Mendoza and San Juan. This operation held 10% world market share for tartaric acid. It was sold in 2008 and currently operates as Derivados Vínicos S.A. (DERVINSA). Australia The subsidiary ICI Australia Ltd established the Dry Creek Saltfields at Dry Creek north of Adelaide, South Australia, in 1940, with an associated soda ash plant at nearby Osborne. In 1989, these operations were sold to Penrice Soda Products. An ICI plant was built at Botany Bay in New South Wales in the 1940s and was sold to Orica in 1997. The plant once manufactured paints, plastics and industrial chemicals such as solvents. It was responsible for the Botany Bay Groundwater Plume contamination of a local aquifer. Bangladesh In 1968 a subsidiary of Imperial Chemical Industries (ICI) was established in then-East Pakistan. After Bangladesh gained independence in 1971, the company was incorporated on 24 January 1973 as ICI Bangladesh Manufacturers Limited and also as Public Limited Company. The company divested its investment in Bangladesh and was renamed as Advanced Chemical Industries Limited (ACI Limited) on 5 May 1992. The company sold its insect control, air care and toilet care brands to SC Johnson & Son in 2015. Currently Advanced Chemical Industries (ACI) Limited is one of the largest conglomerates in Bangladesh with a multinational heritage operating across the country. The company operates through three reporting divisions: Pharmaceuticals, Consumer Brands and Agribusiness. Sri Lanka ICI maintained offices in Colombo importing and supplying chemicals for manufacturers in Ceylon. In 1964, following import restrictions that allowed only locally owned subsidiaries of multinational companies to gain import licenses, Chemical Industries (Colombo) Limited was formed as an ICI subsidiary with 49% ICI ownership and remaining held public. New Zealand The subsidiary ICI New Zealand provided substantial quantities of chemical products – including swimming pool chemicals, commercial healthcare products, herbicides and pesticides for use within New Zealand and the neighboring Pacific Islands. A fire at the ICI New Zealand store in Mount Wellington, Auckland, on 21 December 1984, killed an ICI employee and caused major health concerns. Over 200 firefighters were exposed to toxic smoke and effluents during the firefighting efforts. Six firefighters retired for medical reasons as a result of the fire. This incident was a major event in the history of the New Zealand Fire Service and subject to a formal investigation, led by future Chief Justice Sian Elias. The fire was a trigger for major reforms of the service; direct consequences included improved protective clothing for firefighters, a standard safety protocol for major incidents, the introduction of dedicated fireground safety officers, and changes to occupational health regulations. See also Imperial Chemical House IMI plc (formerly Imperial Metal Industries) Pharmaceutical industry in the United Kingdom References Further reading AstraZeneca British companies established in 1926 Chemical companies established in 1926 Chemical companies of the United Kingdom Former defence companies of the United Kingdom Companies formerly listed on the London Stock Exchange Paint and coatings companies of the United Kingdom 1926 establishments in England
[ 0.2116883248090744, 0.49280357360839844, -0.6510440111160278, -0.11976168304681778, -0.29542478919029236, 0.1996220499277115, -0.2548934519290924, 0.3410916328430176, -0.07900414615869522, 0.3656410276889801, -0.18131834268569946, 0.14334537088871002, 0.2543087303638458, 1.2810122966766357...
15357
https://en.wikipedia.org/wiki/Imperial%20Airways
Imperial Airways
Imperial Airways was the early British commercial long-range airline, operating from 1924 to 1939 and principally serving the British Empire routes to South Africa, India and the Far East, including Australia, Malaya and Hong Kong. Passengers were typically businessmen or colonial administrators, most flights carried about 20 passengers or less. Accidents were frequent: in the first six years, 32 people died in seven incidents. Imperial Airways never achieved the levels of technological innovation of its competitors, and was merged into the British Overseas Airways Corporation (BOAC) in 1939. BOAC in turn merged with the British European Airways (BEA) in 1974 to form British Airways. Background The establishment of Imperial Airways occurred in the context of facilitating overseas settlement by making travel to and from the colonies quicker, and that flight would also speed up colonial government and trade that was until then dependent upon ships. The launch of the airline followed a burst of air route surveying in the British Empire after the First World War, and after some experimental (and often dangerous) long-distance flying to the margins of Empire. Formation Imperial Airways was created against a background of stiff competition from French and German airlines that enjoyed heavy government subsidies and following the advice of the government's Hambling Committee (formally known as the C.A.T Subsidies Committee) under Sir Herbert Hambling. The committee, set up on 2 January 1923, produced a report on 15 February 1923 recommending that four of the largest existing airlines, the Instone Air Line Company, owned by shipping magnate Samuel Instone, Noel Pemberton Billing's British Marine Air Navigation (part of the Supermarine flying-boat company), the Daimler Airway, under the management of George Edward Woods, and Handley Page Transport Co Ltd., should be merged. It was hoped that this would create a company which could compete against French and German competition and would be strong enough to develop Britain's external air services while minimizing government subsidies for duplicated services. With this in view, a £1m subsidy over ten years was offered to encourage the merger. Agreement was made between the President of the Air Council and the British, Foreign and Colonial Corporation on 3 December 1923 for the company, under the title of the 'Imperial Air Transport Company' to acquire existing air transport services in the UK. The agreement set out the government subsidies for the new company: £137,000 in the first year diminishing to £32,000 in the tenth year as well as minimum mileages to be achieved and penalties if these weren't met. Imperial Airways Limited was formed on 31 March 1924 with equipment from each contributing concern: British Marine Air Navigation Company Ltd, the Daimler Airway, Handley Page Transport Ltd and the Instone Air Line Ltd. Sir Eric Geddes was appointed the chairman of the board with one director from each of the merged companies. The government had appointed two directors, Hambling (who was also President of the Institute of Bankers) and Major John Hills, a former Treasury Financial Secretary. The land operations were based at Croydon Airport to the south of London. IAL immediately discontinued its predecessors' service to points north of London, the airline being focused on international and imperial service rather than domestic. Thereafter the only IAL aircraft operating 'North of Watford' were charter flights. Industrial troubles with the pilots delayed the start of services until 26 April 1924, when a daily London–Paris route was opened with a de Havilland DH.34. Thereafter the task of expanding the routes between England and the Continent began, with Southampton–Guernsey on 1 May 1924, London-Brussels–Cologne on 3 May, London–Amsterdam on 2 June 1924, and a summer service from London–Paris–Basel–Zürich on 17 June 1924. The first new airliner ordered by Imperial Airways, was the Handley Page W8f City of Washington, delivered on 3 November 1924. In the first year of operation the company carried 11,395 passengers and 212,380 letters. In April 1925, the film The Lost World became the first film to be screened for passengers on a scheduled airliner flight when it was shown on the London-Paris route. Empire services Route proving Between 16 November 1925 and 13 March 1926, Alan Cobham made an Imperial Airways' route survey flight from the UK to Cape Town and back in the Armstrong Siddeley Jaguar–powered de Havilland DH.50J floatplane G-EBFO. The outward route was London–Paris–Marseille–Pisa–Taranto–Athens–Sollum–Cairo–Luxor–Aswan–Wadi Halfa–Atbara–Khartoum–Malakal–Mongalla–Jinja–Kisumu–Tabora–Abercorn–Ndola–Broken Hill–Livingstone–Bulawayo–Pretoria–Johannesburg–Kimberley–Blomfontein–Cape Town. On his return Cobham was awarded the Air Force Cross for his services to aviation. On 30 June 1926, Cobham took off from the River Medway at Rochester in G-EBFO to make an Imperial Airways route survey for a service to Melbourne, arriving on 15 August 1926. He left Melbourne on 29 August 1926, and, after completing in 320 hours flying time over 78 days, he alighted on the Thames at Westminster on 1 October 1926. Cobham was met by the Secretary of State for Air, Sir Samuel Hoare, and was subsequently knighted by HM King George V. On 27 December 1926, Imperial Airways de Havilland DH.66 Hercules G-EBMX City of Delhi left Croydon for a survey flight to India. The flight reached Karachi on 6 January 1927 and Delhi on 8 January 1927. The aircraft was named by Lady Irwin, wife of the Viceroy, on 10 January 1927. The return flight left on 1 February 1927 and arrived at Heliopolis, Cairo on 7 February 1927. The flying time from Croydon to Delhi was 62 hours 27 minutes and Delhi to Heliopolis 32 hours 50 minutes. The Eastern Route Regular services on the Cairo to Basra route began on 12 January 1927 using DH.66 aircraft, replacing the previous RAF mail flight. Following 2 years of negotiations with the Persian authorities regarding overflight rights, a London to Karachi service started on 30 March 1929, taking 7 days and consisting of a flight from London to Basle, a train to Genoa and a Short S.8 Calcutta flying boats to Alexandria, a train to Cairo and finally a DH.66 flight to Karachi. The route was extended as far as Delhi on 29 December 1929. The route across Europe and the Mediterranean changed many times over the next few years but almost always involved a rail journey. In April 1931 an experimental London-Australia air mail flight took place; the mail was transferred at the Dutch East Indies, and took 26 days in total to reach Sydney. For the passenger flight leaving London on 1 October 1932, the Eastern route was switched from the Persian to the Arabian side of the Persian Gulf, and Handley Page HP 42 airliners were introduced on the Cairo to Karachi sector. The move saw the establishment of an airport and rest house, Mahatta Fort, in the Trucial State of Sharjah now part of the United Arab Emirates. On 29 May 1933 an England to Australia survey flight took off, operated by Imperial Airways Armstrong Whitworth Atalanta G-ABTL Astraea. Major H G Brackley, Imperial Airways' Air Superintendent, was in charge of the flight. Astraea flew Croydon-Paris-Lyon-Rome-Brindisi-Athens-Alexandria-Cairo where it followed the normal route to Karachi then onwards to Jodhpur-Delhi-Calcutta-Akyab-Rangoon-Bangkok-Prachuab-Alor Setar-Singapore-Palembang-Batavia-Sourabaya-Bima-Koepang-Bathurst Island-Darwin-Newcastle Waters-Camooweal-Cloncurry-Longreach-Roma-Toowoomba reaching Eagle Farm, Brisbane on 23 June. Sydney was visited on 26 June, Canberra on 28 June and Melbourne on 29 June. There followed a rapid eastern extension. The first London to Calcutta service departed on 1 July 1933, the first London to Rangoon service on 23 September 1933, the first London to Singapore service on 9 December 1933, and the first London to Brisbane service on 8 December 1934, with Qantas responsible for the Singapore to Brisbane sector. (The 1934 start was for mail; passenger flights to Brisbane began the following April.) The first London to Hong Kong passengers departed London on 14 March 1936 following the establishment of a branch from Penang to Hong Kong. The Africa Route On 28 February 1931 a weekly service began between London and Mwanza on Lake Victoria in Tanganyika as part of the proposed route to Cape Town. On 9 December 1931 the Imperial Airways' service for Central Africa was extended experimentally to Cape Town for the carriage of Christmas mail. The aircraft used on the last sector, DH66 G-AARY City of Karachi arrived in Cape Town on 21 December 1931. On 20 January 1932 a mail-only route to London to Cape Town was opened. On 27 April this route was opened to passengers and took 10 days. In early 1933 Atalantas replaced the DH.66s on the Kisumu to Cape Town sector of the London to Cape Town route. On 9 February 1936 the trans-Africa route was opened by Imperial Airways between Khartoum and Kano in Nigeria. This route was extended to Lagos on 15 October 1936. Short Empire flying boats In 1937 with the introduction of Short Empire flying boats built at Short Brothers, Imperial Airways could offer a through-service from Southampton to the Empire. The journey to the Cape was via Marseille, Rome, Brindisi, Athens, Alexandria, Khartoum, Port Bell, Kisumu and onwards by land-based craft to Nairobi, Mbeya and eventually Cape Town. Survey flights were also made across the Atlantic and to New Zealand. By mid-1937 Imperial had completed its thousandth service to the Empire. Starting in 1938 Empire flying boats also flew between Britain and Australia via India and the Middle East. In March 1939 three Shorts a week left Southampton for Australia, reaching Sydney after ten days of flying and nine overnight stops. Three more left for South Africa, taking six flying days to Durban. Passengers Imperial's aircraft were small, most seating fewer than twenty passengers; about 50,000 passengers used Imperial Airways in the 1930s. Most passengers on intercontinental routes or on services within and between British colonies were men doing colonial administration, business or research. To begin with only the wealthy could afford to fly, but passenger lists gradually diversified. Travel experiences related to flying low and slow, and were reported enthusiastically in newspapers, magazines and books. There was opportunity for sightseeing from the air and at stops. Crews Imperial Airways stationed its all-male flight deck crew, cabin crew and ground crew along the length of its routes. Specialist engineers and inspectors – and ground crew on rotation or leave – travelled on the airline without generating any seat revenue. Several air crew lost their lives in accidents. At the end of the 1930s crew numbers approximated 3,000. All crew were expected to be ambassadors for Britain and the British Empire. Air Mail In 1934 the Government began negotiations with Imperial Airways to establish a service (Empire Air Mail Scheme) to carry mail by air on routes served by the airline. Indirectly these negotiations led to the dismissal in 1936 of Sir Christopher Bullock, the Permanent Under-Secretary at the Air Ministry, who was found by a Board of Inquiry to have abused his position in seeking a position on the board of the company while these negotiations were in train. The Government, including the Prime Minister, regretted the decision to dismiss him, later finding that, in fact, no corruption was alleged and sought Bullock's reinstatement which he declined. The Empire Air Mail Programme started in July 1937, delivering anywhere for 1 d./oz. By mid-1938 a hundred tons of mail had been delivered to India and a similar amount to Africa. In the same year, construction was started on the Empire Terminal in Victoria, London, designed by A. Lakeman and with a statue by Eric Broadbent, Speed Wings Over the World gracing the portal above the main entrance. From the terminal there were train connections to Imperial's flying boats at Southampton and coaches to its landplane base at Croydon Airport. The terminal operated as recently as 1980. To help promote use of the Air Mail service, in June and July 1939, Imperial Airways participated with Pan American Airways in providing a special "around the world" service; Imperial carried the souvenir mail from Foynes, Ireland, to Hong Kong, out of the eastbound New York to New York route. Pan American provided service from New York to Foynes (departing 24 June, via the first flight of Northern FAM 18) and Hong Kong to San Francisco (via FAM 14), and United Airlines carried it on the final leg from San Francisco to New York, arriving on 28 July. Captain H.W.C. Alger was the pilot for the inaugural air mail flight carrying mail from England to Australia for the first time on the Short Empire flyingboat Castor for Imperial Airways' Empires Air Routes, in 1937. In November 2016, 80 years later, the Crete2Cape Vintage Air Rally flew this old route with fifteen vintage aeroplanes - a celebration of the skill and determination of these early aviators. Second World War Before the outbreak of war on 1 September 1939, the British government had already implemented the Air Navigation (Restriction in Time of War) Order 1939. That ordered military takeover of most civilian airfields in the UK, cessation of all private flying without individual flight permits, and other emergency measures. It was administered by a statutory department of the Air Ministry titled National Air Communications (NAC). By 1 September 1939, the aircraft and administrations of Imperial Airways and British Airways Ltd were physically transferred to Bristol (Whitchurch) Airport, to be operated jointly by NAC. On 1 April 1940, Imperial Airways Ltd and British Airways Ltd were officially combined into a new company, British Overseas Airways Corporation (BOAC), that had already been formed on 24 November 1939 with retrospective financial arrangements. Accidents and incidents Fatal accidents 1920s 24 December 1924: de Havilland DH.34 G-EBBX City of Delhi crashed and caught fire shortly after take-off from Croydon Airport, killing the pilot and all seven passengers. 13 July 1928: Vickers Vulcan G-EBLB crashed at Purley during a test flight, killing four of the six people on board. As a result of the crash, Imperial Airways stopped the flying of staff (so called joy rides) during test flights. 17 June 1929: Handley Page W.10 G-EBMT City of Ottawa ditched in the English Channel following engine failure whilst on a flight from Croydon to Paris with the loss of seven lives. 6 September 1929: de Havilland Hercules G-EBMZ City of Jerusalem crashed and burned on landing at Jask, Iran in the dark due to the pilot misjudging the altitude and stalling the aircraft, killing three of five on board. 26 October 1929: Short Calcutta G-AADN City of Rome force-landed off La Spezia, Italy in poor weather; the flying boat sank in the night during attempts to tow it to shore, killing all seven on board. 1930s 30 October 1930: Handley Page W.8g G-EBIX City of Washington struck high ground in fog at Boulogne, Paris, France, killing three of six on board. 28 March 1933: Armstrong Whitworth Argosy G-AACI City of Liverpool crashed at Diksmuide, Belgium following an in-flight fire. This is suspected to be the first case of sabotage in the air. All fifteen people on board were killed. 30 December 1933: Avro Ten G-ABLU Apollo collided with a radio mast at Ruysselede, Belgium and crashed. All ten people on board were killed. 31 December 1935: Short Calcutta G-AASJ City of Khartoum crashed off Alexandria, Egypt when all four engines failed on approach, possibly due to fuel starvation; twelve of 13 on board drowned when the flying boat sank. 22 August 1936: Short Kent G-ABFA Scipio sank at Mirabello Bay, Crete after a heavy landing, killing two of 11 on board. 24 March 1937: Short Empire G-ADVA Capricornus crashed in the Beaujolois Mountains near Ouroux, France, following a navigation error, killing five. 1 October 1937: Short Empire G-ADVC Courtier crashed on landing in Phaleron Bay, Greece due to poor visibility, killing two of 15 on board. 5 December 1937: Short Empire G-ADUZ Cygnus crashed on takeoff from Brindisi, Italy due to incorrect flap settings, killing two. 27 July 1938: Armstrong Whitworth Atalanta G-ABTG Amalthea flew into a hillside near Kisumu, Kenya shortly after takeoff, killing all four on board. 27 November 1938: Short Empire G-AETW Calpurnia crashed in Lake Habbaniyah, Iraq in bad weather after the pilot descended to maintain visual contact with the ground following spatial disorientation, killing all four crew. 21 January 1939: Short Empire G-ADUU Cavalier ditched in the Atlantic 285 mi off New York due to carburettor icing and loss of engine power; three drowned while ten survivors were picked up by the tanker Esso Baytown. Thereafter Imperial Airways and Pan-American trans-oceanic flying boats had the upper surfaces of the wings painted with orange high visibility markings. 1 May 1939: Short Empire G-ADVD Challenger crashed in the Lumbo lagoon while attempting to land at Lumbo Airport, killing two of six on board. 1940 1 March 1940: Flight 197, operated by Handley Page H.P.42 G-AAGX Hannibal, disappeared over the Gulf of Oman with eight on board; no wreckage, cargo or occupants have been found. The cause of the crash remains unknown, but fuel starvation, a bird strike damaging a propeller and causing an engine or wing to separate, an in-flight breakup or multiple engine failure were theorized. Two months after the crash, the H.P.42 was withdrawn from passenger operations. It was also recommended that all commercial aircraft used in long flights over water be equipped with personal and group life saving gear; this would later become standard throughout the airline industry. Non-fatal accidents 21 October 1926: Handley Page W.10 G-EBMS City of Melbourne ditched in the English Channel off the English coast after an engine failed. All 12 people on board were rescued by FV Invicta. 19 April 1931: de Havilland DH.66 Hercules with registration G-EBMW, damaged beyond repair in a forced landing following fuel starvation at Surabaya. The airplane operated on a trial mail flight from India to Melbourne with en route stops at Semarang, Soerabaja and Kupang. 8 August 1931: Handley Page H.P.42 G-AAGX Hannibal was operating a scheduled passenger flight from Croydon to Paris when an engine failed and debris forced a second engine to be shut down. A forced landing at Five Oak Green, Kent resulted in extensive damage. No injuries occurred. Hannibal was dismantled and trucked to Croydon to be rebuilt. 9 November 1935: Short Kent G-ABFB Sylvanus caught fire and burned out during refueling in Brindisi Harbor; the refueling crew were able to jump clear of the burning aircraft and survived. 29 September 1936: Armstrong Whitworth Atalanta G-ABTK burned out in a hangar fire at Delhi, India. 31 May 1937: Handley Page H.P.45 (former H.P.42) G-AAXE Hengist was destroyed in a hangar fire at Karachi, India. 3 December 1938: de Havilland Express G-ADCN burned out at Bangkok. 12 March 1939: Short S.23 Empire Flying Boat Mk 1 G-ADUY, damaged beyond repair at Tandjong, Batavia, Netherlands East Indies. Struck a submerged object while taxiing after alighting. Aircraft beached but damaged beyond repair by immersion and mishandling during salvage. Aircraft dismantled and shipped to England but not returned to service. 7 November 1939: Handley Page H.P.42 G-AXXD Horatius was written off following a forced landing at a golf course at Tiverton, Devon. 19 March 1940: Handley Page H.P.45 G-AAXC Heracles and H.P.42 G-AAUD Hanno were written off after being blown over in a windstorm while parked at Whitchurch Airport. Aircraft Imperial Airways operated many types of aircraft from its formation on 1 April 1924 until 1 April 1940 when all aircraft still in service were transferred to BOAC. References Footnotes Notes Bibliography Baldwin, N.C. 1950.Imperial Airways (and Subsidiary Companies): A History and Priced Check List of the Empire Air Mails. Sutton Coldfield, England: Francis J. Field. Budd, Lucy "Global Networks Before Globalisation: Imperial Airways and the Development of Long-Haul Air Routes" Globalization and World Cities (GaWC) Research Bulletin 253, 5 December 2007. Cluett, Douglas; Nash, Joanna; Learmonth Bob. 1980. Croydon Airport 1928 – 1939, The Great Days. London Borough of Sutton Davies, R.E.G 2005. British Airways: An Airline and Its Aircraft, Volume 1: 1919–1939—The Imperial Years. McLean, VA: Paladwr Press. Doyle, Neville. 2002. The Triple Alliance: The Predecessors of the first British Airways. Air-Britain. Higham, Robin. 1960. Britain's Imperial Air Routes 1918 to 1939: The Story of Britain's Overseas Airlines London: G.T. Foulis; Hamden, CT: Shoe String. Jackson, A.J. 1959 and 1974. British Civil Aircraft since 1919 2 vols (1st ed.); 3 vols (2nd ed.) London: Putnam. Moss, Peter W. 1962. Impressments Log (Vol I-IV). Air-Britain. Moss, Peter W. October 1974. British Airways. Aeroplane Monthly. Pirie, G.H. 2004. Passenger traffic in the 1930s on British imperial air routes: refinement and revision. Journal of Transport History, 25: 66–84. Pirie, G.H. 2009. Air Empire: British Imperial Civil Aviation 1919–39. Manchester: Manchester University Press. . Pirie, G.H. 2009. Incidental tourism: British imperial air travel in the 1930s. Journal of Tourism History, 1: 49–66. Pirie, G.H. 2012.Cultures and Caricatures of British Imperial Aviation: Passengers, Pilots, Publicity. Manchester: Manchester University Press. . Pudney, J. 1959. The Seven Skies - A Study of BOAC and its forerunners since 1919. London: Putnam. Salt, Major A.E.W. 1930.Imperial Air Routes. London: John Murray. Sanford, Kendall C. 2003. Air Crash Mail of Imperial Airways and Predecessor Airlines. Bristol: Stuart Rossiter Trust Fund. Stroud, John 1962.Annals of British and Commonwealth Air Transport 1919–1960. London: Putnam. Stroud, John. 2005. The Imperial Airways Fleet. Stroud, England: Tempus Publishing. External links www.imperial-airways.com enthusiast website at archive.org British Airways "Explore our past" Imperial Airways Timetables History Imperial Airways Eastern Route Website for historical information on the airline Website for the Imperial Airways Museum Website for The Crete2Cape Vintage Air Rally Airlines established in 1924 Defunct airlines of the United Kingdom Airlines disestablished in 1939 Defunct seaplane operators
[ 0.033838532865047455, -0.16818052530288696, -0.008598574437201023, 0.15187092125415802, -0.4014734923839569, 0.37342989444732666, 0.18163041770458221, 0.22703303396701813, 0.19388490915298462, -0.26046934723854065, -0.0074769980274140835, -0.29554736614227295, -0.13981160521507263, 0.94156...
15358
https://en.wikipedia.org/wiki/Insanity%20defense
Insanity defense
The insanity defense, also known as the mental disorder defense, is an affirmative defense by excuse in a criminal case, arguing that the defendant is not responsible for their actions due to an episodic or persistent psychiatric disease at the time of the criminal act. This is contrasted with an excuse of provocation, in which the defendant is responsible, but the responsibility is lessened due to a temporary mental state. It is also contrasted with a finding that a defendant cannot stand trial in a criminal case because a mental disease prevents him from effectively assisting counsel, from a civil finding in trusts and estates where a will is nullified because it was made when a mental disorder prevented a testator from recognizing the natural objects of his bounty, and from involuntary civil commitment to a mental institution, when anyone is found to be gravely disabled or to be a danger to himself or to others. Exemption from full criminal punishment on such grounds dates back to at least the Code of Hammurabi. Legal definitions of insanity or mental disorder are varied, and include the M'Naghten Rule, the Durham rule, the 1953 British Royal Commission on Capital Punishment report, the ALI rule (American Legal Institute Model Penal Code rule), and other provisions, often relating to a lack of mens rea ("guilty mind"). In the criminal laws of Australia and Canada, statutory legislation enshrines the M'Naghten Rules, with the terms defense of mental disorder, defense of mental illness or not criminally responsible by reason of mental disorder employed. Being incapable of distinguishing right from wrong is one basis for being found to be legally insane as a criminal defense. It originated in the M'Naghten Rule, and has been reinterpreted and modernized through more recent cases, such as People v. Serravo. In the United Kingdom, Ireland, and the United States, use of the defense is rare. Mitigating factors, including things not eligible for the insanity defense such as intoxication (or, more frequently, diminished capacity), may lead to reduced charges or reduced sentences. The defense is based on evaluations by forensic mental health professionals with the appropriate test according to the jurisdiction. Their testimony guides the jury, but they are not allowed to testify to the accused's criminal responsibility, as this is a matter for the jury to decide. Similarly, mental health practitioners are restrained from making a judgment on the "ultimate issue"—whether the defendant is insane. Some jurisdictions require the evaluation to address the defendant's ability to control their behavior at the time of the offense (the volitional limb). A defendant claiming the defense is pleading "not guilty by reason of insanity" (NGRI) or "guilty but insane or mentally ill" in some jurisdictions which, if successful, may result in the defendant being committed to a psychiatric facility for an indeterminate period. Non compos mentis Non compos mentis (Latin) is a legal term meaning "not of sound mind". Non compos mentis derives from the Latin non meaning "not", compos meaning "having command" or "composed", and mentis (genitive singular of mens), meaning "of mind". It is the direct opposite of Compos mentis (of a sound mind). Although typically used in law, this term can also be used metaphorically or figuratively; e.g. when one is in a confused state, intoxicated, or not of sound mind. The term may be applied when a determination of competency needs to be made by a physician for purposes of obtaining informed consent for treatments and, if necessary, assigning a surrogate to make health care decisions. While the proper sphere for this determination is in a court of law, this is practically, and most frequently, made by physicians in the clinical setting. In English law, the rule of non compos mentis was most commonly used when the defendant invoked religious or magical explanations for behaviour. History The concept of defense by insanity has existed since ancient Greece and Rome. However, in colonial America a delusional Dorothy Talbye was hanged in 1638 for murdering her daughter, as at the time Massachusetts's common law made no distinction between insanity (or mental illness) and criminal behavior. Edward II, under English Common law, declared that a person was insane if their mental capacity was no more than that of a "wild beast" (in the sense of a dumb animal, rather than being frenzied). The first complete transcript of an insanity trial dates to 1724. It is likely that the insane, like those under 14, were spared trial by ordeal. When trial by jury replaced this, the jury members were expected to find the insane guilty but then refer the case to the King for a Royal Pardon. From 1500 onwards, juries could acquit the insane, and detention required a separate civil procedure. The Criminal Lunatics Act 1800, passed with retrospective effect following the acquittal of James Hadfield, mandated detention at the regent's pleasure (indefinitely) even for those who, although insane at the time of the offence, were now sane. The M'Naghten Rules of 1843 were not a codification or definition of insanity but rather the responses of a panel of judges to hypothetical questions posed by Parliament in the wake of Daniel M'Naghten's acquittal for the homicide of Edward Drummond, whom he mistook for British Prime Minister Robert Peel. The rules define the defense as "at the time of committing the act the party accused was labouring under such a defect of reason, from disease of the mind, as not to know the nature and quality of the act he was doing, or as not to know that what he was doing was wrong." The key is that the defendant could not appreciate the nature of his actions during the commission of the crime. In Ford v. Wainwright 477 U.S. 399 (1986), the US Supreme Court upheld the common law rule that the insane cannot be executed. It further stated that a person under the death penalty is entitled to a competency evaluation and to an evidentiary hearing in court on the question of his competency to be executed. In Wainwright v. Greenfield, the Court ruled that it was fundamentally unfair for the prosecutor to comment during the court proceedings on the petitioner's silence invoked as a result of a Miranda warning. The prosecutor had argued that the respondent's silence after receiving Miranda warnings was evidence of his sanity. Application Incompetency and mental illness An important distinction to be made is the difference between competency and criminal responsibility. The issue of competency is whether a defendant is able to adequately assist his attorney in preparing a defense, make informed decisions about trial strategy and whether to plead guilty, accept a plea agreement or plead not guilty. This issue is dealt with in UK law as "fitness to plead". Competency largely deals with the defendant's present condition, while criminal responsibility addresses the condition at the time the crime was committed. In the United States, a trial in which the insanity defense is invoked typically involves the testimony of psychiatrists or psychologists who will, as expert witnesses, present opinions on the defendant's state of mind at the time of the offense. Therefore, a person whose mental disorder is not in dispute is determined to be sane if the court decides that despite a "mental illness" the defendant was responsible for the acts committed and will be treated in court as a normal defendant. If the person has a mental illness and it is determined that the mental illness interfered with the person's ability to determine right from wrong (and other associated criteria a jurisdiction may have) and if the person is willing to plead guilty or is proven guilty in a court of law, some jurisdictions have an alternative option known as either a Guilty but Mentally Ill (GBMI) or a Guilty but Insane verdict. The GBMI verdict is available as an alternative to, rather than in lieu of, a "not guilty by reason of insanity" verdict. Michigan (1975) was the first state to create a GBMI verdict, after two prisoners released after being found NGRI committed violent crimes within a year of release, one raping two women and the other killing his wife. Temporary insanity The notion of temporary insanity argues that a defendant was insane during the commission of a crime, but they later regained their sanity after the criminal act was carried out. This legal defense is commonly used to defend individuals that have committed crimes of passion. The defense was first successfully used by U.S. Congressman Daniel Sickles of New York in 1859 after he had killed his wife's lover, Philip Barton Key. Mitigating factors and diminished capacity The United States Supreme Court (in Penry v. Lynaugh) and the United States Court of Appeals for the Fifth Circuit (in Bigby v. Dretke) have been clear in their decisions that jury instructions in death penalty cases that do not ask about mitigating factors regarding the defendant's mental health violate the defendant's Eighth Amendment rights, saying that the jury is to be instructed to consider mitigating factors when answering unrelated questions. This ruling suggests specific explanations to the jury are necessary to weigh mitigating factors. Diminished responsibility or diminished capacity can be employed as a mitigating factor or partial defense to crimes. In the United States, diminished capacity is applicable to more circumstances than the insanity defense. The Homicide Act 1957 is the statutory basis for the defense of diminished responsibility in England and Wales, whereas in Scotland it is a product of case law. The number of findings of diminished responsibility has been matched by a fall in unfitness to plead and insanity findings. A plea of diminished capacity is different from a plea of insanity in that "reason of insanity" is a full defense while "diminished capacity" is merely a plea to a lesser crime. Withdrawal or refusal of defense Several cases have ruled that persons found not guilty by reason of insanity may not withdraw the defense in a habeas petition to pursue an alternative, although there have been exceptions in other rulings. In Colorado v. Connelly, 700 A.2d 694 (Conn. App. Ct. 1997), the petitioner who had originally been found not guilty by reason of insanity and committed for ten years to the jurisdiction of a Psychiatric Security Review Board, filed a pro se writ of habeas corpus and the court vacated his insanity acquittal. He was granted a new trial and found guilty of the original charges, receiving a prison sentence of 40 years. In the landmark case of Frendak v. United States in 1979, the court ruled that the insanity defense cannot be imposed upon an unwilling defendant if an intelligent defendant voluntarily wishes to forgo the defense. Usage This increased coverage gives the impression that the defense is widely used, but this is not the case. According to an eight-state study, the insanity defense is used in less than 1% of all court cases and, when used, has only a 26% success rate. Of those cases that were successful, 90% of the defendants had been previously diagnosed with mental illness. Psychiatric treatment Those found to have been not guilty by reason of mental disorder or insanity are generally then required to undergo psychiatric treatment in a mental institution, except in the case of temporary insanity (see below). In England and Wales, under the Criminal Procedure (Insanity and Unfitness to Plead) Act of 1991 (amended by the Domestic Violence, Crime and Victims Act, 2004 to remove the option of a guardianship order), the court can mandate a hospital order, a restriction order (where release from hospital requires the permission of the Home Secretary), a "supervision and treatment" order, or an absolute discharge. Unlike defendants who are found guilty of a crime, they are not institutionalized for a fixed period, but rather held in the institution until they are determined not to be a threat. Authorities making this decision tend to be cautious, and as a result, defendants can often be institutionalized for longer than they would have been incarcerated in prison. Worldwide Australia In Australia there are nine law units, each of which may have different rules governing mental impairment defenses. South Australia In South Australia, the Criminal Law Consolidation Act 1935 (SA) provides that: 269C—Mental competence A person is mentally incompetent to commit an offence if, at the time of the conduct alleged to give rise to the offence, the person is suffering from a mental impairment and, in consequence of the mental impairment— (a) does not know the nature and quality of the conduct; or (b) does not know that the conduct is wrong; or (c) is unable to control the conduct. 269H—Mental unfitness to stand trial A person is mentally unfit to stand trial on a charge of an offence if the person's mental processes are so disordered or impaired that the person is— (a) unable to understand, or to respond rationally to, the charge or the allegations on which the charge is based; or (b) unable to exercise (or to give rational instructions about the exercise of) procedural rights (such as, for example, the right to challenge jurors); or (c) unable to understand the nature of the proceedings, or to follow the evidence or the course of the proceedings. Victoria In Victoria the current defence of mental impairment was introduced in the Crimes (Mental Impairment and Unfitness to be Tried) Act 1997 which replaced the common law defence of insanity and indefinite detention at the governor's pleasure with the following: the accused was suffering from a mental impairment; and the mental impairment affected the accused so they either did not understand the nature and quality of the conduct, or did not know that it was wrong. These requirements are almost identical to the M'Naghten Rules, substituting "mental impairment" for "disease of the mind". New South Wales In New South Wales, the defence has been renamed the 'Defence of Mental Illness' in Part 4 of the Mental Health (Forensic Provisions) Act 1990. However, definitions of the defence are derived from M'Naghten's case and have not been codified. Whether a particular condition amounts to a disease of the mind is not a medical but a legal question to be decided in accordance with the ordinary rules of interpretation. This defence is an exception to the Woolmington v DPP (1935) 'golden thread', as the party raising the issue of the defence of mental illness bears the burden of proving this defence on the balance of probabilities. Generally, the defence will raise the issue of insanity. However, the prosecution can raise it in exceptional circumstances: R v Ayoub (1984). Australian cases have further qualified and explained the M'Naghten Rules. The NSW Supreme Court has held there are two limbs to the M'Naghten Rules, that the accused did not know what he was doing, or that the accused did not appreciate that what he was doing was morally wrong, in both cases the accused must be operating under a 'defect of reason, from a disease of the mind'. The High Court in R v Porter stated that the condition of the accused's mind is relevant only at the time of the actus reus. In Woodbridge v The Queen the court stated that a symptom indicating a disease of the mind must be prone to recur and be the result of an underlying pathological infirmity. A ‘defect of reason’ is the inability to think rationally and pertains to incapacity to reason, rather than having unsound ideas or difficulty with such a task. Examples of disease of the mind include Arteriosclerosis (considered so because the hardening of the arteries affects the mind. Canada Criminal Code provisions The defence of mental disorder is codified in section 16 of the Criminal Code which states, in part: 16. (1) No person is criminally responsible for an act committed or an omission made while suffering from a mental disorder that rendered the person incapable of appreciating the nature and quality of the act or omission or of knowing that it was wrong. To establish a claim of mental disorder the party raising the issue must show on a balance of probabilities first that the person who committed the act was suffering from a "disease of the mind", and second, that at the time of the offence they were either 1) unable to appreciate the "nature and quality" of the act, or 2) did not know it was "wrong". The meaning of the word "wrong" was determined in the Supreme Court case of R. v. Chaulk [1990] 3 S.C.R. which held that "wrong" was NOT restricted to "legally wrong" but to "morally wrong" as well. Post-verdict conditions The current legislative scheme was created by the Parliament of Canada after the previous scheme was found unconstitutional by the Supreme Court of Canada in R. v. Swain. The new provisions also replaced the old insanity defense with the current mental disorder defence. Once a person is found not criminally responsible ("NCR"), they will have a hearing by a Review Board within 45 days (90 days if the court extends the delay). A Review Board is established under Part XX.1 of the Criminal Code and is composed of at least three members, a person who is a judge or eligible to be a judge, a psychiatrist and another expert in a relevant field, such as social work, criminology or psychology. Parties at a Review Board hearing are usually the accused, the Crown and the hospital responsible for the supervision or assessment of the accused. A Review Board is responsible for both accused persons found NCR or accused persons found unfit to stand trial on account of mental disorder. A Review Board dealing with an NCR offender must consider two questions: whether the accused is a "significant threat to the safety of the public" and, if so, what the "least onerous and least restrictive" restrictions on the liberty of the accused should be in order to mitigate such a threat. Proceedings before a Review Board are inquisitorial rather than adversarial. Often the Review Board will be active in conducting an inquiry. Where the Review Board is unable to conclude that the accused is a significant threat to the safety of the public, the review board must grant the accused an absolute discharge, an order essentially terminating the jurisdiction of the criminal law over the accused. Otherwise, the Review Board must order that the accused be either discharged subject to conditions or detained in a hospital, both subject to conditions. The conditions imposed must be the least onerous and least restrictive necessary to mitigate any danger the accused may pose to others. Since the Review Board is empowered under criminal law powers under s. 91(27) of the Constitution Act, 1867 the sole justification for its jurisdiction is public safety. Therefore, the nature of the inquiry is the danger the accused may pose to public safety rather than whether the accused is "cured". For instance, many "sick" accused persons are discharged absolutely on the basis that they are not a danger to the public while many "sane" accused are detained on the basis that they are dangerous. Moreover, the notion of "significant threat to the safety of the public" is a "criminal threat". This means that the Review Board must find that the threat posed by the accused is of a criminal nature. While proceedings before a Review Board are less formal than in court, there are many procedural safeguards available to the accused given the potential indefinite nature of Part XX.1. Any party may appeal against the decision of a Review Board. In 1992 when the new mental disorder provisions were enacted, Parliament included "capping" provisions which were to be enacted at a later date. These capping provisions limited the jurisdiction of a Review Board over an accused based on the maximum potential sentence had the accused been convicted (e.g. there would be a cap of 5 years if the maximum penalty for the index offence is 5 years). However, these provisions were never proclaimed into force and were subsequently repealed. A Review Board must hold a hearing every 12 months (unless extended to 24 months) until the accused is discharged absolutely. Accused unfit to stand trial The issue of mental disorder may also come into play before a trial even begins if the accused's mental state prevents the accused from being able to appreciate the nature of a trial and to conduct a defence. An accused who is found to be unfit to stand trial is subject to the jurisdiction a Review Board. While the considerations are essentially the same, there are a few provisions which apply only to unfit accused. A Review Board must determine whether the accused is fit to stand trial. Regardless of the determination, the Review Board must then determine what conditions should be imposed on the accused, considering both the protection of the public and the maintenance of the fitness of the accused (or conditions which would render the accused fit). Previously an absolute discharge was unavailable to an unfit accused. However, in R. v. Demers, the Supreme Court of Canada struck down the provision restricting the availability of an absolute discharge to an accused person who is deemed both "permanently unfit" and not a significant threat to the safety of the public. Presently a Review Board may recommend a judicial stay of proceedings in the event that it finds the accused both "permanently unfit" and non-dangerous. The decision is left to the court having jurisdiction over the accused. An additional requirement for an unfit accused is the holding of a "prima facie case" hearing every two years. The Crown must demonstrate to the court having jurisdiction over the accused that it still has sufficient evidence to try the accused. If the Crown fails to meet this burden then the accused is discharged and proceedings are terminated. The nature of the hearing is virtually identical to that of a preliminary hearing. Denmark In Denmark a psychotic person who commits a criminal defense is declared guilty but is sentenced to mandatory treatment instead of prison. Section 16 of the penal code states that "Persons, who, at the time of the act, were irresponsible owing to mental illness or similar conditions or to a pronounced mental deficiency, are not punishable". This means that in Denmark, 'insanity' is a legal term rather than a medical term and that the court retains the authority to decide whether an accused person is irresponsible. Finland In Finland, punishments can only be administered if the accused is compos mentis, of sound mind; not if the accused is insane (syyntakeeton, literally "unable to guarantee [shoulder the responsibility of] guilt"). Thus, an insane defendant may be found guilty based on the facts and his actions just as a sane defendant, but the insanity will only affect the punishment. The definition of insanity is similar to the M'Naught criterion above: "the accused is insane, if during the act, due to a mental illness, profound mental retardation or a severe disruption of mental health or consciousness, he cannot understand the actual nature of his act or its illegality, or that his ability to control his behavior is critically weakened". If an accused is suspected to be insane, the court must consult the National Institute for Health and Welfare (THL), which is obliged to place the accused in involuntary commitment if he is found insane. The offender receives no judicial punishment; he becomes a patient under the jurisdiction of THL, and must be released immediately once the conditions of involuntary commitment are no longer fulfilled. Diminished responsibility is also available, resulting in lighter sentences. Germany According to section 20 of the German criminal code, those who commit an illegal act because a mental disorder makes them unable to see the wrong of the act or to act on this insight is considered not guilty. Norway In Norway, psychotic perpetrators are declared guilty but not punished and, instead of prison, they are sentenced to mandatory treatment. Section 44 of the penal code states specifically that "a person who at the time of the crime was insane or unconscious is not punished". It is the responsibility of a criminal court to consider whether the accused may have been psychotic or suffering from other severe mental defects when perpetrating a criminal act. Thus, even though he himself declared to be sane, the court hearing the case of Anders Behring Breivik considered the question of his sanity. Japan If the ability to recognize the right or wrong of action or the ability to act accordingly is lost due to a mental disorder, then the defendant cannot be pursued under Japanese criminal law so if this is recognized during a trial then an innocent judgment will be given. This is, however, rare, happening in only around 1 in 500,000 cases. Poland Insanity is determined through a judicial decision issued on the basis of expert opinions of psychiatrists and psychologists. Russia A forensic psychiatric examination is used to establish insanity. The result of the forensic examination is then subjected to a legal assessment, taking into account other circumstances of the case, from which a conclusion is drawn about the defendant's sanity or insanity. The Criminal Code of Russia establishes that a person who during the commission of an illegal act was in a state of insanity, that is, could not be aware of the actual nature and social danger of his actions or was unable to control his actions due to a chronic mental disorder, a temporary mental disorder, or dementia is not subject to criminal liability. Sweden In Sweden, psychotic perpetrators are seen as accountable, but the sanction is, if they are psychotic at the time of the trial, forensic mental care. United Kingdom Although use of the insanity defense is rare, since the Criminal Procedure (Insanity and Unfitness to Plead) Act 1991, insanity pleas have steadily increased in the UK. Scotland The Scottish Law Commission, in its Discussion Paper No 122 on Insanity and Diminished Responsibility (2003), pp. 16/18, confirms that the law has not substantially changed from the position stated in Hume's Commentaries: We may next attend to the case of those unfortunate persons, who have plead the miserable defense of idiocy or insanity. Which condition, if it is not an assumed or imperfect, but a genuine and thorough insanity, and is proved by the testimony of intelligent witnesses, makes the act like that of an infant, and equally bestows the privilege of an entire exemption from any manner of pain; Cum alterum innocentia concilii tuetur, alterum fati infelicitas excusat. I say, where the insanity is absolute, and is duly proved: For if reason and humanity enforce the plea in these circumstances, it is no less necessary to observe a caution and reserve in applying the law, as shall hinder it from being understood, that there is any privilege in a case of mere weakness of intellect, or a strange and moody humor, or a crazy and capricious or irritable temper. In none of these situations does or can the law excuse the offender. Because such constitutions are not exclusive of a competent understanding of the true state of the circumstances in which the deed is done, nor of the subsistence of some steady and evil passion, grounded in those circumstances, and directed to a certain object. To serve the purpose of a defense in law, the disorder must therefore amount to an absolute alienation of reason, ut continua mentis alienatione, omni intellectu careat - such a disease as deprives the patient of the knowledge of the true aspect and position of things about him - hinders him from distinguishing friend from foe - and gives him up to the impulse of his own distempered fancy. The phrase "absolute alienation of reason" is still regarded as at the core of the defense in the modern law (see HM Advocate v Kidd (1960) JC 61 and Brennan v HM Advocate (1977) United States In the United States, variances in the insanity defense between states, and in the federal court system, are attributable to differences with respect to three key issues: Availability: whether the jurisdiction allows a defendant to raise the insanity defense, Definition: when the defense is available, what facts will support a finding of insanity, and Burden of proof: whether the defendant has the duty of proving insanity or the prosecutor has the duty of disproving insanity, and by what standard of proof. In Foucha v. Louisiana (1992) the Supreme Court of the United States ruled that a person could not be held "indefinitely" for psychiatric treatment following a finding of not guilty by reason of insanity. Availability In the United States, a criminal defendant may plead insanity in federal court, and in the state courts of every state except for Idaho, Kansas, Montana, and Utah. However, defendants in states that disallow the insanity defense may still be able to demonstrate that a defendant was not capable of forming intent to commit a crime as a result of mental illness. In Kahler v. Kansas (2020), the U.S. Supreme Court held, in a 6–3 ruling, that a state does not violate the Due Process Clause by abolishing an insanity defense based on a defendant's incapacity to distinguish right from wrong. The Court emphasized that state governments have broad discretion to choose laws defining "the precise relationship between criminal culpability and mental illness." Definition Each state and the federal court system currently uses one of the following "tests" to define insanity for purposes of the insanity defense. Over its decades of use the definition of insanity has been modified by statute, with changes to the availability of the insanity defense, what constitutes legal insanity, whether the prosecutor or defendant has the burden of proof, the standard of proof required at trial, trial procedures, and to commitment and release procedures for defendants who have been acquitted based on a finding of insanity. M'Naghten test The guidelines for the M'Naghten Rules, state, among other things, and evaluating the criminal responsibility for defendants claiming to be insane were settled in the British courts in the case of Daniel M'Naghten in 1843. M'Naghten was a Scottish woodcutter who killed the secretary to the prime minister, Edward Drummond, in a botched attempt to assassinate the prime minister himself. M'Naghten apparently believed that the prime minister was the architect of the myriad of personal and financial misfortunes that had befallen him. During his trial, nine witnesses testified to the fact that he was insane, and the jury acquitted him, finding him "not guilty by reason of insanity". The House of Lords asked the judges of the common law courts to answer five questions on insanity as a criminal defence, and the formulation that emerged from their review—that a defendant should not be held responsible for his actions only if, as a result of his mental disease or defect, he (i) did not know that his act would be wrong; or (ii) did not understand the nature and quality of his actions—became the basis of the law governing legal responsibility in cases of insanity in England. Under the rules, loss of control because of mental illness was no defense. The M'Naghten rule was embraced with almost no modification by American courts and legislatures for more than 100 years, until the mid-20th century. Durham/New Hampshire test The strict M'Naghten standard for the insanity defense was widely used until the 1950s and the case of Durham v. United States case. In the Durham case, the court ruled that a defendant is entitled to acquittal if the crime was the product of his mental illness (i.e., crime would not have been committed but for the disease). The test, also called the Product Test, is broader than either the M'Naghten test or the irresistible impulse test. The test has more lenient guidelines for the insanity defense, but it addressed the issue of convicting mentally ill defendants, which was allowed under the M'Naghten Rule. However, the Durham standard drew much criticism because of its expansive definition of legal insanity. Model Penal Code test The Model Penal Code, published by the American Law Institute, provides a standard for legal insanity that serves as a compromise between the strict M'Naghten Rule, the lenient Durham ruling, and the irresistible impulse test. Under the MPC standard, which represents the modern trend, a defendant is not responsible for criminal conduct "if at the time of such conduct as a result of mental disease or defect he lacks substantial capacity either to appreciate the criminality of his conduct or to conform his conduct to the requirements of the law." The test thus takes into account both the cognitive and volitional capacity of insanity. Federal courts After the perpetrator of President Reagan's assassination attempt was found not guilty by reason of insanity, Congress passed the Insanity Defense Reform Act of 1984. Under this act, the burden of proof was shifted from the prosecution to the defense and the standard of evidence in federal trials was increased from a preponderance of evidence to clear and convincing evidence. The ALI test was discarded in favor of a new test that more closely resembled M'Naghten's. Under this new test only perpetrators suffering from severe mental illnesses at the time of the crime could successfully employ the insanity defense. The defendant's ability to control himself or herself was no longer a consideration. The Act also curbed the scope of expert psychiatric testimony and adopted stricter procedures regarding the hospitalization and release of those found not guilty by reason of insanity. Those acquitted of a federal offense by reason of insanity have not been able to challenge their psychiatric confinement through a writ of habeas corpus or other remedies. In Archuleta v. Hedrick, 365 F.3d 644 (8th Cir. 2004), the U.S. Court of Appeals for the Eighth Circuit the court ruled persons found not guilty by reason of insanity and later want to challenge their confinement may not attack their initial successful insanity defense: Guilty but mentally ill As an alternative to the insanity defense, some jurisdictions permit a defendant to plead guilty but mentally ill. A defendant who is found guilty but mentally ill may be sentenced to mental health treatment, at the conclusion of which the defendant will serve the remainder of his sentence in the same manner as any other defendant. Burden of proof In a majority of states, the burden of proving insanity is placed on the defendant, who must prove insanity by a preponderance of the evidence. In a minority of states, the burden is placed on the prosecution, who must prove sanity beyond reasonable doubt. In federal court, and in Arizona, the burden is placed on the defendant, who must prove insanity by clear and convincing evidence. See 18 U.S.C.S. Sec. 17(b); see also A.R.S. Sec. 13-502(C). Controversy The insanity plea is used in the U.S Criminal Justice System in less than 1% of all criminal cases. Little is known about the criminal justice system and the mentally ill: Some U.S. states have begun to ban the use of the insanity defense, and in 1994 the Supreme Court denied a petition of certiorari seeking review of a Montana Supreme Court case that upheld Montana's abolition of the defense. Idaho, Kansas, and Utah have also banned the defense. However, a mentally ill defendant/patient can be found unfit to stand trial in these states. In 2001, the Nevada Supreme Court found that their state's abolition of the defense was unconstitutional as a violation of Federal due process. In 2006, the Supreme Court decided Clark v. Arizona upholding Arizona's limitations on the insanity defense. In that same ruling, the Court noted "We have never held that the Constitution mandates an insanity defense, nor have we held that the Constitution does not so require." In 2020, the Supreme Court decided Kahler v. Kansas upholding Kansas' abolition of the insanity defense, stating that the Constitution does not require Kansas to adopt an insanity test that turns on a defendant's ability to recognize that his crime was morally wrong. The insanity defense is also complicated because of the underlying differences in philosophy between psychiatrists/psychologists and legal professionals. In the United States, a psychiatrist, psychologist or other mental health professional is often consulted as an expert witness in insanity cases, but the ultimate legal judgment of the defendant's sanity is determined by a jury, not by a mental health professional. In other words, mental health professionals provide testimony and professional opinion but are not ultimately responsible for answering legal questions. See also Archuleta v. Hedrick By Reason of Insanity, a documentary about a hospital in Ohio housing the guilty-but-insane Diminished responsibility (or "Limited Sanity") Frendak v. United States Intoxication defence Mentally ill people in American prisons M'Naghten rules NCR: Not Criminally Responsible, a Canadian documentary film about the mental disorder defense Non compos mentis Nulla poena sine culpa People v. Drew Sanity Settled insanity State v. Strasburg Twinkie defense United States federal laws governing offenders with mental diseases or defects References Further reading Boland, F. (1996). "Insanity, the Irish Constitution and the European Convention on Human Rights". 47 Northern Ireland Legal Quarterly 260. Brown, M. (2007). "The John Hinckley Trial & Its Effect on the Insanity Defense". Butler Committee. (1975). The Butler Committee on Mentally Abnormal Offenders, London: HMSO, Cmnd 6244 . Ellis, J. W. (1986). "The Consequences of the Insanity Defense: Proposals to reform post-acquittal commitment laws". 35 Catholic University Law Review 961. Gostin, L. (1982). "Human Rights, Judicial Review and the Mentally Disordered Offender". (1982) Crim. LR 779. Vatz, R. (December 19, 2013). “Affluenza: just the latest way to shirk legal responsibility”. The Baltimore Sun op-ed page. at p. 30 External links Frontline—From Daniel M'Naughten to John Hinckley: A Brief History of the Insanity Defense Evolution of the Insanity Plea Survey of US states' insanity defense criteria Criminal defenses Criminology Forensic psychiatry Forensic psychology Defense Legal ethics it:Capacità di intendere e di volere ja:責任能力#刑法上の責任能力
[ -0.1043732687830925, 0.12276233732700348, -0.07227655500173569, -0.07473605871200562, 0.04672468081116676, 0.38778334856033325, 0.487272173166275, -0.545336902141571, -0.45937058329582214, 0.2325301468372345, 0.18389247357845306, 0.42492741346359253, -0.335052490234375, 0.37297165393829346...
15361
https://en.wikipedia.org/wiki/Ice%20age
Ice age
An ice age is a long period of reduction in the temperature of Earth's surface and atmosphere, resulting in the presence or expansion of continental and polar ice sheets and alpine glaciers. Earth's climate alternates between ice ages and greenhouse periods, during which there are no glaciers on the planet. Earth is currently in the Quaternary glaciation. Individual pulses of cold climate within an ice age are termed glacial periods (or, alternatively, glacials, glaciations, glacial stages, stadials, stades, or colloquially, ice ages), and intermittent warm periods within an ice age are called interglacials or interstadials. In glaciology, ice age implies the presence of extensive ice sheets in both northern and southern hemispheres. By this definition, Earth is currently in an interglacial period—the Holocene. The amount of anthropogenic greenhouse gases emitted into Earth's oceans and atmosphere is predicted to prevent the next glacial period for the next 500,000 years, which otherwise would begin in around 50,000 years, and likely more glacial cycles after. History of research In 1742, Pierre Martel (1706–1767), an engineer and geographer living in Geneva, visited the valley of Chamonix in the Alps of Savoy. Two years later he published an account of his journey. He reported that the inhabitants of that valley attributed the dispersal of erratic boulders to the glaciers, saying that they had once extended much farther. Later similar explanations were reported from other regions of the Alps. In 1815 the carpenter and chamois hunter Jean-Pierre Perraudin (1767–1858) explained erratic boulders in the Val de Bagnes in the Swiss canton of Valais as being due to glaciers previously extending further. An unknown woodcutter from Meiringen in the Bernese Oberland advocated a similar idea in a discussion with the Swiss-German geologist Jean de Charpentier (1786–1855) in 1834. Comparable explanations are also known from the Val de Ferret in the Valais and the Seeland in western Switzerland and in Goethe's scientific work. Such explanations could also be found in other parts of the world. When the Bavarian naturalist Ernst von Bibra (1806–1878) visited the Chilean Andes in 1849–1850, the natives attributed fossil moraines to the former action of glaciers. Meanwhile, European scholars had begun to wonder what had caused the dispersal of erratic material. From the middle of the 18th century, some discussed ice as a means of transport. The Swedish mining expert Daniel Tilas (1712–1772) was, in 1742, the first person to suggest drifting sea ice was a cause of the presence of erratic boulders in the Scandinavian and Baltic regions. In 1795, the Scottish philosopher and gentleman naturalist, James Hutton (1726–1797), explained erratic boulders in the Alps by the action of glaciers. Two decades later, in 1818, the Swedish botanist Göran Wahlenberg (1780–1851) published his theory of a glaciation of the Scandinavian peninsula. He regarded glaciation as a regional phenomenon. Only a few years later, the Danish-Norwegian geologist Jens Esmark (1762–1839) argued for a sequence of worldwide ice ages. In a paper published in 1824, Esmark proposed changes in climate as the cause of those glaciations. He attempted to show that they originated from changes in Earth's orbit. Esmark discovered the similarity between moraines near Haukalivatnet lake near sea level in Rogaland and moraines at branches of Jostedalsbreen. Esmark's discovery were later attributed to or appropriated by Theodor Kjerulf and Louis Agassiz. During the following years, Esmark's ideas were discussed and taken over in parts by Swedish, Scottish and German scientists. At the University of Edinburgh Robert Jameson (1774–1854) seemed to be relatively open to Esmark's ideas, as reviewed by Norwegian professor of glaciology Bjørn G. Andersen (1992). Jameson's remarks about ancient glaciers in Scotland were most probably prompted by Esmark. In Germany, Albrecht Reinhard Bernhardi (1797–1849), a geologist and professor of forestry at an academy in Dreissigacker (since incorporated in the southern Thuringian city of Meiningen), adopted Esmark's theory. In a paper published in 1832, Bernhardi speculated about the polar ice caps once reaching as far as the temperate zones of the globe. In 1829, independently of these debates, the Swiss civil engineer Ignaz Venetz (1788–1859) explained the dispersal of erratic boulders in the Alps, the nearby Jura Mountains, and the North German Plain as being due to huge glaciers. When he read his paper before the Swiss Society for Natural Research, most scientists remained sceptical. Finally, Venetz convinced his friend Jean de Charpentier. Charpentier transformed Venetz's idea into a theory with a glaciation limited to the Alps. His thoughts resembled Wahlenberg's theory. In fact, both men shared the same volcanistic, or in Charpentier's case rather plutonistic assumptions, about Earth's history. In 1834, Charpentier presented his paper before the Swiss Society for Natural Research. In the meantime, the German botanist Karl Friedrich Schimper (1803–1867) was studying mosses which were growing on erratic boulders in the alpine upland of Bavaria. He began to wonder where such masses of stone had come from. During the summer of 1835 he made some excursions to the Bavarian Alps. Schimper came to the conclusion that ice must have been the means of transport for the boulders in the alpine upland. In the winter of 1835 to 1836 he held some lectures in Munich. Schimper then assumed that there must have been global times of obliteration ("Verödungszeiten") with a cold climate and frozen water. Schimper spent the summer months of 1836 at Devens, near Bex, in the Swiss Alps with his former university friend Louis Agassiz (1801–1873) and Jean de Charpentier. Schimper, Charpentier and possibly Venetz convinced Agassiz that there had been a time of glaciation. During the winter of 1836/37, Agassiz and Schimper developed the theory of a sequence of glaciations. They mainly drew upon the preceding works of Venetz, Charpentier and on their own fieldwork. Agassiz appears to have been already familiar with Bernhardi's paper at that time. At the beginning of 1837, Schimper coined the term "ice age" ("Eiszeit") for the period of the glaciers. In July 1837 Agassiz presented their synthesis before the annual meeting of the Swiss Society for Natural Research at Neuchâtel. The audience was very critical, and some were opposed to the new theory because it contradicted the established opinions on climatic history. Most contemporary scientists thought that Earth had been gradually cooling down since its birth as a molten globe. In order to persuade the skeptics, Agassiz embarked on geological fieldwork. He published his book Study on Glaciers ("Études sur les glaciers") in 1840. Charpentier was put out by this, as he had also been preparing a book about the glaciation of the Alps. Charpentier felt that Agassiz should have given him precedence as it was he who had introduced Agassiz to in-depth glacial research. As a result of personal quarrels, Agassiz had also omitted any mention of Schimper in his book. It took several decades before the ice age theory was fully accepted by scientists. This happened on an international scale in the second half of the 1870s, following the work of James Croll, including the publication of Climate and Time, in Their Geological Relations in 1875, which provided a credible explanation for the causes of ice ages. Evidence There are three main types of evidence for ice ages: geological, chemical, and paleontological. Geological evidence for ice ages comes in various forms, including rock scouring and scratching, glacial moraines, drumlins, valley cutting, and the deposition of till or tillites and glacial erratics. Successive glaciations tend to distort and erase the geological evidence for earlier glaciations, making it difficult to interpret. Furthermore, this evidence was difficult to date exactly; early theories assumed that the glacials were short compared to the long interglacials. The advent of sediment and ice cores revealed the true situation: glacials are long, interglacials short. It took some time for the current theory to be worked out. The chemical evidence mainly consists of variations in the ratios of isotopes in fossils present in sediments and sedimentary rocks and ocean sediment cores. For the most recent glacial periods, ice cores provide climate proxies, both from the ice itself and from atmospheric samples provided by included bubbles of air. Because water containing lighter isotopes has a lower heat of evaporation, its proportion decreases with warmer conditions. This allows a temperature record to be constructed. This evidence can be confounded, however, by other factors recorded by isotope ratios. The paleontological evidence consists of changes in the geographical distribution of fossils. During a glacial period, cold-adapted organisms spread into lower latitudes, and organisms that prefer warmer conditions become extinct or retreat into lower latitudes. This evidence is also difficult to interpret because it requires (1) sequences of sediments covering a long period of time, over a wide range of latitudes and which are easily correlated; (2) ancient organisms which survive for several million years without change and whose temperature preferences are easily diagnosed; and (3) the finding of the relevant fossils. Despite the difficulties, analysis of ice core and ocean sediment cores has provided a credible record of glacials and interglacials over the past few million years. These also confirm the linkage between ice ages and continental crust phenomena such as glacial moraines, drumlins, and glacial erratics. Hence the continental crust phenomena are accepted as good evidence of earlier ice ages when they are found in layers created much earlier than the time range for which ice cores and ocean sediment cores are available. Major ice ages There have been at least five major ice ages in Earth's history (the Huronian, Cryogenian, Andean-Saharan, late Paleozoic, and the latest Quaternary Ice Age). Outside these ages, Earth seems to have been ice-free even in high latitudes; such periods are known as greenhouse periods. Rocks from the earliest well-established ice age, called the Huronian, have been dated to around 2.4 to 2.1 Ga (billion years) ago during the early Proterozoic Eon. Several hundreds of kilometers of the Huronian Supergroup are exposed north of the north shore of Lake Huron, extending from near Sault Ste. Marie to Sudbury, northeast of Lake Huron, with giant layers of now-lithified till beds, dropstones, varves, outwash, and scoured basement rocks. Correlative Huronian deposits have been found near Marquette, Michigan, and correlation has been made with Paleoproterozoic glacial deposits from Western Australia. The Huronian ice age was caused by the elimination of atmospheric methane, a greenhouse gas, during the Great Oxygenation Event. The next well-documented ice age, and probably the most severe of the last billion years, occurred from 720 to 630 million years ago (the Cryogenian period) and may have produced a Snowball Earth in which glacial ice sheets reached the equator, possibly being ended by the accumulation of greenhouse gases such as produced by volcanoes. "The presence of ice on the continents and pack ice on the oceans would inhibit both silicate weathering and photosynthesis, which are the two major sinks for at present." It has been suggested that the end of this ice age was responsible for the subsequent Ediacaran and Cambrian explosion, though this model is recent and controversial. The Andean-Saharan occurred from 460 to 420 million years ago, during the Late Ordovician and the Silurian period. The evolution of land plants at the onset of the Devonian period caused a long term increase in planetary oxygen levels and reduction of levels, which resulted in the late Paleozoic icehouse. Its former name, the Karoo glaciation, was named after the glacial tills found in the Karoo region of South Africa. There were extensive polar ice caps at intervals from 360 to 260 million years ago in South Africa during the Carboniferous and early Permian Periods. Correlatives are known from Argentina, also in the center of the ancient supercontinent Gondwanaland. The Quaternary Glaciation / Quaternary Ice Age started about 2.58 million years ago at the beginning of the Quaternary Period when the spread of ice sheets in the Northern Hemisphere began. Since then, the world has seen cycles of glaciation with ice sheets advancing and retreating on 40,000- and 100,000-year time scales called glacial periods, glacials or glacial advances, and interglacial periods, interglacials or glacial retreats. Earth is currently in an interglacial, and the last glacial period ended about 10,000 years ago. All that remains of the continental ice sheets are the Greenland and Antarctic ice sheets and smaller glaciers such as on Baffin Island. The definition of the Quaternary as beginning 2.58 Ma is based on the formation of the Arctic ice cap. The Antarctic ice sheet began to form earlier, at about 34 Ma, in the mid-Cenozoic (Eocene-Oligocene Boundary). The term Late Cenozoic Ice Age is used to include this early phase. Ice ages can be further divided by location and time; for example, the names Riss (180,000–130,000 years bp) and Würm (70,000–10,000 years bp) refer specifically to glaciation in the Alpine region. The maximum extent of the ice is not maintained for the full interval. The scouring action of each glaciation tends to remove most of the evidence of prior ice sheets almost completely, except in regions where the later sheet does not achieve full coverage. Glacials and interglacials Within the current glaciation, more temperate and more severe periods have occurred. The colder periods are called glacial periods, the warmer periods interglacials, such as the Eemian Stage. There is evidence that similar glacial cycles occurred in previous glaciations, including the Andean-Saharan and the late Paleozoic ice house. The glacial cycles of the late Paleozoic ice house are likely responsible for the deposition of cyclothems. Glacials are characterized by cooler and drier climates over most of Earth and large land and sea ice masses extending outward from the poles. Mountain glaciers in otherwise unglaciated areas extend to lower elevations due to a lower snow line. Sea levels drop due to the removal of large volumes of water above sea level in the icecaps. There is evidence that ocean circulation patterns are disrupted by glaciations. The glacials and interglacials coincide with changes in orbital forcing of climate due to Milankovitch cycles, which are periodic changes in Earth's orbit and the tilt of Earth's rotational axis. Earth has been in an interglacial period known as the Holocene for around 11,700 years, and an article in Nature in 2004 argues that it might be most analogous to a previous interglacial that lasted 28,000 years. Predicted changes in orbital forcing suggest that the next glacial period would begin at least 50,000 years from now. Moreover, anthropogenic forcing from increased greenhouse gases is estimated to potentially outweigh the orbital forcing of the Milankovitch cycles for hundreds of thousands of years. Feedback processes Each glacial period is subject to positive feedback which makes it more severe, and negative feedback which mitigates and (in all cases so far) eventually ends it. Positive An important form of feedback is provided by Earth's albedo, which is how much of the sun's energy is reflected rather than absorbed by Earth. Ice and snow increase Earth's albedo, while forests reduce its albedo. When the air temperature decreases, ice and snow fields grow, and they reduce forest cover. This continues until competition with a negative feedback mechanism forces the system to an equilibrium. In 1956, Ewing and Donn hypothesized that an ice-free Arctic Ocean leads to increased snowfall at high latitudes. When low-temperature ice covers the Arctic Ocean there is little evaporation or sublimation and the polar regions are quite dry in terms of precipitation, comparable to the amount found in mid-latitude deserts. This low precipitation allows high-latitude snowfalls to melt during the summer. An ice-free Arctic Ocean absorbs solar radiation during the long summer days, and evaporates more water into the Arctic atmosphere. With higher precipitation, portions of this snow may not melt during the summer and so glacial ice can form at lower altitudes and more southerly latitudes, reducing the temperatures over land by increased albedo as noted above. Furthermore, under this hypothesis the lack of oceanic pack ice allows increased exchange of waters between the Arctic and the North Atlantic Oceans, warming the Arctic and cooling the North Atlantic. (Current projected consequences of global warming include a largely ice-free Arctic Ocean within 5–20 years.) Additional fresh water flowing into the North Atlantic during a warming cycle may also reduce the global ocean water circulation. Such a reduction (by reducing the effects of the Gulf Stream) would have a cooling effect on northern Europe, which in turn would lead to increased low-latitude snow retention during the summer. It has also been suggested that during an extensive glacial, glaciers may move through the Gulf of Saint Lawrence, extending into the North Atlantic Ocean far enough to block the Gulf Stream. Negative Ice sheets that form during glaciations erode the land beneath them. This can reduce the land area above sea level and thus diminish the amount of space on which ice sheets can form. This mitigates the albedo feedback, as does the rise in sea level that accompanies the reduced area of ice sheets, since open ocean has a lower albedo than land. Another negative feedback mechanism is the increased aridity occurring with glacial maxima, which reduces the precipitation available to maintain glaciation. The glacial retreat induced by this or any other process can be amplified by similar inverse positive feedbacks as for glacial advances. According to research published in Nature Geoscience, human emissions of carbon dioxide (CO2) will defer the next ice age. Researchers used data on Earth's orbit to find the historical warm interglacial period that looks most like the current one and from this have predicted that the next ice age would usually begin within 1,500 years. They go on to predict that emissions have been so high that it will not. Causes The causes of ice ages are not fully understood for either the large-scale ice age periods or the smaller ebb and flow of glacial–interglacial periods within an ice age. The consensus is that several factors are important: atmospheric composition, such as the concentrations of carbon dioxide and methane (the specific levels of the previously mentioned gases are now able to be seen with the new ice core samples from EPICA Dome C in Antarctica over the past 800,000 years); changes in Earth's orbit around the Sun known as Milankovitch cycles; the motion of tectonic plates resulting in changes in the relative location and amount of continental and oceanic crust on Earth's surface, which affect wind and ocean currents; variations in solar output; the orbital dynamics of the Earth–Moon system; the impact of relatively large meteorites and volcanism including eruptions of supervolcanoes. Some of these factors influence each other. For example, changes in Earth's atmospheric composition (especially the concentrations of greenhouse gases) may alter the climate, while climate change itself can change the atmospheric composition (for example by changing the rate at which weathering removes ). Maureen Raymo, William Ruddiman and others propose that the Tibetan and Colorado Plateaus are immense "scrubbers" with a capacity to remove enough from the global atmosphere to be a significant causal factor of the 40 million year Cenozoic Cooling trend. They further claim that approximately half of their uplift (and "scrubbing" capacity) occurred in the past 10 million years. Changes in Earth's atmosphere There is evidence that greenhouse gas levels fell at the start of ice ages and rose during the retreat of the ice sheets, but it is difficult to establish cause and effect (see the notes above on the role of weathering). Greenhouse gas levels may also have been affected by other factors which have been proposed as causes of ice ages, such as the movement of continents and volcanism. The Snowball Earth hypothesis maintains that the severe freezing in the late Proterozoic was ended by an increase in levels in the atmosphere, mainly from volcanoes, and some supporters of Snowball Earth argue that it was caused in the first place by a reduction in atmospheric . The hypothesis also warns of future Snowball Earths. In 2009, further evidence was provided that changes in solar insolation provide the initial trigger for Earth to warm after an Ice Age, with secondary factors like increases in greenhouse gases accounting for the magnitude of the change. Position of the continents The geological record appears to show that ice ages start when the continents are in positions which block or reduce the flow of warm water from the equator to the poles and thus allow ice sheets to form. The ice sheets increase Earth's reflectivity and thus reduce the absorption of solar radiation. With less radiation absorbed the atmosphere cools; the cooling allows the ice sheets to grow, which further increases reflectivity in a positive feedback loop. The ice age continues until the reduction in weathering causes an increase in the greenhouse effect. There are three main contributors from the layout of the continents that obstruct the movement of warm water to the poles: A continent sits on top of a pole, as Antarctica does today. A polar sea is almost land-locked, as the Arctic Ocean is today. A supercontinent covers most of the equator, as Rodinia did during the Cryogenian period. Since today's Earth has a continent over the South Pole and an almost land-locked ocean over the North Pole, geologists believe that Earth will continue to experience glacial periods in the geologically near future. Some scientists believe that the Himalayas are a major factor in the current ice age, because these mountains have increased Earth's total rainfall and therefore the rate at which carbon dioxide is washed out of the atmosphere, decreasing the greenhouse effect. The Himalayas' formation started about 70 million years ago when the Indo-Australian Plate collided with the Eurasian Plate, and the Himalayas are still rising by about 5 mm per year because the Indo-Australian plate is still moving at 67 mm/year. The history of the Himalayas broadly fits the long-term decrease in Earth's average temperature since the mid-Eocene, 40 million years ago. Fluctuations in ocean currents Another important contribution to ancient climate regimes is the variation of ocean currents, which are modified by continent position, sea levels and salinity, as well as other factors. They have the ability to cool (e.g. aiding the creation of Antarctic ice) and the ability to warm (e.g. giving the British Isles a temperate as opposed to a boreal climate). The closing of the Isthmus of Panama about 3 million years ago may have ushered in the present period of strong glaciation over North America by ending the exchange of water between the tropical Atlantic and Pacific Oceans. Analyses suggest that ocean current fluctuations can adequately account for recent glacial oscillations. During the last glacial period the sea-level has fluctuated 20–30 m as water was sequestered, primarily in the Northern Hemisphere ice sheets. When ice collected and the sea level dropped sufficiently, flow through the Bering Strait (the narrow strait between Siberia and Alaska is about 50 m deep today) was reduced, resulting in increased flow from the North Atlantic. This realigned the thermohaline circulation in the Atlantic, increasing heat transport into the Arctic, which melted the polar ice accumulation and reduced other continental ice sheets. The release of water raised sea levels again, restoring the ingress of colder water from the Pacific with an accompanying shift to northern hemisphere ice accumulation. According to a study published in Nature in 2021, all glacial periods of ice ages over the last 1.5 million years were associated with northward shifts of melting Antarctic icebergs which changed ocean circulation patterns, leading to more CO2 being pulled out of the atmosphere. The authors suggest that this process may be disrupted in the future as the Southern Ocean will become too warm for the icebergs to travel far enough to trigger these changes. Uplift of the Tibetan plateau Matthias Kuhle's geological theory of Ice Age development was suggested by the existence of an ice sheet covering the Tibetan Plateau during the Ice Ages (Last Glacial Maximum?). According to Kuhle, the plate-tectonic uplift of Tibet past the snow-line has led to a surface of c. 2,400,000 square kilometres (930,000 sq mi) changing from bare land to ice with a 70% greater albedo. The reflection of energy into space resulted in a global cooling, triggering the Pleistocene Ice Age. Because this highland is at a subtropical latitude, with 4 to 5 times the insolation of high-latitude areas, what would be Earth's strongest heating surface has turned into a cooling surface. Kuhle explains the interglacial periods by the 100,000-year cycle of radiation changes due to variations in Earth's orbit. This comparatively insignificant warming, when combined with the lowering of the Nordic inland ice areas and Tibet due to the weight of the superimposed ice-load, has led to the repeated complete thawing of the inland ice areas. Variations in Earth's orbit The Milankovitch cycles are a set of cyclic variations in characteristics of Earth's orbit around the Sun. Each cycle has a different length, so at some times their effects reinforce each other and at other times they (partially) cancel each other. There is strong evidence that the Milankovitch cycles affect the occurrence of glacial and interglacial periods within an ice age. The present ice age is the most studied and best understood, particularly the last 400,000 years, since this is the period covered by ice cores that record atmospheric composition and proxies for temperature and ice volume. Within this period, the match of glacial/interglacial frequencies to the Milanković orbital forcing periods is so close that orbital forcing is generally accepted. The combined effects of the changing distance to the Sun, the precession of Earth's axis, and the changing tilt of Earth's axis redistribute the sunlight received by Earth. Of particular importance are changes in the tilt of Earth's axis, which affect the intensity of seasons. For example, the amount of solar influx in July at 65 degrees north latitude varies by as much as 22% (from 450 W/m2 to 550 W/m2). It is widely believed that ice sheets advance when summers become too cool to melt all of the accumulated snowfall from the previous winter. Some believe that the strength of the orbital forcing is too small to trigger glaciations, but feedback mechanisms like may explain this mismatch. While Milankovitch forcing predicts that cyclic changes in Earth's orbital elements can be expressed in the glaciation record, additional explanations are necessary to explain which cycles are observed to be most important in the timing of glacial–interglacial periods. In particular, during the last 800,000 years, the dominant period of glacial–interglacial oscillation has been 100,000 years, which corresponds to changes in Earth's orbital eccentricity and orbital inclination. Yet this is by far the weakest of the three frequencies predicted by Milankovitch. During the period 3.0–0.8 million years ago, the dominant pattern of glaciation corresponded to the 41,000-year period of changes in Earth's obliquity (tilt of the axis). The reasons for dominance of one frequency versus another are poorly understood and an active area of current research, but the answer probably relates to some form of resonance in Earth's climate system. Recent work suggests that the 100K year cycle dominates due to increased southern-pole sea-ice increasing total solar reflectivity. The "traditional" Milankovitch explanation struggles to explain the dominance of the 100,000-year cycle over the last 8 cycles. Richard A. Muller, Gordon J. F. MacDonald, and others have pointed out that those calculations are for a two-dimensional orbit of Earth but the three-dimensional orbit also has a 100,000-year cycle of orbital inclination. They proposed that these variations in orbital inclination lead to variations in insolation, as Earth moves in and out of known dust bands in the solar system. Although this is a different mechanism to the traditional view, the "predicted" periods over the last 400,000 years are nearly the same. The Muller and MacDonald theory, in turn, has been challenged by Jose Antonio Rial. Another worker, William Ruddiman, has suggested a model that explains the 100,000-year cycle by the modulating effect of eccentricity (weak 100,000-year cycle) on precession (26,000-year cycle) combined with greenhouse gas feedbacks in the 41,000- and 26,000-year cycles. Yet another theory has been advanced by Peter Huybers who argued that the 41,000-year cycle has always been dominant, but that Earth has entered a mode of climate behavior where only the second or third cycle triggers an ice age. This would imply that the 100,000-year periodicity is really an illusion created by averaging together cycles lasting 80,000 and 120,000 years. This theory is consistent with a simple empirical multi-state model proposed by Didier Paillard. Paillard suggests that the late Pleistocene glacial cycles can be seen as jumps between three quasi-stable climate states. The jumps are induced by the orbital forcing, while in the early Pleistocene the 41,000-year glacial cycles resulted from jumps between only two climate states. A dynamical model explaining this behavior was proposed by Peter Ditlevsen. This is in support of the suggestion that the late Pleistocene glacial cycles are not due to the weak 100,000-year eccentricity cycle, but a non-linear response to mainly the 41,000-year obliquity cycle. Variations in the Sun's energy output There are at least two types of variation in the Sun's energy output: In the very long term, astrophysicists believe that the Sun's output increases by about 7% every one billion (109) years. Shorter-term variations such as sunspot cycles, and longer episodes such as the Maunder Minimum, which occurred during the coldest part of the Little Ice Age. The long-term increase in the Sun's output cannot be a cause of ice ages. Volcanism Volcanic eruptions may have contributed to the inception and/or the end of ice age periods. At times during the paleoclimate, carbon dioxide levels were two or three times greater than today. Volcanoes and movements in continental plates contributed to high amounts of CO2 in the atmosphere. Carbon dioxide from volcanoes probably contributed to periods with highest overall temperatures. One suggested explanation of the Paleocene-Eocene Thermal Maximum is that undersea volcanoes released methane from clathrates and thus caused a large and rapid increase in the greenhouse effect. There appears to be no geological evidence for such eruptions at the right time, but this does not prove they did not happen. Recent glacial and interglacial phases The current geological period, the Quaternary, which began about 2.6 million years ago and extends into the present, is marked by warm and cold episodes, cold phases called glacials (Quaternary ice age) lasting about 100,000 years, and which are then interrupted by the warmer interglacials which lasted about 10,000–15,000 years. The last cold episode of the last glacial period ended about 10,000 years ago. Earth is currently in an interglacial period of the Quaternary, called the Holocene. Glacial stages in North America The major glacial stages of the current ice age in North America are the Illinoian, Eemian and Wisconsin glaciation. The use of the Nebraskan, Afton, Kansan, and Yarmouthian stages to subdivide the ice age in North America has been discontinued by Quaternary geologists and geomorphologists. These stages have all been merged into the Pre-Illinoian in the 1980s. During the most recent North American glaciation, during the latter part of the Last Glacial Maximum (26,000 to 13,300 years ago), ice sheets extended to about 45th parallel north. These sheets were thick. This Wisconsin glaciation left widespread impacts on the North American landscape. The Great Lakes and the Finger Lakes were carved by ice deepening old valleys. Most of the lakes in Minnesota and Wisconsin were gouged out by glaciers and later filled with glacial meltwaters. The old Teays River drainage system was radically altered and largely reshaped into the Ohio River drainage system. Other rivers were dammed and diverted to new channels, such as Niagara Falls, which formed a dramatic waterfall and gorge, when the waterflow encountered a limestone escarpment. Another similar waterfall, at the present Clark Reservation State Park near Syracuse, New York, is now dry. The area from Long Island to Nantucket, Massachusetts was formed from glacial till, and the plethora of lakes on the Canadian Shield in northern Canada can be almost entirely attributed to the action of the ice. As the ice retreated and the rock dust dried, winds carried the material hundreds of miles, forming beds of loess many dozens of feet thick in the Missouri Valley. Post-glacial rebound continues to reshape the Great Lakes and other areas formerly under the weight of the ice sheets. The Driftless Area, a portion of western and southwestern Wisconsin along with parts of adjacent Minnesota, Iowa, and Illinois, was not covered by glaciers. Last Glacial Period in the semiarid Andes around Aconcagua and Tupungato A specially interesting climatic change during glacial times has taken place in the semi-arid Andes. Beside the expected cooling down in comparison with the current climate, a significant precipitation change happened here. So, researches in the presently semiarid subtropic Aconcagua-massif (6,962 m) have shown an unexpectedly extensive glacial glaciation of the type "ice stream network". The connected valley glaciers exceeding 100 km in length, flowed down on the East-side of this section of the Andes at 32–34°S and 69–71°W as far as a height of 2,060 m and on the western luff-side still clearly deeper. Where current glaciers scarcely reach 10 km in length, the snowline (ELA) runs at a height of 4,600 m and at that time was lowered to 3,200 m asl, i.e. about 1,400 m. From this follows that—beside of an annual depression of temperature about c. 8.4 °C— here was an increase in precipitation. Accordingly, at glacial times the humid climatic belt that today is situated several latitude degrees further to the S, was shifted much further to the N. Effects of glaciation Although the last glacial period ended more than 8,000 years ago, its effects can still be felt today. For example, the moving ice carved out the landscape in Canada (See Canadian Arctic Archipelago), Greenland, northern Eurasia and Antarctica. The erratic boulders, till, drumlins, eskers, fjords, kettle lakes, moraines, cirques, horns, etc., are typical features left behind by the glaciers. The weight of the ice sheets was so great that they deformed Earth's crust and mantle. After the ice sheets melted, the ice-covered land rebounded. Due to the high viscosity of Earth's mantle, the flow of mantle rocks which controls the rebound process is very slow—at a rate of about 1 cm/year near the center of rebound area today. During glaciation, water was taken from the oceans to form the ice at high latitudes, thus global sea level dropped by about 110 meters, exposing the continental shelves and forming land-bridges between land-masses for animals to migrate. During deglaciation, the melted ice-water returned to the oceans, causing sea level to rise. This process can cause sudden shifts in coastlines and hydration systems resulting in newly submerged lands, emerging lands, collapsed ice dams resulting in salination of lakes, new ice dams creating vast areas of freshwater, and a general alteration in regional weather patterns on a large but temporary scale. It can even cause temporary reglaciation. This type of chaotic pattern of rapidly changing land, ice, saltwater and freshwater has been proposed as the likely model for the Baltic and Scandinavian regions, as well as much of central North America at the end of the last glacial maximum, with the present-day coastlines only being achieved in the last few millennia of prehistory. Also, the effect of elevation on Scandinavia submerged a vast continental plain that had existed under much of what is now the North Sea, connecting the British Isles to Continental Europe. The redistribution of ice-water on the surface of Earth and the flow of mantle rocks causes changes in the gravitational field as well as changes to the distribution of the moment of inertia of Earth. These changes to the moment of inertia result in a change in the angular velocity, axis, and wobble of Earth's rotation. The weight of the redistributed surface mass loaded the lithosphere, caused it to flex and also induced stress within Earth. The presence of the glaciers generally suppressed the movement of faults below. During deglaciation, the faults experience accelerated slip triggering earthquakes. Earthquakes triggered near the ice margin may in turn accelerate ice calving and may account for the Heinrich events. As more ice is removed near the ice margin, more intraplate earthquakes are induced and this positive feedback may explain the fast collapse of ice sheets. In Europe, glacial erosion and isostatic sinking from weight of ice made the Baltic Sea, which before the Ice Age was all land drained by the Eridanos River. See also References External links Cracking the Ice Age from PBS Historical Simulation Eduard Y. Osipov, Oleg M. Khlystov. Glaciers and meltwater flux to Lake Baikal during the Last Glacial Maximum. History of climate variability and change Glaciology Geological history of the Great Lakes History of science
[ -0.318278431892395, 0.058827389031648636, 0.14486512541770935, -0.036284491419792175, 0.18127773702144623, -0.12035438418388367, 0.754056453704834, 0.7681045532226562, -0.4910432696342468, -0.8461629152297974, -0.38906535506248474, -0.7361482977867126, -0.22686469554901123, 1.1845172643661...
15362
https://en.wikipedia.org/wiki/Irving%20Langmuir
Irving Langmuir
Irving Langmuir (; January 31, 1881 – August 16, 1957) was an American chemist, physicist, and engineer. He was awarded the Nobel Prize in Chemistry in 1932 for his work in surface chemistry. Langmuir's most famous publication is the 1919 article "The Arrangement of Electrons in Atoms and Molecules" in which, building on Gilbert N. Lewis's cubical atom theory and Walther Kossel's chemical bonding theory, he outlined his "concentric theory of atomic structure". Langmuir became embroiled in a priority dispute with Lewis over this work; Langmuir's presentation skills were largely responsible for the popularization of the theory, although the credit for the theory itself belongs mostly to Lewis. While at General Electric from 1909 to 1950, Langmuir advanced several fields of physics and chemistry, invented the gas-filled incandescent lamp and the hydrogen welding technique. The Langmuir Laboratory for Atmospheric Research near Socorro, New Mexico, was named in his honor, as was the American Chemical Society journal for surface science called Langmuir. Biography Early years Irving Langmuir was born in Brooklyn, New York, on January 31, 1881. He was the third of the four children of Charles Langmuir and Sadie, Comings. During his childhood, Langmuir's parents encouraged him to carefully observe nature and to keep a detailed record of his various observations. When Irving was eleven, it was discovered that he had poor eyesight. When this problem was corrected, details that had previously eluded him were revealed, and his interest in the complications of nature was heightened. During his childhood, Langmuir was influenced by his older brother, Arthur Langmuir. Arthur was a research chemist who encouraged Irving to be curious about nature and how things work. Arthur helped Irving set up his first chemistry lab in the corner of his bedroom, and he was content to answer the myriad questions that Irving would pose. Langmuir's hobbies included mountaineering, skiing, piloting his own plane, and classical music. In addition to his professional interest in the politics of atomic energy, he was concerned about wilderness conservation. Education Langmuir attended several schools and institutes in America and Paris (1892–1895) before graduating high school from Chestnut Hill Academy (1898), an elite private school located in the affluent Chestnut Hill area in Philadelphia. He graduated with a Bachelor of Science degree in metallurgical engineering (Met.E.) from the Columbia University School of Mines in 1903. He earned his PhD in 1906 under Friedrich Dolezalek in Göttingen, for research done using the "Nernst glower", an electric lamp invented by Nernst. His doctoral thesis was entitled "On the Partial Recombination of Dissolved Gases During Cooling." He later did postgraduate work in chemistry. Langmuir then taught at Stevens Institute of Technology in Hoboken, New Jersey, until 1909, when he began working at the General Electric research laboratory (Schenectady, New York). Research His initial contributions to science came from his study of light bulbs (a continuation of his PhD work). His first major development was the improvement of the diffusion pump, which ultimately led to the invention of the high-vacuum rectifier and amplifier tubes. A year later, he and colleague Lewi Tonks discovered that the lifetime of a tungsten filament could be greatly lengthened by filling the bulb with an inert gas, such as argon, the critical factor (overlooked by other researchers) being the need for extreme cleanliness in all stages of the process. He also discovered that twisting the filament into a tight coil improved its efficiency. These were important developments in the history of the incandescent light bulb. His work in surface chemistry began at this point, when he discovered that molecular hydrogen introduced into a tungsten-filament bulb dissociated into atomic hydrogen and formed a layer one atom thick on the surface of the bulb. His assistant in vacuum tube research was his cousin William Comings White. As he continued to study filaments in vacuum and different gas environments, he began to study the emission of charged particles from hot filaments (thermionic emission). He was one of the first scientists to work with plasmas, and he was the first to call these ionized gases by that name because they reminded him of blood plasma. Langmuir and Tonks discovered electron density waves in plasmas that are now known as Langmuir waves. He introduced the concept of electron temperature and in 1924 invented the diagnostic method for measuring both temperature and density with an electrostatic probe, now called a Langmuir probe and commonly used in plasma physics. The current of a biased probe tip is measured as a function of bias voltage to determine the local plasma temperature and density. He also discovered atomic hydrogen, which he put to use by inventing the atomic hydrogen welding process; the first plasma weld ever made. Plasma welding has since been developed into gas tungsten arc welding. In 1917, he published a paper on the chemistry of oil films that later became the basis for the award of the 1932 Nobel Prize in chemistry. Langmuir theorized that oils consisting of an aliphatic chain with a hydrophilic end group (perhaps an alcohol or acid) were oriented as a film one molecule thick upon the surface of water, with the hydrophilic group down in the water and the hydrophobic chains clumped together on the surface. The thickness of the film could be easily determined from the known volume and area of the oil, which allowed investigation of the molecular configuration before spectroscopic techniques were available. Later years Following World War I Langmuir contributed to atomic theory and the understanding of atomic structure by defining the modern concept of valence shells and isotopes. Langmuir was president of the Institute of Radio Engineers in 1923. Based on his work at General Electric, John B. Taylor developed a detector ionizing beams of alkali metals, called nowadays the Langmuir-Taylor detector. In 1927, he was one of the participants of the fifth Solvay Conference on Physics that took place at the International Solvay Institute for Physics in Belgium. He joined Katharine B. Blodgett to study thin films and surface adsorption. They introduced the concept of a monolayer (a layer of material one molecule thick) and the two-dimensional physics which describe such a surface. In 1932 he received the Nobel Prize in Chemistry "for his discoveries and investigations in surface chemistry." In 1938, Langmuir's scientific interests began to turn to atmospheric science and meteorology. One of his first ventures, although tangentially related, was a refutation of the claim of entomologist Charles H. T. Townsend that the deer botfly flew at speeds of over 800 miles per hour. Langmuir estimated the fly's speed at 25 miles per hour. After observing windrows of drifting seaweed in the Sargasso Sea he discovered a wind-driven surface circulation in the sea. It is now called the Langmuir circulation. During World War II, Langmuir worked on improving naval sonar for submarine detection, and later to develop protective smoke screens and methods for deicing aircraft wings. This research led him to theorize that the introduction of dry ice and iodide into a sufficiently moist cloud of low temperature could induce precipitation (cloud seeding); though in frequent practice, particularly in Australia and the People's Republic of China, the efficiency of this technique remains controversial today. In 1953 Langmuir coined the term "pathological science", describing research conducted with accordance to the scientific method, but tainted by unconscious bias or subjective effects. This is in contrast to pseudoscience, which has no pretense of following the scientific method. In his original speech, he presented ESP and flying saucers as examples of pathological science; since then, the label has been applied to polywater and cold fusion. His house in Schenectady, was designated a National Historic Landmark in 1976. Personal life Langmuir was married to Marion Mersereau (1883–1971) in 1912 with whom he adopted two children: Kenneth and Barbara. After a short illness, he died in Woods Hole, Massachusetts from a heart attack on August 16, 1957. His obituary ran on the front page of The New York Times. On his religious views, Langmuir was an agnostic. In fiction According to author Kurt Vonnegut, Langmuir was the inspiration for his fictional scientist Dr. Felix Hoenikker in the novel Cat's Cradle. The character's invention of ice-nine eventually destroyed the world by seeding a new phase of ice water (similar in name only to Ice IX). Langmuir had worked with Vonnegut's brother, Bernard Vonnegut at General Electric on seeding ice crystals to diminish or increase rain or storms. Honors Fellow of the American Academy of Arts and Sciences (1918) Perkin Medal (1928) Nobel Prize in Chemistry (1932) Franklin Medal (1934) Faraday Medal (1944) John J. Carty Award of the National Academy of Sciences (1950) Mount Langmuir (elevation 8022 ft / 2445m ) in Alaska is named after him (Chugach National Forest, Copper River, AK) Langmuir College, a residential college at Stony Brook University in H-Quad, named for him in 1970 grandson, Roger R Summerhayes, directed/wrote/produced/edited a 57-minute documentary in 1999 called Langmuir's World Patents Langmuir, , "Incandescent Electric Lamp" Langmuir, , "Electron-discharge apparatus and method of operating the same" Langmuir, , "Method of and apparatus for controlling x-ray tubes" See also 18-electron rule Irving Langmuir House Langmuir isotherm Langmuir trough Langmuir equation, an equation that relates the coverage or adsorption of molecules on a solid surface to gas pressure or concentration of a medium above the solid surface at a fixed temperature Langmuir wave, a rapid oscillation of the electron density in conducting media such as plasmas or metals Langmuir states, three-dimensional quantum states of Helium when both electrons move in phase on Bohr circular orbits and mutually repel Langmuir–Blodgett film Child–Langmuir law Langmuir–Taylor detector List of things named after Irving Langmuir References External links Langmuir Journal ACS Chemistry Journal of Surfaces and Colloids "Langmuir, Irving" Infoplease.com. " Irving Langmuir's Ball Lightning Tube". Ball Lightning Page. Science Hobbyist. "Irving Langmuir shows Whitney one of his inventions, the Pliotron tube. ca. 1920.". Willis Rodney Whitney: the "Father of basic research in industry". "Pathological Science" – noted lecture of December 18, 1953, at GE Labs "The Arrangement of Electrons in Atoms and Molecules" JACS, Vol. 41, No. 6, 868. "The adsorption of gases on plane surfaces of glass, mica and platinum" JACS, Vol. 40, No. 9, 1361. "Irving Langmuir a great physical Chemist"; Resonance, July 2008 Key Participants: Irving Langmuir – Linus Pauling and the Nature of the Chemical Bond: A Documentary History National Academy of Sciences Biographical Memoir 1881 births 1957 deaths American agnostics American physical chemists American meteorologists Foreign Members of the Royal Society Columbia School of Engineering and Applied Science alumni University of Göttingen alumni General Electric people Nobel laureates in Chemistry American Nobel laureates Scientists from Schenectady, New York Faraday Lecturers Fellows of the American Academy of Arts and Sciences Chestnut Hill Academy alumni American plasma physicists
[ -0.09030827134847641, 0.5377582311630249, -0.5871505737304688, 0.12530550360679626, 0.2712569236755371, 0.3793003559112549, 0.40552273392677307, -0.33281245827674866, 0.10954005271196365, 0.22173242270946503, -0.4075876474380493, 0.10744313150644302, 0.1482202112674713, 0.6692351698875427,...
15365
https://en.wikipedia.org/wiki/International%20Association%20of%20Travel%20Agents%20Network
International Association of Travel Agents Network
The International Airlines Travel Agent Network (IATAN) is a Miami based association in the USA representing the interests of its member companies (airlines) and the U.S. travel distribution network (travel agencies). It is an independent department of the International Air Transport Association (IATA). In addition, it (along with the IATA) is the body responsible for the standard international codes for airlines, airports, hotels, cities and car rental firms (for example, the three-character codes that designate London Heathrow Airport as LHR). These codes provide a method to link international travel network with international suppliers. See also American Society of Travel Agents IATA airport code International Air Transport Association List of airports Travel agency References International trade associations Traveling business organizations
[ 0.43403100967407227, 0.15254150331020355, 0.25966402888298035, 0.02783983387053013, -0.036308448761701584, -0.3792734444141388, 0.1003921777009964, 0.21232596039772034, -0.5190904140472412, -0.30578041076660156, -0.0708160400390625, 0.682543158531189, -0.37947791814804077, -0.0588070973753...
15368
https://en.wikipedia.org/wiki/Insider%20trading
Insider trading
Insider trading is the trading of a public company's stock or other securities (such as bonds or stock options) based on material, nonpublic information about the company. In various countries, some kinds of trading based on insider information is illegal. This is because it is seen as unfair to other investors who do not have access to the information, as the investor with insider information could potentially make larger profits than a typical investor could make. The rules governing insider trading are complex and vary significantly from country to country. The extent of enforcement also varies from one country to another. The definition of insider in one jurisdiction can be broad, and may cover not only insiders themselves but also any persons related to them, such as brokers, associates, and even family members. A person who becomes aware of non-public information and trades on that basis may be guilty of a crime. Trading by specific insiders, such as employees, is commonly permitted as long as it does not rely on material information not in the public domain. Many jurisdictions require that such trading be reported so that the transactions can be monitored. In the United States and several other jurisdictions, trading conducted by corporate officers, key employees, directors, or significant shareholders must be reported to the regulator or publicly disclosed, usually within a few business days of the trade. In these cases, insiders in the United States are required to file a Form 4 with the U.S. Securities and Exchange Commission (SEC) when buying or selling shares of their own companies. The authors of one study claim that illegal insider trading raises the cost of capital for securities issuers, thus decreasing overall economic growth. However, some economists, such as Henry Manne, have argued that insider trading should be allowed and could, in fact, benefit markets. There has long been "considerable academic debate" among business and legal scholars over whether or not insider trading should be illegal. Several arguments against outlawing insider trading have been identified: for example, although insider trading is illegal, most insider trading is never detected by law enforcement, and thus the illegality of insider trading might give the public the potentially misleading impression that "stock market trading is an unrigged game that anyone can play." Some legal analysis has questioned whether insider trading actually harms anyone in the legal sense, since some have questioned whether insider trading causes anyone to suffer an actual "loss", and whether anyone who suffers a loss is owed an actual legal duty by the insiders in question. Illegal Rules prohibiting or criminalizing insider trading on material non-public information exist in most jurisdictions around the world (Bhattacharya and Daouk, 2002), but the details and the efforts to enforce them vary considerably. In the United States, Sections 16(b) and 10(b) of the Securities Exchange Act of 1934 directly and indirectly address insider trading. The U.S. Congress enacted this law after the stock market crash of 1929. While the United States is generally viewed as making the most serious efforts to enforce its insider trading laws, the broader scope of the European model legislation provides a stricter framework against illegal insider trading. In the European Union and the United Kingdom all trading on non-public information is, under the rubric of market abuse, subject at a minimum to civil penalties and to possible criminal penalties as well. UK's Financial Conduct Authority has the responsibility to investigate and prosecute insider dealing, defined by the Criminal Justice Act 1993. Definition of "insider" In the United States, Canada, Australia, Germany and Romania for mandatory reporting purposes, corporate insiders are defined as a company's officers, directors and any beneficial owners of more than 10% of a class of the company's equity securities. Trades made by these types of insiders in the company's own stock, based on material non-public information, are considered fraudulent since the insiders are violating the fiduciary duty that they owe to the shareholders. The corporate insider, simply by accepting employment, has undertaken a legal obligation to the shareholders to put the shareholders' interests before their own, in matters related to the corporation. When insiders buy or sell based upon company-owned information, they are said to be violating their obligation to the shareholders. For example, illegal insider trading would occur if the chief executive officer of Company A learned (prior to a public announcement) that Company A will be taken over and then bought shares in Company A while knowing that the share price would likely rise. In the United States and many other jurisdictions, however, "insiders" are not just limited to corporate officials and major shareholders where illegal insider trading is concerned but can include any individual who trades shares based on material non-public information in violation of some duty of trust. This duty may be imputed; for example, in many jurisdictions, in cases of where a corporate insider "tips" a friend about non-public information likely to have an effect on the company's share price, the duty the corporate insider owes the company is now imputed to the friend and the friend violates a duty to the company if he trades on the basis of this information. Liability Liability for inside trading violations generally cannot be avoided by passing on the information in an "I scratch your back; you scratch mine" or quid pro quo arrangement if the person receiving the information knew or should have known that the information was material non-public information. In the United States, at least one court has indicated that the insider who releases the non-public information must have done so for an improper purpose. In the case of a person who receives the insider information (called the "tippee"), the tippee must also have been aware that the insider released the information for an improper purpose. One commentator has argued that if Company A's CEO did not trade on undisclosed takeover news, but instead passed the information on to his brother-in-law who traded on it, illegal insider trading would still have occurred (albeit by proxy, by passing it on to a "non-insider" so Company A's CEO would not get his hands dirty). Misappropriation theory A newer view of insider trading, the misappropriation theory, is now accepted in U.S. law. It states that anyone who misappropriates material non-public information and trades on that information in any stock may be guilty of insider trading. This can include elucidating material non-public information from an insider with the intention of trading on it, or passing it on to someone who will. Proof of responsibility Proving that someone has been responsible for a trade can be difficult because traders may try to hide behind nominees, offshore companies, and other proxies. The Securities and Exchange Commission (SEC) prosecutes over 50 cases each year, with many being settled administratively out of court. The SEC and several stock exchanges actively monitor trading, looking for suspicious activity. The SEC does not have criminal enforcement authority, but can refer serious matters to the U.S. Attorney's Office for further investigation and prosecution. Trading on information in general In the United States and most non-European jurisdictions not all trading on non-public information is illegal insider trading. For example, a person in a restaurant who hears the CEO of Company A at the next table tell the CFO that the company's profits will be higher than expected and then buys the stock is not guilty of insider trading—unless he or she had some closer connection to the company or company officers. However, even where the tippee is not himself an insider, where the tippee knows that the information is non-public and the information is paid for, or the tipper receives a benefit for giving it, then in the broader-scope jurisdictions the subsequent trading is illegal. Notwithstanding, information about a tender offer (usually regarding a merger or acquisition) is held to a higher standard. If this type of information is obtained (directly or indirectly) and there is reason to believe it is nonpublic, there is a duty to disclose it or abstain from trading. In the United States in addition to civil penalties, the trader may also be subject to criminal prosecution for fraud or where SEC regulations have been broken, the U.S. Department of Justice (DOJ) may be called to conduct an independent parallel investigation. If the DOJ finds criminal wrongdoing, the department may file criminal charges. Legal Legal trades by insiders are common, as employees of publicly traded corporations often have stock or stock options. These trades are made public in the United States through Securities and Exchange Commission filings, mainly Form 4. U.S. SEC Rule 10b5-1 clarified that the prohibition against insider trading does not require proof that an insider actually used material nonpublic information when conducting a trade; possession of such information alone is sufficient to violate the provision, and the SEC would infer that an insider in possession of material nonpublic information used this information when conducting a trade. However, SEC Rule 10b5-1 also created for insiders an affirmative defense if the insider can demonstrate that the trades conducted on behalf of the insider were conducted as part of a pre-existing contract or written binding plan for trading in the future. For example, if an insider expects to retire after a specific period of time and, as part of retirement planning, the insider has adopted a written binding plan to sell a specific amount of the company's stock every month for two years, and the insider later comes into possession of material nonpublic information about the company, trades based on the original plan might not constitute prohibited insider trading. United States law Until the 21st century and the European Union's market abuse laws, the United States was the leading country in prohibiting insider trading made on the basis of material non-public information. Thomas Newkirk and Melissa Robertson of the SEC summarize the development of US insider trading laws. Insider trading has a base offense level of 8, which puts it in Zone A under the U.S. Sentencing Guidelines. This means that first-time offenders are eligible to receive probation rather than incarceration. Statutory U.S. insider trading prohibitions are based on English and American common law prohibitions against fraud. In 1909, well before the Securities Exchange Act was passed, the United States Supreme Court ruled that a corporate director who bought that company's stock when he knew the stock's price was about to increase committed fraud by buying but not disclosing his inside information. Section 15 of the Securities Act of 1933 contained prohibitions of fraud in the sale of securities, later greatly strengthened by the Securities Exchange Act of 1934. Section 16(b) of the Securities Exchange Act of 1934 prohibits short-swing profits (from any purchases and sales within any six-month period) made by corporate directors, officers, or stockholders owning more than 10% of a firm's shares. Under Section 10(b) of the 1934 Act, SEC Rule 10b-5, prohibits fraud related to securities trading. The Insider Trading Sanctions Act of 1984 and the Insider Trading and Securities Fraud Enforcement Act of 1988 place penalties for illegal insider trading as high as three times the amount of profit gained or loss avoided from the illegal trading. SEC regulations SEC regulation FD ("Fair Disclosure") requires that if a company intentionally discloses material non-public information to one person, it must simultaneously disclose that information to the public at large. In the case of an unintentional disclosure of material non-public information to one person, the company must make a public disclosure "promptly". Insider trading, or similar practices, are also regulated by the SEC under its rules on takeovers and tender offers under the Williams Act. Court decisions Much of the development of insider trading law has resulted from court decisions. In 1909, the Supreme Court of the United States ruled in Strong v. Repide that a director who expects to act in a way that affects the value of shares cannot use that knowledge to acquire shares from those who do not know of the expected action. Even though, in general, ordinary relations between directors and shareholders in a business corporation are not of such a fiduciary nature as to make it the duty of a director to disclose to a shareholder general knowledge regarding the value of the shares of the company before he purchases any from a shareholder, some cases involve special facts that impose such duty. In 1968, the Second Circuit Court of Appeals advanced a "level playing field" theory of insider trading in SEC v. Texas Gulf Sulphur Co. The court stated that anyone in possession of inside information must either disclose the information or refrain from trading. Officers of the Texas Gulf Sulphur Company had used inside information about the discovery of the Kidd Mine to make profits by buying shares and call options on company stock. In 1984, the Supreme Court of the United States ruled in the case of Dirks v. Securities and Exchange Commission that tippees (receivers of second-hand information) are liable if they had reason to believe that the tipper had breached a fiduciary duty in disclosing confidential information. One such example would be if the tipper received any personal benefit from the disclosure, thereby breaching his or her duty of loyalty to the company. In Dirks, the "tippee" received confidential information from an insider, a former employee of a company. The reason the insider disclosed the information to the tippee, and the reason the tippee disclosed the information to third parties, was to blow the whistle on massive fraud at the company. As a result of the tippee's efforts the fraud was uncovered, and the company went into bankruptcy. But, while the tippee had given the "inside" information to clients who made profits from the information, the U.S. Supreme Court ruled that the tippee could not be held liable under the federal securities laws—for the simple reason that the insider from whom he received the information was not releasing the information for an improper purpose (a personal benefit), but rather for the purpose of exposing the fraud. The Supreme Court ruled that the tippee could not have been aiding and abetting a securities law violation committed by the insider—for the simple reason that no securities law violation had been committed by the insider. In Dirks, the Supreme Court also defined the concept of "constructive insiders", who are lawyers, investment bankers, and others who receive confidential information from a corporation while providing services to the corporation. Constructive insiders are also liable for insider trading violations if the corporation expects the information to remain confidential, since they acquire the fiduciary duties of the true insider. The next expansion of insider trading liability came in SEC vs. Materia 745 F.2d 197 (2d Cir. 1984), the case that first introduced the misappropriation theory of liability for insider trading. Materia, a financial printing firm proofreader, and clearly not an insider by any definition, was found to have determined the identity of takeover targets based on proofreading tender offer documents in the course of his employment. After a two-week trial, the district court found him liable for insider trading, and the Second Circuit Court of Appeals affirmed holding that the theft of information from an employer, and the use of that information to purchase or sell securities in another entity, constituted a fraud in connection with the purchase or sale of a securities. The misappropriation theory of insider trading was born, and liability further expanded to encompass a larger group of outsiders. In United States v. Carpenter (1986) the U.S. Supreme Court cited an earlier ruling while unanimously upholding mail and wire fraud convictions for a defendant who received his information from a journalist rather than from the company itself. The journalist R. Foster Winans was also convicted, on the grounds that he had misappropriated information belonging to his employer, the Wall Street Journal. In that widely publicized case, Winans traded in advance of "Heard on the Street" columns appearing in the Journal. The Court stated in Carpenter: "It is well established, as a general proposition, that a person who acquires special knowledge or information by virtue of a confidential or fiduciary relationship with another is not free to exploit that knowledge or information for his own personal benefit but must account to his principal for any profits derived therefrom." However, in upholding the securities fraud (insider trading) convictions, the justices were evenly split. In 1997, the U.S. Supreme Court adopted the misappropriation theory of insider trading in United States v. O'Hagan, 521 U.S. 642, 655 (1997). O'Hagan was a partner in a law firm representing Grand Metropolitan, while it was considering a tender offer for Pillsbury Company. O'Hagan used this inside information by buying call options on Pillsbury stock, resulting in profits of over $4.3 million. O'Hagan claimed that neither he nor his firm owed a fiduciary duty to Pillsbury, so he did not commit fraud by purchasing Pillsbury options. The Court rejected O'Hagan's arguments and upheld his conviction. The "misappropriation theory" holds that a person commits fraud "in connection with" a securities transaction and thereby violates 10(b) and Rule 10b-5, when he misappropriates confidential information for securities trading purposes, in breach of a duty owed to the source of the information. Under this theory, a fiduciary's undisclosed, self-serving use of a principal's information to purchase or sell securities, in breach of a duty of loyalty and confidentiality, defrauds the principal of the exclusive use of the information. In lieu of premising liability on a fiduciary relationship between company insider and purchaser or seller of the company's stock, the misappropriation theory premises liability on a fiduciary-turned-trader's deception of those who entrusted him with access to confidential information. The Court specifically recognized that a corporation's information is its property: "A company's confidential information ... qualifies as property to which the company has a right of exclusive use. The undisclosed misappropriation of such information in violation of a fiduciary duty ... constitutes fraud akin to embezzlement – the fraudulent appropriation to one's own use of the money or goods entrusted to one's care by another." In 2000, the SEC enacted SEC Rule 10b5-1, which defined trading "on the basis of" inside information as any time a person trades while aware of material nonpublic information. It is no longer a defense for one to say that one would have made the trade anyway. The rule also created an affirmative defense for pre-planned trades. In Morgan Stanley v. Skowron, 989 F. Supp. 2d 356 (S.D.N.Y. 2013), applying New York's faithless servant doctrine, the court held that a hedge fund's portfolio manager engaging in insider trading in violation of his company's code of conduct, which also required him to report his misconduct, must repay his employer the full $31 million his employer paid him as compensation during his period of faithlessness. The court called the insider trading the "ultimate abuse of a portfolio manager's position". The judge also wrote: "In addition to exposing Morgan Stanley to government investigations and direct financial losses, Skowron's behavior damaged the firm's reputation, a valuable corporate asset." In 2014, in the case of United States v. Newman, the United States Court of Appeals for the Second Circuit cited the Supreme Court's decision in Dirks, and ruled that for a "tippee" (a person who used information they received from an insider) to be guilty of insider trading, the tippee must have been aware not only that the information was insider information, but must also have been aware that the insider released the information for an improper purpose (such as a personal benefit). The Court concluded that the insider's breach of a fiduciary duty not to release confidential information—in the absence of an improper purpose on the part of the insider—is not enough to impose criminal liability on either the insider or the tippee. In 2016, in the case of Salman v. United States, the U.S. Supreme Court held that the benefit a tipper must receive as predicate for an insider-trader prosecution of a tippee need not be pecuniary, and that giving a 'gift' of a tip to a family member is presumptively an act for the personal though intangible benefit of the tipper. By members of Congress Members of the US Congress are exempt from the laws that ban insider trading. Because they generally do not have a confidential relationship with the source of the information they receive, however, they do not meet the usual definition of an "insider". House of Representatives rules may however consider congressional insider trading unethical. A 2004 study found that stock sales and purchases by Senators outperformed the market by 12.3% per year. Peter Schweizer points out several examples of insider trading by members of Congress, including action taken by Spencer Bachus following a private, behind-the-doors meeting on the evening of September 18, 2008 when Hank Paulson and Ben Bernanke informed members of Congress about the issues due to the financial crisis of 2007–2008, Bachus then shorted stocks the next morning and cashed in his profits within a week. Also attending the same meeting were Senator Dick Durbin and John Boehner; the same day (trade effective the next day), Durbin sold mutual-fund shares worth $42,696, and reinvested it all with Warren Buffett. Also the same day (trade effective the next day), Congressman Boehner cashed out of an equity mutual fund. In May 2007, a bill entitled the Stop Trading on Congressional Knowledge Act, or STOCK Act was introduced that would hold congressional and federal employees liable for stock trades they made using information they gained through their jobs and also regulate analysts or political intelligence firms that research government activities. The STOCK Act was enacted on April 4, 2012. As of 2021, in the approximately nine month period up to September 2021, Senate and House members disclosed 4,000 trades worth at least $315 million of stocks and bonds. Arguments for legalizing Some economists and legal scholars (such as Henry Manne, Milton Friedman, Thomas Sowell, Daniel Fischel, and Frank H. Easterbrook) have argued that laws against insider trading should be repealed. They claim that insider trading based on material nonpublic information benefits investors, in general, by more quickly introducing new information into the market. Friedman, laureate of the Nobel Memorial Prize in Economics, said: "You want more insider trading, not less. You want to give the people most likely to have knowledge about deficiencies of the company an incentive to make the public aware of that." Friedman did not believe that the trader should be required to make his trade known to the public, because the buying or selling pressure itself is information for the market. Other critics argue that insider trading is a victimless act: a willing buyer and a willing seller agree to trade property that the seller rightfully owns, with no prior contract (according to this view) having been made between the parties to refrain from trading if there is asymmetric information. The Atlantic has described the process as "arguably the closest thing that modern finance has to a victimless crime". Legalization advocates also question why "trading" where one party has more information than the other is legal in other markets, such as real estate, but not in the stock market. For example, if a geologist knows there is a high likelihood of the discovery of petroleum under Farmer Smith's land, he may be entitled to make Smith an offer for the land, and buy it, without first telling Farmer Smith of the geological data. Advocates of legalization make free speech arguments. Punishment for communicating about a development pertinent to the next day's stock price might seem an act of censorship. If the information being conveyed is proprietary information and the corporate insider has contracted to not expose it, he has no more right to communicate it than he would to tell others about the company's confidential new product designs, formulas, or bank account passwords. Some authors have used these arguments to propose legalizing insider trading on negative information (but not on positive information). Since negative information is often withheld from the market, trading on such information has a higher value for the market than trading on positive information. There are very limited laws against "insider trading" in the commodities markets if, for no other reason than that the concept of an "insider" is not immediately analogous to commodities themselves (corn, wheat, steel, etc.). However, analogous activities such as front running are illegal under US commodity and futures trading laws. For example, a commodity broker can be charged with fraud for receiving a large purchase order from a client (one likely to affect the price of that commodity) and then purchasing that commodity before executing the client's order to benefit from the anticipated price increase. Commercialisation The advent of the Internet has provided a forum for the commercialisation of trading on insider information. In 2016 a number of dark web sites were identified as marketplaces where such non-public information was bought and sold. At least one such site used bitcoins to avoid currency restrictions and to impede tracking. Such sites also provide a place for soliciting for corporate informants, where non-public information may be used for purposes other than stock trading. Legal differences among jurisdictions The US and the UK vary in the way the law is interpreted and applied with regard to insider trading. In the UK, the relevant laws are the Criminal Justice Act 1993, Part V, Schedule 1; the Financial Services and Markets Act 2000, which defines an offence of "market abuse"; and the European Union Regulation No 596/2014. The principle is that it is illegal to trade on the basis of market-sensitive information that is not generally known. This is a much broader scope that under U.S. law. The key differences from U.S. law are that no relationship to either the issuer of the security or the tipster is required; all that is required is that the guilty party traded (or caused trading) whilst having inside information, and there is no scienter requirement under UK law. Japan enacted its first law against insider trading in 1988. Roderick Seeman said, "Even today many Japanese do not understand why this is illegal. Indeed, previously it was regarded as common sense to make a profit from your knowledge." In Malta the law follows the European broader scope model. The relevant statute is the Prevention of Financial Markets Abuse Act of 2005, as amended. Earlier acts included the Financial Markets Abuse Act in 2002, and the Insider Dealing and Market Abuse Act of 1994. The International Organization of Securities Commissions (IOSCO) paper on the "Objectives and Principles of Securities Regulation" (updated to 2003) states that the three objectives of good securities market regulation are investor protection, ensuring that markets are fair, efficient and transparent, and reducing systemic risk. The discussion of these "Core Principles" state that "investor protection" in this context means "Investors should be protected from misleading, manipulative or fraudulent practices, including insider trading, front running or trading ahead of customers and the misuse of client assets." More than 85 percent of the world's securities and commodities market regulators are members of IOSCO and have signed on to these Core Principles. The World Bank and International Monetary Fund now use the IOSCO Core Principles in reviewing the financial health of different country's regulatory systems as part of these organization's financial sector assessment program, so laws against insider trading based on non-public information are now expected by the international community. Enforcement of insider trading laws varies widely from country to country, but the vast majority of jurisdictions now outlaw the practice, at least in principle. Larry Harris claims that differences in the effectiveness with which countries restrict insider trading help to explain the differences in executive compensation among those countries. The US, for example, has much higher CEO salaries than have Japan or Germany, where insider trading is less effectively restrained. By nation European Union In 2014, the European Union (EU) adopted legislation (Criminal Sanctions for Market Abuse Directive) that harmonised criminal sanctions for insider dealing. All EU Member States agreed to introduce maximum prison sentences of at least four years for serious cases of market manipulation and insider dealing, and at least two years for improper disclosure of insider information. Australia The current Australian legislation arose out of the report of a 1989 parliamentary committee report which recommended removal of the requirement that the trader be ‘connected’ with the body corporate. This may have weakened the importance of the fiduciary duty rationale and possibly brought new potential offenders within its ambit. In Australia if a person possesses inside information and knows, or ought reasonably to know, that the information is not generally available and is materially price sensitive then the insider must not trade. Nor must she or he procure another to trade and must not tip another. Information will be considered generally available if it consists of readily observable matter or it has been made known to common investors and a reasonable period for it to be disseminated among such investors has elapsed. Norway In 2009, a journalist in Nettavisen (Thomas Gulbrandsen) was sentenced to 4 months in prison for insider trading. The longest prison sentence in a Norwegian trial where the main charge was insider trading, was for eight years (two suspended) when Alain Angelil was convicted in a district court on December 9, 2011. United Kingdom Although insider trading in the UK has been illegal since 1980, it proved difficult to successfully prosecute individuals accused of insider trading. There were a number of notorious cases where individuals were able to escape prosecution. Instead the UK regulators relied on a series of fines to punish market abuses. These fines were widely perceived as an ineffective deterrent (Cole, 2007), and there was a statement of intent by the UK regulator (the Financial Services Authority) to use its powers to enforce the legislation (specifically the Financial Services and Markets Act 2000). Between 2009 and 2012 the FSA secured 14 convictions in relation to insider dealing. United States Anil Kumar, a senior partner at management consulting firm McKinsey & Company, pleaded guilty in 2010 to insider trading in a "descent from the pinnacle of the business world". Chip Skowron, a hedge fund co-portfolio manager of FrontPoint Partners LLC's health care funds, was convicted of insider trading in 2011, for which he served five years in prison. He had been tipped off by a consultant to a company that the company was about to make a negative announcement regarding its clinical trial for a drug. At first Skowron denied the charges against him, and his defense attorney said he would plead not guilty, saying "We look forward to responding to the allegations more fully in court at the appropriate time". However, after the consultant charged with tipping him off pleaded guilty, he changed his position, and admitted his guilt. Rajat Gupta, who had been managing partner of McKinsey & Co. and a director at Goldman Sachs Group Inc. and Procter & Gamble Co., was convicted by a federal jury in 2012 and sentence to two years in prison for leaking inside information to hedge fund manager Raj Rajaratnam who was sentenced to 11 years in prison. The case was prosecuted by the office of United States Attorney for the Southern District of New York Preet Bharara. Mathew Martoma, former hedge fund trader and portfolio manager at S.A.C. Capital Advisors, was accused of generating possibly the largest single insider trading transaction profit in history at a value of $276 million. He was convicted in February 2014, and is serving a nine-year prison sentence. With the guilty plea by Perkins Hixon in 2014 for insider trading from 2010 to 2013 while at Evercore Partners, Bharara said in a press release that 250 defendants whom his office had charged since August 2009 had now been convicted. On December 10, 2014, a federal appeals court overturned the insider trading convictions of two former hedge fund traders, Todd Newman and Anthony Chiasson, based on the "erroneous" instructions given to jurors by the trial judge. The decision was expected to affect the appeal of the separate insider-trading conviction of former SAC Capital portfolio manager Michael Steinberg and the U.S. Attorney and the SEC in 2015 did drop their cases against Steinberg and others. In 2016, Sean Stewart, a former managing director at Perella Weinberg Partners LP and vice president at JPMorgan Chase, was convicted on allegations he tipped his father on pending health-care deals. The father, Robert Stewart, previously had pleaded guilty but didn't testify during his son's trial. It was argued that by way of compensation for the tip, the father had paid more than $10,000 for Sean's wedding photographer. In 2017, Billy Walters, Las Vegas sports bettor, was convicted of making $40 million on private information of Dallas-based dairy processing company Dean Foods, and sentenced to five years in prison. Walters's source, company director Thomas C. Davis employing a prepaid cell phone and sometimes the code words "Dallas Cowboys" for Dean Foods, helped him from 2008 to 2014 realize profits and avoid losses in the stock, the federal jury found. Golfer Phil Mickelson "was also mentioned during the trial as someone who had traded in Dean Foods shares and once owed nearly $2 million in gambling debts to" Walters. Mickelson "made roughly $1 million trading Dean Foods shares; he agreed to forfeit those profits in a related civil case brought by the Securities and Exchange Commission". Walters appealed the verdict, but in December 2018 his conviction was upheld by the 2nd U.S. Circuit Court of Appeals in Manhattan. Canada In 2008, police uncovered an insider trading conspiracy involving Bay Street and Wall Street lawyer Gil Cornblum who had worked at Sullivan & Cromwell and was working at Dorsey & Whitney, and a former lawyer, Stan Grmovsek, who were found to have gained over $10 million in illegal profits over a 14-year span. Cornblum committed suicide by jumping from a bridge as he was under investigation and shortly before he was to be arrested but before criminal charges were laid against him, one day before his alleged co-conspirator Grmovsek pled guilty. Grmovsek pleaded guilty to insider trading and was sentenced to 39 months in prison. This was the longest term ever imposed for insider trading in Canada. These crimes were explored in Mark Coakley's 2011 non-fiction book, Tip and Trade. Kuwait The U.S. SEC alleged that in 2009 Kuwaiti trader Hazem Al-Braikan engaged in insider trading after misleading the public about possible takeover bids for two companies. Three days after Al-Braikan was sued by the SEC, he was found dead of a gunshot wound to the head in his home in Kuwait City on July 26, 2009, in what Kuwaiti police called a suicide. The SEC later reached a $6.5 million settlement of civil insider trading charges, with his estate and others. China The majority of shares in China before 2005 were non-tradeable shares that were not sold on the stock exchange publicly but privately. To make shares more accessible, the China Securities Regulation Commission (CSRC) required the companies to convert the non-tradeable shares into tradeable shares. There was a deadline for companies to convert their shares and the deadline was short, due to this there was a massive amount of exchanges and in the midst of these exchanges many people committed insider trading knowing that the selling of these shares would affect prices. Chinese people did not fear insider trading as much as one may in the United States because there is no possibility of imprisonment. Punishment may include monetary fees or temporary relieving from a position in the company. The Chinese do not view insider trading as a crime worth prison time because generally the person has a clean record and a path of success with references to deter them from being viewed as a criminal. On October 1, 2015, Chinese fund manager Xu Xiang was arrested due to insider trading. India Insider trading in India is an offense according to Sections 12A, 15G of the Securities and Exchange Board of India Act, 1992. Insider trading is when one with access to non-public, price-sensitive information about the securities of the company subscribes, buys, sells, or deals, or agrees to do so or counsels another to do so as principal or agent. Price-sensitive information is information that materially affects the value of the securities. The penalty for insider trading is imprisonment, which may extend to five years, and a minimum of five lakh rupees (500,000) to 25 crore rupees (250 million) or three times the profit made, whichever is higher. The Wall Street Journal, in a 2014 article entitled "Why It’s Hard to Catch India’s Insider Trading", said that despite a widespread belief that insider trading takes place on a regular basis in India, there were few examples of insider traders being prosecuted in India. One former top regulator said that in India insider trading is deeply rooted and especially rampant because regulators don't have the tools to address it. In the few cases where prosecution has taken place, cases have sometimes taken more than a decade to reach trial, and punishments have been light; and despite SEBI by law having the ability to demand penalties of up to $4 million, the few fines that were levied for insider trading have usually been under $200,000. Philippines Under Republic Act 8799 or the Securities Regulation Code, insider trading in the Philippines is illegal. See also Notes References Mark J. Astarita, Insider Trading: Legal vs. Illegal Insider trading: Legal vs. Illegal, Stephen M. Bainbridge, Securities Law: Insider Trading (1999) . M. Duffy, Insider Trading: Addressing the Continuing Problems of Proof (2009) 23(2) Australian Journal of Corporate Law 149. (link). Larry Harris, Trading & Exchanges, Oxford Press, Oxford, 2003. Chapter 29 "Insider Trading" . Grechenig, The Marginal Incentive of Insider Trading: an Economics Reinterpretation of the Case Law, 37 The University of Memphis Law Review 75-148 (2006) (link). Review of Financial Studies; May2009, Vol. 22 Issue 5, pp. 1845–1887 Grechenig, Positive and Negative Information – Insider Trading Rethought Pierre Hauck, Europe’s commitment to countering insider dealing and market manipulation on the basis of Art. 83 para. 2 TFEU A critical evaluation International Standard Book Number-13: 978-1-4200-7403-1 (eBook - PDF) External links General information Insider Trading Informational page from the U.S. Security and Exchange Commission (SEC) Testimony Concerning Insider Trading, by Linda Thomsen, Director of the SEC's Division of Enforcement, before the U.S. Senate Judicial Committee (September 26, 2006) SEC Forms 3, 4 and 5 Insider Trading: Information on Bounties Hoffman, Liz, "Towers Watson CEO Sold Stock Before Big Deal: John Haley netted nearly $10 million on preannouncement sales", Wall Street Journal, September 23, 2015. Towers Watson CEO John J. Haley's pre-deal sale of personally owned stock questioned. Articles and opinions Insider Trading: The Legal and Illegal SECLaw.com, 2002 Timothy Sullivan We're still against fraud, aren't we? United States v. O'Hagan: Trimming the Oak in the wrong season St. John's Law Review, Winter 1997. An opinion on Why Insider Trading Should be Legal Larry Elder Interviews Henry Manne Why forbid insider trading? by Ajay Shah, consultant to the Ministry of Finance, India Information, Privilege, Opportunity and Insider Trading by Robert W. Mcgee and Walter E. Blocka scholarly work that opposes regulations against insider trading Free Samuel Waksal argues that businessman's insider trading should not be considered a crime Rule: Ownership Reports and Trading by Officers, Directors and Principal Security Data on insider trading SEC Edgar Database on current Form 3, Form 4 and Form 5 filings Corruption Financial crimes Stock market Ethically disputed business practices Conflict of interest Information
[ 0.5000473260879517, 0.055751729756593704, -0.6861492991447449, 0.15902309119701385, 0.6611722707748413, -0.2445043921470642, -0.24315251410007477, 0.7267659902572632, -0.46403437852859497, 0.3258523643016815, -0.011538253165781498, 0.6919011473655701, -0.21148397028446198, 0.26310175657272...
15369
https://en.wikipedia.org/wiki/International%20Brigades
International Brigades
The International Brigades () were military units set up by the Communist International to assist the Popular Front government of the Second Spanish Republic during the Spanish Civil War. The organization existed for two years, from 1936 until 1938. It is estimated that during the entire war, between 40,000 and 59,000 members served in the International Brigades, including 15,000 who died in combat. Beyond the Spanish Civil War, International Brigades is also sometimes used interchangeably with the term foreign legion in reference to military units comprising foreigners who volunteer to fight in the military of another state, often in times of war. The headquarters of the brigade was located at the Gran Hotel, Albacete, Castilla-La Mancha. They participated in the battles of Madrid, Jarama, Guadalajara, Brunete, Belchite, Teruel, Aragon and the Ebro. Most of these ended in defeat. For the last year of its existence, the International Brigades were integrated into the Spanish Republican Army as part of the Spanish Foreign Legion. The organisation was dissolved on 23 September 1938 by Spanish Prime Minister, Juan Negrín, in a vain attempt to get more support from the liberal democracies on the Non-Intervention Committee. The International Brigades was strongly supported by the Comintern and represented the Soviet Union's commitment to assisting the Spanish Republic (with arms, logistics, military advisers and the NKVD), just as Fascist Italy, Fascist Portugal and Nazi Germany were assisting the opposing Nationalist insurgency. The largest number of volunteers came from France (where the French Communist Party had many members) and communist exiles from Italy and Germany. Many Jews were part of the brigades, being particularly numerous within the volunteers coming from the United States, Poland, France, England and Argentina. Republican volunteers who were opposed to Stalinism did not join the Brigades but instead enlisted in the separate Popular Front, the POUM (formed from Trotskyist, Bukharinist and other anti-Stalinist groups, which did not separate Spaniards and foreign volunteers such as George Orwell), or anarcho-syndicalist groups such as the Durruti Column, the IWA and the CNT. Formation and recruitment Using foreign communist parties to recruit volunteers for Spain was first proposed in the Soviet Union in September 1936—apparently at the suggestion of Maurice Thorez—by Willi Münzenberg, chief of Comintern propaganda for Western Europe. As a security measure, non-communist volunteers would first be interviewed by an NKVD agent. By the end of September, the Italian and French Communist Parties had decided to set up a column. Luigi Longo, ex-leader of the Italian Communist Youth, was charged to make the necessary arrangements with the Spanish government. The Soviet Ministry of Defense also helped, since they had an experience of dealing with corps of international volunteers during the Russian Civil War. The idea was initially opposed by Largo Caballero, but after the first setbacks of the war, he changed his mind and finally agreed to the operation on 22 October. However, the Soviet Union did not withdraw from the Non-Intervention Committee, probably to avoid diplomatic conflict with France and the United Kingdom. The main recruitment center was in Paris, under the supervision of Soviet colonel Karol "Walter" Świerczewski. On 17 October 1936, an open letter by Joseph Stalin to José Díaz was published in Mundo Obrero, arguing that victory for the Spanish second republic was a matter not only for Spaniards but also for the whole of "progressive humanity"; in short order, communist activists joined with moderate socialist and liberal groups to form anti-fascist "popular front" militias in several countries, most of them under the control of or influenced by the Comintern. Entry to Spain was arranged for volunteers, for instance, a Yugoslav, Josip Broz, who would become famous as Marshal Josip Broz Tito, was in Paris to provide assistance, money, and passports for volunteers from Eastern Europe. Volunteers were sent by train or ship from France to Spain, and sent to the base at Albacete. Many of them also went by themselves to Spain. The volunteers were under no contract, nor defined engagement period, which would later prove a problem. Also, many Italians, Germans, and people from other countries joined the movement, with the idea that combat in Spain was the first step to restore democracy or advance a revolutionary cause in their own country. There were also many unemployed workers (especially from France), and adventurers. Finally, some 500 communists who had been exiled to Russia were sent to Spain (among them, experienced military leaders from the First World War like "Kléber" Stern, "Gomez" Zaisser, "Lukacs" Zalka and "Gal" Galicz, who would prove invaluable in combat). The operation was met with enthusiasm by communists, but by anarchists with skepticism, at best. At first, the anarchists, who controlled the borders with France, were told to refuse communist volunteers, but reluctantly allowed their passage after protests. A group of 500 volunteers (mainly French, with a few exiled Poles and Germans) arrived in Albacete on 14 October 1936. They were met by international volunteers who had already been fighting in Spain: Germans from the Thälmann Battalion, Italians from the Centuria Gastone Sozzi and French from the Commune de Paris Battalion. Among them was British poet John Cornford. Men were sorted according to their experience and origin and dispatched to units. On 30 May 1937, the Spanish liner Ciudad de Barcelona, carrying 200–250 volunteers from Marseille to Spain, was torpedoed by a Nationalist submarine off the coast of Malgrat de Mar. The ship sunk and up to 65 volunteers are estimated to have drowned. Albacete soon became the International Brigades headquarters and its main depot. It was run by a troika of Comintern heavyweights: André Marty was commander; Luigi Longo (Gallo) was Inspector-General; and Giuseppe Di Vittorio (Nicoletti) was chief political commissar. There were many Jewish volunteers amongst the brigaders - about a quarter of the total. A Jewish company was formed within the Polish battalion that was named after Naftali Botwin, a young Jewish communist killed in Poland in 1925. The French Communist Party provided uniforms for the Brigades. They were organized into mixed brigades, the basic military unit of the Republican People's Army. Discipline was severe. For several weeks, the Brigades were locked in their base while their strict military training was underway. Service First engagements: Siege of Madrid The Battle of Madrid was a major success for the Republic, and staved off the prospect of a rapid defeat at the hands of Francisco Franco's forces. The role of the International Brigades in this victory was generally recognized but was exaggerated by Comintern propaganda so that the outside world heard only of their victories and not those of Spanish units. So successful was such propaganda that the British Ambassador, Sir Henry Chilton, declared that there were no Spaniards in the army which had defended Madrid. The International Brigade forces that fought in Madrid arrived after another successful Republican fighting. Of the 40,000 Republican troops in the city, the foreign troops numbered less than 3,000. Even though the International Brigades did not win the battle by themselves, nor significantly change the situation, they certainly did provide an example by their determined fighting and improved the morale of the population by demonstrating the concern of other nations in the fight. Many of the older members of the International Brigades provided valuable combat experience, having fought during the First World War (Spain remained neutral in 1914–1918) and the Irish War of Independence (some had fought in the British Army while others had fought in the Irish Republican Army (IRA)). One of the strategic positions in Madrid was the Casa de Campo. There the Nationalist troops were Moroccans, commanded by General José Enrique Varela. They were stopped by III and IV Brigades of the Spanish Republican Army. On 9 November 1936, the XI International Brigade – comprising 1,900 men from the Edgar André Battalion, the Commune de Paris Battalion and the Dabrowski Battalion, together with a British machine-gun company — took up position at the Casa de Campo. In the evening, its commander, General Kléber, launched an assault on the Nationalist positions. This lasted for the whole night and part of the next morning. At the end of the fight, the Nationalist troops had been forced to retreat, abandoning all hopes of a direct assault on Madrid by Casa de Campo, while the XIth Brigade had lost a third of its personnel. On 13 November, the 1,550-man strong XII International Brigade, made up of the Thälmann Battalion, the Garibaldi Battalion and the André Marty Battalion, deployed. Commanded by General "Lukacs", they assaulted Nationalist positions on the high ground of Cerro de Los Angeles. As a result of language and communication problems, command issues, lack of rest, poor coordination with armored units, and insufficient artillery support, the attack failed. On 19 November, the anarchist militias were forced to retreat, and Nationalist troops — Moroccans and Spanish Foreign Legionnaires, covered by the Nazi Condor Legion — captured a foothold in the University City. The 11th Brigade was sent to drive the Nationalists out of the University City. The battle was extremely bloody, a mix of artillery and aerial bombardment, with bayonet and grenade fights, room by room. Anarchist leader Buenaventura Durruti was shot there on 19 November 1936 and died the next day. The battle in the university went on until three-quarters of the University City was under Nationalist control. Both sides then started setting up trenches and fortifications. It was then clear that any assault from either side would be far too costly; the Nationalist leaders had to renounce the idea of a direct assault on Madrid, and prepare for a siege of the capital. On 13 December 1936, 18,000 nationalist troops attempted an attack to close the encirclement of Madrid at Guadarrama — an engagement known as the Battle of the Corunna Road. The Republicans sent in a Soviet armored unit, under General Dmitry Pavlov, and both XI and XII International Brigades. Violent combat followed, and they stopped the Nationalist advance. An attack was then launched by the Republic on the Córdoba front. The battle ended in a form of stalemate; a communique was issued, saying: "During the day the advance continued without the loss of any territory." Poets Ralph Winston Fox and John Cornford were killed. Eventually, the Nationalists advanced, taking the hydroelectric station at El Campo. André Marty accused the commander of the Marseillaise Battalion, Gaston Delasalle, of espionage and treason and had him executed. (It is doubtful that Delasalle would have been a spy for Francisco Franco; he was denounced by his second-in-command, André Heussler, who was subsequently executed for treason during World War II by the French Resistance.) Further Nationalist attempts after Christmas to encircle Madrid met with failure, but not without extremely violent combat. On 6 January 1937, the Thälmann Battalion arrived at Las Rozas, and held its positions until it was destroyed as a fighting force. On 9 January, only 10  km had been lost to the Nationalists, when the XIII International Brigade and XIV International Brigade and the 1st British Company, arrived in Madrid. Violent Republican assaults were launched in an attempt to retake the land, with little success. On 15 January, trenches and fortifications were built by both sides, resulting in a stalemate. The Nationalists did not take Madrid until the very end of the war, in March 1939, when they marched in unopposed. There were some pockets of resistance during the subsequent months. Battle of Jarama On 6 February 1937, following the fall of Málaga, the nationalists launched an attack on the Madrid–Andalusia road, south of Madrid. The Nationalists quickly advanced on the little town of Ciempozuelos, held by the XV International Brigade. was composed of the British Battalion (British Commonwealth and Irish), the Dimitrov Battalion (miscellaneous Balkan nationalities), the Sixth February Battalion (Belgians and French), the Canadian Mackenzie-Papineau Battalion and the Abraham Lincoln Brigade. An independent 80-men-strong (mainly) Irish unit, known afterward as the Connolly Column, also fought. Battalions were rarely composed entirely of one nationality, rather they were, for the most part, a mix of many. On 11 February 1937, a Nationalist brigade launched a surprise attack on the André Marty Battalion (XIV International Brigade), killing its sentries silently and crossing the Jarama. The Garibaldi Battalion stopped the advance with heavy fire. At another point, the same tactic allowed the Nationalists to move their troops across the river. On 12 February, the British Battalion, XV International Brigade took the brunt of the attack, remaining under heavy fire for seven hours. The position became known as "Suicide Hill". At the end of the day, only 225 of the 600 members of the British battalion remained. One company was captured by ruse, when Nationalists advanced among their ranks singing The Internationale. On 17 February, the Republican Army counter-attacked. On 23 and 27 February, the International Brigades were engaged, but with little success. The Lincoln Battalion was put under great pressure, with no artillery support. It suffered 120 killed and 175 wounded. Amongst the dead was the Irish poet Charles Donnelly and Leo Greene. There were heavy casualties on both sides, and although "both claimed victory ... both suffered defeats". The battle resulted in a stalemate, with both sides digging in and creating elaborate trench systems. On 22 February 1937, the League of Nations Non-Intervention Committee ban on foreign volunteers went into effect. Battle of Guadalajara After the failed assault on the Jarama, the Nationalists attempted another assault on Madrid, this time from the northeast. The objective was the town of Guadalajara, 50  km from Madrid. The whole Italian expeditionary corps — 35,000 men, with 80 battle tanks and 200 field artillery — was deployed, as Benito Mussolini wanted the victory to be credited to Italy. On 9 March 1937, the Italians made a breach in the Republican lines but did not properly exploit the advance. However, the rest of the Nationalist army was advancing, and the situation appeared critical for the Republicans. A formation drawn from the best available units of the Republican army, including the XI and XII International Brigades, was quickly assembled. At dawn on 10 March, the Nationalists closed in, and by noon, the Garibaldi Battalion counterattacked. Some confusion arose from the fact that the sides were not aware of each other's movements, and that both sides spoke Italian; this resulted in scouts from both sides exchanging information without realizing they were enemies. The Republican lines advanced and made contact with XI International Brigade. Nationalist tanks were shot at and infantry patrols came into action. On 11 March, the Nationalist army broke the front of the Republican army. The Thälmann Battalion suffered heavy losses, but succeeded in holding the Trijueque–Torija road. The Garibaldi also held its positions. On 12 March, Republican planes and tanks attacked. The Thälmann Battalion attacked Trijuete in a bayonet charge and re-took the town, capturing numerous prisoners. Other battles The International Brigades also saw combat in the Battle of Teruel in January 1938. The 35th International Division suffered heavily in this battle from aerial bombardment as well as shortages of food, winter clothing, and ammunition. The XIV International Brigade fought in the Battle of Ebro in July 1938, the last Republican offensive of the war. Casualties Although exact figures are not available, an estimated 5,857 to 25,229 members of the International Brigades died in Spain, of an estimated 23,670 to 59,380 who served, with estimated death rates of 16.7% to 29.2%. These high casualty rates are blamed on lack of training, poor leadership and use as shock troops. Disbandment In October 1938, at the height of the Battle of the Ebro, the Non-Intervention Committee demanded the withdrawal of the International Brigades. The Republican government of Juan Negrín announced the decision in the League of Nations on 21 September 1938. The disbandment was part of an ill-advised effort to get the Nationalists' foreign backers to withdraw their troops and to persuade the Western democracies such as France and Britain to end their arms embargo on the Republic. By this time there were about an estimated 10,000 foreign volunteers still serving in Spain for the Republican side, and about 50,000 foreign conscripts for the Nationalists (excluding another 30,000 Moroccans). Perhaps half of the International Brigadistas were exiles or refugees from Nazi Germany, Fascist Italy or other countries, such as Hungary, which had authoritarian right-wing governments at the time. These men could not safely return home and some were instead given honorary Spanish citizenship and integrated into Spanish units of the Popular Army. The remainder were repatriated to their own countries. The Belgian and Dutch volunteers lost their citizenship because they had served in a foreign army. Composition Overview The first brigades were composed mostly of French, Belgian, Italian, and German volunteers, backed by a sizeable contingent of Polish miners from Northern France and Belgium. The XIth, XIIth and XIIIth were the first brigades formed. Later, the XIVth and XVth Brigades were raised, mixing experienced soldiers with new volunteers. Smaller Brigades — the 86th, 129th and 150th - were formed in late 1937 and 1938, mostly for temporary tactical reasons. About 32,000 foreigners volunteered to defend the Spanish Republic, the vast majority of them with the International Brigades. Many were veterans of World War I. Their early engagements in 1936 during the Siege of Madrid amply demonstrated their military and propaganda value. The international volunteers were mainly socialists, communists, or others willing to accept communist authority, and a high proportion were Jewish. Some were involved in the Barcelona May Days fighting against leftist opponents of the Communists: the Workers' Party of Marxist Unification (POUM) (Partido Obrero de Unificación Marxista, an anti-Stalinist Marxist party) and the anarchist CNT (CNT, Confederación Nacional del Trabajo) and FAI (FAI, Iberian Anarchist Federation), who had strong support in Catalonia. These libertarian groups attracted fewer foreign volunteers. To simplify communication, the battalions usually concentrated on people of the same nationality or language group. The battalions were often (formally, at least) named after inspirational people or events. From spring 1937 onwards, many battalions contained one Spanish volunteer company of about 150 men. Later in the war, military discipline tightened and learning Spanish became mandatory. By decree of 23 September 1937, the International Brigades formally became units of the Spanish Foreign Legion. This made them subject to the Spanish Code of Military Justice. However, the Spanish Foreign Legion itself sided with the Nationalists throughout the coup and the civil war. The same decree also specified that non-Spanish officers in the Brigades should not exceed Spanish ones by more than 50 percent. Non-Spanish battalions Abraham Lincoln Battalion - from the United States, Canada and Irish Free State, with some British, Cypriots, and Chileans from the Chilean Worker Club of New York. Connolly Column - a mostly Irish republican group who fought as a section of the Lincoln Battalion Mickiewicz Battalion - predominantly Polish. André Marty Battalion - predominantly French and Belgian, named after André Marty. British Battalion - mainly British but with many from the Irish Free State, Australia, New Zealand, South Africa, Cyprus and other Commonwealth countries. Checo-Balcánico Battalion - Czechoslovakian and Balkan. Commune de Paris Battalion - predominantly French. Deba Blagoiev Battalion - predominantly Bulgarian, later merged into the Djakovic Battalion. Dimitrov Battalion - Greek, Yugoslav, Bulgarian, Czechoslovakian, Hungarian and Romanian. Named after Georgi Dimitrov. Djuro Djakovic Battalion - Yugoslav, Bulgarian, anarchist, named for former Yugoslav Communist Party secretary Đuro Đaković. Dabrowski Battalion - mostly Polish and Hungarian, also Czechoslovak, Ukrainian, Bulgarian and Palestinian Jews. Edgar André Battalion - mostly German, also Austrian, Yugoslav, Bulgarian, Albanian, Romanian, Danish, Swedish, Norwegian and Dutch. Español Battalion - Mexican, Cuban, Puerto Rican, Chilean, Argentine and Bolivian. Figlio Battalion - mostly Italian; later merged with the Garibaldi Battalion. Garibaldi Battalion - raised as the Italoespañol Battalion and renamed. Mostly Italian and Spanish, but contained some Albanians. George Washington Battalion - the second U.S. battalion. Later merged with the Lincoln Battalion, to form the Lincoln-Washington Battalion. Hans Beimler Battalion - mostly German; later merged with the Thälmann Battalion. Henri Barbusse Battalion - predominantly French. Henri Vuilleman Battalion - predominantly French. (Matteotti Battalion) - predominantly Italian and the first international group to reach Spain Louise Michel Battalions - French-speaking, later merged with the Henri Vuillemin Battalion. Mackenzie–Papineau Battalion - the "Mac-Paps", predominantly Canadian. Marseillaise Battalion - predominantly French, commanded by George Nathan. Incorporated one separate British company. Palafox Battalion - Yugoslav, Polish, Czechoslovakian, Hungarian, Jewish and French. Naftali Botwin Company - a Jewish unit formed within the Palafox Battalion in December 1937. Pierre Brachet Battalion - mostly French. Rakosi Battalion - mainly Hungarian, also Czechoslovaks, Ukrainians, Poles, Chinese, Mongolians and Palestinian Jews. Nine Nations Battalion (also known as the Sans nons and Neuf Nationalités - French, Belgian, Italian, German, Austrian, Dutch, Danish, Swiss and Polish. Sixth of February Battalion - French, Belgian, Moroccan, Algerian, Libyan, Syrian, Iranian, Iraqi, Egyptian, Chinese, Japanese, Indian, Filipino and Palestinian Jewish. Thälmann Battalion - predominantly German, named after German communist leader Ernst Thälmann. Tom Mann Centuria - a small, mostly British, group who operated as a section of the Thälmann Battalion. Thomas Masaryk Battalion: mostly Czechoslovak. Chapaev Battalion - composed of 21 nationalities (Ukrainian, Polish, Czechoslovakian, Bulgarian, Yugoslavian, Turkish, Italian, German, Austrian, Finnish, Swedish, Norwegian, Danish, Belgian, French, Greek, Albanian, Dutch, Swiss, Lithuanian and Estonian). Vaillant-Couturier Battalion - French, Belgian, Czechoslovakian, Bulgarian, Swedish, Norwegian and Danish. Veinte Battalion - American, British, Italian, Yugoslav and Bulgarian. Zwölfte Februar Battalion - mostly Austrian. Company De Zeven Provinciën - Dutch. Brigadistas by country of origin {| class="wikitable" |- ! Country !! Estimate !! Notes |- | France ||8,962–9,000 || |- | Italy || 3,000–3,350 || |- | Germany | rowspan="2" | 3,000–5,000 Beevor quotes 2,217 Germans and 872 Austrians. Austrian Resistance documents name 1400 Austrians || |- | Austria |annexed in 1938 by Germany |- | Poland || 500-5,000 || International historiography tends to hover around the figure of 3,000 "Poles". It includes migrants from Poland but recruited in France and Belgium, who made up some 75% of the Polish contingent; it also includes volunteers of Belorussian, Ukrainian and especially Jewish origin; the latter might have accounted for 45% of all volunteers classified as "Poles" |- | ||2,341–2,800 || |- | Yugoslavia | 2,095 || |- | || 2,500 || |- | || 1,600–1,722 || |- | || 1,546–2,000 Thomas estimates 1,000. || |- | Yugoslavia || 1,500–1,660 || |- | Cuba|| 1,101 || |- | Czechoslovakia || 1,006–1,500 || |- | ||740 || |- | ||628–691|| |- | ||550 || 220 died. |- | Hungary ||528–1,500 || |- | ||500 || Est. 799–1,000 from Scandinavia (of whom 500 were Swedes.) |- | Romania || 500 || |- | Bulgaria ||462 || |- | ||408–800 || |- | |300-600 | |- | Ireland || 250 || Split between the British Battalion and the Lincoln Battalion which included the famed Connolly Column |- | ||225 || 100 died. |- | || 225 || Including 78 Finnish Americans and 73 Finnish Canadians, ca. 70 died. |- | Estonia ||200 || |- | Greece || 290–400 || |- | Portugal || 134|| Due to the geographic and linguistic proximity most Portuguese volunteers joined the Republican forces directly and not the International Brigades (such is the case of Emídio Guerreiro and that was the plan of the failed 1936 Naval Revolt). At the time it was estimated that about 2,000 Portuguese fought on the Republican side, spread throughout different units. |- | ||103 || Livre historiographic d'Henri Wehenkel - D'Spueniekämfer (1997) |- | China || 100||Organised by the Chinese Communist Party, members were mostly overseas Chinese led by Xie Weijin. |- | ||90 || |- | Cyprus ||60 || |- | || 60 || Of whom 16 killed. |- | Philippines || 50 || |- | Albania || 43 || Organised in the "Garibaldi Battalion" together with Italians. They were led by the Kosovar revolutionary Asim Vokshi |- | || 24 || |- | New Zealand || "Perhaps 20" || Mixed into British units |- | Others || 1,122|| |} Status after the war After the Civil War was eventually won by the Nationalists, the brigaders were initially on the "wrong side" of history, especially as most of their home countries had right-wing governments (in France, for instance, the Popular Front was not in power anymore). However, since most of these countries soon found themselves at war with the very powers which had been supporting the Nationalists, the brigadistas gained some prestige as the first guard of the democracies, as having foreseen the danger of fascism and gone to fight it. Retrospectively, it was clear that the war in Spain was as much a precursor of the Second World War as a Spanish civil war. Some glory therefore accrued to the volunteers (a great many of the survivors also fought during World War II), but this soon faded in the fear that it would promote communism by association. An exception is among some left-wingers, for example many anarchists. Among these, the Brigades, or at least their leadership, are criticized for their role in suppressing the Spanish Revolution. An example of a modern work that promotes this view is Ken Loach's film Land and Freedom. A well-known contemporary account of the Spanish Civil War which also takes this view is George Orwell's book Homage to Catalonia. East Germany Germany was undivided until after the Second World War. At that time, the new communist state, the German Democratic Republic, began to create a national identity which was separate from and antithetical to the former Nazi Germany. The Spanish Civil War, and especially the role of the International Brigades, became a substantial part of East Germany's memorial rituals because of the substantial numbers of German communists who had served in the brigades. These showcased a commitment by many Germans to antifascism at a time when Germany and Nazism were often conflated. Canada Survivors of the Mackenzie-Papineau Battalion were often investigated by the Royal Canadian Mounted Police and denied employment when they returned to Canada. Some were prevented from serving in the military during the Second World War due to "political unreliability". In 1995 a monument to veterans of the war was built near Ontario's provincial parliament. On 12 February 2000, a bronze statue "The Spirit of the Republic" by sculptor Jack Harman, based on an original poster from the Spanish Republic, was placed on the grounds of the British Columbia Legislature. In 2001, the few remaining Canadian veterans of the Spanish Civil War dedicated a monument to Canadian members of the International Brigades in Ottawa's Green Island Park. Switzerland In Switzerland, public sympathy was high for the Republican cause, but the federal government banned all fundraising and recruiting activities a month after the start of the war as part of the country's long-standing policy of neutrality. Around 800 Swiss volunteers joined the International Brigades, among them a small number of women. Sixty percent of Swiss volunteers identified as communists, while the others included socialists, anarchists and antifascists. Some 170 Swiss volunteers were killed in the war. The survivors were tried by military courts upon their return to Switzerland for violating the criminal prohibition on foreign military service. The courts pronounced 420 sentences which ranged from around two weeks to four years in prison, and often also stripped the convicts of their political rights. In the judgment of Swiss historian Mauro Cerutti, volunteers were punished more harshly in Switzerland than in any other democratic country. Motions to pardon the Swiss brigaders on the account that they fought for a just cause have been repeatedly introduced in the Swiss federal parliament. A first such proposal was defeated in 1939 on neutrality grounds. In 2002, Parliament again rejected a pardon of the Swiss war volunteers, with a majority arguing that they broke a law that remains in effect to this day. In March 2009, Parliament adopted the third bill of pardon, retroactively rehabilitating Swiss brigades, only a handful of whom were still alive. United Kingdom On disbandment, 305 British volunteers left Spain to return home. They arrived at Victoria Station in central London on 7 December and were met warmly as returning heroes by a crowd of supporters including Clement Attlee, Stafford Cripps, Willie Gallacher, and Will Lawther. The last surviving British member of the International Brigades, Geoffrey Servante, died in April 2019 aged 99. United States In the United States, the returned volunteers were labeled "premature anti-fascists" by the FBI, denied promotion during service in the U.S. military during World War II, and pursued by Congressional committees during the Red Scare of 1947–1957. However, threats of loss of citizenship were not carried out. Recognition Josep Almudéver, believed to be the last surviving veteran of the International Brigades, died on 23 May 2021 at the age of 101. Although born into a Spanish family and living in Spain at the outbreak of the conflict, he also held French citizenship and enlisted in the International Brigades to avoid age restrictions in the Spanish Republican army. He served in the CXXIX International Brigade and later fought in the Spanish Maquis, and after the war lived in exile in France. Spain On 26 January 1996, the Spanish government gave Spanish citizenship to the 600 or so remaining Brigadistas, fulfilling a promise made by Prime Minister Juan Negrín in 1938. France In 1996, Jacques Chirac, then French President, granted the former French members of the International Brigades the legal status of former service personnel ("ancient combatants") following the request of two French communist Members of Parliament, Lefort and Asensi, both children of volunteers. Before 1996, the same request was turned down several times including by François Mitterrand, the former Socialist President. Symbolism and heraldry The International Brigades were inheritors of a socialist aesthetic. The flags featured the colors of the Spanish Republic: red, yellow and purple, often along with socialist symbols (red flags, hammer and sickle, fist). The emblem of the brigades themselves was the three-pointed red star, which is often featured. See also Foreign involvement in the Spanish Civil War References Footnotes Sources Alvarez, Santiago. Historia politica y militar de las brigadas internacionales Madrid: Compañía Literaria, 1996. Anderson, James W. The Spanish Civil War: A History and Reference Guide. Santa Barbara: Greenwood Press, 2003. Beevor, Antony. [1982] The Spanish Civil War. Reissued London: Weidenfeld & Nicolson (Cassell), 1999. Beevor, Antony. (2006). The Battle for Spain: The Spanish Civil War 1936–1939. London: Weidenfeld & Nicolson, 2006. Bradley, Ken International Brigades in Spain 1936-39 with Mike Chappell (Illustrator) Published by Elite. . Castells, Andreu. Las brigadas internacionales en la guerra de España. Barcelona: Editorial Ariel, 1974. Copeman, Fred (1948). Reason in Revolt. London: Blandford Press, 1948. Eby, Cecil. Comrades and Commissars. Pennsylvania: Penn State University Press, 2007. Gurney, Jason (1974) Crusade in Spain. London: Faber, 1974. Kantorowicz, Alfred (1938, 1948), Spanisches Tagebuch, Madrid (1938), Berlin (1948). Kuuli, O; Riis, V; Utt, O; (editors) (1965) Hispaania tules. Mälestusi ja dokumente fašismivastasest võitlusest Hispaanias 1936.-1939. aastal. Tallinn: Eesti raamat. Lefebvre, Michel; Skoutelsky, Rémi. Las brigadas internacionales. Barcelona: Lunwerg Editores (2003). Marco, Jorge and Thomas, Maria, "'Mucho malo for fascisti': Languages and Transnational Soldiers in the Spanish Civil War", War & Society, 38-2 (2019) Marco, Jorge, "The Antifascist Tower of Babel: Language Barriers in Civil-War Spain", The Volunteer, December (2019) Marco, Jorge, "Transnational Soldiers and Guerrilla Warfare from the Spanish Civil War to the Second World War", War i History (2018) Marco, Jorge and Anderson, Peter, "Legitimacy by proxy:searching for a usable past through the International Brigades in Spain’s Post-Franco democracy, 1975-2015", Journal of Modern European History, 14-3 (2016) Orwell, George. [1938] A Homage to Catalonia. London: Penguin Books, 1969. (New edition) Thomas, Hugh. (1961) The Spanish Civil War. London: Eyre & Spottiswoode, 1961. Thomas, Hugh. (2003) The Spanish Civil War, 2003. London: Penguin (Revised 4th edition), 2003. Giles Tremlett. (2020) The International Brigades: Fascism, Freedom and the Spanish Civil War', Bloomsbury, 2020 Wainwright, John, L. (2011) The Last to Fall: the Life and Letters of Ivor Hickman - an International Brigader in Spain''. Southampton: Hatchet Green Publishing. External links IBMT the international brigade memorial trust Abraham Lincoln Brigade Archives Private Collection about German Exile and Spanish Civil War Remembering the Sussex Brigaders Armed Forces of the Second Spanish Republic Expatriate units and formations Foreign volunteers in the Spanish Civil War Military units and formations disestablished in 1938 Military units and formations established in 1936
[ -0.1690000295639038, 0.048569127917289734, -0.2359788864850998, -0.15030261874198914, -0.44673460721969604, -0.07203901559114456, 0.18162637948989868, 0.4234614074230194, -0.3180786371231079, -0.08123765140771866, -0.45313194394111633, 0.3380112946033478, -0.721176028251648, 0.223270863294...
15373
https://en.wikipedia.org/wiki/Iron%20Duke
Iron Duke
Iron Duke may refer to: People William Mark Duke (1879–1971), Archbishop of Vancouver Irvin Khoza (born 1948), South African football administrator John F. Thompson (politician) (1920–1965), U.S. politician Fernando Álvarez de Toledo, 3rd Duke of Alba (1507–1582), Spanish noble, general, and diplomat involved in the Eighty Years' War Luís Alves de Lima e Silva, Duke of Caxias (1803–1880), Brazilian army officer and politician Arthur Wellesley, 1st Duke of Wellington (1769–1852), British soldier and statesman Beltrán Alfonso Osorio, 18th duke of Alburquerque (1918–1994), Spanish noble and amateur jockey Robert William Wilcox (1855–1903), Hawaiian revolutionary soldier and politician Ships , any of several British Royal Navy ships HMS Iron Duke (1870), a battleship sold for scrap in 1906 HMS Iron Duke (1912), the fleet flagship at the Battle of Jutland HMS Iron Duke (F234), a Type 23 frigate launched in 1991 Trains GWR Iron Duke Class, a class of locomotive built by the Great Western Railway in England Iron Duke, a GWR 3031 Class locomotive built in 1892 BR Standard Class 7 Iron Duke number 70014 built in 1951 British Rail Class 87 Iron Duke number 87017 built in 1974 Other uses Iron Duke engine, a 2.5 L I4 piston engine made by General Motors Iron Duke (pub), public house in Great Yarmouth, England The Iron Duke (film), 1934 film starring George Arliss The Iron Duke (novel), by L. Ron Hubbard The Iron Dukes, the name the 2nd Battalion 37th Armored Regiment See also Iron Baron (disambiguation) Iron Lady (disambiguation) Iron Lord (disambiguation) Iron Man (disambiguation) Iron Woman (disambiguation)
[ -0.0010347366333007812, 0.4160337448120117, -0.27886709570884705, -0.10818695276975632, -0.5293241143226624, 0.34196606278419495, 0.6526930928230286, 0.3254821002483368, -0.3863492012023926, -0.5393345952033997, -0.4494287371635437, 0.06896837055683136, -0.43444550037384033, 0.603121280670...
15374
https://en.wikipedia.org/wiki/Food%20irradiation
Food irradiation
Food irradiation is the process of exposing food and food packaging to ionizing radiation, such as from gamma rays, x-rays, or electron beams. When ionizing radiation passes through a food product, some energy is absorbed by some chemical bonds. Some bonds rupture and produce free radicals which are highly reactive and unstable. They instantaneously rejoin with neighboring compounds and the results are called radiolytic compounds. Food irradiation improves food safety by extending product shelf life (preservation), reducing the risk of foodborne illness, delaying or eliminating sprouting or ripening, by sterilization of foods, and as a means of controlling insects and invasive pests. Food irradiation extends the shelf life of irradiated foods by effectively destroying organisms responsible for spoilage and foodborne illness and inhibiting sprouting. Consumer perception of foods treated with irradiation is more negative than those processed by other means. The U.S. Food and Drug Administration (FDA), the World Health Organization (WHO), the Centers for Disease Control and Prevention (CDC), and U.S. Department of Agriculture (USDA) have performed studies that confirm irradiation to be safe. In order for a food to be irradiated in the US, the FDA will still require that the specific food be thoroughly tested for irradiation safety. Food irradiation is permitted in over 60 countries, and about 500,000 metric tons of food are processed annually worldwide. The regulations for how food is to be irradiated, as well as the foods allowed to be irradiated, vary greatly from country to country. In Austria, Germany, and many other countries of the European Union only dried herbs, spices, and seasonings can be processed with irradiation and only at a specific dose, while in Brazil all foods are allowed at any dose. Uses Irradiation is used to reduce or eliminate pests and the risk of food-borne illnesses as well as prevent or slow spoilage and plant maturation or sprouting. Depending on the dose, some or all of the organisms, microorganisms, bacteria, and viruses present are destroyed, slowed, or rendered incapable of reproduction. When targeting bacteria, most foods are irradiated to significantly reduce the number of active microbes, not to sterilize all microbes in the product. Irradiation cannot return spoiled or over-ripe food to a fresh state. If this food was processed by irradiation, further spoilage would cease and ripening would slow, yet the irradiation would not destroy the toxins or repair the texture, color, or taste of the food. Irradiation slows the speed at which enzymes change the food. By reducing or removing spoilage organisms and slowing ripening and sprouting (e.g. potato, onion, and garlic) irradiation is used to reduce the amount of food that goes bad between harvest and final use. Shelf-stable products are created by irradiating foods in sealed packages, as irradiation reduces chance of spoilage, the packaging prevents re-contamination of the final product. Foods that can tolerate the higher doses of radiation required to do so can be sterilized. This is useful for people at high risk of infection in hospitals as well as situations where proper food storage is not feasible, such as rations for astronauts. Pests such as insects have been transported to new habitats through the trade in fresh produce and significantly affected agricultural production and the environment once they established themselves. To reduce this threat and enable trade across quarantine boundaries, food is irradiated using a technique called phytosanitary irradiation. Phytosanitary irradiation sterilizes the pests preventing breeding by treating the produce with low doses of irradiation (less than 1000 Gy). The higher doses required to destroy pests are not used due to either affecting the look or taste, or cannot be tolerated by fresh produce. Process The target material is exposed to a radiation source that is separated from the target material. The radiation source supplies energetic particles or waves. As these waves/particles enter the target material they collide with other particles. The higher the likelihood of these collisions over a distance are, the lower the penetration depth of the irradiation process is as the energy is more quickly depleted. Around the sites of these collisions chemical bonds are broken, creating short lived radicals (e.g. the hydroxyl radical, the hydrogen atom and solvated electrons). These radicals cause further chemical changes by bonding with and or stripping particles from nearby molecules. When collisions occur in cells, cell division is often suppressed, halting or slowing the processes that cause the food to mature. When the process damages DNA or RNA, effective reproduction becomes unlikely halting the population growth of viruses and organisms. The distribution of the dose of radiation varies from the food surface and the interior as it is absorbed as it moves through food and depends on the energy and density of the food and the type of radiation used. Better quality Irradiation leaves a product with qualities (sensory and chemical) that are more similar to unprocessed food than any preservation method that can achieve a similar degree of preservation. Not radioactive Irradiated food does not become radioactive; only radiation sources that are incapable of causing significant induced radioactivity are used for food irradiation. Radioactivity is the ability of an atom to emit energetic particles. When particles hit the target materials, they may free other highly energetic particles. When the nucleus is not modified this ends shortly after the end of the exposure, much like objects stop reflecting light when the source is turned off and warm objects emit heat until they cool down but do not continue to produce their own heat. To modify a material so that it keeps emitting radiation (induce radiation) the atomic cores (nucleus) of the atoms in the target material must be modified by colliding with particles above a specific energy threshold. Particles below this energy can never be strong enough to modify the nucleus of the targeted atom in the food, regardless of how many particles hit the target material, and radioactivity can not be induced without modifying the nucleus. Food irradiators using radioactive materials (gamma irradiation) or electron beams as sources produce radiation at a precise energies making it impossible to induce any amount of radiation. Food irradiatiors using x-rays produce radiation at a wider power spectrum, a small portion of this radiation is above the threshold for inducing radiation, therefore is impossible for food irradiators to induce radiation above the background level (above the normal level of radiation) in a product. Dosimetry The radiation absorbed dose is the amount energy absorbed per unit weight of the target material. Dose is used because, when the same substance is given the same dose, similar changes are observed in the target material(Gy or J/kg). Dosimeters are used to measure dose, and are small components that, when exposed to ionizing radiation, change measurable physical attributes to a degree that can be correlated to the dose received. Measuring dose (dosimetry) involves exposing one or more dosimeters along with the target material. For purposes of legislation doses are divided into low (up to 1 kGy), medium (1 kGy to 10 kGy), and high-dose applications (above 10 kGy). High-dose applications are above those currently permitted in the US for commercial food items by the FDA and other regulators around the world, though these doses are approved for non commercial applications, such as sterilizing frozen meat for NASA astronauts (doses of 44 kGy) and food for hospital patients. The ratio of the maximum dose permitted at the outer edge (Dmax) to the minimum limit to achieve processing conditions (Dmin) determines the uniformity of dose distribution. This ratio determines how uniform the irradiation process is. Chemical changes As ionising radiation passes through food, it creates a trail of chemical transformations due to radiolysis effects. Irradiation does not make foods radioactive, change food chemistry, compromise nutrient contents, or change the taste, texture, or appearance of food . Food quality Assessed rigorously over several decades, irradiation in commercial amounts to treat food has no negative impact on the sensory qualities and nutrient content of foods. Research on minimally processed vegetables Watercress (Nasturtium officinale) is a rapidly growing aquatic or semi aquatic perennial plant. Because chemical agents do not provide efficient microbial reductions, watercress has been tested with gamma irradiation treatment in order to improve both safety and the shelf life of the product. It is traditionally used on horticultural products to prevent sprouting and post-packaging contamination, delay post-harvest ripening, maturation and senescence. Public Perceptions Some who advocate against food irradiation argue the long term health effects & safety of irradiated food cannot be scientifically proven, despite hundreds of animal feeding studies of irradiated food performed since 1950. Endpoints include subchronic and chronic changes in metabolism, histopathology, function of most organs, reproductive effects, growth, teratogenicity, and mutagenicity. Industrial process Up to the point where the food is processed by irradiation, the food is processed in the same way as all other food. Packaging For some forms of treatment, packaging is used to ensure the food stuffs never come in contact with radioactive substances and prevent re-contamination of the final product. Food processors and manufacturers today struggle with using affordable, efficient packaging materials for irradiation based processing. The implementation of irradiation on prepackaged foods has been found to impact foods by inducing specific chemical alterations to the food packaging material that migrates into the food. Cross-linking in various plastics can lead to physical and chemical modifications that can increase the overall molecular weight. On the other hand, chain scission is fragmentation of polymer chains that leads to a molecular weight reduction. Treatment To treat the food, it is exposed to a radioactive source for a set period of time to achieve a desired dose. Radiation may be emitted by a radioactive substance, or by X-ray and electron beam accelerators. Special precautions are taken to ensure the food stuffs never come in contact with the radioactive substances and that the personnel and the environment are protected from exposure radiation. Irradiation treatments are typically classified by dose (high, medium, and low), but are sometimes classified by the effects of the treatment (radappertization, radicidation and radurization). Food irradiation is sometimes referred to as "cold pasteurization" or "electronic pasteurization" because ionizing the food does not heat the food to high temperatures during the process, and the effect is similar to heat pasteurization. The term "cold pasteurization" is controversial because the term may be used to disguise the fact the food has been irradiated and pasteurization and irradiation are fundamentally different processes. Gamma irradiation Gamma irradiation is produced from the radioisotopes cobalt-60 and caesium-137, which are derived by neutron bombardment of cobalt-59 and as a nuclear source by-product, respectively. Cobalt-60 is the most common source of gamma rays for food irradiation in commercial scale facilities as it is water insoluble and hence has little risk of environmental contamination by leakage into the water systems. As for transportation of the radiation source, cobalt-60 is transported in special trucks that prevent release of radiation and meet standards mentioned in the Regulations for Safe Transport of Radioactive Materials of the International Atomic Energy Act. The special trucks must meet high safety standards and pass extensive tests to be approved to ship radiation sources. Conversely, caesium-137, is water-soluble and poses a risk of environmental contamination. Insufficient quantities are available for large scale commercial use. An incident where water-soluble caesium-137 leaked into the source storage pool requiring NRC intervention has led to near elimination of this radioisotope. Gamma irradiation is widely used due to its high penetration depth and dose uniformity, allowing for large-scale applications with high through puts. Additionally, gamma irradiation is significantly less expensive than using an X-ray source. In most designs, the radioisotope, contained in stainless steel pencils, is stored in a water-filled storage pool which absorbs the radiation energy when not in use. For treatment, the source is lifted out of the storage tank, and product contained in totes is passed around the pencils to achieve required processing. Treatment costs vary as a function of dose and facility usage. A pallet or tote is typically exposed for several minutes to hours depending on dose. Low-dose applications such as disinfestation of fruit range between US$0.01/lbs and US$0.08/lbs while higher-dose applications can cost as much as US$0.20/lbs. Electron beam Treatment of electron beams is created as a result of high energy electrons in an accelerator that generates electrons accelerated to 99% the speed of light. This system uses electrical energy and can be powered on and off. The high power correlates with a higher throughput and lower unit cost, but electron beams have low dose uniformity and a penetration depth of centimeters. Therefore, electron beam treatment works for products that have low thickness. X-ray X-rays are produced by bombardment of dense target material with high-energy accelerated electrons(this process is known as bremsstrahlung-conversion), giving rise to a continuous energy spectrum. Heavy metals, such as tantalum and tungsten, are used because of their high atomic numbers and high melting temperatures. Tantalum is usually preferred versus tungsten for industrial, large-area, high-power targets because it is more workable than tungsten and has a higher threshold energy for induced reactions. Like electron beams, x-rays do not require the use of radioactive materials and can be turned off when not in use. X-rays have high penetration depths and high dose uniformity but they are a very expensive source of irradiation as only 8% of the incident energy is converted into X-rays. UV-C UV-C does not penetrate as deeply as other methods. As such, its direct antimicrobial effect is limited to the surface only. Its DNA damage effect produces cyclobutane-type pyrimidine dimers. Besides the direct effects, UV-C also induces resistance even against pathogens not yet inoculated. Some of this induced resistance is understood, being the result of temporary inactivation of self-degradation enzymes like polygalacturonase and increased expression of enzymes associated with cell wall repair. Cost Irradiation is a capital-intensive technology requiring a substantial initial investment, ranging from $1 million to $5 million. In the case of large research or contract irradiation facilities, major capital costs include a radiation source, hardware (irradiator, totes and conveyors, control systems, and other auxiliary equipment), land (1 to 1.5 acres), radiation shield, and warehouse. Operating costs include salaries (for fixed and variable labor), utilities, maintenance, taxes/insurance, cobalt-60 replenishment, general utilities, and miscellaneous operating costs. Perishable food items, like fruits, vegetables and meats would still require to be handled in the cold chain, so all other supply chain costs remain the same. Food manufacturers have not embraced food irradiation because the market does not support the increased price of irradiated foods, and because of potential consumer backlash due to irradiated foods. The cost of food irradiation is influenced by dose requirements, the food's tolerance of radiation, handling conditions, i.e., packaging and stacking requirements, construction costs, financing arrangements, and other variables particular to the situation. State of the industry Irradiation has been approved by many countries. For example, in the U.S. and Canada, food irradiation has existed for decades. Food irradiation is used commercially and volumes are in general increasing at a slow rate, even in the European Union where all member countries allow the irradiation of dried herbs spices and vegetable seasonings, but only a few allow other foods to be sold as irradiated. Although there are some consumers who choose not to purchase irradiated food, a sufficient market has existed for retailers to have continuously stocked irradiated products for years. When labeled irradiated food is offered for retail sale, consumers buy it and re-purchase it, indicating a market for irradiated foods, although there is a continuing need for consumer education. Food scientists have concluded that any fresh or frozen food undergoing irradiation at specified doses is safe to consume, with some 60 countries using irradiation to maintain quality in their food supply. Standards and regulations The Codex Alimentarius represents the global standard for irradiation of food, in particular under the WTO-agreement. Regardless of treatment source, all processing facilities must adhere to safety standards set by the International Atomic Energy Agency (IAEA), Codex Code of Practice for the Radiation Processing of Food, Nuclear Regulatory Commission (NRC), and the International Organization for Standardization (ISO). More specifically, ISO 14470 and ISO 9001 provide in-depth information regarding safety in irradiation facilities. All commercial irradiation facilities contain safety systems which are designed to prevent exposure of personnel to radiation. The radiation source is constantly shielded by water, concrete, or metal. Irradiation facilities are designed with overlapping layers of protection, interlocks, and safeguards to prevent accidental radiation exposure. Additionally, "melt-downs" do not occur in facilities because the radiation source gives off radiation and decay heat; however, the heat is not sufficient to melt any material. Labeling The provisions of the Codex Alimentarius are that any "first generation" product must be labeled "irradiated" as any product derived directly from an irradiated raw material; for ingredients the provision is that even the last molecule of an irradiated ingredient must be listed with the ingredients even in cases where the unirradiated ingredient does not appear on the label. The RADURA-logo is optional; several countries use a graphical version that differs from the Codex-version. The suggested rules for labeling is published at CODEX-STAN – 1 (2005), and includes the usage of the Radura symbol for all products that contain irradiated foods. The Radura symbol is not a designator of quality. The amount of pathogens remaining is based upon dose and the original content and the dose applied can vary on a product by product basis. The European Union follows the Codex's provision to label irradiated ingredients down to the last molecule of irradiated food. The European Union does not provide for the use of the Radura logo and relies exclusively on labeling by the appropriate phrases in the respective languages of the Member States. The European Union enforces its irradiation labeling laws by requiring its member countries to perform tests on a cross section of food items in the market-place and to report to the European Commission. The results are published annually on EUR-Lex. The US defines irradiated foods as foods in which the irradiation causes a material change in the food, or a material change in the consequences that may result from the use of the food. Therefore, food that is processed as an ingredient by a restaurant or food processor is exempt from the labeling requirement in the US. All irradiated foods must include a prominent Radura symbol followed in addition to the statement "treated with irradiation" or "treated by irradiation. Bulk foods must be individually labeled with the symbol and statement or, alternatively, the Radura and statement should be located next to the sale container. Packaging Under section 409 of the Federal Food, Drug, and Cosmetic Act, irradiation of prepackaged foods requires premarket approval for not only the irradiation source for a specific food but also for the food packaging material. Approved packaging materials include various plastic films, yet does not cover a variety of polymers and adhesive based materials that have been found to meet specific standards. The lack of packaging material approval limits manufacturers production and expansion of irradiated prepackaged foods. Approved materials by FDA for Irradiation according to 21 CFR 179.45: Food safety In 2003, the Codex Alimentarius removed any upper dose limit for food irradiation as well as clearances for specific foods, declaring that all are safe to irradiate. Countries such as Pakistan and Brazil have adopted the Codex without any reservation or restriction. Standards that describe calibration and operation for radiation dosimetry, as well as procedures to relate the measured dose to the effects achieved and to report and document such results, are maintained by the American Society for Testing and Materials (ASTM international) and are also available as ISO/ASTM standards. All of the rules involved in processing food are applied to all foods before they are irradiated. United States The U.S. Food and Drug Administration (FDA) is the agency responsible for regulation of radiation sources in the United States. Irradiation, as defined by the FDA is a "food additive" as opposed to a food process and therefore falls under the food additive regulations. Each food approved for irradiation has specific guidelines in terms of minimum and maximum dosage as determined safe by the FDA. Packaging materials containing the food processed by irradiation must also undergo approval. The United States Department of Agriculture (USDA) amends these rules for use with meat, poultry, and fresh fruit. The United States Department of Agriculture (USDA) has approved the use of low-level irradiation as an alternative treatment to pesticides for fruits and vegetables that are considered hosts to a number of insect pests, including fruit flies and seed weevils. Under bilateral agreements that allows less-developed countries to earn income through food exports agreements are made to allow them to irradiate fruits and vegetables at low doses to kill insects, so that the food can avoid quarantine. The U.S. Food and Drug Administration and the U.S. Department of Agriculture have approved irradiation of the following foods and purposes: Packaged refrigerated or frozen red meat — to control pathogens (E. Coli O157:H7 and Salmonella) and to extend shelf life Packaged poultry — control pathogens (Salmonella and Camplylobacter) Fresh fruits, vegetables, and grains — to control insects and inhibit growth, ripening and sprouting Pork — to control trichinosis Herbs, spices and vegetable seasonings — to control insects and microorganisms Dry or dehydrated enzyme preparations — to control insects and microorganisms White potatoes — to inhibit sprout development Wheat and wheat flour — to control insects Loose or bagged fresh iceberg lettuce and spinach Crustaceans (lobster, shrimp, and crab) Shellfish (oysters, clams, mussels, and scallops) European Union European law stipulates that all member countries must allow the sale of irradiated dried aromatic herbs, spices and vegetable seasonings. However, these Directives allow Member States to maintain previous clearances food categories the EC's Scientific Committee on Food (SCF) had previously approved (the approval body is now the European Food Safety Authority). Presently, Belgium, Czech Republic, France, Italy, Netherlands, Poland, and the United Kingdom allow the sale of many different types of irradiated foods. Before individual items in an approved class can be added to the approved list, studies into the toxicology of each of such food and for each of the proposed dose ranges are requested. It also states that irradiation shall not be used "as a substitute for hygiene or health practices or good manufacturing or agricultural practice". These Directives only control food irradiation for food retail and their conditions and controls are not applicable to the irradiation of food for patients requiring sterile diets. In 2021 the most common food items irradiated were frog legs at 65.1%, poultry 20.6% and dried aromatic herbs, spices and vegetables seasoning. Because of the Single Market of the EU any food, even if irradiated, must be allowed to be marketed in any other Member State even if a general ban of food irradiation prevails, under the condition that the food has been irradiated legally in the state of origin. Furthermore, imports into the EC are possible from third countries if the irradiation facility had been inspected and approved by the EC and the treatment is legal within the EC or some Member state. Nuclear safety and security Interlocks and safeguards are mandated to minimize this risk. There have been radiation-related accidents, deaths, and injury at such facilities, many of them caused by operators overriding the safety related interlocks. In a radiation processing facility, radiation specific concerns are supervised by special authorities, while "Ordinary" occupational safety regulations are handled much like other businesses. The safety of irradiation facilities is regulated by the United Nations International Atomic Energy Agency and monitored by the different national Nuclear Regulatory Commissions. The regulators enforce a safety culture that mandates that all incidents that occur are documented and thoroughly analyzed to determine the cause and improvement potential. Such incidents are studied by personnel at multiple facilities, and improvements are mandated to retrofit existing facilities and future design. In the US the Nuclear Regulatory Commission (NRC) regulates the safety of the processing facility, and the United States Department of Transportation (DOT) regulates the safe transport of the radioactive sources. Historical timeline 1895 Wilhelm Conrad Röntgen discovers X-rays ("bremsstrahlung", from German for radiation produced by deceleration) 1896 Antoine Henri Becquerel discovers natural radioactivity; Minck proposes the therapeutic use 1904 Samuel Prescott describes the bactericide effects Massachusetts Institute of Technology (MIT) 1906 Appleby & Banks: UK patent to use radioactive isotopes to irradiate particulate food in a flowing bed 1918 Gillett: U.S. Patent to use X-rays for the preservation of food 1921 Schwartz describes the elimination of Trichinella from food 1930 Wuest: French patent on food irradiation 1943 MIT becomes active in the field of food preservation for the U.S. Army 1951 U.S. Atomic Energy Commission begins to co-ordinate national research activities 1958 World first commercial food irradiation (spices) at Stuttgart, Germany 1970 Establishment of the International Food Irradiation Project (IFIP), headquarters at the Federal Research Centre for Food Preservation, Karlsruhe, Germany 1980 FAO/IAEA/WHO Joint Expert Committee on Food Irradiation recommends the clearance generally up to 10 kGy "overall average dose" 1981/1983 End of IFIP after reaching its goals 1983 Codex Alimentarius General Standard for Irradiated Foods: any food at a maximum "overall average dose" of 10 kGy 1984 International Consultative Group on Food Irradiation (ICGFI) becomes the successor of IFIP 1998 The European Union's Scientific Committee on Food (SCF) voted in favour of eight categories of irradiation applications 1997 FAO/IAEA/WHO Joint Study Group on High-Dose Irradiation recommends to lift any upper dose limit 1999 The European Union adopts Directives 1999/2/EC (framework Directive) and 1999/3/EC (implementing Directive) limiting irradiation a positive list whose sole content is one of the eight categories approved by the SCF, but allowing the individual states to give clearances for any food previously approved by the SCF. 2000 Germany leads a veto on a measure to provide a final draft for the positive list. 2003 Codex Alimentarius General Standard for Irradiated Foods: no longer any upper dose limit 2003 The SCF adopts a "revised opinion" that recommends against the cancellation of the upper dose limit. 2004 ICGFI ends 2011 The successor to the SCF, European Food Safety Authority (EFSA), reexamines the SCF's list and makes further recommendations for inclusion. See also Deinococcus radiodurans Food labeling regulations Food and cooking hygiene Irradiated mail Chemical sterilization Radurization Notes References Further reading World Health Organization publications: Safety and nutritional adequacy of irradiated food, WHO, Geneva, 1994 High-dose irradiation: Wholesomeness of food irradiated with doses above 10 kGy, WHO, Geneva, 1999, Technical Report Series No. 890 Diehl, J.F., Safety of irradiated foods, Marcel Dekker, N.Y., 1995 (2. ed.) Satin, M., Food irradiation, Technomic, Lancaster, 1996 (2. ed.) Urbain, W.M., Food irradiation, Academic Press, Orlando, 1986 Molins, R. (ed.), Food irradiation – Principles and applications, Wiley Interscience, N.Y., 2001 Sommers, C.H. and Fan, X. (eds.), Food Irradiation Research and Technology, Blackwell Publishing, Ames, IA, 2006 The Food That Would Last Forever : Understanding the Dangers of Food Irradiation, by Gary Gibbs, Garden City Park, N.Y. : Avery Pub. Group, c1993 anon., Food Irradiation: Available Research Indicates That Benefits Outweigh Risks, RCED-00-217, August 24, 2000, Government Accountability Office, United States General Accounting Office, Resources, Community, and Economic Development Division, Washington, D.C. 20548 "Food Irradiation" Farkas, J. and Mohácsi-Farkas, C., History and future of food irradiation, Food Sci. Technol. 22(2011),121-128 Evaluation of the Significance of 2-Dodecylcyclobutanone and other Alkylcyclobutanones External links Codex Alimentarius Codex Alimentarius Recommended International Code of Practice Code for Radiation Processing of Foods (CAC/RCP 19-1979, rev.2 – 2003) General Standard for the Labelling of Prepacked Foods (CODEX STAN 1-1985) Food Irradiation Processing Alliance FIPA represents the irradiation service industry, manufacturers of food irradiators and suppliers of cobalt-60 sources. , Center for Food Safety and Applied Nutrition (US Government) , a series of 14 fact sheets, International Consultative Group on Food Irradiation, International Atomic Energy Agency, Vienna, 1991 Bibliography on Food Irradiation, Federal Research Centre for Nutrition and Food, Karlsruhe, Germany IAEA interactive map of irradiation facilities Food preservation Foodborne illnesses Pasteurized foods Pest control techniques Radiation Radiobiology Intensive farming Environmental controversies Scientific controversies
[ 0.5996792912483215, 0.5084810853004456, -0.319896399974823, -0.021596325561404228, -0.23410376906394958, -0.5907955169677734, 0.18802601099014282, 0.21217948198318481, -0.03009416162967682, -0.5831359028816223, -0.5232459902763367, 0.13254399597644806, -0.4321524202823639, 0.59724301099777...
15378
https://en.wikipedia.org/wiki/Copper%20IUDs
Copper IUDs
Intrauterine device (IUD) with copper, also known as intrauterine coil, is a type of intrauterine device which contains copper. It is used for birth control and emergency contraception within five days of unprotected sex. It is one of the most effective forms of birth control with a one-year failure rate around 0.7%. The device is placed in the uterus and lasts up to twelve years. It may be used by women of all ages regardless of whether or not they have had children. Following removal, fertility quickly returns. Side effects may be heavy menstrual periods, and/or rarely the device may come out. It is less recommended for people at high risk of sexually transmitted infections as it may increase the risk of pelvic inflammatory disease in the first three weeks after insertion. It is recommended for people who don’t tolerate or hardly tolerate hormonal contraceptives. If a woman becomes pregnant with an IUD in place removal is recommended. Very rarely, uterine perforation may occur during insertion if not done properly. The copper IUD is a type of long-acting reversible birth control. It primarily works by killing the sperm. The copper IUD came into medical use in the 1970s. It is on the World Health Organization's List of Essential Medicines. They are used by more than 170 million women globally. Medical uses Copper IUDs are a form of long-acting reversible contraception and are one of the most effective forms of birth control available. The type of frame and amount of copper can affect the effectiveness of different copper IUD models. The failure rates for different models vary between 0.1 and 2.2% after 1 year of use. The T-shaped models with a surface area of 380 mm² of copper have the lowest failure rates. The TCu 380A (ParaGard) has a one-year failure rate of 0.8% and a cumulative 12-year failure rate of 2.2%. Over 12 years of use, the models with less surface area of copper have higher failure rates. The TCu 220A has a 12-year failure rate of 5.8%. The frameless GyneFix has a failure rate of less than 1% per year. Worldwide, older IUD models with lower effectiveness rates are no longer produced. Unlike other forms of reversible contraception, the typical use failure rate and the perfect use failure rate for the copper IUDs are the same because the IUD does not depend on user action. A 2008 review of the available T-shaped copper IUDs recommended that the TCu 380A and the TCu 280S be used as the first choice for copper IUDs because those two models have the lowest failure rates and the longest lifespans. The effectiveness of the copper IUD (failure rate of 0.8%) is comparable to tubal sterilization (failure rate of 0.5%) for the first year. However, the effects of the copper IUD are reversible, which can be viewed as either an advantage or a disadvantage, depending on a person's goals for contraception. Emergency contraception It was first discovered in 1976 that the copper IUD could be used as a form of emergency contraception (EC). The copper IUD is the most effective form of emergency contraception. It is more effective than the hormonal EC pills currently available. The pregnancy rate among those using the copper IUD for EC is 0.09%. It can be used for EC up to five days after the act of unprotected sex and does not decrease in effectiveness during the five days. An additional advantage of using the copper IUD for emergency contraception is that it can be used as a form of birth control for 10–12 years after insertion. Removal and return to fertility Removal of the copper IUD should also be performed by a qualified medical practitioner. Fertility has been shown to return to previous levels quickly after removal of the device. One study found that the median amount of time from removal to planned pregnancy was three months for those women using the TCu 380Ag. Side effects Expulsion: Sometimes, the copper IUD can be spontaneously expelled from the uterus. Expulsion rates can range from 2.2% to 11.4% of users from the first year to the 10th year. The TCu380A may have lower rates of expulsion than other models. Unusual vaginal discharge, cramping or pain, spotting between periods, postcoital (after sex) spotting, dyspareunia, or the absence or lengthening of the strings can be signs of a possible expulsion. If expulsion occurs, the woman is not protected against pregnancy. If an IUD with copper is inserted after an expulsion has occurred, the risk of re-expulsion has been estimated in one study to be approximately one third of cases after one year. Magnetic resonance imaging (MRI) may cause dislocation of a copper IUD, and it is therefore recommended to check the location of the IUD both before and after MRI. Perforation: Very rarely, the IUD can move through the wall of the uterus. Risk of perforation is mostly determined by the skill of the practitioner performing the insertion. For experienced medical practitioners, the risk of perforation is 1 per 1,000 insertions or less. It is recommended to consult an obstetrician/gynecologist, who has the equipment to properly insert the IUD and check that it does not move during the months following insertion. Infection: The insertion of a copper IUD poses a transient risk of pelvic inflammatory disease (PID) in the first 21 days after insertion. However, it is a small risk and is attributable to preexisting gonorrhea or chlamydia infection at the time of insertion, and not to the IUD itself. Proper infection prevention procedures have little or no effect on the course of gonorrhea or chlamydia infections but are important in helping protect both clients and providers from infection in general. Such infection prevention practices include washing hands and then putting on gloves, cleaning the cervix and vagina, making minimal contact with non-sterile surfaces (using a no-touch insertion technique), and, after the procedure, washing hands again and then processing instruments. The device itself carries no increased risk of PID beyond the time of insertion. Cramping: Some women can feel cramping during the IUD insertion process and immediately after as a result of cervix dilation during insertion. Taking NSAIDs before the procedure often reduces discomfort, as the use of a local anaesthetic. Misoprostol 6 to 12 hrs before insertion can help with cervical dilation. Some women may have cramps for 1 to 2 weeks following insertion. Heavier periods: The copper IUD may increase the amount of blood flow during a woman's menstrual periods. On average, menstrual blood loss may increase by 20–50% after insertion of a copper-T IUD; This symptom may clear up for some women after 3 to 6 months. Irregular bleeding and spotting: For some women, the copper IUD may cause spotting between periods during the first 3 to 6 months after insertion. Pregnancy: Although it’s rare, if pregnancy does occur with the copper IUD in place there can be side effects. The risk of ectopic pregnancy to a woman using an IUD is lower than the risk of ectopic pregnancy to a woman using no form of birth control. However, of pregnancies that do occur during IUD use, a higher than expected percentage (3–4%) are ectopic. If pregnancy occurs with the IUD in place there is a higher risk of miscarriage or early delivery. If this occurs and the IUD strings are visible, the IUD should be removed immediately by a clinician. Although the Dalkon Shield IUD was associated with septic abortions (infections associated with miscarriage), other brands of IUD are not. IUDs are also not associated with birth defects. Some barrier contraceptives protect against STIs. Hormonal contraceptives reduce the risk of developing pelvic inflammatory disease (PID), a serious complication of certain STIs. IUDs, by contrast, do not protect against STIs or PID. Copper Toxicity: There exists anecdotal evidence linking copper IUDs to cases of copper toxicity. Contraindications A category 3 condition indicates conditions where the theoretical or proven risks usually outweigh the advantages of inserting a copper IUD. A category 4 condition indicates conditions that represent an unacceptable health risk if a copper IUD is inserted. Women should not use a copper IUD if they: (Category 4) Are pregnant or think they may be pregnant Have certain uterine abnormalities Have malignant gestational trophoblastic disease Have or may have an STI Have or may have had a pelvic infection within the past three months Have pelvic tuberculosis Have unexplained abnormal vaginal bleeding Have untreated cervical cancer Have uterine cancer Having a septic pregnancy or abortion (Category 3) Are postpartum between 48 hours and 4 weeks (increased IUD expulsion rate with delayed postpartum insertion). The CDC and WHO criteria differ in their recommendation for women postpartum between 48 hours and 4 weeks. The CDC does not list this as a contraindication. Have AIDS (unless clinically well on anti-retroviral therapy) Have benign gestational trophoblastic disease Have ovarian cancer Have very high individual likelihood of exposure to gonorrhea or chlamydial STIs A full list of contraindications can be found in the World Health Organization (WHO) Medical Eligibility Criteria for Contraceptive Use and the Centers for Disease Control and Prevention (CDC) United States Medical Eligibility Criteria for Contraceptive Use. Being a nulliparous women (women who have never given birth) is not a contraindication for IUD use. IUDs are safe and acceptable even in young nulliparous women. The same is likely the case for virgin women, unless there is a microperforate hymen that obstructs any insertion of the IUD. Device description There are a number of models of copper IUDs available around the world. Most copper devices consist of a plastic core that is wrapped in a copper wire. Many of the devices have a T-shape similar to the hormonal IUD. However, there are "frameless" copper IUDs available as well.ParaGard is the only model currently available in the United States. At least three copper IUD models are available in Canada, two of which are slimmer T-shape versions used for women who have not had children. Early copper IUDs had copper around only the vertical stem, but more recent models have copper sleeves wrapped around the horizontal arms as well, increasing effectiveness. Some newer models also contain a silver core instead of a plastic core to delay copper fragmentation as well as increase the lifespan of the device. The lifespan of the devices range from 3 years to 10 years; however, some studies have demonstrated that the TCu 380A may be effective through 12 years. Its ATC code is . Insertion The copper IUD must be inserted by a qualified medical practitioner. It is recommended to consult an obstetrician/gynecologist, who has the equipment to properly insert the IUD and check that it does not move during the months following insertion. A copper IUD can be inserted at any phase of the menstrual cycle, but the optimal time is right after the menstrual period when the cervix is softest and the woman is least likely to be pregnant. The insertion process generally takes five minutes or less. The procedure can cause cramping or be painful for some women. Before placement of an IUD, a medical history and physical examination by a medical professional is useful to check for any contraindications or concerns. It is also recommended by some clinicians that patients be tested for gonorrhea and chlamydia, as these two infections increase the risk of contracting pelvic inflammatory disease shortly after insertion. Immediately prior to insertion, the clinician will perform a pelvic exam to determine the position of the uterus. After the pelvic exam, the vagina is held open with a speculum. A tenaculum is used to steady the cervix and uterus. Uterine sounding may be used to measure the length and direction of the cervical canal and uterus in order to decrease the risk of uterine perforation. The IUD is placed using a narrow tube, which is inserted through the cervix into the uterus. Short monofilament plastic/nylon strings hang down from the uterus into the vagina. The clinician will trim the threads so that they only protrude 3 to 4 cm out of the cervix and remain in the upper vagina. The strings allow the patient or clinician to periodically check to ensure the IUD is still in place and to enable easy removal of the device. The copper IUD can be inserted at any time in a woman's menstrual cycle as long as the woman is not pregnant. An IUD can also be inserted immediately postpartum and post-abortion as long as no infection has occurred. Breastfeeding is not a contraindication for the use of the copper IUD. The IUD can be inserted in women with HIV or AIDS as it does not increase the risk of transmission. Although previously not recommended for nulliparous women (women who have not had children), the IUD is now recommended for most women who are past menarche (their first period), including adolescents. After the insertion is finished, normal activities such as sex, exercise, and swimming can be performed as soon as it feels comfortable. Strenuous physical activity does not affect the position of the IUD. Types Many different types of copper IUDs are currently manufactured worldwide, but availability varies by country. In the United States, only one type of copper IUD is approved for use, while in the United Kingdom, over ten varieties are available. One company, Mona Lisa N.V., offers generic versions of many existing IUDs. Frameless IUDs The frameless IUD eliminates the use of the frame that gives conventional IUDs their signature T-shape. This change in design was made to reduce discomfort and expulsion associated with prior IUDs; without a solid frame, the frameless IUD should mold to the shape of the uterus. It may reduce expulsion and discontinuation rates compared to framed copper IUDs. Gynefix is the only frameless IUD brand currently available. It consists of hollow copper tubes on a polypropylene thread. It is inserted through the cervix with a special applicator that sutures the thread to the fundus (top) of the uterus; the thread is then cut with a tail hanging outside of the cervix, similar to frame IUDs. When this tail is pulled, the suture comes undone and the device can be removed. This requires more force than removing a T-shaped IUD but results in comparable discomfort during removal. Gynefix is not approved for use in the United States. Mechanism of action The copper IUD's primary mechanism of action is to prevent fertilization. Copper acts as a spermicide within the uterus. The presence of copper increases the levels of copper ions, prostaglandins, and white blood cells within the uterine and tubal fluids. Although not a primary mechanism of action, some experts in human reproduction believe there is sufficient evidence to suggest that IUDs with copper can disrupt implantation, especially when used for emergency contraception. Despite this, there has been no definitive evidence that IUD users have higher rates of embryonic loss than women not using contraception. Therefore, the copper IUD is considered to be a true contraceptive and not an abortifacient. Usage Globally, the IUD is the most widely used method of reversible birth control. The most recent data indicates that there are 169 million IUD users around the world. This includes both the nonhormonal and hormonal IUDs. IUDs are most popular in Asia, where the prevalence is almost 30%. In Africa and Europe, the prevalence is around 20%. As of 2009, levels of IUD use in the United States are estimated to be 5.5%. Data in the United States does not distinguish between hormonal and non-hormonal IUDs. In Europe, copper IUD prevalence ranges from under 5% in the United Kingdom to over 10% in Denmark in 2006. History According to popular legend, Arab traders inserted small stones into the uteruses of their camels to prevent pregnancy during long desert treks. The story was originally a tall tale to entertain delegates at a scientific conference on family planning; although it was later repeated as truth, it has no known historical basis. Precursors to IUDs were first marketed in 1902. Developed from stem pessaries (where the stem held the pessary in place over the cervix), the 'stem' on these devices actually extended into the uterus itself. Because they occupied both the vagina and the uterus, this type of stem pessary was also known as an intrauterine device. The use of intrauterine devices was associated with high rates of infection; for this reason, they were condemned by the medical community. The first intrauterine device (contained entirely in the uterus) was described in a German publication in 1909, although the author appears to have never marketed his product. In 1929, Ernst Gräfenberg of Germany published a report on an IUD made of silk sutures. He had found a 3% pregnancy rate among 1,100 women using his ring. In 1930, Gräfenberg reported a lower pregnancy rate of 1.6% among 600 women using an improved ring wrapped in silver wire. Unbeknownst to Gräfenberg, the silver wire was contaminated with 26% copper. Copper's role in increasing IUD efficacy would not be recognized until nearly 40 years later. In 1934, Japanese physician Tenrei Ota developed a variation of Gräfenberg's ring that contained a supportive structure in the center. The addition of this central disc lowered the IUD's expulsion rate. These devices still had high rates of infection, and their use and development were further stifled by World War II politics: contraception was forbidden in both Nazi Germany and Axis-allied Japan. The Allies did not learn of the work by Gräfenberg and Ota until well after the war ended. The first plastic IUD, the Margulies Coil or Margulies Spiral, was introduced in 1958. This device was somewhat large, causing discomfort to a large proportion of women users, and had a hard plastic tail, causing discomfort to their male partners. The modern colloquialism "coil" is based on the coil-shaped design of early IUDs. The Lippes Loop, a slightly smaller device with a monofilament tail, was introduced in 1962 and gained in popularity over the Margulies device. The stainless steel single-ring IUD was developed in the 1970s and widely used in China because of low manufacturing costs. The Chinese government banned production of steel IUDs in 1993 due to high failure rates (up to 10% per year). Howard Tatum, in the US, conceived the plastic T-shaped IUD in 1968. Shortly thereafter Jaime Zipper, in Chile, introduced the idea of adding copper to the devices to improve their contraceptive effectiveness. It was found that copper-containing devices could be made in smaller sizes without compromising effectiveness, resulting in fewer side effects such as pain and bleeding. T-shaped devices had lower rates of expulsion due to their greater similarity to the shape of the uterus. The poorly designed Dalkon Shield plastic IUD (which had a multifilament tail) was manufactured by the A. H. Robins Company and sold by Robins in the United States for three and a half years from January 1971 through June 1974, before sales were suspended by Robins on June 28, 1974, at the request of the FDA because of safety concerns following reports of 110 septic spontaneous abortions in women with the Dalkon Shield in place, seven of whom had died. Robins stopped international sales of the Dalkon Shield in April 1975. Tatum developed many different models of the copper IUD. He created the TCu220 C, which had copper collars as opposed to a copper filament, which prevented metal loss and increased the lifespan of the device. Second-generation copper-T IUDs were also introduced in the 1970s. These devices had higher surface areas of copper, and for the first time consistently achieved effectiveness rates of greater than 99%. The last model Tatum developed was the TCu380A, the model that is most recommended today. In addition to T-shaped IUDs, there are also U-shaped IUDs (such as the Multiload) and 7-shaped Gravigard Copper 7 (with a mini version for nulliparous women introduced in the 1980s). More recently, a frameless IUD called Gynefix was introduced. Brands The ParaGard T-380A is an IUD with copper, manufactured and marketed in the United States by The Cooper Companies. It is the only copper-containing intrauterine device approved for use in the U.S. (three hormonal uterine devices, Mirena, Skyla and Liletta are also approved). The ParaGard consists of a T-shaped polyethylene frame wound with copper wire, along with two monofilament threads to aid in the removal of the IUD. The ParaGard T 380A was developed in the 1970s by the Population Council and Finishing Enterprises Inc. (FEI). The Population Council's ParaGard new drug application (NDA) was approved by the U.S. Food and Drug Administration (FDA) and FEI began manufacturing it for distribution outside the United States in 1984. GynoPharma (originally GynoMed) began marketing it in the U.S. in May 1988. On August 2, 1995, Ortho-McNeil acquired GynoPharma and began marketing ParaGard in the U.S. On January 1, 2004, FEI Women's Health acquired the patent from the Population Council and U.S. marketing rights from Ortho-McNeil. On November 10, 2005, Duramed Pharmaceuticals, a subsidiary of Barr Pharmaceuticals, acquired FEI Women's Health and ParaGard. On July 18, 2008, it was announced that Teva Pharmaceutical Industries Ltd. would acquire Barr Pharmaceuticals. On November 1, 2017, The Cooper Companies acquired Paragard from Teva Pharmaceutical Industries for approximately $1.1 billion. The original FDA approval of ParaGard in 1984 was for 4 years continuous use, this was later extended to 6 years in 1989, then 8 years in 1991, then 10 years in 1994. (ATC code ) References External links Association of Reproductive Health Professionals' Clinical Proceedings: New Developments in Intrauterine Contraception World Health Organization essential medicines Wikipedia medicine articles ready to translate
[ 0.4981895685195923, 0.1587551236152649, 0.20203907787799835, 0.5725327134132385, 0.05068057402968407, -0.16606281697750092, -0.25138941407203674, -0.2635560631752014, 0.18121430277824402, -0.4402815103530884, -0.17866608500480652, 0.019860142841935158, -0.21948890388011932, 0.5103241801261...
15379
https://en.wikipedia.org/wiki/Isle%20Royale%20National%20Park
Isle Royale National Park
Isle Royale National Park is an American national park consisting of Isle Royale and more than 400 small adjacent islands, as well as the surrounding waters of Lake Superior, in the state of Michigan. Isle Royale is long and wide, with an area of , making it the fourth-largest lake island in the world. In addition, it is the largest natural island in Lake Superior, the second-largest island in the Great Lakes (after Manitoulin Island), the third-largest in the contiguous United States (after Long Island and Padre Island), and the 33rd-largest island in the United States. Isle Royale National Park was established on April 3, 1940, then additionally protected from development by wilderness area designation in 1976, declared a UNESCO International Biosphere Reserve in 1980, and added to the National Register of Historic Places in 2019 as the Minong Traditional Cultural Property. The park covers , with of land and of surrounding waters. The park's northern boundary lies adjacent to the Canadian Lake Superior National Marine Conservation Area along the international border. With 25,798 visitors in 2018, it is the least-visited national park in the contiguous United States. Geography In 1875, Isle Royale was set off from Keweenaw County, as a separate county, "Isle Royale County". In 1897, the county was dissolved, and the island was reincorporated into Keweenaw County. The highest point on the island is Mount Desor at , or about above lake level. Isle Royale, the largest island in Lake Superior, is over in length and wide at its widest point. The park is made up of Isle Royale itself and approximately 400 smaller islands, along with any submerged lands within of the surrounding islands (16USC408g). Isle Royale is within about from the shore of the Canadian province of Ontario and adjacently, the state of Minnesota (near the city of Thunder Bay), and is from the Michigan shore, on the Keweenaw Peninsula, itself part of Upper Peninsula. There are no roads on the island, and wheeled vehicles or devices, other than wheelchairs, are not permitted. Rock Harbor has wheeled carts available to move personal belongings from the Rock Harbor marina to the cabins and hotel. Also, the National Park Service employs tractors and utility terrain vehicles to move items around the developed areas at Windigo, Rock Harbor, and Mott Island. Topsoil tends to be thin, which favors trees that have horizontal root patterns such as balsam fir, white spruce, and black spruce. Interior lakes Siskiwit Lake is the largest lake on the island. It has cold, clear water which is relatively low in nutrients. Siskiwit Lake contains several islands, including Ryan Island, the largest. Chicken Bone Lake Lake Desor Feldtmann Lake Intermediate Lake (Isle Royale) Lake Ritchie Sargent Lake Climate According to the Köppen climate classification system, Isle Royale National Park has a mild summer Humid continental climate (Dfb). According to the United States Department of Agriculture, the Plant Hardiness zone is 4b at 1178 ft (359 m) elevation with an average annual extreme minimum temperature of -24.2 °F (-31.2 °C). There is no weather station in the park, but the PRISM Climate Group, a project of Oregon State University, provides interpolated data for the island based on the climates of nearby areas. History Prehistory The island was a common hunting ground for native people from nearby Minnesota and Ontario. A canoe voyage of thirteen miles is necessary to reach the island's west end from the mainland. Large quantities of copper artifacts found in indian mounds and settlements, some dating back to 3000 B.C., were most likely mined on Isle Royale and the nearby Keweenaw Peninsula. The island has hundreds of pits and trenches up to 65 feet (20 m) deep from these indigenous peoples, with most in the McCargoe Cove area. Carbon-14 testing of wood remains found in sockets of copper artifacts indicates that they are at least 6500 years old.In Prehistoric Copper Mining in the Lake Superior Region, Drier and Du Temple estimated that over 750,000 tons of copper had been mined from the region. However, David Johnson and Susan Martin contend that their estimate was based on exaggerated and inaccurate assumptions. The Jesuit missionary Dablon published an account in 1669-70 of "an island called Menong, celebrated for its copper." Menong, or Minong, was the native term for the island, and is the basis for Minong Ridge. Prospecting began in earnest when the Chippewas relinquished their claims to the island in 1843, starting with many of the original native pits. This activity had ended by 1855, when no economic deposits were found. The Minong Mine and Island Mine were the result of renewed but short-lived activity from 1873 to 1881. Isle Royale was given to the United States by the 1783 treaty with Great Britain, but the British remained in control until after the War of 1812, and the Ojibwa peoples considered the island to be their territory.  The Ojibwas ceded the island to the U.S. in the 1842 Treaty of La Pointe, with the Grand Portage Band unaware that neither they nor Isle Royale were in British territory. With the clarification to the Ojibwas of the 1842 Webster–Ashburton Treaty that was signed before the Treaty of La Pointe, the Ojibwas re-affirmed the 1842 Treaty of La Pointe in the 1844 Isle Royale Agreement, with the Grand Portage Band signing the agreement as an addendum to the 1842 treaty. In the mid-1840s, a report by Douglass Houghton, Michigan's first state geologist, set off a copper boom in the state, and the first modern copper mines were opened on the island. Evidence of the earlier mining efforts was everywhere, in the form of many stone hammers, some copper artifacts, and places where copper had been partially worked out of the rock but left in place. The ancient pits and trenches led to the discovery of many of the copper deposits that were mined in the 19th century. The remoteness of the island, combined with the small veins of copper, caused most of the 19th-century mines to fail quickly. Between the miners and commercial loggers, much of the island was deforested during the late 19th century. Once the island became a national park in 1940, logging and other exploitive activities ended, and the forest began to regenerate. The island was once the site of several lake trout and whitefish fisheries, as well as a few resorts. The fishing industry has declined considerably, but continues at Edisen Fishery. Today, it has no permanent inhabitants; the small communities of Scandinavian fishermen were removed by the United States National Park Service after the island became a national park in the 1940s. About 12 families still have lifetime leases for their cabins and claim Isle Royale as their heritage, and several descendant fishermen fish the Isle Royale waters commercially. Because numerous small islands surround Isle Royale, ships were once guided through the area by lighthouses at Passage Island, Rock Harbor, Rock of Ages, and Isle Royale Lighthouse on Menagerie Island. The western tip of the island is home to several shipwrecks that are very popular with scuba divers, including the SS America. The NPS Submerged Resources Center mapped the 10 most famous of the shipwrecks contained within the park, and published Shipwrecks of Isle Royale National Park; The Archeological Survey, which gives an overview of the maritime history of the area. The area’s notoriously harsh weather, dramatic underwater topography, the island’s central location on historic shipping routes, and the cold, fresh water have resulted in largely intact, well preserved wrecks throughout the park. In January 2019, the entire island chain was added to the National Register of Historic Places by the federal government. On the Register it is called 'the Minong Traditional Cultural Property.' The Survival of Angelique Mott In 1845, an Ojibwe woman named Angelique and her voyageur husband Charlie Mott were left on Isle Royale, as hires for Cyrus Mendenhall and the Lake Superior Copper Company. They were hired and carried to Isle Royale by Mendenhall's schooner, the "Algonquin", first to scout for copper. Angelique found a large mass of copper ore, upon which she and her husband were hired to stay and guard until a barge could come to retrieve it, promised in no more than 3 months' time. They were dropped off in July and were left stranded there until the following Spring. They were left with minimal provisions, which consisted of a half-barrel of flour, six pounds of butter, and some beans. A supply boat was promised to arrive after the first few weeks, but it was never sent out. Angelique and her husband were left to survive in the wilderness with limited supplies, on an island with scarce resources. They lost their canoe in a fall storm, and their fishing net was destroyed. By January 1846, Charlie went mad with hunger and even threatened to murder and eat Angelique. He returned to himself, loving and soft, but was weakening greatly, and eventually succumbed to his starvation, dying. Angelique was forced to leave the body in the cabin and created a brush shelter for herself to live in. She survived by eating poplar bark, bitter berries, and by pulling out her own hair, plaiting the strands, and creating snares with it, by which she caught rabbits on rare occasions. In the Spring of 1846, the Algonquin returned, and brought Angelique back to her mother. She died in 1874, in Sault Ste. Marie, Ontario. The full events were chronicled in a footnote as told by Angelique, in the first printing of a book called "The Honorable Peter White" by Ralph D. Williams in 1907; Angelique's story was pulled from the subsequent printing, thus making it the only written record survives.Humans haven't normally settled year-round on Isle Royale. For about three thousand years, Native Americans used the land for copper and fish. These native Americans usually limited their visiting to the island in the summer. Americans in the nineteenth century did the same thing. Natural history A number of habitats exist on the island, the primary being boreal forest, similar to neighboring Ontario and Minnesota. Upland areas along some of the ridges are effectively "balds" with exposed bedrock and a few scrubby trees, blueberry bushes, and hardy grasses. Occasional marshes exist, which are typically the by-product of beaver activities. There are also several lakes, often with wooded or marshy shores. The climate, especially in lowland areas, is heavily influenced by the cold waters of Lake Superior. Flora According to the A. W. Kuchler U.S. Potential natural vegetation Types, Isle Royale National Park has a Great Lakes Spruce/Fir (93) potential vegetation type and a Northern Conifer Forest (22) potential vegetation form. The predominant floral habitats of Isle Royale are within the Laurentian Mixed Forest Province. The area is a temperate broadleaf and mixed forests biome transition zone between the true boreal forest to the north and Big Woods to the south, with characteristics of each. It has areas of both broadleaf and conifer forest cover, and bodies of water ranging from conifer bogs to swamps. Conifers include jack pines (Pinus banksiana), black and white spruces (Picea mariana and Picea glauca), balsam firs (Abies balsamea), and eastern redcedars (Juniperus virginiana). Deciduous trees include quaking aspens (Populus tremuloides), red oaks (Quercus rubra), paper birches (Betula papyrifera), American mountain ash (Sorbus americana), red maples (Acer rubrum), sugar maples (Acer saccharum), and mountain maples (Acer spicatum). There are over 600 species of flowering plants found in Isle Royale National Park such as wild sarsaparilla, marsh-marigold, wood lily and prickly wild rose. Fauna Isle Royale National Park is known for its timber wolf and moose populations which are studied by scientists investigating predator-prey relationships in a closed environment. There is a cyclical relationship between the two animals: as the moose increase in population, so do the wolves. Eventually, the wolves kill too many moose and begin to starve and lower their reproductive rates. This is made easier because Isle Royale has been colonized by roughly just one third of the mainland mammal species, because it is so remote. In addition, the environment is unique in that it is the only known place where wolves and moose coexist without the presence of bears. Other common mammals are red foxes, beavers, and red squirrels. Some foxes are quite used to human contact, and can be seen prowling the campgrounds at dawn, looking for stray scraps left by unwary campers. For its part, the wolf is an elusive species which avoids human interaction. Few documented cases of direct wolf/human contact exist. Ermine have been periodically sighted around docks. Other mammals that can be seen include mink (along the various lake shores) and muskrats (occasionally at beaver ponds). Several species of bat also exist on the island. Reptiles include the eastern garter snake, painted turtle, and northern redbelly snake. Six species of frogs and three species of salamander also live on the island. Historically neither moose nor wolves inhabited Isle Royale. Just prior to becoming a national park the large mammals on Isle Royale were Canada lynx and the boreal woodland caribou. Archeological evidence indicates both of these species were present on Isle Royale for 3,500 years prior to being removed by direct human actions (hunting, trapping, mining, logging, fires, competition for resources from exotic species and possibly disease due to the introduction of invasive species). The last caribou documented on Isle Royale was in 1925. Though lynx were removed by the 1930s some have periodically crossed the ice bridge from neighboring Ontario, Canada, the most recent being an individual sighting in 1980. Although lynx are no longer present on the island, their primary prey, snowshoe hares, remain. Before the appearance of wolves, coyotes were also predators on the island. Coyotes appeared around 1905 and disappeared shortly after wolves arrived in the 1950s. Four wolves were brought from Minnesota in 2018. after some debate as to whether or not the introduction was an unnatural intervention. Moose are believed to have colonized Isle Royale sometime between 1905 and 1912. It was initially believed that a small herd of moose (moose typically do not travel in herds) colonized the islands by crossing the ice from the adjacent mainland; later this theory was modified to a herd of moose swimming 20 miles across Lake Superior from the nearest mainland. The improbability of these theories received little scrutiny until recent years. Although no thorough scientific investigation to determine how moose arrived on Isle Royale has been carried out to date, both cultural and genetic evidence indicates they were likely introduced by humans to create a private hunting preserve in the early 1900s. The cultural evidence that moose were trapped in northwestern Minnesota and transported to Isle Royale sounded far fetched to many until decades later when genetic evidence revealed the moose on Isle Royale were more closely related to moose in the far northwestern Minnesota/Manitoba border area than the mainland adjacent to Isle Royale in far northeastern Minnesota bordering Ontario. Further evidence has also shown that the Washington Harbor Club, a group of well-to-do businessmen, owned various buildings on Isle Royale in addition to railroads that ran from Baudette to Duluth and Two Harbors and so had the means to transport moose from northwestern Minnesota to Two Harbors. There are usually around 25 wolves and 1000 moose on the island, but the numbers change greatly year to year. In the 2006-2007 winter, 385 moose were counted, as well as 21 wolves, in three packs. In spring 2008, 23 wolves and approximately 650 moose were counted. However, recent reductions in winter pack ice had ended replenishment of the wolf population from the mainland. Due to genetic inbreeding, the wolf population had declined to two individuals in 2016, causing researchers to expect that the island's wolf population would eventually become extinct. At the same time, the island's moose population had exploded to an estimated 1600. By November 2017, the wolf population was down to one, a female. In December 2016, the National Park Service put forward an initial plan in which they would bring additional wolves to the island in order to prevent the pack from disappearing completely. The decision to relocate 20-30 wolves to the island was approved and from September 2018 to September 2019, 19 wolves were relocated to Isle Royale from various locations in Minnesota, Michigan, and Ontario. As of April 14, 2020, there were an estimated 14 wolves remaining on the island. Geology The island is composed largely of ridges, running roughly southwest-to-northeast. The main ridge, Greenstone Ridge, is over in many places. Greenstone belts are exposed, with rounded stones of chlorastrolite, also known as greenstone, near and in the lake. The two main rock assemblages found on the island include the Portage Lake Volcanics and the Copper Harbor Conglomerate, both Precambrian in age. The volcanics are mainly ophitic flood basalts, some 100 individual flows over an accumulated thickness of at least 10,000 feet. The conglomerate outcrops on the southwestern portion of the island and consists of sedimentary rock derived from volcanic rocks in present-day Minnesota. Glacial erosion accentuated the ridge and valley topography from pre-glacial stream erosion. Glacial striations indicate a generally westward movement of the glaciers as do the recessional moraines west of Lake Desor. Drumlins are found west of Siskiwit Lake. Recent analyses by the USGS of both unmineralized basalt and copper-mineralized rock show that a small amount of naturally occurring mercury is associated with mineralization. Native copper and chlorastrolite, the official state gem of Michigan, are secondary minerals filling pore spaces formed by vesicles and fractures within the volcanic rocks. Prehnite and agate amygdules are also plentiful island gemstones. Recreation Recreational activity on Isle Royale includes hiking, backpacking, fishing, boating, canoeing, kayaking, and observing nature. Wheeled vehicles are not permitted on Isle Royale, such as bicycles or canoe portage devices; however, wheelchairs are allowed. Hiking The island offers approximately of hiking trails for everything from day hikes to a two-week circumnavigation hike. Some of the hiking trails are quite challenging, with steep grades. The Greenstone Ridge is a high ridge in the center of the island and carries the longest trail in the park, the Greenstone Ridge Trail, which runs from one end of the island to the other. This is generally done as a 4 or 5 day hike. A boat shuttle can carry hikers back to their starting point. The trail leads to the peak of Mount Desor, at , the highest point on the island, and passes through northwoods wilderness, and by inland glacial lakes, swamps, bogs and scenic shorelines. In total there are of hiking trails. There are also canoe/kayak routes, many involving portages, along coastal bays and inland lakes. Services The park has two developed areas: Windigo, at the southwest end of the island (docking site for the ferries from Minnesota), with a campstore, showers, campsites, rustic camper cabins for those wanting to sleep off of the ground and a boat dock. Rock Harbor on the south side of the northeast end (docking site for the ferries from Michigan), with a campstore, showers, restaurant, lodge, campsites, and a boat dock. Non-camping sleeping accommodations at the park are limited to the lodge at Rock Harbor and the camper cabins at Windigo. Camping The park has 36 designated wilderness campgrounds. Some campgrounds in the interior are accessible only by trail or by canoe/kayak on the island lakes. Other campgrounds are accessible only by private boat. The campsites vary in capacity but typically include a few three-sided wood shelters (the fourth wall is screened) with floors and roofs, and several individual sites suitable for pitching a small tent. Some tent sites with space for groups of up to 10 are available, and are used for overflow if all the individual sites are filled. The only amenities at the campgrounds are pit toilets, picnic tables, and fire-rings at specific areas. Campfires are not permitted at most campgrounds; gas or alcohol camp stoves are recommended. Drinking and cooking water must be drawn from local water sources (Lake Superior and inland lakes) and filtered, treated, or boiled to avoid parasites. Hunting is not permitted, but fishing is, and edible berries (blueberries, thimbleberries) may be picked from the trail. Access The park is accessible by ferries, floatplanes, and passenger ships during the summer months—from Houghton and Copper Harbor in Michigan and Grand Portage in Minnesota. Private boats travel to the island from the coasts of Michigan, Minnesota, and Ontario. Isle Royale is quite popular with day-trippers in private boats, and day-trip ferry service is provided from Copper Harbor and Grand Portage to and from the park. Isle Royale is the only American national park to entirely close in the winter months, from November 1 through April 15, due to extreme weather conditions and for the safety and protection of visitors. Isle Royale is the least-visited national park in the contiguous United States, due to the winter closing and the distance across Lake Superior to reach the park. The average annual visitation was about 19,000 in the period from 2009 to 2018, with 25,798 visiting in 2018. It is the least visited national park in the lower 48 states. Only three of the most remote Alaskan national parksLake Clark, Kobuk Valley and Gates of the Arcticreceive fewer visitors. Ships Scheduled ferry service operates from Grand Portage, Copper Harbor and Houghton. The Grand Portage ferries reach the island in 1 1/2 hours, and stay 4 hours at the island, allowing time for hiking, a guided hike or program by the park staff, and picnics. The Isle Royale Queen serves park visitors out of Copper Harbor, on the northern Upper Peninsula coast of Michigan. It arrives at Rock Harbor in the park in 3 to 3 1/2 hours, spends 3 1/2 hours before returning to Copper Harbor. The Sea Hunter operates round-trips and offers day trips to the Windigo visitor center through much of the season, and less frequently in early summer and autumn; it will transport kayaks and canoes for visitors wanting to explore the park from the water. It is the fastest ferry serving the island and arrives in 1 1/2 hours, including some sightseeing points along the way out and back. Because of the relatively short boat ride, day visitors are able to get four hours on the island, and get back to the mainland earlier in the afternoon. This gives visitors on a tight schedule time to visit the Grand Portage National Monument or other attractions in the same day. The Ranger III is a ship that serves park visitors from Houghton, Michigan to Rock Harbor. It is operated by the National Park Service, and is said to be the largest piece of equipment in the National Park system. It carries 125 passengers, along with canoes, kayaks, and even small powerboats. It is a six-hour voyage from Houghton to the park. The ship stays overnight at Rock Harbor before returning the next day, making two round trips each week from June to mid-September. Briefly in the 2008 season, the Ranger III carried visitors to and from Windigo. This was not continued after four trips, due to low interest and long crossing times. In 2012, Park Superintendent Phyllis Green required the Ranger III to purify its ballast water. The Voyageur II, out of Grand Portage, crosses up to three times a week, overnighting at Rock Harbor and providing transportation between popular lakeside campgrounds. In the fall season, in addition to carrying campers and hikers, it provides day-trip service to Windigo on weekends. The Voyageur transports kayaks and canoes for visitors wanting to explore the island from the water. The Voyageur II and other boat taxi services ferry hikers to points along the island, allowing a one-way hike back to Rock Harbor or Windigo. Visitors may land at Rock Harbor and depart from Windigo several days later, or vice versa. Hikers frequently ride it in one direction to do a cross-island hike and then get picked up at the other end. See also List of islands in Isle Royale National Park List of fish of Isle Royale National Park List of birds of Isle Royale National Park List of shipwrecks of Isle Royale List of national parks of the United States National Register of Historic Places listings in Isle Royale National Park References Further reading External links of the National Park Service Forest Resources of Isle Royale National Park, United States Department of Agriculture National parks in Michigan Biosphere reserves of the United States Wilderness areas of Michigan Protected areas of Keweenaw County, Michigan Protected areas established in 1940 Lake Superior
[ -0.18913215398788452, 0.29293110966682434, 0.009045214392244816, -0.055630069226026535, 0.9248359799385071, 0.12936945259571075, 0.6901182532310486, 0.21498240530490875, -0.6136874556541443, -0.3780282139778137, -0.47254371643066406, 0.2408227175474167, -0.10269956290721893, 0.067082405090...
15381
https://en.wikipedia.org/wiki/NATO%20Integrated%20Air%20Defense%20System
NATO Integrated Air Defense System
The NATO Integrated Air Defense System (short: NATINADS) is a command and control network combining radars and other facilities spread throughout the NATO alliance's air defence forces. It formed in the mid-1950s and became operational in 1962 as NADGE. It has been constantly upgraded since its formation, notably with the integration of Airborne Early Warning aircraft in the 1970s. The United Kingdom maintained its own network, but was fully integrated with the network since the introduction of the Linesman/Mediator network in the 1970s. Similarly, the German network maintained an independent nature through GEADGE. Development Development was approved by the NATO Military Committee in December 1955. The system was to be based on four air defense regions (ADRs) coordinated by SACEUR (Supreme Allied Commander Europe). Starting from 1956 early warning coverage was extended across Western Europe using 18 radar stations. This part of the system was completed by 1962. Linked to existing national radar sites the coordinated system was called the NATO Air Defence Ground Environment (NADGE). From 1960 NATO countries agreed to place all their air defence forces under the command of SACEUR in the event of war. These forces included command & control (C2) systems, radar installations, and Surface-to-Air (SAM) missile units as well as interceptor aircraft. By 1972 NADGE was converted into NATINADS consisting of 84 radar sites and associated Control Reporting Centers (CRC) and in the 1980s the Airborne Early Warning / Ground Environment Integration Segment (AEGIS) upgraded the NATINADS with the possibility to integrate the AWACS radar picture and all of its information into its visual displays. (NOTE: This AEGIS is not to be confused with the U.S.Navy AEGIS, a shipboard fire control radar and weapons system.) AEGIS processed the information through Hughes H5118ME computers, which replaced the H3118M computers installed at NADGE sites in the late 1960s and early 1970s. NATINADS ability to handle data increased with faster clock rates. The H5118M computer had a staggering 1 megabyte of memory and could handle 1.2 million instructions per second while the former model had a memory of only 256 kilobytes and a clock speed of 150,000 instructions per seconds. NATINADS/AEGIS were complemented, in West Germany by the German Air Defence Ground Environment (GEADGE), an updated radar network adding the southern part of Germany to the European system and Coastal Radar Integration System (CRIS), adding data links from Danish coastal radars. In order to counter the hardware obsolescence, during the mid-1990s NATO started the AEGIS Site Emulator (ASE) program allowing the NATINADS/AEGIS sites to replace the proprietary hardware (the 5118ME computer and the various operator consoles IDM-2, HMD-22, IDM-80) with commercial-off-the-shelf (COTS) servers and workstations. In the first years 2000, the initial ASE capability was expanded with the possibility to run, thanks to the new hardware power, multiple site emulators on the same hardware, so the system was renamed into Multi-AEGIS Site Emulator (MASE). The NATO system designed to replace MASE in the near future is the Air Command and Control System (ACCS). Because of changing politics, NATO expanding and financial crises most European (NATO) countries are trying to cut defence budgets; as a direct result, many obsolete and outdated NATINADS facilities are phased out earlier. As of 2013, operational NATO radar sites in Europe are as follows: Allied Air Command Allied Air Command (AIRCOM) is the central command of all NATO air forces on the European continent. The command is based at Ramstein Air Base in Germany and has two subordinate commands in Germany and Spain. The Royal Canadian Air Force and United States Air Force fall under command of the Canadian/American North American Aerospace Defense Command. Allied Air Command, at Ramstein Air Base, Germany CAOC Torrejón, at Torrejón Air Base, Spain - responsible for the airspace South of the Alps Albania: Air Surveillance Centre, at Tirana International Airport Bulgaria: Air Sovereignty Operations Centre, in Sofia Croatia: Airspace Surveillance Centre, in Podvornica Greece: Air Operations Centre, at Larissa Air Base Italy: Air Operations Centre, in Poggio Renatico Montenegro: Air Surveillance and Reporting Centre, at Podgorica Airport Portugal: Control and Reporting Centre, in Monsanto Romania: Air Operations Center, in Bucharest Slovenia: Airspace Surveillance and Control Centre, in Brnik Spain: Air Operations Centre, in Torrejón Central Command and Control Group, at Torrejón Air Base Northern Command and Control Group, at Zaragoza Air Base Turkey: Control and Reporting Centre, in Ahlatlıbel CAOC Uedem, in Uedem, Germany - responsible for the airspace North of the Alps Baltic Air Surveillance Network - Regional Airspace Surveillance Coordination Centre, in Karmėlava Estonia: Air Operations Control Centre, at Ämari Air Base Latvia: Air Operations Centre, at Lielvārde Air Base Lithuania: Airspace Control Centre, in Karmėlava Belgium: Control and Reporting Centre, at Beauvechain Air Base Czech Republic: Control and Reporting Centre, in Hlavenec Denmark: Control and Reporting Centre, at Karup Air Base France: Control and Reporting Centre, at Mont Verdun Air Base Germany: Air Operations Centre, in Uedem Control and Reporting Centre 2, in Erndtebrück Control and Reporting Centre 3, in Schönewalde Hungary: Air Operations Centre, in Veszprém Iceland: Control and Reporting Centre, at Keflavik Air Base Luxembourg: airspace controlled by Belgium's Control and Reporting Centre, at Beauvechain Air Base Netherlands: Control and Reporting Centre, in Nieuw-Milligen Norway: Control and Reporting Centre, in Sørreisa Poland: Air Operations Centre, in Warsaw-Pyry 22nd Command and Control Centre, in Osówiec 32nd Command and Control Centre, in Balice Slovakia: Air Operations Centre, at Sliač Air Base United Kingdom: Control and Reporting Centre, at RAF Boulmer Radar stations Albania The Albanian Air Force operates Lockheed Martin AN/TPS-77 radars. Belgium The Belgian Air Component's Control and Reporting Centre was based at Glons, where also its main radar was located. The radar was deactivated in 2015 and the Centre moved to Beauvechain Air Base in 2020. The Belgian Control and Reporting Centre reports to CAOC Uedem in Germany and is also responsible for guarding the airspace of Luxembourg. At the new location the Control and Reporting Centre uses digital radar data of the civilian radars of Belgocontrol and the Marconi S-723 radar of the Air Component's Air Traffic Control Centre in Semmerzake. Bulgaria The Bulgarian Air Force's Air Sovereignty Operations Centre is located in Sofia and reports to CAOC Torrejón. The Bulgarian Air Force fields three control and surveillance zones, which operate obsolete Soviet-era radars. The Bulgarian Air Force intends to replace these radars with fewer, but more capable Western 3-D radars as soon as possible. The future locations of the new radars are as of 2018 unknown. Joint Forces Command, in Sofia Air Sovereignty Operational Center (ASOC), in Sofia Base Operative Center (part of 3rd Air Base), Graf Ignatievo Air Base, operational control of fighter aviation Command, Control and Surveillance Base, in Sofia 1st Control and Surveillance Zone, in Bozhurishte, Sofia Province 2nd Control and Surveillance Zone, in Trud, Plovdiv Province 3rd Control and Surveillance Zone, in Bratovo, Burgas Province Canada The Royal Canadian Air Force's control centres and radar stations are part of the Canadian/American North American Aerospace Defense Command. Croatia The Croatian Air Force and Air Defense's Airspace Surveillance Centre is headquartered in Podvornica and reports to CAOC Torrejón. Air Force and Air Defense Command Airspace Surveillance and Control Battalion, at 91st Air Force Base (Zagreb - Pleso) Airspace Surveillance Centre, in Podvornica Sector Operational Centre, in Split Mount Sljeme Radar Post, with AN/FPS-117(E)1T Borinci Radar Post, with AN/FPS-117(E)1T Papuk Radar Post, with AN/FPS-117(E)1T Učka Radar Post, with AN/FPS-117(E)1T Mount Rota, with AN/FPS-117(E)1T Czech Republic The Czech Air Force's Control and Reporting Centre is located in Hlavenec and reports to CAOC Uedem. Air Force Command, in Prague 26th Air Command, Control and Surveillance Regiment, in Stará Boleslav 261st Control and Reporting Centre (CRC), in Hlavenec 262nd Radiotechnical Battalion, in Hlavenec 1st Radiotechnical Company, in Nepolisy, with RAT-31DL 4th Radiotechnical Company, in Sokolnice, with RAT-31DL 263nd Support Battalion, in Hlavenec Reserve Control and Reporting Centre, in Větrušice Denmark The Royal Danish Air Force's Combined Air Operations Centre (CAOC 1) in Finderup was deactivated in 2008 and replaced at the same location by the Combined Air Operations Centre Finderup (CAOC F), which had responsibility for the airspaces of Iceland, Norway, Denmark and the United Kingdom. CAOC F was deactivated in 2013 and its responsibilities were transferred to CAOC Uedem in Germany. The national Danish Control and Reporting Centre is located at Karup Air Base and it reports to CAOC Uedem. The Thule Air Base in Greenland is a United States Air Force installation and its radars are part of the North American Aerospace Defense Command. Air Force Tactical Command, at Karup Air Base Air Control Wing, at Karup Air Base Control and Reporting Centre, at Karup Air Base Radar Station Skagen, in Skagen, with RAT-31DL Radar Station Skrydstrup, at Skrydstrup Air Base, with AN/TPS-77 Radar Station Bornholm, in Almindingen, with Marconi S-723 Estonia The Estonian Air Force's Air Operations Control Centre is located at Ämari Air Base and reports to the Baltic Air Surveillance Network's Regional Airspace Surveillance Coordination Centre (RASCC) in Karmėlava, Lithuania, which in turn reports to CAOC Uedem. Air Force Command, in Tallinn Air Surveillance Wing, at Ämari Air Base Air Operations Control Centre, at Ämari Air Base Engineering and Technical Group, at Ämari Air Base Radar Station, in Levalõpme, with GM 403 Radar Station, in Otepää, with GM 403 Radar Station, in Kellavere, with AN/TPS-77(V) Airport Surveillance Radar at Ämari Air Base, with ASR-8 France The French Air and Space Force's Air Operations Centre is located at Mont Verdun Air Base and reports to CAOC Uedem. Most French radar sites use the PALMIER radar, which is being taken out of service. By 2022 all PALMIER radars will have been replaced with new radar stations using the GM 403 radar. Air Defense and Air Operations Command Air Operations Brigade, at Mont Verdun Air Base Air Operations Centre, at Mont Verdun Air Base Control and Reporting Centre, at Mont-de-Marsan Air Base Control and Reporting Centre, in Cinq-Mars-la-Pile Mont Verdun Air Base radar, with GM GM 406 Élément Air Rattaché (EAR) 943, on Mont Agel, with GM 406 Additionally the French Air and Space Force fields a GM 406 radar at the Cayenne-Rochambeau Air Base in French Guiana to protect the Guiana Space Centre in Kourou. Germany The German Air Force's Combined Air Operations Centre (CAOC 2) in Uedem was deactivated in 2008 and reactivated as CAOC Uedem in 2013. CAOC Uedem is responsible for the NATO airspace North of the Alps. The HADR radars are a variant of the HR-3000 radar, while the RRP-117 radars are a variant of the AN/FPS-117. Air Operations Centre (Zentrum Luftoperationen der Luftwaffe) (NATO CAOC Uedem), in Uedem Control and Reporting Centre 2 (Einsatzführungsbereich 2), in Erndtebrück Operations Squadron 21, in Erndtebrück Operations Support Squadron 22, in Erndtebrück Sensor Platoon I, in Lauda Remote Radar Post 240 "Loneship", in Erndtebrück with GM 406F Remote Radar Post 246 "Hardwheel", on Erbeskopf with HADR Remote Radar Post 247 "Batman", in Lauda with GM 406F Remote Radar Post 248 "Coldtrack", in Freising with GM 406F Remote Radar Post 249 "Sweet Apple", in Meßstetten with HADR Sensor Platoon II, in Auenhausen Remote Radar Post 241 "Crabtree", in Marienbaum with HADR Remote Radar Post 242 "Backwash", in Auenhausen with GM 406F Remote Radar Post 243 "Silver Cork", in Visselhövede with GM 406F Remote Radar Post 244 "Round up", in Brockzetel with HADR Remote Radar Post 245 "Bugle", in Brekendorf with GM 406F Control and Reporting Training Inspection 23, in Erndtebrück Education and Training Centre, in Erndtebrück Education, Test and Training Group, in Erndtebrück Control and Reporting Centre 3 (Einsatzführungsbereich 3), in Schönewalde Operations Squadron 31, in Schönewalde Operations Support Squadron 32, in Schönewalde Sensor Platoon III, in Cölpin Remote Radar Post 351 "Matchpoint", in Putgarten with RRP-117 Remote Radar Post 352 "Mindreader", in Cölpin with RRP-117 Remote Radar Post 353 "Teddy Bear", in Tempelhof with RRP-117 Remote Radar Post 356 "", in Elmenhorst with RRP-117 Sensor Platoon IV, in Regen Remote Radar Post 354 "Blackmoor", in Döbern with RRP-117 Remote Radar Post 355 "Royal Flash", in Gleina with RRP-117 Remote Radar Post 357 "", on Döbraberg with RRP-117 Remote Radar Post 358 "Snow Cap", on Großer Arber with RRP-117 Greece 1st Area Control Centre, inside Mount Chortiatis, with Marconi S-743D 2nd Area Control Centre, inside Mount Parnitha, with Marconi S-743D 9th Control and Warning Station Squadron, on Mount Pelion, with Marconi S-743D 10th Control and Warning Station Squadron, on Mount Chortiatis, with Marconi S-743D The Hellenic Air Force's Combined Air Operations Centre (CAOC 7) at Larissa Air Base was deactivated in 2013 and its responsibilities transferred to the CAOC Torrejón in Spain. The Hellenic Air Force fields two HR-3000, four AR-327 and six Marconi S-743D radar systems, however as of 2018 the air force is in the process of replacing some of its older systems with three RAT-31DL radars. Air Force Tactical Command, at Larissa Air Base Air Operations Centre, at Larissa Air Base 1st Area Control Centre, inside Mount Chortiatis 2nd Area Control Centre, inside Mount Parnitha 1st Control and Warning Station Squadron, in Didymoteicho, with AR-327 2nd Control and Warning Station Squadron, on Mount Ismaros, with HR-3000 3rd Control and Warning Station Squadron, on Mount Vitsi, with Marconi S-743D 4th Control and Warning Station Squadron, on Mount Elati, with RAT-31DL 5th Control and Warning Station Squadron, in Kissamos, with Marconi S-743D 6th Control and Warning Station Squadron, on Mykonos, with AR-327 7th Control and Warning Station Squadron, on Mount Mela, with AR-327 8th Control and Warning Station Squadron, on Lemnos, with AR-327 9th Control and Warning Station Squadron, on Mount Pelion, with Marconi S-743D 10th Control and Warning Station Squadron, on Mount Chortiatis, with Marconi S-743D 11th Control and Warning Station Squadron, in Ziros, with HR-3000 Hungary The Hungarian Air Force's Air Operations Centre is located in Veszprém and reports to CAOC Uedem. There are additional three radar companies with Soviet-era equipment subordinate to the 54th Radar Regiment "Veszprém", however it is unclear if they will remain in service once Hungary's newest radar at Medina reaches full operational capability. Air Force Command, in Budapest Air Operations Centre, in Veszprém 54th Radar Regiment "Veszprém", in Veszprém 1st Radar Data Centre, in Békéscsaba, with RAT-31DL 2nd Radar Data Centre, in Medina, with RAT-31DL 3rd Radar Data Centre, in Bánkút, with RAT-31DL Iceland The Iceland Air Defense System, which is part of the Icelandic Coast Guard, monitors Iceland's airspace. Air Defense is provided by fighter jets from NATO allies, which rotate units for the Icelandic Air Policing mission to Keflavik Air Base. The Iceland Air Defense System's Control and Reporting Centre is at Keflavik Air Base and reports to CAOC Uedem in Germany. Iceland Air Defense System, at Keflavik Air Base Control and Reporting Centre, at Keflavik Air Base H1 Radar Station, at Miðnesheiði, with AN/FPS-117(V)5 H2 Radar Station, on Mount Gunnolfsvík, with AN/FPS-117(V)5 H3 Radar Station, at Stokksnes, with AN/FPS-117(V)5 H4 Radar Station, on Mount Bolafjalli, with AN/FPS-117(V)5 Italy The Italian Air Force's Combined Air Operations Centre (CAOC 5) in Poggio Renatico was deactivated in 2013 and replaced with the Mobile Command and Control Regiment (RMCC) at Bari Air Base, while the Centre's responsibilities were transferred to the CAOC Torrejón in Spain. Air Operations Command (COA), in Poggio Renatico Air Operations Centre, in Poggio Renatico Integrated Missile Air-defense Regiment (Rep. DAMI), in Poggio Renatico 11th Integrated Missile Air-defense Squadron, in Poggio Renatico 22nd Air Force Radar Squadron (GrRAM), in Licola, with AN/FPS-117(V) 112th Remote Radar Station Flight, in Mortara, with RAT-31DL 113th Remote Radar Station Flight, in Lame di Concordia, with RAT-31DL 114th Remote Radar Station Flight, in Potenza Picena, with RAT-31DL 115th Remote Radar Station Flight, in Capo Mele, with RAT-31DL 121st Remote Radar Station Flight, in Poggio Ballone, with AN/FPS-117(V) 123rd Remote Radar Station Flight, in Capo Frasca, with AN/FPS-117(V) 131st Remote Radar Station Flight, in Jacotenente, with RAT-31DL 132nd Remote Radar Station Flight, in Capo Rizzuto, with RAT-31DL 133rd Remote Radar Station Flight, in San Giovanni Teatino, with AN/FPS-117(V) 134th Remote Radar Station Flight, in Lampedusa, with RAT-31DL 135th Remote Radar Station Flight, in Marsala, with RAT-31DL 136th Remote Radar Station Flight, in Otranto, with RAT-31DL 137th Remote Radar Station Flight, in Mezzogregorio, with RAT-31DL Latvia The Latvian Air Force's Air Operations Centre is located at Lielvārde Air Base and reports to the Baltic Air Surveillance Network's Regional Airspace Surveillance Coordination Centre (RASCC) in Karmėlava, Lithuania, which in turn reports to CAOC Uedem. Air Force Headquarters, at Lielvārde Air Base Air Surveillance Squadron, at Lielvārde Air Base Air Operations Centre, at Lielvārde Air Base 1st Radiotechnical (Radar) Post, at Lielvārde Air Base, with AN/TPS-77(V) 2nd Radiotechnical (Radar) Post, in Audriņi, with AN/TPS-77(V) 3rd Radiotechnical (Radar) Post, in Čalas, with AN/TPS-77(V) Mobile Radar Section, with TPS-77 MRR Lithuania The Lithuanian Air Force's Air Operations Control Centre is located in Karmėlava and reports to the Baltic Air Surveillance Network's Regional Airspace Surveillance Coordination Centre (RASCC) co-located in Karmėlava, which in turn reports to CAOC Uedem. Lithuanian Air Force Headquarters, in Kaunas Airspace Surveillance and Control Command, in Kaunas Airspace Control Centre, in Karmėlava 1st Radar Post, in Antaveršis 3rd Radar Post, in Degučiai 4th Radar Post, in Ceikiškės Luxembourg Luxembourg's airspace is monitored and guarded by the Belgian Air Component's Control and Reporting Centre at Beauvechain Air Base. Montenegro The Armed Forces of Montenegro do not possess a modern air defense radar and the country's airspace is monitored by Italian Air Force radar sites. The Armed Forces Air Surveillance and Reporting Centre is located at Podgorica Airport in Golubovci and reports to CAOC Torrejón in Spain. Netherlands The Royal Netherlands Air Force's Air Operations Centre is located at Nieuw-Milligen and reports to CAOC Uedem. The air force's main radars are being replaced with two modern SMART-L GB radars. Air Force Command, in The Hague Air Operations Control Station, in Nieuw-Milligen Control and Reporting Centre, in Nieuw-Milligen Radar Station South, in Nieuw-Milligen, with SMART-L GB Radar Station North, at Wier, with SMART-L GB Norway The Royal Norwegian Air Force's Combined Air Operations Centre (CAOC 3) in Reitan was deactivated in 2008 and its responsibilities were transferred to the Combined Air Operations Centre Finderup (CAOC F). After CAOC F was deactivated in 2013 the responsibility for the air defense of Norway was transferred to CAOC Uedem in Germany and the Royal Norwegian Air Force's Control and Reporting Centre in Sørreisa reports to it. Until 2016 the Royal Norwegian Air Force's radar installations were distributed between two CRCs. That year the CRC Mågerø was disbanded. In its place a wartime mobilization back-up CRC has been formed with a reduction in personnel from the around active 170 duty to about 50 air force home guardsmen. The SINDRE I radars are a variant of the HR-3000 radar, which is also used in the German HADR radars. The newer RAT-31SL/N radars are sometimes designated SINDRE II. Armed Forces Operational Headquarters, Reitan near Bodø Main Air Station 131 Air Wing, in Sørreisa Control and Reporting Centre Sørreisa Radar Station Njunis, with RAT-31SL/N Radar Station Senja, with RAT-31SL/N Radar Station Honningsvåg, with RAT-31SL/N Radar Station Vestvågøy, with SINDRE I Radar Station Vågsøy, with SINDRE I Radar Station Skykula, with SINDRE I Poland The Polish Armed Forces Operational Command's Air Operations Centre is located in the Warsaw-Pyry neighborhood and reports to CAOC Uedem. The 3rd Wrocław Radiotechnical Brigade is responsible for the operation of the Armed Forces radar equipment. As of 2021 the Polish Air Force possesses three NUR-12M and three RAT-31DL long-range radars making up BACKBONE system, which are listed below. Armed Forces Operational Command, in Warsaw Air Operations Centre - Air Component Command, in Warsaw-Pyry Mobile Air Operations Command Unit, in Babki 22nd Command and Control Centre, in Osówiec 32nd Command and Control Centre, at Kraków-Balice Air Base 1st Air Operations Coordination Centre, in Gdynia 2nd Air Operations Coordination Centre, in Kraków 4th Air Operations Coordination Centre, in Szczecin 3rd Wrocław Radiotechnical Brigade, in Wrocław 3rd Sandomierz Radiotechnical Battalion, in Sandomierz 110th Long Range Radiolocating Post, in Łabunie, with RAT-31DL 360th Long Range Radiolocating Post, in Brzoskwinia, with NUR-12M 8th Szczycień Radiotechnical Battalion, in Lipowiec 144th Long Range Radiolocating Post, in Roskosz, with NUR-12M 184th Long Range Radiolocating Post, in Szypliszki, with RAT-31DL 211th Long Range Radiolocating Post, in Chruściel, with RAT-31DL 31st Lower Silesian Radiotechnical Battalion, in Wrocław 170th Long Range Radiolocating Post, in Wronowice, with NUR-12M 34th Chojnice Radiotechnical Battalion, in Chojnice Portugal The Portuguese Air Force's Combined Air Operations Centre (CAOC 10) in Lisbon was deactivated in 2013 and its responsibilities were transferred to CAOC Torrejón in Spain. Air Command, in Lisbon Control and Reporting Centre, in Monsanto Radar Station 1, on Monte Fóia, with HR-3000 Radar Station 2, on Monte Pilar in Paços de Ferreira, with HR-3000 Radar Station 3, at Montejunto, with HR-3000 Radar Station 4, on Pico do Arieiro, on the island of Madeira, with LANZA 3-D Romania The Romanian Air Force's Air Operations Centre is headquartered in Bucharest and reports to CAOC Torrejón. The radar station in Bârnova is officially designated and operated as a civilian radar station, however its data is fed into the military air surveillance system. Air Operations Centre, in Bucharest 2nd Airspace Surveillance Centre "North", at 71st Air Base, in Câmpia Turzii Radar Station, in Ovidiu, with AN/FPS-117(V) Radar Station, at Giarmata Airport, with AN/FPS-117(V) Radar Station, in Suceava, with AN/FPS-117(V) Radar Station, in Craiova, with AN/FPS-117(V) Radar Station, on Muntele Mare, with AN/FPS-117(V) Civil/Military Radar Station, in Bârnova, with AN/FPS-117(V) Slovakia The Slovak Air Force's Air Operations Centre is located at Sliač Air Base and reports to CAOC Uedem. The Slovak Air Force still operates obsolete Soviet-era radars, which it intends to replace with fewer, but more capable Western 3-D radars as soon as possible. The future locations of the new radars are as of 2018 unknown. Air Force Command, at Sliač Air Base Command, Control and Surveillance Wing, at Sliač Air Base Air Operations Centre, at Sliač Air Base Radar Surveillance Battalion, in Sliač Air Base Slovenia The Slovenian Air Force and Air Defense's Airspace Surveillance and Control Centre is headquartered in Brnik and reports to CAOC Torrejón. The Italian Air Force's 4th Wing at Grosseto Air Base and 36th Wing at Gioia del Colle Air Base rotate a QRA flight of Eurofighter Typhoons to Istrana Air Base, which are responsible for the air defense of Northern Italy and Slovenia. Forces Command, in Vrhnika 15th Military Aviation Regiment, at Cerklje ob Krki Air Base 16th Airspace Surveillance and Control Battalion in Brnik Airspace Surveillance and Control Centre, in Brnik 1st Radar Station, in Vrhnika, with GM 403 2nd Radar Station, in Hočko Pohorje, with GM 403 Spain The Spanish Air Force's Combined Air Operations Centre (CAOC 8) at Torrejón Air Base was deactivated in 2013 and replaced at same location by CAOC Torrejon, which took over the functions of CAOC 5, CAOC 7, CAOC 8 and CAOC 10. CAOC Torrejón is responsible for the NATO airspace South of the Alps. Combat Air Command, at Torrejón Air Base Combat Air Command Headquarter (CGMACOM), at Torrejón Air Base Air Operations Centre / NATO CAOC Torrejón Command and Control Systems Headquarter (JSMC), at Torrejón Air Base Central Command and Control Group (GRUCEMAC), at Torrejón Air Base Northern Command and Control Group (GRUNOMAC), at Zaragoza Air Base Mobile Air Control Group (GRUMOCA) at Tablada Air Base 1st Air Surveillance Squadron (EVA 1) radar station, at Air Station El Frasno, with LANZA 3-D 2nd Air Surveillance Squadron (EVA 2) radar station, at Air Station Villatobas, with RAT-31SL/T 3rd Air Surveillance Squadron (EVA 3) radar station, at Air Station Constantina, with LANZA 3-D 4th Air Surveillance Squadron (EVA 4) radar station, at Air Station Roses, with LANZA 3-D 5th Air Surveillance Squadron (EVA 5) radar station, at Air Station Aitana, with RAT-31SL/T 7th Air Surveillance Squadron (EVA 7) radar station, at Air Station Puig Major, with LANZA 3-D 9th Air Surveillance Squadron (EVA 9) radar station, at Air Station Motril, with RAT-31SL/T 10th Air Surveillance Squadron (EVA 10) radar station, at Air Station Barbanza, with LANZA 3-D 11th Air Surveillance Squadron (EVA 11) radar station, at Air Station Alcalá de los Gazules, with LANZA 3-D 12th Air Surveillance Squadron (EVA 12) radar station, at Air Station Espinosa de los Monteros, with RAT-31SL/T 13th Air Surveillance Squadron (EVA 13) radar station, at Air Station Sierra Espuña, with LANZA 3-D 21st Air Surveillance Squadron (EVA 21) radar station, at Vega de San Mateo on Gran Canaria, with LANZA 3-D 22nd Air Surveillance Squadron (EVA 22) radar station, in Haría on Lanzarote, with RAT-31SL/T Turkey The Turkish Air Force's Combined Air Operations Centre (CAOC 6) in Eskisehir was deactivated in 2013 and its responsibilities were transferred to CAOC Torrejón in Spain. Turkey's Air Force fields a mix of HR-3000, AN/FPS-117, RAT-31SL and RAT-31DL radars, however the exact number of each of these radar and their location in the Turkish radar system is unknown. Air Force Command (COA), in Control and Reporting Centre, in Ahlatlıbel Aerial Surveillance Radar Post, in Ahlatlıbel, with Aerial Surveillance Radar Post, in Körfez, with Aerial Surveillance Radar Post, in Karabelen, with Aerial Surveillance Radar Post, in Çanakkale, with Aerial Surveillance Radar Post, in Erzurum, with Aerial Surveillance Radar Post, in Datça, with Aerial Surveillance Radar Post, in İnebolu, with Aerial Surveillance Radar Post, in İskenderun, with Aerial Surveillance Radar Post, in Rize, with United Kingdom The Royal Air Force's Combined Air Operations Centre (CAOC 9) at RAF High Wycombe was deactivated in 2008 and its responsibilities were transferred to the Combined Air Operations Centre Finderup (CAOC F). After CAOC F was deactivated in 2013 the responsibility for the air defense of the United Kingdom was transferred to CAOC Uedem in Germany. The Royal Air Force's Control and Reporting Centres report to it. No. 1 Group RAF, at RAF High Wycombe UK Air Surveillance and Control Systems, at RAF Boulmer Control and Reporting Centre, at RAF Boulmer No. 1 Air Control Centre, at RAF Scampton (National Air Control Centre) RRH Benbecula, in North Uist, with AN/TPS-77 RRH Brizlee Wood, in Shipley, with AN/FPS-117 RRH Buchan, in Boddam, with AN/TPS-77 RRH Portreath, in Portreath, with AR-327 RRH Saxa Vord, in Unst, with AN/TPS-77 RRH Trimingham, in Trimingham, with AN/FPS-117 (satellite station of RRH Neatishead) RRH Staxton Wold, in Scarborough, had an AN/TPS-77 radar, which was moved to RRH Saxa Vord in 2017, future plans for RRH Staxton Wold are as of 2018 unknown. United States The United States Air Force's control centres and radar stations are part of the Canadian/American North American Aerospace Defense Command. Non-NATO European air defense systems Austria Austrian Air Force - GOLDHAUBE system: Command and Control Center "Basisraum", in St Johann im Pongau Kolomansberg Radar Station Großer Speikkogel Radar Station Steinmandl Radar Station Switzerland Swiss Air Force - FLORAKO system: Air Defence & Direction Center, at Dübendorf Air Base Pilatus Radar Station Scopi Radar Station Weisshorn Radar Station Weissfluh Radar Station References Integrated Air Defense System Air defence radar networks
[ 0.08414346724748611, -0.02455723099410534, 0.3046950399875641, -0.05242840573191643, -0.0975235253572464, 0.015726247802376747, 0.3549378216266632, -0.23045329749584198, -0.20040036737918854, -0.46773165464401245, -0.7484330534934998, 0.5140471458435059, -0.38852423429489136, -0.1106250286...
15382
https://en.wikipedia.org/wiki/Invisible%20balance
Invisible balance
The invisible balance or balance of trade on services is that part of the balance of trade that refers to services and other products that do not result in the transfer of physical objects. Examples include consulting services, shipping services, tourism, and patent license revenues. This figure is usually generated by tertiary industry. The term 'invisible balance' is especially common in the United Kingdom. For countries that rely on service exports or on tourism, the invisible balance is particularly important. For instance the United Kingdom and Saudi Arabia receive significant international income from financial services, while Japan and Germany rely more on exports of manufactured goods. Types of invisibles Invisibles are both international payments for services (as opposed to goods), as well as movements of money without exchange for goods or services. These invisibles are called 'transfer payments' or 'remittances' and may include money sent from one country to another by an individual, business, government or non-governmental organisations (NGO) – often charities. An individual remittance may include money sent to a relative overseas. Business transfers may include profits sent by a foreign subsidiary to a parent company or money invested by a business in a foreign country. Bank loans to foreign countries are also included in this category, as are license fees paid for the use of patents and trademarks. Government transfers may involve loans made or official aid given to foreign countries, while transfers made by NGO's include money designated for charitable work within foreign countries, respectively. Balance of payments and invisibles In many countries a useful distinction is drawn between the balance of trade and the balance of payments. 'Balance of trade' refers to the trade of both tangible (physical) objects as well as the trade in services – collectively known as exports and imports (in other words, 'visibles plus services') – while the 'balance of payments' also includes transfers of Capital in the form of loans, investments in shares or direct investment in projects. A nation may have a visibles balance surplus but this can be offset by a larger deficit in the invisibles balance (creating a Balance of Trade deficit overall) – if, for example, there are large payments made to foreign businesses for invisibles such as shipping or tourism. On the other hand, a Visibles Balance deficit can be offset by a strong surplus on the invisibles balance if, for example, foreign aid is being provided. In a similar way, a nation may also have a surplus 'balance of trade' because it exports more than it imports but a negative (or deficit) 'balance of payments' because, it has a much greater shortfall in transfers of capital. And, just as easily, a deficit in the 'balance of trade' may be offset by a larger surplus in capital transfers from overseas to produce a balance of payments surplus overall. Balance of payments problems and the invisible balance Problems with a country's balance of trade (or balance of payments) are often associated with an inappropriate valuation of its currency, its country's foreign exchange rate. If a country's exchange rate is too high, its exports will become uncompetitive as buyers in foreign countries require more of their own currency to pay for them. In the meantime, it also becomes cheaper for the citizens of the country to buy goods from overseas, as opposed to buying locally produced goods), because an overvalued currency makes foreign products less expensive. The simultaneous decline in currency inflows from decreased exports and the rise in outflows, due to increased imports, sends the balance of trade into deficit, which then needs to be paid for by a transfer of funds in some form, either invisible transfers (aid, etc.) or capital flows (loans, etc.). However, relying on funds like that to support a trade deficit, is unsustainable, and the country may eventually require its currency to be devalued. If, on the other hand, a currency is undervalued, its exports will become cheaper and therefore more competitive internationally. At the same time, imports will also become more costly, stimulating the production of domestic substitutes to replace them. That will result in a growth of currency flowing into the country and a decline in currency flowing out of it, resulting in an improvement in the country's balance of trade. Because a nation's exchange rate has a big impact on its 'balance of trade' and its 'balance of payments', many economists favour freely floating exchange rates over the older, fixed (or pegged) rates of foreign currency exchange. Floating exchange rates allow more regular adjustments in exchange rates to occur, allowing the greater opportunity for international payments to maintain equilibrium. Balance of payments International trade
[ 0.3071433901786804, -0.32783883810043335, 0.18278919160366058, 0.4112333059310913, 0.01767309382557869, 0.23497000336647034, -0.1964893490076065, 0.4340585470199585, -0.3409340977668762, -0.4881564676761627, -0.44487693905830383, 0.16471342742443085, -0.5281473994255066, 0.4599973261356354...
15387
https://en.wikipedia.org/wiki/Irreducible%20complexity
Irreducible complexity
Irreducible complexity (IC) is the argument that certain biological systems cannot have evolved by successive small modifications to pre-existing functional systems through natural selection, because no less complex system would function. Irreducible complexity has become central to the creationist concept of intelligent design, but the scientific community regards intelligent design as pseudoscience and rejects the concept of irreducible complexity. Irreducible complexity is one of two main arguments used by intelligent-design proponents, alongside specified complexity. Creation science presented the theological argument from design with assertions that evolution could not explain complex molecular mechanisms, and in 1993 Michael Behe, a professor of biochemistry at Lehigh University, presented these arguments in a revised version of the school textbook Of Pandas and People. In his 1996 book Darwin's Black Box he called this concept irreducible complexity and said it made evolution through natural selection of random mutations impossible. This was based on the mistaken assumption that evolution relies on improvement of existing functions, ignoring how complex adaptations originate from changes in function, and disregarding published research. Evolutionary biologists have published rebuttals showing how systems discussed by Behe can evolve, and examples documented through comparative genomics show that complex molecular systems are formed by the addition of components as revealed by different temporal origins of their proteins. In the 2005 Kitzmiller v. Dover Area School District trial, Behe gave testimony on the subject of irreducible complexity. The court found that "Professor Behe's claim for irreducible complexity has been refuted in peer-reviewed research papers and has been rejected by the scientific community at large." Definitions Michael Behe defined irreducible complexity in natural selection in terms of well-matched parts in his 1996 book Darwin's Black Box: ... a single system which is composed of several well-matched, interacting parts that contribute to the basic function, and where the removal of any one of the parts causes the system to effectively cease functioning. A second definition given by Behe in 2000 (his "evolutionary definition") states: An irreducibly complex evolutionary pathway is one that contains one or more unselected steps (that is, one or more necessary-but-unselected mutations). The degree of irreducible complexity is the number of unselected steps in the pathway. Intelligent-design advocate William A. Dembski assumed an "original function" in his 2002 definition: A system performing a given basic function is irreducibly complex if it includes a set of well-matched, mutually interacting, nonarbitrarily individuated parts such that each part in the set is indispensable to maintaining the system's basic, and therefore original, function. The set of these indispensable parts is known as the irreducible core of the system. History Forerunners The argument from irreducible complexity is a descendant of the teleological argument for God (the argument from design or from complexity). This states that complex functionality in the natural world which looks designed is evidence of an intelligent creator. William Paley famously argued, in his 1802 watchmaker analogy, that complexity in nature implies a God for the same reason that the existence of a watch implies the existence of a watchmaker. This argument has a long history, and one can trace it back at least as far as Cicero's De Natura Deorum ii.34, written in 45 BC. Up to the 18th century Galen (1st and 2nd centuries AD) wrote about the large number of parts of the body and their relationships, which observation was cited as evidence for creation. The idea that the interdependence between parts would have implications for the origins of living things was raised by writers starting with Pierre Gassendi in the mid-17th century and by John Wilkins (1614-1672), who wrote (citing Galen), "Now to imagine, that all these things, according to their several kinds, could be brought into this regular frame and order, to which such an infinite number of Intentions are required, without the contrivance of some wise Agent, must needs be irrational in the highest degree." In the late 17th-century, Thomas Burnet referred to "a multitude of pieces aptly joyn'd" to argue against the eternity of life. In the early 18th century, Nicolas Malebranche wrote "An organized body contains an infinity of parts that mutually depend upon one another in relation to particular ends, all of which must be actually formed in order to work as a whole", arguing in favor of preformation, rather than epigenesis, of the individual; and a similar argument about the origins of the individual was made by other 18th-century students of natural history. In his 1790 book, The Critique of Judgment, Kant is said by Guyer to argue that "we cannot conceive how a whole that comes into being only gradually from its parts can nevertheless be the cause of the properties of those parts". 19th century Chapter XV of Paley's Natural Theology discusses at length what he called "relations" of parts of living things as an indication of their design. Georges Cuvier applied his principle of the correlation of parts to describe an animal from fragmentary remains. For Cuvier, this related to another principle of his, the conditions of existence, which excluded the possibility of transmutation of species. While he did not originate the term, Charles Darwin identified the argument as a possible way to falsify a prediction of the theory of evolution at the outset. In The Origin of Species (1859), he wrote, "If it could be demonstrated that any complex organ existed, which could not possibly have been formed by numerous, successive, slight modifications, my theory would absolutely break down. But I can find out no such case." Darwin's theory of evolution challenges the teleological argument by postulating an alternative explanation to that of an intelligent designer—namely, evolution by natural selection. By showing how simple unintelligent forces can ratchet up designs of extraordinary complexity without invoking outside design, Darwin showed that an intelligent designer was not the necessary conclusion to draw from complexity in nature. The argument from irreducible complexity attempts to demonstrate that certain biological features cannot be purely the product of Darwinian evolution. In the late 19th century, in a dispute between supporters of the adequacy of natural selection and those who held for inheritance of acquired characteristics, one of the arguments made repeatedly by Herbert Spencer, and followed by others, depended on what Spencer referred to as co-adaptation of co-operative parts, as in: "We come now to Professor Weismann's endeavour to disprove my second thesis — that it is impossible to explain by natural selection alone the co-adaptation of co-operative parts. It is thirty years since this was set forth in 'The Principles of Biology.' In §166, I instanced the enormous horns of the extinct Irish elk, and contended that in this and in kindred cases, where for the efficient use of some one enlarged part many other parts have to be simultaneously enlarged, it is out of the question to suppose that they can have all spontaneously varied in the required proportions."One example of a response was in Section III(γ) pages 32-42 of See also Chapter VII, §12(1), pages 237-238 in: Both of these referred to what has become known as the Baldwin effect. An analysis of both sides of the issue is: Darwin responded to Spencer's objections in chapter XXV of The Variation of Animals and Plants Under Domestication (1868). The history of this concept in the dispute has been characterized: "An older and more religious tradition of idealist thinkers were committed to the explanation of complex adaptive contrivances by intelligent design. ... Another line of thinkers, unified by the recurrent publications of Herbert Spencer, also saw co-adaptation as a composed, irreducible whole, but sought to explain it by the inheritance of acquired characteristics." St. George Jackson Mivart raised the objection to natural selection that "Complex and simultaneous co-ordinations ... until so far developed as to effect the requisite junctions, are useless" which "amounts to the concept of 'irreducible complexity' as defined by ... Michael Behe". 20th century Hermann Muller, in the early 20th century, discussed a concept similar to irreducible complexity. However, far from seeing this as a problem for evolution, he described the "interlocking" of biological features as a consequence to be expected of evolution, which would lead to irreversibility of some evolutionary changes. He wrote, "Being thus finally woven, as it were, into the most intimate fabric of the organism, the once novel character can no longer be withdrawn with impunity, and may have become vitally necessary." In 1974 the young Earth creationist Henry M. Morris introduced a similar concept in his book Scientific Creationism, in which he wrote; "This issue can actually be attacked quantitatively, using simple principles of mathematical probability. The problem is simply whether a complex system, in which many components function unitedly together, and in which each component is uniquely necessary to the efficient functioning of the whole, could ever arise by random processes." In 1975 Thomas H. Frazzetta published a book-length study of a concept similar to irreducible complexity, explained by gradual, step-wise, non-teleological evolution. Frazzetta wrote: "A complex adaptation is one constructed of several components that must blend together operationally to make the adaptation 'work'. It is analogous to a machine whose performance depends upon careful cooperation among its parts. In the case of the machine, no single part can greatly be altered without changing the performance of the entire machine." The machine that he chose as an analog is the Peaucellier–Lipkin linkage, and one biological system given extended description was the jaw apparatus of a python. The conclusion of this investigation, rather than that evolution of a complex adaptation was impossible, "awed by the adaptations of living things, to be stunned by their complexity and suitability", was "to accept the inescapable but not humiliating fact that much of mankind can be seen in a tree or a lizard." In 1981, Ariel Roth, in defense of the creation-science position in the trial McLean v. Arkansas, said of "complex integrated structures": "This system would not be functional until all the parts were there ... How did these parts survive during evolution ...?" In 1985 Cairns-Smith wrote of "interlocking": "How can a complex collaboration between components evolve in small steps?" and used the analogy of the scaffolding called centering - used to build an arch then removed afterwards: "Surely there was 'scaffolding'. Before the multitudinous components of present biochemistry could come to lean together they had to lean on something else." However, neither Muller or Cairns-Smith claimed their ideas as evidence of something supernatural. An essay in support of creationism published in 1994 referred to bacterial flagella as showing "multiple, integrated components", where "nothing about them works unless every one of their complexly fashioned and integrated components are in place". The author asked the reader to "imagine the effects of natural selection on those organisms that fortuitously evolved the flagella ... without the concommitant control mechanisms". An early concept of irreducibly complex systems comes from Ludwig von Bertalanffy (1901-1972), an Austrian biologist. He believed that complex systems must be examined as complete, irreducible systems in order to fully understand how they work. He extended his work on biological complexity into a general theory of systems in a book titled General Systems Theory. After James Watson and Francis Crick published the structure of DNA in the early 1950s, General Systems Theory lost many of its adherents in the physical and biological sciences. However, systems theory remained popular in the social sciences long after its demise in the physical and biological sciences. Origins Michael Behe developed his ideas on the concept around 1992, in the early days of the 'wedge movement', and first presented his ideas about "irreducible complexity" in June 1993 when the "Johnson-Behe cadre of scholars" met at Pajaro Dunes in California. He set out his ideas in the second edition of Of Pandas and People published in 1993, extensively revising Chapter 6 Biochemical Similarities with new sections on the complex mechanism of blood clotting and on the origin of proteins. He first used the term "irreducible complexity" in his 1996 book Darwin's Black Box, to refer to certain complex biochemical cellular systems. He posits that evolutionary mechanisms cannot explain the development of such "irreducibly complex" systems. Notably, Behe credits philosopher William Paley for the original concept (alone among the predecessors) and suggests that his application of the concept to biological systems is entirely original. Intelligent design advocates argue that irreducibly complex systems must have been deliberately engineered by some form of intelligence. In 2001, Michael Behe wrote: "[T]here is an asymmetry between my current definition of irreducible complexity and the task facing natural selection. I hope to repair this defect in future work." Behe specifically explained that the "current definition puts the focus on removing a part from an already functioning system", but the "difficult task facing Darwinian evolution, however, would not be to remove parts from sophisticated pre-existing systems; it would be to bring together components to make a new system in the first place". In the 2005 Kitzmiller v. Dover Area School District trial, Behe testified under oath that he "did not judge [the asymmetry] serious enough to [have revised the book] yet." Behe additionally testified that the presence of irreducible complexity in organisms would not rule out the involvement of evolutionary mechanisms in the development of organic life. He further testified that he knew of no earlier "peer reviewed articles in scientific journals discussing the intelligent design of the blood clotting cascade," but that there were "probably a large number of peer reviewed articles in science journals that demonstrate that the blood clotting system is indeed a purposeful arrangement of parts of great complexity and sophistication." (The judge ruled that "intelligent design is not science and is essentially religious in nature".) According to the theory of evolution, genetic variations occur without specific design or intent. The environment "selects" the variants that have the highest fitness, which are then passed on to the next generation of organisms. Change occurs by the gradual operation of natural forces over time, perhaps slowly, perhaps more quickly (see punctuated equilibrium). This process is able to adapt complex structures from simpler beginnings, or convert complex structures from one function to another (see spandrel). Most intelligent design advocates accept that evolution occurs through mutation and natural selection at the "micro level", such as changing the relative frequency of various beak lengths in finches, but assert that it cannot account for irreducible complexity, because none of the parts of an irreducible system would be functional or advantageous until the entire system is in place. The mousetrap example Behe uses the mousetrap as an illustrative example of this concept. A mousetrap consists of five interacting pieces: the base, the catch, the spring, the hammer, and the hold-down bar. All of these must be in place for the mousetrap to work, as the removal of any one piece destroys the function of the mousetrap. Likewise, he asserts that biological systems require multiple parts working together in order to function. Intelligent design advocates claim that natural selection could not create from scratch those systems for which science is currently unable to find a viable evolutionary pathway of successive, slight modifications, because the selectable function is only present when all parts are assembled. In his 2008 book Only A Theory, biologist Kenneth R. Miller challenges Behe's claim that the mousetrap is irreducibly complex. Miller observes that various subsets of the five components can be devised to form cooperative units, ones that have different functions from the mousetrap and so, in biological terms, could form functional spandrels before being adapted to the new function of catching mice. In an example taken from his high school experience, Miller recalls that one of his classmates...struck upon the brilliant idea of using an old, broken mousetrap as a spitball catapult, and it worked brilliantly.... It had worked perfectly as something other than a mousetrap.... my rowdy friend had pulled a couple of parts --probably the hold-down bar and catch-- off the trap to make it easier to conceal and more effective as a catapult... [leaving] the base, the spring, and the hammer. Not much of a mousetrap, but a helluva spitball launcher.... I realized why [Behe's] mousetrap analogy had bothered me. It was wrong. The mousetrap is not irreducibly complex after all. Other systems identified by Miller that include mousetrap components include the following: use the spitball launcher as a tie clip (same three-part system with different function) remove the spring from the spitball launcher/tie clip to create a two-part key chain (base + hammer) glue the spitball launcher/tie clip to a sheet of wood to create a clipboard (launcher + glue + wood) remove the hold-down bar for use as a toothpick (single element system) The point of the reduction is that—in biology—most or all of the components were already at hand, by the time it became necessary to build a mousetrap. As such, it required far fewer steps to develop a mousetrap than to design all the components from scratch. Thus, the development of the mousetrap, said to consist of five different parts which had no function on their own, has been reduced to one step: the assembly from parts that are already present, performing other functions. Consequences Supporters of intelligent design argue that anything less than the complete form of such a system or organ would not work at all, or would in fact be a detriment to the organism, and would therefore never survive the process of natural selection. Although they accept that some complex systems and organs can be explained by evolution, they claim that organs and biological features which are irreducibly complex cannot be explained by current models, and that an intelligent designer must have created life or guided its evolution. Accordingly, the debate on irreducible complexity concerns two questions: whether irreducible complexity can be found in nature, and what significance it would have if it did exist in nature. Behe's original examples of irreducibly complex mechanisms included the bacterial flagellum of E. coli, the blood clotting cascade, cilia, and the adaptive immune system. Behe argues that organs and biological features which are irreducibly complex cannot be wholly explained by current models of evolution. In explicating his definition of "irreducible complexity" he notes that: An irreducibly complex system cannot be produced directly (that is, by continuously improving the initial function, which continues to work by the same mechanism) by slight, successive modifications of a precursor system, because any precursor to an irreducibly complex system that is missing a part is by definition nonfunctional. Irreducible complexity is not an argument that evolution does not occur, but rather an argument that it is "incomplete". In the last chapter of Darwin's Black Box, Behe goes on to explain his view that irreducible complexity is evidence for intelligent design. Mainstream critics, however, argue that irreducible complexity, as defined by Behe, can be generated by known evolutionary mechanisms. Behe's claim that no scientific literature adequately modeled the origins of biochemical systems through evolutionary mechanisms has been challenged by TalkOrigins. The judge in the Dover trial wrote "By defining irreducible complexity in the way that he has, Professor Behe attempts to exclude the phenomenon of exaptation by definitional fiat, ignoring as he does so abundant evidence which refutes his argument. Notably, the NAS has rejected Professor Behe's claim for irreducible complexity..." Stated examples Behe and others have suggested a number of biological features that they believed to be irreducibly complex. Blood clotting cascade The process of blood clotting or coagulation cascade in vertebrates is a complex biological pathway which is given as an example of apparent irreducible complexity. The irreducible complexity argument assumes that the necessary parts of a system have always been necessary, and therefore could not have been added sequentially. However, in evolution, something which is at first merely advantageous can later become necessary. Natural selection can lead to complex biochemical systems being built up from simpler systems, or to existing functional systems being recombined as a new system with a different function. For example, one of the clotting factors that Behe listed as a part of the clotting cascade (Factor XII, also called Hageman factor) was later found to be absent in whales, demonstrating that it is not essential for a clotting system. Many purportedly irreducible structures can be found in other organisms as much simpler systems that utilize fewer parts. These systems, in turn, may have had even simpler precursors that are now extinct. Behe has responded to critics of his clotting cascade arguments by suggesting that homology is evidence for evolution, but not for natural selection. The "improbability argument" also misrepresents natural selection. It is correct to say that a set of simultaneous mutations that form a complex protein structure is so unlikely as to be unfeasible, but that is not what Darwin advocated. His explanation is based on small accumulated changes that take place without a final goal. Each step must be advantageous in its own right, although biologists may not yet understand the reason behind all of them—for example, jawless fish accomplish blood clotting with just six proteins instead of the full ten. Eye The eye is frequently cited by intelligent design and creationism advocates as a purported example of irreducible complexity. Behe used the "development of the eye problem" as evidence for intelligent design in Darwin's Black Box. Although Behe acknowledged that the evolution of the larger anatomical features of the eye have been well-explained, he pointed out that the complexity of the minute biochemical reactions required at a molecular level for light sensitivity still defies explanation. Creationist Jonathan Sarfati has described the eye as evolutionary biologists' "greatest challenge as an example of superb 'irreducible complexity' in God's creation", specifically pointing to the supposed "vast complexity" required for transparency. In an often misquoted passage from On the Origin of Species, Charles Darwin appears to acknowledge the eye's development as a difficulty for his theory. However, the quote in context shows that Darwin actually had a very good understanding of the evolution of the eye (see fallacy of quoting out of context). He notes that "to suppose that the eye ... could have been formed by natural selection, seems, I freely confess, absurd in the highest possible degree". Yet this observation was merely a rhetorical device for Darwin. He goes on to explain that if gradual evolution of the eye could be shown to be possible, "the difficulty of believing that a perfect and complex eye could be formed by natural selection ... can hardly be considered real". He then proceeded to roughly map out a likely course for evolution using examples of gradually more complex eyes of various species. Since Darwin's day, the eye's ancestry has become much better understood. Although learning about the construction of ancient eyes through fossil evidence is problematic due to the soft tissues leaving no imprint or remains, genetic and comparative anatomical evidence has increasingly supported the idea of a common ancestry for all eyes. Current evidence does suggest possible evolutionary lineages for the origins of the anatomical features of the eye. One likely chain of development is that the eyes originated as simple patches of photoreceptor cells that could detect the presence or absence of light, but not its direction. When, via random mutation across the population, the photosensitive cells happened to have developed on a small depression, it endowed the organism with a better sense of the light's source. This small change gave the organism an advantage over those without the mutation. This genetic trait would then be "selected for" as those with the trait would have an increased chance of survival, and therefore progeny, over those without the trait. Individuals with deeper depressions would be able to discern changes in light over a wider field than those individuals with shallower depressions. As ever deeper depressions were advantageous to the organism, gradually, this depression would become a pit into which light would strike certain cells depending on its angle. The organism slowly gained increasingly precise visual information. And again, this gradual process continued as individuals having a slightly shrunken aperture of the eye had an advantage over those without the mutation as an aperture increases how collimated the light is at any one specific group of photoreceptors. As this trait developed, the eye became effectively a pinhole camera which allowed the organism to dimly make out shapes—the nautilus is a modern example of an animal with such an eye. Finally, via this same selection process, a protective layer of transparent cells over the aperture was differentiated into a crude lens, and the interior of the eye was filled with humours to assist in focusing images. In this way, eyes are recognized by modern biologists as actually a relatively unambiguous and simple structure to evolve, and many of the major developments of the eye's evolution are believed to have taken place over only a few million years, during the Cambrian explosion. Behe asserts that this is only an explanation of the gross anatomical steps, however, and not an explanation of the changes in discrete biochemical systems that would have needed to take place. Behe maintains that the complexity of light sensitivity at the molecular level and the minute biochemical reactions required for those first "simple patches of photoreceptor[s]" still defies explanation, and that the proposed series of infinitesimal steps to get from patches of photoreceptors to a fully functional eye would actually be considered great, complex leaps in evolution if viewed on the molecular scale. Other intelligent design proponents claim that the evolution of the entire visual system would be difficult rather than the eye alone. Flagella The flagella of certain bacteria constitute a molecular motor requiring the interaction of about 40 different protein parts. Behe presents this as a prime example of an irreducibly complex structure defined as "a single system composed of several well-matched, interacting parts that contribute to the basic function, wherein the removal of any one of the parts causes the system to effectively cease functioning", and argues that since "an irreducibly complex system that is missing a part is by definition nonfunctional", it could not have evolved gradually through natural selection. Reducible complexity. In contrast to Behe's claims, many proteins can be deleted or mutated and the flagellum still works, even though sometimes at reduced efficiency. In fact, the composition of flagella is surprisingly diverse across bacteria with many proteins only found in some species but not others. Hence the flagellar apparatus is clearly very flexible in evolutionary terms and perfectly able to lose or gain protein components. Further studies have shown that, contrary to claims of "irreducible complexity", flagella and the type-III secretion system share several components which provides strong evidence of a shared evolutionary history (see below). In fact, this example shows how a complex system can evolve from simpler components. Multiple processes were involved in the evolution of the flagellum, including horizontal gene transfer. Evolution from type three secretion systems. The basal body of the flagella has been found to be similar to the Type III secretion system (TTSS), a needle-like structure that pathogenic germs such as Salmonella and Yersinia pestis use to inject toxins into living eucaryote cells. The needle's base has ten elements in common with the flagellum, but it is missing forty of the proteins that make a flagellum work. The TTSS system negates Behe's claim that taking away any one of the flagellum's parts would prevent the system from functioning. On this basis, Kenneth Miller notes that, "The parts of this supposedly irreducibly complex system actually have functions of their own." Studies have also shown that similar parts of the flagellum in different bacterial species can have different functions despite showing evidence of common descent, and that certain parts of the flagellum can be removed without completely eliminating its functionality. Dembski has argued that phylogenetically, the TTSS is found in a narrow range of bacteria which makes it seem to him to be a late innovation, whereas flagella are widespread throughout many bacterial groups, and he argues that it was an early innovation. Against Dembski's argument, different flagella use completely different mechanisms, and publications show a plausible path in which bacterial flagella could have evolved from a secretion system. Cilium motion The cilium construction of axoneme microtubules movement by the sliding of dynein protein was cited by Behe as an example of irreducible complexity. He further said that the advances in knowledge in the subsequent 10 years had shown that the complexity of intraflagellar transport for two hundred components cilium and many other cellular structures is substantially greater than was known earlier. Bombardier beetle's defense mechanism The bombardier beetle is able to defend itself by directing a spray of hot fluid at an attacker. The mechanism involves a system for mixing hydroquinones and hydrogen peroxide, which react violently to attain a temperature near boiling point, and in some species a nozzle which allows the spray to be directed accurately in any direction. The unique combination of features of the bombardier beetle's defense mechanism—strongly exothermic reactions, boiling-hot fluids, and explosive release—have been claimed by creationists and proponents of intelligent design to be examples of irreducible complexity. Biologists such as the taxonomist Mark Isaak note however that step-by-step evolution of the mechanism could readily have occurred. In particular, quinones are precursors to sclerotin, used to harden the skeleton of many insects, while peroxide is a common by-product of metabolism. Response of the scientific community Like intelligent design, the concept it seeks to support, irreducible complexity has failed to gain any notable acceptance within the scientific community. Reducibility of "irreducible" systems Researchers have proposed potentially viable evolutionary pathways for allegedly irreducibly complex systems such as blood clotting, the immune system and the flagellum—the three examples Behe proposed. John H. McDonald even showed his example of a mousetrap to be reducible. If irreducible complexity is an insurmountable obstacle to evolution, it should not be possible to conceive of such pathways. Niall Shanks and Karl H. Joplin, both of East Tennessee State University, have shown that systems satisfying Behe's characterization of irreducible biochemical complexity can arise naturally and spontaneously as the result of self-organizing chemical processes. They also assert that what evolved biochemical and molecular systems actually exhibit is "redundant complexity"—a kind of complexity that is the product of an evolved biochemical process. They claim that Behe overestimated the significance of irreducible complexity because of his simple, linear view of biochemical reactions, resulting in his taking snapshots of selective features of biological systems, structures, and processes, while ignoring the redundant complexity of the context in which those features are naturally embedded. They also criticized his over-reliance of overly simplistic metaphors, such as his mousetrap. A computer model of the co-evolution of proteins binding to DNA in the peer-reviewed journal Nucleic Acids Research consisted of several parts (DNA binders and DNA binding sites) which contribute to the basic function; removal of either one leads immediately to the death of the organism. This model fits the definition of irreducible complexity exactly, yet it evolves. (The program can be run from Ev program.) In addition, research published in the peer-reviewed journal Nature has shown that computer simulations of evolution demonstrate that it is possible for complex features to evolve naturally. One can compare a mousetrap with a cat in this context. Both normally function so as to control the mouse population. The cat has many parts that can be removed leaving it still functional; for example, its tail can be bobbed, or it can lose an ear in a fight. Comparing the cat and the mousetrap, then, one sees that the mousetrap (which is not alive) offers better evidence, in terms of irreducible complexity, for intelligent design than the cat. Even looking at the mousetrap analogy, several critics have described ways in which the parts of the mousetrap could have independent uses or could develop in stages, demonstrating that it is not irreducibly complex. Moreover, even cases where removing a certain component in an organic system will cause the system to fail do not demonstrate that the system could not have been formed in a step-by-step, evolutionary process. By analogy, stone arches are irreducibly complex—if you remove any stone the arch will collapse—yet humans build them easily enough, one stone at a time, by building over centering that is removed afterward. Similarly, naturally occurring arches of stone form by the weathering away of bits of stone from a large concretion that has formed previously. Evolution can act to simplify as well as to complicate. This raises the possibility that seemingly irreducibly complex biological features may have been achieved with a period of increasing complexity, followed by a period of simplification. A team led by Joseph Thornton, assistant professor of biology at the University of Oregon's Center for Ecology and Evolutionary Biology, using techniques for resurrecting ancient genes, reconstructed the evolution of an apparently irreducibly complex molecular system. The April 7, 2006 issue of Science published this research. Irreducible complexity may not actually exist in nature, and the examples given by Behe and others may not in fact represent irreducible complexity, but can be explained in terms of simpler precursors. The theory of facilitated variation challenges irreducible complexity. Marc W. Kirschner, a professor and chair of Department of Systems Biology at Harvard Medical School, and John C. Gerhart, a professor in Molecular and Cell Biology, University of California, Berkeley, presented this theory in 2005. They describe how certain mutation and changes can cause apparent irreducible complexity. Thus, seemingly irreducibly complex structures are merely "very complex", or they are simply misunderstood or misrepresented. Gradual adaptation to new functions The precursors of complex systems, when they are not useful in themselves, may be useful to perform other, unrelated functions. Evolutionary biologists argue that evolution often works in this kind of blind, haphazard manner in which the function of an early form is not necessarily the same as the function of the later form. The term used for this process is exaptation. The mammalian middle ear (derived from a jawbone) and the panda's thumb (derived from a wrist bone spur) provide classic examples. A 2006 article in Nature demonstrates intermediate states leading toward the development of the ear in a Devonian fish (about 360 million years ago). Furthermore, recent research shows that viruses play a heretofore unexpected role in evolution by mixing and matching genes from various hosts. Arguments for irreducibility often assume that things started out the same way they ended up—as we see them now. However, that may not necessarily be the case. In the Dover trial an expert witness for the plaintiffs, Ken Miller, demonstrated this possibility using Behe's mousetrap analogy. By removing several parts, Miller made the object unusable as a mousetrap, but he pointed out that it was now a perfectly functional, if unstylish, tie clip. Methods by which irreducible complexity may evolve Irreducible complexity can be seen as equivalent to an "uncrossable valley" in a fitness landscape. A number of mathematical models of evolution have explored the circumstances under which such valleys can, nevertheless, be crossed. Falsifiability and experimental evidence Some critics, such as Jerry Coyne (professor of evolutionary biology at the University of Chicago) and Eugenie Scott (a physical anthropologist and former executive director of the National Center for Science Education) have argued that the concept of irreducible complexity and, more generally, intelligent design is not falsifiable and, therefore, not scientific. Behe argues that the theory that irreducibly complex systems could not have evolved can be falsified by an experiment where such systems are evolved. For example, he posits taking bacteria with no flagellum and imposing a selective pressure for mobility. If, after a few thousand generations, the bacteria evolved the bacterial flagellum, then Behe believes that this would refute his theory. Other critics take a different approach, pointing to experimental evidence that they consider falsification of the argument for intelligent design from irreducible complexity. For example, Kenneth Miller describes the lab work of Barry G. Hall on E. coli as showing that "Behe is wrong". Other evidence that irreducible complexity is not a problem for evolution comes from the field of computer science, which routinely uses computer analogues of the processes of evolution in order to automatically design complex solutions to problems. The results of such genetic algorithms are frequently irreducibly complex since the process, like evolution, both removes non-essential components over time as well as adding new components. The removal of unused components with no essential function, like the natural process where rock underneath a natural arch is removed, can produce irreducibly complex structures without requiring the intervention of a designer. Researchers applying these algorithms automatically produce human-competitive designs—but no human designer is required. Argument from ignorance Intelligent design proponents attribute to an intelligent designer those biological structures they believe are irreducibly complex and therefore they say a natural explanation is insufficient to account for them. However, critics view irreducible complexity as a special case of the "complexity indicates design" claim, and thus see it as an argument from ignorance and as a God-of-the-gaps argument. Eugenie Scott and Glenn Branch of the National Center for Science Education note that intelligent design arguments from irreducible complexity rest on the false assumption that a lack of knowledge of a natural explanation allows intelligent design proponents to assume an intelligent cause, when the proper response of scientists would be to say that we don't know, and further investigation is needed. Other critics describe Behe as saying that evolutionary explanations are not detailed enough to meet his standards, while at the same time presenting intelligent design as exempt from having to provide any positive evidence at all. False dilemma Irreducible complexity is at its core an argument against evolution. If truly irreducible systems are found, the argument goes, then intelligent design must be the correct explanation for their existence. However, this conclusion is based on the assumption that current evolutionary theory and intelligent design are the only two valid models to explain life, a false dilemma. In the Dover trial While testifying during the 2005 Kitzmiller v. Dover Area School District trial, Behe conceded that there are no peer-reviewed papers supporting his claims that complex molecular systems, like the bacterial flagellum, the blood-clotting cascade, and the immune system, were intelligently designed nor are there any peer-reviewed articles supporting his argument that certain complex molecular structures are "irreducibly complex." In the final ruling of Kitzmiller v. Dover Area School District, Judge Jones specifically singled out Behe and irreducible complexity: "Professor Behe admitted in "Reply to My Critics" that there was a defect in his view of irreducible complexity because, while it purports to be a challenge to natural selection, it does not actually address "the task facing natural selection." and that "Professor Behe wrote that he hoped to "repair this defect in future work..." (Page 73) "As expert testimony revealed, the qualification on what is meant by "irreducible complexity" renders it meaningless as a criticism of evolution. (3:40 (Miller)). In fact, the theory of evolution proffers exaptation as a well-recognized, well-documented explanation for how systems with multiple parts could have evolved through natural means." (Page 74) "By defining irreducible complexity in the way that he has, Professor Behe attempts to exclude the phenomenon of exaptation by definitional fiat, ignoring as he does so abundant evidence which refutes his argument. Notably, the NAS has rejected Professor Behe's claim for irreducible complexity..." (Page 75) "As irreducible complexity is only a negative argument against evolution, it is refutable and accordingly testable, unlike ID [Intelligent Design], by showing that there are intermediate structures with selectable functions that could have evolved into the allegedly irreducibly complex systems. (2:15–16 (Miller)). Importantly, however, the fact that the negative argument of irreducible complexity is testable does not make testable the argument for ID. (2:15 (Miller); 5:39 (Pennock)). Professor Behe has applied the concept of irreducible complexity to only a few select systems: (1) the bacterial flagellum; (2) the blood-clotting cascade; and (3) the immune system. Contrary to Professor Behe's assertions with respect to these few biochemical systems among the myriad existing in nature, however, Dr. Miller presented evidence, based upon peer-reviewed studies, that they are not in fact irreducibly complex." (Page 76) "...on cross-examination, Professor Behe was questioned concerning his 1996 claim that science would never find an evolutionary explanation for the immune system. He was presented with fifty-eight peer-reviewed publications, nine books, and several immunology textbook chapters about the evolution of the immune system; however, he simply insisted that this was still not sufficient evidence of evolution, and that it was not "good enough." (23:19 (Behe))." (Page 78) "We therefore find that Professor Behe's claim for irreducible complexity has been refuted in peer-reviewed research papers and has been rejected by the scientific community at large. (17:45–46 (Padian); 3:99 (Miller)). Additionally, even if irreducible complexity had not been rejected, it still does not support ID as it is merely a test for evolution, not design. (2:15, 2:35–40 (Miller); 28:63–66 (Fuller)). We will now consider the purportedly "positive argument" for design encompassed in the phrase used numerous times by Professors Behe and Minnich throughout their expert testimony, which is the "purposeful arrangement of parts." Professor Behe summarized the argument as follows: We infer design when we see parts that appear to be arranged for a purpose. The strength of the inference is quantitative; the more parts that are arranged, the more intricately they interact, the stronger is our confidence in design. The appearance of design in aspects of biology is overwhelming. Since nothing other than an intelligent cause has been demonstrated to be able to yield such a strong appearance of design, Darwinian claims notwithstanding, the conclusion that the design seen in life is real design is rationally justified. (18:90–91, 18:109–10 (Behe); 37:50 (Minnich)). As previously indicated, this argument is merely a restatement of the Reverend William Paley's argument applied at the cell level. Minnich, Behe, and Paley reach the same conclusion, that complex organisms must have been designed using the same reasoning, except that Professors Behe and Minnich refuse to identify the designer, whereas Paley inferred from the presence of design that it was God. (1:6–7 (Miller); 38:44, 57 (Minnich)). Expert testimony revealed that this inductive argument is not scientific and as admitted by Professor Behe, can never be ruled out. (2:40 (Miller); 22:101 (Behe); 3:99 (Miller))." (Pages 79–80) Notes and references Further reading External links Supportive Michael J. Behe home page About Irreducible Complexity Discovery Institute Behe's Reply to his Critics (PDF) How to Explain Irreducible Complexity -- A Lab Manual Discovery Institute Institute for Creation Research (PDF) Irreducible Complexity: Definition & Evaluation by Craig Rusbult, Ph.D. Irreducible Complexity Revisited (PDF) Critical Behe, Biochemistry, and the Invisible Hand Darwin vs. Intelligent Design (again), by H. Allen Orr (review of Darwin's Black Box) Devolution: Why intelligent design isn't (The New Yorker) Does irreducible complexity imply Intelligent Design? by Mark Perakh Evolution of the Eye (Video) Zoologist Dan-Erik Nilsson demonstrates eye evolution through intermediate stages with working model. (PBS) Facilitated Variation Himma, Kenneth Einar. Design Arguments for the Existence of God. Internet Encyclopedia of Philosophy: 2. Contemporary Versions of the Design Argument, a. The Argument from Irreducible Biochemical Complexity Kitzmiller vs. Dover transcripts Miller, Kenneth R. textbook website Miller's "The Flagellum Unspun: The Collapse of Irreducible Complexity" Talk.origins archive (see talk.origins) TalkDesign.org (sister site to talk.origins archive on intelligent design) The bacterial flagellar motor: brilliant evolution or intelligent design? Matt Baker, ABC Science, 7 July 2015 Unlocking cell secrets bolsters evolutionists (Chicago Tribune) Biological systems Complex systems theory Creationist objections to evolution Intelligent design
[ -0.3147580325603485, 0.1388520896434784, -0.783194899559021, 0.25194013118743896, -0.1544935405254364, 0.3511655628681183, 0.2603875398635864, 0.2279384881258011, -0.1799677014350891, -0.6997665166854858, -0.07299695909023285, 0.5725707411766052, -0.6839420795440674, 0.6945686340332031, ...
15388
https://en.wikipedia.org/wiki/Religion%20in%20pre-Islamic%20Arabia
Religion in pre-Islamic Arabia
Religion in pre-Islamic Arabia included indigenous Arabian polytheism, ancient Semitic religions, Christianity, Judaism, Mandaeism, and Iranian religions such as Zoroastrianism, and Manichaeism. Arabian polytheism, the dominant form of religion in pre-Islamic Arabia, was based on veneration of deities and spirits. Worship was directed to various gods and goddesses, including Hubal and the goddesses al-Lāt, al-‘Uzzā, and Manāt, at local shrines and temples such as the Kaaba in Mecca. Deities were venerated and invoked through a variety of rituals, including pilgrimages and divination, as well as ritual sacrifice. Different theories have been proposed regarding the role of Allah in Meccan religion. Many of the physical descriptions of the pre-Islamic gods are traced to idols, especially near the Kaaba, which is said to have contained up to 360 of them. Other religions were represented to varying, lesser degrees. The influence of the adjacent Roman and Aksumite civilizations resulted in Christian communities in the northwest, northeast, and south of Arabia. Christianity made a lesser impact in the remainder of the peninsula, but did secure some conversions. With the exception of Nestorianism in the northeast and the Persian Gulf, the dominant form of Christianity was Miaphysitism. The peninsula had been a destination for Jewish migration since Roman times, which had resulted in a diaspora community supplemented by local converts. Additionally, the influence of the Sasanian Empire resulted in Iranian religions being present in the peninsula. Zoroastrianism existed in the east and south, while there is evidence of Manichaeism or possibly Mazdakism being practiced in Mecca. Background and sources Until about the fourth century, almost all inhabitants of Arabia practiced polytheistic religions. Although significant Jewish and Christian minorities developed, polytheism remained the dominant belief system in pre-Islamic Arabia. The contemporary sources of information regarding the pre-Islamic Arabian religion and pantheon include a small number of inscriptions and carvings, pre-Islamic poetry, external sources such as Jewish and Greek accounts, as well as the Muslim tradition, such as the Qur'an and Islamic writings. Nevertheless, information is limited. One early attestation of Arabian polytheism was in Esarhaddon’s Annals, mentioning Atarsamain, Nukhay, Ruldaiu, and Atarquruma. Herodotus, writing in his Histories, reported that the Arabs worshipped Orotalt (identified with Dionysus) and Alilat (identified with Aphrodite). Strabo stated the Arabs worshipped Dionysus and Zeus. Origen stated they worshipped Dionysus and Urania. Muslim sources regarding Arabian polytheism include the eighth-century Book of Idols by Hisham ibn al-Kalbi, which F.E. Peters argued to be the most substantial treatment of the religious practices of pre-Islamic Arabia, as well as the writings of the Yemeni historian al-Hasan al-Hamdani on South Arabian religious beliefs. According to the Book of Idols, descendants of the son of Abraham (Ishmael) who had settled in Mecca migrated to other lands. They carried holy stones from the Kaaba with them, erected them, and circumambulated them like the Kaaba. This, according to al-Kalbi led to the rise of idol worship. Based on this, it may be probable that Arabs originally venerated stones, later adopting idol-worship under foreign influences. The relationship between a god and a stone as his representation can be seen from the third-century Syriac work called the Homily of Pseudo-Meliton where he describes the pagan faiths of Syriac-speakers in northern Mesopotamia, who were mostly Arabs. Worship Deities The pre-Islamic Arabian religions were polytheistic, with many of the deities' names known. Formal pantheons are more noticeable at the level of kingdoms, of variable sizes, ranging from simple city-states to collections of tribes. Tribes, towns, clans, lineages and families had their own cults too. Christian Julien Robin suggests that this structure of the divine world reflected the society of the time. Trade caravans also brought foreign religious and cultural influences. A large number of deities did not have proper names and were referred to by titles indicating a quality, a family relationship, or a locale preceded by "he who" or "she who" (dhū or dhāt respectively). The religious beliefs and practices of the nomadic Bedouin were distinct from those of the settled tribes of towns such as Mecca. Nomadic religious belief systems and practices are believed to have included fetishism, totemism and veneration of the dead but were connected principally with immediate concerns and problems and did not consider larger philosophical questions such as the afterlife. Settled urban Arabs, on the other hand, are thought to have believed in a more complex pantheon of deities. While the Meccans and the other settled inhabitants of the Hejaz worshiped their gods at permanent shrines in towns and oases, the Bedouin practiced their religion on the move. Minor spirits In South Arabia, mndh’t were anonymous guardian spirits of the community and the ancestor spirits of the family. They were known as ‘the sun (shms) of their ancestors’. In North Arabia, were known from Palmyrene inscriptions as "the good and rewarding gods" and were probably related to the jinn of west and central Arabia. Unlike jinn, could not hurt nor possess humans and were much more similar to the Roman genius. According to common Arabian belief, soothsayers, pre-Islamic philosophers, and poets were inspired by the jinn. However, jinn were also feared and thought to be responsible for causing various diseases and mental illnesses. Malevolent beings Aside from benevolent gods and spirits, there existed malevolent beings. These beings were not attested in the epigraphic record, but were alluded to in pre-Islamic Arabic poetry, and their legends were collected by later Muslim authors. Commonly mentioned are ghouls. Etymologically, the English word "ghoul" was derived from the Arabic ghul, from ghala, "to seize", related to the Sumerian galla. They are said to have a hideous appearance, with feet like those of an ass. Arabs were said to utter the following couplet if they should encounter one: "Oh ass-footed one, just bray away, we won't leave the desert plain nor ever go astray." Christian Julien Robin notes that all the known South Arabian divinities had a positive or protective role and that evil powers were only alluded to but were never personified. Roles of deities Role of Allah Some scholars postulate that in pre-Islamic Arabia, including in Mecca, Allah was considered to be a deity, possibly a creator deity or a supreme deity in a polytheistic pantheon. The word Allah (from the Arabic al-ilah meaning "the god") may have been used as a title rather than a name. The concept of Allah may have been vague in the Meccan religion. According to Islamic sources, Meccans and their neighbors believed that the goddesses Al-lāt, Al-‘Uzzá, and Manāt were the daughters of Allah. Regional variants of the word Allah occur in both pagan and Christian pre-Islamic inscriptions. References to Allah are found in the poetry of the pre-Islamic Arab poet Zuhayr bin Abi Sulma, who lived a generation before Muhammad, as well as pre-Islamic personal names. Muhammad's father's name was ʿAbd-Allāh, meaning "the servant of Allah". Charles Russell Coulter and Patricia Turner considered that Allah's name may be derived from a pre-Islamic god called Ailiah and is similar to El, Il, Ilah, and Jehovah. They also considered some of his characteristics to be seemingly based on lunar deities like Almaqah, Kahl, Shaker, Wadd and Warakh. Alfred Guillaume states that the connection between Ilah that came to form Allah and ancient Babylonian Il or El of ancient Israel is not clear. Wellhausen states that Allah was known from Jewish and Christian sources and was known to pagan Arabs as the supreme god. Winfried Corduan doubts the theory of Allah of Islam being linked to a moon god, stating that the term Allah functions as a generic term, like the term El-Elyon used as a title for the god Sin. South Arabian inscriptions from the fourth century AD refer to a god called Rahman ("The Merciful One") who had a monotheistic cult and was referred to as the "Lord of heaven and Earth". Aaron W. Hughes states that scholars are unsure whether he developed from the earlier polytheistic systems or developed due to the increasing significance of the Christian and Jewish communities, and that it is difficult to establish whether Allah was linked to Rahmanan. Maxime Rodinson, however, considers one of Allah's names, "Ar-Rahman", to have been used in the form of Rahmanan earlier. Al-Lat, al-Uzza and Manat Al-Lāt, Al-‘Uzzá and Manāt were common names used for multiple goddesses across Arabia. G. R. Hawting states that modern scholars have frequently associated the names of Arabian goddesses Al-lāt, Al-‘Uzzá and Manāt with cults devoted to celestial bodies, particularly Venus, drawing upon evidence external to the Muslim tradition as well as in relation to Syria, Mesopotamia and the Sinai Peninsula. Allāt (Arabic: اللات) or al-Lāt was worshipped throughout the ancient Near East with various associations. Herodotus in the 5th century BC identifies Alilat (Greek: Ἀλιλάτ) as the Arabic name for Aphrodite (and, in another passage, for Urania), which is strong evidence for worship of Allāt in Arabia at that early date. Al-‘Uzzá (Arabic: العزى) was a fertility goddess or possibly a goddess of love. Manāt (Arabic: مناة) was the goddess of destiny. Al-Lāt's cult was spread in Syria and northern Arabia. From Safaitic and Hismaic inscriptions, it is probable that she was worshiped as Lat (lt). F. V. Winnet saw al-Lat as a lunar deity due to the association of a crescent with her in 'Ayn esh-Shallāleh and a Lihyanite inscription mentioning the name of Wadd, the Minaean moon god, over the title of fkl lt. René Dussaud and Gonzague Ryckmans linked her with Venus while others have thought her to be a solar deity. John F. Healey considers that al-Uzza actually might have been an epithet of al-Lāt before becoming a separate deity in the Meccan pantheon. Paola Corrente, writing in Redefining Dionysus, considers she might have been a god of vegetation or a celestial deity of atmospheric phenomena and a sky deity. Mythology According to F. E. Peters, "one of the characteristics of Arab paganism as it has come down to us is the absence of a mythology, narratives that might serve to explain the origin or history of the gods." Many of the deities have epithets, but are lacking myths or narratives to decode the epithets, making them generally uninformative. Practices Cult images and idols The worship of sacred stones constituted one of the most important practices of the Semitic peoples, including Arabs. Cult images of a deity were most often an unworked stone block. The most common name for these stone blocks was derived from the Semitic nsb ("to be stood upright"), but other names were used, such as Nabataean ("place of prostration") and Arabic ("object of circumambulation", this term often occurs in pre-Islamic Arabic poetry). These god-stones were usually a free-standing slab, but Nabataean god-stones are usually carved directly on the rock face. Facial features may be incised on the stone (especially in Nabataea), or astral symbols (especially in South Arabia). Under Greco-Roman influence, an anthropomorphic statue might be used instead. The Book of Idols describes two types of statues: idols (sanam) and images (wathan). If a statue were made of wood, gold, or silver, after a human form, it would be an idol, but if the statue were made of stone, it would be an image. Representation of deities in animal-form was common in South Arabia, such as the god Sayin from Hadhramaut, who was represented as either an eagle fighting a serpent or a bull. Sacred places Sacred places are known as hima, haram or mahram, and within these places, all living things were considered inviolable and violence was forbidden. In most of Arabia, these places would take the form of open-air sanctuaries, with distinguishing natural features such as springs and forests. Cities would contain temples, enclosing the sacred area with walls, and featuring ornate structures. Priesthood and sacred offices Sacred areas often had a guardian or a performer of cultic rites. These officials were thought to tend the area, receive offerings, and perform divination. They are known by many names, probably based on cultural-linguistic preference: was used in the Hejaz, kâhin was used in the Sinai-Negev-Hisma region, and kumrâ was used in Aramaic-influenced areas. In South Arabia, rs2w and 'fkl were used to refer to priests, and other words include qyn ("administrator") and mrtd ("consecrated to a particular divinity"). A more specialized staff is thought to have existed in major sanctuaries. Pilgrimages Pilgrimages to sacred places would be made at certain times of the year. Pilgrim fairs of central and northern Arabia took place in specific months designated as violence-free, allowing several activities to flourish, such as trade, though in some places only exchange was permitted. South Arabian pilgrimages The most important pilgrimage in Saba' was probably the pilgrimage of Almaqah at Ma'rib, performed in the month of dhu-Abhi (roughly in July). Two references attest the pilgrimage of Almaqah dhu-Hirran at 'Amran. The pilgrimage of Ta'lab Riyam took place in Mount Tur'at and the Zabyan temple at Hadaqan, while the pilgrimage of Dhu-Samawi, the god of the Amir tribe, took place in Yathill. Aside from Sabaean pilgrimages, the pilgrimage of Sayin took place at Shabwa. Meccan pilgrimage The pilgrimage of Mecca involved the stations of Mount Arafat, Muzdalifah, Mina and central Mecca that included Safa and Marwa as well as the Kaaba. Pilgrims at the first two stations performed wuquf or standing in adoration. At Mina, animals were sacrificed. The procession from Arafat to Muzdalifah, and from Mina to Mecca, in a pre-reserved route towards idols or an idol, was termed and , with the latter taking place before sunset. At Jabal Quzah, fires were started during the sacred month. Nearby the Kaaba was located the betyl which was later called Maqam Ibrahim; a place called al-Ḥigr which Aziz al-Azmeh takes to be reserved for consecrated animals, basing his argument on a Sabaean inscription mentioning a place called mḥgr which was reserved for animals; and the Well of Zamzam. Both Safa and Marwa were adjacent to two sacrificial hills, one called Muṭ'im al Ṭayr and another Mujāwir al-Riḥ which was a pathway to Abu Kubais from where the Black Stone is reported to have originated. Cult associations Meccan pilgrimages differed according to the rites of different cult associations, in which individuals and groups joined for religious purposes. The Ḥilla association performed the hajj in autumn season while the Ṭuls and Ḥums performed the umrah in spring. The Ḥums were the Quraysh, Banu Kinanah, Banu Khuza'a and Banu 'Amir. They did not perform the pilgrimage outside the zone of Mecca's haram, thus excluding Mount Arafat. They also developed certain dietary and cultural restrictions. According to Kitab al-Muhabbar, the Ḥilla denoted most of the Banu Tamim, Qays, Rabi`ah, Qūḍa'ah, Ansar, Khath'am, Bajīlah, Banu Bakr ibn Abd Manat, Hudhayl, Asad, Tayy and Bariq. The Ṭuls comprised the tribes of Yemen and Hadramaut, 'Akk, Ujayb and Īyād. The Basl recognised at least eight months of the calendar as holy. There was also another group which didn't recognize the sanctity of Mecca's haram or holy months, unlike the other four. Divination In South Arabia, oracles were regarded as ms’l, or "a place of asking", and that deities interacted by hr’yhw ("making them see") a vision, a dream, or even direct interaction. Otherwise deities interacted indirectly through a medium. There were three methods of chance-based divination attested in pre-Islamic Arabia; two of these methods, making marks in the sand or on rocks and throwing pebbles are poorly attested. The other method, the practice of randomly selecting an arrow with instructions, was widely attested and was common throughout Arabia. A simple form of this practice was reportedly performed before the image of Dhu'l-Khalasa by a certain man, sometimes said to be the Kindite poet Imru al-Qays according to al-Kalbi. A more elaborate form of the ritual was performed in before the image of Hubal. This form of divination was also attested in Palmyra, evidenced by an honorific inscription in the temple of al-Lat. Offerings and ritual sacrifice The most common offerings were animals, crops, food, liquids, inscribed metal plaques or stone tablets, aromatics, edifices and manufactured objects. Camel-herding Arabs would devote some of their beasts to certain deities. The beasts would have their ears slit and would be left to pasture without a herdsman, allowing them to die a natural death. Pre-Islamic Arabians, especially pastoralist tribes, sacrificed animals as an offering to a deity. This type of offering was common and involved domestic animals such as camels, sheep and cattle, while game animals and poultry were rarely or never mentioned. Sacrifice rites were not tied to a particular location though they were usually practiced in sacred places. Sacrifice rites could be performed by the devotee, though according to Hoyland, women were probably not allowed. The victim's blood, according to pre-Islamic Arabic poetry and certain South Arabian inscriptions, was also 'poured out' on the altar stone, thus forming a bond between the human and the deity. According to Muslim sources, most sacrifices were concluded with communal feasts. In South Arabia, beginning with the Christian era, or perhaps a short while before, statuettes were presented before the deity, known as (male) or (female). Human sacrifice was sometimes carried out in Arabia. The victims were generally prisoners of war, who represented the god's part of the victory in booty, although other forms might have existed. Blood sacrifice was definitely practiced in South Arabia, but few allusions to the practice are known, apart from some Minaean inscriptions. Other practices In the Hejaz, menstruating women were not allowed to be near the cult images. The area where Isaf and Na'ila's images stood was considered out-of-bounds for menstruating women. This was reportedly the same with Manaf. According to the Book of Idols, this rule applied to all the "idols". This was also the case in South Arabia, as attested in a South Arabian inscription from al-Jawf. Sexual intercourse in temples was prohibited, as attested in two South Arabian inscriptions. One legend concerning Isaf and Na'ila, when two lovers made love in the Kaaba and were petrified, joining the idols in the Kaaba, echoes this prohibition. By geography Eastern Arabia The Dilmun civilization, which existed along the Persian Gulf coast and Bahrain until the 6th century BC, worshipped a pair of deities, Inzak and Meskilak. It is not known whether these were the only deities in the pantheon or whether there were others. The discovery of wells at the sites of a Dilmun temple and a shrine suggests that sweet water played an important part in religious practices. In the subsequent Greco-Roman period, there is evidence that the worship of non-indigenous deities was brought to the region by merchants and visitors. These included Bel, a god popular in the Syrian city of Palmyra, the Mesopotamian deities Nabu and Shamash, the Greek deities Poseidon and Artemis and the west Arabian deities Kahl and Manat. South Arabia The main sources of religious information in pre-Islamic South Arabia are inscriptions, which number in the thousands, as well as the Quran, complemented by archaeological evidence. The civilizations of South Arabia are considered to have the most developed pantheon in the Arabian peninsula. In South Arabia, the most common god was 'Athtar, who was considered remote. The patron deity (shym) was considered to be of much more immediate significance than 'Athtar. Thus, the kingdom of Saba' had Almaqah, the kingdom of Ma'in had Wadd, the kingdom of Qataban had 'Amm, and the kingdom of Hadhramaut had Sayin. Each people was termed the "children" of their respective patron deity. Patron deities played a vital role in sociopolitical terms, their cults serving as the focus of a person's cohesion and loyalty. Evidence from surviving inscriptions suggests that each of the southern kingdoms had its own pantheon of three to five deities, the major deity always being a god. For example, the pantheon of Saba comprised Almaqah, the major deity, together with 'Athtar, Haubas, Dhat-Himyam, and Dhat-Badan. The main god in Ma'in and Himyar was 'Athtar, in Qataban it was Amm, and in Hadhramaut it was Sayin. 'Amm was a lunar deity and was associated with the weather, especially lightning. One of the most frequent titles of the god Almaqah was "Lord of Awwam". Anbay was an oracular god of Qataban and also the spokesman of Amm. His name was invoked in royal regulations regarding water supply. Anbay's name was related to that of the Babylonian deity Nabu. Hawkam was invoked alongside Anbay as god of "command and decision" and his name is derived from the root word "to be wise". Each kingdom's central temple was the focus of worship for the main god and would be the destination for an annual pilgrimage, with regional temples dedicated to a local manifestation of the main god. Other beings worshipped included local deities or deities dedicated to specific functions as well as deified ancestors. Influence of Arab tribes The encroachment of northern Arab tribes into South Arabia also introduced northern Arab deities into the region. The three goddesses al-Lat, al-Uzza and Manat became known as Lat/Latan, Uzzayan and Manawt. Uzzayan's cult in particular was widespread in South Arabia, and in Qataban she was invoked as a guardian of the final royal palace. Lat/Latan was not significant in South Arabia, but appears to be popular with the Arab tribes bordering Yemen. Other Arab deities include Dhu-Samawi, a god originally worshipped by the Amir tribe, and Kahilan, perhaps related to Kahl of Qaryat al-Faw. Bordering Yemen, the Azd Sârat tribe of the Asir region was said to have worshipped Dhu'l-Shara, Dhu'l-Kaffayn, Dhu'l-Khalasa and A'im. According to the Book of Idols, Dhu'l-Kaffayn originated from a clan of the Banu Daws. In addition to being worshipped among the Azd, Dushara is also reported to have a shrine amongst the Daws. Dhu’l-Khalasa was an oracular god and was also worshipped by the Bajila and Khatham tribes. Influence on Aksum Before conversion to Christianity, the Aksumites followed a polytheistic religion that was similar to that of Southern Arabia. The lunar god Hawbas was worshiped in South Arabia and Aksum. The name of the god Astar, a sky-deity was related to that of 'Attar. The god Almaqah was worshiped at Hawulti-Melazo. The South Arabian gods in Aksum included Dhat-Himyam and Dhat-Ba'adan. A stone later reused for the church of Enda-Cerqos at Melazo mentions these gods. Hawbas is also mentioned on an altar and sphinx in Dibdib. The name of Nrw who is mentioned in Aksum inscriptions is related to that of the South Arabian god Nawraw, a deity of stars. Transition to Judaism The Himyarite kings radically opposed polytheism in favor of Judaism, beginning officially in 380. The last trace of polytheism in South Arabia, an inscription commemorating a construction project with a polytheistic invocation, and another, mentioning the temple of Ta’lab, all date from just after 380 (the former dating to the rule of the king Dhara’amar Ayman, and the latter dating to the year 401–402). The rejection of polytheism from the public sphere did not mean the extinction of it altogether, as polytheism likely continued in the private sphere. Central Arabia The Kinda tribe's chief god was Kahl, whom their capital Qaryat Dhat Kahl (modern Qaryat al-Faw) was named for. His name appears in the form of many inscriptions and rock engravings on the slopes of the Tuwayq, on the walls of the souk of the village, in the residential houses and on the incense burners. An inscription in Qaryat Dhat Kahl invokes the gods Kahl, Athtar al-Shariq and Lah. Hejaz According to Islamic sources, the Hejaz region was home to three important shrines dedicated to al-Lat, al-’Uzza and Manat. The shrine and idol of al-Lat, according to the Book of Idols, once stood in Ta'if, and was primarily worshipped by the Banu Thaqif tribe. Al-’Uzza's principal shrine was in Nakhla and was the chief-goddess of the Quraysh tribe. Manāt's idol, reportedly the oldest of the three, was erected on the seashore between Medina and Mecca, and was honored by the Aws and Khazraj tribes. Inhabitants of several areas venerated Manāt, performing sacrifices before her idol, and pilgrimages of some were not considered completed until they visited Manāt and shaved their heads. In the Muzdalifah region near Mecca, the god Quzah, who is a god of rains and storms, was worshipped. In pre-Islamic times pilgrims used to halt at the "hill of Quzah" before sunrise. Qusai ibn Kilab is traditionally reported to have introduced the association of fire worship with him on Muzdalifah. Various other deities were venerated in the area by specific tribes, such as the god Suwa' by the Banu Hudhayl tribe and the god Nuhm by the Muzaynah tribe. Historiography The majority of extant information about Mecca during the rise of Islam and earlier times comes from the text of the Quran itself and later Muslim sources such as the prophetic biography literature dealing with the life of Muhammad and the Book of Idols. Alternative sources are so fragmentary and specialized that writing a convincing history of this period based on them alone is impossible. Several scholars hold that the sīra literature is not independent of the Quran but has been fabricated to explain the verses of the Quran. There is evidence to support the contention that some reports of the sīras are of dubious validity, but there is also evidence to support the contention that the sīra narratives originated independently of the Quran. Compounding the problem is that the earliest extant Muslim historical works, including the sīras, were composed in their definitive form more than a century after the beginning of the Islamic era. Some of these works were based on subsequently lost earlier texts, which in their turn recorded a fluid oral tradition. Scholars do not agree as to the time when such oral accounts began to be systematically collected and written down, and they differ greatly in their assessment of the historical reliability of the available texts. Role of Mecca and the Kaaba The Kaaba, whose environs were regarded as sacred (haram), became a national shrine under the custodianship of the Quraysh, the chief tribe of Mecca, which made the Hejaz the most important religious area in north Arabia. Its role was solidified by a confrontation with the Christian king Abraha, who controlled much of Arabia from a seat of power in Yemen in the middle of the sixth century. Abraha had recently constructed a splendid church in Sana'a, and he wanted to make that city a major center of pilgrimage, but Mecca's Kaaba presented a challenge to his plan. Abraha found a pretext for an attack on Mecca, presented by different sources alternatively as pollution of the church by a tribe allied to the Meccans or as an attack on Abraha's grandson in Najran by a Meccan party. The defeat of the army he assembled to conquer Mecca is recounted with miraculous details by the Islamic tradition and is also alluded to in the Quran and pre-Islamic poetry. After the battle, which probably occurred around 565, the Quraysh became a dominant force in western Arabia, receiving the title "God's people" (ahl Allah) according to Islamic sources, and formed the cult association of ḥums, which tied members of many tribes in western Arabia to the Kaaba. The Kaaba, Allah, and Hubal According to tradition, the Kaaba was a cube-like, originally roofless structure housing a black stone revered as a relic. The sanctuary was dedicated to Hubal (Arabic: هبل), who, according to some sources, was worshiped as the greatest of the 360 idols the Kaaba contained, which probably represented the days of the year. Ibn Ishaq and Ibn Al-Kalbi both report that the human-shaped idol of Hubal made of precious stone came into the possession of the Quraysh with its right hand broken off and that the Quraysh made a hand of gold to replace it. A soothsayer performed divination in the shrine by drawing ritual arrows, and vows and sacrifices were made to assure success. Marshall Hodgson argues that relations with deities and fetishes in pre-Islamic Mecca were maintained chiefly on the basis of bargaining, where favors were expected in return for offerings. A deity's or oracle's failure to provide the desired response was sometimes met with anger. Different theories have been proposed regarding the role of Allah in Meccan religion. According to one hypothesis, which goes back to Julius Wellhausen, Allah (the supreme deity of the tribal federation around Quraysh) was a designation that consecrated the superiority of Hubal (the supreme deity of Quraysh) over the other gods. However, there is also evidence that Allah and Hubal were two distinct deities. According to that hypothesis, the Kaaba was first consecrated to a supreme deity named Allah and then hosted the pantheon of Quraysh after their conquest of Mecca, about a century before the time of Muhammad. Some inscriptions seem to indicate the use of Allah as a name of a polytheist deity centuries earlier, but we know nothing precise about this use. Some scholars have suggested that Allah may have represented a remote creator god who was gradually eclipsed by more particularized local deities. There is disagreement on whether Allah played a major role in the Meccan religious cult. No iconic representation or idol of Allah is known to have existed. Other deities The three chief goddesses of Meccan religion were al-Lat, Al-‘Uzzá, and Manāt, who were called the daughters of Allah. Egerton Sykes meanwhile states that Al-lāt was the female counterpart of Allah while Uzza was a name given by Banu Ghatafan to the planet Venus. Other deities of the Quraysh in Mecca included Manaf, Isaf and Na’ila. Although the early Arab historian Al-Tabari calls Manaf (Arabic: مناف) "one of the greatest deities of Mecca", very little information is available about it. Women touched his idol as a token of blessing, and kept away from it during menstruation. Gonzague Ryckmans described this as a practice peculiar to Manaf, but according to the Encyclopedia of Islam, a report from Ibn Al-Kalbi indicates that it was common to all idols. Muhammad's great-great-grandfather's name was Abd Manaf which means "slave of Manaf". He is thought by some scholars to be a sun-god. The idols of Isāf and Nā'ila were located near the Black Stone with a talbiyah performed to Isāf during sacrifices. Various legends existed about the idols, including one that they were petrified after they committed adultery in the Kaaba. The pantheon of the Quraysh was not identical with that of the tribes who entered into various cult and commercial associations with them, especially that of the hums. Christian Julien Robin argues that the former was composed principally of idols that were in the sanctuary of Mecca, including Hubal and Manaf, while the pantheon of the associations was superimposed on it, and its principal deities included the three goddesses, who had neither idols nor a shrine in that city. Political and religious developments The second half of the sixth century was a period of political disorder in Arabia and communication routes were no longer secure. Religious divisions were an important cause of the crisis. Judaism became the dominant religion in Yemen while Christianity took root in the Persian Gulf area. In line with the broader trends of the ancient world, Arabia yearned for a more spiritual form of religion and began believing in afterlife, while the choice of religion increasingly became a personal rather than communal choice. While many were reluctant to convert to a foreign faith, those faiths provided intellectual and spiritual reference points, and the old pagan vocabulary of Arabic began to be replaced by Jewish and Christian loanwords from Aramaic everywhere, including Mecca. The distribution of pagan temples supports Gerald Hawting's argument that Arabian polytheism was marginalized in the region and already dying in Mecca on the eve of Islam. The practice of polytheistic cults was increasingly limited to the steppe and the desert, and in Yathrib (later known as Medina), which included two tribes with polytheistic majorities, the absence of a public pagan temple in the town or its immediate neighborhood indicates that polytheism was confined to the private sphere. Looking at the text of the Quran itself, Hawting has also argued that the criticism of idolaters and polytheists contained in Quran is in fact a hyperbolic reference to other monotheists, in particular the Arab Jews and Arab Christians, whose religious beliefs were considered imperfect. According to some traditions, the Kaaba contained no statues, but its interior was decorated with images of Mary and Jesus, prophets, angels, and trees. To counter the effects of anarchy, the institution of sacred months, during which every act of violence was prohibited, was reestablished. During those months, it was possible to participate in pilgrimages and fairs without danger. The Quraysh upheld the principle of two annual truces, one of one month and the second of three months, which conferred a sacred character to the Meccan sanctuary. The cult association of hums, in which individuals and groups partook in the same rites, was primarily religious, but it also had important economic consequences. Although, as Patricia Crone has shown, Mecca could not compare with the great centers of caravan trade on the eve of Islam, it was probably one of the most prosperous and secure cities of the peninsula, since, unlike many of them, it did not have surrounding walls. Pilgrimage to Mecca was a popular custom. Some Islamic rituals, including processions around the Kaaba and between the hills of al-Safa and Marwa, as well as the salutation "we are here, O Allah, we are here" repeated on approaching the Kaaba are believed to have antedated Islam. Spring water acquired a sacred character in Arabia early on and Islamic sources state that the well of Zamzam became holy long before the Islamic era. Advent of Islam According to Ibn Sa'd, the opposition in Mecca started when the prophet of Islam, Muhammad, delivered verses that "spoke shamefully of the idols they (the Meccans) worshiped other than Himself (God) and mentioned the perdition of their fathers who died in disbelief". According to William Montgomery Watt, as the ranks of Muhammad's followers swelled, he became a threat to the local tribes and the rulers of the city, whose wealth rested upon the Kaaba, the focal point of Meccan religious life, which Muhammad threatened to overthrow. Muhammad's denunciation of the Meccan traditional religion was especially offensive to his own tribe, the Quraysh, as they were the guardians of the Kaaba. The conquest of Mecca around 629–630 AD led to the destruction of the idols around the Kaaba, including Hubal. Following the conquest, shrines and temples dedicated to deities were destroyed, such as the shrines to al-Lat, al-’Uzza and Manat in Ta’if, Nakhla and al-Qudayd respectively. North Arabia Less complex societies outside South Arabia often had smaller pantheons, with the patron deity having much prominence. The deities attested in north Arabian inscriptions include Ruda, Nuha, Allah, Dathan, and Kahl. Inscriptions in a North Arabian dialect in the region of Najd referring to Nuha describe emotions as a gift from him. In addition, they also refer to Ruda being responsible for all things good and bad. The Safaitic tribes in particular prominently worshipped the goddess al-Lat as a bringer of prosperity. The Syrian god Baalshamin was also worshipped by Safaitic tribes and is mentioned in Safaitic inscriptions. Religious worship amongst the Qedarites, an ancient tribal confederation that was probably subsumed into Nabataea around the 2nd century AD, was centered around a polytheistic system in which women rose to prominence. Divine images of the gods and goddesses worshipped by Qedarite Arabs, as noted in Assyrian inscriptions, included representations of Atarsamain, Nuha, Ruda, Dai, Abirillu and Atarquruma. The female guardian of these idols, usually the reigning queen, served as a priestess (, in Assyrian texts) who communed with the other world. There is also evidence that the Qedar worshipped al-Lat to whom the inscription on a silver bowl from a king of Qedar is dedicated. In the Babylonian Talmud, which was passed down orally for centuries before being transcribed c. 500 AD, in tractate Taanis (folio 5b), it is said that most Qedarites worshiped pagan gods. The Aramaic stele inscription discovered by Charles Hubert in 1880 at Tayma mentions the introduction of a new god called Salm of hgm into the city's pantheon being permitted by three local gods – Salm of Mahram who was the chief god, Shingala, and Ashira. The name Salm means "image" or "idol". The Midianites, a people referred to in the Book of Genesis and located in north-western Arabia, may have worshipped Yahweh. Indeed, some scholars believe that Yahweh was originally a Midianite god and that he was subsequently adopted by the Israelites. An Egyptian temple of Hathor continued to be used during the Midianite occupation of the site, although images of Hathor were defaced suggesting Midianite opposition. They transformed it into a desert tent-shrine set up with a copper sculpture of a snake. The Lihyanites worshipped the god Dhu-Ghabat and rarely turned to others for their needs. Dhu-Ghabat's name means "he of the thicket", based on the etymology of gabah, meaning forest or thicket. The god al-Kutba', a god of writing probably related to a Babylonian deity and perhaps was brought into the region by the Babylonian king Nabonidus, is mentioned in Lihyanite inscriptions as well. The worship of the Hermonian gods Leucothea and Theandrios was spread from Phoenicia to Arabia. According to the Book of Idols, the Tayy tribe worshipped al-Fals, whose idol stood on Jabal Aja, while the Kalb tribe worshipped Wadd, who had an idol in Dumat al-Jandal. Nabataeans The Nabataeans worshipped primarily northern Arabian deities. Under foreign influences, they also incorporated foreign deities and elements into their beliefs. The Nabataeans’ chief-god is Dushara. In Petra, the only major goddess is Al-‘Uzzá, assuming the traits of Isis, Tyche and Aphrodite. It is unknown if her worship and identity is related to her cult at Nakhla and others. The Nabatean inscriptions define Allāt and Al-Uzza as the "bride of Dushara". Al-Uzza may have been an epithet of Allāt in the Nabataean religion according to John F. Healey. Outside Petra, other deities were worshipped; for example, Hubal and Manat were invoked in the Hejaz, and al-Lat was invoked in the Hauran and the Syrian desert. The Nabataean king Obodas I, who founded Obodat, was deified and worshipped as a god. They also worshipped Shay al-Qawm, al-Kutba', and various Greco-Roman deities such as Nike and Tyche. Maxime Rodinson suggests that Hubal, who was popular in Mecca, had a Nabataean origin. The worship of Pakidas, a Nabataean god, is attested at Gerasa alongside Hera in an inscription dated to the first century A.D. while an Arabian god is also attested by three inscriptions dated to the second century. The Nabataeans were known for their elaborate tombs, but they were not just for show; they were meant to be comfortable places for the dead. Petra has many "sacred high places" which include altars that have usually been interpreted as places of human sacrifice, although, since the 1960s, an alternative theory that they are "exposure platforms" for placing the corpses of the deceased as part of a funerary ritual has been put forward. However, there is, in fact, little evidence for either proposition. Religious beliefs of Arabs outside Arabia Palmyra was a cosmopolitan society, with its population being a mix of Aramaeans and Arabs. The Arabs of Palmyra worshipped al-Lat, Rahim and Shamash. The temple of al-Lat was established by the Bene Ma'zin tribe, who were probably an Arab tribe. The nomads of the countryside worshipped a set of deities, bearing Arab names and attributes, most prominent of them was Abgal, who himself is not attested in Palmyra itself. Ma'n, an Arab god, was worshipped alongside Abgal in a temple dedicated in 195 AD at Khirbet Semrin in the Palmyrene region while an inscription dated 194 AD at Ras esh-Shaar calls him the "good and bountiful god". A stele at Ras esh-Shaar shows him riding a horse with a lance while the god Saad is riding a camel. Abgal, Ma'n and Sa'd were known as the genii. The god Ashar was represented on a stele in Dura-Europos alongside another god Sa'd. The former was represented on a horse with Arab dress while the other was shown standing on the ground. Both had Parthian hairstyle, large facial hair and moustaches as well as similar clothing. Ashar's name is found to have been used in a theophoric manner among the Arab-majority areas of the region of the Northwest Semitic languages, like Hatra, where names like "Refuge of Ashar", "Servant of Ashar" and "Ashar has given" are recorded on an inscription. In Edessa, the solar deity was the primary god around the time of the Roman Emperor Julian and this worship was presumably brought in by migrants from Arabia. Julian's oration delivered to the denizens of the city mentioned that they worshipped the Sun surrounded by Azizos and Monimos whom Iamblichus identified with Ares and Hermes respectively. Monimos derived from Mu'nim or "the favourable one", and was another name of Ruda or Ruldaiu as apparent from spellings of his name in Sennacherib's Annals. The idol of the god al-Uqaysir was, according to the Book of Idols, located in Syria, and was worshipped by the tribes of Quda'a, Lakhm, Judham, Amela, and Ghatafan. Adherents would go on a pilgrimage to the idol and shave their heads, then mix their hair with wheat, "for every single hair a handful of wheat". A shrine to Dushara has been discovered in the harbour of ancient Puteoli in Italy. The city was an important nexus for trade to the Near East, and it is known to have had a Nabataean presence during the mid 1st century BCE. A Minaean altar dedicated to Wadd evidently existed in Delos, containing two inscriptions in Minaean and Greek respectively. Bedouin religious beliefs The Bedouin were introduced to Meccan ritualistic practices as they frequented settled towns of the Hejaz during the four months of the "holy truce", the first three of which were devoted to religious observance, while the fourth was set aside for trade. Alan Jones infers from Bedouin poetry that the gods, even Allah, were less important to the Bedouins than Fate. They seem to have had little trust in rituals and pilgrimages as means of propitiating Fate, but had recourse to divination and soothsayers (). The Bedouins regarded some trees, wells, caves and stones as sacred objects, either as fetishes or as means of reaching a deity. They created sanctuaries where people could worship fetishes. The Bedouins had a code of honor which Fazlur Rahman Malik states may be regarded as their religious ethics. This code encompassed women, bravery, hospitality, honouring one's promises and pacts, and vengeance. They believed that the ghost of a slain person would cry out from the grave until their thirst for blood was quenched. Practices such as killing of infant girls were often regarded as having religious sanction. Numerous mentions of jinn in the Quran and testimony of both pre-Islamic and Islamic literature indicate that the belief in spirits was prominent in pre-Islamic Bedouin religion. However, there is evidence that the word jinn is derived from Aramaic, , which was widely attested in Palmyrene inscriptions. The Aramaic word was used by Christians to designate pagan gods reduced to the status of demons, and was introduced into Arabic folklore only late in the pre-Islamic era. Julius Wellhausen has observed that such spirits were thought to inhabit desolate, dingy and dark places and that they were feared. One had to protect oneself from them, but they were not the objects of a true cult. Bedouin religious experience also included an apparently indigenous cult of ancestors. The dead were not regarded as powerful, but rather as deprived of protection and needing charity of the living as a continuation of social obligations beyond the grave. Only certain ancestors, especially heroes from which the tribe was said to derive its name, seem to have been objects of real veneration. Other religions Iranian religions Iranian religions existed in pre-Islamic Arabia on account of Sasanian military presence along the Persian Gulf and South Arabia and on account of trade routes between the Hejaz and Iraq. Some Arabs in northeast of the peninsula converted to Zoroastrianism and several Zoroastrian temples were constructed in Najd. Some of the members from the tribe of Banu Tamim had converted to the religion. There is also evidence of existence of Manichaeism in Arabia as several early sources indicate a presence of "zandaqas" in Mecca, although the term could also be interpreted as referring to Mazdakism. However, according to the most recent research by Tardieu, the prevalence of Manichaeism in Mecca during the 6th and 7th centuries, when Islam emerged, can not be proven. Similar reservations regarding the appearance of Manichaeism and Mazdakism in pre-Islamic Mecca are offered by Trompf & Mikkelsen et al. in their latest work (2018). There is evidence for the circulation of Iranian religious ideas in the form of Persian loan words in Quran such as firdaws (paradise). Zoroastrianism was also present in Eastern Arabia and Persian-speaking Zoroastrians lived in the region. The religion was introduced in the region including modern-day Bahrain during the rule of Persian empires in the region starting from 250 B.C. It was mainly practiced in Bahrain by Persian settlers. Zoroastrianism was also practiced in the Persian-ruled area of modern-day Oman. The religion also existed in Persian-ruled area of modern Yemen. The descendants of Abna, the Persian conquerors of Yemen, were followers of Zoroastrianism. Yemen's Zoroastrians who had the jizya imposed on them after being conquered by Muhammad are mentioned by the Islamic historian al-Baladhuri. According to Serjeant, the Baharna people may be the Arabized descendants of converts from the original population of ancient Persians (majus) as well as other religions. Abrahamic religions Judaism A thriving community of Jewish tribes existed in pre-Islamic Arabia and included both sedentary and nomadic communities. Jews had migrated into Arabia from Roman times onwards. Arabian Jews spoke Arabic as well as Hebrew and Aramaic and had contact with Jewish religious centers in Babylonia and Palestine. The Yemeni Himyarites converted to Judaism in the 4th century, and some of the Kinda were also converted in the 4th/5th century. Jewish tribes existed in all major Arabian towns during Muhammad's time including in Tayma and Khaybar as well as Medina with twenty tribes living in the peninsula. From tomb inscriptions, it is visible that Jews also lived in Mada'in Saleh and Al-'Ula. There is evidence that Jewish converts in the Hejaz were regarded as Jews by other Jews, as well as by non-Jews, and sought advice from Babylonian rabbis on matters of attire and kosher food. In at least one case, it is known that an Arab tribe agreed to adopt Judaism as a condition for settling in a town dominated by Jewish inhabitants. Some Arab women in Yathrib/Medina are said to have vowed to make their child a Jew if the child survived, since they considered the Jews to be people "of knowledge and the book" (ʿilmin wa-kitābin). Philip Hitti infers from proper names and agricultural vocabulary that the Jewish tribes of Yathrib consisted mostly of Judaized clans of Arabian and Aramaean origin. The key role played by Jews in the trade and markets of the Hejaz meant that market day for the week was the day preceding the Jewish Sabbath. This day, which was called aruba in Arabic, also provided occasion for legal proceedings and entertainment, which in turn may have influenced the choice of Friday as the day of Muslim congregational prayer. Toward the end of the sixth century, the Jewish communities in the Hejaz were in a state of economic and political decline, but they continued to flourish culturally in and beyond the region. They had developed their distinctive beliefs and practices, with a pronounced mystical and eschatological dimension. In the Islamic tradition, based on a phrase in the Quran, Arab Jews are said to have referred to Uzair as the son of Allah, although the historical accuracy of this assertion has been disputed. Jewish agriculturalists lived in the region of Eastern Arabia. According to Robert Bertram Serjeant, the Baharna may be the Arabized "descendants of converts from Christians (Arameans), Jews and ancient Persians (Majus) inhabiting the island and cultivated coastal provinces of Eastern Arabia at the time of the Arab conquest". From the Islamic sources, it seems that Judaism was the religion most followed in Yemen. Ya'qubi claimed all Yemenites to be Jews; Ibn Hazm however states only Himyarites and some Kindites were Jews. Christianity The main areas of Christian influence in Arabia were on the north eastern and north western borders and in what was to become Yemen in the south. The north west was under the influence of Christian missionary activity from the Roman Empire where the Ghassanids, a client kingdom of the Romans, were converted to Christianity. In the south, particularly at Najran, a centre of Christianity developed as a result of the influence of the Christian Kingdom of Axum based on the other side of the Red Sea in Ethiopia. Some of the Banu Harith had converted to Christianity. One family of the tribe built a large church at Najran called Deir Najran, also known as the "Ka'ba of Najran". Both the Ghassanids and the Christians in the south adopted Monophysitism. The third area of Christian influence was on the north eastern borders where the Lakhmids, a client tribe of the Sassanians, adopted Nestorianism, being the form of Christianity having the most influence in the Sassanian Empire. As the Persian Gulf region of Arabia increasingly fell under the influence of the Sassanians from the early third century, many of the inhabitants were exposed to Christianity following the eastward dispersal of the religion by Mesopotamian Christians. However, it was not until the fourth century that Christianity gained popularity in the region with the establishment of monasteries and a diocesan structure. In pre-Islamic times, the population of Eastern Arabia consisted of Christianized Arabs (including Abd al-Qays) and Aramean Christians among other religions. Syriac functioned as a liturgical language. Serjeant states that the Baharna may be the Arabized descendants of converts from the original population of Christians (Aramaeans), among other religions at the time of Arab conquests. Beth Qatraye, which translates "region of the Qataris" in Syriac, was the Christian name used for the region encompassing north-eastern Arabia. It included Bahrain, Tarout Island, Al-Khatt, Al-Hasa, and Qatar. Oman and what is today the United Arab Emirates comprised the diocese known as Beth Mazunaye. The name was derived from 'Mazun', the Persian name for Oman and the United Arab Emirates. Sohar was the central city of the diocese. In Nejd, in the centre of the peninsula, there is evidence of members of two tribes, Kinda and Taghlib, converting to Christianity in the 6th century. However, in the Hejaz in the west, whilst there is evidence of the presence of Christianity, it is not thought to have been significant amongst the indigenous population of the area. Arabicized Christian names were fairly common among pre-Islamic Arabians, which has been attributed to the influence that Syrianized Christian Arabs had on Bedouins of the peninsula for several centuries before the rise of Islam. Neal Robinson, based on verses in the Quran, believes that some Arab Christians may have held unorthodox beliefs such as the worshipping of a divine triad of God the father, Jesus the Son and Mary the Mother. Furthermore, there is evidence that unorthodox groups such as the Collyridians, whose adherents worshipped Mary, were present in Arabia, and it has been proposed that the Quran refers to their beliefs. However, other scholars, notably Mircea Eliade, William Montgomery Watt, G. R. Hawting and Sidney H. Griffith, cast doubt on the historicity or reliability of such references in the Quran. Their views are as follows: Mircea Eliade argues that Muhammad's knowledge of Christianity "was rather approximative" and that references to the triad of God, Jesus and Mary probably reflect the likelihood that Muhammad's information on Christianity came from people who had knowledge of the Monophysite Church of Abyssinia, which was known for extreme veneration of Mary. William Montgomery Watt points out that we do not know how far Muhammad was acquainted with Christian beliefs prior to the conquest of Mecca and that dating of some of the passages criticizing Christianity is uncertain. His view is that Muhammad and the early Muslims may have been unaware of some orthodox Christian doctrines, including the nature of the trinity, because Muhammad's Christian informants had a limited grasp of doctrinal issues. Watt has also argued that the verses criticizing Christian doctrines in the Quran are attacking Christian heresies like tritheism and "physical sonship" rather than orthodox Christianity. G. R. Hawting, Sidney H. Griffith and Gabriel Reynolds argue that the verses commenting on apparently unorthodox Christian beliefs should be read as an informed, polemically motivated caricature of mainstream Christian doctrine whose goal is to highlight how wrong some of its tenets appear from an Islamic perspective. See also Ancient Semitic religion Ancient Canaanite religion Book of Idols Hanif Religions of the ancient Near East Rahmanism Shirk (Islam) Taghut References Citations Sources Arabian mythology Arab culture History of Saudi Arabia Islamic mythology Pre-Islamic Arabia
[ 0.22967493534088135, 0.3670749068260193, -0.7646986842155457, -0.23081541061401367, -0.6454768180847168, 0.46219897270202637, 0.6689393520355225, 0.4479154348373413, -0.16456492245197296, -0.16349023580551147, -0.13249017298221588, 0.005840446799993515, -0.5186928510665894, 0.3495059013366...
15392
https://en.wikipedia.org/wiki/Imperial%20Conference
Imperial Conference
Imperial Conferences (Colonial Conferences before 1907) were periodic gatherings of government leaders from the self-governing colonies and dominions of the British Empire between 1887 and 1937, before the establishment of regular Meetings of Commonwealth Prime Ministers in 1944. They were held in 1887, 1894, 1897, 1902, 1907, 1911, 1921, 1923, 1926, 1930, 1932 and 1937. All the conferences were held in London, the seat of the Empire, except for the 1894 and 1932 conferences which were held in Ottawa, the capital of the senior Dominion of the Crown. The 1907 conference changed the name of the meetings to Imperial Conferences and agreed that the meetings should henceforth be regular rather than taking place while overseas statesmen were visiting London for royal occasions (e.g. jubilees and coronations). List of conferences Notable meetings Originally instituted to emphasise imperial unity, as time went on, the conferences became a key forum for dominion governments to assert the desire for removing the remaining vestiges of their colonial status. The conference of 1926 agreed to the Balfour Declaration, which acknowledged that the dominions would henceforth rank as equals to the United Kingdom, as members of the 'British Commonwealth of Nations'. The conference of 1930 decided to abolish the legislative supremacy of the British Parliament as it was expressed through the Colonial Laws Validity Act and other Imperial Acts. The statesmen recommended that a declaratory enactment of Parliament, which became the Statute of Westminster 1931, be passed with the consent of the dominions, but some dominions did not ratify the statute until some years afterwards. The 1930 conference was notable, too, for the attendance of Southern Rhodesia, despite it being a self-governing colony, not a dominion. Towards Commonwealth meetings As World War II drew to a close, Imperial Conferences were replaced by Commonwealth Prime Ministers' Conferences, with 17 such meetings occurring from 1944 until 1969, all but one of the meetings occurred in London. The gatherings were renamed Commonwealth Heads of Government Meetings (CHOGM) in 1971 and were henceforth held every two years with hosting duties rotating around the Commonwealth. See also British Empire Economic Conference (1932) Commonwealth Heads of Government Meeting First Colonial Conference Historiography of the British Empire Imperial War Cabinet Footnotes Further reading Keith, A.B. The Government of the British Empire (1935). Olson, James S., ed. Historical Dictionary of European Imperialism (1991) pp 292–300; Covers 1907, 1911, 1921, 1923, 1926 and 1932 Palmer, G.E.H. Constitution and Cooperation in the British Commonwealth (1934) Governance of the British Empire Diplomatic conferences in the United Kingdom Diplomatic conferences in Canada 19th-century diplomatic conferences 20th-century diplomatic conferences
[ -0.15368463099002838, -0.027735339477658272, 0.021006233990192413, -0.09450177103281021, -0.5980805158615112, 0.2043188363313675, 0.24655108153820038, 0.3119756877422333, -0.4280301034450531, -0.326186865568161, -0.39706140756607056, -0.043294601142406464, 0.2038058191537857, 0.75163012742...
15395
https://en.wikipedia.org/wiki/International%20Refugee%20Organization
International Refugee Organization
The International Refugee Organization (IRO) was an intergovernmental organization founded on 20 April 1946 to deal with the massive refugee problem created by World War II. A Preparatory Commission began operations fourteen months previously. In 1948, the treaty establishing the IRO formally entered into force and the IRO became a United Nations specialized agency. The IRO assumed most of the functions of the earlier United Nations Relief and Rehabilitation Administration. In 1952, operations of the IRO ceased, and it was replaced by the Office of the United Nations High Commissioner for Refugees (UNHCR). The Constitution of the International Refugee Organization, adopted by the United Nations General Assembly on 15 December 1946, is the founding document of the IRO. The constitution specified the organization's field of operations. Controversially, the constitution defined "persons of German ethnic origin" who had been expelled, or were to be expelled from their countries of birth into the postwar Germany, as individuals who would "not be the concern of the Organization." This excluded from its purview a group that exceeded in number all the other European displaced persons put together. Also, because of disagreements between the Western allies and the Soviet Union, the IRO only worked in areas controlled by Western armies of occupation. Twenty-six states became members of the IRO and it formally came into existence in 1948: Argentina, Australia, Belgium, Bolivia, Brazil, Canada, Republic of China, Chile, Denmark, the Dominican Republic, France, Guatemala, Honduras, Iceland, Italy, Liberia, Luxembourg, the Netherlands, New Zealand, Norway, Panama, Peru, the Philippines, Switzerland, the United Kingdom, the United States, and Venezuela. The U.S. provided about 40% of the IRO's $155 million annual budget. The total contribution by the members for the five years of operation was around $400 million. It had rehabilitated around 10 million people during this time, out of 15 million people who were stranded in Europe. The IRO's first Director-General was William Hallam Tuck, succeeded by J. Donald Kingsley on 31 July 1949. IRO closed its operations on 31 January 1952 and after a liquidation period, went out of existence on 30 September 1953. By that time many of its responsibilities had been assumed by other agencies. Of particular importance was the Office of the High Commissioner for Refugees, established in January 1951 as a part of the United Nations, and the Intergovernmental Committee for European Migration (originally PICMME), set up in December 1951. Filmography The Search by Fred Zinnemann (1948): The IRO helped the producers to make this story about children refugees, in 1945 Germany. References Further reading Holborn, Louise W. The International Refugee Organization: a specialized agency of the United Nations, its history and work, 1946–1952 (Oxford UP, 1956. 1956) online Holborn, Louise W. Philip Chartrand, and Rita Chartrand. Refugees, a problem of our time: the work of the United Nations High Commissioner for Refugees, 1951-1972 (Scarecrow Press, 1975). External links Records of the International Refugee Organization (IRO) at the United Nations Archives Constitution of the International Refugee Organisation Original, complete constitution of the IRO, assigned by the Government of the United Kingdom: https://treaties.un.org/doc/Publication/UNTS/Volume%2018/v18.pdf IRO. Area Vocational Training School. Ingolstadt, Bavaria, Germany 1948 United Nations specialized agencies Organizations established in 1946 Refugee aid organizations Displaced persons camps in the aftermath of World War II United Nations High Commissioner for Refugees Intergovernmental organizations established by treaty Organizations disestablished in 1952
[ -0.33140578866004944, 0.4271918535232544, -0.40856698155403137, -0.2077193707227707, -0.26656997203826904, 0.19093163311481476, 0.08673475682735443, 0.3394451439380646, -0.7130454182624817, -0.026492824777960777, -0.3158855736255646, 0.1183573305606842, -0.6944036483764648, 0.4904687404632...
15396
https://en.wikipedia.org/wiki/IRO
IRO
IRO, Iro, or iro may refer to: Organizations Institution of Railway Operators (Chartered Institution of Railway Operators since October 2021) Internal Revolutionary Organization, Bulgaria International Refugee Organization, a United Nations agency 1946–1952 International Rescue Dog Organisation Jewish Industrial Removal Office, an agency assisting European Jewish immigrants to the U.S. in the early 20th century People Given name Iro Haarla (born 1956), Finnish jazz musician Iro Ilk, German Luftwaffe pilot; recipient of the Knight's Cross of the Iron Cross Iro Konstantopoulou (1927–1944), Greek resistance member during World War II Iro Tembeck (1946–2004), Canadian dancer, choreographer, and dance historian Surname Andy Iro (born 1984), English footballer Edgar Iro (born 2000), Solomon Islands swimmer Hapilyn Iro (born 1992), Solomon Islands weightlifter Kayal Iro (born 2000), Cook Islands rugby league footballer Kevin Iro (born 1968), New Zealand rugby league footballer Tony Iro (born 1967), New Zealand rugby league footballer and coach Places Iro (South Sudan), a mountain Iro Lake, Chad Iro town in Obafemi Owode, Nigeria Other uses Birao Airport (IATA code) Inland Revenue Ordinance, a tax law in Hong Kong Japanese oiler Irō, an Imperial Japanese Navy fleet oiler 1922–1944 Mohawk hairstyle or iro See also Iroh, a fictional character in Avatar: The Last Airbender Lac Iro (disambiguation)
[ 0.23609907925128937, 0.12857574224472046, -0.0831182673573494, -0.009624822996556759, 0.09747694432735443, 0.05450757220387459, 0.15674401819705963, 0.15562868118286133, -0.4037895202636719, 0.3101867437362671, -0.4673623740673065, 0.4670274257659912, -0.46405404806137085, 0.28288507461547...
15401
https://en.wikipedia.org/wiki/Isabella%20d%27Este
Isabella d'Este
Isabella d'Este (19 May 1474 – 13 February 1539) was Marchioness of Mantua and one of the leading women of the Italian Renaissance as a major cultural and political figure. She was a patron of the arts as well as a leader of fashion, whose innovative style of dressing was copied by women throughout Italy and at the French court. The poet Ariosto labeled her as the "liberal and magnanimous Isabella", while author Matteo Bandello described her as having been "supreme among women". Diplomat Niccolò da Correggio went even further by hailing her as "The First Lady of the world". She served as the regent of Mantua during the absence of her husband, Francesco II Gonzaga, Marquess of Mantua, and the minority of her son, Federico, Duke of Mantua. In 1500, she met King Louis XII of France in Milan on a diplomatic mission to persuade him not to send his troops against Mantua. She was a prolific letter-writer and maintained a lifelong correspondence with her sister-in-law Elisabetta Gonzaga. Reportedly, Isabella possessed "lively eyes" and was "of lively grace". Isabella d'Este grew up in a cultured family in the city-state of Ferrara. She received a fine classical education and as a girl met many famous humanist scholars and artists. Due to the vast amount of extant correspondence between Isabella and her family and friends, her life is extremely well documented. Early life Isabella was born on Tuesday, 19 May 1474 at nine o'clock in the evening Isabella's mother wrote a letter to her friend Barbara Gonzaga describing the details of Isabella's birth</ref> in Ferrara, to Ercole I d'Este, Duke of Ferrara, and Eleanor of Naples. Eleanor was the daughter of Ferdinand I, the Aragonese King of Naples, and Isabella of Clermont. One year later on 29 June 1475, her sister Beatrice was born, and in 1476 and 1477 two brothers, Alfonso and Ferrante, were born. In 1479 and 1480 two more brothers were born; they were Ippolito and Sigismondo. Of all the children born into the family, Isabella was considered to have been the favourite. In the year of her brother Ferrante's birth, Isabella was among the children of the family who travelled to Naples with her mother. When her mother returned to Ferrara, Isabella accompanied her, while the other two children remained in Naples for many years: Beatrice was adopted by her grandfather, and her little brother Ferrante left under the tutelage of their uncle Alfonso. Education Because of her outstanding intellect, she often discussed the classics and the affairs of state with ambassadors. Moreover, she was personally acquainted with the painters, musicians, writers, and scholars who lived in and around the court. Besides her knowledge of history and languages, she could also recite Virgil and Terence by heart. Isabella was also a talented singer and musician, and was taught to play the lute by Giovanni Angelo Testagrossa. In addition to all these admirable accomplishments, she was also an innovator of new dances, having been instructed in the art by Ambrogio, a Jewish dancing master. Betrothal and marriage In 1480, at the age of six, Isabella was betrothed to the eight years older Francesco, the heir to the Marquess of Mantua. The Duke of Milan had requested her hand in marriage for his son, Ludovico, two weeks later. Instead, her sister, Beatrice was betrothed to Ludovico and became the Duchess of Milan. Her dowry amounted to 25,000 ducats. Although he was not handsome, Isabella admired Francesco for his strength and bravery; she also regarded him as a gentleman. After their first few encounters she found that she enjoyed his company and she spent the next few years getting to know him and preparing to be the Marchioness of Mantua. During their courtship, Isabella treasured the letters, poems, and sonnets he sent her as gifts. Ten years later on 11 February 1490, at age 15, she married Francesco by proxy. By then, he had succeeded to the marquisate. Besides being the Marquess, Francesco was captain general of the armies of the Republic of Venice. Isabella became his wife and marchioness amid a spectacular outpouring of popular acclamation and a grand celebration that took place on 15 February. She brought as her marriage portion the sum of 3,000 ducats as well as valuable jewellery, dishes, and a silver service. Prior to the magnificent banquet which followed the wedding ceremony, Isabella rode through the main streets of Ferrara astride a horse draped in gems and gold. Relations with Milan In 1491 Isabella went with a small entourage to Brescello and from there to Pavia, to accompany her sister Beatrice who was married to Ludovico il Moro. On this occasion she saw again - since she had already known him as a child in Ferrara - Galeazzo Sanseverino, with whom she undertook a dense, and at times humorous, exchange of letters. Between the two immediately ignited a dispute, destined to last for months, on who was the best paladin, Orlando or Rinaldo: Galeazzo supported the first, the sisters d'Este the second. Galeazzo, who exercised a strong fascination, soon managed to convert them both to orlando's faith, but Isabella, once back in Mantua, returned to prefer Rinaldo, so that Galeazzo remembered her as "I alone was enough to make her change her mind and cry out Rolando! Rolando!", invited her to follow her sister's example and swore that he would convert her a second time, as soon as they met again. Isabella jokingly replied that she would then bring a frog to offend him, and the dispute went on for a long time. On February 11, speaking to her about the amusements he had with Beatrice, he wrote to her: "I will also strive to improve in order to give greater pleasure to the S. V., when I come for her this summer", and lamented the lack of "his sweet company". Isabella's presence was in fact much desired in Milan, not only by Galeazzo but also by her sister, Ludovico and the other courtiers, however the Marquise was able to go there a few times, as her husband Francesco was wary of sending it to her, judging that in that court too many "madness" were committed, and perhaps also out of jealousy of Ludovico. Despite the affection, Isabella began to feel envy for her sister Beatrice, first for the very fortunate marriage that had touched her and for the enormous riches, then for the two sons in perfect health who were born to her a short time later, while she seemed unable to have children, and in this aroused the concerns of her mother Eleonora, who continually exhorted her in letters to be as close as possible to her husband. A certain hatred can also be seen in a letter to his mother dating back to his visit to Pavia in August 1492, when, speaking of Beatrice, he wrote: "she is not a greater than me, but she is much bigger!", not being able yet to know, perhaps, that the sister's coarseness was due to the incipient pregnancy. These frictions were perhaps also linked to the fact that Ludovico had initially asked for Isabella's hand, in 1480, and that this had not been possible because, only a few days earlier, Duke Ercole had officially promised it to Francesco Gonzaga. Despite everything, in 1492 she was very close to Beatrice in a difficult moment of her pregnancy, that is when she was suddenly struck by an attack of malarial fevers, and in 1495 she went again to Milan to assist her sister in her second birth and also baptized her nephew Francesco. In the summer of 1494, on the occasion of the descent of the French into Italy, Beatrice invited her sister to Milan to kiss Gilbert of Montpensier and others of the royal house, according to the custom French. Secretary Benedetto Capilupi reported: In fact, it does not seem that Beatrice had any conflicting feelings towards Isabella, nor that she saw with a bad eye the complicity between the latter and her husband Ludovico. The Moro in fact, who was of generous nature, often gave Isabella even very expensive gifts: once he sent her fifteen arms of a fabric so precious as to cost forty ducats on her arm - an amazing sum - saying that he had already made a dress for Beatrice. After the death of his wife, which took place in 1497, Ludovico came to allude to a secret relationship with Isabella, claiming that it was out of jealousy of his wife that the Marquis Francesco played a double game between him and the Lordship of Venice. The rumor was however promptly denied by his father Ercole. Others instead defined Beatrice's attitude towards her sister as "complexed second child" because in the letter of congratulations to Isabella for the birth of little Eleonora - who, being female, incredibly disappointed her mother - she added the greetings of her little son Hercules to "soa cusina", despite not having the child yet turned one year of age, something that historians such as Luciano Chiappini interpreted as a sort of mockery, of "refined malice", "a slap given with grace and grace". In fact, if Isabella was always the daughter most loved by her parents, Beatrice had been ceded to her grandfather, and only with the birth of the firstborn had she obtained her own revenge. Having also received different educations, the two sisters were the opposite of each other: Isabella, more like her mother, was sweet, graceful and a lover of tranquility; Beatrice, more like her father, was impetuous, adventurous and aggressive. However, they were united by the desire to excel in everything. A difficult marriage As the couple had known and admired one another for many years, their mutual attraction deepened into love. Reportedly, marriage to Francesco caused Isabella to "bloom". At the time of her wedding, Isabella was said to have been pretty, slim, graceful, and well-dressed. Her long, fine hair was dyed a fashionable pale blonde and her eyes were described as "brown as fir cones in autumn, scattered laughter". The relationship with her husband over the years often proved to be tense, at times very tense, both for the political differences between the two and for the difficulty in procreating a male heir. In truth, Francesco for his part was always very proud of his daughters and never showed himself disappointed, indeed from the beginning he declared himself in love with the firstborn Eleonora, born in 1493, despite the absolute disappointment of Isabella who refused her daughter, who was then very lovingly educated by her sister-in-law Elisabetta, who because of her husband's impotence never had children. When in 1496 the second daughter Margherita was born, Isabella was so angry that she wrote to her husband, who was then fighting the French in Calabria, a letter in which she blamed him, declaring that she did nothing but reap the fruits of his sown. Francis replied that he was instead very happy with the birth of his daughter - who, however, did not have time to know, having died in swaddling clothes - and indeed forbade anyone to show discontent with it. Only in 1500 was finally born the long-awaited son Federico, who was the most loved by Isabella. In his capacity of captain general of the Venetian armies, Francesco often was required to go to Venice for conferences that left Isabella in Mantua on her own at La Reggia, the ancient palace that was the family seat of the Gonzagas. She did not lack company, however, as she passed the time with her mother and with her sister, Beatrice. Upon meeting Elisabetta Gonzaga, her 18-year-old sister-in-law, the two women became close friends. They enjoyed reading books, playing cards, and travelling about the countryside together. Once they journeyed as far as Lake Garda during one of Francesco's absences, and later travelled to Venice. They maintained a steady correspondence until Elisabetta's death in 1526. Almost four years after her marriage in December 1493, Isabella gave birth to her first child out of an eventual total of eight. She was a daughter, Eleonora, whom they called Leonora for short, after Isabella's mother, Eleonora of Naples. Children Together Isabella and Francesco had eight children: Eleonora Gonzaga (31 December 1493 – 13 February 1570), married Francesco Maria I della Rovere, Duke of Urbino, by whom she had issue Margherita Gonzaga (13 July 1496 – 22 September 1496) Federico II Gonzaga, Duke of Mantua (17 May 1500 – 28 August 1540), married Margaret Paleologa, by whom he had issue Livia Gonzaga (1501 – January 1508) Ippolita Gonzaga (13 November 1503 – 16 March 1570), who became a nun Ercole Gonzaga (23 November 1505 – 2 March 1563), Cardinal, Bishop of Mantua Ferrante Gonzaga (28 January 1507 – 15 November 1557), a condottiero; married Isabella di Capua, by whom he had issue Livia Gonzaga (August 1508 – 1569), who became a nun Lucrezia Borgia A year after her 1502 marriage to Isabella's brother Alfonso, the notorious Lucrezia Borgia became the mistress of Francesco. At about the same time, Isabella had given birth to a daughter, Ippolita, and she continued to bear him children throughout Francesco and Lucrezia's long, passionate affair, which was more sexual than romantic. Lucrezia had previously made overtures of friendship to Isabella which the latter had coldly and disdainfully ignored. From the time Lucrezia had first arrived in Ferrara as Alfonso's intended bride, Isabella, despite having acted as hostess during the wedding festivities, had regarded Lucrezia as a rival, whom she sought to outdo at every opportunity. Francesco's affair with Lucrezia, whose beauty was renowned, caused Isabella much jealous suffering and emotional pain. The liaison ended when he contracted syphilis as a result of encounters with prostitutes. Regency Isabella played an important role in Mantua during troubled times for the city. When her husband was captured in 1509 and held hostage in Venice, she took control of Mantua's military forces and held off the invaders until his release in 1512. In the same year, 1512, she was the hostess at the Congress of Mantua, which was held to settle questions concerning Florence and Milan. As a ruler, she appeared to have been much more assertive and competent than her husband. When apprised of this fact upon his return, Francesco was furious and humiliated at being surpassed by his wife's superior political ability. This caused their marriage to break down irrevocably. As a result, Isabella began to travel freely and live independently from her husband until his death on 19 March 1519. After the death of her husband, Isabella ruled Mantua as regent for her son Federico. She began to play an increasingly important role in Italian politics, steadily advancing Mantua's position. She was instrumental in promoting Mantua to a Duchy, which was obtained by wise diplomatic use of her son's marriage contracts. She also succeeded in obtaining a cardinalate for her son Ercole. She further displayed shrewd political acumen in her negotiations with Cesare Borgia, who had dispossessed Guidobaldo da Montefeltro, duke of Urbino, the husband of her sister-in-law and good friend Elisabetta Gonzaga in 1502. Widowhood "Devoted head of state" As a widow, Isabella at the age of 45 became a "devoted head of state". Her position as a Marquise required her serious attention, therefore she was required to study the problems faced by a ruler of a city-state. To improve the well-being of her subjects she studied architecture, agriculture, and industry, and followed the principles that Niccolò Machiavelli had set forth for rulers in his book The Prince. In return, the people of Mantua respected and loved her. Isabella left Mantua for Rome in 1527. She was present during the catastrophic Sack of Rome, when she converted her house into an asylum for approximately 2,000 people fleeing the Imperial soldiers. Isabella's house was one of the very few that was not attacked because her son was a member of the invading army. When she left Rome, she managed to acquire safe passage for all the refugees who had sought refuge in her home. Later years and death Once Rome became stabilized following the sacking, she left the city and returned to Mantua. She made it a centre of culture, started a school for girls, and turned her ducal apartments into a museum containing the finest art treasures. This was not enough to satisfy Isabella, already in her mid-sixties, so she returned to political life and ruled Solarolo, in Romagna until her death on 13 February 1539. She was buried beside her husband in the Church of San Francesco in Mantua. Cultural pursuits Isabella d'Este is famous as the most important art patron of the Renaissance; her life is documented by her correspondence, which remains archived in Mantua (approximately 28,000 letters received and copies of approximately 12,000 letters written). Art patronage In painting she had numerous famous artists of the time work for her, including Giovanni Bellini, Giorgione, Leonardo da Vinci, Andrea Mantegna (court painter until 1506), Perugino, Raphael, Titian, Antonio da Correggio, Lorenzo Costa (court painter from 1509), Dosso Dossi, Francesco Francia, Giulio Romano, and many others. For instance her 'Studiolo' in the Ducal Palace, Mantua, was decorated with allegories by Mantegna, Perugino, Costa, and Correggio. It is suggested that she requested a specific painting for her studio from da Vinci that is known as La Scapigliata and may have given it to her son Federico II on the occasion of his wedding to Margaret Paleologa. In parallel she contracted the most important sculptors and medallists of her time, i.e. Michelangelo, Pier Jacopo Alari Bonacolsi (L'Antico), Gian Cristoforo Romano, and Tullio Lombardo. She also collected ancient Roman art. For what concerns writers, she was in contact with Pietro Aretino, Ludovico Ariosto, Pietro Bembo, Baldassare Castiglione, Mario Equicola, Gian Giorgio Trissino, and others. In music Isabella sponsored the composers Bartolomeo Tromboncino and Marco Cara and she played the lute. Unusually, she employed women as professional singers at her court, including Giovanna Moreschi, the wife of Marchetto Cara. In the architecture field, she could not afford new palaces, however she commissioned architects such as Biagio Rossetti and Battista Covo. Being a leader of fashion, she ordered the finest clothing, including furs as well as the newest distillations of perfume, from which she concocted original perfumes that she sent as presents. Her style of dressing in caps ('capigliari') and plunging décolletage was imitated throughout Italy and at the French court. Relationship with Leonardo's Mona Lisa Isabella d'Este has been proposed as a plausible candidate as the subject of Leonardo's Mona Lisa of c. 1503–1506, usually considered a portrait of Lisa del Giocondo. (Lisa was the wife of a merchant in Florence and Giorgio Vasari wrote of her portrait by Leonardo, – in debate that persists about whether this is the portrait now known as the 'Mona Lisa'.) Evidence in favor of Isabella as the subject of the famous work includes Leonardo's drawing 'Isabella d'Este' from 1499 and her letters of 1501–1506 requesting the promised painted portrait. Further arguments focus upon the mountains in the background indicating the native origin of the subject, and the armrest in the painting as a Renaissance symbol used to identify a portrait as that of a sovereign. Potential portrait identifications Despite her significant art patronage that included a number of portraits – reportedly, no other person of her time was portrayed so often as she was – there are very few surviving portraits that may be identified as Isabella. These few identifications are known as inhomogeneous (i.e. differing eye and hair colours as well as divergent eyebrows in two Titian portraits) and there are no known images of her between the ages of 26 and 54 (see image). It is known that the elderly Isabella preferred idealized paintings and even waived sitting as a model. However, it may be presumed that she insisted nonetheless on seeing her personal characteristics in the outcome, as one portrait by Andrea Mantegna was rejected because it "looked nothing at all like us". In recent years several museums have withdrawn their few identifications of portraits as Isabella because of concern about possible misidentification. The remaining three colourful portraits are still inhomogeneous (Kunsthistorisches Museum/KHM, Vienna): Isabella in Red by Titian, c. 1529 (lost, known from a copy by Peter Paul Rubens c. 1605) Isabella in Black by Titian, 1536 "Ambras Miniature", 16th century La Bella (now in Palazzo Pitti, Florence) has been discussed as an alternative to Titian's 1536 portrait in Vienna, because the commission from the 60-year-old patron was for a rejuvenated portrait; if La Bella were Isabella, eye colour, hair colour, eyebrows, and general appearance would homogenize in all known portraits, allowing potential links toward further identifications. At present the 1495 medal by Gian Cristoforo Romano (several extant copies) is the only reliable identification because of the inscription created during Isabella's lifetime. Diplomatic missions Isabella had met the French king in Milan in 1500 on a successful diplomatic mission that she had undertaken to protect Mantua from French invasion. Louis had been impressed by her alluring personality and keen intelligence. It was while she was being entertained by Louis, whose troops occupied Milan, that she offered asylum to Milanese refugees including Cecilia Gallerani, the refined mistress of her sister Beatrice's husband, Ludovico Sforza, Duke of Milan, who had been forced to leave his duchy in the wake of French occupation. Isabella presented Cecilia to King Louis, describing her as a "lady of rare gifts and charm". Household slaves Correspondence exchanged by Isabella documents the Renaissance European tendency to perceive black African slaves as exotic. Isabella's pursuit of a black child as a servant is extensively documented. On 1 May 1491 Isabella asked Giorgio Brognolo, her agent in Venice, to procure a young black girl ('una moreta') between the ages of one-and-a-half and four, and twice in early June reminded him of the request, emphasizing that the girl should be 'as black as possible'. Isabella's household and financial records reflect that she already had a significantly older black girl in her service when she inquired after a younger black child. Records also reflect that she obtained a little black girl from a Venetian orphanage. She opened negotiations with a Venetian patrician household for the sale of a little black boy and purchased an enslaved little black girl from her sister. Legacy During her lifetime and after her death, poets, popes, and statesmen paid tribute to Isabella. Pope Leo X invited her to treat him with "as much friendliness as you would your brother". The latter's secretary Pietro Bembo described her as "one of the wisest and most fortunate of women". The poet Ariosto deemed her the "liberal and magnanimous Isabella". Author Matteo Bandello wrote that she was "supreme among women", and the diplomat Niccolò da Correggio entitled her "The First Lady of the world". Judgments less imbued with praise, indeed very harsh, were instead expressed by Pietro Aretino, who in his own work defines her as "monstrous Marquise of Mantua, which has ebony teeth, ivory eyelashes, dishonestly ugly and archdisonestically embellished". Pope Julius II, a man of corrupt morals, in disagreement with Isabella's conduct, even went so far as to call her "that ribald whore". A not dissimilar judgment had also expressed her husband Francesco himself who, now a prisoner of the Venetians, accused his wife of not loving him and of having indeed been the cause of his ruin, referring to her by letter as "that whore of my wife". Depiction in modern media The artwork The Dinner Party by Judy Chicago features a place setting for Isabella d'Este. Isabella d'Este was portrayed by Belgian actress Alexandra Oppo in the television show Borgia (2011–2014). References Bibliography Further reading George, L., The Public Perception of Isabella d'Este, Clio History Journal, 2009. I camerini di Isabella d'Este Mantua tourist guide. 1474 births 1539 deaths Isabella Isabella 16th-century women rulers Regents of Mantua 16th-century Italian nobility 16th-century Italian women Italian Renaissance people Italian art patrons Italian salon-holders Renaissance women Italian letter writers Women letter writers
[ -0.8781843185424805, -0.47878190875053406, 0.8659443259239197, 0.13105961680412292, -0.45733779668807983, 0.6012616157531738, 0.001992336940020323, 0.2721724212169647, -0.6460532546043396, -0.6275357007980347, -0.18460382521152496, 0.3456680178642273, 0.15190178155899048, 0.509741604328155...
15402
https://en.wikipedia.org/wiki/International%20standard
International standard
An international standard is a technical standard developed by one or more international standards organizations. International standards are available for consideration and use worldwide. The most prominent such organization is the International Organization for Standardization (ISO). Other prominent international standards organizations include the International Telecommunication Union (ITU) and the International Electrotecal Commission (IEC). Together, these three organizations have formed the World Standards Cooperation alliance. Purpose International standards may be used either by direct application or by a process of modifying an international standard to suit local conditions. Adopting international standards results in creating national standards that are equivalent, or substantially the same as international standards in technical content, but may have (i) editorial differences as to appearance, use of symbols and measurement units, substitution of a point for a comma as the decimal marker, and (ii) differences resulting from conflicts in government regulations or industry-specific requirements caused by fundamental climatic, geographic, technologic, or infrastructure factors, or the stringency of safety requirements that a given standard authority considers appropriate. International standards are one way to overcome technical barriers in international commerce caused by differences among technical regulations and standards developed independently and separately by each nation, national standards organization, or business. Technical barriers arise when different groups come together, each with a large user base, doing some well established thing that between them is mutually incompatible. Establishing international standards is one way of preventing or overcoming this problem. To support this, the World Trade Organization (WTO) Technical Barriers to Trade (TBT) Committee published the "Six Principles" guiding members in the development of international standards. History Standardization The implementation of standards in industry and commerce became highly important with the onset of the Industrial Revolution and the need for high-precision machine tools and interchangeable parts. Henry Maudslay developed the first industrially practical screw-cutting lathe in 1800, which allowed for the standardisation of screw thread sizes for the first time. Maudslay's work, as well as the contributions of other engineers, accomplished a modest amount of industry standardization; some companies' in-house standards spread a bit within their industries. Joseph Whitworth's screw thread measurements were adopted as the first (unofficial) national standard by companies around the country in 1841. It came to be known as the British Standard Whitworth, and was widely adopted in other countries. By the end of the 19th century differences in standards between companies were making trade increasingly difficult and strained. The Engineering Standards Committee was established in London in 1901 as the world's first national standards body. After the First World War, similar national bodies were established in other countries. The Deutsches Institut für Normung was set up in Germany in 1917, followed by its counterparts, the American National Standard Institute and the French Commission Permanente de Standardisation, both in 1918. There are not many books that cover standards in general but a book written in 2019 by Nicholas Rich and Tegwen Malik gives a very comprehensive overview of the history of standards, how ISO standards are drafted along with key ISO standards such as ISO 9001 and ISO 14001. A paper has been published explaining the differences between international standards and private standards. International organizations One of the most well established international standardization organizations is the International Telecommunication Union (ITU), a Specialized Agency of the United Nations which was founded on 17 May 1865 as the International Telegraph Union. The ITU was initially focused on the standardization of telegraph signals, and later evolved to include telephony, radio and satellite communications, and other information and communication technology. By the mid to late 19th century, efforts were being made to standardize electrical measurement. An important figure was R. E. B. Crompton, who became concerned by the large range of different standards and systems used by electrical engineering companies and scientists in the early 20th century. Many companies had entered the market in the 1890s and all chose their own settings for voltage, frequency, current and even the symbols used on circuit diagrams. Adjacent buildings would have totally incompatible electrical systems simply because they had been fitted out by different companies. Crompton could see the lack of efficiency in this system and began to consider proposals for an international standard for electric engineering. In 1904, Crompton represented Britain at the Louisiana Purchase Exposition in St. Louis as part of a delegation by the Institute of Electrical Engineers. He presented a paper on standardisation, which was so well received that he was asked to look into the formation of a commission to oversee the process. By 1906 his work was complete and he drew up a permanent constitution for the first international standards organization, the International Electrotechnical Commission. The body held its first meeting that year in London, with representatives from 14 countries. In honour of his contribution to electrical standardisation, Lord Kelvin was elected as the body's first President. The International Federation of the National Standardizing Associations (ISA) was founded in 1926 with a broader remit to enhance international cooperation for all technical standards and specifications. The body was suspended in 1942 during World . After the war, ISA was approached by the recently formed United Nations Standards Coordinating Committee (UNSCC) with a proposal to form a new global standards body. In October 1946, ISA and UNSCC delegates from 25 countries met in London and agreed to join forces to create the new International Organization for Standardization (ISO); the new organization officially began operations in February 1947. See also International Electrotechnical Commission International Organization for Standardization International Telecommunication Union List of international common standards List of technical standard organisations Standardization Standards organization Technical standard World Standards Cooperation World Standards Day (14 October annually) References External links
[ 0.5515387654304504, 0.19713978469371796, 0.10870815068483353, 0.18468579649925232, -0.07153447717428207, -0.4058634042739868, -0.14698773622512817, 0.31644368171691895, -0.32661598920822144, -0.36186084151268005, -0.4357143044471741, 0.2930167317390442, 0.013591027818620205, 0.249273002147...
15403
https://en.wikipedia.org/wiki/ISO%204217
ISO 4217
ISO 4217 is a standard published by International Organization for Standardization (ISO) that defines alpha codes and numeric codes for the representation of currencies and provides information about the relationships between individual currencies and their minor units. This data is published in three tables: Table A.1 – Current currency & funds code list Table A.2 – Current funds codes Table A.3 – List of codes for historic denominations of currencies & funds The first edition of ISO 4217 was published in 1978. The tables, history and ongoing discussion are maintained by SIX Interbank Clearing on behalf of ISO and the Swiss Association for Standardization. The ISO 4217 code list is used in banking and business globally. In many countries the ISO 4217 alpha codes for the more common currencies are so well known publicly that exchange rates published in newspapers or posted in banks use only these to delineate the currencies, instead of translated currency names or ambiguous currency symbols. ISO 4217 alpha codes are used on airline tickets and international train tickets to remove any ambiguity about the price. Alpha codes National currencies In the case of national currencies, the first two letters of the alpha code are the two letters of the ISO 3166-1 alpha-2 country code and the third is usually the initial of the currency itself. So Japan's currency code is JPY—JP for Japan and Y for yen. This eliminates the problem caused by the names dollar, franc, peso and pound being used in dozens of countries, each having significantly differing values. In some cases, the third letter of the alpha code is not the initial letter of the currency name. There are two possible reasons for this to happen: It is considered important that the code of a completely new currency be highly mnemonic. An example is the assignment of the code EUR to the euro. ISO 4217 amendment 94, which created this code, states “The code element 'EU' has been reserved by the ISO 3166 Maintenance Agency for use within ISO 4217 where 'R' has been appended to make an acceptable mnemonic code.”. Here the R comes from the third letter in the word “euro”. The currency in question is replacing another currency of the same name, due to devaluation. So that the two currencies have different codes, a different third letter must be chosen for the code of the new currency. In some cases, the third letter is the initial for "new" in that country's language, to distinguish it from an older currency that was revalued; the code sometimes outlasts the usage of the term "new" itself (for example, the code for the Mexican peso is MXN). Another solution to a devalued currency having the same name as its predecessor is to choose a third letter which results in a 3-letter code with mnemonic significance. For example, the Russian ruble changed from RUR to RUB following a devaluation, where the B comes from the third letter in the word "ruble". X currencies In addition to codes for most active national currencies ISO 4217 provides codes for "supranational" currencies, procedural purposes, and several things which are "similar to" currencies: Codes for the precious metals gold (XAU), silver (XAG), palladium (XPD), and platinum (XPT) are formed by prefixing the element's chemical symbol with the letter "X". These "currency units" are denominated as one troy ounce of the specified metal as opposed to "USD 1" or "EUR 1". The code XTS is reserved for use in testing. The code XXX is used to denote a "transaction" involving no currency. There are also codes specifying certain monetary instruments used in international finance, e.g. XDR is the symbol for special drawing right issued by the International Monetary Fund. The codes for most supranational currencies, such as the East Caribbean dollar, the CFP franc, the CFA franc BEAC and the CFA franc BCEAO. The predecessor to the euro, the European Currency Unit (ECU), had the code XEU. The use of an initial letter "X" for these purposes is facilitated by the ISO 3166 rule that no official country code beginning with X will ever be assigned. The inclusion of EU (denoting the European Union) in the ISO 3166-1 reserved codes list allows the euro to be coded as EUR rather than assigned a code beginning with X, even though it is a supranational currency. Numeric codes ISO 4217 also assigns a three-digit numeric code to each currency, much like the three-digit numeric code assigned to each country by ISO 3166. The numeric code assigned to a currency by ISO 4217 is usually the same as the numeric code assigned to the corresponding country by ISO 3166-1. For example, USD (United States dollar) has numeric code 840 which is also the numeric code for the US (United States). Minor units of currency The 2008 (7th) edition of ISO 4217 says the following about minor units of currency: Examples for the ratios of 100:1 and 1 000:1 include the United States dollar and the Bahraini dinar, for which the column headed “Minor unit” shows “2” and “3”, respectively. , two currencies have non-decimal ratios, the Mauritanian ouguiya and the Malagasy ariary; in both cases the ratio is 5:1. For these, the “Minor unit” column shows the number “2”. Some currencies, such as the Burundian franc, do not in practice have any minor currency unit at all. These show the number “0”, as with currencies whose minor units are unused due to negligible value. Position of ISO 4217 code in amounts The ISO standard does not regulate either the spacing, prefixing or suffixing in usage of currency codes. According however to the European Union's Publication Office, in English, Irish, Latvian and Maltese texts, the ISO 4217 code is to be followed by a hard space and the amount: a sum of EUR 30 In Bulgarian, Croatian, Czech, Danish, Dutch, Estonian, Finnish, French, German, Greek, Hungarian, Italian, Lithuanian, Polish, Portuguese, Romanian, Slovak, Slovene, Spanish and Swedish the order is reversed; the amount is followed by a hard space and the ISO 4217 code: une somme de 30 EUR Note that, as illustrated, the order is determined not by the currency but by the native language of the document context. History In 1973, the ISO Technical Committee 68 decided to develop codes for the representation of currencies and funds for use in any application of trade, commerce or banking. At the 17th session (February 1978), the related UN/ECE Group of Experts agreed that the three-letter alphabetic codes for International Standard ISO 4217, "Codes for the representation of currencies and funds", would be suitable for use in international trade. Over time, new currencies are created and old currencies are discontinued. Such changes usually originate from the formation of new countries, treaties between countries on shared currencies or monetary unions, or redenomination from an existing currency due to excessive inflation. As a result, the list of codes must be updated from time to time. The ISO 4217 maintenance agency (MA), SIX Interbank Clearing, is responsible for maintaining the list of codes. Active codes The following is a list of active codes of official ISO 4217 currency names . In the standard the values are called "alphabetic code", "numeric code", "minor unit", and "entity". USD/USN, two currency codes belonging to the US The US dollar has two codes assigned: USD and USN (next day). The USS (same day) code is not in use any longer, and was removed from the list of active ISO 4217 codes in March 2014. According to UN/CEFACT recommendation 9, paragraphs 8–9 ECE/TRADE/203, 1996: 8. In applications where monetary resources associated with a currency (i.e. funds) need not be specified and where a field identifier indicating currency is used, the first two (leftmost) characters are sufficient to identify a currency—example: US for United States dollars for general, unspecified purposes where a field identifier indicating currency is present. (A field identifier can be a preprinted field heading in an aligned document or a similarly-agreed application in electronic transmission of data.) 9. In applications where there is a need to distinguish between types of currencies, or where funds are required as in the banking environment, or where there is no field identifier, the third (rightmost) character of the alphabetic code is an indicator, preferably mnemonic, derived from the name of the major currency unit or fund—example: USD for general, unspecified purposes; USN for United States dollar next-day funds, and USS for funds which are immediately available for Federal Reserve transfer, withdrawal in cash or transfer in like funds (same-day funds). Since there is no need for such a distinction in international trade applications, the funds codes have not been included in the Annex to the present Recommendation. Non ISO 4217 currencies Currencies without ISO 4217 currency codes A number of active currencies do not have an ISO 4217 code, because they may be: (1) a minor currency pegged at par (1:1) to a larger currency, even if independently regulated, (2) a currency only used for commemorative banknotes or coins, or (3) a currency of an unrecognized or partially recognized state. These currencies include: Abkhazian apsar Alderney pound (1:1 pegged to the pound sterling) Artsakh dram Cook Islands dollar (1:1 pegged to the New Zealand dollar) Faroese króna (1:1 pegged to the Danish krone) Guernsey pound (1:1 pegged to the pound sterling) Isle of Man pound (1:1 pegged to the pound sterling) Jersey pound (1:1 pegged to the pound sterling) Kiribati dollar (1:1 pegged to the Australian dollar) Maltese scudo (1:0.24 pegged to the euro) Sahrawi peseta (pegged to the euro), sometimes given the code "EHP" but this has not been assigned by the ISO Somaliland shilling (state of issue is viewed as de jure part of Somalia, exchange rate not fixed) Transnistrian ruble (state of issue is viewed as de jure part of Moldova) Tuvaluan dollar (1:1 pegged to the Australian dollar) Zimbabwean bonds RTGS dollar (ZWL occasionally used) See :Category:Fixed exchange rate for a list of all currently pegged currencies. Unofficial currency codes Despite having no official recognition in ISO 4217, the following non-ISO codes are sometimes used locally or commercially. The following non-ISO codes were used in the past. Unofficial codes for minor units of currency Minor units of currency (also known as currency subdivisions or currency subunits) are often used for pricing and trading stocks and other assets, such as energy, but are not assigned codes by ISO 4217. Two conventions for representing minor units are in widespread use: Replacing the third letter of the ISO 4217 Code of the parent currency with an upper-case "X". Examples are GBX for Penny Sterling, USX for the US Cent, EUX for the Euro Cent. Replacing the third letter of the ISO 4217 Code of the parent currency with the first letter of the name of the minor unit, using lower-case. Examples are GBp for Penny Sterling, USc for the US Cent, EUc for the Euro Cent. A third convention is similar to the second one but uses an upper-case letter, e.g. ZAC for the South African Cent. This convention is not in widespread use as it would result in clashes, e.g. between GBP for Pound Sterling and GBP for Penny Sterling. Unofficial codes for cryptocurrencies Recently, cryptocurrencies have unofficially used ISO-like codes on various cryptocurrency exchanges, for instance LTC for Litecoin, NMC for Namecoin and XRP for the XRP Ledger. SIX Interbank Clearing (a Maintenance Agency of ISO) is currently studying the effect and role of cryptocurrencies and other independent currencies on ISO 4217. Historical currency codes A number of currencies had official ISO 4217 currency codes and currency names until their replacement by another currency. The table below shows the ISO currency codes of former currencies and their common names (which do not always match the ISO 4217 names). See also List of circulating currencies Currency Tables of historical exchange rates List of international trade topics SWIFT codes International currency sign Notes References External links The official list of ISO 4217 alphabetic and numeric codes ISO 4217 Maintenance Agency An older list of ISO 4217 alphabetic codes that contains some history of ISO 4217 (PDF file) Another list of numeric and alphabetic ISO 4217 currency codes Position of the ISO code or euro sign in amounts List of all currencies with names and ISO 4217 codes in all languages and all data formats Currency symbols Financial metadata Encodings International trade 04217 Financial regulation Financial routing standards
[ -0.22857297956943512, 0.49750158190727234, -0.02547449991106987, -0.273766428232193, 0.293332576751709, 0.1332981288433075, 0.19799993932247162, 0.2969062626361847, -0.40661856532096863, 0.06936848908662796, -0.6984200477600098, 0.21398569643497467, -0.3831901252269745, 0.04014481604099274...
15406
https://en.wikipedia.org/wiki/Irgun
Irgun
The Irgun (; full title: , lit. "The National Military Organization in the Land of Israel") was a Zionist paramilitary organization that operated in Mandate Palestine between 1931 and 1948. The organization is also referred to as Etzel (), an acronym of the Hebrew initials, or by the abbreviation IZL. It was an offshoot of the older and larger Jewish paramilitary organization Haganah (Hebrew: , Defence). When the group broke from the Haganah it became known as the Haganah Bet (Hebrew: literally "Defense 'B' " or "Second Defense", ), or alternatively as haHaganah haLeumit () or Hama'amad (). Irgun members were absorbed into the Israel Defense Forces at the start of the 1948 Arab–Israeli war. The Irgun policy was based on what was then called Revisionist Zionism founded by Ze'ev Jabotinsky. According to Howard Sachar, "The policy of the new organization was based squarely on Jabotinsky's teachings: every Jew had the right to enter Palestine; only active retaliation would deter the Arabs; only Jewish armed force would ensure the Jewish state". Two of the operations for which the Irgun is best known are the bombing of the King David Hotel in Jerusalem on 22 July 1946 and the Deir Yassin massacre, carried out together with Lehi on 9 April 1948. The Irgun has been viewed as a terrorist organization or organization which carried out terrorist acts. Specifically the organization "committed acts of terrorism and assassination against the British, whom it regarded as illegal occupiers, and it was also violently anti-Arab" according to the Encyclopædia Britannica. In particular the Irgun was described as a terrorist organization by the United Nations, British, and United States governments; in media such as The New York Times newspaper; as well as by the Anglo-American Committee of Inquiry, the 1946 Zionist Congress and the Jewish Agency. However, academics such as Bruce Hoffman and Max Abrahms have written that the Irgun went to considerable lengths to avoid harming civilians, such as issuing pre-attack warnings; according to Hoffman, Irgun leadership urged "targeting the physical manifestations of British rule while avoiding the deliberate infliction of bloodshed." Albert Einstein, in a letter to the New York Times in 1948, compared Irgun and its successor Herut party to "Nazi and Fascist parties" and described it as a "terrorist, right wing, chauvinist organization". Irgun's tactics appealed to many Jews who believed that any action taken in the cause of the creation of a Jewish state was justified, including terrorism. The Irgun was a political predecessor to Israel's right-wing Herut (or "Freedom") party, which led to today's Likud party. Likud has led or been part of most Israeli governments since 1977. Nature of the movement Members of the Irgun came mostly from Betar and from the Revisionist Party both in Palestine and abroad. The Revisionist Movement made up a popular backing for the underground organization. Ze'ev Jabotinsky, founder of Revisionist Zionism, commanded the organization until he died in 1940. He formulated the general realm of operation, regarding Restraint and the end thereof, and was the inspiration for the organization overall. An additional major source of ideological inspiration was the poetry of Uri Zvi Greenberg. The symbol of the organization, with the motto רק כך (only thus), underneath a hand holding a rifle in the foreground of a map showing both Mandatory Palestine and the Emirate of Transjordan (at the time, both were administered under the terms of the British Mandate for Palestine), implied that force was the only way to "liberate the homeland." The number of members of the Irgun varied from a few hundred to a few thousand. Most of its members were people who joined the organization's command, under which they carried out various operations and filled positions, largely in opposition to British law. Most of them were "ordinary" people, who held regular jobs, and only a few dozen worked full-time in the Irgun. The Irgun disagreed with the policy of the Yishuv and with the World Zionist Organization, both with regard to strategy and basic ideology and with regard to PR and military tactics, such as use of armed force to accomplish the Zionist ends, operations against the Arabs during the riots, and relations with the British mandatory government. Therefore, the Irgun tended to ignore the decisions made by the Zionist leadership and the Yishuv's institutions. This fact caused the elected bodies not to recognize the independent organization, and during most of the time of its existence the organization was seen as irresponsible, and its actions thus worthy of thwarting. Accordingly, the Irgun accompanied its armed operations with public-relations campaigns aiming to convince the public of the Irgun's way and the problems with the official political leadership of the Yishuv. The Irgun put out numerous advertisements, an underground newspaper and even ran the first independent Hebrew radio station – Kol Zion HaLochemet. Structure of organization As members of an underground armed organization, Irgun personnel did not normally call Irgun by its name but rather used other names. In the first years of its existence it was known primarily as Ha-Haganah Leumit (The National Defense), and also by names such as Haganah Bet ("Second Defense"), Irgun Bet ("Second Irgun"), the Parallel Organization and the Rightwing Organization. Later on it became most widely known as המעמד (the Stand). The anthem adopted by the Irgun was "Anonymous Soldiers", written by Avraham (Yair) Stern who was at the time a commander in the Irgun. Later on Stern defected from the Irgun and founded Lehi, and the song became the anthem of the Lehi. The Irgun's new anthem then became the third verse of the "Betar Song", by Ze'ev Jabotinsky. The Irgun gradually evolved from its humble origins into a serious and well-organized paramilitary organization. The movement developed a hierarchy of ranks and a sophisticated command-structure, and came to demand serious military training and strict discipline from its members. It developed clandestine networks of hidden arms-caches and weapons-production workshops, safe-houses, and training camps, along with a secret printing facility for propaganda posters. The ranks of the Irgun were (in ascending order): Khayal = (Private) Segen Rosh Kvutza, Segen ("Deputy Group Leader", "Deputy") = Assistant Squad Leader (Lance Corporal) Rosh Kvutza ("Group Leader") = Squad Leader (Corporal) Samal ("Sergeant") = Section Leader (Sergeant) Samal Rishon ("Sergeant First Class") = Brigade Leader (Platoon Sergeant) Rav Samal ("Chief Sergeant") = Battalion Leader (Master Sergeant) Gundar Sheni, Gundar ("Commander Second Class", "Commander") = District Commander (2nd Lieutenant) Gundar Rishon ("Commander First Class") = Senior Branch Commander, Headquarters Staff (Lieutenant). The Irgun was led by a High Command, which set policy and gave orders. Directly underneath it was a General Staff, which oversaw the activities of the Irgun. The General Staff was divided into a military and a support staff. The military staff was divided into operational units that oversaw operations and support units in charge of planning, instruction, weapons caches and manufacture, and first aid. The military and support staff never met jointly; they communicated through the High Command. Beneath the General Staff were six district commands: Jerusalem, Tel Aviv, Haifa-Galilee, Southern, Sharon, and Shomron, each led by a district commander. A local Irgun district unit was called a "Branch". A "brigade" in the Irgun was made up of three sections. A section was made up of two groups, at the head of each was a "Group Head", and a deputy. Eventually, various units were established, which answered to a "Center" or "Staff". The head of the Irgun High Command was the overall commander of the organization, but the designation of his rank varied. During the revolt against the British, Irgun commander Menachem Begin and the entire High Command held the rank of Gundar Rishon. His predecessors, however, had held their own ranks. A rank of Military Commander (Seren) was awarded to the Irgun commander Yaakov Meridor and a rank of High Commander (Aluf) to David Raziel. Until his death in 1940, Jabotinsky was known as the "Military Commander of the Etzel" or the Ha-Matzbi Ha-Elyon ("Supreme Commander"). Under the command of Menachem Begin, the Irgun was divided into different corps: Hayil Kravi (Combat Corps) – responsible for combat operations Delek ("Gasoline") – the intelligence section; responsible for gathering and translating intelligence, and maintaining contact with local and foreign journalists HAT (Planning Division) – responsible for planning activities HATAM (Revolutionary Publicity Corps) – responsible for printing and disseminating propaganda The Irgun's commanders planned for it to have a regular combat force, a reserve, and shock units, but in practice there were not enough personnel for a reserve or for a shock force. The Irgun emphasized that its fighters be highly disciplined. Strict drill exercises were carried out at ceremonies at different times, and strict attention was given to discipline, formal ceremonies and military relationships between the various ranks. The Irgun put out professional publications on combat doctrine, weaponry, leadership, drill exercises, etc. Among these publications were three books written by David Raziel, who had studied military history, techniques, and strategy: The Pistol (written in collaboration with Avraham Stern) The Theory of Training Parade Ground and Field Drill A British analysis noted that the Irgun's discipline was "as strict as any army in the world." The Irgun operated a sophisticated recruitment and military-training regime. Those wishing to join had to find and make contact with a member, meaning only those who personally knew a member or were persistent could find their way in. Once contact had been established, a meeting was set up with the three-member selection committee at a safe-house, where the recruit was interviewed in a darkened room, with the committee either positioned behind a screen, or with a flashlight shone into the recruit's eyes. The interviewers asked basic biographical questions, and then asked a series of questions designed to weed out romantics and adventurers and those who had not seriously contemplated the potential sacrifices. Those selected attended a four-month series of indoctrination seminars in groups of five to ten, where they were taught the Irgun's ideology and the code of conduct it expected of its members. These seminars also had another purpose - to weed out the impatient and those of flawed purpose who had gotten past the selection interview. Then, members were introduced to other members, were taught the locations of safe-houses, and given military training. Irgun recruits trained with firearms, hand grenades, and were taught how to conduct combined attacks on targets. Arms handling and tactics courses were given in clandestine training camps, while practice shooting took place in the desert or by the sea. Eventually, separate training camps were established for heavy-weapons training. The most rigorous course was the explosives course for bomb-makers, which lasted a year. The British authorities believed that some Irgun members enlisted in the Jewish section of the Palestine Police Force for a year as part of their training, during which they also passed intelligence. In addition to the Irgun's sophisticated training program, many Irgun members were veterans of the Haganah (including the Palmach), the British Armed Forces, and Jewish partisan groups that had waged guerrilla warfare in Nazi-occupied Europe, thus bringing significant military training and combat experience into the organization. The Irgun also operated a course for its intelligence operatives, in which recruits were taught espionage, cryptography, and analysis techniques. Of the Irgun's members, almost all were part-time members. They were expected to maintain their civilian lives and jobs, dividing their time between their civilian lives and underground activities. There were never more than 40 full-time members, who were given a small expense stipend on which to live on. Upon joining, every member received an underground name. The Irgun's members were divided into cells, and worked with the members of their own cells. The identities of Irgun members in other cells were withheld. This ensured that an Irgun member taken prisoner could betray no more than a few comrades. In addition to the Irgun's members in Palestine, underground Irgun cells composed of local Jews were established in Europe following World War II. An Irgun cell was also established in Shanghai, home to many European-Jewish refugees. The Irgun also set up a Swiss bank account. Eli Tavin, the former head of Irgun intelligence, was appointed commander of the Irgun abroad. In November 1947, the Jewish insurgency came to an end as the UN approved of the partition of Palestine, and the British had announced their intention to withdraw the previous month. As the British left and the 1947-48 Civil War in Mandatory Palestine got underway, the Irgun came out of the underground and began to function more as a standing army rather an underground organization. It began openly recruiting, training, and raising funds, and established bases, including training facilities. It also introduced field communications and created a medical unit and supply service.Segal, Hagai: How My Grandmother Prevented A Civil War (2014) Until World War II the group armed itself with weapons purchased in Europe, primarily Italy and Poland, and smuggled to Palestine. The Irgun also established workshops that manufactured spare parts and attachments for the weapons. Also manufactured were land mines and simple hand grenades. Another way in which the Irgun armed itself was theft of weapons from the British Police and military. Prior to World War II Founding The Irgun's first steps were in the aftermath of the Riots of 1929. In the Jerusalem branch of the Haganah there were feelings of disappointment and internal unrest towards the leadership of the movements and the Histadrut (at that time the organization running the Haganah). These feelings were a result of the view that the Haganah was not adequately defending Jewish interests in the region. Likewise, critics of the leadership spoke out against alleged failures in the number of weapons, readiness of the movement and its policy of restraint and not fighting back. On April 10, 1931, commanders and equipment managers announced that they refused to return weapons to the Haganah that had been issued to them earlier, prior to the Nebi Musa holiday. These weapons were later returned by the commander of the Jerusalem branch, Avraham Tehomi, a.k.a. "Gideon". However, the commanders who decided to rebel against the leadership of the Haganah relayed a message regarding their resignations to the Vaad Leumi, and thus this schism created a new independent movement. The leader of the new underground movement was Avraham Tehomi, alongside other founding members who were all senior commanders in the Haganah, members of Hapoel Hatzair and of the Histadrut. Also among them was Eliyahu Ben Horin, an activist in the Revisionist Party. This group was known as the "Odessan Gang", because they previously had been members of the Haganah Ha'Atzmit of Jewish Odessa. The new movement was named Irgun Tsvai Leumi, ("National Military Organization") in order to emphasize its active nature in contrast to the Haganah. Moreover, the organization was founded with the desire to become a true military organization and not just a militia as the Haganah was at the time. In the autumn of that year the Jerusalem group merged with other armed groups affiliated with Betar. The Betar groups' center of activity was in Tel Aviv, and they began their activity in 1928 with the establishment of "Officers and Instructors School of Betar". Students at this institution had broken away from the Haganah earlier, for political reasons, and the new group called itself the "National Defense", הגנה הלאומית. During the riots of 1929 Betar youth participated in the defense of Tel Aviv neighborhoods under the command of Yermiyahu Halperin, at the behest of the Tel Aviv city hall. After the riots the Tel Avivian group expanded, and was known as "The Right Wing Organization". After the Tel Aviv expansion another branch was established in Haifa. Towards the end of 1932 the Haganah branch of Safed also defected and joined the Irgun, as well as many members of the Maccabi sports association. At that time the movement's underground newsletter, Ha'Metsudah (the Fortress) also began publication, expressing the active trend of the movement. The Irgun also increased its numbers by expanding draft regiments of Betar – groups of volunteers, committed to two years of security and pioneer activities. These regiments were based in places that from which stemmed new Irgun strongholds in the many places, including the settlements of Yesod HaMa'ala, Mishmar HaYarden, Rosh Pina, Metula and Nahariya in the north; in the center – Hadera, Binyamina, Herzliya, Netanya and Kfar Saba, and south of there – Rishon LeZion, Rehovot and Ness Ziona. Later on regiments were also active in the Old City of Jerusalem ("the Kotel Brigades") among others. Primary training centers were based in Ramat Gan, Qastina (by Kiryat Mal'akhi of today) and other places. Under Tehomi's command In 1933 there were some signs of unrest, seen by the incitement of the local Arab leadership to act against the authorities. The strong British response put down the disturbances quickly. During that time the Irgun operated in a similar manner to the Haganah and was a guarding organization. The two organizations cooperated in ways such as coordination of posts and even intelligence sharing. Within the Irgun, Tehomi was the first to serve as "Head of the Headquarters" or "Chief Commander". Alongside Tehomi served the senior commanders, or "Headquarters" of the movement. As the organization grew, it was divided into district commands. In August 1933 a "Supervisory Committee" for the Irgun was established, which included representatives from most of the Zionist political parties. The members of this committee were Meir Grossman (of the Hebrew State Party), Rabbi Meir Bar-Ilan (of the Mizrachi Party), either Immanuel Neumann or Yehoshua Supersky (of the General Zionists) and Ze'ev Jabotinsky or Eliyahu Ben Horin (of Hatzohar). In protest against, and with the aim of ending Jewish immigration to Palestine, the Great Arab Revolt of 1936–1939 broke out on April 19, 1936. The riots took the form of attacks by Arab rioters ambushing main roads, bombing of roads and settlements as well as property and agriculture vandalism. In the beginning, the Irgun and the Haganah generally maintained a policy of restraint, apart from a few instances. Some expressed resentment at this policy, leading up internal unrest in the two organizations. The Irgun tended to retaliate more often, and sometimes Irgun members patrolled areas beyond their positions in order to encounter attackers ahead of time. However, there were differences of opinion regarding what to do in the Haganah, as well. Due to the joining of many Betar Youth members, Jabotinsky (founder of Betar) had a great deal of influence over Irgun policy. Nevertheless, Jabotinsky was of the opinion that for moral reasons violent retaliation was not to be undertaken. In November 1936 the Peel Commission was sent to inquire regarding the breakout of the riots and propose a solution to end the Revolt. In early 1937 there were still some in the Yishuv who felt the commission would recommend a partition of Mandatory Palestine (the land west of the Jordan River), thus creating a Jewish state on part of the land. The Irgun leadership, as well as the "Supervisory Committee" held similar beliefs, as did some members of the Haganah and the Jewish Agency. This belief strengthened the policy of restraint and led to the position that there was no room for defense institutions in the future Jewish state. Tehomi was quoted as saying: "We stand before great events: a Jewish state and a Jewish army. There is a need for a single military force". This position intensified the differences of opinion regarding the policy of restraint, both within the Irgun and within the political camp aligned with the organization. The leadership committee of the Irgun supported a merger with the Haganah. On April 24, 1937, a referendum was held among Irgun members regarding its continued independent existence. David Raziel and Avraham (Yair) Stern came out publicly in support for the continued existence of the Irgun: The Irgun has been placed ... before a decision to make, whether to submit to the authority of the government and the Jewish Agency or to prepare for a double sacrifice and endangerment. Some of our friends do not have appropriate willingness for this difficult position, and have submitted to the Jewish Agency and has left the battle ... all of the attempts ... to unite with the leftist organization have failed, because the Left entered into negotiations not on the basis of unification of forces, but the submission of one such force to the other.... The first split In April 1937 the Irgun split after the referendum. Approximately 1,500–2,000 people, about half of the Irgun's membership, including the senior command staff, regional committee members, along with most of the Irgun's weapons, returned to the Haganah, which at that time was under the Jewish Agency's leadership. The Supervisory Committee's control over the Irgun ended, and Jabotinsky assumed command. In their opinion, the removal of the Haganah from the Jewish Agency's leadership to the national institutions necessitated their return. Furthermore, they no longer saw significant ideological differences between the movements. Those who remained in the Irgun were primarily young activists, mostly laypeople, who sided with the independent existence of the Irgun. In fact, most of those who remained were originally Betar people. Moshe Rosenberg estimated that approximately 1,800 members remained. In theory, the Irgun remained an organization not aligned with a political party, but in reality the supervisory committee was disbanded and the Irgun's continued ideological path was outlined according to Ze'ev Jabotinsky's school of thought and his decisions, until the movement eventually became Revisionist Zionism's military arm. One of the major changes in policy by Jabotinsky was the end of the policy of restraint. On April 27, 1937, the Irgun founded a new headquarters, staffed by Moshe Rosenberg at the head, Avraham (Yair) Stern as secretary, David Raziel as head of the Jerusalem branch, Hanoch Kalai as commander of Haifa and Aharon Haichman as commander of Tel Aviv. On 20 Tammuz, (June 29) the day of Theodor Herzl's death, a ceremony was held in honor of the reorganization of the underground movement. For security purposes this ceremony was held at a construction site in Tel Aviv. Ze'ev Jabotinsky placed Col. Robert Bitker at the head of the Irgun. Bitker had previously served as Betar commissioner in China and had military experience. A few months later, probably due to total incompatibility with the position, Jabotinsky replaced Bitker with Moshe Rosenberg. When the Peel Commission report was published a few months later, the Revisionist camp decided not to accept the commission's recommendations. Moreover, the organizations of Betar, Hatzohar and the Irgun began to increase their efforts to bring Jews to the land of Israel, illegally. This Aliyah was known as the עליית אף על פי "Af Al Pi (Nevertheless) Aliyah". As opposed to this position, the Jewish Agency began acting on behalf of the Zionist interest on the political front, and continued the policy of restraint. From this point onwards the differences between the Haganah and the Irgun were much more obvious. Illegal immigration According to Jabotinsky's "Evacuation Plan", which called for millions of European Jews to be brought to Palestine at once, the Irgun helped the illegal immigration of European Jews to the land of Israel. This was named by Jabotinsky the "National Sport". The most significant part of this immigration prior to World War II was carried out by the Revisionist camp, largely because the Yishuv institutions and the Jewish Agency shied away from such actions on grounds of cost and their belief that Britain would in the future allow widespread Jewish immigration. The Irgun joined forces with Hatzohar and Betar in September 1937, when it assisted with the landing of a convoy of 54 Betar members at Tantura Beach (near Haifa.) The Irgun was responsible for discreetly bringing the Olim, or Jewish immigrants, to the beaches, and dispersing them among the various Jewish settlements. The Irgun also began participating in the organisation of the immigration enterprise and undertook the process of accompanying the ships. This began with the ship Draga which arrived at the coast of British Palestine in September 1938. In August of the same year, an agreement was made between Ari Jabotinsky (the son of Ze'ev Jabotinsky), the Betar representative and Hillel Kook, the Irgun representative, to coordinate the immigration (also known as Ha'apala). This agreement was also made in the "Paris Convention" in February 1939, at which Ze'ev Jabotinsky and David Raziel were present. Afterwards, the "Aliyah Center" was founded, made up of representatives of Hatzohar, Betar, and the Irgun, thereby making the Irgun a full participant in the process. The difficult conditions on the ships demanded a high level of discipline. The people on board the ships were often split into units, led by commanders. In addition to having a daily roll call and the distribution of food and water (usually very little of either), organized talks were held to provide information regarding the actual arrival in Palestine. One of the largest ships was the Sakaria, with 2,300 passengers, which equalled about 0.5% of the Jewish population in Palestine. The first vessel arrived on April 13, 1937, and the last on February 13, 1940. All told, about 18,000 Jews immigrated to Palestine with the help of the Revisionist organizations and private initiatives by other Revisionists. Most were not caught by the British. End of restraint Irgun members continued to defend settlements, but at the same time began attacks on Arab villages, thus ending the policy of restraint. These attacks were intended to instill fear in the Arab side, in order to cause the Arabs to wish for peace and quiet. In March 1938, David Raziel wrote in the underground newspaper "By the Sword" a constitutive article for the Irgun overall, in which he coined the term "Active Defense": The actions of the Haganah alone will never be a true victory. If the goal of the war is to break the will of the enemy – and this cannot be attained without destroying his spirit – clearly we cannot be satisfied with solely defensive operations.... Such a method of defense, that allows the enemy to attack at will, to reorganize and attack again ... and does not intend to remove the enemy's ability to attack a second time – is called passive defense, and ends in downfall and destruction ... whoever does not wish to be beaten has no choice but to attack. The fighting side, that does not intend to oppress but to save its liberty and honor, he too has only one way available – the way of attack. Defensiveness by way of offensiveness, in order to deprive the enemy the option of attacking, is called active defense. The first attacks began around April 1936, and by the end of World War II, more than 250 Arabs had been killed. Examples include: After an Arab shooting at Carmel school in Tel Aviv, which resulted in the death of a Jewish child, Irgun members attacked an Arab neighborhood near Kerem Hatemanim in Tel Aviv, killing one Arab man and injuring another. On August 17, the Irgun responded to shootings by Arabs from the Jaffa–Jerusalem train towards Jews that were waiting by the train block on Herzl Street in Tel Aviv. The same day, when a Jewish child was injured by the shooting, Irgun members attacked a train on the same route, killing one Arab and injuring five. During 1936, Irgun members carried out approximately ten attacks. Throughout 1937 the Irgun continued this line of operation. On March 6, a Jew at Sabbath prayers at the Western Wall was shot by a local Arab. A few hours later, the Irgun shot at an Arab in the Jerusalem neighborhood of Rechavia. On June 29, a band of Arabs attacked an Egged bus on the Jerusalem – Tel Aviv road, killing one Jew. The following day, two Jews were also killed near Karkur. A few hours later, the Irgun carried out a number of operations. An Arab bus making its way from Lifta was attacked in Jerusalem. In two other locations in Jerusalem, Arabs were shot as well. In Tel Aviv, a hand grenade was thrown at an Arab coffee shop on Carmel St., injuring many of the patrons. Irgun members also injured an Arab on Reines St. in Tel Aviv. On September 5, the Irgun responded to the murder of a rabbi on his way home from prayer in the Old City of Jerusalem by throwing explosives at an Arab bus that had left Lifta, injuring two female passengers and a British police officer. A more complete list can be found here. At that time, however, these acts were not yet a part of a formulated policy of the Irgun. Not all of the aforementioned operations received a commander's approval, and Jabotinsky was not in favor of such actions at the time. Jabotinsky still hoped to establish a Jewish force out in the open that would not have to operate underground. However, the failure, in its eyes, of the Peel Commission and the renewal of violence on the part of the Arabs caused the Irgun to rethink its official policy. Increase in operations 14 November 1937 was a watershed in Irgun activity. From that date, the Irgun increased its reprisals. Following an increase in the number of attacks aimed at Jews, including the killing of five kibbutz members near Kiryat Anavim (today kibbutz Ma'ale HaHamisha), the Irgun undertook a series of attacks in various places in Jerusalem, killing five Arabs. Operations were also undertaken in Haifa (shooting at the Arab-populated Wadi Nisnas neighborhood) and in Herzliya. The date is known as the day the policy of restraint (Havlagah) ended, or as Black Sunday when operations resulted in the murder of 10 Arabs. This is when the organization fully changed its policy, with the approval of Jabotinsky and Headquarters to the policy of "active defense" in respect of Irgun actions. The British responded with the arrest of Betar and Hatzohar members as suspected members of the Irgun. Military courts were allowed to act under "Time of Emergency Regulations" and even sentence people to death. In this manner Yehezkel Altman, a guard in a Betar battalion in the Nahalat Yizchak neighborhood of Tel Aviv, shot at an Arab bus, without his commanders' knowledge. Altman was acting in response to a shooting at Jewish vehicles on the Tel Aviv–Jerusalem road the day before. He turned himself in later and was sentenced to death, a sentence which was later commuted to a life sentence. Despite the arrests, Irgun members continued fighting. Jabotinsky lent his moral support to these activities. In a letter to Moshe Rosenberg on 18 March 1938 he wrote: Tell them: from afar I collect and save, as precious treasures, news items about your lives. I know of the obstacles that have not impeded your spirit; and I know of your actions as well. I am overjoyed that I have been blessed with such students. Although the Irgun continued activities such as these, following Rosenberg's orders, they were greatly curtailed. Furthermore, in fear of the British threat of the death sentence for anyone found carrying a weapon, all operations were suspended for eight months. However, opposition to this policy gradually increased. In April, 1938, responding to the killing of six Jews, Betar members from the Rosh Pina Brigade went on a reprisal mission, without the consent of their commander, as described by historian Avi Shlaim: On 21 April 1938, after several weeks of planning, he and two of his colleagues from the Irgun (Etzel) ambushed an Arab bus at a bend on a mountain road near Safad. They had a hand grenade, a gun and a pistol. Their plan was to destroy the engine so that the bus would fall off the side of the road and all the passengers would be killed. When the bus approached, they fired at it (not in the air, as Mailer has it) but the grenade lobbed by Ben Yosef did not detonate. The bus with its screaming and terrified passengers drove on. Although the incident ended without casualties, the three were caught, and one of them – Shlomo Ben-Yosef was sentenced to death. Demonstrations around the country, as well as pressure from institutions and people such as Dr. Chaim Weizmann and the Chief Rabbi of Mandatory Palestine, Yitzhak HaLevi Herzog did not reduce his sentence. In Shlomo Ben-Yosef's writings in Hebrew were later found: I am going to die and I am not sorry at all. Why? Because I am going to die for our country. Shlomo Ben-Yosef. On 29 June 1938 he was executed, and was the first of the Olei Hagardom. The Irgun revered him after his death and many regarded him as an example. In light of this, and due to the anger of the Irgun leadership over the decision to adopt a policy of restraint until that point, Jabotinsky relieved Rosenberg of his post and replaced him with David Raziel, who proved to be the most prominent Irgun commander until Menachem Begin. Jabotinsky simultaneously instructed the Irgun to end its policy of restraint, leading to armed offensive operations until the end of the Arab Revolt in 1939. In this time, the Irgun mounted about 40 operations against Arabs and Arab villages, for instance: After a Jewish father and son were killed in the Old City of Jerusalem, on June 6, 1938, Irgun members threw explosives from the roof of a nearby house, killing two Arabs and injuring four. The Irgun planted land mines in a number of Arab markets, primarily in places identified by the Irgun as activity centers of armed Arab gangs. Explosives detonated in the Arab souk in Jerusalem on July 15, killed ten local Arabs. In similar circumstances, 70 Arabs were killed by a land mine planted in the Arab souk in Haifa. This action led the British Parliament to discuss the disturbances in Palestine. On 23 February 1939 the Secretary of State for the Colonies, Malcolm MacDonald revealed the British intention to cancel the mandate and establish a state that would preserve Arab rights. This caused a wave of riots and attacks by Arabs against Jews. The Irgun responded four days later with a series of attacks on Arab buses and other sites. The British used military force against the Arab rioters and in the latter stages of the revolt by the Arab community in Palestine, it deteriorated into a series of internal gang wars. During the same period At the same time, the Irgun also established itself in Europe. The Irgun built underground cells that participated in organizing migration to Palestine. The cells were made up almost entirely of Betar members, and their primary activity was military training in preparation for emigration to Palestine. Ties formed with the Polish authorities brought about courses in which Irgun commanders were trained by Polish officers in advanced military issues such as guerrilla warfare, tactics and laying land mines. Avraham (Yair) Stern was notable among the cell organizers in Europe. In 1937 the Polish authorities began to deliver large amounts of weapons to the underground. According to Irgun activists Poland supplied the organization with 25,000 rifles, and additional material and weapons, by summer 1939 the Warsaw warehouses of Irgun held 5,000 rifles and 1,000 machine guns. The training and support by Poland would allow the organization to mobilize 30,000-40,000 men The transfer of handguns, rifles, explosives and ammunition stopped with the outbreak of World War II. Another field in which the Irgun operated was the training of pilots, so they could serve in the Air Force in the future war for independence, in the flight school in Lod. Towards the end of 1938 there was progress towards aligning the ideologies of the Irgun and the Haganah. Many abandoned the belief that the land would be divided and a Jewish state would soon exist. The Haganah founded פו"מ, a special operations unit, (pronounced poom), which carried out reprisal attacks following Arab violence. These operations continued into 1939. Furthermore, the opposition within the Yishuv to illegal immigration significantly decreased, and the Haganah began to bring Jews to Palestine using rented ships, as the Irgun had in the past. First operations against the British The publishing of the MacDonald White Paper of 1939 brought with it new edicts that were intended to lead to a more equitable settlement between Jews and Arabs. However, it was considered by some Jews to have an adverse effect on the continued development of the Jewish community in Palestine. Chief among these was the prohibition on selling land to Jews, and the smaller quotas for Jewish immigration. The entire Yishuv was furious at the contents of the White Paper. There were demonstrations against the "Treacherous Paper", as it was considered that it would preclude the establishment of a Jewish homeland in Palestine. Under the temporary command of Hanoch Kalai, the Irgun began sabotaging strategic infrastructure such as electricity facilities, radio and telephone lines. It also started publicizing its activity and its goals. This was done in street announcements, newspapers, as well as the underground radio station Kol Zion HaLochemet. On August 26, 1939, the Irgun killed Ralph Cairns, a British police officer who, as head of the Jewish Department in the Palestine Police, had tortured a number of youths who were underground members. Cairns and Ronald Barker, another British police officer, were killed by an Irgun IED. The British increased their efforts against the Irgun. As a result, on August 31 the British police arrested members meeting in the Irgun headquarters. On the next day, September 1, 1939, World War II broke out. During World War II Following the outbreak of war, Ze'ev Jabotinsky and the New Zionist Organization voiced their support for Britain and France. In mid-September 1939 Raziel was moved from his place of detention in Tzrifin. This, among other events, encouraged the Irgun to announce a cessation of its activities against the British so as not to hinder Britain's effort to fight "the Hebrew's greatest enemy in the world – German Nazism". This announcement ended with the hope that after the war a Hebrew state would be founded "within the historical borders of the liberated homeland". After this announcement Irgun, Betar and Hatzohar members, including Raziel and the Irgun leadership, were gradually released from detention. The Irgun did not rule out joining the British army and the Jewish Brigade. Irgun members did enlist in various British units. Irgun members also assisted British forces with intelligence in Romania, Bulgaria, Morocco and Tunisia. An Irgun unit also operated in Syria and Lebanon. David Raziel later died during one of these operations. During the Holocaust, Betar members revolted numerous times against the Nazis in occupied Europe. The largest of these revolts was the Warsaw Ghetto Uprising, in which an armed underground organization fought, formed by Betar and Hatzoar and known as the Żydowski Związek Wojskowy (ŻZW) (Jewish Military Union). Despite its political origins, the ŻZW accepted members without regard to political affiliation, and had contacts established before the war with elements of the Polish military. Because of differences over objectives and strategy, the ŻZW was unable to form a common front with the mainstream ghetto fighters of the Żydowska Organizacja Bojowa, and fought independently under the military leadership of Paweł Frenkiel and the political leadership of Dawid Wdowiński. There were instances of Betar members enlisted in the British military smuggling British weapons to the Irgun. From 1939 onwards, an Irgun delegation in the United States worked for the creation of a Jewish army made up of Jewish refugees and Jews from Palestine, to fight alongside the Allied Forces. In July 1943 the "Emergency Committee to Save the Jewish People in Europe" was formed, and worked until the end of the war to rescue the Jews of Europe from the Nazis and to garner public support for a Jewish state. However, it was not until January 1944 that US President Franklin Roosevelt established the War Refugee Board, which achieved some success in saving European Jews. Second split Throughout this entire period, the British continued enforcing the White Paper's provisions, which included a ban on the sale of land, restrictions on Jewish immigration and increased vigilance against illegal immigration. Part of the reason why the British banned land sales (to anyone) was the confused state of the post Ottoman land registry; it was difficult to determine who actually owned the land that was for sale. Within the ranks of the Irgun this created much disappointment and unrest, at the center of which was disagreement with the leadership of the New Zionist Organization, David Raziel and the Irgun Headquarters. On June 18, 1939, Avraham (Yair) Stern and others of the leadership were released from prison and a rift opened between them the Irgun and Hatzohar leadership. The controversy centred on the issues of the underground movement submitting to public political leadership and fighting the British. On his release from prison Raziel resigned from Headquarters. To his chagrin, independent operations of senior members of the Irgun were carried out and some commanders even doubted Raziel's loyalty. In his place, Stern was elected to the leadership. In the past, Stern had founded secret Irgun cells in Poland without Jabotinsky's knowledge, in opposition to his wishes. Furthermore, Stern was in favor of removing the Irgun from the authority of the New Zionist Organization, whose leadership urged Raziel to return to the command of the Irgun. He finally consented. Jabotinsky wrote to Raziel and to Stern, and these letters were distributed to the branches of the Irgun: ... I call upon you: Let nothing disturb our unity. Listen to the commissioner (Raziel), whom I trust, and promise me that you and Betar, the greatest of my life's achievements, will stand strong and united and allow me to continue with the hope for victory in the war to realize our old Maccabean dream.... Stern was sent a telegram with an order to obey Raziel, who was reappointed. However, these events did not prevent the splitting of the organization. Suspicion and distrust were rampant among the members. Out of the Irgun a new organization was created on July 17, 1940, which was first named "The National Military Organization in Israel" (as opposed to the "National Military Organization in the Land of Israel") and later on changed its name to Lehi, an acronym for Lohamei Herut Israel''', "Fighters for the Freedom of Israel", (לח"י – לוחמי חירות ישראל). Jabotinsky died in New York on August 4, 1940, yet this did not prevent the Lehi split. Following Jabotinsky's death, ties were formed between the Irgun and the New Zionist Organization. These ties would last until 1944, when the Irgun declared a revolt against the British. The primary difference between the Irgun and the newly formed organization was its intention to fight the British in Palestine, regardless of their war against Germany. Later, additional operational and ideological differences developed that contradicted some of the Irgun's guiding principles. For example, the Lehi, unlike the Irgun, supported a population exchange with local Arabs. Change of policy The split damaged the Irgun both organizationally and from a morale point of view. As their spiritual leader, Jabotinsky's death also added to this feeling. Together, these factors brought about a mass abandonment by members. The British took advantage of this weakness to gather intelligence and arrest Irgun activists. The new Irgun leadership, which included Meridor, Yerachmiel Ha'Levi, Rabbi Moshe Zvi Segal and others used the forced hiatus in activity to rebuild the injured organization. This period was also marked by more cooperation between the Irgun and the Jewish Agency, however David Ben-Gurion's uncompromising demand that Irgun accept the Agency's command foiled any further cooperation. In both the Irgun and the Haganah more voices were being heard opposing any cooperation with the British. Nevertheless, an Irgun operation carried out in the service of Britain was aimed at sabotaging pro-Nazi forces in Iraq, including the assassination of Haj Amin al-Husayni. Among others, Raziel and Yaakov Meridor participated. On April 20, 1941, during a Luftwaffe air raid on RAF Habbaniya near Baghdad, David Raziel, commander of the Irgun, was killed during the operation. In late 1943 a joint Haganah – Irgun initiative was developed, to form a single fighting body, unaligned with any political party, by the name of עם לוחם (Fighting Nation). The new body's first plan was to kidnap the British High Commissioner of Palestine, Sir Harold MacMichael and take him to Cyprus. However, the Haganah leaked the planned operation and it was thwarted before it got off the ground. Nevertheless, at this stage the Irgun ceased its cooperation with the British. As Eliyahu Lankin tells in his book: Immediately following the failure of Fighting Nation practical discussions began in the Irgun Headquarters regarding a declaration of war. Revolt In 1943 the Polish II Corps, commanded by Władysław Anders, arrived in Palestine from Iraq. The British insisted that no Jewish units of the army be created. Eventually, many of the soldiers of Jewish origin that arrived with the army were released and allowed to stay in Palestine. One of them was Menachem Begin, whose arrival in Palestine created new-found expectations within the Irgun and Betar. Begin had served as head of the Betar movement in Poland, and was a respected leader. Yaakov Meridor, then the commander of the Irgun, raised the idea of appointing Begin to the post. In late 1943, when Begin accepted the position, a new leadership was formed. Meridor became Begin's deputy, and other members of the board were Aryeh Ben Eliezer, Eliyahu Lankin, and Shlomo Lev Ami. On February 1, 1944, the Irgun put up posters all around the country, proclaiming a revolt against the British mandatory government. The posters began by saying that all of the Zionist movements stood by the Allied Forces and over 25,000 Jews had enlisted in the British military. The hope to establish a Jewish army had died. European Jewry was trapped and was being destroyed, yet Britain, for its part, did not allow any rescue missions. This part of the document ends with the following words: The White Paper is still in effect. It is enforced, despite the betrayal of the Arabs and the loyalty of the Jews; despite the mass enlisting to the British Army; despite the ceasefire and the quiet in The Land of Israel; despite the massacre of masses of the Jewish people in Europe.... The facts are simple and horrible as one. Over the last four years of the war we have lost millions of the best of our people; millions more are in danger of eradication. And The Land of Israel is closed off and quarantined because the British rule it, realizing the White Paper, and strives for the destruction of our people's last hope. The Irgun then declared that, for its part, the ceasefire was over and they were now at war with the British. It demanded the transfer of rule to a Jewish government, to implement ten policies. Among these were the mass evacuation of Jews from Europe, the signing of treaties with any state that recognized the Jewish state's sovereignty, including Britain, granting social justice to the state's residents, and full equality to the Arab population. The proclamation ended with: The God of Israel, God of Hosts, will be at our side. There is no retreat. Liberty or death.... The fighting youth will not recoil in the face of sacrifices and suffering, blood and torment. They will not surrender, so long as our days of old are not renewed, so long as our nation is not ensured a homeland, liberty, honor, bread, justice and law. The Irgun began this campaign rather weakly. At the time of the start of the revolt, it was only about 1,000 strong, including some 200 fighters. It possessed about 4 submachine guns, 40 rifles, 60 pistols, 150 hand grenades, and 2,000 kilograms of explosive material, and its funds were about £800. Struggle against the British The Irgun began a militant operation against the symbols of government, in an attempt to harm the regime's operation as well as its reputation. The first attack was on February 12, 1944, at the government immigration offices, a symbol of the immigration laws. The attacks went smoothly and ended with no casualties—as they took place on a Saturday night, when the buildings were empty—in the three largest cities: Jerusalem, Tel Aviv, and Haifa. On February 27 the income tax offices were bombed. Parts of the same cities were blown up, also on a Saturday night; prior warnings were put up near the buildings. On March 23 the national headquarters building of the British police in the Russian Compound in Jerusalem was attacked, and part of it was blown up. These attacks in the first few months were sharply condemned by the organized leadership of the Yishuv and by the Jewish Agency, who saw them as dangerous provocations. At the same time the Lehi also renewed its attacks against the British. The Irgun continued to attack police stations and headquarters, and Tegart Fort, a fortified police station (today the location of Latrun). One relatively complex operation was the takeover of the radio station in Ramallah, on May 17, 1944. One symbolic act by the Irgun happened before Yom Kippur of 1944. They plastered notices around town, warning that no British officers should come to the Western Wall on Yom Kippur, and for the first time since the mandate began no British police officers were there to prevent the Jews from the traditional Shofar blowing at the end of the fast. After the fast that year the Irgun attacked four police stations in Arab settlements. In order to obtain weapons, the Irgun carried out "confiscation" operations – they robbed British armouries and smuggled stolen weapons to their own hiding places. During this phase of activity the Irgun also cut all of its official ties with the New Zionist Organization, so as not to tie their fate in the underground organization. Begin wrote in his memoirs, The Revolt: History and experience taught us that if we are able to destroy the prestige of the British in Palestine, the regime will break. Since we found the enslaving government's weak point, we did not let go of it. Underground exiles In October 1944 the British began expelling hundreds of arrested Irgun and Lehi members to detention camps in Africa. 251 detainees from Latrun were flown on thirteen planes, on October 19 to a camp in Asmara, Eritrea. Eleven additional transports were made. Throughout the period of their detention, the detainees often initiated rebellions and hunger strikes. Many escape attempts were made until July 1948 when the exiles were returned to Israel. While there were numerous successful escapes from the camp itself, only nine men actually made it back all the way. One noted success was that of Yaakov Meridor, who escaped nine times before finally reaching Europe in April 1948. These tribulations were the subject of his book Long is the Path to Freedom: Chronicles of one of the Exiles. Hunting Season On November 6, 1944, Lord Moyne, British Deputy Resident Minister of State in Cairo was assassinated by Lehi members Eliyahu Hakim and Eliyahu Bet-Zuri. This act raised concerns within the Yishuv from the British regime's reaction to the underground's violent acts against them. Therefore, the Jewish Agency decided on starting a Hunting Season, known as the saison, (from the French "la saison de chasse"). The Irgun's recuperation was noticeable when it began to renew its cooperation with the Lehi in May 1945, when it sabotaged oil pipelines, telephone lines and railroad bridges. All in all, over 1,000 members of the Irgun and Lehi were arrested and interned in British camps during the Saison. Eventually the Hunting Season died out, and there was even talk of cooperation with the Haganah leading to the formation of the Jewish Resistance Movement. Jewish Resistance Movement Towards the end of July 1945 the Labour party in Britain was elected to power. The Yishuv leadership had high hopes that this would change the anti-Zionist policy that the British maintained at the time. However, these hopes were quickly dashed when the government limited Jewish immigration, with the intention that the population of Mandatory Palestine (the land west of the Jordan River) would not be more than one-third of the total. This, along with the stepping up of arrests and their pursuit of underground members and illegal immigration organizers led to the formation of the Jewish Resistance Movement. This body consolidated the armed resistance to the British of the Irgun, Lehi, and Haganah. For ten months the Irgun and the Lehi cooperated and they carried out nineteen attacks and defense operations. The Haganah and Palmach carried out ten such operations. The Haganah also assisted in landing 13,000 illegal immigrants. Tension between the underground movements and the British increased with the increase in operations. On April 23, 1946, an operation undertaken by the Irgun to gain weapons from the Tegart fort at Ramat Gan resulted in a firefight with the police in which an Arab constable and two Irgun fighters were killed, including one who jumped on an explosive device to save his comrades. A third fighter, Dov Gruner, was wounded and captured. He stood trial and was sentenced to be death by hanging, refusing to sign a pardon request. In 1946, British relations with the Yishuv worsened, building up to Operation Agatha of June 29. The authorities ignored the Anglo-American Committee of Inquiry's recommendation to allow 100,000 Jews into Palestine at once. As a result of the discovery of documents tying the Jewish Agency to the Jewish Resistance Movement, the Irgun was asked to speed up the plans for the King David Hotel bombing of July 22. The hotel was where the documents were located, the base for the British Secretariat, the military command and a branch of the Criminal Investigation Division of the police. The Irgun later claimed to have sent a warning that was ignored. Palestinian and U.S. sources confirm that the Irgun issued numerous warnings for civilians to evacuate the hotel prior to the bombing. 91 people were killed in the attack where a 350 kg bomb was placed in the basement of the hotel and caused a large section of it to collapse. Only 13 were British soldiers. Further struggle against the British The King David Hotel bombing and the arrest of Jewish Agency and other Yishuv leaders as part of Operation Agatha caused the Haganah to cease their armed activity against the British. Yishuv and Jewish Agency leaders were released from prison. From then until the end of the British mandate, resistance activities were led by the Irgun and Lehi. In early September 1946 the Irgun renewed its attacks against civil structures, railroads, communication lines and bridges. One operation was the attack on the train station in Jerusalem, in which Meir Feinstein was arrested and later committed suicide awaiting execution. According to the Irgun these sort of armed attacks were legitimate, since the trains primarily served the British, for redeployment of their forces. The Irgun also publicized leaflets, in three languages, not to use specific trains in danger of being attacked. For a while, the British stopped train traffic at night. The Irgun also carried out repeated attacks against military and police traffic using disguised, electronically detonated roadside mines which could be detonated by an operator hiding nearby as a vehicle passed, carried out arms raids against military bases and police stations (often disguised as British soldiers), launched bombing, shooting, and mortar attacks against military and police installations and checkpoints, and robbed banks to gain funds as a result of losing access to Haganah funding following the collapse of the Jewish Resistance Movement. On October 31, 1946, in response to the British barring entry of Jews from Palestine, the Irgun blew up the British Embassy in Rome, a center of British efforts to monitor and stop Jewish immigration. The Irgun also carried out a few other operations in Europe: a British troop train was derailed and an attempt against another troop train failed. An attack on a British officers club in Vienna took place in 1947, and an attack on another British officer's club in Vienna and a sergeant's club in Germany took place in 1948. In December 1946 a sentence of 18 years and 18 beatings was handed down to a young Irgun member for robbing a bank. The Irgun made good on a threat they made and after the detainee was whipped, Irgun members kidnapped British officers and beat them in public. The operation, known as the "Night of the Beatings" brought an end to British punitive beatings. The British, taking these acts seriously, moved many British families in Palestine into the confines of military bases, and some moved home. On February 14, 1947, Ernest Bevin announced that the Jews and Arabs would not be able to agree on any British proposed solution for the land, and therefore the issue must be brought to the United Nations (UN) for a final decision. The Yishuv thought of the idea to transfer the issue to the UN as a British attempt to achieve delay while a UN inquiry commission would be established, and its ideas discussed, and all the while the Yishuv would weaken. Foundation for Immigration B increased the number of ships bringing in Jewish refugees. The British still strictly enforced the policy of limited Jewish immigration and illegal immigrants were placed in detention camps in Cyprus, which increased the anger of the Jewish community towards the mandate government. The Irgun stepped up its activity and from February 19 until March 3 it attacked 18 British military camps, convoy routes, vehicles, and other facilities. The most notable of these attacks was the bombing of a British officer's club located in Goldsmith House in Jerusalem, which was in a heavily guarded security zone. Covered by machine-gun fire, an Irgun assault team in a truck penetrated the security zone and lobbed explosives into the building. Thirteen people, including two officers, were killed. As a result, martial law was imposed over much of the country, enforced by approximately 20,000 British soldiers. Despite this, attacks continued throughout the martial law period. The most notable one was an Irgun attack against the Royal Army Pay Corps base at the Schneller Orphanage, in which a British soldier was killed. Throughout its struggle against the British, the Irgun sought to publicize its cause around the world. By humiliating the British, it attempted to focus global attention on Palestine, hoping that any British overreaction would be widely reported, and thus result in more political pressure against the British. Begin described this strategy as turning Palestine into a "glass house". The Irgun also re-established many representative offices internationally, and by 1948 operated in 23 states. In these countries, the Irgun sometimes acted against the local British representatives or led public relations campaigns against Britain. According to Bruce Hoffman: "In an era long before the advent of 24/7 global news coverage and instantaneous satellite-transmitted broadcasts, the Irgun deliberately attempted to appeal to a worldwide audience far beyond the immediate confines of its local struggle, and beyond even the ruling regime's own homeland." Acre Prison break On April 16, 1947, Irgun members Dov Gruner, Yehiel Dresner, Eliezer Kashani, and Mordechai Alkahi were hanged in Acre Prison, while singing Hatikvah. On April 21 Meir Feinstein and Lehi member Moshe Barazani blew themselves up, using a smuggled grenade, hours before their scheduled hanging. And on May 4 one of the Irgun's largest operations took place – the raid on Acre Prison. The operation was carried out by 23 men, commanded by Dov Cohen – AKA "Shimshon", along with the help of the Irgun and Lehi prisoners inside the prison. The Irgun had informed them of the plan in advance and smuggled in explosives. After a hole was blasted in the prison wall, the 41 Irgun and Lehi members who had been chosen to escape then ran to the hole, blasting through inner prison gates with the smuggled explosives. Meanwhile, Irgun teams mined roads and launched a mortar attack on a nearby British Army camp to delay the arrival of responding British forces. Although the 41 escapees managed to get out of the prison and board the escape trucks, some were rapidly recaptured and nine of the escapees and attackers were killed. Five Irgun men in the attacking party were also captured. Overall, 27 of the 41 designated escapees managed to escape. Along with the underground movement members, other criminals – including 214 Arabs – also escaped. Of the five attackers who were caught, three of them – Avshalom Haviv, Meir Nakar, and Yaakov Weiss, were sentenced to death. The Sergeants affair After the death sentences of the three were confirmed, the Irgun tried to save them by kidnapping hostages — British sergeants Clifford Martin and Mervyn Paice — in the streets of Netanya. British forces closed off and combed the area in search of the two, but did not find them. On July 29, 1947, in the afternoon, Meir Nakar, Avshalom Haviv, and Yaakov Weiss were executed. Approximately thirteen hours later the hostages were hanged in retaliation by the Irgun and their bodies, booby-trapped with an explosive, afterwards strung up from trees in woodlands south of Netanya. This action caused an outcry in Britain and was condemned both there and by Jewish leaders in Palestine. This episode has been given as a major influence on the British decision to terminate the Mandate and leave Palestine. The United Nations Special Committee on Palestine (UNSCOP) was also influenced by this and other actions. At the same time another incident was developing – the events of the ship Exodus 1947. The 4,500 Holocaust survivors on board were not allowed to enter Palestine. UNSCOP also covered the events. Some of its members were even present at Haifa port when the putative immigrants were forcefully removed from their ship (later found to have been rigged with an IED by some of its passengers) onto the deportation ships, and later commented that this strong image helped them press for an immediate solution for Jewish immigration and the question of Palestine. Two weeks later, the House of Commons convened for a special debate on events in Palestine, and concluded that their soldiers should be withdrawn as soon as possible. 1948 Palestine War UNSCOP's conclusion was a unanimous decision to end the British mandate, and a majority decision to divide Mandatory Palestine (the land west of the Jordan River) between a Jewish state and an Arab state. During the UN's deliberations regarding the committee's recommendations the Irgun avoided initiating any attacks, so as not to influence the UN negatively on the idea of a Jewish state. On November 29 the UN General Assembly voted in favor of ending the mandate and establishing two states on the land. That very same day the Irgun and the Lehi renewed their attacks on British targets. The next day the local Arabs began attacking the Jewish community, thus beginning the first stage of the 1948 Palestine War. The first attacks on Jews were in Jewish neighborhoods of Jerusalem, in and around Jaffa, and in Bat Yam, Holon, and the Ha'Tikvah neighborhood in Tel Aviv. In the autumn of 1947, the Irgun had approximately 4,000 members. The goal of the organization at that point was the conquest of the land between the Jordan River and the Mediterranean Sea for the future Jewish state and preventing Arab forces from driving out the Jewish community. The Irgun became almost an overt organization, establishing military bases in Ramat Gan and Petah Tikva. It began recruiting openly, thus significantly increasing in size. During the war the Irgun fought alongside the Lehi and the Haganah in the front against the Arab attacks. At first the Haganah maintained a defensive policy, as it had until then, but after the Convoy of 35 incident it completely abandoned its policy of restraint: "Distinguishing between individuals is no longer possible, for now – it is a war, and even the innocent shall not be absolved." The Irgun also began carrying out reprisal missions, as it had under David Raziel's command. At the same time though, it published announcements calling on the Arabs to lay down their weapons and maintain a ceasefire: The National Military Organization has warned you, if the murderous attacks on Jewish civilians shall continue, its soldiers will penetrate your centers of activity and plague you. You have not heeded the warning. You continued to harm our brothers and murder them in wild cruelty. Therefore soldiers of the National Military Organization will go on the attack, as we have warned you. ... However even in these frenzied times, when Arab and Jewish blood is spilled at the British enslaver, we hereby call upon you ... to stop the attacks and create peace between us. We do not want a war with you. We are certain that neither do you want a war with us... However, the mutual attacks continued. The Irgun attacked the Arab villages of Tira near Haifa, Yehudiya ('Abassiya) in the center, and Shuafat by Jerusalem. The Irgun also attacked in the Wadi Rushmiya neighborhood in Haifa and Abu Kabir in Jaffa. On December 29 Irgun units arrived by boat to the Jaffa shore and a gunfight between them and Arab gangs ensued. The following day a bomb was thrown from a speeding Irgun car at a group of Arab men waiting to be hired for the day at the Haifa oil refinery, resulting in seven Arabs killed, and dozens injured. In response, some Arab workers attacked Jews in the area, killing 41. This sparked a Haganah response in Balad al-Sheykh, which resulted in the deaths of 60 civilians. The Irgun's goal in the fighting was to move the battles from Jewish populated areas to Arab populated areas. On January 1, 1948, the Irgun attacked again in Jaffa, its men wearing British uniforms; later in the month it attacked in Beit Nabala, a base for many Arab fighters. On 5 January 1948 the Irgun detonated a lorry bomb outside Jaffa's Ottoman built Town Hall, killing 14 and injuring 19. In Jerusalem, two days later, Irgun members in a stolen police van rolled a barrel bomb into a large group of civilians who were waiting for a bus by the Jaffa Gate, killing around sixteen. In the pursuit that followed three of the attackers were killed and two taken prisoner. On 6 April 1948, the Irgun raided the British Army camp at Pardes Hanna killing six British soldiers and their commanding officer. The Deir Yassin massacre was carried out in a village west of Jerusalem that had signed a non-belligerency pact with its Jewish neighbors and the Haganah, and repeatedly had barred entry to foreign irregulars.Jon Kimche, 'Seven Fallen Pillars – The Middle East, 1915–1950'. Secker and Warburg, London. 1950. p. 217: "Dir Yassin was one of the few Arab villages whose inhabitants had refused permission for foreign Arab volunteers to use it as a base...." On 9 April approximately 120 Irgun and Lehi members began an operation to capture the village. During the operation, the villagers fiercely resisted the attack, and a battle broke out. In the end, the Irgun and Lehi forces advanced gradually through house-to-house fighting. The village was only taken after the Irgun began systematically dynamiting houses, and after a Palmach unit intervened and employed mortar fire to silence the villagers' sniper positions.Milstein, Uri (1998). History of Israel's War of Independence: Out of Crisis Came Decision. Volume 4, University Press of America. The operation resulted in five Jewish fighters dead and 40 injured. Some 100 to 120 villagers were also killed. There are allegations that Irgun and Lehi forces committed war crimes during and after the capture of the village. These allegations include reports that fleeing individuals and families were fired at, and prisoners of war were killed after their capture. A Haganah report writes:The conquest of the village was carried out with great cruelty. Whole families – women, old people, children – were killed. ... Some of the prisoners moved to places of detention, including women and children, were murdered viciously by their captors.Some say that this incident was an event that accelerated the Arab exodus from Palestine. The Irgun cooperated with the Haganah in the conquest of Haifa. At the regional commander's request, on April 21 the Irgun took over an Arab post above Hadar Ha'Carmel as well as the Arab neighborhood of Wadi Nisnas, adjacent to the Lower City. The Irgun acted independently in the conquest of Jaffa (part of the proposed Arab State according to the UN Partition Plan). On April 25 Irgun units, about 600 strong, left the Irgun base in Ramat Gan towards Arab Jaffa. Difficult battles ensued, and the Irgun faced resistance from the Arabs as well as the British. Under the command of Amichai "Gidi" Paglin, the Irgun's chief operations officer, the Irgun captured the neighborhood of Manshiya, which threatened the city of Tel Aviv. Afterwards the force continued to the sea, towards the area of the port, and using mortars, shelled the southern neighborhoods. In his report concerning the fall of Jaffa the local Arab military commander, Michel Issa, wrote: "Continuous shelling with mortars of the city by Jews for four days, beginning 25 April, [...] caused inhabitants of city, unaccustomed to such bombardment, to panic and flee." According to Morris the shelling was done by the Irgun. Their objective was "to prevent constant military traffic in the city, to break the spirit of the enemy troops [and] to cause chaos among the civilian population in order to create a mass flight." High Commissioner Cunningham wrote a few days later "It should be made clear that IZL attack with mortars was indiscriminate and designed to create panic among the civilian inhabitants." The British demanded the evacuation of the newly conquered city, and militarily intervened, ending the Irgun offensive. Heavy British shelling against Irgun positions in Jaffa failed to dislodge them, and when British armor pushed into the city, the Irgun resisted; a bazooka team managed to knock out one tank, buildings were blown up and collapsed onto the streets as the armor advanced, and Irgun men crawled up and tossed live dynamite sticks onto the tanks. The British withdrew, and opened negotiations with the Jewish authorities. An agreement was worked out, under which Operation Hametz would be stopped and the Haganah would not attack Jaffa until the end of the Mandate. The Irgun would evacuate Manshiya, with Haganah fighters replacing them. British troops would patrol its southern end and occupy the police fort. The Irgun had previously agreed with the Haganah that British pressure would not lead to withdrawal from Jaffa and that custody of captured areas would be turned over to the Haganah. The city ultimately fell on May 13 after Haganah forces entered the city and took control of the rest of the city, from the south – part of the Hametz Operation which included the conquest of a number of villages in the area. The battles in Jaffa were a great victory for the Irgun. This operation was the largest in the history of the organization, which took place in a highly built up area that had many militants in shooting positions. During the battles explosives were used in order to break into homes and continue forging a way through them. Furthermore, this was the first occasion in which the Irgun had directly fought British forces, reinforced with armor and heavy weaponry. The city began these battles with an Arab population estimated at 70,000, which shrank to some 4,100 Arab residents by the end of major hostilities. Since the Irgun captured the neighborhood of Manshiya on its own, causing the flight of many of Jaffa's residents, the Irgun took credit for the conquest of Jaffa. It had lost 42 dead and about 400 wounded during the battle. Integration with the IDF and the Altalena Affair On May 14, 1948 the establishment of the State of Israel was proclaimed. The declaration of independence was followed by the establishment of the Israel Defense Forces (IDF), and the process of absorbing all military organizations into the IDF started. On June 1, an agreement had been signed between Menachem Begin and Yisrael Galili for the absorption of the Irgun into the IDF. One of the clauses stated that the Irgun had to stop smuggling arms. Meanwhile, in France, Irgun representatives purchased a ship, renamed Altalena (a pseudonym of Ze'ev Jabotinsky), and weapons. The ship sailed on June 11 and arrived at the Israeli coast on June 20, during the first truce of the 1948 Arab–Israeli War. Despite United Nations Security Council Resolution 50 declaring an arms embargo in the region, neither side respected it. When the ship arrived the Israeli government, headed by Ben-Gurion, was adamant in its demand that the Irgun surrender and hand over all of the weapons. Ben-Gurion said: "We must decide whether to hand over power to Begin or to order him to cease his activities. If he does not do so, we will open fire! Otherwise, we must decide to disperse our own army." There were two confrontations between the newly formed IDF and the Irgun: when Altalena reached Kfar Vitkin in the late afternoon of Sunday, June 20 many Irgun militants, including Begin, waited on the shore. A clash with the Alexandroni Brigade, commanded by Dan Even (Epstein), occurred. Fighting ensued and there were a number of casualties on both sides. The clash ended in a ceasefire and the transfer of the weapons on shore to the local IDF commander, and with the ship, now reinforced with local Irgun members, including Begin, sailing to Tel Aviv, where the Irgun had more supporters. Many Irgun members, who joined the IDF earlier that month, left their bases and concentrated on the Tel Aviv beach. A confrontation between them and the IDF units started. In response, Ben-Gurion ordered Yigael Yadin (acting Chief of Staff) to concentrate large forces on the Tel Aviv beach and to take the ship by force. Heavy guns were transferred to the area and at four in the afternoon, Ben-Gurion ordered the shelling of the Altalena. One of the shells hit the ship, which began to burn. Sixteen Irgun fighters were killed in the confrontation with the army; six were killed in the Kfar Vitkin area and ten on Tel Aviv beach. Three IDF soldiers were killed: two at Kfar Vitkin and one in Tel Aviv. After the shelling of the Altalena, more than 200 Irgun fighters were arrested. Most of them were freed several weeks later. The Irgun militants were then fully integrated with the IDF and not kept in separate units. The initial agreement for the integration of the Irgun into the IDF did not include Jerusalem, where a small remnant of the Irgun called the Jerusalem Battalion, numbering around 400 fighters, and Lehi, continued to operate independently of the government. Following the assassination of UN Envoy for Peace Folke Bernadotte by Lehi in September 1948, the Israeli government determined to immediately dismantle the underground organizations. An ultimatum was issued to the Irgun to liquidate as an independent organization and integrate into the IDF or be destroyed, and Israeli troops surrounded the Irgun camp in the Katamon Quarter of Jerusalem. The Irgun accepted the ultimatum on September 22, 1948, and shortly afterward the remaining Irgun fighters in Jerusalem began enlisting in the IDF and turning over their arms.Irgunists in Jerusalem Surrender Their Arms to Govt; Dissidents to Join Army Today 22 September 1948, www.jta.org, accessed 29 September 2019 At Begin's orders, the Irgun in the diaspora formally disbanded on January 12, 1949, with the Irgun's former Paris headquarters becoming the European bureau of the Herut movement. Propaganda In order to increase the popularity of the Irgun organization and ideology, Irgun employed propaganda. This propaganda was mainly aimed at the British, and included the idea of Eretz Israel. According to Irgun propaganda posters, the Jewish state was not only to encompass all of Mandatory Palestine, but also The Emirate of Transjordan. When the Labour party came into power in Britain in July 1945, Irgun published an announcement entitled, "We shall give the Labour Government a Chance to Keep Its Word." In this publication, Irgun stated, "Before it came to power, this Party undertook to return the Land of Israel to the people of Israel as a free state... Men and parties in opposition or in their struggle with their rivals, have, for twenty-five years, made us many promises and undertaken clear obligations; but, on coming to power, they have gone back on their words." Another publication, which followed a British counter-offensive against Jewish organizations in Palestine, Irgun released a document titled, "Mobilize the Nation!" Irgun used this publication to paint the British regime as hostile to the Jewish people, even comparing the British to the Nazis. In response to what was seen as British aggression, Irgun called for a Hebrew Provisional Government, and a Hebrew Liberation Army. Criticism Description as a terrorist organization References to the Irgun as a terrorist organization came from sources including the Anglo-American Committee of Inquiry, newspapers and a number of prominent world and Jewish figures. Leaders within the mainstream Jewish organizations, the Jewish Agency, Haganah and Histadrut, as well as the British authorities, routinely condemned Irgun operations as terrorism and branded it an illegal organization as a result of the group's attacks on civilian targets. However, privately at least the Haganah kept a dialogue with the dissident groups. Ironically, in early 1947, "the British army in Mandate Palestine banned the use of the term 'terrorist' to refer to the Irgun zvai Leumi ... because it implied that British forces had reason to be terrified." Irgun attacks prompted a formal declaration from the World Zionist Congress in 1946, which strongly condemned "the shedding of innocent blood as a means of political warfare." The Israeli government, in September 1948, acting in response to the assassination of Count Folke Bernadotte, outlawed the Irgun and Lehi groups, declaring them terrorist organizations under the Prevention of Terrorism Ordinance. In 1948, The New York Times published a letter signed by a number of prominent Jewish figures including Hannah Arendt, Albert Einstein, Sidney Hook, and Rabbi Jessurun Cardozo, which described Irgun as "a terrorist, right-wing, chauvinist organization in Palestine". The letter went on to state that Irgun and the Stern gang "inaugurated a reign of terror in the Palestine Jewish community. Teachers were beaten up for speaking against them, adults were shot for not letting their children join them. By gangster methods, beatings, window-smashing, and widespread robberies, the terrorists intimidated the population and exacted a heavy tribute." Soon after World War II, Winston Churchill said "we should never have stopped immigration before the war", but that the Irgun were "the vilest gangsters" and that he would "never forgive the Irgun terrorists." In 2006, Simon McDonald, the British ambassador in Tel Aviv, and John Jenkins, the Consul-General in Jerusalem, wrote in response to a pro-Irgun commemoration of the King David Hotel bombing: "We do not think that it is right for an act of terrorism, which led to the loss of many lives, to be commemorated." They also called for the removal of plaques at the site which presented as a fact that the deaths were due to the British ignoring warning calls. The plaques, in their original version, read: McDonald and Jenkins said that no such warning calls were made, adding that even if they had, "this does not absolve those who planted the bomb from responsibility for the deaths." Bruce Hoffman states: "Unlike many terrorist groups today, the Irgun's strategy was not deliberately to target or wantonly harm civilians." Max Abrahms writes that the Irgun "pioneered the practice of issuing pre-attack warnings to spare civilians", which was later emulated by the African National Congress (ANC) and other groups and proved "effective but not foolproof". In addition, Begin ordered attacks to take place at night and even during Shabbat to reduce the likelihood of civilian casualties. U.S. military intelligence found that "the Irgun Zvai Leumi is waging a general war against the government and at all times took special care not to cause damage or injury to persons". Although the King David Hotel bombing is widely considered a prima facie case of Irgun terrorism, Abrahms comments: "But this hotel wasn't a normal hotel. It served as the headquarters for the British Armed Forces in Palestine. By all accounts, the intent wasn't to harm civilians." Accusations of fascismHa'aretz columnist and Israeli historian Tom Segev wrote of the Irgun: "In the second half of 1940, a few members of the Irgun Zvai Leumi (National Military Organization) – the anti-British terrorist group sponsored by the Revisionists and known by its acronym Etzel, and to the British simply as the Irgun – made contact with representatives of Fascist Italy, offering to cooperate against the British." Clare Hollingworth, the Daily Telegraph and The Scotsman correspondent in Jerusalem during 1948 wrote several outspoken reports after spending several weeks in West Jerusalem: Irgun is in fact rapidly becoming the 'SS' of the new state. There is also a strong 'Gestapo' – but no-one knows who is in it. Other A US military intelligence report, dated January 1948, described Irgun recruiting tactics amongst Displaced Persons (DP) in the camps across Germany: 'Irgun ... seems to be concentrating on the DP police force. This is an old technique in Eastern Europe and in all police states. By controlling the police, a small, unscrupulous group of determined people can impose its will on a peaceful and inarticulate majority; it is done by threats, intimidation, by violence and if need be bloodshed ... they have embarked upon a course of violence within the camps.' Alan Dershowitz wrote in his book The Case for Israel that unlike the Haganah, the policy of the Irgun had been to encourage the flight of local Arabs. See also Konrad Adenauer (Assassination attempt) Jewish religious terrorism List of Irgun attacks List of notable Irgun members Nationalist terrorism Zionist political violence References Further reading J. Bowyer Bell, Terror Out of Zion: Irgun Zvai Leumi, Lehi, and the Palestine Underground, 1929–1949 (Avon, 1977), Menachem Begin, The Revolt: Memoirs of the Leader of the Irgun, Dell Books, (New York, NY, 1978) In fiction Tintin au Pays de l'Or Noir, by Herge. Original version, 1971. The Hope, by Herman Wouk, 1993. Dawn, by Eli Wiesel, 1961. External links Prof. Yehuda Lapidot, Irgun website, history of Irgun FBI file on Irgun Encyclopædia Britannica Entry on Irgun Letter of prominent Jews to New York Times, December 4, 1948, warning of dangers of Irgun British Security Service files on Jewish terrorist activities, The National Archives, released through Freedom of information legislation in March 2006. The Iron Wall: Zionist Revisionism from Jabotinsky to Shamir, by Lenni Brenner 1952 Assassination attempt against German Chancellor Konrad Adenauer by Irgun under Menachem Begin Arie Perliger and Leonard Weinberg, Jewish Self Defense and Terrorist Groups Prior to the Establishment of the State of Israel: Roots and Traditions. Totalitarian Movements & Political Religions'', Vol. 4, No. 3 (2003) pp. 91–118. Defunct organizations designated as terrorist in Asia Jewish organizations in Mandatory Palestine Terrorism in Mandatory Palestine Resistance movements Zionist terrorism National liberation movements Revisionist Zionism Betar Military units and formations established in 1931 1931 establishments in Mandatory Palestine Military units and formations disestablished in 1948 1948 disestablishments in Israel
[ 0.1829615980386734, 0.12896046042442322, -0.8654726147651672, -0.5743447542190552, -0.7996878027915955, 0.1305021047592163, 0.40151727199554443, 0.17120885848999023, 0.23884595930576324, -0.4476805627346039, -0.4657554030418396, 0.4057779312133789, -0.4375770092010498, 0.608455240726471, ...
15408
https://en.wikipedia.org/wiki/Isoroku%20Yamamoto
Isoroku Yamamoto
was a Japanese Marshal Admiral of the Imperial Japanese Navy (IJN) and the commander-in-chief of the Combined Fleet during World War II until his death. Yamamoto held several important posts in the IJN, and undertook many of its changes and reorganizations, especially its development of naval aviation. He was the commander-in-chief during the early years of the Pacific War and oversaw major engagements including the attack on Pearl Harbor and the Battle of Midway. Yamamoto was killed in April 1943 after American code breakers identified his flight plans, enabling the United States Army Air Forces to shoot down his plane. His death was a major blow to Japanese military morale during World War II. Family background Yamamoto was born in Nagaoka, Niigata. His father, Sadayoshi Takano (高野 貞吉), was an intermediate-rank samurai of the Nagaoka Domain. "Isoroku" is an old Japanese term meaning "56"; the name referred to his father's age at Isoroku's birth. In 1916, Isoroku was adopted into the Yamamoto family (another family of former Nagaoka samurai) and took the Yamamoto name. It was a common practice for samurai families lacking sons to adopt suitable young men in this fashion to carry on the family name, the rank and the income that went with it. Isoroku married Reiko Mihashi in 1918; they had two sons and two daughters. Early career Yamamoto would go on to graduate from the Imperial Japanese Naval Academy in 1904, ranking 7th in his class. He then subsequently served on the armored cruiser during the Russo-Japanese War. He was wounded at the Battle of Tsushima, losing two fingers (the index and middle fingers) on his left hand, as the cruiser was hit repeatedly by the Russian battle line. He returned to the Naval Staff College in 1914, emerging as a lieutenant commander in 1916. In December 1919, he was promoted to commander. 1920s and 1930s Yamamoto was part of the Japanese Navy establishment, who were rivals of the more aggressive Army establishment, especially the officers of the Kwantung Army. He promoted a policy of a strong fleet to project force through gunboat diplomacy, rather than a fleet used primarily for the transport of invasion land forces, as some of his political opponents in the Army wanted. This stance led him to oppose the invasion of China. He also opposed war against the United States, partly because of his studies at Harvard University (1919–1921) and his two postings as a naval attaché in Washington, D.C., where he learned to speak fluent English. Yamamoto traveled extensively in the United States during his tour of duty there, where he studied American customs and business practices. He was promoted to captain in 1923. On February 13, 1924, Captain Yamamoto was part of the Japanese delegation visiting the United States Naval War College. Later that year, he changed his specialty from gunnery to naval aviation. His first command was the cruiser in 1928, followed by the aircraft carrier . He participated in the London Naval Conference 1930 as a rear admiral and the London Naval Conference 1935 as a vice admiral, as the growing military influence on the government at the time deemed that a career military specialist needed to accompany the diplomats to the arms limitations talks. Yamamoto was a strong proponent of naval aviation and served as head of the Aeronautics Department, before accepting a post as commander of the First Carrier Division. Yamamoto opposed the Japanese invasion of northeast China in 1931, the subsequent full-scale land war with China in 1937, and the Tripartite Pact with Nazi Germany and fascist Italy in 1940. As Deputy Navy Minister, he apologized to United States Ambassador Joseph C. Grew for the bombing of the gunboat USS Panay in December 1937. These issues made him a target of assassination threats by pro-war militarists. Throughout 1938, many young army and naval officers began to speak publicly against Yamamoto and certain other Japanese admirals, such as Mitsumasa Yonai and Shigeyoshi Inoue, for their strong opposition to a tripartite pact with Nazi Germany, which the admirals saw as inimical to "Japan's natural interests". Yamamoto received a steady stream of hate mail and death threats from Japanese nationalists. His reaction to the prospect of death by assassination was passive and accepting. The admiral wrote: To die for Emperor and Nation is the highest hope of a military man. After a brave hard fight the blossoms are scattered on the fighting field. But if a person wants to take a life instead, still the fighting man will go to eternity for Emperor and country. One man's life or death is a matter of no importance. All that matters is the Empire. As Confucius said, "They may crush cinnabar, yet they do not take away its color; one may burn a fragrant herb, yet it will not destroy the scent." They may destroy my body, yet they will not take away my will. The Japanese Army, annoyed at Yamamoto's unflinching opposition to a Rome-Berlin-Tokyo treaty, dispatched military police to "guard" him, a ruse by the Army to keep an eye on him. He was later reassigned from the naval ministry to sea as the commander-in-chief of the Combined Fleet on August 30, 1939. This was done as one of the last acts of acting Navy Minister Mitsumasa Yonai, under Baron Hiranuma Kiichirō's short-lived administration. It was done partly to make it harder for assassins to target Yamamoto. Yonai was certain that if Yamamoto remained ashore, he would be killed before the year [1939] ended. 1940–1941 Yamamoto was promoted to admiral on November 15, 1940. This, in spite of the fact that when Hideki Tojo was appointed Prime Minister on October 18, 1941, many political observers thought that Yamamoto's career was essentially over. Tojo had been Yamamoto's old opponent from the time when the latter served as Japan's deputy naval minister and Tōjō was the prime mover behind Japan's takeover of Manchuria. It was believed that Yamamoto would be appointed to command the Yokosuka Naval Base, "a nice safe demotion with a big house and no power at all". However, after a brief stint in the post, a new Japanese cabinet was announced, and Yamamoto found himself returned to his position of power despite his open conflict with Tojo and other members of the Army's oligarchy who favored war with the European powers and the United States. Two of the main reasons for Yamamoto's political survival were his immense popularity within the fleet, where he commanded the respect of his men and officers, and his close relations with the imperial family. He also had the acceptance of Japan's naval hierarchy: There was no officer more competent to lead the Combined Fleet to victory than Admiral Yamamoto. His daring plan for the Pearl Harbor attack had passed through the crucible of the Japanese naval establishment, and after many expressed misgivings, his fellow admirals had realized that Yamamoto spoke no more than the truth when he said that Japan's hope for victory in this [upcoming] war was limited by time and oil. Every sensible officer of the navy was well aware of the perennial oil problems. Also, it had to be recognized that if the enemy could seriously disturb Japanese merchant shipping, then the fleet would be endangered even more. Consequently, Yamamoto stayed in his post. With Tojo now in charge of Japan's highest political office, it became clear the Army would lead the Navy into a war about which Yamamoto had serious reservations. He wrote to an ultranationalist: Should hostilities once break out between Japan and the United States, it would not be enough that we take Guam and the Philippines, nor even Hawaii and San Francisco. To make victory certain, we would have to march into Washington and dictate the terms of peace in the White House. I wonder if our politicians [who speak so lightly of a Japanese-American war] have confidence as to the final outcome and are prepared to make the necessary sacrifices. This quote was spread by the militarists, minus the last sentence, so it was interpreted in America as a boast that Japan would conquer the entire continental United States. The omitted sentence showed Yamamoto's counsel of caution towards a war that could cost Japan dearly. Nevertheless, Yamamoto accepted the reality of impending war and planned for a quick victory by destroying the United States Pacific Fleet at Pearl Harbor in a preventive strike, while simultaneously thrusting into the oil- and rubber-rich areas of Southeast Asia, especially the Dutch East Indies, Borneo, and Malaya. In naval matters, Yamamoto opposed the building of the super battleships and as an unwise investment of resources. Yamamoto was responsible for a number of innovations in Japanese naval aviation. Although remembered for his association with aircraft carriers, Yamamoto did more to influence the development of land-based naval aviation, particularly the Mitsubishi G3M and G4M medium bombers. His demand for great range and the ability to carry a torpedo was intended to conform to Japanese conceptions of bleeding the American fleet as it advanced across the Pacific. The planes did achieve long range, but long-range fighter escorts were not available. These planes were lightly constructed and when fully fueled, they were especially vulnerable to enemy fire. This earned the G4M the sardonic nickname the "flying cigarette lighter". Yamamoto would eventually die in one of these aircraft. The range of the G3M and G4M contributed to a demand for great range in a fighter aircraft. This partly drove the requirements for the A6M Zero, which was as noteworthy for its range as for its maneuverability. Both qualities were again purchased at the expense of light construction and flammability that later contributed to the A6M's high casualty rates as the war progressed. As Japan moved toward war during 1940, Yamamoto gradually moved toward strategic as well as tactical innovation, again with mixed results. Prompted by talented young officers such as Lieutenant Commander Minoru Genda, Yamamoto approved the reorganization of Japanese carrier forces into the First Air Fleet, a consolidated striking force that gathered Japan's six largest carriers into one unit. This innovation gave great striking capacity, but also concentrated the vulnerable carriers into a compact target. Yamamoto also oversaw the organization of a similar large land-based organization in the 11th Air Fleet, which would later use the G3M and G4M to neutralize American air forces in the Philippines and sink the British Force Z. In January 1941, Yamamoto went even further and proposed a radical revision of Japanese naval strategy. For two decades, in keeping with the doctrine of Captain Alfred T. Mahan,<ref>Mahan, The Influence of Seapower on History</ref> the Naval General Staff had planned in terms of Japanese light surface forces, submarines, and land-based air units whittling down the American fleet as it advanced across the Pacific until the Japanese Navy engaged it in a climactic Kantai Kessen ("decisive battle") in the northern Philippine Sea (between the Ryukyu Islands and the Marianas), with battleships fighting in traditional battle lines. Correctly pointing out this plan had never worked even in Japanese war games, and painfully aware of American strategic advantages in military production capacity, Yamamoto proposed instead to seek parity with the Americans by first reducing their forces with a preventive strike, then following up with a "decisive battle" fought offensively, rather than defensively. Yamamoto hoped, but probably did not believe, that if the Americans could be dealt terrific blows early in the war, they might be willing to negotiate an end to the conflict. The Naval General Staff proved reluctant to go along, and Yamamoto was eventually driven to capitalize on his popularity in the fleet by threatening to resign to get his way. Admiral Osami Nagano and the Naval General Staff eventually caved in to this pressure, but only insofar as approving the attack on Pearl Harbor. The First Air Fleet commenced preparations for the Pearl Harbor raid, solving a number of technical problems along the way, including how to launch torpedoes in the shallow waters of Pearl Harbor and how to craft armor-piercing bombs by machining down battleship gun projectiles. Attack on Pearl Harbor Though the United States and Japan were officially at peace, the First Air Fleet of six carriers attacked on December 7, 1941, launching 353 aircraft against Pearl Harbor and other locations within Honolulu in two waves. The attack was a complete success according to the parameters of the mission, which sought to sink at least four American battleships and prevent the United States from interfering in Japan's southward advance for at least six months. Three American aircraft carriers were also considered a choice target, but these were at sea at the time. In the end, four American battleships were sunk, four were damaged, and eleven other cruisers, destroyers, and auxiliaries were sunk or seriously damaged, 188 American aircraft were destroyed and 159 others damaged, and 2,403 people were killed and 1,178 others wounded. The Japanese lost 64 servicemen and only 29 aircraft, with 74 others damaged by anti-aircraft fire from the ground. The damaged aircraft were disproportionately dive and torpedo bombers, seriously reducing the ability to exploit the first two waves' success, so the commander of the First Air Fleet, Naval Vice Admiral Chuichi Nagumo, withdrew. Yamamoto later lamented Nagumo's failure to seize the initiative to seek out and destroy the American carriers or further bombard various strategically important facilities on Oahu. Nagumo had absolutely no idea where the American carriers were, and remaining on station while his forces looked for them ran the risk of his own forces being found first and attacked while his aircraft were absent searching. In any case, insufficient daylight remained after recovering the aircraft from the first two waves for the carriers to launch and recover a third before dark, and Nagumo's escorting destroyers lacked the fuel capacity to loiter long. Much has been made of Yamamoto's hindsight, but in keeping with Japanese military tradition not to criticize the commander on the spot, he did not punish Nagumo for his withdrawal. On the strategic, moral, and political level, the attack was a disaster for Japan, rousing Americans' thirst for revenge due to what is now famously called a "sneak attack". The shock of the attack, coming in an unexpected place with devastating results and without a declaration of war, galvanized the American public's determination to avenge the attack. When asked by Prime Minister Fumimaro Konoe in mid-1941 about the outcome of a possible war with the United States, Yamamoto made a well-known and prophetic statement: If ordered to fight, he said, "I shall run wild considerably for the first six months or a year, but I have utterly no confidence for the second and third years." His prediction would be vindicated, as Japan easily conquered territories and islands in Asia and the Pacific for the first six months of the war, before suffering a major defeat at the Battle of Midway on June 4–7, 1942, which ultimately tilted the balance of power in the Pacific towards the United States. As a strategic blow intended to prevent American interference in the Dutch East Indies for six months, the Pearl Harbor attack was a success, but unbeknownst to Yamamoto, it was a pointless one. In 1935, in keeping with the evolution of War Plan Orange, the United States Navy had abandoned any notion of charging across the Pacific towards the Philippines at the outset of a war with Japan. In 1937, the United States had further determined even fully manning the fleet to wartime levels could not be accomplished in less than six months, and the extensive logistical support required to advance across the Pacific simply did not exist and would require two years to construct. In 1940, American Chief of Naval Operations Admiral Harold Stark had penned the Plan Dog memo, which recommended a defensive war in the Pacific while the country concentrated on defeating Nazi Germany first, and consigned Admiral Husband Kimmel's Pacific Fleet to merely keeping the Imperial Japanese Navy out of the eastern Pacific and away from the shipping lanes to Australia. Moreover, it is questionable whether the United States would have gone to war at all had Japan attacked only British and Dutch possessions in the Far East. December 1941 – May 1942 With the American fleet largely neutralized at Pearl Harbor, Yamamoto's Combined Fleet turned to the task of executing the larger Japanese war plan devised by the Imperial Japanese Army and Navy General Staff. The First Air Fleet made a circuit of the Pacific, striking American, Australian, Dutch, and British installations from Wake Island to Australia to Ceylon in the Indian Ocean. The 11th Air Fleet caught the United States Fifth Air Force on the ground in the Philippines hours after Pearl Harbor, and then sank the British Force Z's battleship and battlecruiser at sea. Under Yamamoto's able subordinates, Vice Admirals Jisaburō Ozawa, Nobutake Kondō, and Ibō Takahashi, the Japanese swept the inadequate remaining American, British, Dutch and Australian naval assets from the Dutch East Indies in a series of amphibious landings and surface naval battles culminating in the Battle of the Java Sea on February 27, 1942. Along with the occupation of the Dutch East Indies came the fall of Singapore on February 15, and the eventual reduction of the remaining American-Filipino defensive positions in the Philippines on the Bataan peninsula on April 9 and Corregidor Island on May 6. The Japanese had secured their oil- and rubber-rich "southern resources area". By late-March, having achieved their initial aims with surprising speed and little loss, albeit against enemies ill-prepared to resist them, the Japanese paused to consider their next moves. Yamamoto and a few Japanese military leaders and officials waited, hoping that the United States or Great Britain would negotiate an armistice or a peace treaty to end the war. But when the British, as well as the Americans, expressed no interest in negotiating, Japanese thoughts turned to securing their newly seized territory and acquiring more with an eye to driving one or more of their enemies out of the war. Competing plans were developed at this stage, including thrusts to the west against British India, south against Australia, and east against the United States. Yamamoto was involved in this debate, supporting different plans at different times with varying degrees of enthusiasm and for varying purposes, including "horse-trading" for support of his own objectives. Plans included ideas as ambitious as invading India or Australia, or seizing Hawaii. These grandiose ventures were inevitably set aside, as the Army could not spare enough troops from China for the first two, which would require a minimum of 250,000 men, nor shipping to support the latter two (transports were allocated separately to the Navy and Army, and jealously guarded.). Instead, the Imperial General Staff supported an army thrust into Burma in hopes of linking up with Indian nationalists revolting against British rule, and attacks in New Guinea and the Solomon Islands designed to imperil Australia's lines of communication with the United States. Yamamoto argued for a decisive offensive strike in the east to finish off the American fleet, but the more conservative Naval General Staff officers were unwilling to risk it. On April 18, in the midst of these debates, the Doolittle Raid struck Tokyo and surrounding areas, demonstrating the threat posed by American aircraft carriers, and giving Yamamoto an event he could exploit to get his way, and further debate over military strategy came to a quick end. The Naval General Staff agreed to Yamamoto's Midway Island (MI) Operation, subsequent to the first phase of the operations against Australia's link with America, and concurrent with its plan to invade the Aleutian Islands. Yamamoto rushed planning for the Midway and Aleutians missions, while dispatching a force under Vice Admiral Takeo Takagi, including the Fifth Carrier Division (the large new carriers and ), to support the effort to seize the islands of Tulagi and Guadalcanal for seaplane and airplane bases, and the town of Port Moresby on Papua New Guinea's south coast facing Australia. The Port Moresby (MO) Operation proved an unwelcome setback. Although Tulagi and Guadalcanal were taken, the Port Moresby invasion fleet was compelled to turn back when Takagi clashed with an American carrier task force in the Battle of the Coral Sea in early May. Although the Japanese sank the carrier and damaged the , the Americans damaged the carrier Shōkaku so badly that she required dockyard repairs, and the Japanese lost the light carrier . Just as importantly, Japanese operational mishaps and American fighters and anti-aircraft fire devastated the dive bomber and torpedo plane formations of both Shōkakus and Zuikakus air groups. These losses sidelined Zuikaku while she awaited replacement aircraft and aircrews, and saw to tactical integration and training. These two ships would be sorely missed a month later at Midway. Battle of Midway, June 1942 Yamamoto's plan for Midway Island was an extension of his efforts to knock the American Pacific Fleet out of action long enough for Japan to fortify its defensive perimeter in the Pacific island chains. Yamamoto felt it necessary to seek an early, offensive decisive battle. This plan was long believed to have been to draw American attention—and possibly carrier forces—north from Pearl Harbor by sending his Fifth Fleet (one carrier, one light carrier, four battleships, eight cruisers, 25 destroyers, and four transports) against the Aleutians, raiding Dutch Harbor on Unalaska Island and invading the more distant islands of Kiska and Attu. While Fifth Fleet attacked the Aleutians, First Mobile Force (four carriers, two battleships, three cruisers, and 12 destroyers) would attack Midway and destroy its air force. Once this was neutralized, Second Fleet (one light carrier, two battleships, 10 cruisers, 21 destroyers, and 11 transports) would land 5,000 troops to seize the atoll from the United States Marines. The seizure of Midway was expected to draw the American carriers west into a trap where the First Mobile Force would engage and destroy them. Afterwards, First Fleet (one light carrier, three battleships, one light cruiser and nine destroyers), in conjunction with elements of Second Fleet, would mop up remaining US surface forces and complete the destruction of the American Pacific Fleet. To guard against failure, Yamamoto initiated two security measures. The first was an aerial reconnaissance mission (Operation K) over Pearl Harbor to ascertain if the American carriers were there. The second was a picket line of submarines to detect the movement of enemy carriers toward Midway in time for First Mobile Force, First Fleet, and Second Fleet to combine against it. In the event, the first measure was aborted and the second delayed until after the American carriers had already sortied. The plan was a compromise and hastily prepared, apparently so it could be launched in time for the anniversary of the Battle of Tsushima, but appeared well thought out, well organized, and finely timed when viewed from a Japanese viewpoint. Against four carriers, two light carriers, seven battleships, 14 cruisers and 42 destroyers likely to be in the area of the main battle, the United States could field only three carriers, eight cruisers, and 15 destroyers. The disparity appeared crushing. Only in numbers of carrier decks, available aircraft, and submarines was there near parity between the two sides. Despite various mishaps developed in the execution, it appeared that—barring something unforeseen—Yamamoto held all the cards. Unknown to Yamamoto, the Americans had learned of Japanese plans thanks to the code breaking of Japanese naval code D (known to the US as JN-25). As a result, Admiral Chester Nimitz, the Pacific Fleet commander, was able to place his outnumbered forces in a position to conduct their own ambush. By Nimitz's calculation, his three available carrier decks, plus Midway, gave him rough parity with Nagumo's First Mobile Force. Following a nuisance raid by Japanese flying boats in May, Nimitz dispatched a minesweeper to guard the intended refueling point for Operation K near French Frigate Shoals, causing the reconnaissance mission to be aborted and leaving Yamamoto ignorant of whether the Pacific Fleet carriers were still at Pearl Harbor. It remains unclear why Yamamoto permitted the earlier attack, and why his submarines did not sortie sooner, as reconnaissance was essential to success at Midway. Nimitz also dispatched his carriers toward Midway early, and they passed the Japanese submarines en route to their picket line positions. Nimitz's carriers positioned themselves to ambush the Kidō Butai (striking force) when it struck Midway. A token cruiser and destroyer force was sent toward the Aleutians, but otherwise Nimitz ignored them. On June 4, 1942, days before Yamamoto expected them to interfere in the Midway operation, American carrier-based aircraft destroyed the four carriers of the Kidō Butai, catching the Japanese carriers at especially vulnerable times. With his air power destroyed and his forces not yet concentrated for a fleet battle, Yamamoto maneuvered his remaining forces, still strong on paper, to trap the American forces. He was unable to do so because his initial dispositions had placed his surface combatants too far from Midway, and because Admiral Raymond Spruance prudently withdrew to the east to further defend Midway Island, believing (based on a mistaken submarine report) the Japanese still intended to invade. Not knowing several battleships, including the powerful , were in the Japanese order of battle, he did not comprehend the severe risk of a night surface battle, in which his carriers and cruisers would be at a disadvantage. However, his move to the east avoided that possibility. Correctly perceiving he had lost and could not bring surface forces into action, Yamamoto withdrew. The defeat marked the high tide of Japanese expansion. Yamamoto's plan has been the subject of much criticism. Some historians state it violated the principle of concentration of force and was overly complex. Others point to similarly complex Allied operations, such as Operation MB8, that were successful, and note the extent to which the American intelligence coup derailed the operation before it began. Had Yamamoto's dispositions not denied Nagumo adequate pre-attack reconnaissance assets, both the American cryptanalytic success and the unexpected appearance of the American carriers would have been irrelevant. Actions after Midway The Battle of Midway checked Japanese momentum, but the Japanese Navy was still a powerful force, capable of regaining the initiative. It planned to resume the thrust with Operation FS, aimed at eventually taking Samoa and Fiji to cut the American lifeline to Australia. Yamamoto remained as commander-in-chief, retained at least partly to avoid diminishing the morale of the Combined Fleet. However, he had lost face as a result of the Midway defeat, and the Naval General Staff were disinclined to indulge in further gambles. This reduced Yamamoto to pursuing the classic defensive "decisive battle strategy" he had attempted to avoid. Yamamoto committed Combined Fleet units to a series of small attrition actions across the south and central Pacific that stung the Americans, but in return suffered losses he could ill afford. Three major efforts to beat the Americans moving on Guadalcanal precipitated a pair of carrier battles that Yamamoto commanded personally: the Battles of the Eastern Solomons and Santa Cruz Islands in September and October, respectively, and finally a wild pair of surface engagements in November, all timed to coincide with Japanese Army pushes. The effort was wasted when the Army could not hold up its end of the operation. Yamamoto's naval forces won a few victories and inflicted considerable losses and damage to the American fleet in several battles around Guadalcanal which included the Battles of Savo Island, Cape Esperance, and Tassafaronga, but he could never draw the United States into a decisive fleet action. As a result, Japanese naval strength declined. Death To boost morale following the defeat at Guadalcanal, Yamamoto decided to make an inspection tour throughout the South Pacific. It was during this tour that US officials decided to assassinate him. On April 14, 1943, the United States naval intelligence effort, codenamed "Magic", intercepted and decrypted a message containing specifics of Yamamoto's tour, including arrival and departure times and locations, as well as the number and types of aircraft that would transport and accompany him on the journey. Yamamoto, the itinerary revealed, would be flying from Rabaul to Balalae Airfield, on an island near Bougainville in the Solomon Islands, on the morning of April 18, 1943. President Franklin D. Roosevelt may have authorized Secretary of the Navy Frank Knox to "get Yamamoto," but no official record of such an order exists, and sources disagree whether he did so. Knox essentially let Admiral Chester W. Nimitz make the decision. Nimitz first consulted Admiral William Halsey Jr., Commander, South Pacific, and then authorized the mission on April 17 to intercept and shoot down Yamamoto's flight en route. A squadron of United States Army Air Forces Lockheed P-38 Lightning aircraft were assigned the task as only they possessed sufficient range. Select pilots from three units were informed that they were intercepting an "important high officer", with no specific name given. On the morning of April 18, despite urging by local commanders to cancel the trip for fear of ambush, Yamamoto's two Mitsubishi G4M bombers, used as fast transport aircraft without bombs, left Rabaul as scheduled for the trip. Sixteen P-38s intercepted the flight over Bougainville, and a dogfight ensued between them and the six escorting Mitsubishi A6M Zeroes. First Lieutenant Rex T. Barber engaged the first of the two Japanese transports, which turned out to be T1-323 (Yamamoto's aircraft). He fired on the aircraft until it began to spew smoke from its left engine. Barber turned away to attack the other transport as Yamamoto's plane crashed into the jungle. Yamamoto's body, along with the crash site, was found the next day in the jungle of the island of Bougainville by a Japanese search-and-rescue party, led by army engineer Lieutenant Tsuyoshi Hamasuna. According to Hamasuna, Yamamoto had been thrown clear of the plane's wreckage, his white-gloved hand grasping the hilt of his katana, still upright in his seat under a tree. Hamasuna said Yamamoto was instantly recognizable, head dipped down as if deep in thought. A post-mortem disclosed that Yamamoto had received two 0.50-caliber bullet wounds, one to the back of his left shoulder and another to the left side of his lower jaw that exited above his right eye. The Japanese navy doctor examining the body determined that the head wound had killed Yamamoto. The more violent details of Yamamoto's death were hidden from the Japanese public. The medical report was changed "on orders from above", according to biographer Hiroyuki Agawa.Agawa 2000, p. 364 Yamamoto's staff cremated his remains at Buin, Papua New Guinea, and his ashes were returned to Tokyo aboard the battleship , his last flagship. He was given a full state funeral on June 5, 1943, where he received, posthumously, the title of Marshal Admiral and was awarded the Order of the Chrysanthemum (1st Class). He was also awarded Nazi Germany's Knight's Cross of the Iron Cross with Oak Leaves and Swords. Some of his ashes were buried in the public Tama Cemetery, Tokyo (多摩霊園) and the remainder at his ancestral burial grounds at the temple of Chuko-ji in Nagaoka City. He was succeeded as commander-in-chief of the Combined Fleet by Admiral Mineichi Koga. Personal life Yamamoto practiced calligraphy. He and his wife, Reiko, had four children: two sons and two daughters. Yamamoto was an avid gambler, enjoying Go, shogi, billiards, bridge, mahjong, poker, and other games that tested his wits and sharpened his mind. He frequently made jokes about moving to Monaco and starting his own casino. He enjoyed the company of geisha, and his wife Reiko revealed to the Japanese public in 1954 that Yamamoto was closer to his favorite geisha Kawai Chiyoko than to her, which stirred some controversy. His funeral procession passed by Kawai's quarters on the way to the cemetery. The claim that Yamamoto was a Catholic is likely due to confusion with retired Admiral Shinjiro Stefano Yamamoto, who was a decade older than Isoroku, and died in 1942. Decorations Grand Cordon of the Order of the Chrysanthemum (posthumous appointment, 18 April 1943) Grand Cordon of the Order of the Rising Sun with Paulownia Flowers (4 April 1942) Grand Cordon of the Order of the Rising Sun (29 April 1940) Grand Cordon of the Order of the Sacred Treasure (23 March 1939; Second Class: 31 October 1931) Order of the Golden Kite (1st class: 18 April 1943 (posthumous); Second Class: 4 April 1942) Grand Cross of the Order of the German Eagle (Nazi Germany, 9 February 1940) Knight's Cross of the Iron Cross with Oak Leaves and Swords (Nazi Germany, 27 May 1943 (posthumous)) Dates of rank Midshipman—November 14, 1904 Ensign—August 31, 1905 Sublieutenant—September 28, 1907 Lieutenant—October 11, 1909 Lieutenant Commander—December 13, 1915 Commander—December 1, 1919 Captain—December 1, 1923 Rear Admiral—November 30, 1929 Vice Admiral—November 15, 1934 Admiral—November 15, 1940 Marshal-Admiral—April 18, 1943 (posthumous) In popular culture Since the end of the Second World War, a number of Japanese and American films have depicted the character of Isoroku Yamamoto. One of the most notable films is the 1970 movie Tora! Tora! Tora!, which stars Japanese actor Sô Yamamura as Yamamoto, who states after the attack on Pearl Harbor: The first film to feature Yamamoto was Toho's 1953 film Taiheiyô no washi, (later released in the United States as Eagle of the Pacific), in which Yamamoto was portrayed by Denjirô Ôkôchi. The 1960 film The Gallant Hours depicts the battle of wits between Vice-Admiral William Halsey, Jr. and Yamamoto from the start of the Guadalcanal Campaign in August 1942 to Yamamoto's death in April 1943. The film, however, portrays Yamamoto's death as occurring in November 1942, the day after the Naval Battle of Guadalcanal, and the P-38 aircraft that killed him as coming from Guadalcanal. In Daiei Studios's 1969 film Aa, kaigun (later released in the United States as Gateway to Glory), Yamamoto was portrayed by Shôgo Shimada.Gateway to Glory (1970). Turner Classic Movies. Professional wrestler Harold Watanabe adopted the villainous Japanese gimmick of Tojo Yamamoto in reference to both Yamamoto and Hideki Tojo Award-winning Japanese actor Toshiro Mifune (star of The Seven Samurai) portrayed Yamamoto in three films: Rengō Kantai Shirei Chōkan: Yamamoto Isoroku (1968, later released in Canada and the United States as Admiral Yamamoto), Gekido no showashi 'Gunbatsu' (1970, lit. "Turning Point of Showa History: The Militarists"), and Midway (1976, where all of the Japanese scenes had English dialogue). A fictionalized version of Yamamoto's death was portrayed in the Baa Baa Black Sheep episode "The Hawk Flies on Sunday", though only photos of Yamamoto were shown. In this episode, set much later in the war than in real life, the Black Sheep, a Marine Corsair squadron, joins an army squadron of P-51 Mustangs. The Marines intercepted fighter cover while the army shot down Yamamoto. In Shūe Matsubayashi's 1981 film Rengō kantai (lit. "Combined Fleet", later released in the United States as The Imperial Navy), Yamamoto was portrayed by Keiju Kobayashi. In the 1993 OVA series Konpeki no Kantai (lit. Deep Blue Fleet), instead of dying in the plane crash, Yamamoto blacks out and suddenly wakes up as his younger self, Isoroku Takano, after the Battle of Tsushima in 1905. His memory from the original timeline intact, Yamamoto uses his knowledge of the future to help Japan become a stronger military power, eventually launching a coup d'état against Hideki Tōjō's government. In the subsequent Pacific War, Japan's technologically advanced navy decisively defeats the United States, and grants all of the former European and American colonies in Asia full independence. Later on, Yamamoto convinces Japan to join forces with the United States and Britain to defeat Nazi Germany. The series was criticized outside Japan as a whitewash of Imperial Japan’s intentions towards its neighbors, and distancing itself from the wartime alliance with Nazi Germany. In Neal Stephenson's 1999 book Cryptonomicon, Yamamoto's final moments are depicted, with him realizing that Japan's naval codes have been broken and that he must inform headquarters. In the 2001 film Pearl Harbor, Yamamoto was portrayed by Oscar-nominated Japanese-born American actor Mako Iwamatsu. Like Tora! Tora! Tora!, this film also features a version of the sleeping giant quote. In the 2004 anime series Zipang, Yamamoto (voiced by Bunmei Tobayama) works to develop the uneasy partnership with the crew of the JMSDF Mirai, which has been transported back sixty years through time to the year 1942. In the Axis of Time trilogy by author John Birmingham, after a naval task force from the year 2021 is accidentally transported back through time to 1942, Yamamoto assumes a leadership role in the dramatic alteration of Japan's war strategy. In The West Wing episode "We Killed Yamamoto", the Chairman of the Joint Chiefs of Staff uses the assassination of Yamamoto to advocate for another assassination. In Douglas Niles' 2007 book MacArthur's War: A Novel of the Invasion of Japan (written with Michael Dobson), which focuses on General Douglas MacArthur and an alternate history of the Pacific War (following a considerably different outcome of the Battle of Midway), Yamamoto is portrayed sympathetically, with much of the action in the Japanese government seen through his eyes, though he could not change the major decisions of Japan in World War II. In Toei's 2011 war film Rengō Kantai Shirei Chōkan: Yamamoto Isoroku (Blu-Ray titles:- English "The Admiral"; German "Der Admiral"), Yamamoto was portrayed by Kōji Yakusho. The film portrays his career from Pearl Harbor to his death in Operation Vengeance. In Robert Conroy's 2011 book Rising Sun, Yamamoto directs the IJN to launch a series of attacks on the American West Coast, in the hope the United States can be convinced to sue for peace and securing Japan's place as a world power; but cannot escape his lingering fear the war will ultimately doom Japan. In the 2019 motion picture Midway, Yamamoto is portrayed by Etsushi Toyokawa. Notes Sources Agawa, Hiroyuki; Bester, John (trans.). The Reluctant Admiral. New York: Kodansha, 1979. . A definitive biography of Yamamoto in English. This book explains much of the political structure and events within Japan that led to the war. - Total pages: 994 Davis, Donald A. Lightning Strike: The Secret Mission to Kill Admiral Yamamoto and Avenge Pearl Harbor. New York: St. Martin's Press, 2005. . Dull, Paul S. A Battle History of the Imperial Japanese Navy, 1941–1945. Annapolis, Maryland: Naval Institute Press, 1978. . Evans, David C. and Mark R. Peattie. Kaigun: Strategy, Tactics, and Technology in the Imperial Japanese Navy 1887–1941. Annapolis, Maryland: Naval Institute Press, 1997. . Glines, Carroll V. Attack on Yamamoto (1st edition). New York: Crown, 1990. . Glines documents both the mission to shoot down Yamamoto and the subsequent controversies with thorough research, including personal interviews with all surviving participants and researchers who examined the crash site. Lundstrom, John B. The First Team: Pacific Naval Air Combat from Pearl Harbor to Midway. Annapolis, Maryland: Naval Institute Press, 1984. . Miller, Edward S. War Plan Orange: The U.S. Strategy to Defeat Japan, 1897–1945. Annapolis, Maryland: Naval Institute Press, 1991. . Peattie, Mark R. Sunburst: The Rise of Japanese Naval Air Power, 1909–1941. Annapolis, Maryland: Naval Institute Press, 2002. . Prados, John. Combined Fleet Decoded: The Secret History of American Intelligence and the Japanese Navy in World War II. Annapolis, Maryland: Naval Institute Press, 2001. . Prange, Gordon. At Dawn We Slept. New York: Penguin Books, 1982. . Ugaki, Matome; Chihaya, Masataka (trans.). Fading Victory: The Diary of Admiral Matome Ugaki, 1941–45. Pittsburgh: University of Pittsburgh Press, 1991. . Provides a high-level view of the war from the Japanese side, from the diaries of Yamamoto's Chief of Staff, Admiral Matome Ugaki. Provides evidence of the intentions of the imperial military establishment to seize Hawaii and to operate against Britain's Royal Navy in the Indian Ocean. Translated by Masataka Chihaya, this edition contains extensive clarifying notes from the U.S. editors derived from U.S. military histories. External links Yamamoto biography from Spartacus Educational World War II Database: Isoroku Yamamoto biography World War II Database: Death of Yamamoto "Isoroku Yamamoto" Encyclopædia Britannica'' Admiral Isoroku Yamamoto, Japanese Navy US Naval Historical Center Pacific Wrecks. Place where Yamamoto Type 1 bomber crash The Great Pacific War The Assassination of Yamamoto in 1943 CombinedFleet.com, Isoroku Yamamoto 1884 births 1943 deaths Assassinated Japanese people Assassinated military personnel Attack on Pearl Harbor Battle of Midway Harvard University alumni Imperial Japanese Navy marshal admirals Japanese admirals of World War II Japanese amputees Japanese gamblers Japanese military personnel killed in World War II Japanese military personnel of the Russo-Japanese War Japanese military personnel of World War II People from Nagaoka, Niigata Recipients of the Knight's Cross of the Iron Cross with Oak Leaves and Swords Recipients of the Order of the Golden Kite, 1st class Recipients of the Order of the Rising Sun with Paulownia Flowers Recipients of the Order of the Sacred Treasure, 1st class Victims of aircraft shootdowns Japanese naval attachés Japanese Go players
[ -0.36809566617012024, -0.11262718588113785, -0.2816718816757202, 0.2306491881608963, -0.44726505875587463, 0.44775092601776123, 0.4428090453147888, -0.5488349199295044, 0.01887180656194687, -0.24513418972492218, -0.4510762691497803, 0.5228174924850464, 0.18940351903438568, 0.31586742401123...
15412
https://en.wikipedia.org/wiki/Infrared%20spectroscopy
Infrared spectroscopy
Infrared spectroscopy (IR spectroscopy or vibrational spectroscopy) is the measurement of the interaction of infrared radiation with matter by absorption, emission, or reflection. It is used to study and identify chemical substances or functional groups in solid, liquid, or gaseous forms. It can be used to characterize new materials or identify and verify known and unknown samples. The method or technique of infrared spectroscopy is conducted with an instrument called an infrared spectrometer (or spectrophotometer) which produces an infrared spectrum. An IR spectrum can be visualized in a graph of infrared light absorbance (or transmittance) on the vertical axis vs. frequency or wavelength on the horizontal axis. Typical units of frequency used in IR spectra are reciprocal centimeters (sometimes called wave numbers), with the symbol cm−1. Units of IR wavelength are commonly given in micrometers (formerly called "microns"), symbol μm, which are related to wave numbers in a reciprocal way. A common laboratory instrument that uses this technique is a Fourier transform infrared (FTIR) spectrometer. Two-dimensional IR is also possible as discussed below. The infrared portion of the electromagnetic spectrum is usually divided into three regions; the near-, mid- and far- infrared, named for their relation to the visible spectrum. The higher-energy near-IR, approximately 14,000–4,000 cm−1 (0.7–2.5 μm wavelength) can excite overtone or combination modes of molecular vibrations. The mid-infrared, approximately 4,000–400 cm−1 (2.5–25 μm) is generally used to study the fundamental vibrations and associated rotational–vibrational structure. The far-infrared, approximately 400–10 cm−1 (25–1,000 μm) has low energy and may be used for rotational spectroscopy and low frequency vibrations. The region from 2–130 cm−1, bordering the microwave region, is considered the terahertz region and may probe intermolecular vibrations. The names and classifications of these subregions are conventions, and are only loosely based on the relative molecular or electromagnetic properties. Theory Infrared spectroscopy exploits the fact that molecules absorb frequencies that are characteristic of their structure. These absorptions occur at resonant frequencies, i.e. the frequency of the absorbed radiation matches the vibrational frequency. The energies are affected by the shape of the molecular potential energy surfaces, the masses of the atoms, and the associated vibronic coupling. In particular, in the Born–Oppenheimer and harmonic approximations, i.e. when the molecular Hamiltonian corresponding to the electronic ground state can be approximated by a harmonic oscillator in the neighborhood of the equilibrium molecular geometry, the resonant frequencies are associated with the normal modes of vibration corresponding to the molecular electronic ground state potential energy surface. The resonant frequencies are also related to the strength of the bond and the mass of the atoms at either end of it. Thus, the frequency of the vibrations are associated with a particular normal mode of motion and a particular bond type. Number of vibrational modes In order for a vibrational mode in a sample to be "IR active", it must be associated with changes in the dipole moment. A permanent dipole is not necessary, as the rule requires only a change in dipole moment. A molecule can vibrate in many ways, and each way is called a vibrational mode. For molecules with N number of atoms, linear molecules have 3N – 5 degrees of vibrational modes, whereas nonlinear molecules have 3N – 6 degrees of vibrational modes (also called vibrational degrees of freedom). As an example H2O, a non-linear molecule, will have 3 × 3 – 6 = 3 degrees of vibrational freedom, or modes. Simple diatomic molecules have only one bond and only one vibrational band. If the molecule is symmetrical, e.g. N2, the band is not observed in the IR spectrum, but only in the Raman spectrum. Asymmetrical diatomic molecules, e.g. CO, absorb in the IR spectrum. More complex molecules have many bonds, and their vibrational spectra are correspondingly more complex, i.e. big molecules have many peaks in their IR spectra. The atoms in a CH2X2 group, commonly found in organic compounds and where X can represent any other atom, can vibrate in nine different ways. Six of these vibrations involve only the CH2 portion: two stretching modes (ν): symmetric (νs) and antisymmetric (νas); and four bending modes: scissoring (δ), rocking (ρ), wagging (ω) and twisting (τ), as shown below. Structures that do not have the two additional X groups attached have fewer modes because some modes are defined by specific relationships to those other attached groups. For example, in water, the rocking, wagging, and twisting modes do not exist because these types of motions of the H atoms represent simple rotation of the whole molecule rather than vibrations within it. In case of more complex molecules, out-of-plane (γ) vibrational modes can be also present. These figures do not represent the "recoil" of the C atoms, which, though necessarily present to balance the overall movements of the molecule, are much smaller than the movements of the lighter H atoms. The simplest and most important or fundamental IR bands arise from the excitations of normal modes, the simplest distortions of the molecule, from the ground state with vibrational quantum number v = 0 to the first excited state with vibrational quantum number v = 1. In some cases, overtone bands are observed. An overtone band arises from the absorption of a photon leading to a direct transition from the ground state to the second excited vibrational state (v = 2). Such a band appears at approximately twice the energy of the fundamental band for the same normal mode. Some excitations, so-called combination modes, involve simultaneous excitation of more than one normal mode. The phenomenon of Fermi resonance can arise when two modes are similar in energy; Fermi resonance results in an unexpected shift in energy and intensity of the bands etc. Practical IR spectroscopy The infrared spectrum of a sample is recorded by passing a beam of infrared light through the sample. When the frequency of the IR is the same as the vibrational frequency of a bond or collection of bonds, absorption occurs. Examination of the transmitted light reveals how much energy was absorbed at each frequency (or wavelength). This measurement can be achieved by scanning the wavelength range using a monochromator. Alternatively, the entire wavelength range is measured using a Fourier transform instrument and then a transmittance or absorbance spectrum is generated using a dedicated procedure. This technique is commonly used for analyzing samples with covalent bonds. Simple spectra are obtained from samples with few IR active bonds and high levels of purity. More complex molecular structures lead to more absorption bands and more complex spectra. Sample preparation Gas samples Gaseous samples require a sample cell with a long pathlength to compensate for the diluteness. The pathlength of the sample cell depends on the concentration of the compound of interest. A simple glass tube with length of 5 to 10 cm equipped with infrared-transparent windows at both ends of the tube can be used for concentrations down to several hundred ppm. Sample gas concentrations well below ppm can be measured with a White's cell in which the infrared light is guided with mirrors to travel through the gas. White's cells are available with optical pathlength starting from 0.5 m up to hundred meters. Liquid samples Liquid samples can be sandwiched between two plates of a salt (commonly sodium chloride, or common salt, although a number of other salts such as potassium bromide or calcium fluoride are also used). The plates are transparent to the infrared light and do not introduce any lines onto the spectra. Solid samples Solid samples can be prepared in a variety of ways. One common method is to crush the sample with an oily mulling agent (usually mineral oil Nujol). A thin film of the mull is applied onto salt plates and measured. The second method is to grind a quantity of the sample with a specially purified salt (usually potassium bromide) finely (to remove scattering effects from large crystals). This powder mixture is then pressed in a mechanical press to form a translucent pellet through which the beam of the spectrometer can pass. A third technique is the "cast film" technique, which is used mainly for polymeric materials. The sample is first dissolved in a suitable, non-hygroscopic solvent. A drop of this solution is deposited on surface of KBr or NaCl cell. The solution is then evaporated to dryness and the film formed on the cell is analysed directly. Care is important to ensure that the film is not too thick otherwise light cannot pass through. This technique is suitable for qualitative analysis. The final method is to use microtomy to cut a thin (20–100 μm) film from a solid sample. This is one of the most important ways of analysing failed plastic products for example because the integrity of the solid is preserved. In photoacoustic spectroscopy the need for sample treatment is minimal. The sample, liquid or solid, is placed into the sample cup which is inserted into the photoacoustic cell which is then sealed for the measurement. The sample may be one solid piece, powder or basically in any form for the measurement. For example, a piece of rock can be inserted into the sample cup and the spectrum measured from it. Comparing to a reference It is typical to record spectrum of both the sample and a "reference". This step controls for a number of variables, e.g. infrared detector, which may affect the spectrum. The reference measurement makes it possible to eliminate the instrument influence. The appropriate "reference" depends on the measurement and its goal. The simplest reference measurement is to simply remove the sample (replacing it by air). However, sometimes a different reference is more useful. For example, if the sample is a dilute solute dissolved in water in a beaker, then a good reference measurement might be to measure pure water in the same beaker. Then the reference measurement would cancel out not only all the instrumental properties (like what light source is used), but also the light-absorbing and light-reflecting properties of the water and beaker, and the final result would just show the properties of the solute (at least approximately). A common way to compare to a reference is sequentially: first measure the reference, then replace the reference by the sample and measure the sample. This technique is not perfectly reliable; if the infrared lamp is a bit brighter during the reference measurement, then a bit dimmer during the sample measurement, the measurement will be distorted. More elaborate methods, such as a "two-beam" setup (see figure), can correct for these types of effects to give very accurate results. The Standard addition method can be used to statistically cancel these errors. Nevertheless, among different absorption based techniques which are used for gaseous species detection, Cavity ring-down spectroscopy (CRDS) can be used as a calibration free method. The fact that CRDS is based on the measurements of photon life-times (and not the laser intensity) makes it needless for any calibration and comparison with a reference FTIR Fourier transform infrared (FTIR) spectroscopy is a measurement technique that allows one to record infrared spectra. Infrared light is guided through an interferometer and then through the sample (or vice versa). A moving mirror inside the apparatus alters the distribution of infrared light that passes through the interferometer. The signal directly recorded, called an "interferogram", represents light output as a function of mirror position. A data-processing technique called Fourier transform turns this raw data into the desired result (the sample's spectrum): Light output as a function of infrared wavelength (or equivalently, wavenumber). As described above, the sample's spectrum is always compared to a reference. An alternate method for acquiring spectra is the "dispersive" or "scanning monochromator" method. In this approach, the sample is irradiated sequentially with various single wavelengths. The dispersive method is more common in UV-Vis spectroscopy, but is less practical in the infrared than the FTIR method. One reason that FTIR is favored is called "Fellgett's advantage" or the "multiplex advantage": The information at all frequencies is collected simultaneously, improving both speed and signal-to-noise ratio. Another is called "Jacquinot's Throughput Advantage": A dispersive measurement requires detecting much lower light levels than an FTIR measurement. There are other advantages, as well as some disadvantages, but virtually all modern infrared spectrometers are FTIR instruments. Infrared microscopy Various forms of infrared microscopy exist. These include IR versions of sub-diffraction microscopy such as IR NSOM, photothermal microspectroscopy, Nano-FTIR and atomic force microscope based infrared spectroscopy (AFM-IR). Other methods in molecular vibrational spectroscopy Infrared spectroscopy is not the only method of studying molecular vibrational spectra. Raman spectroscopy involves an inelastic scattering process in which only part of the energy of an incident photon is absorbed by the molecule, and the remaining part is scattered and detected. The energy difference corresponds to absorbed vibrational energy. The selection rules for infrared and for Raman spectroscopy are different at least for some molecular symmetries, so that the two methods are complementary in that they observe vibrations of different symmetries. Another method is electron energy loss spectroscopy (EELS), in which the energy absorbed is provided by an inelastically scattered electron rather than a photon. This method is useful for studying vibrations of molecules adsorbed on a solid surface. Recently, high-resolution EELS (HREELS) has emerged as a technique for performing vibrational spectroscopy in a transmission electron microscope (TEM). In combination with the high spatial resolution of the TEM, unprecedented experiments have been performed, such as nano-scale temperature measurements, mapping of isotopically labeled molecules, mapping of phonon modes in position- and momentum-space, vibrational surface and bulk mode mapping on nanocubes, and investigations of polariton modes in van der Waals crystals. Analysis of vibrational modes that are IR-inactive but appear in inelastic neutron scattering is also possible at high spatial resolution using EELS. Although the spatial resolution of HREELs is very high, the bands are extremely broad compared to other techniques. Computational infrared microscopy By using computer simulations and normal mode analysis it is possible to calculate theoretical frequencies of molecules. Absorption bands IR spectroscopy is often used to identify structures because functional groups give rise to characteristic bands both in terms of intensity and position (frequency). The positions of these bands are summarized in correlation tables as shown below. Regions A spectrograph is often interpreted as having two regions. functional group region In the functional region there are one to a few troughs per functional group. fingerprint region In the fingerprint region there are many troughs which form an intricate pattern which can be used like a fingerprint to determine the compound. Badger's rule For many kinds of samples, the assignments are known, i.e. which bond deformation(s) are associated with which frequency. In such cases further information can be gleaned about the strength on a bond, relying on the empirical guideline called Badger's Rule. Originally published by Richard McLean Badger in 1934, this rule states that the strength of a bond (in terms of force constant) correlates with the bond length. That is, increase in bond strength leads to corresponding bond shortening and vice versa. Uses and applications Infrared spectroscopy is a simple and reliable technique widely used in both organic and inorganic chemistry, in research and industry. In catalysis research it is a very useful tool to characterize the catalyst, as well as to detect intermediates and products during the catalytic reaction. It is used in quality control, dynamic measurement, and monitoring applications such as the long-term unattended measurement of CO2 concentrations in greenhouses and growth chambers by infrared gas analyzers. It is also used in forensic analysis in both criminal and civil cases, for example in identifying polymer degradation. It can be used in determining the blood alcohol content of a suspected drunk driver. IR-spectroscopy has been successfully used in analysis and identification of pigments in paintings and other art objects such as illuminated manuscripts. A useful way of analyzing solid samples without the need for cutting samples uses ATR or attenuated total reflectance spectroscopy. Using this approach, samples are pressed against the face of a single crystal. The infrared radiation passes through the crystal and only interacts with the sample at the interface between the two materials. With increasing technology in computer filtering and manipulation of the results, samples in solution can now be measured accurately (water produces a broad absorbance across the range of interest, and thus renders the spectra unreadable without this computer treatment). Some instruments also automatically identify the substance being measured from a store of thousands of reference spectra held in storage. Infrared spectroscopy is also useful in measuring the degree of polymerization in polymer manufacture. Changes in the character or quantity of a particular bond are assessed by measuring at a specific frequency over time. Modern research instruments can take infrared measurements across the range of interest as frequently as 32 times a second. This can be done whilst simultaneous measurements are made using other techniques. This makes the observations of chemical reactions and processes quicker and more accurate. Infrared spectroscopy has also been successfully utilized in the field of semiconductor microelectronics: for example, infrared spectroscopy can be applied to semiconductors like silicon, gallium arsenide, gallium nitride, zinc selenide, amorphous silicon, silicon nitride, etc. Another important application of Infrared Spectroscopy is in the food industry to measure the concentration of various compounds in different food products. The instruments are now small, and can be transported, even for use in field trials. Infrared Spectroscopy is also used in gas leak detection devices such as the DP-IR and EyeCGAs. These devices detect hydrocarbon gas leaks in the transportation of natural gas and crude oil. In February 2014, NASA announced a greatly upgraded database, based on IR spectroscopy, for tracking polycyclic aromatic hydrocarbons (PAHs) in the universe. According to scientists, more than 20% of the carbon in the universe may be associated with PAHs, possible starting materials for the formation of life. PAHs seem to have been formed shortly after the Big Bang, are widespread throughout the universe, and are associated with new stars and exoplanets. Infrared spectroscopy is an important analysis method in the recycling process of household waste plastics, and a convenient stand-off method to sort plastic of different polymers (PET, HDPE, ...). Other developments include a miniature IR-spectrometer that's linked to a cloud based database and suitable for personal everyday use, and NIR-spectroscopic chips that can be embedded in smartphones and various gadgets. Isotope effects The different isotopes in a particular species may exhibit different fine details in infrared spectroscopy. For example, the O–O stretching frequency (in reciprocal centimeters) of oxyhemocyanin is experimentally determined to be 832 and 788 cm−1 for ν(16O–16O) and ν(18O–18O), respectively. By considering the O–O bond as a spring, the frequency of absorbance can be calculated as a wavenumber [= frequency/(speed of light)] where k is the spring constant for the bond, c is the speed of light, and μ is the reduced mass of the A–B system: ( is the mass of atom ). The reduced masses for 16O–16O and 18O–18O can be approximated as 8 and 9 respectively. Thus The effect of isotopes, both on the vibration and the decay dynamics, has been found to be stronger than previously thought. In some systems, such as silicon and germanium, the decay of the anti-symmetric stretch mode of interstitial oxygen involves the symmetric stretch mode with a strong isotope dependence. For example, it was shown that for a natural silicon sample, the lifetime of the anti-symmetric vibration is 11.4 ps. When the isotope of one of the silicon atoms is increased to 29Si, the lifetime increases to 19 ps. In similar manner, when the silicon atom is changed to 30Si, the lifetime becomes 27 ps. Two-dimensional IR Two-dimensional infrared correlation spectroscopy analysis combines multiple samples of infrared spectra to reveal more complex properties. By extending the spectral information of a perturbed sample, spectral analysis is simplified and resolution is enhanced. The 2D synchronous and 2D asynchronous spectra represent a graphical overview of the spectral changes due to a perturbation (such as a changing concentration or changing temperature) as well as the relationship between the spectral changes at two different wavenumbers. Nonlinear two-dimensional infrared spectroscopy is the infrared version of correlation spectroscopy. Nonlinear two-dimensional infrared spectroscopy is a technique that has become available with the development of femtosecond infrared laser pulses. In this experiment, first a set of pump pulses is applied to the sample. This is followed by a waiting time during which the system is allowed to relax. The typical waiting time lasts from zero to several picoseconds, and the duration can be controlled with a resolution of tens of femtoseconds. A probe pulse is then applied, resulting in the emission of a signal from the sample. The nonlinear two-dimensional infrared spectrum is a two-dimensional correlation plot of the frequency ω1 that was excited by the initial pump pulses and the frequency ω3 excited by the probe pulse after the waiting time. This allows the observation of coupling between different vibrational modes; because of its extremely fine time resolution, it can be used to monitor molecular dynamics on a picosecond timescale. It is still a largely unexplored technique and is becoming increasingly popular for fundamental research. As with two-dimensional nuclear magnetic resonance (2DNMR) spectroscopy, this technique spreads the spectrum in two dimensions and allows for the observation of cross peaks that contain information on the coupling between different modes. In contrast to 2DNMR, nonlinear two-dimensional infrared spectroscopy also involves the excitation to overtones. These excitations result in excited state absorption peaks located below the diagonal and cross peaks. In 2DNMR, two distinct techniques, COSY and NOESY, are frequently used. The cross peaks in the first are related to the scalar coupling, while in the latter they are related to the spin transfer between different nuclei. In nonlinear two-dimensional infrared spectroscopy, analogs have been drawn to these 2DNMR techniques. Nonlinear two-dimensional infrared spectroscopy with zero waiting time corresponds to COSY, and nonlinear two-dimensional infrared spectroscopy with finite waiting time allowing vibrational population transfer corresponds to NOESY. The COSY variant of nonlinear two-dimensional infrared spectroscopy has been used for determination of the secondary structure content of proteins. See also Applied spectroscopy Astrochemistry Atomic and molecular astrophysics Atomic force microscopy based infrared spectroscopy (AFM-IR) Cosmochemistry Far-infrared astronomy Forensic chemistry Forensic engineering Forensic polymer engineering Infrared astronomy Infrared microscopy Infrared multiphoton dissociation Infrared photodissociation spectroscopy Infrared spectroscopy correlation table Infrared spectroscopy of metal carbonyls Near-infrared spectroscopy Nuclear resonance vibrational spectroscopy Photothermal microspectroscopy Raman spectroscopy Rotational-vibrational spectroscopy Time-resolved spectroscopy Vibrational spectroscopy of linear molecules References External links Infrared spectroscopy for organic chemists Organic compounds spectrum database
[ 0.021114934235811234, -0.014221502467989922, -0.04112928733229637, -0.17894823849201202, 0.10543953627347946, -0.5193125605583191, 0.45209360122680664, -0.5550145506858826, 0.2465651035308838, -0.611333429813385, -0.3991128206253052, 0.32826098799705505, -0.10685814917087555, 0.25628778338...
15414
https://en.wikipedia.org/wiki/Irenaeus
Irenaeus
Irenaeus (; Eirēnaios; c. 130 – c. 202 AD) was a Greek bishop noted for his role in guiding and expanding Christian communities in the southern regions of present-day France and, more widely, for the development of Christian theology by combating heresy and defining orthodoxy. Originating from Smyrna, he had seen and heard the preaching of Polycarp, who in turn was said to have heard John the Evangelist, and thus was the last-known living connection with the Apostles. Chosen as bishop of Lugdunum, now Lyon, his best-known work is Against Heresies, often cited as Adversus Haereses, a refutation of gnosticism, in particular that of Valentinus. To counter the doctrines of the gnostic sects claiming secret wisdom, he offered three pillars of orthodoxy: the scriptures, the tradition handed down from the apostles, and the teaching of the apostles' successors. Intrinsic to his writing is that the surest source of Christian guidance is the Church of Rome, and he is the earliest surviving witness to regard all four of the now-canonical gospels as essential. He is recognized as a saint in the Catholic Church, which celebrates his feast on 28 June, and in the Eastern Orthodox Churches, which celebrates the feast on 23 August. Irenaeus is remembered in the Church of England with a Lesser Festival on 28 June. Pope Francis declared Irenaeus the 37th Doctor of the Church on 21 January 2022. Biography Irenaeus was a Greek from Polycarp's hometown of Smyrna in Asia Minor, now İzmir, Turkey, born during the first half of the 2nd century. The exact date is thought to be between the years 120 and 140. Unlike many of his contemporaries, he was brought up in a Christian family rather than converting as an adult. During the persecution of Christians by Marcus Aurelius, the Roman emperor from 161 to 180, Irenaeus was a priest of the Church of Lyon. The clergy of that city, many of whom were suffering imprisonment for the faith, sent him in 177 to Rome with a letter to Pope Eleutherius concerning the heresy of Montanism, and that occasion bore emphatic testimony to his merits. While Irenaeus was in Rome, a persecution took place in Lyon. Returning to Gaul, Irenaeus succeeded the martyr Saint Pothinus and became the second bishop of Lyon. During the religious peace which followed the persecution by Marcus Aurelius, the new bishop divided his activities between the duties of a pastor and of a missionary (as to which we have but brief data, late and not very certain). Almost all his writings were directed against Gnosticism. The most famous of these writings is Adversus haereses (Against Heresies). Irenaeus alludes to coming across Gnostic writings, and holding conversations with Gnostics, and this may have taken place in Asia Minor or in Rome. However, it also appears that Gnosticism was present near Lyon: he writes that there were followers of 'Marcus the Magician' living and teaching in the Rhone valley. Little is known about the career of Irenaeus after he became bishop. The last action reported of him (by Eusebius, 150 years later) is that in 190 or 191, he exerted influence on Pope Victor I not to excommunicate the Christian communities of Asia Minor which persevered in the practice of the Quartodeciman celebration of Easter. Nothing is known of the date of his death, which must have occurred at the end of the second or the beginning of the third century. He is regarded as a martyr by the Catholic Church and by some within the Orthodox Church. He was buried under the Church of Saint John in Lyon, which was later renamed St Irenaeus in his honour. The tomb and his remains were utterly destroyed in 1562 by the Huguenots. Writings Irenaeus wrote a number of books, but the most important that survives is the Against Heresies (or, in its Latin title, Adversus haereses). In Book I, Irenaeus talks about the Valentinian Gnostics and their predecessors, who he says go as far back as the magician Simon Magus. In Book II he attempts to provide proof that Valentinianism contains no merit in terms of its doctrines. In Book III Irenaeus purports to show that these doctrines are false, by providing counter-evidence gleaned from the Gospels. Book IV consists of Jesus's sayings, and here Irenaeus also stresses the unity of the Old Testament and the Gospel. In the final volume, Book V, Irenaeus focuses on more sayings of Jesus plus the letters of Paul the Apostle. Irenaeus wrote: "One should not seek among others the truth that can be easily gotten from the Church. For in her, as in a rich treasury, the apostles have placed all that pertains to truth, so that everyone can drink this beverage of life. She is the door of life." But he also said, "Christ came not only for those who believed from the time of Tiberius Caesar, nor did the Father provide only for those who are now, but for absolutely all men from the beginning, who, according to their ability, feared and loved God and lived justly. . . and desired to see Christ and to hear His voice Irenaeus recognized that all who feared and loved God, practiced justice and piety towards their neighbors, and desired to see Christ, insofar as they were able to do so, will be saved. Since many were not able to have an explicit desire to see Christ, but only implicit, it is clear that for Irenaeus this is enough. The purpose of "Against Heresies" was to refute the teachings of various Gnostic groups; apparently, several Greek merchants had begun an oratorial campaign in Irenaeus's bishopric, teaching that the material world was the accidental creation of an evil god, from which we are to escape by the pursuit of gnosis. Irenaeus argued that the true gnosis is in fact knowledge of Christ, which redeems rather than escapes from bodily existence. Until the discovery of the Library of Nag Hammadi in 1945, Against Heresies was the best-surviving description of Gnosticism. Some religious scholars have argued the findings at Nag Hammadi have shown Irenaeus's description of Gnosticism to be inaccurate and polemic in nature. However, the general consensus among modern scholars is that Irenaeus was fairly accurate in his transmission of gnostic beliefs, and that the Nag Hammadi texts have raised no substantial challenges to the overall accuracy of Irenaeus's information. Religious historian Elaine Pagels criticizes Irenaeus for describing Gnostic groups as sexual libertines, for example, when some of their own writings advocated chastity more strongly than did orthodox texts. However, the Nag Hammadi texts do not present a single, coherent picture of any unified gnostic system of belief, but rather divergent beliefs of multiple Gnostic sects. Some of these sects were indeed libertine because they considered bodily existence meaningless; others praised chastity, and strongly prohibited any sexual activity, even within marriage. Irenaeus also wrote The Demonstration of the Apostolic Preaching (also known as Proof of the Apostolic Preaching), an Armenian copy of which was discovered in 1904. This work seems to have been an instruction for recent Christian converts. Eusebius attests to other works by Irenaeus, today lost, including On the Ogdoad, an untitled letter to Blastus regarding schism, On the Subject of Knowledge, On the Monarchy or How God is not the Cause of Evil, On Easter. Irenaeus exercised wide influence on the generation which followed. Both Hippolytus and Tertullian freely drew on his writings. However, none of his works aside from Against Heresies and The Demonstration of the Apostolic Preaching survive today, perhaps because his literal hope of an earthly millennium may have made him uncongenial reading in the Greek East. Even though no complete version of Against Heresies in its original Greek exists, we possess the full ancient Latin version, probably of the third century, as well as thirty-three fragments of a Syrian version and a complete Armenian version of books 4 and 5. Irenaeus's works were first translated into English by John Keble and published in 1872 as part of the Library of the Fathers series. Scripture Irenaeus pointed to the public rule of faith, authoritatively articulated by the preaching of bishops and inculcated in Church practice, especially worship, as an authentic apostolic tradition by which to read Scripture truly against heresies. He classified as Scripture not only the Old Testament but most of the books now known as the New Testament, while excluding many works, a large number by Gnostics, that flourished in the 2nd century and claimed scriptural authority. Oftentimes, Irenaeus, as a student of Polycarp, who was a direct disciple of the Apostle John, believed that he was interpreting scriptures in the same hermeneutic as the Apostles. This connection to Jesus was important to Irenaeus because both he and the Gnostics based their arguments on Scripture. Irenaeus argued that since he could trace his authority to Jesus and the Gnostics could not, his interpretation of Scripture was correct. He also used "the Rule of Faith", a "proto-creed" with similarities to the Apostles' Creed, as a hermeneutical key to argue that his interpretation of Scripture was correct. Before Irenaeus, Christians differed as to which gospel they preferred. The Christians of Asia Minor preferred the Gospel of John. The Gospel of Matthew was the most popular overall. Irenaeus asserted that four Gospels, Matthew, Mark, Luke, and John, were canonical scripture. Thus Irenaeus provides the earliest witness to the assertion of the four canonical Gospels, possibly in reaction to Marcion's edited version of the Gospel of Luke, which Marcion asserted was the one and only true gospel. Based on the arguments Irenaeus made in support of only four authentic gospels, some interpreters deduce that the fourfold Gospel must have still been a novelty in Irenaeus's time. Against Heresies 3.11.7 acknowledges that many heterodox Christians use only one gospel while 3.11.9 acknowledges that some use more than four. The success of Tatian's Diatessaron in about the same time period is "... a powerful indication that the fourfold Gospel contemporaneously sponsored by Irenaeus was not broadly, let alone universally, recognized." (The apologist and ascetic Tatian had previously harmonized the four gospels into a single narrative, the Diatesseron circa 150–160) Irenaeus is also the earliest attestation that the Gospel of John was written by John the Apostle, and that the Gospel of Luke was written by Luke, the companion of Paul. Scholars contend that Irenaeus quotes from 21 of the 27 New Testament books, such as: Matthew 3:16 Mark 3:10 Luke 3:14 John 3:11 Acts of the Apostles 3:14 Romans 3:16 1 Corinthians 1:3 2 Corinthians 3:7 Galatians 3:22 Ephesians 5:2 Philippians 4:18 Colossians 1:3 1 Thessalonians 5:6 2 Thessalonians 5:25 1 Timothy (Preface) 2 Timothy 3:14 Titus 3:3 1 Peter 4:9 1 John 3:16 2 John 1:16 Revelation 4:20 He may refer to Hebrews 2:30 and James 4:16 and maybe even 2 Peter 5:28, but does not cite Philemon. Irenaeus cited the New Testament approximately 1,000 times. About one third of his citations are made to Paul's letters. Irenaeus considered all 13 letters belonging to the Pauline corpus to have been written by Paul himself. Apostolic authority In his writing against the Gnostics, who claimed to possess a secret oral tradition from Jesus himself, Irenaeus maintained that the bishops in different cities are known as far back as the Apostles and that the oral tradition he lists from the Apostles is a safe guide to the interpretation of Scripture. In a passage that became a locus classicus of Catholic-Protestant polemics, he cited the Roman church as an example of the unbroken chain of authority, which text Catholic polemics would use to assert the primacy of Rome over Eastern churches by virtue of its preeminent authority.The succession of bishops and presbyters was important to establish a chain of custody for orthodoxy. Irenaeus's point when refuting the Gnostics was that all of the Apostolic churches had preserved the same traditions and teachings in many independent streams. It was the unanimous agreement between these many independent streams of transmission that proved the orthodox faith, current in those churches, to be true. Theology and contrast with Gnosticism The central point of Irenaeus's theology is the unity and the goodness of God, in opposition to the Gnostics' theory of God; a number of divine emanations (Aeons) along with a distinction between the Monad and the Demiurge. Irenaeus uses the Logos theology he inherited from Justin Martyr. Irenaeus was a student of Polycarp, who was said to have been tutored by John the Apostle. (John had used Logos terminology in the Gospel of John and the letter of 1 John). Irenaeus often spoke of the Son and the Spirit as the "hands of God," though he also spoke of the Son as the "Logos." Unity of salvation history Irenaeus's emphasis on the unity of God is reflected in his corresponding emphasis on the unity of salvation history. Irenaeus repeatedly insists that God began the world and has been overseeing it ever since this creative act; everything that has happened is part of his plan for humanity. The essence of this plan is a process of maturation: Irenaeus believes that humanity was created immature, and God intended his creatures to take a long time to grow into or assume the divine likeness. Everything that has happened since has therefore been planned by God to help humanity overcome this initial mishap and achieve spiritual maturity. The world has been intentionally designed by God as a difficult place, where human beings are forced to make moral decisions, as only in this way can they mature as moral agents. Irenaeus likens death to the big fish that swallowed Jonah: it was only in the depths of the whale's belly that Jonah could turn to God and act according to the divine will. Similarly, death and suffering appear as evils, but without them we could never come to know God. According to Irenaeus, the high point in salvation history is the advent of Jesus. For Irenaeus, the Incarnation of Christ was intended by God before he determined that humanity would be created. Irenaeus develops this idea based on Rom. 5:14, saying "Forinasmuch as He had a pre-existence as a saving Being, it was necessary that what might be saved should also be called into existence, in order that the Being who saves should not exist in vain." Some theologians maintain that Irenaeus believed that Incarnation would have occurred even if humanity had never sinned; but the fact that they did sin determined his role as the savior. Irenaeus sees Christ as the new Adam, who systematically undoes what Adam did: thus, where Adam was disobedient concerning God's edict concerning the fruit of the Tree of Knowledge of Good and Evil, Christ was obedient even to death on the wood of a tree. Irenaeus is the first to draw comparisons between Eve and Mary, contrasting the faithlessness of the former with the faithfulness of the latter. In addition to reversing the wrongs done by Adam, Irenaeus thinks of Christ as "recapitulating" or "summing up" human life. Irenaeus conceives of our salvation as essentially coming about through the incarnation of God as a man. He characterizes the penalty for sin as death and corruption. God, however, is immortal and incorruptible, and simply by becoming united to human nature in Christ he conveys those qualities to us: they spread, as it were, like a benign infection. Irenaeus emphasizes that salvation occurs through Christ's Incarnation, which bestows incorruptibility on humanity, rather than emphasizing His Redemptive death in the crucifixion, although the latter event is an integral part of the former. Christ's life Part of the process of recapitulation is for Christ to go through every stage of human life, from infancy to old age, and simply by living it, sanctify it with his divinity. Although it is sometimes claimed that Irenaeus believed Christ did not die until he was older than is conventionally portrayed, the bishop of Lyon simply pointed out that because Jesus turned the permissible age for becoming a rabbi (30 years old and above), he recapitulated and sanctified the period between 30 and 50 years old, as per the Jewish custom of periodization on life, and so touches the beginning of old age when one becomes 50 years old. (see Adversus Haereses, book II, chapter 22). In the passage of Adversus Haereses under consideration, Irenaeus is clear that after receiving baptism at the age of thirty, citing Luke 3:23, Gnostics then falsely assert that "He [Jesus] preached only one year reckoning from His baptism," and also, "On completing His thirtieth year He [Jesus] suffered, being in fact still a young man, and who had by no means attained to advanced age." Irenaeus argues against the Gnostics by using scripture to add several years after his baptism by referencing 3 distinctly separate visits to Jerusalem. The first is when Jesus makes wine out of water, he goes up to the Paschal feast-day, after which he withdraws and is found in Samaria. The second is when Jesus goes up to Jerusalem for Passover and cures the paralytic, after which he withdraws over the sea of Tiberias. The third mention is when he travels to Jerusalem, eats the Passover, and suffers on the following day. Irenaeus quotes scripture (John 8:57), to suggest that Jesus ministers while in his 40s. In this passage, Jesus's opponents want to argue that Jesus has not seen Abraham, because Jesus is too young. Jesus's opponents argue that Jesus was not yet 50 years old. Irenaeus argues that if Jesus were in his thirties, his opponents would have argued that he was not yet 40 years old, since that would make him even younger. Irenaeus's argument is that they would not weaken their own argument by adding years to Jesus's age. Irenaeus also writes: "The Elders witness to this, who in Asia conferred with John the Lord's disciple, to the effect that John had delivered these things unto them: for he abode with them until the times of Trajan. And some of them saw not only John, but others also of the Apostles, and had this same account from them, and witness to the aforesaid relation." In Demonstration (74) Irenaeus notes "For Pontius Pilate was governor of Judæa, and he had at that time resentful enmity against Herod the king of the Jews. But then, when Christ was brought to him bound, Pilate sent Him to Herod, giving command to enquire of him, that he might know of a certainty what he should desire concerning Him; making Christ a convenient occasion of reconciliation with the king." Pilate was the prefect of the Roman province of Judaea from AD 26–36. He served under Emperor Tiberius Claudius Nero. Herod Antipas was tetrarch of Galilee and Perea, a client state of the Roman Empire. He ruled from 4 BC to 39 AD. In refuting Gnostic claims that Jesus preached for only one year after his baptism, Irenaeus used the "recapitulation" approach to demonstrate that by living beyond the age of thirty Christ sanctified even old age. Use of Paul's Epistles Many aspects of Irenaeus's presentation of salvation history depend on Paul's Epistles. Irenaeus's conception of salvation relies heavily on the understanding found in Paul's letters. Irenaeus first brings up the theme of victory over sin and evil that is afforded by Jesus's death. God's intervention has saved humanity from the Fall of Adam and the wickedness of Satan. Human nature has become joined with God's in the person of Jesus, thus allowing human nature to have victory over sin. Paul writes on the same theme, that Christ has come so that a new order is formed, and being under the Law, is being under the sin of Adam. Reconciliation is also a theme of Paul's that Irenaeus stresses in his teachings on Salvation. Irenaeus believes Jesus coming in flesh and blood sanctified humanity so that it might again reflect the perfection associated with the likeness of the Divine. This perfection leads to a new life, in the lineage of God, which is forever striving for eternal life and unity with the Father. This is a carryover from Paul, who attributes this reconciliation to the actions of Christ: "For since death came through a human being, the resurrection of the dead has also come through a human being; for as all die in Adam, so all will be made alive in Christ". A third theme in both Paul's and Irenaeus's conceptions of salvation is the sacrifice of Christ being necessary for the new life given to humanity in the triumph over evil. It is in this obedient sacrifice that Jesus is victor and reconciler, thus erasing the marks that Adam left on human nature. To argue against the Gnostics on this point, Irenaeus uses Colossians in showing that the debt which came by a tree has been paid for us in another tree. Furthermore, the first chapter of Ephesians is picked up in Irenaeus's discussion of the topic when he asserts, "By His own blood He redeemed us, as also His apostle declares, 'In whom we have redemption through His blood, even the remission of sins.'" The frequencies of quotations and allusions to the Pauline Epistles in Against Heresies are: Christ as the New Adam To counter his Gnostic opponents, Irenaeus significantly develops Paul's presentation of Christ as the Last Adam. Irenaeus's presentation of Christ as the New Adam is based on Paul's Christ-Adam parallel in . Irenaeus uses this parallel to demonstrate that Christ truly took human flesh. Irenaeus considered it important to emphasize this point because he understands the failure to recognize Christ's full humanity the bond linking the various strains of Gnosticism together, as seen in his statement that "according to the opinion of no one of the heretics was the Word of God made flesh." Irenaeus believes that unless the Word became flesh, humans were not fully redeemed. He explains that by becoming man, Christ restored humanity to being in the image and likeness of God, which they had lost in the Fall of man. Just as Adam was the original head of humanity through whom all sinned, Christ is the new head of humanity who fulfills Adam's role in the Economy of Salvation. Irenaeus calls this process of restoring humanity recapitulation. For Irenaeus, Paul's presentation of the Old Law (the Mosaic covenant) in this passage indicates that the Old Law revealed humanity's sinfulness but could not save them. He explains that "For as the law was spiritual, it merely made sin to stand out in relief, but did not destroy it. For sin had no dominion over the spirit, but over man." Since humans have a physical nature, they cannot be saved by a spiritual law. Instead, they need a human Savior. This is why it was necessary for Christ to take human flesh. Irenaeus summarizes how Christ's taking human flesh saves humanity with a statement that closely resembles , "For as by the disobedience of the one man who was originally moulded from virgin soil, the many were made sinners, and forfeited life; so was it necessary that, by the obedience of one man, who was originally born from a virgin, many should be justified and receive salvation." The physical creation of Adam and Christ is emphasized by Irenaeus to demonstrate how the Incarnation saves humanity's physical nature. Irenaeus emphasizes the importance of Christ's reversal of Adam's action. Through His obedience, Christ undoes Adam's disobedience. Irenaeus presents the Passion as the climax of Christ's obedience, emphasizing how this obedience on the tree of the Cross undoes the disobedience that occurred through a tree. Irenaeus's interpretation of Paul's discussion of Christ as the New Adam is significant because it helped develop the recapitulation theory of atonement. Irenaeus emphasizes that it is through Christ's reversal of Adam's action that humanity is saved, rather than considering the Redemption to occur in a cultic or juridical way. The biblical passage, "Death has been swallowed up in victory", implied for Irenaeus that the Lord will surely resurrect the first human, i.e. Adam, as one of the saved. According to Irenaeus, those who deny Adam's salvation are “shutting themselves out from life for ever” and the first one who did so was Tatian. The notion that the Second Adam saved the first Adam was advocated not only by Irenaeus, but also by Gregory Thaumaturgus, which suggests that it was popular in the Early Church. Valentinian Gnosticism Valentinian Gnosticism was one of the major forms of Gnosticism that Irenaeus opposed. According to the Gnostic view of Salvation, creation was perfect to begin with; it did not need time to grow and mature. For the Valentinians, the material world is the result of the loss of perfection which resulted from Sophia's desire to understand the Forefather. Therefore, one is ultimately redeemed, through secret knowledge, to enter the pleroma of which the Achamoth originally fell. According to the Valentinian Gnostics, there are three classes of human beings. They are the material, who cannot attain salvation; the psychic, who are strengthened by works and faith (they are part of the church); and the spiritual, who cannot decay or be harmed by material actions. Essentially, ordinary humans—those who have faith but do not possess the special knowledge—will not attain salvation. Spirituals, on the other hand—those who obtain this great gift—are the only class that will eventually attain salvation. In his article entitled "The Demiurge", J.P. Arendzen sums up the Valentinian view of the salvation of man. He writes, "The first, or carnal men, will return to the grossness of matter and finally be consumed by fire; the second, or psychic men, together with the Demiurge as their master, will enter a middle state, neither heaven (pleroma) nor hell (whyle); the purely spiritual men will be completely freed from the influence of the Demiurge and together with the Saviour and Achamoth, his spouse, will enter the pleroma divested of body (húle) and soul (psuché)." In this understanding of salvation, the purpose of the Incarnation was to redeem the Spirituals from their material bodies. By taking a material body, the Son becomes the Savior and facilitates this entrance into the pleroma by making it possible for the Spirituals to receive his spiritual body. However, in becoming a body and soul, the Son Himself becomes one of those needing redemption. Therefore, the Word descends onto the Savior at His Baptism in the Jordan, which liberates the Son from his corruptible body and soul. His redemption from the body and soul is then applied to the Spirituals. In response to this Gnostic view of Christ, Irenaeus emphasized that the Word became flesh and developed a soteriology that emphasized the significance of Christ's material Body in saving humanity, as discussed in the sections above. In his criticism of Gnosticism, Irenaeus made reference to a Gnostic gospel which portrayed Judas in a positive light, as having acted in accordance with Jesus's instructions. The recently discovered Gospel of Judas dates close to the period when Irenaeus lived (late 2nd century), and scholars typically regard this work as one of many Gnostic texts, showing one of many varieties of Gnostic beliefs of the period. Quartodeciman Controversy Irenaeus took part in the Quartodeciman Controversy. When Victor I of Rome tried to force a universal practice of feasting until Easter to supersede the Jewish practice and prevent Christians from partaking of the Passover, Polycrates who led the Churches of Asia Minor continued to hold old traditions of the paschal feast. For this reason Victor I wanted to excommunicate Polycrates and his supporters, but this was a step too far for Irenaeus and other bishops. See also Catholic Church in Greece Descriptions in antiquity of the execution cross Irenaean theodicy List of Catholic saints POxy 405 – 3rd century papyrus portion of Against Heresies Recapitulation theory of atonement References Notes Citations Sources Steenberg, Ireaneus M.C. "The Role of Mary as Co-Recapitulator in St. Irenaeus of Lyons." Vigilae Christianae 58 (2004):117–137. Further reading Irenaeus, Proof of the Apostolic Preaching, trans JP Smith, (ACW 16, 1952) Irenaeus, Proof of the Apostolic Preaching, trans John Behr (PPS, 1997) Irenaeus, Against Heresies, trans. Alexander Roberts and William Rambaut, in Ante-Nicene Fathers, vol. 1, ed. Alexander Roberts, James Donaldson, and A. Cleveland Coxe (Buffalo, NY: Christian Literature Co., 1885). Paperback Payton Jr., James R. Irenaeus on the Christian Faith: A Condensation of 'Against Heresies (Cambridge, James Clarke and Co Ltd, 2012). External links Early Christian Writings Irenaeus Fragments from his lost works Alexander Roberts and William Rambaut 1885 Ante-Nicene Fathers, Vol. 1. translation of Against Heresies A nineteenth-century translation of Irenaeus's work Demonstration of the Apostolic Preaching Book II, ch. 22, where Irenaeus argues his unconventional views about the age of Jesus and the length of his ministry. EarlyChurch.org.uk Extensive bibliography. Gregory S. Neal: "The Nature of Evil and the Irenaean Theodicy" Grace Incarnate (1988) Critique of Irenaeus, Elaine H. Pagels Critique of Pagel's article by Paul Mankowski Opera Omnia by Migne Patrologia Graeca with analytical indexes "St. Irenæus, Bishop of Lyons, Martyr", Butler's Lives of the Saints "Catholic Online" "Santiebeati" a lecture by James L. Papandrea 140s births 200s deaths 2nd-century apocalypticists 2nd-century bishops in Gaul 2nd-century Christian saints 2nd-century Christian theologians 2nd-century Greek people 2nd-century Romans 3rd-century apocalypticists 3rd-century Greek people 3rd-century Romans Ancient Smyrnaeans Anglican saints Bishops of Lyon Catholic Mariology Christian anti-Gnosticism Christian apologists Church Fathers Gallo-Roman saints People from İzmir Roman Lyon Saints from Roman Anatolia Doctors of the Church
[ -0.5889785289764404, 0.37572112679481506, -0.5423929691314697, -0.16116568446159363, -0.9402543306350708, 0.8807271122932434, 0.7018722295761108, 0.150943785905838, -0.584246814250946, -0.4694294333457947, 0.11730344593524933, 0.3306623697280884, -0.7029898166656494, 0.17178866267204285, ...
15416
https://en.wikipedia.org/wiki/Involuntary%20commitment
Involuntary commitment
Involuntary commitment, civil commitment, involuntary hospitalization or involuntary hospitalisation (Commonwealth English; see spelling differences), (also known informally as sectioning or being sectioned in some jurisdictions, such as the United Kingdom) is a legal process through which an individual who is deemed by a qualified agent to have symptoms of severe mental disorder is detained in a psychiatric hospital (inpatient) where they can be treated involuntarily. This treatment may involve the administration of psychoactive drugs, including involuntary administration. In many jurisdictions, people diagnosed with mental health disorders can also be forced to undergo treatment while in the community; this is sometimes referred to as outpatient commitment and shares legal processes with commitment. Criteria for civil commitment are established by laws which vary between nations. Commitment proceedings often follow a period of emergency hospitalization, during which an individual with acute psychiatric symptoms is confined for a relatively short duration (e.g. 72 hours) in a treatment facility for evaluation and stabilization by mental health professionals who may then determine whether further civil commitment is appropriate or necessary. Civil commitment procedures may take place in a court or only involve physicians. If commitment does not involve a court there is normally an appeal process that does involve the judiciary in some capacity, though potentially through a specialist court. Historically, until the mid-1960s in most jurisdictions in the United States, all committals to public psychiatric facilities and most committals to private ones were involuntary. Since then, there have been alternating trends towards the abolition or substantial reduction of involuntary commitment, a trend known as "deinstitutionalisation". In many currents, individuals can voluntarily admit themselves to a mental health hospital and may have more rights than those who are involuntarily committed. This practice is referred to as voluntary commitment. In the United States, an indefinite form of commitment is applied to people convicted of some sexual offences. Purpose For most jurisdictions, involuntary commitment is applied to individuals believed to be experiencing a mental illness that impairs their ability to reason to such an extent that the agents of the law, state, or courts determine that decisions will be made for the individual under a legal framework. In some jurisdictions, this is a proceeding distinct from being found incompetent. Involuntary commitment is used in some degree for each of the following although different jurisdictions have different criteria. Some jurisdictions limit involuntary treatment to individuals who meet statutory criteria for presenting a danger to self or others. Other jurisdictions have broader criteria. The legal process by which commitment takes place varies between jurisdictions. Some jurisdictions have a formal court hearing where testimony and other evidence may also be submitted where subject of the hearing is typically entitled to legal counsel and may challenge a commitment order through habeas corpus. Other jurisdictions have delegated these power to physicians, though may provide an appeal process that involves the judiciary but may also involve physicians. For example in the UK a mental health tribunal consists of a judge, a medical member, and a lay representative. First aid Training is gradually becoming available in mental health first aid to equip community members such as teachers, school administrators, police officers, and medical workers with training in recognizing, and authority in managing, situations where involuntary evaluations of behavior are applicable under law. The extension of first aid training to cover mental health problems and crises is a quite recent development. A mental health first aid training course was developed in Australia in 2001 and has been found to improve assistance provided to persons with an alleged mental illness or mental health crisis. This form of training has now spread to a number of other countries (Canada, Finland, Hong Kong, Ireland, Singapore, Scotland, England, Wales, and the United States). Mental health triage may be used in an emergency room to make a determination about potential risk and apply treatment protocols. Observation Observation is sometimes used to determine whether a person warrants involuntary commitment. It is not always clear on a relatively brief examination whether a person should be committed. Containment of danger Austria, Belgium, Germany, Israel, the Netherlands, Northern Ireland, Russia, Taiwan, Ontario (Canada), and the United States have adopted commitment criteria based on the presumed danger of the defendant to self or to others. People with suicidal thoughts may act on these impulses and harm or kill themselves. People with psychosis are occasionally driven by their delusions or hallucinations to harm themselves or others. Research has found that those who suffer from schizophrenia are between 3.4 and 7.4 times more likely to engage in violent behaviour than members of the general public. However, because other confounding factors such as childhood adversity and poverty are correlated with both schizophrenia and violence it can be difficult to determine whether this effect is due to schizophrenia or other factors. In an attempt to avoid these confounding factors, researchers have tried comparing the rates of violence amongst people diagnosed with schizophrenia to their siblings in a similar manner to twin studies. In these studies people with schizophrenia are found to be between 1.3 and 1.8 times more likely to engage in violent behaviour. People with certain types of personality disorders can occasionally present a danger to themselves or others. This concern has found expression in the standards for involuntary commitment in every US state and in other countries as the danger to self or others standard, sometimes supplemented by the requirement that the danger be imminent. In some jurisdictions, the danger to self or others standard has been broadened in recent years to include need-for-treatment criteria such as "gravely disabled". Deinstitutionalization Starting in the 1960s, there has been a worldwide trend toward moving psychiatric patients from hospital settings to less restricting settings in the community, a shift known as "deinstitutionalization". Because the shift was typically not accompanied by a commensurate development of community-based services, critics say that deinstitutionalization has led to large numbers of people who would once have been inpatients as instead being incarcerated or becoming homeless. In some jurisdictions, laws authorizing court-ordered outpatient treatment have been passed in an effort to compel individuals with chronic, untreated severe mental illness to take psychiatric medication while living outside the hospital (e.g. Laura's Law, Kendra's Law). Before the 1960s deinstitutionalization there were earlier efforts to free psychiatric patients. Philippe Pinel (1745–1826) ordered the removal of chains from patients. In a study of 269 patients from Vermont State Hospital done by Courtenay M. Harding and associates, about two-thirds of the ex-patients did well after deinstitutionalization. Around the world France In 1838, France enacted a law to regulate both the admissions into asylums and asylum services across the country. Édouard Séguin developed a systematic approach for training individuals with mental deficiencies, and, in 1839, he opened the first school for the intellectually disabled. His method of treatment was based on the idea that the intellectually disabled did not suffer from disease. United Kingdom In the United Kingdom, provision for the care of the mentally ill began in the early 19th century with a state-led effort. Public mental asylums were established in Britain after the passing of the 1808 County Asylums Act. This empowered magistrates to build rate-supported asylums in every county to house the many "pauper lunatics". Nine counties first applied, and the first public asylum opened in 1812 in Nottinghamshire. Parliamentary Committees were established to investigate abuses at private madhouses like Bethlem Hospital - its officers were eventually dismissed and national attention was focused on the routine use of bars, chains and handcuffs and the filthy conditions the inmates lived in. However, it was not until 1828 that the newly appointed Commissioners in Lunacy were empowered to license and supervise private asylums. The Lunacy Act 1845 was a landmark in the treatment of the mentally ill, as it explicitly changed the status of mentally ill people to patients who required treatment. The Act created the Lunacy Commission, headed by Lord Shaftesbury, focusing on reform of the legislation concerning lunacy. The commission consisted of eleven Metropolitan Commissioners who were required to carry out the provisions of the Act; the compulsory construction of asylums in every county, with regular inspections on behalf of the Home Secretary. All asylums were required to have written regulations and to have a resident qualified physician. A national body for asylum superintendents - the Medico-Psychological Association - was established in 1866 under the Presidency of William A. F. Browne, although the body appeared in an earlier form in 1841. At the turn of the century, England and France combined had only a few hundred individuals in asylums. By the late 1890s and early 1900s, those so detained had risen to the hundreds of thousands. However, the idea that mental illness could be ameliorated through institutionalization was soon disappointed. Psychiatrists were pressured by an ever-increasing patient population. The average number of patients in asylums kept increasing. Asylums were quickly becoming almost indistinguishable from custodial institutions, and the reputation of psychiatry in the medical world had hit an extreme low. United States In the United States, the erection of state asylums began with the first law for the creation of one in New York, passed in 1842. The Utica State Hospital was opened approximately in 1850. The creation of this hospital, as of many others, was largely the work of Dorothea Lynde Dix, whose philanthropic efforts extended over many states, and in Europe as far as Constantinople. Many state hospitals in the United States were built in the 1850s and 1860s on the Kirkbride Plan, an architectural style meant to have curative effect. In the United States and most other developed societies, severe restrictions have been placed on the circumstances under which a person may be committed or treated against their will as such actions have been ruled by the United States Supreme Court and other national legislative bodies as a violation of civil rights and/or human rights. The Supreme court case O'Connor v. Donaldson established that the mere presence of mental illness and the necessity for treatment are not sufficient by themselves to justify involuntary commitment, if the patient is capable of surviving in freedom and does not present a danger of harm to themselves others. Criteria for involuntary commitment are generally set by the individual states, and often have both short- and long-term types of commitment. Short-term commitment tends to be a few days or less, requiring an examination by a medical professional, while longer-term commitment typically requires a court hearing, or sentencing as part of a criminal trial. Indefinite commitment is rare and is usually reserved for individuals who are violent or present an ongoing danger to themselves and others. Kansas v. Hendricks established the procedures for indefinite commitment of sex offenders. United Nations United Nations General Assembly Resolution 46/119, "Principles for the Protection of Persons with Mental Illness and the Improvement of Mental Health Care", is a non-binding resolution advocating certain broadly drawn procedures for the carrying out of involuntary commitment. These principles have been used in many countries where local laws have been revised or new ones implemented. The UN runs programs in some countries to assist in this process. Criticism The dangers of institutions were chronicled and criticized by reformers almost since their foundation. Charles Dickens was an outspoken and high-profile early critic, and several of his novels, in particular Oliver Twist and Hard Times demonstrate his insight into the damage that institutions can do to human beings. Enoch Powell, when Minister for Health in the early 1960s, was a later opponent who was appalled by what he witnessed on his visits to the asylums, and his famous "water tower" speech in 1961 called for the closure of all NHS asylums and their replacement by wards in general hospitals: "There they stand, isolated, majestic, imperious, brooded over by the gigantic water-tower and chimney combined, rising unmistakable and daunting out of the countryside - the asylums which our forefathers built with such immense solidity to express the notions of their day. Do not for a moment underestimate their powers of resistance to our assault. Let me describe some of the defenses which we have to storm." Scandal after scandal followed, with many high-profile public inquiries. These involved the exposure of abuses such as unscientific surgical techniques such as lobotomy and the widespread neglect and abuse of vulnerable patients in the US and Europe. The growing anti-psychiatry movement in the 1960s and 1970s led in Italy to the first successful legislative challenge to the authority of the mental institutions, culminating in their closure. During the 1970s and 1990s the hospital population started to fall rapidly, mainly because of the deaths of long-term inmates. Significant efforts were made to re-house large numbers of former residents in a variety of suitable or otherwise alternative accommodation. The first 1,000+ bed hospital to close was Darenth Park Hospital in Kent, swiftly followed by many more across the UK. The haste of these closures, driven by the Conservative governments led by Margaret Thatcher and John Major, led to considerable criticism in the press, as some individuals slipped through the net into homelessness or were discharged to poor quality private sector mini-institutions. Wrongful involuntary commitment Mental health professionals have, on occasion, wrongfully deemed individuals to have symptoms of a mental disorder, and thereby commit the individual for treatment in a psychiatric hospital. Claims of wrongful commitment are a common theme in the anti-psychiatry movement. In 1860, the case of Elizabeth Packard, who was wrongfully committed that year and filed a lawsuit and won thereafter, highlighted the issue of wrongful involuntary commitment. In 1887, investigative journalist Nellie Bly went undercover at an asylum in New York City to expose the terrible conditions that mental patients at the time had to deal with. She published her findings and experiences as articles in New York World, and later made the articles into one book called Ten Days in a Mad-House. In the first half of the twentieth century there were a few high-profile cases of wrongful commitment based on racism or punishment for political dissenters. In the former Soviet Union, psychiatric hospitals were used as prisons to isolate political prisoners from the rest of society. British playwright Tom Stoppard wrote Every Good Boy Deserves Favour about the relationship between a patient and his doctor in one of these hospitals. Stoppard was inspired by a meeting with a Russian exile. In 1927, after the execution of Sacco and Vanzetti in the United States, demonstrator Aurora D'Angelo was sent to a mental health facility for psychiatric evaluation after she participated in a rally in support of the anarchists. Throughout the 1940s and 1950s in Canada, 20,000 Canadian children, called the Duplessis orphans, were wrongfully certified as being mentally ill and as a result were wrongfully committed to psychiatric institutions where they were forced to take psychiatric medication that they did not need, and were abused. They were named after Maurice Duplessis, the premier of Quebec at the time, who deliberately committed these children to in order to misappropriate additional subsidies from the federal government. Decades later in the 1990s, several of the orphans sued Quebec and the Catholic Church for the abuse and wrongdoing. In 1958, black pastor and activist Clennon Washington King Jr. tried enrolling at the University of Mississippi, which at the time was white, for summer classes; the local police secretly arrested and involuntarily committed him to a mental hospital for 12 days. Patients are able to sue if they believe that they have been wrongfully committed. In one instance, Junius Wilson, an African American man, was committed to Cherry Hospital in Goldsboro, North Carolina in 1925 for an alleged crime without a trial or conviction. He was castrated. He continued to be held at Cherry Hospital for the next 67 years of his life. It turned out he was deaf rather than mentally ill. In many American states sex offenders who have completed a period of incarceration can be civilly committed to a mental institution based on a finding of dangerousness due to a mental disorder. Although the United States Supreme Court determined that this practice does not constitute double jeopardy, organizations such as the American Psychiatric Association (APA) strongly oppose the practice. The Task Force on Sexually Dangerous Offenders, a component of APA's Council on Psychiatry and Law, reported that "in the opinion of the task force, sexual predator commitment laws represent a serious assault on the integrity of psychiatry, particularly with regard to defining mental illness and the clinical conditions for compulsory treatment. Moreover, by bending civil commitment to serve essentially non-medical purposes, statutes threaten to undermine the legitimacy of the medical model of commitment." See also In the creative arts One Flew Over the Cuckoo's Nest (novel), (One Flew Over the Cuckoo's Nest (film)), (One Flew Over the Cuckoo's Nest (play)) if.... Forrest Gump novel and film based on the novel Cool Hand Luke Rebel without a Cause Notes References Further reading HTML. Report of the Committee of Inquiry into allegations of ill-treatment of patients and other irregularities at the Ely Hospital, Cardiff, HMSO 1969 Extracts of the Report of the Committee of Inquiry into Normansfield Hospital - British Medical Journal, 1978, 2, 1560-1563 Erving Goffman Asylums Whyte, William H., The Organization Man, Doubleday Publishing, 1956. (excerpts from Whyte's book) The Production and Reproduction of Scandals in Chronic Sector Hospitals Amy Munson- Barkshire 1981 External links National Resource Center on Psychiatric Advance Directives (United States) Provides information related to Florida's Civil Commitment Statute. National Alliance on Mental Illness (United States) Ethically disputed medical practices Mental health law
[ 0.198489248752594, -0.24137479066848755, -0.32621142268180847, -0.13902461528778076, 0.17029914259910583, 0.3577062785625458, 0.5966344475746155, -0.2003440260887146, -0.8390699028968811, 0.035828083753585815, -0.41188523173332214, -0.02010844461619854, -0.5774574279785156, 0.4304951429367...
15417
https://en.wikipedia.org/wiki/Intermolecular%20force
Intermolecular force
An intermolecular force (IMF) (or secondary force) is the force that mediates interaction between molecules, including the electromagnetic forces of attraction or repulsion which act between atoms and other types of neighboring particles, e.g. atoms or ions. Intermolecular forces are weak relative to intramolecular forces – the forces which hold a molecule together. For example, the covalent bond, involving sharing electron pairs between atoms, is much stronger than the forces present between neighboring molecules. Both sets of forces are essential parts of force fields frequently used in molecular mechanics. The investigation of intermolecular forces starts from macroscopic observations which indicate the existence and action of forces at a molecular level. These observations include non-ideal-gas thermodynamic behavior reflected by virial coefficients, vapor pressure, viscosity, superficial tension, and absorption data. The first reference to the nature of microscopic forces is found in Alexis Clairaut's work Théorie de la figure de la Terre, published in Paris in 1743. Other scientists who have contributed to the investigation of microscopic forces include: Laplace, Gauss, Maxwell and Boltzmann. Attractive intermolecular forces are categorized into the following types: Hydrogen bonding Ion–induced dipole forces Ion–dipole forces van der Waals forces – Keesom force, Debye force, and London dispersion force Information on intermolecular forces is obtained by macroscopic measurements of properties like viscosity, pressure, volume, temperature (PVT) data. The link to microscopic aspects is given by virial coefficients and Lennard-Jones potentials. Hydrogen bonding A hydrogen bond is an extreme form of dipole-dipole bonding, referring to the attraction between a hydrogen atom that is bonded to an element with high electronegativity, usually nitrogen, oxygen, or fluorine and another of these same elements. The hydrogen bond is often described as a strong electrostatic dipole–dipole interaction. However, it also has some features of covalent bonding: it is directional, stronger than a van der Waals force interaction, produces interatomic distances shorter than the sum of their van der Waals radii, and usually involves a limited number of interaction partners, which can be interpreted as a kind of valence. The number of Hydrogen bonds formed between molecules is equal to the number of active pairs. The molecule which donates its hydrogen is termed the donor molecule, while the molecule containing lone pair participating in H bonding is termed the acceptor molecule. The number of active pairs is equal to the common number between number of hydrogens the donor has and the number of lone pairs the acceptor has. Though both not depicted in the diagram, water molecules have two active pairs, as the oxygen atom can interact with two hydrogens to form two hydrogen bonds. Intermolecular hydrogen bonding is responsible for the high boiling point of water (100 °C) compared to the other group 16 hydrides, which have little capability to hydrogen bond. Intramolecular hydrogen bonding is partly responsible for the secondary, tertiary, and quaternary structures of proteins and nucleic acids. It also plays an important role in the structure of polymers, both synthetic and natural. Ionic bonding The attraction between cationic and anionic sites is a noncovalent, or intermolecular interaction which is usually referred to as ion pairing or salt bridge. It is essentially due to electrostatic forces, although in aqueous medium the association is driven by entropy and often even endothermic. Most salts form crystals with characteristic distances between the ions; in contrast to many other noncovalent interactions, salt bridges are not directional and show in the solid state usually contact determined only by the van der Waals radii of the ions. Inorganic as well as organic ions display in water at moderate ionic strength I similar salt bridge as association ΔG values around 5 to 6 kJ/mol for a 1:1 combination of anion and cation, almost independent of the nature (size, polarizability, etc.) of the ions. The ΔG values are additive and approximately a linear function of the charges, the interaction of e.g. a doubly charged phosphate anion with a single charged ammonium cation accounts for about 2x5 = 10 kJ/mol. The ΔG values depend on the ionic strength I of the solution, as described by the Debye-Hückel equation, at zero ionic strength one observes ΔG = 8 kJ/mol. Dipole–dipole and similar interactions Regular dipole Dipole–dipole interactions are electrostatic interactions between molecules which have permanent dipoles. This interaction is stronger than the London forces but is weaker than ion-ion interaction because only partial charges are involved. These interactions tend to align the molecules to increase attraction (reducing potential energy). An example of a dipole–dipole interaction can be seen in hydrogen chloride (HCl): the positive end of a polar molecule will attract the negative end of the other molecule and influence its position. Polar molecules have a net attraction between them. Examples of polar molecules include hydrogen chloride (HCl) and chloroform (CHCl3). Often molecules contain dipolar groups of atoms, but have no overall dipole moment on the molecule as a whole. This occurs if there is symmetry within the molecule that causes the dipoles to cancel each other out. This occurs in molecules such as tetrachloromethane and carbon dioxide. The dipole–dipole interaction between two individual atoms is usually zero, since atoms rarely carry a permanent dipole. These forces are discussed further in the section about the Keesom interaction, below. Ion–dipole and ion–induced dipole forces Ion–dipole and ion–induced dipole forces are similar to dipole–dipole and dipole–induced dipole interactions but involve ions, instead of only polar and non-polar molecules. Ion–dipole and ion–induced dipole forces are stronger than dipole–dipole interactions because the charge of any ion is much greater than the charge of a dipole moment. Ion–dipole bonding is stronger than hydrogen bonding. An ion–dipole force consists of an ion and a polar molecule interacting. They align so that the positive and negative groups are next to one another, allowing maximum attraction. An important example of this interaction is hydration of ions in water which give rise to hydration enthalpy. The polar water molecules surround themselves around ions in water and the energy released during the process is known as hydration enthalpy. The interaction has its immense importance in justifying the stability of various ions (like Cu2+) in water. An ion–induced dipole force consists of an ion and a non-polar molecule interacting. Like a dipole–induced dipole force, the charge of the ion causes distortion of the electron cloud on the non-polar molecule. Van der Waals forces The van der Waals forces arise from interaction between uncharged atoms or molecules, leading not only to such phenomena as the cohesion of condensed phases and physical absorption of gases, but also to a universal force of attraction between macroscopic bodies. Keesom force The first contribution to van der Waals forces is due to electrostatic interactions between rotating permanent dipoles, quadrupoles (all molecules with symmetry lower than cubic), and multipoles. It is termed the Keesom interaction, named after Willem Hendrik Keesom. These forces originate from the attraction between permanent dipoles (dipolar molecules) and are temperature dependent. They consist of attractive interactions between dipoles that are ensemble averaged over different rotational orientations of the dipoles. It is assumed that the molecules are constantly rotating and never get locked into place. This is a good assumption, but at some point molecules do get locked into place. The energy of a Keesom interaction depends on the inverse sixth power of the distance, unlike the interaction energy of two spatially fixed dipoles, which depends on the inverse third power of the distance. The Keesom interaction can only occur among molecules that possess permanent dipole moments, i.e., two polar molecules. Also Keesom interactions are very weak van der Waals interactions and do not occur in aqueous solutions that contain electrolytes. The angle averaged interaction is given by the following equation: where d = electric dipole moment, = permitivity of free space, = dielectric constant of surrounding material, T = temperature, = Boltzmann constant, and r = distance between molecules. Debye (permanent–induced dipoles) force The second contribution is the induction (also termed polarization) or Debye force, arising from interactions between rotating permanent dipoles and from the polarizability of atoms and molecules (induced dipoles). These induced dipoles occur when one molecule with a permanent dipole repels another molecule's electrons. A molecule with permanent dipole can induce a dipole in a similar neighboring molecule and cause mutual attraction. Debye forces cannot occur between atoms. The forces between induced and permanent dipoles are not as temperature dependent as Keesom interactions because the induced dipole is free to shift and rotate around the polar molecule. The Debye induction effects and Keesom orientation effects are termed polar interactions. The induced dipole forces appear from the induction (also termed polarization), which is the attractive interaction between a permanent multipole on one molecule with an induced (by the former di/multi-pole) 31 on another. This interaction is called the Debye force, named after Peter J. W. Debye. One example of an induction interaction between permanent dipole and induced dipole is the interaction between HCl and Ar. In this system, Ar experiences a dipole as its electrons are attracted (to the H side of HCl) or repelled (from the Cl side) by HCl. The angle averaged interaction is given by the following equation: where = polarizability. This kind of interaction can be expected between any polar molecule and non-polar/symmetrical molecule. The induction-interaction force is far weaker than dipole–dipole interaction, but stronger than the London dispersion force. London dispersion force (fluctuating dipole–induced dipole interaction) The third and dominant contribution is the dispersion or London force (fluctuating dipole–induced dipole), which arises due to the non-zero instantaneous dipole moments of all atoms and molecules. Such polarization can be induced either by a polar molecule or by the repulsion of negatively charged electron clouds in non-polar molecules. Thus, London interactions are caused by random fluctuations of electron density in an electron cloud. An atom with a large number of electrons will have a greater associated London force than an atom with fewer electrons. The dispersion (London) force is the most important component because all materials are polarizable, whereas Keesom and Debye forces require permanent dipoles. The London interaction is universal and is present in atom-atom interactions as well. For various reasons, London interactions (dispersion) have been considered relevant for interactions between macroscopic bodies in condensed systems. Hamaker developed the theory of van der Waals between macroscopic bodies in 1937 and showed that the additivity of these interactions renders them considerably more long-range. Relative strength of forces This comparison is approximate. The actual relative strengths will vary depending on the molecules involved. Ionic bonding and covalent bonding will always be stronger than intermolecular forces in any given substance. Effect on the behavior of gases Intermolecular forces are repulsive at short distances and attractive at long distances (see the Lennard-Jones potential). In a gas, the repulsive force chiefly has the effect of keeping two molecules from occupying the same volume. This gives a real gas a tendency to occupy a larger volume than an ideal gas at the same temperature and pressure. The attractive force draws molecules closer together and gives a real gas a tendency to occupy a smaller volume than an ideal gas. Which interaction is more important depends on temperature and pressure (see compressibility factor). In a gas, the distances between molecules are generally large, so intermolecular forces have only a small effect. The attractive force is not overcome by the repulsive force, but by the thermal energy of the molecules. Temperature is the measure of thermal energy, so increasing temperature reduces the influence of the attractive force. In contrast, the influence of the repulsive force is essentially unaffected by temperature. When a gas is compressed to increase its density, the influence of the attractive force increases. If the gas is made sufficiently dense, the attractions can become large enough to overcome the tendency of thermal motion to cause the molecules to disperse. Then the gas can condense to form a solid or liquid, i.e., a condensed phase. Lower temperature favors the formation of a condensed phase. In a condensed phase, there is very nearly a balance between the attractive and repulsive forces. Quantum mechanical theories Intermolecular forces observed between atoms and molecules can be described phenomenologically as occurring between permanent and instantaneous dipoles, as outlined above. Alternatively, one may seek a fundamental, unifying theory that is able to explain the various types of interactions such as hydrogen bonding, van der Waals forces and dipole–dipole interactions. Typically, this is done by applying the ideas of quantum mechanics to molecules, and Rayleigh–Schrödinger perturbation theory has been especially effective in this regard. When applied to existing quantum chemistry methods, such a quantum mechanical explanation of intermolecular interactions provides an array of approximate methods that can be used to analyze intermolecular interactions. One of the most helpful methods to visualize this kind of intermolecular interactions, that we can find in quantum chemistry, is the non-covalent interaction index, which is based on the electron density of the system. London dispersion forces play a big role with this. See also Ionic bonding Salt bridges Coomber's relationship Force field (chemistry) Hydrophobic effect Intramolecular force Molecular solid Polymer Quantum chemistry computer programs van der Waals force Comparison of software for molecular mechanics modeling Non-covalent interactions Solvation References Intermolecular forces Chemical bonding Johannes Diderik van der Waals
[ -0.05054142326116562, 0.1741594672203064, 0.38588201999664307, -0.12576453387737274, -0.4906907379627228, -0.13240166008472443, -0.09612435102462769, -0.03277377784252167, -0.11942355334758759, -0.8144806623458862, -0.4537077844142914, 0.46442681550979614, -0.8157352805137634, 0.5728113651...
15420
https://en.wikipedia.org/wiki/IRQ
IRQ
IRQ may refer to: Interrupt request, a computer hardware signal Iraq (ISO 3166-1 country code) Qeshm Air (ICAO airline designator)
[ -0.04570038616657257, 0.020757483318448067, 0.2578747272491455, -0.09028071165084839, -0.20693077147006989, 0.19158826768398285, 0.08521129935979843, 0.12623745203018188, -0.04736017435789108, -0.2131849229335785, -0.6802190542221069, 0.36763301491737366, -0.6873143911361694, 0.14670346677...
15422
https://en.wikipedia.org/wiki/List%20of%20Internet%20top-level%20domains
List of Internet top-level domains
This list of Internet top-level domains (TLD) contains top-level domains, which are those domains in the DNS root zone of the Domain Name System of the Internet. A list of the top-level domains by the Internet Assigned Numbers Authority (IANA) is maintained at the Root Zone Database. IANA also oversees the approval process for new proposed top-level domains for ICANN. , their root domain contains 1502 top-level domains. , the IANA root database includes 1589 TLDs. That also includes 68 that are not assigned (revoked), 8 that are retired and 11 test domains. Those are not represented in IANA's listing and are not in root.zone file (root.zone file also includes one root domains ). Types IANA distinguishes the following groups of top-level domains: infrastructure top-level domain (ARPA) generic top-level domains (gTLD) generic-restricted top-level domains (grTLD) sponsored top-level domains (sTLD) country code top-level domains (ccTLD) test top-level domains (tTLD) Original top-level domains Seven generic top-level domains were created early in the development of the Internet, and predate the creation of ICANN in 1998. Name: DNS names Entity: intended use Notes: general remarks IDN: support for internationalized domain names (IDN) DNSSEC: presence of DS records for Domain Name System Security Extensions Infrastructure top-level domain Country code top-level domains As of 20 May 2017, there were 255 country-code top-level domains, purely in the Latin alphabet, using two-character codes. , this number is 316, with the addition of internationalized domains. Proposed internationalized ccTLDs Internationalised domain names have been proposed for Japan and Libya. ICANN-era generic top-level domains Name: DNS name Target market: intended use Restrictions: restrictions, if any, on who can register, and how the domain can be used Operator: entity the registry has been delegated to IDN: support for internationalized domain names (IDN) DNSSEC: presence of DS records for Domain Name System Security Extensions English A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Chinese French German Hindi Italian Portuguese Spanish Internationalized generic top-level domains All of these TLDs are internationalized domain names (IDN) and support second-level IDNs. Notes: general remarks and intended use DNSSEC: presence of DS records for Domain Name System Security Extensions Arabic script Chinese characters Cyrillic script Japanese characters Other script Geographic top-level domains Name: DNS name Entity: Target geographic area Notes: general remarks IDN: support for internationalized domain names (IDN) DNSSEC: presence of DS records for Domain Name System Security Extensions Africa Asia Europe North America Oceania South America Internationalized geographic top-level domains Brand top-level domains Name: DNS name Entity: company and/or brand Notes: general remarks IDN: support for internationalized domain names (IDN) DNSSEC: presence of DS records for Domain Name System Security Extensions Internationalized brand top-level domains Special-Use Domains ICANN/IANA has created some Special-Use domain names which are meant for special technical purposes. ICANN/IANA owns all of the Special-Use domain names. Non-IANA domains Besides the TLDs managed (or at least tracked) by IANA or ICANN, other independent groups have created, or had attempted to create, their own TLDs with varying technical specifications, functions, and outcomes. Blockchain-registered Blockchain-based domains are registered and exchanged using a public blockchain like Ethereum. Often times, these domains serve specific functions such as creating human-readable references to smart contract addresses used in DApps or personal wallet addresses. Generally, these non-standard domains are unreachable through the normal DNS resolution process and instead require clients to use some sort of transparent web proxy or gateway to access them Alternate roots In the case of alternative DNS roots, organizations or projects make use of the same mechanisms of the DNS but instead take on the role of ICANN in managing and administering an entirely separate root zone, thus having the ability to create new TLDs independently. However, this doesn't make these domains any less isolated from the rest of the internet, though the ability for clients to resolve them theoretically only requires switching to a recursive DNS resolver that recognizes and serves records underneath the alternate root zone. See also Country code top-level domain Generic top-level domain IDN Test TLDs ISO 3166-1 alpha-2, the standard for two-letter country codes, which most ccTLDs are based on Proposed top-level domain Second-level domain, information about .co.jp, .co.uk, .co.kr, .co.nf, etc. Public Suffix List Explanatory notes Citations External links IANA's list of TLDs in machine-readable format The Internet Domain Survey The Public Suffix List / PSL – Maintained by Mozilla Registry Agreements at ICANN Registry Agreement Termination Info Page at ICANN Country codes International telecommunications Top-level domains Top-level domains
[ 0.04516398161649704, 0.6039063334465027, -0.11793291568756104, 0.45273321866989136, -0.3982921838760376, -0.4641960561275482, 0.401366263628006, 0.6911599636077881, -0.6281020045280457, -0.32494547963142395, -0.5437120795249939, -0.2694888412952423, -0.2819349467754364, 0.7114462852478027,...
15428
https://en.wikipedia.org/wiki/Idealism
Idealism
In philosophy, the term idealism identifies and describes metaphysical perspectives which assert that reality is indistinguishable and inseparable from human perception and understanding; that reality is a mental construct closely connected to ideas. Idealist perspectives are in two categories: (i) Subjective idealism, which proposes that a material object exists only to the extent that a human being perceives the object; and (ii) Objective idealism, which proposes the existence of an objective consciousness that exists prior to and independently of human consciousness, thus the existence of the object is independent of human perception. The philosopher George Berkeley said that the essence of an object is to be perceived. By contrast, Immanuel Kant said that idealism does "not concern the existence of things", but that our "modes of representation" of things such as space and time are not "determinations that belong to things in themselves", but are essential features of the human mind. In the philosophy of "transcendental idealism" Kant proposes that the objects of experience relied upon their existence in the human mind that perceives the objects, and that the nature of the thing-in-itself is external to human experience, and cannot be conceived without the application of categories, which give structure to the human experience of reality. Epistemologically, idealism is accompanied by philosophical skepticism about the possibility of knowing the existence of any thing that is independent of the human mind. Ontologically, idealism asserts that the existence of things depends upon the human mind; thus ontological idealism rejects the perspectives of physicalism and dualism, because each perspective does not give ontological priority to the human mind. In contrast to materialism, idealism asserts the primacy of consciousness as the origin and prerequisite of phenomena. Idealism holds that consciousness (the mind) is the origin of the material world. Indian and Greek philosophers proposed the earliest arguments that the world of experience is grounded in the mind's perception of the physical world. Hindu idealism and Greek neoplatonism gave panentheistic arguments for the existence of an all-pervading consciousness as the true nature , as the true grounding of reality. In contrast, the Yogācāra school, which arose within Mahayana Buddhism in India in the 4th century AD, based its "mind-only" idealism to a greater extent on phenomenological analyses of personal experience. This turn toward the subjective anticipated empiricists such as George Berkeley, who revived idealism in 18th-century Europe by employing skeptical arguments against materialism. Beginning with Immanuel Kant, German idealists such as Georg Wilhelm Friedrich Hegel, Johann Gottlieb Fichte, Friedrich Wilhelm Joseph Schelling, and Arthur Schopenhauer dominated 19th-century philosophy. This tradition, which emphasized the mental or "ideal" character of all phenomena, gave birth to idealistic and subjectivist schools ranging from British idealism to phenomenalism to existentialism. Idealism as a philosophy came under heavy attack in the West at the turn of the 20th century. The most influential critics of both epistemological and ontological idealism were G. E. Moore and Bertrand Russell, but its critics also included the new realists. According to Stanford Encyclopedia of Philosophy, the attacks by Moore and Russell were so influential that even more than 100 years later "any acknowledgment of idealistic tendencies is viewed in the English-speaking world with reservation". However, many aspects and paradigms of idealism did still have a large influence on subsequent philosophy. Phenomenology, an influential strain of philosophy since the beginning of the 20th century, also draws on the lessons of idealism. In his Being and Time, Martin Heidegger famously states: If the term idealism amounts to the recognition that being can never be explained through beings, but, on the contrary, always is the transcendental in its relation to any beings, then the only right possibility of philosophical problematics lies with idealism. In that case, Aristotle was no less an idealist than Kant. If idealism means a reduction of all beings to a subject or a consciousness, distinguished by staying undetermined in its own being, and ultimately is characterised negatively as 'non-thingly', then this idealism is no less methodically naive than the most coarse-grained realism. Definitions Idealism is a term with several related meanings. It comes via Latin idea from the Ancient Greek idea (ἰδέα) from idein (ἰδεῖν), meaning "to see". The term entered the English language by 1743. It was first used in the abstract metaphysical sense "belief that reality is made up only of ideas" by Christian Wolff in 1747. The term re-entered the English language in this abstract sense by 1796. In ordinary language, as when speaking of Woodrow Wilson's political idealism, it generally suggests the priority of ideals, principles, values, and goals over concrete realities. Idealists are understood to represent the world as it might or should be, unlike pragmatists, who focus on the world as it presently is. In the arts, similarly, idealism affirms imagination and attempts to realize a mental conception of beauty, a standard of perfection, juxtaposed to aesthetic naturalism and realism. The term idealism is also sometimes used in a sociological sense, which emphasizes how human ideas—especially beliefs and values—shape society. Any philosophy that assigns crucial importance to the ideal or spiritual realm in its account of human existence may be termed "idealist". Metaphysical idealism is an ontological doctrine that holds that reality itself is incorporeal or experiential at its core. Beyond this, idealists disagree on which aspects of the mental are more basic. Platonic idealism affirms that abstractions are more basic to reality than the things we perceive, while subjective idealists and phenomenalists tend to privilege sensory experience over abstract reasoning. Epistemological idealism is the view that reality can only be known through ideas, that only psychological experience can be apprehended by the mind. Subjective idealists like George Berkeley are anti-realists in terms of a mind-independent world. However, not all idealists restrict the real or the knowable to our immediate subjective experience. Objective idealists make claims about a transempirical world, but simply deny that this world is essentially divorced from or ontologically prior to the mental. Thus, Plato and Gottfried Leibniz affirm an objective and knowable reality transcending our subjective awareness—a rejection of epistemological idealism—but propose that this reality is grounded in ideal entities, a form of metaphysical idealism. Nor do all metaphysical idealists agree on the nature of the ideal; for Plato, the fundamental entities were non-mental abstract forms, while for Leibniz they were proto-mental and concrete monads. As a rule, transcendental idealists like Kant affirm idealism's epistemic side without committing themselves to whether reality is ultimately mental; objective idealists like Plato affirm reality's metaphysical basis in the mental or abstract without restricting their epistemology to ordinary experience; and subjective idealists like Berkeley affirm both metaphysical and epistemological idealism. Classical idealism Pre-Socratic philosophy Idealism as a form of metaphysical monism holds that consciousness, not matter, is the ground of all being. It is monist because it holds that there is only one type of thing in the universe and idealist because it holds that one thing to be consciousness. Anaxagoras (480 BC) taught that "all things" were created by Nous ("Mind"). He held that Mind held the cosmos together and gave human beings a connection to the cosmos or a pathway to the divine. Platonism and neoplatonism Plato's theory of forms or "ideas" describes ideal forms (for example the platonic solids in geometry or abstracts like Goodness and Justice), as universals existing independently of any particular instance. Arne Grøn calls this doctrine "the classic example of a metaphysical idealism as a transcendent idealism", while Simone Klein calls Plato "the earliest representative of metaphysical objective idealism". Nevertheless, Plato holds that matter is real, though transitory and imperfect, and is perceived by our body and its senses and given existence by the eternal ideas that are perceived directly by our rational soul. Plato was therefore a metaphysical and epistemological dualist, an outlook that modern idealism has striven to avoid: Plato's thought cannot therefore be counted as idealist in the modern sense. With the neoplatonist Plotinus, wrote Nathaniel Alfred Boll "there even appears, probably for the first time in Western philosophy, idealism that had long been current in the East even at that time, for it taught... that the soul has made the world by stepping from eternity into time...". Similarly, in regard to passages from the Enneads, "The only space or place of the world is the soul" and "Time must not be assumed to exist outside the soul". Ludwig Noiré wrote: "For the first time in Western philosophy we find idealism proper in Plotinus". However, Plotinus does not address whether we know external objects, unlike Schopenhauer and other modern philosophers. Christian philosophy Christian theologians have held idealist views, often based on neoplatonism, despite the influence of Aristotelian scholasticism from the 12th century onward. However there is certainly a sense in which the scholastics retained the idealism that came via St. Augustine right back to Plato. Later western theistic idealism such as that of Hermann Lotze offers a theory of the "world ground" in which all things find their unity: it has been widely accepted by Protestant theologians. Several modern religious movements, for example the organizations within the New Thought Movement and the Unity Church, may be said to have a particularly idealist orientation. The theology of Christian Science includes a form of idealism: it teaches that all that truly exists is God and God's ideas; that the world as it appears to the senses is a distortion of the underlying spiritual reality, a distortion that may be corrected (both conceptually and in terms of human experience) through a reorientation (spiritualization) of thought. Chinese philosophy Wang Yangming, a Ming Chinese neo-Confucian philosopher, official, educationist, calligraphist and general, held that objects do not exist entirely apart from the mind because the mind shapes them. It is not the world that shapes the mind but the mind that gives reason to the world, so the mind alone is the source of all reason, having an inner light, an innate moral goodness and understanding of what is good. Idealism in Vedic and Buddhist thought There are currents of idealism throughout Indian philosophy, ancient and modern. Hindu idealism often takes the form of monism or non-dualism, espousing the view that a unitary consciousness is the essence or meaning of the phenomenal reality and plurality. Buddhist idealism on the other hand is more epistemic and is not a metaphysical monism, which Buddhists consider eternalistic and hence not the middle way between extremes espoused by the Buddha. The oldest reference to Idealism in Vedic texts is in Purusha Sukta of the Rig Veda. This Sukta espouses panentheism by presenting cosmic being Purusha as both pervading all universe and yet being transcendent to it. Absolute idealism can be seen in Chāndogya Upaniṣad, where things of the objective world like the five elements and the subjective world such as will, hope, memory etc. are seen to be emanations from the Self. Indian philosophy Idealist notions have been propounded by the Vedanta schools of thought, which use the Vedas, especially the Upanishads as their key texts. Idealism was opposed by dualists Samkhya, the atomists Vaisheshika, the logicians Nyaya, the linguists Mimamsa and the materialists Cārvāka. There are various sub schools of Vedanta, like Advaita Vedanta (non-dual), Vishishtadvaita and Bhedabheda Vedanta (difference and non-difference). The schools of Vedanta all attempt to explain the nature and relationship of Brahman (universal soul or Self) and Atman (individual self), which they see as the central topic of the Vedas. One of the earliest attempts at this was Bādarāyaņa's Brahma Sutras, which is canonical for all Vedanta sub-schools. Advaita Vedanta is a major sub school of Vedanta which holds a non-dual Idealistic metaphysics. According to Advaita thinkers like Adi Shankara (788–820) and his contemporary Maṇḍana Miśra, Brahman, the single unitary consciousness or absolute awareness, appears as the diversity of the world because of maya or illusion, and hence perception of plurality is mithya, error. The world and all beings or souls in it have no separate existence from Brahman, universal consciousness, and the seemingly independent soul (jiva) is identical to Brahman. These doctrines are represented in verses such as brahma satyam jagan mithya; jīvo brahmaiva na aparah (Brahman is alone True, and this world of plurality is an error; the individual self is not different from Brahman). Other forms of Vedanta like the Vishishtadvaita of Ramanuja and the Bhedabheda of Bhāskara are not as radical in their non-dualism, accepting that there is a certain difference between individual souls and Brahman. Dvaita school of Vedanta by Madhvacharya maintains the opposing view that the world is real and eternal. It also argues that real atman fully depends and reflection of independent brahman. The Tantric tradition of Kashmir Shaivism has also been categorized by scholars as a form of Idealism. The key thinker of this tradition is the Kashmirian Abhinavagupta (975–1025 CE). Modern Vedic Idealism was defended by the influential Indian philosopher Sarvepalli Radhakrishnan in his 1932 An Idealist View of Life and other works, which espouse Advaita Vedanta. The essence of Hindu Idealism is captured by such modern writers as Sri Nisargadatta Maharaj, Sri Aurobindo, P. R. Sarkar, and Sohail Inayatullah. Buddhist philosophy Buddhist views which can be said to be similar to Idealism appear in Mahayana Buddhist texts such as the Samdhinirmocana sutra, Laṅkāvatāra Sūtra, Dashabhumika sutra, etc. These were later expanded upon by Indian Buddhist philosophers of the influential Yogacara school, like Vasubandhu, Asaṅga, Dharmakīrti, and Śāntarakṣita. Yogacara thought was also promoted in China by Chinese philosophers and translators like Xuanzang. There is a modern scholarly disagreement about whether Yogacara Buddhism can be said to be a form of idealism. As Saam Trivedi notes: "on one side of the debate, writers such as Jay Garfield, Jeffrey Hopkins, Paul Williams, and others maintain the idealism label, while on the other side, Stefan Anacker, Dan Lusthaus, Richard King, Thomas Kochumuttom, Alex Wayman, Janice Dean Willis, and others have argued that Yogacara is not idealist." The central point of issue is what Buddhist philosophers like Vasubandhu who used the term vijñapti-matra ("representation-only" or "cognition-only") and formulated arguments to refute external objects actually meant to say. Vasubandhu's works include a refutation of external objects or externality itself and argues that the true nature of reality is beyond subject-object distinctions. He views ordinary consciousness experience as deluded in its perceptions of an external world separate from itself and instead argues that all there is Vijñapti (representation or conceptualization). Hence Vasubandhu begins his Vimsatika with the verse: All this is consciousness-only, because of the appearance of non-existent objects, just as someone with an optical disorder may see non-existent nets of hair. Likewise, the Buddhist philosopher Dharmakirti's view of the apparent existence of external objects is summed up by him in the Pramānaṿārttika ('Commentary on Logic and Epistemology'): Cognition experiences itself, and nothing else whatsoever. Even the particular objects of perception, are by nature just consciousness itself. While some writers like Jay Garfield hold that Vasubandhu is a metaphysical idealist, others see him as closer to an epistemic idealist like Kant who holds that our knowledge of the world is simply knowledge of our own concepts and perceptions of a transcendental world. Sean Butler upholding that Yogacara is a form of idealism, albeit its own unique type, notes the similarity of Kant's categories and Yogacara's Vāsanās, both of which are simply phenomenal tools with which the mind interprets the noumenal realm. Unlike Kant however who holds that the noumenon or thing-in-itself is unknowable to us, Vasubandhu holds that ultimate reality is knowable, but only through non-conceptual yogic perception of a highly trained meditative mind. Writers like Dan Lusthaus who hold that Yogacara is not a metaphysical idealism point out, for example, that Yogācāra thinkers did not focus on consciousness to assert it as ontologically real, but simply to analyze how our experiences and thus our suffering is created. As Lusthaus notes: "no Indian Yogācāra text ever claims that the world is created by mind. What they do claim is that we mistake our projected interpretations of the world for the world itself, i.e. we take our own mental constructions to be the world." Lusthaus notes that there are similarities to Western epistemic idealists like Kant and Husserl, enough so that Yogacara can be seen as a form of epistemological idealism. However he also notes key differences like the concepts of karma and nirvana. Saam Trivedi meanwhile notes the similarities between epistemic idealism and Yogacara, but adds that Yogacara Buddhism is in a sense its own theory. Similarly, Thomas Kochumuttom sees Yogacara as "an explanation of experience, rather than a system of ontology" and Stefan Anacker sees Vasubandhu's philosophy as a form of psychology and as a mainly therapeutic enterprise. Subjective idealism Subjective idealism (also known as immaterialism) describes a relationship between experience and the world in which objects are no more than collections or bundles of sense data in the perceiver. Proponents include Berkeley, Bishop of Cloyne, an Anglo-Irish philosopher who advanced a theory he called "immaterialism," later referred to as "subjective idealism", contending that individuals can only know sensations and ideas of objects directly, not abstractions such as "matter", and that ideas also depend upon being perceived for their very existence - esse est percipi; "to be is to be perceived". Arthur Collier published similar assertions though there seems to have been no influence between the two contemporary writers. The only knowable reality is the represented image of an external object. Matter as a cause of that image, is unthinkable and therefore nothing to us. An external world as absolute matter unrelated to an observer does not exist as far as we are concerned. The universe cannot exist as it appears if there is no perceiving mind. Collier was influenced by An Essay Towards the Theory of the Ideal or Intelligible World by Cambridge Platonist John Norris (1701). Bertrand Russell's popular book The Problems of Philosophy highlights Berkeley's tautological premise for advancing idealism; "If we say that the things known must be in the mind, we are either unduly limiting the mind's power of knowing, or we are uttering a mere tautology. We are uttering a mere tautology if we mean by 'in the mind' the same as by 'before the mind', i.e. if we mean merely being apprehended by the mind. But if we mean this, we shall have to admit that what, in this sense, is in the mind, may nevertheless be not mental. Thus when we realize the nature of knowledge, Berkeley's argument is seen to be wrong in substance as well as in form, and his grounds for supposing that 'ideas'-i.e. the objects apprehended-must be mental, are found to have no validity whatever. Hence his grounds in favour of the idealism may be dismissed." The Australian philosopher David Stove harshly criticized philosophical idealism, arguing that it rests on what he called "the worst argument in the world". Stove claims that Berkeley tried to derive a non-tautological conclusion from tautological reasoning. He argued that in Berkeley's case the fallacy is not obvious and this is because one premise is ambiguous between one meaning which is tautological and another which, Stove argues, is logically equivalent to the conclusion. Alan Musgrave argues that conceptual idealists compound their mistakes with use/mention confusions; Santa Claus the person does not exist. "Santa Claus" the name/concept/fairy tale does exist because adults tell children this every Christmas season (the distinction is highlighted by using quotation-marks when referring only to the name and not the object) and proliferation of hyphenated entities such as "thing-in-itself" (Immanuel Kant), "things-as-interacted-by-us" (Arthur Fine), "table-of-commonsense" and "table-of-physics" (Arthur Eddington) which are "warning signs" for conceptual idealism according to Musgrave because they allegedly do not exist but only highlight the numerous ways in which people come to know the world. This argument does not take into account the issues pertaining to hermeneutics, especially at the backdrop of analytic philosophy. Musgrave criticized Richard Rorty and postmodernist philosophy in general for confusion of use and mention. A. A. Luce and John Foster are other subjectivists. Luce, in Sense without Matter (1954), attempts to bring Berkeley up to date by modernizing his vocabulary and putting the issues he faced in modern terms, and treats the Biblical account of matter and the psychology of perception and nature. Foster's The Case for Idealism argues that the physical world is the logical creation of natural, non-logical constraints on human sense-experience. Foster's latest defense of his views (phenomenalistic idealism) is in his book A World for Us: The Case for Phenomenalistic Idealism. Paul Brunton, a British philosopher, mystic, traveler, and guru, taught a type of idealism called "mentalism," similar to that of Bishop Berkeley, proposing a master world-image, projected or manifested by a world-mind, and an infinite number of individual minds participating. A tree does not cease to exist if nobody sees it because the world-mind is projecting the idea of the tree to all minds John Searle, criticizing some versions of idealism, summarizes two important arguments for subjective idealism. The first is based on our perception of reality: (1) All we have access to in perception are the contents of our own experience and (2) The only epistemic basis for claims about the external world are our perceptual experiences therefore; (3) The only reality we can meaningfully speak of is that of perceptual experience Whilst agreeing with (2) Searle argues that (1) is false and points out that (3) does not follow from (1) and (2). The second argument runs as follows;Premise: Any cognitive state occurs as part of a set of cognitive states and within a cognitive systemConclusion 1: It is impossible to get outside all cognitive states and systems to survey the relationships between them and the reality they cognizeConclusion 2: There is no cognition of any reality that exists independently of cognition Searle contends that Conclusion 2 does not follow from the premises. Epistemological idealism is a subjectivist position in epistemology that holds that what one knows about an object exists only in one's mind. Proponents include Brand Blanshard. Transcendental idealism Transcendental idealism, founded by Immanuel Kant in the eighteenth century, maintains that the mind shapes the world we perceive into the form of space-and-time. The 2nd edition (1787) contained a Refutation of Idealism to distinguish his transcendental idealism from Descartes's Sceptical Idealism and Berkeley's anti-realist strain of Subjective Idealism. The section Paralogisms of Pure Reason is an implicit critique of Descartes' idealism. Kant says that it is not possible to infer the 'I' as an object (Descartes' cogito ergo sum) purely from "the spontaneity of thought". Kant focused on ideas drawn from British philosophers such as Locke, Berkeley and Hume but distinguished his transcendental or critical idealism from previous varieties; Kant distinguished between things as they appear to an observer and things in themselves, "that is, things considered without regard to whether and how they may be given to us". We cannot approach the noumenon, the "thing in Itself" () without our own mental world. He added that the mind is not a blank slate, tabula rasa but rather comes equipped with categories for organising our sense impressions. In the first volume of his Parerga and Paralipomena, Schopenhauer wrote his "Sketch of a History of the Doctrine of the Ideal and the Real". He defined the ideal as being mental pictures that constitute subjective knowledge. The ideal, for him, is what can be attributed to our own minds. The images in our head are what comprise the ideal. Schopenhauer emphasized that we are restricted to our own consciousness. The world that appears is only a representation or mental picture of objects. We directly and immediately know only representations. All objects that are external to the mind are known indirectly through the mediation of our mind. He offered a history of the concept of the "ideal" as "ideational" or "existing in the mind as an image". Charles Bernard Renouvier was the first Frenchman after Nicolas Malebranche to formulate a complete idealistic system, and had a vast influence on the development of French thought. His system is based on Immanuel Kant's, as his chosen term "néo-criticisme" indicates; but it is a transformation rather than a continuation of Kantianism. Friedrich Nietzsche argued that Kant commits an agnostic tautology and does not offer a satisfactory answer as to the source of a philosophical right to such-or-other metaphysical claims; he ridicules his pride in tackling "the most difficult thing that could ever be undertaken on behalf of metaphysics." The famous "thing-in-itself" was called a product of philosophical habit, which seeks to introduce a grammatical subject: because wherever there is cognition, there must be a thing that is cognized and allegedly it must be added to ontology as a being (whereas, to Nietzsche, only the world as ever changing appearances can be assumed). Yet he attacks the idealism of Schopenhauer and Descartes with an argument similar to Kant's critique of the latter (see above). Objective idealism Objective idealism asserts that the reality of experiencing combines and transcends the realities of the object experienced and of the mind of the observer. Proponents include Thomas Hill Green, Josiah Royce, Benedetto Croce and Charles Sanders Peirce. Absolute idealism Schelling (1775–1854) claimed that the Fichte's "I" needs the Not-I, because there is no subject without object, and vice versa. So there is no difference between the subjective and the objective, that is, the ideal and the real. This is Schelling's "absolute identity": the ideas or mental images in the mind are identical to the extended objects which are external to the mind. Absolute idealism is G. W. F. Hegel's account of how existence is comprehensible as an all-inclusive whole. Hegel called his philosophy "absolute" idealism in contrast to the "subjective idealism" of Berkeley and the "transcendental idealism" of Kant and Fichte, which were not based on a critique of the finite and a dialectical philosophy of history as Hegel's idealism was. The exercise of reason and intellect enables the philosopher to know ultimate historical reality, the phenomenological constitution of self-determination, the dialectical development of self-awareness and personality in the realm of History. In his Science of Logic (1812–1814) Hegel argues that finite qualities are not fully "real" because they depend on other finite qualities to determine them. Qualitative infinity, on the other hand, would be more self-determining and hence more fully real. Similarly finite natural things are less "real"—because they are less self-determining—than spiritual things like morally responsible people, ethical communities and God. So any doctrine, such as materialism, that asserts that finite qualities or natural objects are fully real is mistaken. Hegel certainly intends to preserve what he takes to be true of German idealism, in particular Kant's insistence that ethical reason can and does go beyond finite inclinations. For Hegel there must be some identity of thought and being for the "subject" (any human observer) to be able to know any observed "object" (any external entity, possibly even another human) at all. Under Hegel's concept of "subject-object identity," subject and object both have Spirit (Hegel's ersatz, redefined, nonsupernatural "God") as their conceptual (not metaphysical) inner reality—and in that sense are identical. But until Spirit's "self-realization" occurs and Spirit graduates from Spirit to Absolute Spirit status, subject (a human mind) mistakenly thinks every "object" it observes is something "alien," meaning something separate or apart from "subject." In Hegel's words, "The object is revealed to it [to "subject"] by [as] something alien, and it does not recognize itself." Self-realization occurs when Hegel (part of Spirit's nonsupernatural Mind, which is the collective mind of all humans) arrives on the scene and realizes that every "object" is himself, because both subject and object are essentially Spirit. When self-realization occurs and Spirit becomes Absolute Spirit, the "finite" (man, human) becomes the "infinite" ("God," divine), replacing the imaginary or "picture-thinking" supernatural God of theism: man becomes God. Tucker puts it this way: "Hegelianism . . . is a religion of self-worship whose fundamental theme is given in Hegel's image of the man who aspires to be God himself, who demands 'something more, namely infinity.'" The picture Hegel presents is "a picture of a self-glorifying humanity striving compulsively, and at the end successfully, to rise to divinity." Kierkegaard criticized Hegel's idealist philosophy in several of his works, particularly his claim to a comprehensive system that could explain the whole of reality. Where Hegel argues that an ultimate understanding of the logical structure of the world is an understanding of the logical structure of God's mind, Kierkegaard asserts that for God reality can be a system but it cannot be so for any human individual because both reality and humans are incomplete and all philosophical systems imply completeness. For Hegel, a logical system is possible but an existential system is not: "What is rational is actual; and what is actual is rational". Hegel's absolute idealism blurs the distinction between existence and thought: our mortal nature places limits on our understanding of reality; So-called systems have often been characterized and challenged in the assertion that they abrogate the distinction between good and evil, and destroy freedom. Perhaps one would express oneself quite as definitely, if one said that every such system fantastically dissipates the concept existence. ... Being an individual man is a thing that has been abolished, and every speculative philosopher confuses himself with humanity at large; whereby he becomes something infinitely great, and at the same time nothing at all. A major concern of Hegel's Phenomenology of Spirit (1807) and of the philosophy of Spirit that he lays out in his Encyclopedia of the Philosophical Sciences (1817–1830) is the interrelation between individual humans, which he conceives in terms of "mutual recognition." However, what Climacus means by the aforementioned statement, is that Hegel, in the Philosophy of Right, believed the best solution was to surrender one's individuality to the customs of the State, identifying right and wrong in view of the prevailing bourgeois morality. Individual human will ought, at the State's highest level of development, to properly coincide with the will of the State. Climacus rejects Hegel's suppression of individuality by pointing out it is impossible to create a valid set of rules or system in any society which can adequately describe existence for any one individual. Submitting one's will to the State denies personal freedom, choice, and responsibility. In addition, Hegel does believe we can know the structure of God's mind, or ultimate reality. Hegel agrees with Kierkegaard that both reality and humans are incomplete, inasmuch as we are in time, and reality develops through time. But the relation between time and eternity is outside time and this is the "logical structure" that Hegel thinks we can know. Kierkegaard disputes this assertion, because it eliminates the clear distinction between ontology and epistemology. Existence and thought are not identical and one cannot possibly think existence. Thought is always a form of abstraction, and thus not only is pure existence impossible to think, but all forms in existence are unthinkable; thought depends on language, which merely abstracts from experience, thus separating us from lived experience and the living essence of all beings. In addition, because we are finite beings, we cannot possibly know or understand anything that is universal or infinite such as God, so we cannot know God exists, since that which transcends time simultaneously transcends human understanding. Bradley saw reality as a monistic whole apprehended through "feeling", a state in which there is no distinction between the perception and the thing perceived. Like Berkeley, Bradley thought that nothing can be known to exist unless it is known by a mind. Bradley was the apparent target of G.E. Moore's radical rejection of idealism. Moore claimed that Bradley did not understand the statement that something is real. We know for certain, through common sense and prephilosophical beliefs, that some things are real, whether they are objects of thought or not, according to Moore. The 1903 article The Refutation of Idealism is one of the first demonstrations of Moore's commitment to analysis. He examines each of the three terms in the Berkeleian aphorism esse est percipi, "to be is to be perceived", finding that it must mean that the object and the subject are necessarily connected so that "yellow" and "the sensation of yellow" are identical - "to be yellow" is "to be experienced as yellow". But it also seems there is a difference between "yellow" and "the sensation of yellow" and "that esse is held to be percipi, solely because what is experienced is held to be identical with the experience of it". Though far from a complete refutation, this was the first strong statement by analytic philosophy against its idealist predecessors, or at any rate against the type of idealism represented by Berkeley. Actual idealism Actual idealism is a form of idealism developed by Giovanni Gentile that grew into a "grounded" idealism contrasting Kant and Hegel. The idea is a version of Occam's razor; the simpler explanations are always correct. Actual idealism is the idea that reality is the ongoing act of thinking, or in Italian "pensiero pensante". Any action done by humans is classified as human thought because the action was done due to predisposed thought. He further believes that thoughts are the only concept that truly exist since reality is defined through the act of thinking. This idea was derived from Gentile's paper, "The Theory of Mind As Pure Act". Since thoughts are actions, any conjectured idea can be enacted. This idea not only affects the individual's life, but everyone around them, which in turn affects the state since the people are the state. Therefore, thoughts of each person are subsumed within the state. The state is a composition of many minds that come together to change the country for better or worse. Gentile theorizes that thoughts can only be conjectured within the bounds of known reality; abstract thinking does not exist. Thoughts cannot be formed outside our known reality because we are the reality that halt ourselves from thinking externally. With accordance to "The Act of Thought of Pure Thought", our actions comprise our thoughts, our thoughts create perception, perceptions define reality, thus we think within our created reality. The present act of thought is reality but the past is not reality; it is history. The reason being, past can be rewritten through present knowledge and perspective of the event. The reality that is currently constructed can be completely changed through language (e.g. bias (omission, source, tone)). The unreliability of the recorded reality can skew the original concept and make the past remark unreliable. Actual idealism is regarded as a liberal and tolerant doctrine since it acknowledges that every being picturizes reality, in which their ideas remained hatched, differently. Even though, reality is a figment of thought. Even though core concept of the theory is famous for its simplification, its application is regarded as extremely ambiguous. Over the years, philosophers have interpreted it numerously different ways: Holmes took it as metaphysics of the thinking act; Betti as a form of hermeneutics; Harris as a metaphysics of democracy; Fogu as a modernist philosophy of history. Giovanni Gentile was a key supporter of fascism, regarded by many as the "philosopher of fascism". Gentile's philosophy was the key to understating fascism as it was believed by many who supported and loved it. They believed, if priori synthesis of subject and object is true, there is no difference between the individuals in society; they're all one. Which means that they have equal right, roles, and jobs. In fascist state, submission is given to one leader because individuals act as one body. In Gentile's view, far more can be accomplished when individuals are under a corporate body than a collection of autonomous individuals. Pluralistic idealism Pluralistic idealism such as that of Gottfried Leibniz takes the view that there are many individual minds that together underlie the existence of the observed world and make possible the existence of the physical universe. Unlike absolute idealism, pluralistic idealism does not assume the existence of a single ultimate mental reality or "Absolute". Leibniz' form of idealism, known as Panpsychism, views "monads" as the true atoms of the universe and as entities having perception. The monads are "substantial forms of being, "elemental, individual, subject to their own laws, non-interacting, each reflecting the entire universe. Monads are centers of force, which is substance while space, matter and motion are phenomenal and their form and existence is dependent on the simple and immaterial monads. There is a pre-established harmony by God, the central monad, between the world in the minds of the monads and the external world of objects. Leibniz's cosmology embraced traditional Christian theism. The English psychologist and philosopher James Ward inspired by Leibniz had also defended a form of pluralistic idealism. According to Ward the universe is composed of "psychic monads" of different levels, interacting for mutual self-betterment. Personalism is the view that the minds that underlie reality are the minds of persons. Borden Parker Bowne, a philosopher at Boston University, a founder and popularizer of personal idealism, presented it as a substantive reality of persons, the only reality, as known directly in self-consciousness. Reality is a society of interacting persons dependent on the Supreme Person of God. Other proponents include George Holmes Howison and J. M. E. McTaggart. Howison's personal idealism was also called "California Personalism" by others to distinguish it from the "Boston Personalism" which was of Bowne. Howison maintained that both impersonal, monistic idealism and materialism run contrary to the experience of moral freedom. To deny freedom to pursue truth, beauty, and "benignant love" is to undermine every profound human venture, including science, morality, and philosophy. Personalistic idealists Borden Parker Bowne and Edgar S. Brightman and realistic (in some senses of the term, though he remained influenced by neoplatonism) personal theist Saint Thomas Aquinas address a core issue, namely that of dependence upon an infinite personal God. Howison, in his book The Limits of Evolution and Other Essays Illustrating the Metaphysical Theory of Personal Idealism, created a democratic notion of personal idealism that extended all the way to God, who was no more the ultimate monarch but the ultimate democrat in eternal relation to other eternal persons. J. M. E. McTaggart's idealist atheism and Thomas Davidson's apeirotheism resemble Howisons personal idealism. J. M. E. McTaggart argued that minds alone exist and only relate to each other through love. Space, time and material objects are unreal. In The Unreality of Time he argued that time is an illusion because it is impossible to produce a coherent account of a sequence of events. The Nature of Existence (1927) contained his arguments that space, time, and matter cannot possibly be real. In his Studies in Hegelian Cosmology (Cambridge, 1901, p196) he declared that metaphysics are not relevant to social and political action. McTaggart "thought that Hegel was wrong in supposing that metaphysics could show that the state is more than a means to the good of the individuals who compose it". For McTaggart "philosophy can give us very little, if any, guidance in action... Why should a Hegelian citizen be surprised that his belief as to the organic nature of the Absolute does not help him in deciding how to vote? Would a Hegelian engineer be reasonable in expecting that his belief that all matter is spirit should help him in planning a bridge? Thomas Davidson taught a philosophy called "apeirotheism", a "form of pluralistic idealism...coupled with a stern ethical rigorism" which he defined as "a theory of Gods infinite in number." The theory was indebted to Aristotle's pluralism and his concepts of Soul, the rational, living aspect of a living substance which cannot exist apart from the body because it is not a substance but an essence, and nous, rational thought, reflection and understanding. Although a perennial source of controversy, Aristotle arguably views the latter as both eternal and immaterial in nature, as exemplified in his theology of unmoved movers. Identifying Aristotle's God with rational thought, Davidson argued, contrary to Aristotle, that just as the soul cannot exist apart from the body, God cannot exist apart from the world. Idealist notions took a strong hold among physicists of the early 20th century confronted with the paradoxes of quantum physics and the theory of relativity. In The Grammar of Science, Preface to the 2nd Edition, 1900, Karl Pearson wrote, "There are many signs that a sound idealism is surely replacing, as a basis for natural philosophy, the crude materialism of the older physicists." This book influenced Einstein's regard for the importance of the observer in scientific measurements. In § 5 of that book, Pearson asserted that "...science is in reality a classification and analysis of the contents of the mind..." Also, "...the field of science is much more consciousness than an external world." Arthur Eddington, a British astrophysicist of the early 20th century, wrote in his book The Nature of the Physical World that "The stuff of the world is mind-stuff": The mind-stuff of the world is, of course, something more general than our individual conscious minds... The mind-stuff is not spread in space and time; these are part of the cyclic scheme ultimately derived out of it... It is necessary to keep reminding ourselves that all knowledge of our environment from which the world of physics is constructed, has entered in the form of messages transmitted along the nerves to the seat of consciousness... Consciousness is not sharply defined, but fades into subconsciousness; and beyond that we must postulate something indefinite but yet continuous with our mental nature... It is difficult for the matter-of-fact physicist to accept the view that the substratum of everything is of mental character. But no one can deny that mind is the first and most direct thing in our experience, and all else is remote inference." Ian Barbour in his book Issues in Science and Religion (1966), p. 133, cites Arthur Eddington's The Nature of the Physical World (1928) for a text that argues The Heisenberg Uncertainty Principles provides a scientific basis for "the defense of the idea of human freedom" and his Science and the Unseen World (1929) for support of philosophical idealism "the thesis that reality is basically mental". Sir James Jeans wrote: "The stream of knowledge is heading towards a non-mechanical reality; the Universe begins to look more like a great thought than like a great machine. Mind no longer appears to be an accidental intruder into the realm of matter... we ought rather hail it as the creator and governor of the realm of matter." Jeans, in an interview published in The Observer (London), when asked the question: "Do you believe that life on this planet is the result of some sort of accident, or do you believe that it is a part of some great scheme?" replied: I incline to the idealistic theory that consciousness is fundamental, and that the material universe is derivative from consciousness, not consciousness from the material universe... In general the universe seems to me to be nearer to a great thought than to a great machine. It may well be, it seems to me, that each individual consciousness ought to be compared to a brain-cell in a universal mind. Addressing the British Association in 1934, Jeans said: What remains is in any case very different from the full-blooded matter and the forbidding materialism of the Victorian scientist. His objective and material universe is proved to consist of little more than constructs of our own minds. To this extent, then, modern physics has moved in the direction of philosophic idealism. Mind and matter, if not proved to be of similar nature, are at least found to be ingredients of one single system. There is no longer room for the kind of dualism which has haunted philosophy since the days of Descartes. In The Universe Around Us, Jeans writes: Finite picture whose dimensions are a certain amount of space and a certain amount of time; the protons and electrons are the streaks of paint which define the picture against its space-time background. Traveling as far back in time as we can, brings us not to the creation of the picture, but to its edge; the creation of the picture lies as much outside the picture as the artist is outside his canvas. On this view, discussing the creation of the universe in terms of time and space is like trying to discover the artist and the action of painting, by going to the edge of the canvas. This brings us very near to those philosophical systems which regard the universe as a thought in the mind of its Creator, thereby reducing all discussion of material creation to futility. The chemist Ernest Lester Smith wrote a book Intelligence Came First (1975) in which he claimed that consciousness is a fact of nature and that the cosmos is grounded in and pervaded by mind and intelligence. Bernard d'Espagnat, a French theoretical physicist best known for his work on the nature of reality, wrote a paper titled The Quantum Theory and Reality. According to the paper: The doctrine that the world is made up of objects whose existence is independent of human consciousness turns out to be in conflict with quantum mechanics and with facts established by experiment. In a Guardian article entitled "Quantum Weirdness: What We Call 'Reality' is Just a State of Mind", d'Espagnat wrote: What quantum mechanics tells us, I believe, is surprising to say the least. It tells us that the basic components of objects – the particles, electrons, quarks etc. – cannot be thought of as 'self-existent'. He further writes that his research in quantum physics has led him to conclude that an "ultimate reality" exists, which is not embedded in space or time. Contemporary idealists There are various philosophers working in contemporary Western philosophy of mind who have recently defended an idealist stance. These include: Nicholas Rescher Howard Robinson John McDowell — Mind and World (1996) Vittorio Hösle — Objective Idealism, Ethics and Politics (1998) John Leslie — Infinite Minds: A Philosophical Cosmology (2002). John Foster — A World for Us (2008), coming from a traditional Christian theological perspective. Timothy Sprigge — A Defense of Absolute Idealism (1984). David Pearce — Non-Materialist Physicalism: An experimentally testable conjecture (2014) Bernardo Kastrup — The Idea of the World (2018) Donald D. Hoffman — The Case Against Reality (2019) See also Cogito ergo sum Dialectical idealism Metaphysical solipsism Mind over matter Moral idealism Neo-Vedanta New Thought Panpsychism Rationality Reason Spirituality Teleological idealism Notes References Immanuel Kant's Critique of Pure Reason with an historical introduction by Ludwig Noiré, available at Kierkegaard, Søren. Concluding Unscientific Postscript, Princeton, Neujahr, Philip J., Kant's Idealism, Mercer University Press, 1995 Watts, Michael. Kierkegaard, Oneworld, Nisargadatta Maharaj (1973), I Am That (Chetana Publishing, Mumbai, India), (paperback). Prabhat Rainjan Sarkar (1984), Human Society . Vols. I and II. (Ananda Marga Publications, Calcutta, India). Sri Aurobindo (1984), The Life Divine, (Lotus Press, Twin Lakes, Wisconsin, USA) . Surendranath Dasgupta (1969), Indian Idealism (Cambridge University Press, New York, NY, USA), Fritjof Capra (2002), The Tao of Physics: An Exploration of the Parallels Between Modern Physics and Eastern Mysticism (Shambhala Publications of Berkeley, California, USA), . Sohail Inayatullah (2001), Understanding P. R. Sarkar: The Indian Episteme, Macrohistory and Transformative Knowledge, (Leiden, Brill Publishers) . Further reading Gustavus Watts Cunningham Idealistic Argument in Recent British and American Philosophy Books For Libraries Press, 1967 Hugh Joseph Tallon The concept of self in British and American idealism Catholic University of America Press, 1939 Gerald Thomas Baskfield The idea of God in British and American personal idealism Catholic University of America, 1933 Vergilius Ture Anselm Ferm A history of philosophical systems Littlefield Adams, 1968 External links A. C. Grayling-Wittgenstein on Scepticism and Certainty Science and Health with Key to the Scriptures by Mary Baker Eddy: idealism in religious thought Idealism and its practical use in physics and psychology 'The Triumph of Idealism', lecture by Professor Keith Ward offering a positive view of Idealism, at Gresham College, 13 March 2008 (available in text, audio and video download) Indian philosophy Metaphysical theories Monism Ontology Western philosophy
[ -0.0032671529334038496, 0.08446481823921204, -0.7354075312614441, 0.17709164321422577, -0.022739341482520103, 0.5041277408599854, 0.5733762979507446, 0.20493508875370026, 0.20859310030937195, -0.5641680955886841, -0.5567875504493713, 0.7161277532577515, -0.4012620151042938, 0.4708977937698...
15430
https://en.wikipedia.org/wiki/Inheritance
Inheritance
Inheritance is the practice of passing on private property, titles, debts, entitlements, privileges, rights, and obligations upon the death of an individual. The rules of inheritance differ among societies and have changed over time. The passing on of private property and/or debts can be done by a notary. Terminology In law, an heir is a person who is entitled to receive a share of the deceased's (the person who died) property, subject to the rules of inheritance in the jurisdiction of which the deceased was a citizen or where the deceased (decedent) died or owned property at the time of death. The inheritance may be either under the terms of a will or by intestate laws if the deceased had no will. However, the will must comply with the laws of the jurisdiction at the time it was created or it will be declared invalid (for example, some states do not recognise handwritten wills as valid, or only in specific circumstances) and the intestate laws then apply. The exclusion from inheritance of a person who was an heir in a previous will, or would otherwise be expected to inherit, is termed "disinheritance". A person does not become an heir before the death of the deceased, since the exact identity of the persons entitled to inherit is determined only then. Members of ruling noble or royal houses who are expected to become heirs are called heirs apparent if first in line and incapable of being displaced from inheriting by another claim; otherwise, they are heirs presumptive. There is a further concept of joint inheritance, pending renunciation by all but one, which is called coparceny. In modern law, the terms inheritance and heir refer exclusively to succession to property by descent from a deceased dying intestate. Takers in property succeeded to under a will are termed generally beneficiaries, and specifically devises for real property, bequests for personal property (except money), or legatees for money. Except in some jurisdictions where a person cannot be legally disinherited (such as the United States state of Louisiana, which allows disinheritance only under specifically enumerated circumstances), a person who would be an heir under intestate laws may be disinherited completely under the terms of a will (an example is that of the will of comedian Jerry Lewis; his will specifically disinherited his six children by his first wife, and their descendants, leaving his entire estate to his second wife). History Detailed anthropological and sociological studies have been made about customs of patrimonial inheritance, where only male children can inherit. Some cultures also employ matrilineal succession, where property can only pass along the female line, most commonly going to the sister's sons of the decedent; but also, in some societies, from the mother to her daughters. Some ancient societies and most modern states employ egalitarian inheritance, without discrimination based on gender and/or birth order. Religious laws about inheritance Jewish laws The inheritance is patrimonial. The father —that is, the owner of the land— bequeaths only to his male descendants, so the Promised Land passes from one Jewish father to his sons. According to the Law of Moses, the firstborn was entitled to receive a double portion of his father's inheritance,compared to the other siblings (). If there were no living sons and no descendants of any previously living sons, daughters inherit. In Numbers 27, the daughters of Zelophehad (Mahlah, Noa, Hoglah, Milcah, and Tirzah) of the tribe of Manasseh come to Moses and ask for their father's inheritance, as they have no brothers. The order of inheritance is set out: a man's sons inherit first, daughters if no sons, brothers if he has no children, and so on. Later, in Numbers 36, some of the heads of the families of the tribe of Manasseh come to Moses and point out that, if a daughter inherits and then marries a man not from her paternal tribe, her land will pass from her birth-tribe's inheritance into her marriage-tribe's. So a further rule is laid down: if a daughter inherits land, she must marry someone within her father's tribe. (The daughters of Zelophehad marry the sons' of their father's brothers. There is no indication that this was not their choice.) The tractate Baba Bathra, written during late Antiquity in Babylon, deals extensively with issues of property ownership and inheritance according to Jewish Law. Other works of Rabbinical Law, such as the Hilkhot naḥalot: mi-sefer Mishneh Torah leha-Rambam, and the Sefer ha-yerushot: ʻim yeter ha-mikhtavim be-divre ha-halakhah be-ʻAravit uve-ʻIvrit uve-Aramit also deal with inheritance issues. The first, often abbreviated to Mishneh Torah, was written by Maimonides and was very important in Jewish tradition. All these sources agree that the firstborn son is entitled to a double portion of his father's estate. This means that, for example, if a father left five sons, the firstborn receives a third of the estate and each of the other four receives a sixth. If he left nine sons, the firstborn receives a fifth and each of the other eight receive a tenth. If the eldest surviving son is not the firstborn son, he is not entitled to the double portion. Philo of Alexandria and Josephus also comment on the Jewish laws of inheritance, praising them above other law codes of their time. They also agreed that the firstborn son must receive a double portion of his father's estate. Christian laws At first, Christianity did not have its own inheritance traditions distinct from Judaism. With the accession of Emperor Constantine in 306, Christians both began to distance themselves from Judaism and to have influence on the law and practices of secular institutions. From the beginning, this included inheritance. The Roman practice of adoption was a specific target, because it was perceived to be in conflict with the Judeo-Christian doctrine of primogeniture. As Stephanie Coontz documents in Marriage, a History (Penguin, 2006), not only succession but the whole constellation of rights and practices that included marriage, adoption, legitimacy, consanguinity, and inheritance changed in Western Europe from a Greco-Roman model to a Judeo-Christian pattern, based on Biblical and traditional Judeo-Christian principles. The transformation was essentially complete in the Middle Ages, although in English-speaking countries there was additional development under the influence of Protestantism. Even when Europe became secularized and Christianity faded into the background, the legal foundation Christendom had laid remained. Only in the era of modern jurisprudence have there been significant changes. Islamic laws The Quran introduced a number of different rights and restrictions on matters of inheritance, including general improvements to the treatment of women and family life compared to the pre-Islamic societies that existed in the Arabian Peninsula at the time. Furthermore, the Quran introduced additional heirs that were not entitled to inheritance in pre-Islamic times, mentioning nine relatives specifically of which six were female and three were male. However, the inheritance rights of women remained inferior to those of men because in Islam someone always has a responsibility of looking after a woman's expenses. According to Quran 4:11, for example, a son is entitled to twice as much inheritance as a daughter. The Quran also presented efforts to fix the laws of inheritance, and thus forming a complete legal system. This development was in contrast to pre-Islamic societies where rules of inheritance varied considerably. In addition to the above changes, the Quran imposed restrictions on testamentary powers of a Muslim in disposing his or her property. Three verses of the Quran, 4:11, 4:12 and 4:176, give specific details of inheritance and shares, in addition to few other verses dealing with testamentary. But this information was used as a starting point by Muslim jurists who expounded the laws of inheritance even further using Hadith, as well as methods of juristic reasoning like Qiyas. Nowadays, inheritance is considered an integral part of Sharia law and its application for Muslims is mandatory, though many peoples (see Historical inheritance systems), despite being Muslim, have other inheritance customs. Inequality The distribution of the inherited wealth has varied greatly among different cultures and legal traditions. In nations using civil law, for example, the right of children to inherit wealth from parents in pre-defined ratios is enshrined in law, as far back as the Code of Hammurabi (ca. 1750 BC). In the US State of Louisiana, the only US state where the legal system is derived from the Napoleonic Code, this system is known as "forced heirship" which prohibits disinheritance of adult children except for a few narrowly-defined reasons that a parent is obligated to prove. Other legal traditions, particularly in nations using common law, allow inheritances to be divided however one wishes, or to disinherit any child for any reason. In cases of unequal inheritance, the majority might receive little while only a small number inherit a larger amount. The amount of inheritance is often far less than the value of a business initially given to the son, especially when a son takes over a thriving multimillion-dollar business, yet the daughter is given the balance of the actual inheritance amounting to far less than the value of business that was initially given to the son. This is especially seen in old world cultures, but continues in many families to this day. Arguments for eliminating forced heirship include the right to property and the merit of individual allocation of capital over government wealth confiscation and redistribution, but this does not resolve what some describe as the problem of unequal inheritance. In terms of inheritance inequality, some economists and sociologists focus on the inter generational transmission of income or wealth which is said to have a direct impact on one's mobility (or immobility) and class position in society. Nations differ on the political structure and policy options that govern the transfer of wealth. According to the American federal government statistics compiled by Mark Zandi in 1985, the average US inheritance was $39,000. In subsequent years, the overall amount of total annual inheritance more than doubled, reaching nearly $200 billion. By 2050, there will be an estimated $25 trillion inheritance transmitted across generations. Some researchers have attributed this rise to the baby boomer generation. Historically, the baby boomers were the largest influx of children conceived after WW2. For this reason, Thomas Shapiro suggests that this generation "is in the midst of benefiting from the greatest inheritance of wealth in history". Inherited wealth may help explain why many Americans who have become rich may have had a "substantial head start". In September 2012, according to the Institute for Policy Studies, "over 60 percent" of the Forbes richest 400 Americans "grew up in substantial privilege", and often (but not always) received substantial inheritances. Other research has shown that many inheritances, large or small, are rapidly squandered. Similarly, analysis shows that over two-thirds of high-wealth families lose their wealth within two generations, and almost 80% of high-wealth parents "feel the next generation is not financially responsible enough to handle inheritance". Social stratification It has been argued that inheritance plays a significant effect on social stratification. Inheritance is an integral component of family, economic, and legal institutions, and a basic mechanism of class stratification. It also affects the distribution of wealth at the societal level. The total cumulative effect of inheritance on stratification outcomes takes three forms, according to scholars who have examined the subject. The first form of inheritance is the inheritance of cultural capital (i.e. linguistic styles, higher status social circles, and aesthetic preferences). The second form of inheritance is through familial interventions in the form of inter vivos transfers (i.e. gifts between the living), especially at crucial junctures in the life courses. Examples include during a child's milestone stages, such as going to college, getting married, getting a job, and purchasing a home. The third form of inheritance is the transfers of bulk estates at the time of death of the testators, thus resulting in significant economic advantage accruing to children during their adult years. The origin of the stability of inequalities is material (personal possessions one is able to obtain) and is also cultural, rooted either in varying child-rearing practices that are geared to socialization according to social class and economic position. Child-rearing practices among those who inherit wealth may center around favoring some groups at the expense of others at the bottom of the social hierarchy. Sociological and economic effects of inheritance inequality It is further argued that the degree to which economic status and inheritance is transmitted across generations determines one's life chances in society. Although many have linked one's social origins and educational attainment to life chances and opportunities, education cannot serve as the most influential predictor of economic mobility. In fact, children of well-off parents generally receive better schooling and benefit from material, cultural, and genetic inheritances. Likewise, schooling attainment is often persistent across generations and families with higher amounts of inheritance are able to acquire and transmit higher amounts of human capital. Lower amounts of human capital and inheritance can perpetuate inequality in the housing market and higher education. Research reveals that inheritance plays an important role in the accumulation of housing wealth. Those who receive an inheritance are more likely to own a home than those who do not regardless of the size of the inheritance. Often, racial or religious minorities and individuals from socially disadvantaged backgrounds receive less inheritance and wealth. As a result, mixed races might be excluded in inheritance privilege and are more likely to rent homes or live in poorer neighborhoods, as well as achieve lower educational attainment compared with whites in America. Individuals with a substantial amount of wealth and inheritance often intermarry with others of the same social class to protect their wealth and ensure the continuous transmission of inheritance across generations; thus perpetuating a cycle of privilege. Nations with the highest income and wealth inequalities often have the highest rates of homicide and disease (such as obesity, diabetes, and hypertension) which results in high mortality rates. A The New York Times article reveals that the U.S. is the world's wealthiest nation, but "ranks twenty-ninth in life expectancy, right behind Jordan and Bosnia" and "has the second highest mortality rate of the comparable OECD countries". This has been regarded as highly attributed to the significant gap of inheritance inequality in the country, although there are clearly other factors such as the affordability of healthcare. When social and economic inequalities centered on inheritance are perpetuated by major social institutions such as family, education, religion, etc., these differing life opportunities are argued to be transmitted from each generation. As a result, this inequality is believed to become part of the overall social structure. Dynastic wealth Dynastic wealth is monetary inheritance that is passed on to generations that didn't earn it. Dynastic wealth is linked to the term Plutocracy. Much has been written about the rise and influence of dynastic wealth including the bestselling book Capital in the Twenty-First Century by the French economist Thomas Piketty. Bill Gates uses the term in his article "Why Inequality Matters". Soviet response to inheritance As Communism is founded on the Marxist Labor Theory of Value, any money collected in the course of a lifetime is justified if it was based on the fruits of the person's own labor and not from exploiting others. The first communist government installed after the Russian Revolution resolved therefore to abolish the right of inheritance, with some exceptions. Taxation Many states have inheritance taxes or estate taxes, under which a portion of any inheritance or estate becomes government revenue. See also Beneficiary Digital inheritance Inheritance law in Canada Smart contract Transformative asset Estate planning Family law References External links 26 July 2006 USA Today article on dilemma the rich face when leaving wealth to children Scots law legal terminology Wills and trusts Ancestors Social stratification
[ 0.16574329137802124, -0.0501534640789032, -0.10906875133514404, 0.3143340051174164, 0.08353028446435928, -0.15063981711864471, 0.006107003428041935, -0.24288415908813477, -0.23600643873214722, 0.04212136194109917, -0.49712127447128296, 0.0777529627084732, 0.39539891481399536, 0.50976967811...
15435
https://en.wikipedia.org/wiki/Ignatius%20of%20Antioch
Ignatius of Antioch
Ignatius of Antioch (; Greek: Ἰγνάτιος Ἀντιοχείας, Ignátios Antiokheías; died c. 108/140 AD), also known as Ignatius Theophorus (, Ignátios ho Theophóros, lit. "the God-bearing"), was an early Christian writer and Patriarch of Antioch. While en route to Rome, where he met his martyrdom, Ignatius wrote a series of letters. This correspondence now forms a central part of a later collection of works known to be authored by the Apostolic Fathers. He is considered to be one of the three most important of these, together with Clement of Rome and Polycarp. His letters also serve as an example of early Christian theology. Important topics they address include ecclesiology, the sacraments, and the role of bishops. Life Nothing is known of Ignatius' life apart from what may be inferred internally from his letters, except from later (sometimes spurious) traditions. It is said Ignatius converted to Christianity at a young age. Tradition identifies Ignatius, along with his friend Polycarp, as disciples of John the Apostle. Later in his life, Ignatius was chosen to serve as Bishop of Antioch; the fourth-century Church historian Eusebius writes that Ignatius succeeded Evodius. Theodoret of Cyrrhus claimed that St. Peter himself left directions that Ignatius be appointed to the episcopal see of Antioch. Ignatius called himself Theophorus (God Bearer). A tradition arose that he was one of the children whom Jesus Christ took in his arms and blessed. Veneration Ignatius' feast day was kept in his own Antioch on 17 October, the day on which he is now celebrated in the Catholic Church and generally in western Christianity, although from the 12th century until 1969 it was put at 1 February in the General Roman Calendar. In the Eastern Orthodox Church it is observed on 20 December. The Synaxarium of the Coptic Orthodox Church of Alexandria places it on the 24th of the Coptic Month of Koiak (which is also the 24th day of the fourth month of Tahisas in the Synaxarium of The Ethiopian Orthodox Tewahedo Church), corresponding in three years out of every four to 20 December in the Julian Calendar, which currently falls on 2 January of the Gregorian Calendar. Ignatius is remembered in the Church of England with a Lesser Festival on 17 October. Martyrdom Circumstances of martyrdom Instead of being executed in his home town of Antioch, Ignatius was escorted to Rome by a company of ten Roman soldiers: Scholars consider Ignatius' transport to Rome unusual, since those persecuted as Christians would be expected to be punished locally. Stevan Davies has pointed out that "no other examples exist from the Flavian age of any prisoners except citizens or prisoners of war being brought to Rome for execution." If Ignatius had been a Roman citizen, he could have appealed to the emperor, but then he would usually have been beheaded rather than tortured. Furthermore, the epistles of Ignatius state that he was put in chains during the journey to Rome, but it was illegal under Roman law for a citizen to be put in bonds during an appeal to the emperor. Allen Brent argues that Ignatius was transferred to Rome at the request of the emperor in order to provide entertainment to the masses by being killed in the Colosseum. Brent insists, contrary to some, that "it was normal practice to transport condemned criminals from the provinces in order to offer spectator sport in the Colosseum at Rome." Stevan Davies rejects the idea that Ignatius was transported to Rome for the games at the Colosseum. He reasons that "if Ignatius was in some way a donation by the Imperial Governor of Syria to the games at Rome, a single prisoner seems a rather miserly gift." Instead, Davies proposes that Ignatius may have been indicted by a legate, or representative, of the governor of Syria while the governor was away temporarily, and sent to Rome for trial and execution. Under Roman law, only the governor of a province or the emperor himself could impose capital punishment, so the legate would have faced the choice of imprisoning Ignatius in Antioch or sending him to Rome. Davies postulates that the legate may have decided to send Ignatius to Rome so as to minimize any further dissension among the Antiochene Christians. Christine Trevett has called Davies' suggestion "entirely hypothetical" and concludes that no fully satisfactory solution to the problem can be found, writing, "I tend to take the bishop at his word when he says he is a condemned man. But the question remains, why is he going to Rome? The truth is that we do not know." Route of travel to Rome During the journey to Rome, Ignatius and his entourage of soldiers made a number of lengthy stops in Asia Minor, deviating from the most direct land route from Antioch to Rome. Scholars generally agree on the following reconstruction of Ignatius' route of travel: Ignatius first traveled from Antioch, in the province of Syria, to Asia Minor. It is uncertain whether he traveled by sea or by land. He was then taken to Smyrna, via a route that bypassed the cities of Magnesia, Tralles, and Ephesus, but likely passed through Philadelphia (cf. Ign. Phil. 7). Ignatius then traveled to Troas, where he boarded a ship bound for Neapolis in Macedonia (cf. Ign. Pol. 8). He then passed through the city of Philippi (cf. Pol. Phil. 9). After this, he took some land or sea route to Rome. During the journey, the soldiers allowed Ignatius to meet with entire congregations of Christians while in chains, at least while he was in Philadelphia (cf. Ign. Phil. 7), and numerous Christian visitors and messengers were allowed to meet with him on a one-on-one basis. These messengers allowed Ignatius to send six letters to nearby churches, and one to Polycarp, the bishop of Smyrna. These aspects of Ignatius' martyrdom are also regarded by scholars as unusual. It is generally expected that a prisoner would be transported on the most direct, cost-effective route to their destination. Since travel by land in the Roman Empire was between five and fifty-two times more expensive than travel by sea, and Antioch was a major port city, the most efficient route would likely have been entirely by sea. Steven Davies argues that Ignatius' circuitous route to Rome can only be explained by positing that he was not the main purpose of the soldiers' trip, and that the various stops in Asia Minor were for other state business. He suggests that such a scenario would also explain the relative freedom that Ignatius was given to meet with other Christians during the journey. Date of martyrdom Due to the sparse and fragmentary nature of the documentation of Ignatius' life and martyrdom, the date of his death is subject to a significant amount of uncertainty. Tradition places the martyrdom of Ignatius in the reign of Trajan, who was emperor of Rome from 98 to 117 AD. But the earliest source for this Trajanic date is the 4th century church historian Eusebius of Caesarea, who is regarded by some modern scholars as an unreliable source for chronological information regarding the early church. Eusebius had an ideological interest in dating church leaders as early as possible, and ensuring that there were no gaps in succession between the original apostles of Jesus and the leaders of the church in his day. While many scholars accept the traditional dating of Ignatius' martyrdom under Trajan, others have argued for a somewhat later date. Richard Pervo dated Ignatius' death to 135–140 AD. British classicist Timothy Barnes has argued for a date in the 140s AD, on the grounds that Ignatius seems to have quoted a work of the Gnostic Ptolemy in one of his epistles, who only became active in the 130s. Death and aftermath Ignatius himself wrote that he would be thrown to the beasts, and in the fourth century Eusebius reports tradition that this came to pass, which is then repeated by Jerome who is the first to explicitly mention "lions." John Chrysostom is the first to allude to the Colosseum as the place of Ignatius' martyrdom. Contemporary scholars are uncertain that any of these authors had sources other than Ignatius' own writings. According to a medieval Christian text titled Martyrium Ignatii, Ignatius' remains were carried back to Antioch by his companions after his martyrdom. The sixth-century writings of Evagrius Scholasticus state that the reputed remains of Ignatius were moved by the Emperor Theodosius II to the Tychaeum, or Temple of Tyche, which had been converted into a church dedicated to Ignatius. In 637 the relics were transferred to the Basilica di San Clemente in Rome. The Martyrium Ignatii There is a purported eye-witness account of his martyrdom, named the Martyrium Ignatii. It is presented as being an eye-witness account for the church of Antioch, attributed to Ignatius' companions, Philo of Cilicia, deacon at Tarsus, and Rheus Agathopus, a Syrian. Its most reliable manuscript is the 10th-century Codex Colbertinus (Paris), in which the Martyrium closes the collection. The Martyrium presents the confrontation of the bishop Ignatius with Trajan at Antioch, a familiar trope of Acta of the martyrs, and many details of the long, partly overland voyage to Rome. The Synaxarium of the Coptic Orthodox Church of Alexandria says that he was thrown to the wild beasts that devoured him and rent him to pieces. Epistles The following seven epistles preserved under the name of Ignatius are generally considered authentic, since they were mentioned by the historian Eusebius in the first half of the fourth century. Seven original epistles: The Epistle to the Ephesians, The Epistle to the Magnesians, The Epistle to the Trallians, The Epistle to the Romans, The Epistle to the Philadelphians, The Epistle to the Smyrnaeans, The Epistle to Polycarp, a bishop of Smyrna. Recensions The text of these epistles is known in three different recensions, or editions: the Short Recension, found in a Syriac manuscript; the Middle Recension, found only in Greek manuscripts; and the Long Recension, found in Greek and Latin manuscripts. For some time, it was believed that the Long Recension was the only extant version of the Ignatian epistles, but around 1628 a Latin translation of the Middle Recension was discovered by Archbishop James Ussher, who published it in 1646. For around a quarter of a century after this, it was debated which recension represented the original text of the epistles. But ever since John Pearson's strong defense of the authenticity of the Middle Recension in the late 17th century, there has been a scholarly consensus that the Middle Recension is the original version of the text. The Long Recension is the product of a fourth-century Arian Christian, who interpolated the Middle Recension epistles in order posthumously to enlist Ignatius as an unwitting witness in theological disputes of that age. This individual also forged the six spurious epistles attributed to Ignatius (see below). Manuscripts representing the Short Recension of the Ignatian epistles were discovered and published by William Cureton in the mid-19th century. For a brief period, there was a scholarly debate on the question of whether the Short Recension was earlier and more original than the Middle Recension. But by the end of the 19th century, Theodor Zahn and J. B. Lightfoot had established a scholarly consensus that the Short Recension is merely a summary of the text of the Middle Recension, and was therefore composed later. Authenticity Ever since the Protestant Reformation in the 16th century, the authenticity of all the Ignatian epistles has come under intense scrutiny. John Calvin called the epistles "rubbish published under Ignatius’ name." Some Protestants have tended to want to deny the authenticity of all the epistles attributed to Ignatius because they seem to attest to the existence of a monarchical episcopate in the second century. The Roman Catholic Church has long held up the authenticity of the letters from past to present. In 1886, Presbyterian minister and church historian William Dool Killen published an essay extensively arguing that none of the epistles attributed to Ignatius is authentic. Instead, he argued that Callixtus, bishop of Rome, forged the letters around AD 220 to garner support for a monarchical episcopate, modeling the renowned Saint Ignatius after his own life to give precedent for his own authority. Killen contrasted this episcopal polity with the presbyterian polity in the writings of Polycarp. Some doubts about the authenticity of the original letters continued into the 20th century. In the late 1970s and 1980s, the scholars Robert Joly, Reinhard Hübner, Markus Vinzent, and Thomas Lechner argued forcefully that the epistles of the Middle Recension were forgeries written during the reign of Marcus Aurelius (161–180 AD). Around the same time, the scholar Joseph Ruis-Camps published a study arguing that the Middle Recension letters were pseudepigraphically composed based on an original, smaller, authentic corpus of four letters (Romans, Magnesians, Trallians, and Ephesians). In 2009, Otto Zwierlein took up the thesis of a fake, made around 170. These publications stirred up tremendous, heated controversy in the scholarly community at the time, but in 2017, most religious scholars accepted the authenticity of the seven original epistles. However, J. Lookadoo said in 2020 that "the debate has received renewed energy since the late 1990s and shows few signs of slowing." The original texts of six of the seven original letters are found in the Codex Mediceo Laurentianus written in Greek in the 11th century (which also contains the pseudepigraphical letters of the Long Recension, except that to the Philippians), while the letter to the Romans is found in the Codex Colbertinus. Style and structure Ignatius's letters bear signs of being written in great haste and without a proper plan, such as run-on sentences and an unsystematic succession of thought. Ignatius modelled his writings after those allegedly written by Paul, Peter, and John, and even quoted or paraphrased biblical entries by these apostles' works freely, such as when he quoted 1 Corinthians 1:18, in his letter to the Ephesians: Theology Christology Ignatius is known to have taught the deity of Christ: The same section in text of the Long Recension says the following: He stressed the value of the Eucharist, calling it a "medicine of immortality" (Ignatius to the Ephesians 20:2). The very strong desire for bloody martyrdom in the arena, which Ignatius expresses rather graphically in places, may seem quite odd to the modern reader. An examination of his theology of soteriology shows that he regarded salvation as one being free from the powerful fear of death and thus to face martyrdom bravely. Ignatius is claimed to be the first known Christian writer to argue in favor of Christianity's replacement of the Sabbath with the Lord's Day: This pasaste has provoked textual debate since the only Greek manuscript extant read Κατα κυριακήν ζωήν ζωντες which could be translated "living according to the Lord's life." Most scholar, however, have followed the Latin text (secundum dominicam) omitting ζωήν and translating "living according to Lord's Day". Ecclesiology Ignatius is the earliest known Christian writer to emphasize loyalty to a single bishop in each city (or diocese) who is assisted by both presbyters (priests) and deacons. Earlier writings only mention bishops presbyters. For instance, his writings on bishops, presbyters and deacons: He is also responsible for the first known use of the Greek word katholikos (καθολικός), or Catholic, meaning "universal", "complete" and "whole" to describe the Church, writing: Joseph Lightfoot states the word "catholic (καθόλου)" simply means "universal" and can be found not only before and after Ignatius amongst ecclesiastical and classical writers, but centuries before the Christian era. It is from the word katholikos ("according to the whole") that the word catholic comes. When Ignatius wrote the Letter to the Smyrnaeans in about the year 107 and used the word catholic, he used it as if it were a word already in use to describe the Church. This has led many scholars to conclude that the appellation Catholic Church with its ecclesial connotation may have been in use as early as the last quarter of the first century. On the Eucharist, he wrote in his letter to the Smyrnaeans: In his letter addressed to the Christians of Rome, he entreats to do nothing to prevent his martyrdom. Parallels with Peregrinus Proteus Several scholars have noted that there are striking similarities between Ignatius and the Christian-turned-Cynic philosopher Peregrinus Proteus, as described in Lucian's famous satire The Passing of Peregrinus: Both Ignatius and Peregrinus show a morbid eagerness to die. Both characters are, or have been, Christians. Both are imprisoned by Roman authorities. Upon the arrest of both prisoners, Christians from all over Asia Minor come to visit them and bring them gifts (cf. Peregr. 12–13). Both prisoners sent letters to several Greek cities shortly before their deaths as "testaments, counsels, and laws", appointing "couriers" and "ambassadors" for the purpose. It is generally believed that these parallels are the result of Lucian intentionally copying traits from Ignatius and applying them to his satire of Peregrinus. If the dependence of Lucian on the Ignatian epistles is accepted, then this places an upper limit on the date of the epistles: around the 160s AD, just before The Passing of Peregrinus was written. In 1892, Daniel Völter sought to explain the parallels by proposing that the Ignatian epistles were in fact written by Peregrinus, and later edited to conceal their provenance, but this speculative theory has failed to make a significant impact on the academic community. Pseudo-Ignatius Epistles attributed to Saint Ignatius but of spurious origin (their author is often called Pseudo-Ignatius in English) include: Epistle to the Tarsians Epistle to the Antiochians Epistle to Hero, a Deacon of Antioch Epistle to the Philippians The Epistle of Maria the Proselyte to Ignatius Epistle to Mary at Neapolis, Zarbus First Epistle to St. John Second Epistle to St. John The Epistle of Ignatius to the Virgin Mary See also Apostolic succession Christianity in the 1st century Christianity in the 2nd century Early centers of Christianity List of Patriarchs of Antioch Saint Ignatius of Antioch, patron saint archive Apostolic Fathers Catholicity References Citations Sources Holy Letters and Syllables, the function and character of Scripture Authority in the writings of St Ignatius (Contains biography of Ignatius as well. Doctoral thesis University of the Orange Free State 1997, Dutch, pdf) Further reading External links Early Christian writings: On-line texts of St. Ignatius' letters (archived) (non-archived link) The Ecclesiology of St. Ignatius of Antioch by Fr. John S. Romanides Saint Ignatius Opera Omnia by J.-P. Migne, Patrologia Graeca with analytical indexes Catholic Encyclopedia: Spurious Epistles of St. Ignatius of Antioch Ignatius writings in the Ante-Nicene Fathers Greek text of Ignatius writings 2012 Translation & Audio Version (Authentic Seven Letters and Martyrdom of Ignatius) Saint Ignatius of Antioch at the Christian Iconography web site Here Followeth the Life of St. Ignatius, Bishop from Caxton's translation of the Golden Legend Colonnade Statue in St Peter's Square 30s births 100s deaths Converts to Christianity from pagan religions Church Fathers Patriarchs of Antioch Saints from Roman Syria 1st-century archbishops Syrian archbishops 2nd-century archbishops 2nd-century Christian theologians 2nd-century Christian martyrs People executed by the Roman Empire 2nd-century executions Burials at San Clemente al Laterano Anglican saints
[ -0.38702109456062317, 0.39003056287765503, -0.818170964717865, 0.023280685767531395, -0.4987822473049164, 1.113745093345642, 0.751854419708252, -0.289951890707016, -0.3414157032966614, -0.33272525668144226, 0.07255533337593079, -0.1916389912366867, -0.7212350368499756, -0.6664705276489258,...
15437
https://en.wikipedia.org/wiki/ITU%20prefix
ITU prefix
The International Telecommunication Union (ITU) allocates call sign prefixes for radio and television stations of all types. They also form the basis for, but may not exactly match, aircraft registration identifiers. These prefixes are agreed upon internationally, and are a form of country code. A call sign can be any number of letters and numerals but each country must only use call signs that begin with the characters allocated for use in that country. With regard to the second and/or third letters in the prefixes in the list below, if the country in question is allocated all callsigns with A to Z in that position, then that country can also use call signs with the digits 0 to 9 in that position. For example, the United States is assigned KA–KZ, and therefore can also use prefixes like KW0 or K1. While ITU prefix rules are adhered to in the context of international broadcasting, including amateur radio, it is rarer for countries to assign broadcast call signs to conventional AM, FM, and television stations with purely domestic reach; the United States, Canada, Mexico, Japan, South Korea, and the Philippines are among those that do. Canada presents one notable exception to the ITU prefix rules: it uses CB for its own Canadian Broadcasting Corporation stations, whereas Chile is officially assigned the CB prefix. Department of Industry's broadcasting rules indicate this is through a "special arrangement", without elaborating. In any case, the two countries are geographically separate enough to prevent confusion; Canada's shortwave broadcasters and amateur radio stations have always used one of its assigned ITU prefixes. Unallocated and unavailable call sign prefixes Unallocated: The following call sign prefixes are available for future allocation by the ITU. (x represents any letter; n represents any digit from 2–9.) E8, E9, H5, J9, On, S4, T9*, Un, V9, Xn, YZ*, Z4–Z7, Z9, 4N*. (* Indicates a prefix that has recently been returned to the ITU.) Unavailable: Under present ITU guidelines the following call sign prefixes shall not be allocated. They are sometimes used unofficially – such as amateur radio operators operating in a disputed territory or in a nation state that has no official prefix (e.g. S0 in Western Sahara, station 1A0 at Knights of Malta headquarters in Rome, or station 1L in Liberland). (x represents any letter; n represents any digit from 2–9.) nn, x0, x1, 0x, 1x, Qx. no prefixes beginning with Q are used—they may be confused with Q codes. Note that this applies to prefixes only - suffixes are the responsibility of the allocating country. no prefixes with the digits 1 or 0 are used—they may be confused with the letters I or O. two digit prefixes (nn) are not as yet considered by the ITU. Allocation table See also Call-sign allocation plan Non-ITU prefix Amateur radio call signs Aircraft registration Notes References External links ITU table of international callsigns Call signs Amateur radio call signs
[ 0.4616744816303253, 0.4325522780418396, -0.07980785518884659, 0.3115168809890747, -0.280463844537735, 0.3825085461139679, -0.190962553024292, -0.07823891937732697, -0.29599815607070923, -0.46743807196617126, -0.40450552105903625, 0.23106138408184052, -0.08164434134960175, 0.285826504230499...