sentence1 stringlengths 1 133k | sentence2 stringlengths 1 131k |
|---|---|
Subtitles may also refer to: Subtitle (titling), an explanatory or alternate title of a book or other work Subtitle (rapper) (Giovanni Marks, born 1978), an American rapper and producer "Subtitle", a song by The Charlatans | or Subtitles may also refer to: Subtitle (titling), an explanatory or alternate title of a book or other work Subtitle (rapper) (Giovanni Marks, born 1978), an American rapper and producer "Subtitle", a song by The Charlatans |
joint failure at relatively low temperatures. A high-power part pre-tinned with an alloy of lead can therefore desolder under load when soldered with a bismuth-containing solder. Such joints are also prone to cracking. Alloys with more than 47% Bi expand upon cooling, which may be used to offset thermal expansion mismatch stresses. Retards growth of tin whiskers. Relatively expensive, limited availability. Copper improves resistance to thermal cycle fatigue, and improves wetting properties of the molten solder. It also slows down the rate of dissolution of copper from the board and part leads in the liquid solder. Copper in solders forms intermetallic compounds. Supersaturated (by about 1%) solution of copper in tin may be employed to inhibit dissolution of thin-film under-bump metallization of BGA chips, e.g. as . Nickel can be added to the solder alloy to form a supersaturated solution to inhibit dissolution of thin-film under-bump metallization. In tin-copper alloys, small addition of Ni (<0.5 wt%) inhibits the formation of voids and interdiffusion of Cu and Sn elements. Inhibits copper dissolution, even more in synergy with bismuth. Nickel presence stabilizes the copper-tin intermetallics, inhibits growth of pro-eutectic β-tin dendrites (and therefore increases fluidity near the melting point of copper-tin eutectic), promotes shiny bright surface after solidification, inhibits surface cracking at cooling; such alloys are called "nickel-modified" or "nickel-stabilized". Small amounts increase melt fluidity, most at 0.06%. Suboptimal amounts may be used to avoid patent issues. Fluidity reduction increase hole filling and mitigates bridging and icicles. Cobalt is used instead of nickel to avoid patent issues in improving fluidity. Does not stabilize intermetallic growths in solid alloy. Indium lowers the melting point and improves ductility. In presence of lead it forms a ternary compound that undergoes phase change at 114 °C. Very high cost (several times of silver), low availability. Easily oxidizes, which causes problems for repairs and reworks, especially when oxide-removing flux cannot be used, e.g. during GaAs die attachment. Indium alloys are used for cryogenic applications, and for soldering gold as gold dissolves in indium much less than in tin. Indium can also solder many nonmetals (e.g. glass, mica, alumina, magnesia, titania, zirconia, porcelain, brick, concrete, and marble). Prone to diffusion into semiconductors and cause undesired doping. At elevated temperatures easily diffuses through metals. Low vapor pressure, suitable for use in vacuum systems. Forms brittle intermetallics with gold; indium-rich solders on thick gold are unreliable. Indium-based solders are prone to corrosion, especially in presence of chloride ions. Lead is inexpensive and has suitable properties. Worse wetting than tin. Toxic, being phased out. Retards growth of tin whiskers, inhibits tin pest. Lowers solubility of copper and other metals in tin. Silver provides mechanical strength, but has worse ductility than lead. In absence of lead, it improves resistance to fatigue from thermal cycles. Using SnAg solders with HASL-SnPb-coated leads forms phase with melting point at 179 °C, which moves to the board-solder interface, solidifies last, and separates from the board. Addition of silver to tin significantly lowers solubility of silver coatings in the tin phase. In eutectic tin-silver (3.5% Ag) alloy and similar alloys (e.g. SAC305) it tends to form platelets of , which, if formed near a high-stress spot, may serve as initiating sites for cracks and cause poor shock and drop performance; silver content needs to be kept below 3% to inhibit such problems. High ion mobility, tends to migrate and form short circuits at high humidity under DC bias. Promotes corrosion of solder pots, increases dross formation. Tin is the usual main structural metal of the alloy. It has good strength and wetting. On its own it is prone to tin pest, tin cry, and growth of tin whiskers. Readily dissolves silver, gold and to less but still significant extent many other metals, e.g. copper; this is a particular concern for tin-rich alloys with higher melting points and reflow temperatures. Zinc lowers the melting point and is low-cost. However it is highly susceptible to corrosion and oxidation in air, therefore zinc-containing alloys are unsuitable for some purposes, e.g. wave soldering, and zinc-containing solder pastes have shorter shelf life than zinc-free. Can form brittle Cu-Zn intermetallic layers in contact with copper. Readily oxidizes which impairs wetting, requires a suitable flux. Germanium in tin-based lead-free solders influences formation of oxides; at below 0.002% it increases formation of oxides. Optimal concentration for suppressing oxidation is at 0.005%. Used in e.g. Sn100C alloy. Patented. Rare-earth elements, when added in small amounts, refine the matrix structure in tin-copper alloys by segregating impurities at the grain boundaries. However, excessive addition results in the formation of tin whiskers; it also results in spurious rare earth phases, which easily oxidize and deteriorate the solder properties. Phosphorus is used as antioxidant to inhibit dross formation. Decreases fluidity of tin-copper alloys. Impurities Impurities usually enter the solder reservoir by dissolving the metals present in the assemblies being soldered. Dissolving of process equipment is not common as the materials are usually chosen to be insoluble in solder. Aluminium – little solubility, causes sluggishness of solder and dull gritty appearance due to formation of oxides. Addition of antimony to solders forms Al-Sb intermetallics that are segregated into dross. Promotes embrittlement. Antimony – added intentionally, up to 0.3% improves wetting, larger amounts slowly degrade wetting. Increases melting point. Arsenic – forms thin intermetallics with adverse effects on mechanical properties, causes dewetting of brass surfaces Cadmium – causes sluggishness of solder, forms oxides and tarnishes Copper – most common contaminant, forms needle-shaped intermetallics, causes sluggishness of solders, grittiness of alloys, decreased wetting Gold – easily dissolves, forms brittle intermetallics, contamination above 0.5% causes sluggishness and decreases wetting. Lowers melting point of tin-based solders. Higher-tin alloys can absorb more gold without embrittlement. Iron – forms intermetallics, causes grittiness, but rate of dissolution is very low; readily dissolves in lead-tin above 427 °C. Lead – causes Restriction of Hazardous Substances Directive compliance problems at above 0.1%. Nickel – causes grittiness, very little solubility in Sn-Pb Phosphorus – forms tin and lead phosphides, causes grittiness and dewetting, present in electroless nickel plating Silver – often added intentionally, in high amounts forms intermetallics that cause grittiness and formation of pimples on the solder surface, potential for embrittlement Sulfur – forms lead and tin sulfides, causes dewetting Zinc – in melt forms excessive dross, in solidified joints rapidly oxidizes on the surface; zinc oxide is insoluble in fluxes, impairing repairability; copper and nickel barrier layers may be needed when soldering brass to prevent zinc migration to the surface; potential for embrittlement Board finishes vs wave soldering bath impurities buildup: HASL, lead-free (Hot Air Level): usually virtually pure tin. Does not contaminate high-tin baths. HASL, leaded: some lead dissolves into the bath ENIG (Electroless Nickel Immersion Gold): typically 100-200 microinches of nickel with 3-5 microinches of gold on top. Some gold dissolves into the bath, but limits exceeding buildup is rare. Immersion silver: typically 10–15 microinches of silver. Some dissolves into the bath, limits exceeding buildup is rare. Immersion tin: does not contaminate high-tin baths. OSP (Organic solderability preservative): usually imidazole-class compounds forming a thin layer on the copper surface. Copper readily dissolves in high-tin baths. Flux Flux | popular lead-free solder alloy family is based on the reduced melting point of the Sn-Ag-Cu ternary eutectic behavior (), which is below the 22/78 Sn-Ag (wt.%) eutectic of and the 59/41 Sn-Cu eutectic of . The ternary eutectic behavior of Sn-Ag-Cu and its application for electronics assembly was discovered (and patented) by a team of researchers from Ames Laboratory, Iowa State University, and from Sandia National Laboratories-Albuquerque. Much recent research has focused on the addition of a fourth element to Sn-Ag-Cu solder, in order to provide compatibility for the reduced cooling rate of solder sphere reflow for assembly of ball grid arrays. Examples of these four-element compositions are 18/64/14/4 tin-silver-copper-zinc (Sn-Ag-Cu-Zn) (melting range 217–220 °C) and 18/64/16/2 tin-silver-copper-manganese (Sn-Ag-Cu-Mn; melting range of 211–215 °C). Tin-based solders readily dissolve gold, forming brittle intermetallic joins; for Sn-Pb alloys the critical concentration of gold to embrittle the joint is about 4%. Indium-rich solders (usually indium-lead) are more suitable for soldering thicker gold layer as the dissolution rate of gold in indium is much slower. Tin-rich solders also readily dissolve silver; for soldering silver metallization or surfaces, alloys with addition of silvers are suitable; tin-free alloys are also a choice, though their wettability is poorer. If the soldering time is long enough to form the intermetallics, the tin surface of a joint soldered to gold is very dull. Hard solder Hard solders are used for brazing, and melt at higher temperatures. Alloys of copper with either zinc or silver are the most common. In silversmithing or jewelry making, special hard solders are used that will pass assay. They contain a high proportion of the metal being soldered and lead is not used in these alloys. These solders vary in hardness, designated as "enameling", "hard", "medium" and "easy". Enameling solder has a high melting point, close to that of the material itself, to prevent the joint desoldering during firing in the enameling process. The remaining solder types are used in decreasing order of hardness during the process of making an item, to prevent a previously soldered seam or joint desoldering while additional sites are soldered. Easy solder is also often used for repair work for the same reason. Flux is also used to prevent joints from desoldering. Silver solder is also used in manufacturing to join metal parts that cannot be welded. The alloys used for these purposes contain a high proportion of silver (up to 40%), and may also contain cadmium. Alloys Different elements serve different roles in the solder alloy: Antimony is added to increase strength without affecting wettability. Prevents tin pest. Should be avoided on zinc, cadmium, or galvanized metals as the resulting joint is brittle. Bismuth significantly lowers the melting point and improves wettability. In presence of sufficient lead and tin, bismuth forms crystals of with melting point of only 95 °C, which diffuses along the grain boundaries and may cause a joint failure at relatively low temperatures. A high-power part pre-tinned with an alloy of lead can therefore desolder under load when soldered with a bismuth-containing solder. Such joints are also prone to cracking. Alloys with more than 47% Bi expand upon cooling, which may be used to offset thermal expansion mismatch stresses. Retards growth of tin whiskers. Relatively expensive, limited availability. Copper improves resistance to thermal cycle fatigue, and improves wetting properties of the molten solder. It also slows down the rate of dissolution of copper from the board and part leads in the liquid solder. Copper in solders forms intermetallic compounds. Supersaturated (by about 1%) solution of copper in tin may be employed to inhibit dissolution of thin-film under-bump metallization of BGA chips, e.g. as . Nickel can be added to the solder alloy to form a supersaturated solution to inhibit dissolution of thin-film under-bump metallization. In tin-copper alloys, small addition of Ni (<0.5 wt%) inhibits the formation of voids and interdiffusion of Cu and Sn elements. Inhibits copper dissolution, even more in synergy with bismuth. Nickel presence stabilizes the copper-tin intermetallics, inhibits growth of pro-eutectic β-tin dendrites (and therefore increases fluidity near the melting point of copper-tin eutectic), promotes shiny bright surface after solidification, inhibits surface cracking at cooling; such alloys are called "nickel-modified" or "nickel-stabilized". Small amounts increase melt fluidity, most at 0.06%. Suboptimal amounts may be used to avoid patent issues. Fluidity reduction increase hole filling and mitigates bridging and icicles. Cobalt is used instead of nickel to avoid patent issues in improving fluidity. Does not stabilize intermetallic growths in solid alloy. Indium lowers the melting point and improves ductility. In presence of lead it forms a ternary compound that undergoes phase change at 114 °C. Very high cost (several times of silver), low availability. Easily oxidizes, which causes problems for repairs and reworks, especially when oxide-removing flux cannot be used, e.g. during GaAs die attachment. Indium alloys are used for cryogenic applications, and for soldering gold as gold dissolves in indium much less than in tin. Indium can also solder many nonmetals (e.g. glass, mica, alumina, magnesia, titania, zirconia, porcelain, brick, concrete, and marble). Prone to diffusion into semiconductors and cause undesired doping. At elevated temperatures easily diffuses through metals. Low vapor pressure, suitable for use in vacuum systems. Forms brittle intermetallics with gold; indium-rich solders on thick gold are unreliable. Indium-based solders are prone to corrosion, especially in presence of chloride ions. Lead is inexpensive and has suitable properties. Worse wetting than tin. Toxic, being phased out. Retards growth of tin whiskers, inhibits tin pest. Lowers solubility of copper and other metals in tin. Silver provides mechanical strength, but has worse ductility than lead. In absence of lead, it improves resistance to fatigue from thermal cycles. Using SnAg solders with HASL-SnPb-coated leads forms phase with melting point at 179 °C, which moves to the board-solder interface, solidifies last, and separates from the board. Addition of silver to tin significantly lowers solubility of silver coatings in the tin phase. In eutectic tin-silver (3.5% Ag) alloy and similar alloys (e.g. SAC305) it tends to form platelets of , which, if formed near a high-stress spot, may serve as initiating sites for cracks and cause poor shock and drop performance; silver content needs to be kept below 3% to inhibit such problems. High ion mobility, tends to migrate and form short circuits at high humidity under DC bias. Promotes corrosion of solder pots, increases dross formation. Tin is the usual main structural metal of the alloy. It has good strength and wetting. On its own it is prone to tin pest, tin cry, and growth of tin whiskers. Readily dissolves silver, gold and to less but still significant extent many other metals, e.g. copper; this is a |
Southern Court surrendered to the Northern Court and the authority of the bakufu. Following the Onin War the power of the Ashikaga Shoguns slowly dwindled and with the start of the Sengoku period were reduced to puppets of various warlords, until ultimately the last Muromachi Shogun, Ashikaga Yoshiaki was deposed in 1573. Azuchi–Momoyama period (1573–1600) With the end of the Ashikaga bakufu Oda Nobunaga and his successor, Toyotomi Hideyoshi, rose to power, governing using the court titles of Imperial Regent and gaining far greater power than any of their predecessors in those offices had. Hideyoshi is considered by many historians to be among Japan's greatest rulers, yet neither man was ever formally granted the title of Shogun. Tokugawa shogunate (1600–1868) After Hideyoshi's death following the failed invasion of Korea, Tokugawa Ieyasu seized power with the victory at the Battle of Sekigahara and established a shogunate government at Edo (now known as Tokyo) in 1600. He received the title sei-i taishōgun in 1603, after he forged a family tree to show he was of Minamoto descent. The Tokugawa shogunate lasted until 1867, when Tokugawa Yoshinobu resigned as shogun and abdicated his authority to Emperor Meiji. Ieyasu set a precedent in 1605 when he retired as shogun in favour of his son Tokugawa Hidetada, though he maintained power from behind the scenes as (, cloistered shogun). During the Edo period, effective power rested with the Tokugawa shogun, not the Emperor in Kyoto, even though the former ostensibly owed his position to the latter. The shogun controlled foreign policy, the military, and feudal patronage. The role of the Emperor was ceremonial, similar to the position of the Japanese monarchy after the Second World War. The Honjō Masamune was inherited by successive shoguns and it represented the Tokugawa shogunate. It was crafted by swordsmith Masamune (1264–1343) and recognized as one of the finest Japanese swords in history. After World War 2, in December 1945, Tokugawa Iemasa gave the sword to a police station at Mejiro and it went missing. Timelines Timeline of the Kamakura shogunate Timeline of the Ashikaga shogunate Timeline of the Tokugawa shogunate Shogunate The term originally meant the dwelling and household of a shogun, but in time, became a metonym for the system of government dominated by a feudal military dictatorship, exercised in the name of the shogun or by the shogun himself. Therefore, various bakufu held absolute power over the country (territory ruled at that time) without pause from 1192 to 1867, glossing over actual power, clan and title transfers. The shogunate system was originally established under the Kamakura shogunate by Minamoto no Yoritomo after the Genpei War, although theoretically the state (and therefore the Emperor) still held de jure ownership of all land in Japan. The system had some feudal elements, with lesser territorial lords pledging their allegiance to greater ones. Samurai were rewarded for their loyalty with agricultural surplus, usually rice, or labor services from peasants. In contrast to European feudal knights, samurai were not landowners. The hierarchy that held this system of government together was reinforced by close ties of loyalty between the daimyōs, samurai and their subordinates. Each shogunate was dynamic, not static. Power was constantly shifting and authority was often ambiguous. The study of the ebbs and flows in this complex history continues to occupy the attention of scholars. Each shogunate encountered competition. Sources of competition included the Emperor and the court aristocracy, the remnants of the imperial governmental systems, the daimyōs, the shōen system, the great temples and shrines, the sōhei, the shugo and jitō, the jizamurai and early modern daimyō. Each shogunate reflected the necessity of new ways of balancing the changing requirements of central and regional authorities. Relationship with the emperor Since Minamoto no Yoritomo turned the figure of the shogun into a permanent and hereditary position and until the Meiji Restoration there were two ruling classes in Japan: 1. the emperor or , who acted as "chief priest" of the official religion of the country, Shinto, and 2. the shogun, head of the army who also enjoyed civil, military, diplomatic and judicial authority. Although in theory the shogun was an emperor's servant, it became the true power behind the throne. No shogun tried to usurp the throne, even when they had at their disposal the military power of the territory. There were two reasons primarily: Theoretically the shogun received the power of the emperor, so this was his symbol of authority. There was a sentimentalist tradition created by priests and religious who traced the imperial line from the "age of the gods" into an "eternal line unbroken by the times." According to Japanese mythology, the emperor was a direct descendant of Amaterasu, goddess of the sun. Unable to usurp the throne, the shoguns sought throughout history to keep the emperor away from the country's political activity, relegating them from the sphere of influence. One of the few powers that the imperial house could retain was that of being able to "control time" through the designation of the Japanese Nengō or Eras and the issuance of calendars. This is a highlight of two historical attempts of the emperor to recover the power they enjoyed before the establishment of the shogunate. In 1219 the Emperor Go-Toba accused the Hōjō as outlaws. Imperial troops mobilized, leading to the Jōkyū War (1219–1221), which would culminate in the third Battle of Uji (1221). During this, the imperial troops were defeated and the emperor Go-Toba was exiled. With the defeat of Go-Toba, the samurai government over the country was confirmed. At the beginning of the fourteenth century the Emperor Go-Daigo decided to rebel, but the Hōjō, who were then regents, sent an army from Kamakura. The emperor fled before the troops arrived and took the imperial insignia. The shogun named his own emperor, giving rise to the era . During the 1850s and 1860s, the shogunate was severely pressured both abroad and by foreign powers. It was then that various groups angry with the shogunate for the concessions made to the various European countries found in the figure of the emperor an ally through which they could expel the Tokugawa shogunate from power. The motto of this movement was and they finally succeeded in 1868, when imperial power was restored after centuries of being in the shadow of the country's political life. Legacy Upon Japan's surrender after World War II, American Army General Douglas MacArthur became Japan's de facto ruler during the years of occupation. So great was his influence in Japan that he has been dubbed the . Today, the head of the Japanese government is the Prime Minister; the usage of the term "shogun" has nevertheless continued in colloquialisms. A retired Prime Minister who still wields considerable power and influence behind the scenes is called a , a sort of modern incarnation of the cloistered rule. Examples of "shadow shoguns" are former Prime Minister Kakuei Tanaka and the politician Ichirō Ozawa. See also Commander-in-chief Feudalism Kantō kubō History of Japan List of shoguns References Bibliography Adolphson, Mikael; Edward Kamens, Stacie Matsumoto (2007). Heian Japan: Centers and Peripheries. University of Hawaii Press. . Friday, Karl (2007). The First Samurai: The Life and Legend of the Warrior Rebel, Taira Masakado. John Wiley and Sons. . Hall, John Whitney; James L. McClain, Marius B. Jansen (1991). The Cambridge History of Japan. Cambridge University Press. . Iwao, Seiichi; Teizō Iyanaga, Maison franco-japonaise Tōkyō, Susumu Ishii, Shōichirō Yoshida (2002). Maisonneuve & Larose. . Cranston, Edwin (1998). A Waka Anthology: Volume One: The Gem-Glistening Cup. Stanford University Press. . Sansom, George Bailey (1931). Japan: A Short Cultural History. Stanford University Press. . Takekoshi, Yosaburō (2004). The Economic Aspects of the History of the Civilization of Japan. Taylor & Francis. . Shively, Donald; John Whitney Hall, William H. McCullough | Meiji. Ieyasu set a precedent in 1605 when he retired as shogun in favour of his son Tokugawa Hidetada, though he maintained power from behind the scenes as (, cloistered shogun). During the Edo period, effective power rested with the Tokugawa shogun, not the Emperor in Kyoto, even though the former ostensibly owed his position to the latter. The shogun controlled foreign policy, the military, and feudal patronage. The role of the Emperor was ceremonial, similar to the position of the Japanese monarchy after the Second World War. The Honjō Masamune was inherited by successive shoguns and it represented the Tokugawa shogunate. It was crafted by swordsmith Masamune (1264–1343) and recognized as one of the finest Japanese swords in history. After World War 2, in December 1945, Tokugawa Iemasa gave the sword to a police station at Mejiro and it went missing. Timelines Timeline of the Kamakura shogunate Timeline of the Ashikaga shogunate Timeline of the Tokugawa shogunate Shogunate The term originally meant the dwelling and household of a shogun, but in time, became a metonym for the system of government dominated by a feudal military dictatorship, exercised in the name of the shogun or by the shogun himself. Therefore, various bakufu held absolute power over the country (territory ruled at that time) without pause from 1192 to 1867, glossing over actual power, clan and title transfers. The shogunate system was originally established under the Kamakura shogunate by Minamoto no Yoritomo after the Genpei War, although theoretically the state (and therefore the Emperor) still held de jure ownership of all land in Japan. The system had some feudal elements, with lesser territorial lords pledging their allegiance to greater ones. Samurai were rewarded for their loyalty with agricultural surplus, usually rice, or labor services from peasants. In contrast to European feudal knights, samurai were not landowners. The hierarchy that held this system of government together was reinforced by close ties of loyalty between the daimyōs, samurai and their subordinates. Each shogunate was dynamic, not static. Power was constantly shifting and authority was often ambiguous. The study of the ebbs and flows in this complex history continues to occupy the attention of scholars. Each shogunate encountered competition. Sources of competition included the Emperor and the court aristocracy, the remnants of the imperial governmental systems, the daimyōs, the shōen system, the great temples and shrines, the sōhei, the shugo and jitō, the jizamurai and early modern daimyō. Each shogunate reflected the necessity of new ways of balancing the changing requirements of central and regional authorities. Relationship with the emperor Since Minamoto no Yoritomo turned the figure of the shogun into a permanent and hereditary position and until the Meiji Restoration there were two ruling classes in Japan: 1. the emperor or , who acted as "chief priest" of the official religion of the country, Shinto, and 2. the shogun, head of the army who also enjoyed civil, military, diplomatic and judicial authority. Although in theory the shogun was an emperor's servant, it became the true power behind the throne. No shogun tried to usurp the throne, even when they had at their disposal the military power of the territory. There were two reasons primarily: Theoretically the shogun received the power of the emperor, so this was his symbol of authority. There was a sentimentalist tradition created by priests and religious who traced the imperial line from the "age of the gods" into an "eternal line unbroken by the times." According to Japanese mythology, the emperor was a direct descendant of Amaterasu, goddess of the sun. Unable to usurp the throne, the shoguns sought throughout history to keep the emperor away from the country's political activity, relegating them from the sphere of influence. One of the few powers that the imperial house could retain was that of being able to "control time" through the designation of the Japanese Nengō or Eras and the issuance of calendars. This is a highlight of two historical attempts of the emperor to recover the power they enjoyed before the establishment of the shogunate. In 1219 the Emperor Go-Toba accused the Hōjō as outlaws. Imperial troops mobilized, leading to |
Models Unitary model Not all researchers agree that short-term and long-term memory are separate systems. The Unitary Model proposes that short-term memory consists of temporary activations of long term representation. Some theorists propose that memory is unitary over all time scales, from milliseconds to years. Support for the unitary memory hypothesis comes from the fact that it has been difficult to demarcate a clear boundary between short-term and long-term memory. For instance, Tarnow shows that the recall probability vs. latency curve is a straight line from 6 to 600 seconds (ten minutes), with the probability of failure to recall only saturating after 600 seconds. If there were really two different memory stores operating in this time frame, one could expect a discontinuity in this curve. Other research has shown that the detailed pattern of recall errors looks remarkably similar to recall of a list immediately after learning (it is presumed, from short-term memory) and recall after 24 hours (necessarily from long-term memory). Further evidence against the existence of a short-term memory store comes from experiments involving continual distractor tasks. In 1974, Robert Bjork and William B. Whitten presented subjects with word pairs to be remembered; however, before and after each word pair, subjects had to do a simple multiplication task for 12 seconds. After the final word-pair, subjects had to do the multiplication distractor task for 20 seconds. In their results, Bjork and Whitten found that the recency effect (the increased probability of recall of the last items studied) and the primacy effect (the increased probability of recall of the first few items) still remained. These results would seem inconsistent with the idea of short-term memory as the distractor items would have taken the place of some of the word-pairs in the buffer, thereby weakening the associated strength of the items in long-term memory. Bjork and Whitten hypothesized that these results could be attributed to the memory processes at work for long-term memory retrieval versus short-term memory retrieval. Ovid J. L. Tzeng (1973) also found an instance where the recency effect in free recall did not seem to result from the function of a short-term memory store. Subjects were presented with four study-test periods of 10 word lists, with a continual distractor task (20-second period of counting-backward). At the end of each list, participants had to free recall as many words from the list as possible. After free-recall of the fourth list, participants were asked to free recall items from all four lists. Both the initial free recall and the final free recall showed a recency effect. These results went against the predictions of a short-term memory model, where no recency effect would be expected in either initial or final free recall. Koppenaal and Glanzer (1990) attempted to explain these phenomena as a result of the subjects' adaptation to the distractor task, which therefore allowed them to preserve at least some of the functions of the short-term memory store. As evidence, they provided the results of their experiment, in which the long-term recency effect disappeared when the distractor after the last item differed from the distractors that preceded and followed all the other items (e.g., arithmetic distractor task and word reading distractor task). Thapar and Greene challenged this theory. In one of their experiments, participants were given a different distractor task after every item to be studied. According to Koppenaal's and Glanzer's theory, there should be no recency effect as subjects would not have had time to adapt to the distractor; yet such a recency effect remained in place in the experiment. Another explanation One proposed explanation of the existence of the recency effect in a continual distractor condition, and the disappearance of it in an end-only distractor task is the influence of contextual and distinctive processes. According to this model, recency is a result of the final items' processing context being similar to the processing context of the other items and the distinctive position of the final items versus items in the middle of the list. In the end distractor task, the processing context of the final items is no longer similar to the processing context of the other list items. At the same time, retrieval cues for these items are no longer as effective as without the distractor. Therefore, the recency effect recedes or vanishes. However, when distractor tasks are placed before and after each item, the recency effect returns, because all the list items once again have similar processing context. Biological basis Synaptic theory Various researchers have proposed that stimuli are coded in short-term memory using transmitter depletion. According to this hypothesis, a stimulus activates a spatial pattern of activity across neurons in a brain region. As these neurons fire, the available neurotransmitters in their store are depleted and this pattern of depletion is iconic, representing stimulus information and functions as a memory trace. The memory trace decays over time as a consequence of neurotransmitter reuptake mechanisms that restore neurotransmitters to the levels that existed prior to stimulus presentation. Relationship with working memory The relationship between short-term memory and working memory is described differently by various theories, but it is generally acknowledged that the two concepts are distinct. They both do not hold information for very long but short term memory simply stores information for a short while, while working memory retains the information in order to manipulate it. Short term memory is part of working memory, but that doesn’t make it the same thing. Working memory is a theoretical framework that refers to structures and processes used for temporarily storing and manipulating information. As such, working memory might also be referred to as working attention. Working memory and attention together play a major role in the processes of thinking. Short-term memory in general refers, in a theory-neutral manner, to the short-term storage of information, and it does not entail the manipulation or organization of material held in memory. | increasing work on spatial short-term memory. Duration The limited duration of short-term memory (~18 seconds without a form of memory rehearsal) quickly suggests that its contents spontaneously decay over time. The decay assumption is part of many theories of short-term memory, the most notable one being Baddeley's model of working memory. The decay assumption is usually paired with the idea of rapid covert rehearsal: In order to overcome the limitation of short-term memory, and retain information for longer, information must be periodically repeated or rehearsed—either by articulating it out loud or by mentally simulating such articulation. There is also another type of rehearsal that can also be used to improve short term memory is attention based rehearsal. The information is mentally searched in a particular sequence or list. The information is likely to re-enter the short-term store and be retained for a further period using either of these ways Several researchers; however, dispute that spontaneous decay plays any significant role in forgetting over the short-term, and the evidence is far from conclusive. Authors doubting that decay causes forgetting from short-term memory often offer as an alternative some form of interference: When several elements (such as digits, words, or pictures, or logos in general) are held in short-term memory simultaneously, their representations compete with each other for recall, or degrade each other. Thereby, new content gradually pushes out older content, unless the older content is actively protected against interference by rehearsal or by directing attention to it. Capacity Whatever the cause or causes of forgetting over the short-term may be, there is consensus that it severely limits the amount of new information that we can retain over brief periods of time. This limit is referred to as the finite capacity of short-term memory. The capacity of short-term memory is often called memory span, in reference to a common procedure of measuring it. In a memory span test, the experimenter presents lists of items (e.g. digits or words) of increasing length. An individual's span is determined as the longest list length that he or she can recall correctly in the given order on at least half of all trials. In an early and highly influential article, The Magical Number Seven, Plus or Minus Two, psychologist George Miller suggested that human short-term memory has a forward memory span of approximately seven items plus or minus two and that that was well known at the time (it seems to go back to the 19th-century researcher Wundt). More recent research has shown that this "magical number seven" is roughly accurate for college students recalling lists of digits, but memory span varies widely with populations tested and with material used. For example, the ability to recall words in order depends on a number of characteristics of these words: fewer words can be recalled when the words have longer spoken duration; this is known as the word-length effect, or when their speech sounds are similar to each other; this is called the phonological similarity effect. More words can be recalled when the words are highly familiar or occur frequently in the language. Recall performance is also better when all of the words in a list are taken from a single semantic category (such as games) than when the words are taken from different categories. A more up-to-date estimate of short-term memory capacity is about four pieces, or "chunks", of information. However other prominent theories of short-term memory capacity argue against measuring capacity in terms of a fixed number of elements. Rehearsal Rehearsal is the process where information is kept in short-term memory by mentally repeating it. When the information is repeated each time, that information is reentered into the short-term memory, thus keeping that information for another 10 to 20 seconds (the average storage time for short-term memory). Chunking Chunking is a process by which the memory can be used to remember things in the short term. Chunking is also a process by which a person organizes material into meaningful groups. Although the average person may retain only about four different units in short-term memory, chunking can greatly increase a person's recall capacity. For example, in recalling a phone number, the person could chunk the digits into three groups: first, the area code (such as 123), then a three-digit chunk (456), and, last, a four-digit chunk (7890). This method of remembering phone numbers is far more effective than attempting to remember a string of 10 digits. Practice and the usage of existing information in long-term memory can lead to additional improvements in one's ability to use chunking. In one testing session, an American cross-country runner was able to recall a string of 79 digits after hearing them only once by chunking them into different running times (e.g., the first four numbers were 1518, a three-mile time). Factors affecting Diseases that cause neurodegeneration, such as Alzheimer's disease, can also be a factor in a person's short-term and eventually long-term memory. Damage to certain sections of the brain due to this disease causes a shrinkage in the cerebral cortex, which impairs the ability to think and recall memories. Short term memory performance is majorly influenced by the nature of diet that one takes. More intake of blue berries has shown to improve short term memory after continuous use whereas alcohol decreases short term memory performance. Conditions Memory loss is a natural process in aging. Research has shown that short term memory capability tends to decrease with age. The short term memory tends to increase during adolescence and the decline appears to be constant and continuous at the beginning of twenties gradually till old age. One study investigated whether or not there were deficits in short-term memory in older adults. This was a previous study which compiled normative French data for three short-term memory tasks (verbal, visual and spatial). They found impairments present in participants between the ages of 55 and 85 years of age. Alzheimer's disease Memory distortion in Alzheimer's disease is a very common disorder found in older adults. Performance of patients with mild to moderate Alzheimer's disease was compared with the performance of age matched healthy adults. Researchers concluded the study with findings that showed reduced short-term memory recall for Alzheimer's patients. Episodic memory and semantic abilities deteriorate early in Alzheimer's disease. Since the cognitive system includes interconnected and reciprocally influenced neuronal networks, one study hypothesized that stimulation of lexical-semantic abilities may benefit semantically structured episodic memory. They found that with Lexical-Semantic stimulation treatment may improve episodic memory in Alzheimer's Disease patients. It could also be regarded as a clinical option to counteract the cognitive decline typical of the disease. Aphasia Aphasias are also seen in many elder adults. Semantic aphasia common among stroke patients lack the comprehension of words and objects in a flexible way. Many language-impaired patients make several complaints about short-term memory deficits, with several family members confirming that patients have trouble recalling previously known names and events. The opinion is supported by many studies showing that many aphasics also have trouble with visual-memory required tasks. Schizophrenia Core symptoms of schizophrenia patients have been linked to cognitive deficits. One neglected factor that contributes to those deficits is the comprehension of time. In this study, results confirm that cognitive dysfunctions are a major deficit in patients with schizophrenia. The study provided evidence that patients with schizophrenia process temporal information inefficiently. Advanced age Advanced age is associated with decrements in episodic memory. The associative deficit is in which age differences in recognition memory reflect difficulty in binding components of a memory episode and bound units. A previous study used mixed and blocked test designs to examine deficits in short-term memory of older adults and found there was an associative deficit for older adults. This study along with many other previous studies, continue to build evidence of deficits found in older adults short-term memory. Even when neurological diseases and disorders are not present, there is a progressive and gradual loss of some intellectual functions that become evident in later years. There are several tests used to examine the psychophysical characteristics of the elderly and of them, a well suitable test would be the functional reach (FR) test, and the mini–mental state examination (MMSE). The FR test is an index of the aptitude to maintain balance in an upright position and the MMSE test is a global |
uncertain in the interim). Notably, the Supreme Court of Virginia has always operated under discretionary review for nearly all cases, but from its creation in 1985, the intermediate Court of Appeals of Virginia heard appeals as a matter of right only in family and administrative cases. After two other states adopted appeals of right in the late 2000s, this left Virginia as the only state in the Union with no first appeal of right for the vast majority of civil and criminal cases. Appellants were still free to petition for review, but such petitions were subject to severe length constraints (6,125 words or 35 pages in Virginia) and necessarily were more narrowly targeted than a opening brief in an appeal of right to an intermediate appellate court (in contrast, an appellant's opening brief to a California intermediate appellate court can run up to 14,000 words). The vast majority of decisions of Virginia circuit courts in civil and criminal cases were thereby insulated from appellate review on the merits. In March 2021, Virginia enacted a comprehensive reform package allowing for appeals of right to the Court of Appeals in civil and criminal cases. The same bill expanded the Court of Appeals from 11 to 17 judges to handle the increased workload. Relationship with federal courts and federal law Under American federalism, a state supreme court's ruling on a matter of purely state law is final and binding and must be accepted in both state and federal courts. However, when a case involves federal statutory or constitutional law, review of state supreme court decisions may be sought by way of a petition for writ of certiorari to the Supreme Court of the United States. The U.S. Supreme Court is the only federal court that has jurisdiction over direct appeals from state court decisions, although other federal courts are sometimes allowed "collateral review" of state cases in specific situations, for example regarding individuals on death row. As the U.S. Supreme Court recognized in Erie Railroad Co. v. Tompkins (1938), no part of the federal Constitution actually grants federal courts or the federal Congress the power to directly dictate the content of state law (as distinguished from creating altogether separate federal law that in a particular situation may override state law). Clause 1 of Section 2 of Article Three of the United States Constitution describes the scope of federal judicial power, but only extended it to "the Laws of the United States" and not the laws of the several or individual states. It is this silence on that latter issue that gave rise to the American distinction between state and federal common law not found in other English-speaking common law federations like Australia and Canada. In theory, state supreme courts are bound by the precedent established by the U.S. Supreme Court as to all issues of federal law, but in practice, the Supreme Court reviews very few decisions from state courts. For example, in 2007 the Court reviewed 244 cases appealed from federal courts and only 22 from state courts. Despite the relatively small number of decisions reviewed, Professors Sara Benesh and Wendy Martinek found that state supreme courts follow precedent more closely than federal courts in the area of search and seizure and appear to follow precedent in confessions as well. Additionally, some scholars have argued that state and federal courts should judge according to different judicial theories on topics such as statutory interpretation and stare decisis. Selection State supreme court judges are selected in a variety of ways, with the method of selection often depending on the circumstances in which the seat is filled. Under one common method, the Missouri Plan, the governor fills judicial vacancies by choosing from a list compiled by a non-partisan commission. These judges serve an interim term until they stand in a retention election, in which they win a full term if a majority of voters vote for retention. Many other states elect judges through non-partisan elections in which multiple candidates appear on the ballot without their partisan affiliation listed. Most of the remaining states base their judicial selection system on gubernatorial appointments or partisan elections, although several states use a mix of different methods. South Carolina and Virginia use a system of legislative appointment, while in Vermont, the governor makes the initial appointment of judges, but the legislature has the power to re-appoint judges to new terms. Various other factors can influence the appointment and re-appointment of state supreme court judges. Most judicial selection systems involving gubernatorial appointment make use of a nominating commission to recommend a list of candidates from which the governor must choose, but a minority of states allow the governor to nominate candidates even if they were not recommended by the commission. Many of the states that use gubernatorial appointment require the appointment to be confirmed by the state legislature or some other body, such as the Massachusetts Governor's Council. Although most states limit judicial terms to a set number of years, judges in Massachusetts and New Hampshire serve until they reach a mandatory retirement limit, while in Rhode Island, judges serve lifetime appointments. Most judges represent the entire state, but in Illinois, Kentucky, Louisiana, and Mississippi, judges represent districts of the state. Many states, including some states in which the governor is not otherwise involved in the appointment process, allow the governor to make interim appointments to fill judicial vacancies. In many states with judicial elections, political contributions from groups such as trade associations and political action committees are allowed. Removal The various states provide different methods for the removal of state supreme court judges during their terms, with many states providing multiple methods. Two common methods of removal are impeachment by the state legislature, and removal by state judicial boards or commissions. Other states provide for the removal of judges through recall elections, court action, gubernatorial action (with legislative consent), or through a resolution passed by a super-majority in both houses of the state legislature. Location Traditionally, state supreme courts are headquartered in the capital cities of their respective states, though they may occasionally hold oral arguments elsewhere. The six main exceptions are: Alaska, whose supreme court is located in and usually sits in its largest city, Anchorage (monthly), but also sits in Fairbanks and the state capital Juneau (quarterly), and in other Alaskan communities on an as-needed basis. California, whose supreme court is headquartered in San Francisco and maintains only branch offices in the state capital Sacramento, and the state's largest city, Los Angeles, and hears argument at all three locations each year. Louisiana, whose supreme court is headquartered in New Orleans' French Quarter and not in the capital city Baton Rouge. Maine, whose supreme court is headquartered in Portland, and not the state capital Augusta. Pennsylvania, whose supreme court has facilities at three coequal locations: the state capital Harrisburg, the largest city Philadelphia, and the second-largest city Pittsburgh. Tennessee, whose state constitution requires its supreme court to sit at three coequal locations of Nashville, Knoxville, and Jackson. As for the court's actual facilities, a state supreme court may be housed in the state capitol, in a nearby state office building shared with other courts or state executive branch agencies, or in | interim appointments to fill judicial vacancies. In many states with judicial elections, political contributions from groups such as trade associations and political action committees are allowed. Removal The various states provide different methods for the removal of state supreme court judges during their terms, with many states providing multiple methods. Two common methods of removal are impeachment by the state legislature, and removal by state judicial boards or commissions. Other states provide for the removal of judges through recall elections, court action, gubernatorial action (with legislative consent), or through a resolution passed by a super-majority in both houses of the state legislature. Location Traditionally, state supreme courts are headquartered in the capital cities of their respective states, though they may occasionally hold oral arguments elsewhere. The six main exceptions are: Alaska, whose supreme court is located in and usually sits in its largest city, Anchorage (monthly), but also sits in Fairbanks and the state capital Juneau (quarterly), and in other Alaskan communities on an as-needed basis. California, whose supreme court is headquartered in San Francisco and maintains only branch offices in the state capital Sacramento, and the state's largest city, Los Angeles, and hears argument at all three locations each year. Louisiana, whose supreme court is headquartered in New Orleans' French Quarter and not in the capital city Baton Rouge. Maine, whose supreme court is headquartered in Portland, and not the state capital Augusta. Pennsylvania, whose supreme court has facilities at three coequal locations: the state capital Harrisburg, the largest city Philadelphia, and the second-largest city Pittsburgh. Tennessee, whose state constitution requires its supreme court to sit at three coequal locations of Nashville, Knoxville, and Jackson. As for the court's actual facilities, a state supreme court may be housed in the state capitol, in a nearby state office building shared with other courts or state executive branch agencies, or in a small courthouse reserved for its exclusive use. State supreme courts normally require a courtroom for oral argument, private chambers for all justices, a conference room, offices for law clerks and other support staff, a law library, and a lobby with a window where the court clerk can accept filings and release new decisions in the form of "slip opinions" (that is, in looseleaf format held together only by a staple). Terminology Because state supreme courts generally hear only appeals, some courts have names which directly indicate their functionin the states of New York and Maryland, and in the District of Columbia, the highest court is called the "Court of Appeals". In New York, the "Supreme Court" is the trial court of general unlimited jurisdiction and the intermediate appellate court is called the "Supreme Court—Appellate Division". Maryland's jury trial courts are called "Circuit Courts" (non-jury trials are usually conducted by the "District Courts," whose decisions may be appealed to the Circuit Courts), and the intermediate appellate court is called the "Court of Special Appeals". West Virginia mixes the two; its highest court is called the "Supreme Court of Appeals". Other states' supreme courts have used the term "Appeals": Pennsylvania's court of last resort from 1780-1808; New Jersey's supreme courts under the 1844 constitution; and Delaware's supreme court were all called the "Court of Errors and Appeals". The term "Errors" refers to the now-obsolete writ of error, which was used by state supreme courts to correct certain types of egregious errors committed by lower courts. Massachusetts and New Hampshire originally named their highest courts the "Superior Court of Judicature." Since 1780, Massachusetts has used the name "Supreme Judicial Court" (to distinguish itself from the state legislature, which is called the Massachusetts General Court); New Hampshire uses the name "Supreme Court". Additionally the highest court in Maine is named the "Supreme Judicial Court". This similar terminology is probably a holdover from the time when Maine was part of Massachusetts. In Pennsylvania, Connecticut, Delaware, New Jersey, and New York, the highest courts formerly used variations of the term "Court of Errors," which indicated that the court's primary purpose was to correct the errors of lower courts. List of state and territorial supreme courts States Territories and federal district Tribal supreme courts Supreme Court of the Cherokee Nation of Oklahoma (formerly the Judicial Appeals Tribunal) Supreme Court of the Eastern Band of Cherokee Indians (North Carolina) |
a property of numerical algorithms which describes how errors in the input data propagate through the algorithm Stability radius, a property of continuous polynomial functions Stable theory, concerned with the notion of stability in model theory Stability, a property of points in geometric invariant theory K-Stability, a stability condition for algebraic varieties. Bridgeland stability conditions, a class of stability conditions on elements of a triangulated category. Engineering In atmospheric fluid dynamics, atmospheric stability, a measure of the turbulence in the ambient atmosphere BIBO stability (Bounded Input, Bounded Output stability), in signal processing and control theory Directional stability, the tendency for a body moving with respect to a medium to point in the direction of motion Elastic stability, the resistance of a structural member to buckling Flight dynamics, including longitudinal static stability | stability), in signal processing and control theory Directional stability, the tendency for a body moving with respect to a medium to point in the direction of motion Elastic stability, the resistance of a structural member to buckling Flight dynamics, including longitudinal static stability Nyquist stability criterion, defining the limits of stability for pole-zero analysis in control systems Relaxed stability, the property of inherently unstable aircraft Ship stability in naval architecture includes Limit of positive stability, the angle at which a boat will no longer stay upright Stability conditions (watercraft) of waterborne vessels Slope stability, a property of soil-covered slopes Stability Model of software design Natural sciences Band of stability, in physics, the scatter distribution of isotopes that do not decay Chemical stability, occurring when a substance is in a dynamic chemical equilibrium with its environment Thermal stability of a chemical compound Kinetic stability of a chemical compound Stability constants of complexes, in solution Convective instability, a fluid dynamics condition Ecological stability, measure of the probability of a population returning quickly to a previous state, or not going extinct Plasma stability, a measure of how likely a perturbation in a plasma is to be damped out Exercise and sports medicine Core stability of the abdominal muscles Joint stability in the musculoskeletal system Social sciences Economic stability, the absence |
entity in a way that harms the user. For example, by violating their privacy or endangering their device's security. This behavior may be present in malware as well as in legitimate software. Websites may engage in spyware behaviors like web tracking. Hardware devices may also be affected. Spyware is frequently associated with advertising and involves many of the same issues. Because these behaviors are so common, and can have non-harmful uses, providing a precise definition of spyware is a difficult task. History The first recorded use of the term spyware occurred on October 16, 1995 in a Usenet post that poked fun at Microsoft's business model. Spyware at first denoted software meant for espionage purposes. However, in early 2000 the founder of Zone Labs, Gregor Freund, used the term in a press release for the ZoneAlarm Personal Firewall. Later in 2000, a parent using ZoneAlarm was alerted to the fact that "Reader Rabbit," educational software marketed to children by the Mattel toy company, was surreptitiously sending data back to Mattel. Since then, "spyware" has taken on its present sense. According to a 2005 study by AOL and the National Cyber-Security Alliance, 61 percent of surveyed users' computers were infected with form of spyware. 92 percent of surveyed users with spyware reported that they did not know of its presence, and 91 percent reported that they had not given permission for the installation of the spyware. , spyware has become one of the preeminent security threats to computer systems running Microsoft Windows operating systems. Computers on which Internet Explorer (IE) is the primary browser are particularly vulnerable to such attacks, not only because IE was the most widely used, but because its tight integration with Windows allows spyware access to crucial parts of the operating system. Before Internet Explorer 6 SP2 was released as part of Windows XP Service Pack 2, the browser would automatically display an installation window for any ActiveX component that a website wanted to install. The combination of user ignorance about these changes, and the assumption by Internet Explorer that all ActiveX components are benign, helped to spread spyware significantly. Many spyware components would also make use of exploits in JavaScript, Internet Explorer and Windows to install without user knowledge or permission. The Windows Registry contains multiple sections where modification of key values allows software to be executed automatically when the operating system boots. Spyware can exploit this design to circumvent attempts at removal. The spyware typically will link itself from each location in the registry that allows execution. Once running, the spyware will periodically check if any of these links are removed. If so, they will be automatically restored. This ensures that the spyware will execute when the operating system is booted, even if some (or most) of the registry links are removed. Overview Spyware is mostly classified into four types: adware, system monitors, tracking including web tracking, and trojans; examples of other notorious types include digital rights management capabilities that "phone home", keyloggers, rootkits, and web beacons. These four categories are not mutually exclusive and they have similar tactics in attacking networks and devices. The main goal is to install, hack into the network, avoid being detected, and safely remove themselves from the network. Spyware is mostly used for the stealing information and storing Internet users' movements on the Web and serving up pop-up ads to Internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users. While the term spyware suggests software that monitors a user's computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings. Sometimes, spyware is included along with genuine software, and may come from a malicious website or may have been added to the intentional functionality of genuine software (see the paragraph about Facebook, below). In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices, especially for computers running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer. In German-speaking countries, spyware used or made by the government is called govware by computer experts (in common parlance: Regierungstrojaner, literally "Government Trojan"). Govware is typically a trojan horse software used to intercept communications from the target computer. Some countries, like Switzerland and Germany, have a legal framework governing the use of such software. In the US, the term "policeware" has been used for similar purposes. Use of the term "spyware" has eventually declined as the practice of tracking users has been pushed ever further into the mainstream by major websites and data mining companies; these generally break no known laws and compel users to be tracked, not by fraudulent practices per se, but by the default settings created for users and the language of terms-of-service agreements. In one documented example, on CBS/CNet News reported, on March 7, 2011, on a Wall Street Journal analysis revealing the practice of Facebook and other websites of tracking users' browsing activity, linked to their identity, far beyond users' visits and activity within the Facebook site itself. The report stated: "Here's how it works. You go to Facebook, you log in, you spend some time there, and then ... you move on without logging out. Let's say the next site you go to is New York Times. Those buttons, without you clicking on them, have just reported back to Facebook and Twitter that you went there and also your identity within those accounts. Let's say you moved on to something like a site about depression. This one also has a tweet button, a Google widget, and those, too, can report back who you are and that you went there." The WSJ analysis was researched by Brian Kennish, founder of Disconnect, Inc. Routes of infection Spyware does not necessarily spread in the same way as a virus or worm because infected systems generally do not attempt to transmit or copy the software to other computers. Instead, spyware installs itself on a system by deceiving the user or by exploiting software vulnerabilities. Most spyware is installed without knowledge, or by using deceptive tactics. Spyware may try to deceive users by bundling itself with desirable software. Other common tactics are using a Trojan horse, spy gadgets that look like normal devices but turn out to be something else, such as a USB Keylogger. These devices actually are connected to the device as memory units but are capable of recording each stroke made on the keyboard. Some spyware authors infect a system through security holes in the Web browser or in other software. When the user navigates to a Web page controlled by the spyware author, the page contains code which attacks the browser and forces the download and installation of spyware. The installation of spyware frequently involves Internet Explorer. Its popularity and history of security issues have made it a frequent target. Its deep integration with the Windows environment make it susceptible to attack into the Windows operating system. Internet Explorer also serves as a point of attachment for spyware in the form of Browser Helper Objects, which modify the browser's behaviour. Effects and behaviors A spyware rarely operates alone on a computer; an affected machine usually has multiple infections. Users frequently notice unwanted behavior and degradation of system performance. A spyware infestation can create significant unwanted CPU activity, disk usage, and network traffic. Stability issues, such as applications freezing, failure to boot, and system-wide crashes are also common. Usually, this effect is intentional, but may be caused from the malware simply requiring large amounts of computing power, disk space, or network usage. Spyware, which interferes with networking software commonly causes difficulty connecting to the Internet. In some infections, the spyware is not even evident. Users assume in those situations that the performance issues relate to faulty hardware, Windows installation problems, or another malware infection. Some owners of badly infected systems resort to contacting technical support experts, or even buying a new computer because the existing system "has become too slow". Badly infected systems may require a clean reinstallation of all their software in order to return to full functionality. Moreover, some types of spyware disable software firewalls and antivirus software, and/or reduce browser security settings, which opens the system to further opportunistic infections. Some spyware disables or even removes competing spyware programs, on the grounds that more spyware-related annoyances increase the likelihood that users will take action to remove the programs. Keyloggers are sometimes part of malware packages downloaded onto computers without the owners' knowledge. Some keylogger software is freely available on the internet, while others are commercial or private applications. Most keyloggers allow not only keyboard keystrokes to be captured, they also are often capable of collecting screen captures from the computer. A typical Windows user has administrative privileges, mostly for convenience. Because of this, any program the user runs has unrestricted access to the system. As with other operating systems, Windows users are able to follow the principle of least privilege and use non-administrator accounts. Alternatively, they can reduce the privileges of specific vulnerable Internet-facing processes, such as Internet Explorer. Since Windows Vista is, by default, a computer administrator that runs everything under limited user privileges, when a program requires administrative privileges, a User Account Control pop-up will prompt the user to allow or deny the action. This improves on the design used by previous versions of Windows. Spyware is also known as tracking software. Remedies and prevention As the spyware threat has evolved, a number of techniques have emerged to counteract it. These include programs designed to remove or block spyware, as well as various user practices which reduce the chance of getting spyware on a system. Nonetheless, spyware remains a costly problem. When a large number of pieces of spyware have infected a Windows computer, the only remedy may involve backing up user data, and fully reinstalling the operating system. For instance, some spyware cannot be completely removed by Symantec, Microsoft, PC Tools. Anti-spyware programs Many programmers and some commercial firms have released products designed to remove or block spyware. Programs such as PC Tools' Spyware Doctor, Lavasoft's Ad-Aware SE and Patrick Kolla's Spybot - Search & Destroy rapidly gained popularity as tools to remove, and in some cases intercept, spyware programs. On December, 2004, Microsoft acquired the GIANT AntiSpyware software, rebranding it as Microsoft AntiSpyware (Beta 1) and releasing it as a free download for Genuine Windows XP and Windows 2003 users. In November, 2005, it was renamed Windows Defender. Major anti-virus firms such as Symantec, PC Tools, McAfee and Sophos have also added anti-spyware features to their existing anti-virus products. Early on, anti-virus firms expressed reluctance to add anti-spyware functions, citing lawsuits brought by spyware authors against the authors of web sites and programs which described their products as "spyware". However, recent versions of these major firms home and business anti-virus products do include anti-spyware functions, albeit treated differently from viruses. Symantec Anti-Virus, for instance, categorizes spyware programs as "extended threats" and now offers real-time protection against these threats. How anti-spyware software works Anti-spyware programs can combat spyware in two ways: They can provide real-time protection in a manner similar to that of anti-virus protection: all incoming network data is scanned for spyware, and any detected threats are blocked. Anti-spyware software programs can be used solely for detection and removal of spyware software that has already been installed into the computer. This kind of anti-spyware can often be set to scan on a regular schedule. Such programs inspect the contents of the Windows registry, operating system files, and installed programs, and remove files and entries which match a list of known spyware. Real-time protection from spyware works identically to real-time anti-virus protection: the software scans disk files at download time, and blocks the activity of components known to represent spyware. In some cases, it may also intercept attempts to install start-up items or to | Street Journal analysis revealing the practice of Facebook and other websites of tracking users' browsing activity, linked to their identity, far beyond users' visits and activity within the Facebook site itself. The report stated: "Here's how it works. You go to Facebook, you log in, you spend some time there, and then ... you move on without logging out. Let's say the next site you go to is New York Times. Those buttons, without you clicking on them, have just reported back to Facebook and Twitter that you went there and also your identity within those accounts. Let's say you moved on to something like a site about depression. This one also has a tweet button, a Google widget, and those, too, can report back who you are and that you went there." The WSJ analysis was researched by Brian Kennish, founder of Disconnect, Inc. Routes of infection Spyware does not necessarily spread in the same way as a virus or worm because infected systems generally do not attempt to transmit or copy the software to other computers. Instead, spyware installs itself on a system by deceiving the user or by exploiting software vulnerabilities. Most spyware is installed without knowledge, or by using deceptive tactics. Spyware may try to deceive users by bundling itself with desirable software. Other common tactics are using a Trojan horse, spy gadgets that look like normal devices but turn out to be something else, such as a USB Keylogger. These devices actually are connected to the device as memory units but are capable of recording each stroke made on the keyboard. Some spyware authors infect a system through security holes in the Web browser or in other software. When the user navigates to a Web page controlled by the spyware author, the page contains code which attacks the browser and forces the download and installation of spyware. The installation of spyware frequently involves Internet Explorer. Its popularity and history of security issues have made it a frequent target. Its deep integration with the Windows environment make it susceptible to attack into the Windows operating system. Internet Explorer also serves as a point of attachment for spyware in the form of Browser Helper Objects, which modify the browser's behaviour. Effects and behaviors A spyware rarely operates alone on a computer; an affected machine usually has multiple infections. Users frequently notice unwanted behavior and degradation of system performance. A spyware infestation can create significant unwanted CPU activity, disk usage, and network traffic. Stability issues, such as applications freezing, failure to boot, and system-wide crashes are also common. Usually, this effect is intentional, but may be caused from the malware simply requiring large amounts of computing power, disk space, or network usage. Spyware, which interferes with networking software commonly causes difficulty connecting to the Internet. In some infections, the spyware is not even evident. Users assume in those situations that the performance issues relate to faulty hardware, Windows installation problems, or another malware infection. Some owners of badly infected systems resort to contacting technical support experts, or even buying a new computer because the existing system "has become too slow". Badly infected systems may require a clean reinstallation of all their software in order to return to full functionality. Moreover, some types of spyware disable software firewalls and antivirus software, and/or reduce browser security settings, which opens the system to further opportunistic infections. Some spyware disables or even removes competing spyware programs, on the grounds that more spyware-related annoyances increase the likelihood that users will take action to remove the programs. Keyloggers are sometimes part of malware packages downloaded onto computers without the owners' knowledge. Some keylogger software is freely available on the internet, while others are commercial or private applications. Most keyloggers allow not only keyboard keystrokes to be captured, they also are often capable of collecting screen captures from the computer. A typical Windows user has administrative privileges, mostly for convenience. Because of this, any program the user runs has unrestricted access to the system. As with other operating systems, Windows users are able to follow the principle of least privilege and use non-administrator accounts. Alternatively, they can reduce the privileges of specific vulnerable Internet-facing processes, such as Internet Explorer. Since Windows Vista is, by default, a computer administrator that runs everything under limited user privileges, when a program requires administrative privileges, a User Account Control pop-up will prompt the user to allow or deny the action. This improves on the design used by previous versions of Windows. Spyware is also known as tracking software. Remedies and prevention As the spyware threat has evolved, a number of techniques have emerged to counteract it. These include programs designed to remove or block spyware, as well as various user practices which reduce the chance of getting spyware on a system. Nonetheless, spyware remains a costly problem. When a large number of pieces of spyware have infected a Windows computer, the only remedy may involve backing up user data, and fully reinstalling the operating system. For instance, some spyware cannot be completely removed by Symantec, Microsoft, PC Tools. Anti-spyware programs Many programmers and some commercial firms have released products designed to remove or block spyware. Programs such as PC Tools' Spyware Doctor, Lavasoft's Ad-Aware SE and Patrick Kolla's Spybot - Search & Destroy rapidly gained popularity as tools to remove, and in some cases intercept, spyware programs. On December, 2004, Microsoft acquired the GIANT AntiSpyware software, rebranding it as Microsoft AntiSpyware (Beta 1) and releasing it as a free download for Genuine Windows XP and Windows 2003 users. In November, 2005, it was renamed Windows Defender. Major anti-virus firms such as Symantec, PC Tools, McAfee and Sophos have also added anti-spyware features to their existing anti-virus products. Early on, anti-virus firms expressed reluctance to add anti-spyware functions, citing lawsuits brought by spyware authors against the authors of web sites and programs which described their products as "spyware". However, recent versions of these major firms home and business anti-virus products do include anti-spyware functions, albeit treated differently from viruses. Symantec Anti-Virus, for instance, categorizes spyware programs as "extended threats" and now offers real-time protection against these threats. How anti-spyware software works Anti-spyware programs can combat spyware in two ways: They can provide real-time protection in a manner similar to that of anti-virus protection: all incoming network data is scanned for spyware, and any detected threats are blocked. Anti-spyware software programs can be used solely for detection and removal of spyware software that has already been installed into the computer. This kind of anti-spyware can often be set to scan on a regular schedule. Such programs inspect the contents of the Windows registry, operating system files, and installed programs, and remove files and entries which match a list of known spyware. Real-time protection from spyware works identically to real-time anti-virus protection: the software scans disk files at download time, and blocks the activity of components known to represent spyware. In some cases, it may also intercept attempts to install start-up items or to modify browser settings. Earlier versions of anti-spyware programs focused chiefly on detection and removal. Javacool Software's SpywareBlaster, one of the first to offer real-time protection, blocked the installation of ActiveX-based spyware. Like most anti-virus software, many anti-spyware/adware tools require a frequently updated database of threats. As new spyware programs are released, anti-spyware developers discover and evaluate them, adding to the list of known spyware, which allows the software to detect and remove new spyware. As a result, anti-spyware software is of limited usefulness without regular updates. Updates may be installed automatically or manually. A popular generic spyware removal tool used by those that requires a certain degree of expertise is HijackThis, which scans certain areas of the Windows OS where spyware often resides and presents a list with items to delete manually. As most of the items are legitimate windows files/registry entries it is advised for those who are less knowledgeable on this subject to post a HijackThis log on the numerous antispyware sites and let the experts decide what to delete. If a spyware program is not blocked and manages to get itself installed, it may resist attempts to terminate or uninstall it. Some programs work in pairs: when an anti-spyware scanner (or the user) terminates one running process, the other one respawns the killed program. Likewise, some spyware will detect attempts to remove registry keys and immediately add them again. Usually, booting the infected computer in safe mode allows an anti-spyware program a better chance of removing persistent spyware. Killing the process tree may also work. Security practices To detect spyware, computer users have found several practices useful in addition to installing anti-spyware programs. Many users have installed a web browser other than Internet Explorer, such as Mozilla Firefox or Google Chrome. Though no browser is completely safe, Internet Explorer was once at a greater risk for spyware infection due to its large user base as well as vulnerabilities such as ActiveX but these three major browsers are now close to equivalent when it comes to security. Some ISPs—particularly colleges and universities—have taken a different approach to blocking spyware: they use their network firewalls and web proxies to block access to Web sites known to |
Jones postulated a proto-language uniting Sanskrit, Iranian, Greek, Latin, Germanic and Celtic, but in many ways his work was less accurate than his predecessors', as he erroneously included Egyptian, Japanese and Chinese in the Indo-European languages, while omitting Hindustani and Slavic. Jones also erroneously suggested that Sanskrit ‘was introduced [to north India] by conquerors from other kingdoms in some very remote age’ displacing ‘the pure Hindi’ of north India. Nevertheless, Jones' third annual discourse before the Asiatic Society on the history and culture of the Hindus (delivered on 2 February 1786 and published in 1788) with the famed "philologer" passage is often cited as the beginning of comparative linguistics and Indo-European studies. This common source came to be known as Proto-Indo-European. Jones was the first to propose the concept of an "Aryan invasion" into the Indian subcontinent, which according to Jones led to a lasting ethnic division in India between descents of indigenous Indians and those of the Aryans. This idea fell into obscurity due to a lack of evidence, but was later taken up by amateur Indologists such as the colonial administrator Herbert Hope Risley. Jones also propounded theories that might appear peculiar today but were less so in his time. For example, he believed that Egyptian priests had migrated and settled down in India in prehistoric times. He also posited that the Chinese were originally Hindus belonging to the Kshatriya caste. Jones, in his 1772 Essay on the Arts called Imitative, was one of the first to propound an expressive theory of poetry, valorising expression over description or imitation: "If the arguments, used in this essay, have any weight, it will appear, that the finest parts of poetry, music, and painting, are expressive of the passions...the inferior parts of them are descriptive of natural objects". He thereby anticipated Wordsworth in grounding poetry on the basis of a Romantic subjectivity. Jones was a contributor to Hyde's Notebooks during his term on the bench of the Supreme Court of Judicature. The notebooks are a valuable primary source of information for life in late 18th century Bengal and are the only remaining source for the proceedings of the Supreme Court. View on Historical Timeline of Biblical Events Jones said that "either the first eleven chapters of Genesis ... are true, or the whole fabrick [sic] of our national religion is false, a conclusion which none of us, I trust, would wish to be drawn." (1788, 225) He also said that "I.. . am obliged of course to believe the sanctity of the venerable books [of Genesis]" (1788, 225) Jones "traced the foundation of the Indian empire above three thousand eight hundred years from now" (Jones, 1790). Jones thought it was important that this date would be between Bishop Usher's creation date of 4004 B.C.E. and the Great Flood that Jonas considered to be in 2350 B.C.E. Encounter with Anquetil-Duperron In Europe a discussion as to the authenticity of the first translation of the Avesta scriptures arose. It was the first evidence of an Indo-European language as old as Sanskrit to be translated into a modern European language. It was suggested that the so-called Zend-Avesta was not the genuine work of the prophet Zoroaster, but was a recent forgery. Foremost among the detractors, it is to be regretted, was the distinguished (though young) orientalist William Jones. He claimed, in a letter published in French (1771), that the translator Anquetil-Duperron had been duped, that the Parsis of Surat had palmed off upon him a conglomeration of worthless fabrications and absurdities. In England, Jones was supported by Richardson and Sir John Chardin; in Germany, by Meiners. Anquetil-Duperron was labelled an impostor who had invented his own script to support his claim. This debate was not settled for almost a century. It is not curious that Jones didn't include Iranian in his naming of the cluster of Indo-European languages, since he hadn't any idea about the relationship between Avestan and Sanskrit as two main branches of this language group. Chess poem In 1763, at the age of 17, Jones wrote the poem Caissa, based on a 658-line poem called "Scacchia, Ludus" published in 1527 by Marco Girolamo Vida, giving a mythical origin of chess that has become well known in the chess world. This poem he wrote in English. In the poem the nymph Caissa initially repels the advances of Mars, the god of war. Spurned, Mars seeks the aid of the god of sport, who creates the game of chess as a gift for Mars to win Caissa's favour. Mars wins her over with the game. Caissa has since been characterised as the "goddess" of chess, her name being used in several contexts in modern chess playing. An Elegiac Poem Maurice, Thomas. (1754-1824), published An Elegiac Poem in 1795, full title An Elegiac Poem, sacred to the memory and virtues of the honourable Sir William Jones. Containing a retrospective survey of the progress of science and the Mohammedan Conquests in Asia. Schopenhauer's citation Arthur Schopenhauer referred to one of Sir William Jones's publications in §1 of The World as Will and Representation (1819). Schopenhauer was trying to support the doctrine that "everything that exists for knowledge, and hence the whole of this world, is only object in relation to the subject, perception of the perceiver, in a word, representation." He quoted Jones's original English: ... how early this basic truth was recognized by the sages of India, since it appears as the fundamental tenet of the Vedânta philosophy ascribed to Vyasa, is proved by Sir William Jones in the last of his essays: "On the Philosophy of the Asiatics" (Asiatic Researches, vol. IV, p. 164): "The fundamental tenet of the Vedânta school consisted not in denying the existence of matter, that is solidity, impenetrability, and extended figure (to deny which would be lunacy), but in correcting the popular notion of it, and in contending that it has no essence independent of mental perception; that existence and perceptibility are convertible terms." Schopenhauer used Jones's authority to relate the basic principle of his philosophy to what was, according to Jones, the most important underlying proposition of Vedânta. He made more passing reference to Sir William Jones's writings elsewhere in his works. Oration by Hendrik Arent Hamaker On 28 September 1822 the Dutch orientalist Hendrik Arent Hamaker, who accepted a professorship at the University of Leiden, gave his inaugural lecture in Latin De vita et meritis Guilielmi Jonesii (The Life and Works of William Jones)(Leiden, 1823). Cited by Edgar Allan Poe Edgar Allan Poe's short story "Berenice" starts with a motto, the first half of a poem, by Ibn Zaiat: Dicebant mihi sodales si sepulchrum amicae visitarem, curas meas | mythical origin of chess that has become well known in the chess world. This poem he wrote in English. In the poem the nymph Caissa initially repels the advances of Mars, the god of war. Spurned, Mars seeks the aid of the god of sport, who creates the game of chess as a gift for Mars to win Caissa's favour. Mars wins her over with the game. Caissa has since been characterised as the "goddess" of chess, her name being used in several contexts in modern chess playing. An Elegiac Poem Maurice, Thomas. (1754-1824), published An Elegiac Poem in 1795, full title An Elegiac Poem, sacred to the memory and virtues of the honourable Sir William Jones. Containing a retrospective survey of the progress of science and the Mohammedan Conquests in Asia. Schopenhauer's citation Arthur Schopenhauer referred to one of Sir William Jones's publications in §1 of The World as Will and Representation (1819). Schopenhauer was trying to support the doctrine that "everything that exists for knowledge, and hence the whole of this world, is only object in relation to the subject, perception of the perceiver, in a word, representation." He quoted Jones's original English: ... how early this basic truth was recognized by the sages of India, since it appears as the fundamental tenet of the Vedânta philosophy ascribed to Vyasa, is proved by Sir William Jones in the last of his essays: "On the Philosophy of the Asiatics" (Asiatic Researches, vol. IV, p. 164): "The fundamental tenet of the Vedânta school consisted not in denying the existence of matter, that is solidity, impenetrability, and extended figure (to deny which would be lunacy), but in correcting the popular notion of it, and in contending that it has no essence independent of mental perception; that existence and perceptibility are convertible terms." Schopenhauer used Jones's authority to relate the basic principle of his philosophy to what was, according to Jones, the most important underlying proposition of Vedânta. He made more passing reference to Sir William Jones's writings elsewhere in his works. Oration by Hendrik Arent Hamaker On 28 September 1822 the Dutch orientalist Hendrik Arent Hamaker, who accepted a professorship at the University of Leiden, gave his inaugural lecture in Latin De vita et meritis Guilielmi Jonesii (The Life and Works of William Jones)(Leiden, 1823). Cited by Edgar Allan Poe Edgar Allan Poe's short story "Berenice" starts with a motto, the first half of a poem, by Ibn Zaiat: Dicebant mihi sodales si sepulchrum amicae visitarem, curas meas aliquantulum fore levatas. It was taken from the works of William Jones, and here is the missing part (from Complete Works, Vol. 2, London, 1799): Dixi autem, an ideo aliud praeter hoc pectus habet sepulchrum? My companions said to me, if I would visit the grave of my friend, I might somewhat alleviate my worries. I answered "could she be buried elsewhere than in my heart?" Memorial There is a wall memorial to him in the crypt at St Paul's Cathedral. Bibliography Listing in most cases only editions and reprints that came out during Jones's own lifetime, books by, or prominently including work by, William Jones, are: Muhammad Mahdī, Histoire de Nader Chah: connu sous le nom de Thahmas Kuli Khan, empereur de Perse / Traduite d'un manuscrit persan, par ordre de Sa majesté le roi de Dannemark. Avec des notes chronologiques, historiques, géographiques. Et un traité sur la poésie orientale, par Mr. Jones, 2 vols (London: Elmsly, 1770), later published in English as The history of the life of Nader Shah: King of Persia. Extracted from an Eastern manuscript, ... With an introduction, containing, I. A description of Asia ... II. A short history of Persia ... and an appendix, consisting of an essay on Asiatick poetry, and the history of the Persian language. To which are added, pieces relative to the French translation / by William Jones (London: T. Cadell, 1773) William Jones, Kitāb-i Shakaristān dar naḥvī-i zabān-i Pārsī, taṣnīf-i Yūnus Ūksfurdī = A grammar of the Persian language (London: W. and J. Richardson, 1771) [2nd edn. 1775; 4th edn. London: J. Murray, S. Highley, and J. Sewell, 1797] [anonymously], Poems consisting chiefly of translations from the Asiatick languages: To which are added two essays, I. On the poetry of the Eastern nations. II. On the arts, commonly called imitative (Oxford: Clarendon Press, 1772) [2nd edn. London: N. Conant, 1777] [William Jones], Poeseos Asiaticæ commentariorum libri sex: cum appendice; subjicitur Limon, seu miscellaneorum liber / auctore Gulielmo Jones (London: T. Cadell, 1774) [repr. Lipsiae: Apud Haeredes Weidmanni et Reichium, 1777] [anonymously], An inquiry into the legal mode of suppressing riots: with a constitutional plan of future defence (London: C. Dilly, 1780) [2nd edn, no longer anonymously, London: C. Dilly, 1782] William Jones, An essay on the law of bailments (London: Charles Dilly, 1781) [repr. Dublin: Henry Watts, 1790] William Jones, The muse recalled, an ode: occasioned by the nuptials of Lord Viscount Althorp and Miss Lavinia Bingham (Strawberry-Hill: Thomas Kirgate, 1781) [repr. Paris: F. A. Didot l'aîné, 1782] [anonymously], An ode, in imitation of Callistratus: sung by Mr. Webb, at the Shakespeare Tavern, on Tuesday the 14th day of May, 1782, at the anniversary dinner of the Society for Constitutional Information ([London, 1782]) William Jones, A speech of William Jones, Esq: to the assembled inhabitants of the counties of Middlesex and Surry, the cities of London and Westminster, and the borough of Southwark. XXVIII May, M. DCC. LXXXII (London: C. Dilly, 1782) William Jones, The Moallakát: or seven Arabian poems, which were suspended on the temple at Mecca; with a translation, and arguments (London: P. Elmsly, 1783), https://books.google.com/books?id=qbBCAAAAcAAJ [anonymously], The principles of government: in a dialogue between a scholar and a peasant / written by a member of the Society for Constitutional Information ([London: The Society for Constitutional Information, 1783]) William Jones, A discourse on the institution of a society for enquiring into the history, civil and natural, the antiquities, arts, sciences, and literature of Asia (London: T. Payne and son, 1784) William Davies Shipley, The whole of the proceedings at the assizes at Shrewsbury, Aug. 6, 1784: in the cause of the King on Friday August the sixth, 1784, in the cause of the King on the prosecution of William Jones, attorney-at-law, against the Rev. William Davies Shipley, Dean of St. Asaph, for a libel ... / taken in short hand by William Blanchard (London: The Society for Constitutional Information, 1784) William Davies Shipley, The whole proceedings on the trial of the indictment: the King, on the prosecution of William Jones, gentleman, against the Rev. William Davies Shipley, Dean of St. Asaph, for a libel, at the assize at Shrewsbury, on Friday |
he would have another legitimate son, and he instead looked to Matilda as his intended heir. Matilda claimed the title of Holy Roman Empress through her marriage to Emperor Henry V, but her husband died in 1125, and she was remarried in 1128 to Geoffrey Plantagenet, Count of Anjou, whose lands bordered the Duchy of Normandy. Geoffrey was unpopular with the Anglo-Norman elite: as an Angevin ruler, he was a traditional enemy of the Normans. At the same time, tensions continued to grow as a result of Henry's domestic policies, in particular the high level of revenue he was raising to pay for his various wars. Conflict was curtailed, however, by the power of the King's personality and reputation. Henry attempted to build up a base of political support for Matilda in both England and Normandy, demanding that his court take oaths first in 1127, and then again in 1128 and 1131, to recognise Matilda as his immediate successor and recognise her descendants as the rightful rulers after her. Stephen was amongst those who took this oath in 1127. Nonetheless, relations between Henry, Matilda, and Geoffrey became increasingly strained towards the end of the King's life. Matilda and Geoffrey suspected that they lacked genuine support in England, and proposed to Henry in 1135 that the King should hand over the royal castles in Normandy to Matilda whilst he was still alive and insist on the Norman nobility swearing immediate allegiance to her, thereby giving the couple a much more powerful position after Henry's death. Henry angrily declined to do so, probably out of a concern that Geoffrey would try to seize power in Normandy somewhat earlier than intended. A fresh rebellion broke out in southern Normandy, and Geoffrey and Matilda intervened militarily on behalf of the rebels. In the middle of this confrontation, Henry unexpectedly fell ill and died near Lyons-la-Forêt. Succession (1135) Stephen was a well established figure in Anglo-Norman society by 1135. He was extremely wealthy, well-mannered and liked by his peers; he was also considered a man capable of firm action. Chroniclers recorded that despite his wealth and power he was a modest and easy-going leader, happy to sit with his men and servants, casually laughing and eating with them. He was very pious, both in terms of his observance of religious rituals and his personal generosity to the church. Stephen also had a personal Augustinian confessor appointed to him by the Archbishop of Canterbury, who implemented a penitential regime for him, and Stephen encouraged the new order of Cistercians to form abbeys on his estates, winning him additional allies within the church. Rumours about his father's cowardice during the First Crusade, however, continued to circulate, and a desire to avoid the same reputation may have influenced some of Stephen's rasher military actions. His wife, Matilda, played a major role in running their vast English estates, which contributed to the couple being the second-richest lay household in the country after the King and Queen. The landless Flemish nobleman William of Ypres had joined Stephen's household in 1133. Stephen's younger brother, Henry of Blois, had also risen to power under Henry I. Henry of Blois had become a Cluniac monk and followed Stephen to England, where the King made him Abbot of Glastonbury, the richest abbey in England. The King then appointed him Bishop of Winchester, one of the richest bishoprics, allowing him to retain Glastonbury as well. The combined revenues of the two positions made Henry of Winchester the second-richest man in England after the King. Henry of Winchester was keen to reverse what he perceived as encroachment by the Norman kings on the rights of the church. The Norman kings had traditionally exercised a great deal of power and autonomy over the church within their territories. From the 1040s onwards, however, successive popes had put forward a reforming message that emphasised the importance of the church being "governed more coherently and more hierarchically from the centre" and established "its own sphere of authority and jurisdiction, separate from and independent of that of the lay ruler", in the words of historian Richard Huscroft. When news began to spread of Henry I's death, many of the potential claimants to the throne were not well placed to respond. Geoffrey and Matilda were in Anjou, rather awkwardly supporting the rebels in their campaign against the royal army, which included a number of Matilda's supporters such as Robert of Gloucester. Many of these barons had taken an oath to stay in Normandy until the late King was properly buried, which prevented them from returning to England. Stephen's elder brother Theobald was further south still, in Blois. Stephen, however, was in Boulogne, and when news reached him of Henry's death he left for England, accompanied by his military household. Robert of Gloucester had garrisoned the ports of Dover and Canterbury and some accounts suggest that they refused Stephen access when he first arrived. Nonetheless, Stephen probably reached his own estate on the edge of London by 8 December and over the next week he began to seize power in England. The crowds in London traditionally claimed a right to elect the King, and they proclaimed Stephen the new monarch, believing that he would grant the city new rights and privileges in return. Henry of Blois delivered the support of the church to Stephen: Stephen was able to advance to Winchester, where Roger, Bishop of Salisbury and Lord Chancellor, instructed the royal treasury to be handed over to Stephen. On 15 December, Henry delivered an agreement under which Stephen would grant extensive freedoms and liberties to the church, in exchange for the Archbishop of Canterbury and the Papal Legate supporting his succession to the throne. There was the slight problem of the religious oath that Stephen had taken to support the Empress Matilda, but Henry convincingly argued that the late King had been wrong to insist that his court take the oath. Furthermore, the late King had only insisted on that oath to protect the stability of the kingdom, and in light of the chaos that might now ensue, Stephen would be justified in ignoring it. Henry was also able to persuade Hugh Bigod, the late King's royal steward, to swear that the King had changed his mind about the succession on his deathbed, nominating Stephen instead. Stephen's coronation was held a week later at Westminster Abbey on 22 December. Meanwhile, the Norman nobility gathered at Le Neubourg to discuss declaring Theobald king, probably following the news that Stephen was gathering support in England. The Normans argued that the count, as the more senior grandson of William the Conqueror, had the most valid claim over the kingdom and the duchy, and was certainly preferable to Matilda. Theobald met with the Norman barons and Robert of Gloucester at Lisieux on 21 December. Their discussions were interrupted by the sudden news from England that Stephen's coronation was to occur the next day. Theobald then agreed to the Normans' proposal that he be made king, only to find that his former support immediately ebbed away: the barons were not prepared to support the division of England and Normandy by opposing Stephen, who subsequently financially compensated Theobald, who in return remained in Blois and supported his brother's succession. Early reign (1136–39) Initial years (1136–37) Stephen's new Anglo-Norman kingdom had been shaped by the Norman conquest of England in 1066, followed by the Norman expansion into south Wales over the coming years. Both the kingdom and duchy were dominated by a small number of major barons who owned lands on both sides of the English Channel, with the lesser barons beneath them usually having more localised holdings. The extent to which lands and positions should be passed down through hereditary right or by the gift of the King was still uncertain, and tensions concerning this issue had grown during the reign of Henry I. Certainly lands in Normandy, passed by hereditary right, were usually considered more important to major barons than those in England, where their possession was less certain. Henry had increased the authority and capabilities of the central royal administration, often bringing in "new men" to fulfil key positions rather than using the established nobility. In the process he had been able to maximise revenues and contain expenditures, resulting in a healthy surplus and a famously large treasury, but also increasing political tensions. Stephen had to intervene in the north of England immediately after his coronation. David I of Scotland invaded the north on the news of Henry's death, taking Carlisle, Newcastle and other key strongholds. Northern England was a disputed territory at this time, with the Scottish kings laying a traditional claim to Cumberland, and David also claiming Northumbria by virtue of his marriage to the daughter of Waltheof, Earl of Northumbria. Stephen rapidly marched north with an army and met David at Durham. An agreement was made under which David would return most of the territory he had taken, with the exception of Carlisle. In return, Stephen confirmed the English possessions of David's son Henry, including the Earldom of Huntingdon. Returning south, Stephen held his first royal court at Easter 1136. A wide range of nobles gathered at Westminster for the event, including many of the Anglo-Norman barons and most of the higher officials of the church. Stephen issued a new royal charter, confirming the promises he had made to the church, promising to reverse Henry I's policies on the royal forests and to reform any abuses of the royal legal system. He portrayed himself as the natural successor to Henry's policies, and reconfirmed the existing seven earldoms in the kingdom on their existing holders. The Easter court was a lavish event, and a large amount of money was spent on the event itself, clothes and gifts. Stephen gave out grants of land and favours to those present and endowed numerous church foundations with land and privileges. His accession to the throne still needed to be ratified by the Pope, however, and Henry of Blois appears to have been responsible for ensuring that testimonials of support were sent both from Stephen's brother Theobald and from the French king Louis VI, to whom Stephen represented a useful balance to Angevin power in the north of France. Pope Innocent II confirmed Stephen as king by letter later that year, and Stephen's advisers circulated copies widely around England to demonstrate his legitimacy. Troubles continued across Stephen's kingdom. After the Welsh victory at the battle of Llwchwr in January 1136 and the successful ambush of Richard Fitz Gilbert de Clare in April, south Wales rose in rebellion, starting in east Glamorgan and rapidly spreading across the rest of south Wales during 1137. Owain Gwynedd and Gruffydd ap Rhys successfully captured considerable territories, including Carmarthen Castle. Stephen responded by sending Richard's brother Baldwin and the Marcher Lord Robert Fitz Harold of Ewyas into Wales to pacify the region. Neither mission was particularly successful, and by the end of 1137 the King appears to have abandoned attempts to put down the rebellion. Historian David Crouch suggests that Stephen effectively "bowed out of Wales" around this time to concentrate on his other problems. Meanwhile, he had put down two revolts in the south-west led by Baldwin de Redvers and Robert of Bampton; Baldwin was released after his capture and travelled to Normandy, where he became an increasingly vocal critic of the King. The security of Normandy was also a concern. Geoffrey of Anjou invaded in early 1136 and, after a temporary truce, invaded later the same year, raiding and burning estates rather than trying to hold the territory. Events in England meant that Stephen was unable to travel to Normandy himself, so Waleran de Beaumont, appointed by Stephen as the lieutenant of Normandy, and Theobald led the efforts to defend the duchy. Stephen himself only returned to the duchy in 1137, where he met with Louis VI and Theobald to agree to an informal regional alliance, probably brokered by Henry, to counter the growing Angevin power in the region. As part of this deal, Louis recognised Stephen's son Eustace as Duke of Normandy in exchange for Eustace giving fealty to the French King. Stephen was less successful, however, in regaining the Argentan province along the Normandy and Anjou border, which Geoffrey had taken at the end of 1135. Stephen formed an army to retake it, but the frictions between his Flemish mercenary forces led by William of Ypres and the local Norman barons resulted in a battle between the two halves of his army. The Norman forces then deserted Stephen, forcing the King to give up his campaign. He agreed to another truce with Geoffrey, promising to pay him 2,000 marks a year in exchange for peace along the Norman borders. In the years following his succession, Stephen's relationship with the church became gradually more complex. The royal charter of 1136 had promised to review the ownership of all the lands that had been taken by the crown from the church since 1087, but these estates were now typically owned by nobles. Henry of Blois's claims, in his role as Abbot of Glastonbury, to extensive lands in Devon resulted in considerable local unrest. In 1136, Archbishop of Canterbury William de Corbeil died. Stephen responded by seizing his personal wealth, which caused some discontent amongst the senior clergy. Henry wanted to succeed to the post, but Stephen instead supported Theobald of Bec, who was eventually appointed. The papacy named Henry papal legate, possibly as consolation for not receiving Canterbury. Stephen's first few years as king can be interpreted in different ways. He stabilised the northern border with Scotland, contained Geoffrey's attacks on Normandy, was at peace with Louis VI, enjoyed good relations with the church and had the broad support of his barons. There were significant underlying problems, nonetheless. The north of England was now controlled by David and Prince Henry, Stephen had abandoned Wales, the fighting in Normandy had considerably destabilised the duchy, and an increasing number of barons felt that Stephen had given them neither the lands nor the titles they felt they deserved or were owed. Stephen was also rapidly running out of money: Henry's considerable treasury had been emptied by 1138 due to the costs of running Stephen's more lavish court and the need to raise and maintain his mercenary armies fighting in England and Normandy. Defending the kingdom (1138–39) Stephen was attacked on several fronts during 1138. First, Robert, Earl of Gloucester, rebelled against the King, starting the descent into civil war in England. An illegitimate son of Henry I and the half-brother of the Empress Matilda, Robert was one of the most powerful Anglo-Norman barons, controlling estates in Normandy. He was known for his qualities as a statesman, his military experience, and leadership ability. Robert had tried to convince Theobald to take the throne in 1135; he did not attend Stephen's first court in 1136 and it took several summonses to convince him to attend court at Oxford later that year. In 1138, Robert renounced his fealty to Stephen and declared his support for Matilda, triggering a major regional rebellion in Kent and across the south-west of England, although Robert himself remained in Normandy. In France, Geoffrey of Anjou took advantage of the situation by re-invading Normandy. David of Scotland also invaded the north of England once again, announcing that he was supporting the claim of his niece the Empress Matilda to the throne, pushing south into Yorkshire. Anglo-Norman warfare during the reign of Stephen was characterised by attritional military campaigns, in which commanders tried to seize key enemy castles in order to allow them to take control of their adversaries' territory and ultimately win a slow, strategic victory. The armies of the period centred on bodies of mounted, armoured knights, supported by infantry and crossbowmen. These forces were either feudal levies, drawn up by local nobles for a limited period of service during a campaign, or, increasingly, mercenaries, who were expensive but more flexible and often more skilled. These armies, however, were ill-suited to besieging castles, whether the older motte-and-bailey designs or the newer, stone-built keeps. Existing siege engines were significantly less powerful than the later trebuchet designs, giving defenders a substantial advantage over attackers. As a result, slow sieges to starve defenders out, or mining operations to undermine walls, tended to be preferred by commanders over direct assaults. Occasionally pitched battles were fought between armies but these were considered highly risky endeavours and were usually avoided by prudent commanders. The cost of warfare had risen considerably in the first part of the 12th century, and adequate supplies of ready cash were increasingly proving important in the success of campaigns. Stephen's personal qualities as a military leader focused on his skill in personal combat, his capabilities in siege warfare and a remarkable ability to move military forces quickly over relatively long distances. In response to the revolts and invasions, he rapidly undertook several military campaigns, focusing primarily on England rather than Normandy. His wife Matilda was sent to Kent with ships and resources from Boulogne, with the task of retaking the key port of Dover, under Robert's control. A small number of Stephen's household knights were sent north to help the fight against the Scots, where David's forces were defeated later that year at the battle of the Standard in August by the forces of Thurstan, the Archbishop of York. Despite this victory, however, David still occupied most of the north. Stephen himself went west in an attempt to regain control of Gloucestershire, first striking north into the Welsh Marches, taking Hereford and Shrewsbury, before heading south to Bath. The town of Bristol itself proved too strong for him, and Stephen contented himself with raiding and pillaging the surrounding area. The rebels appear to have expected Robert to intervene with support that year, but he remained in Normandy throughout, trying to persuade the Empress Matilda to invade England herself. Dover finally surrendered to the queen's forces later in the year. Stephen's military campaign in England had progressed well, and historian David Crouch describes it as "a military achievement of the first rank". The King took the opportunity of his military advantage to forge a peace agreement with Scotland. Stephen's wife Matilda was sent to negotiate another agreement between Stephen and David, called the treaty of Durham; Northumbria and Cumbria would effectively be granted to David and his son Henry, in exchange for their fealty and future peace along the border. Unfortunately, the powerful Ranulf I, Earl of Chester, considered himself to hold the traditional rights to Carlisle and Cumberland and was extremely displeased to see them being given to the Scots. Nonetheless, Stephen could now focus his attention on the anticipated invasion of England by Robert and Matilda's forces. Road to civil war (1139) Stephen prepared for the Angevin invasion by creating a number of additional earldoms. Only a handful of earldoms had existed under Henry I and these had been largely symbolic in nature. Stephen created many more, filling them with men he considered to be loyal, capable military commanders, and in the more vulnerable parts of the country assigning them new lands and additional executive powers. He appears to have had several objectives in mind, including both ensuring the loyalty of his key supporters by granting them these honours, and improving his defences in key parts of the kingdom. Stephen was heavily influenced by his principal advisor, Waleran de Beaumont, the twin brother of Robert of Leicester. The Beaumont twins and their younger brother and cousins received the majority of these new earldoms. From 1138 onwards, Stephen gave them the earldoms of Worcester, Leicester, Hereford, Warwick and Pembroke, which – especially when combined with the possessions of Stephen's new ally, Prince Henry, in Cumberland and Northumbria – created a wide block of territory to act as a buffer zone between the troubled south-west, Chester, and the rest of the kingdom. With their new lands, the power of the Beamounts grew to the point where David Crouch suggests that it became "dangerous to be anything other than a friend of Waleran" at Stephen's court. Stephen took steps to remove a group of bishops he regarded as a threat to his rule. The royal administration under Henry I had been headed by Roger, the Bishop of Salisbury, supported by Roger's nephews, Alexander and Nigel, the Bishops of Lincoln and Ely respectively, and Roger's son, Lord Chancellor Roger le Poer. These bishops were powerful landowners as well as ecclesiastical rulers, and they had begun to build new castles and increase the size of their military forces, leading Stephen to suspect that they were about to defect to the Empress Matilda. Roger and his family were also enemies of Waleran, who disliked their control of the royal administration. In June 1139, Stephen held his court in Oxford, where a fight between Alan of Brittany and Roger's men broke out, an incident probably deliberately created by Stephen. Stephen responded by demanding that Roger and the other bishops surrender all of their castles in England. This threat was backed up by the arrest of the bishops, with the exception of Nigel who had taken refuge in Devizes Castle; the bishop only surrendered after Stephen besieged the castle and threatened to execute Roger le Poer. The remaining castles were then surrendered to the King. Stephen's brother, Henry of Blois, was alarmed by this, both as a matter of principle, since Stephen had previously agreed in 1135 to respect the freedoms of the church, and more pragmatically because he himself had recently built six castles and had no desire to be treated in the same way. As the papal legate, he summoned the King to appear before an ecclesiastical council to answer for the arrests and seizure of property. Henry asserted the Church's right to investigate and judge all charges against members of the clergy. Stephen sent Aubrey de Vere II as his spokesman to the council, who argued that Roger of Salisbury had been arrested not as a bishop, but rather in his role as a baron who had been preparing to change his support to the Empress Matilda. The King was supported by Hugh of Amiens, Archbishop of Rouen, who challenged the bishops to show how canon law entitled them to build or hold castles. Aubrey threatened that Stephen would complain to the pope that he was being harassed by the English church, and the council let the matter rest following an unsuccessful appeal to Rome. The incident successfully removed any military threat from the bishops, but it may have damaged Stephen's relationship with the senior clergy, and in particular with his brother Henry. Civil war (1139–54) Initial phase of the war (1139–40) The Angevin invasion finally arrived in 1139. Baldwin de Redvers crossed over from Normandy to Wareham in August in an initial attempt to capture a port to receive the Empress Matilda's invading army, but Stephen's forces forced him to retreat into the south-west. The following month, however, the Empress was invited by the | to the French King. Stephen was less successful, however, in regaining the Argentan province along the Normandy and Anjou border, which Geoffrey had taken at the end of 1135. Stephen formed an army to retake it, but the frictions between his Flemish mercenary forces led by William of Ypres and the local Norman barons resulted in a battle between the two halves of his army. The Norman forces then deserted Stephen, forcing the King to give up his campaign. He agreed to another truce with Geoffrey, promising to pay him 2,000 marks a year in exchange for peace along the Norman borders. In the years following his succession, Stephen's relationship with the church became gradually more complex. The royal charter of 1136 had promised to review the ownership of all the lands that had been taken by the crown from the church since 1087, but these estates were now typically owned by nobles. Henry of Blois's claims, in his role as Abbot of Glastonbury, to extensive lands in Devon resulted in considerable local unrest. In 1136, Archbishop of Canterbury William de Corbeil died. Stephen responded by seizing his personal wealth, which caused some discontent amongst the senior clergy. Henry wanted to succeed to the post, but Stephen instead supported Theobald of Bec, who was eventually appointed. The papacy named Henry papal legate, possibly as consolation for not receiving Canterbury. Stephen's first few years as king can be interpreted in different ways. He stabilised the northern border with Scotland, contained Geoffrey's attacks on Normandy, was at peace with Louis VI, enjoyed good relations with the church and had the broad support of his barons. There were significant underlying problems, nonetheless. The north of England was now controlled by David and Prince Henry, Stephen had abandoned Wales, the fighting in Normandy had considerably destabilised the duchy, and an increasing number of barons felt that Stephen had given them neither the lands nor the titles they felt they deserved or were owed. Stephen was also rapidly running out of money: Henry's considerable treasury had been emptied by 1138 due to the costs of running Stephen's more lavish court and the need to raise and maintain his mercenary armies fighting in England and Normandy. Defending the kingdom (1138–39) Stephen was attacked on several fronts during 1138. First, Robert, Earl of Gloucester, rebelled against the King, starting the descent into civil war in England. An illegitimate son of Henry I and the half-brother of the Empress Matilda, Robert was one of the most powerful Anglo-Norman barons, controlling estates in Normandy. He was known for his qualities as a statesman, his military experience, and leadership ability. Robert had tried to convince Theobald to take the throne in 1135; he did not attend Stephen's first court in 1136 and it took several summonses to convince him to attend court at Oxford later that year. In 1138, Robert renounced his fealty to Stephen and declared his support for Matilda, triggering a major regional rebellion in Kent and across the south-west of England, although Robert himself remained in Normandy. In France, Geoffrey of Anjou took advantage of the situation by re-invading Normandy. David of Scotland also invaded the north of England once again, announcing that he was supporting the claim of his niece the Empress Matilda to the throne, pushing south into Yorkshire. Anglo-Norman warfare during the reign of Stephen was characterised by attritional military campaigns, in which commanders tried to seize key enemy castles in order to allow them to take control of their adversaries' territory and ultimately win a slow, strategic victory. The armies of the period centred on bodies of mounted, armoured knights, supported by infantry and crossbowmen. These forces were either feudal levies, drawn up by local nobles for a limited period of service during a campaign, or, increasingly, mercenaries, who were expensive but more flexible and often more skilled. These armies, however, were ill-suited to besieging castles, whether the older motte-and-bailey designs or the newer, stone-built keeps. Existing siege engines were significantly less powerful than the later trebuchet designs, giving defenders a substantial advantage over attackers. As a result, slow sieges to starve defenders out, or mining operations to undermine walls, tended to be preferred by commanders over direct assaults. Occasionally pitched battles were fought between armies but these were considered highly risky endeavours and were usually avoided by prudent commanders. The cost of warfare had risen considerably in the first part of the 12th century, and adequate supplies of ready cash were increasingly proving important in the success of campaigns. Stephen's personal qualities as a military leader focused on his skill in personal combat, his capabilities in siege warfare and a remarkable ability to move military forces quickly over relatively long distances. In response to the revolts and invasions, he rapidly undertook several military campaigns, focusing primarily on England rather than Normandy. His wife Matilda was sent to Kent with ships and resources from Boulogne, with the task of retaking the key port of Dover, under Robert's control. A small number of Stephen's household knights were sent north to help the fight against the Scots, where David's forces were defeated later that year at the battle of the Standard in August by the forces of Thurstan, the Archbishop of York. Despite this victory, however, David still occupied most of the north. Stephen himself went west in an attempt to regain control of Gloucestershire, first striking north into the Welsh Marches, taking Hereford and Shrewsbury, before heading south to Bath. The town of Bristol itself proved too strong for him, and Stephen contented himself with raiding and pillaging the surrounding area. The rebels appear to have expected Robert to intervene with support that year, but he remained in Normandy throughout, trying to persuade the Empress Matilda to invade England herself. Dover finally surrendered to the queen's forces later in the year. Stephen's military campaign in England had progressed well, and historian David Crouch describes it as "a military achievement of the first rank". The King took the opportunity of his military advantage to forge a peace agreement with Scotland. Stephen's wife Matilda was sent to negotiate another agreement between Stephen and David, called the treaty of Durham; Northumbria and Cumbria would effectively be granted to David and his son Henry, in exchange for their fealty and future peace along the border. Unfortunately, the powerful Ranulf I, Earl of Chester, considered himself to hold the traditional rights to Carlisle and Cumberland and was extremely displeased to see them being given to the Scots. Nonetheless, Stephen could now focus his attention on the anticipated invasion of England by Robert and Matilda's forces. Road to civil war (1139) Stephen prepared for the Angevin invasion by creating a number of additional earldoms. Only a handful of earldoms had existed under Henry I and these had been largely symbolic in nature. Stephen created many more, filling them with men he considered to be loyal, capable military commanders, and in the more vulnerable parts of the country assigning them new lands and additional executive powers. He appears to have had several objectives in mind, including both ensuring the loyalty of his key supporters by granting them these honours, and improving his defences in key parts of the kingdom. Stephen was heavily influenced by his principal advisor, Waleran de Beaumont, the twin brother of Robert of Leicester. The Beaumont twins and their younger brother and cousins received the majority of these new earldoms. From 1138 onwards, Stephen gave them the earldoms of Worcester, Leicester, Hereford, Warwick and Pembroke, which – especially when combined with the possessions of Stephen's new ally, Prince Henry, in Cumberland and Northumbria – created a wide block of territory to act as a buffer zone between the troubled south-west, Chester, and the rest of the kingdom. With their new lands, the power of the Beamounts grew to the point where David Crouch suggests that it became "dangerous to be anything other than a friend of Waleran" at Stephen's court. Stephen took steps to remove a group of bishops he regarded as a threat to his rule. The royal administration under Henry I had been headed by Roger, the Bishop of Salisbury, supported by Roger's nephews, Alexander and Nigel, the Bishops of Lincoln and Ely respectively, and Roger's son, Lord Chancellor Roger le Poer. These bishops were powerful landowners as well as ecclesiastical rulers, and they had begun to build new castles and increase the size of their military forces, leading Stephen to suspect that they were about to defect to the Empress Matilda. Roger and his family were also enemies of Waleran, who disliked their control of the royal administration. In June 1139, Stephen held his court in Oxford, where a fight between Alan of Brittany and Roger's men broke out, an incident probably deliberately created by Stephen. Stephen responded by demanding that Roger and the other bishops surrender all of their castles in England. This threat was backed up by the arrest of the bishops, with the exception of Nigel who had taken refuge in Devizes Castle; the bishop only surrendered after Stephen besieged the castle and threatened to execute Roger le Poer. The remaining castles were then surrendered to the King. Stephen's brother, Henry of Blois, was alarmed by this, both as a matter of principle, since Stephen had previously agreed in 1135 to respect the freedoms of the church, and more pragmatically because he himself had recently built six castles and had no desire to be treated in the same way. As the papal legate, he summoned the King to appear before an ecclesiastical council to answer for the arrests and seizure of property. Henry asserted the Church's right to investigate and judge all charges against members of the clergy. Stephen sent Aubrey de Vere II as his spokesman to the council, who argued that Roger of Salisbury had been arrested not as a bishop, but rather in his role as a baron who had been preparing to change his support to the Empress Matilda. The King was supported by Hugh of Amiens, Archbishop of Rouen, who challenged the bishops to show how canon law entitled them to build or hold castles. Aubrey threatened that Stephen would complain to the pope that he was being harassed by the English church, and the council let the matter rest following an unsuccessful appeal to Rome. The incident successfully removed any military threat from the bishops, but it may have damaged Stephen's relationship with the senior clergy, and in particular with his brother Henry. Civil war (1139–54) Initial phase of the war (1139–40) The Angevin invasion finally arrived in 1139. Baldwin de Redvers crossed over from Normandy to Wareham in August in an initial attempt to capture a port to receive the Empress Matilda's invading army, but Stephen's forces forced him to retreat into the south-west. The following month, however, the Empress was invited by the Dowager Queen Adeliza to land at Arundel instead, and on 30 September Robert of Gloucester and the Empress arrived in England with 140 knights. The Empress stayed at Arundel Castle, whilst Robert marched north-west to Wallingford and Bristol, hoping to raise support for the rebellion and to link up with Miles of Gloucester, a capable military leader who took the opportunity to renounce his fealty to the King. Stephen promptly moved south, besieging Arundel and trapping Matilda inside the castle. Stephen then agreed to a truce proposed by his brother, Henry; the full details of the truce are not known, but the results were that Stephen first released Matilda from the siege and then allowed her and her household of knights to be escorted to the south-west, where they were reunited with Robert of Gloucester. The reasoning behind Stephen's decision to release his rival remains unclear. Contemporary chroniclers suggested that Henry argued that it would be in Stephen's own best interests to release the Empress and concentrate instead on attacking Robert, and Stephen may have seen Robert, not the Empress, as his main opponent at this point in the conflict. He also faced a military dilemma at Arundel—the castle was considered almost impregnable, and he may have been worried that he was tying down his army in the south whilst Robert roamed freely in the west. Another theory is that Stephen released Matilda out of a sense of chivalry; he was certainly known for having a generous, courteous personality and women were not normally expected to be targeted in Anglo-Norman warfare. Having released the Empress, Stephen focused on pacifying the south-west of England. Although there had been few new defections to the Empress, his enemies now controlled a compact block of territory stretching out from Gloucester and Bristol south-west into Devon and Cornwall, west into the Welsh Marches and east as far as Oxford and Wallingford, threatening London. Stephen started by attacking Wallingford Castle, held by the Empress's childhood friend Brien FitzCount, only to find it too well defended. He then left behind some forces to blockade the castle and continued west into Wiltshire to attack Trowbridge Castle, taking the castles of South Cerney and Malmesbury en route. Meanwhile, Miles of Gloucester marched east, attacking Stephen's rearguard forces at Wallingford and threatening an advance on London. Stephen was forced to give up his western campaign, returning east to stabilise the situation and protect his capital. At the start of 1140, Nigel, Bishop of Ely, whose castles Stephen had confiscated the previous year, rebelled against Stephen as well. Nigel hoped to seize East Anglia and established his base of operations in the Isle of Ely, then surrounded by protective fenland. Stephen responded quickly, taking an army into the fens and using boats lashed together to form a causeway that allowed him to make a surprise attack on the isle. Nigel escaped to Gloucester, but his men and castle were captured, and order was temporarily restored in the east. Robert of Gloucester's men retook some of the territory that Stephen had taken in his 1139 campaign. In an effort to negotiate a truce, Henry of Blois held a peace conference at Bath, to which Stephen sent his wife. The conference collapsed over the insistence by Henry and the clergy that they should set the terms of any peace deal, which Stephen found unacceptable. Ranulf of Chester remained upset over Stephen's gift of the north of England to Prince Henry. Ranulf devised a plan for dealing with the problem by ambushing Henry whilst the prince was travelling back from Stephen's court to Scotland after Christmas. Stephen responded to rumours of this plan by escorting Henry himself north, but this gesture proved the final straw for Ranulf. Ranulf had previously claimed that he had the rights to Lincoln Castle, held by Stephen, and under the guise of a social visit, Ranulf seized the fortification in a surprise attack. Stephen marched north to Lincoln and agreed to a truce with Ranulf, probably to keep him from joining the Empress's faction, under which Ranulf would be allowed to keep the castle. Stephen returned to London but received news that Ranulf, his brother and their family were relaxing in Lincoln Castle with a minimal guard force, a ripe target for a surprise attack of his own. Abandoning the deal he had just made, Stephen gathered his army again and sped north, but not quite fast enough—Ranulf escaped Lincoln and declared his support for the Empress. Stephen was forced to place the castle under siege. Second phase of the war (1141–42) While Stephen and his army besieged Lincoln Castle at the start of 1141, Robert of Gloucester and Ranulf of Chester advanced on the King's position with a somewhat larger force. When the news reached Stephen, he held a council to decide whether to give battle or to withdraw and gather additional soldiers: Stephen decided to fight, resulting in the Battle of Lincoln on 2 February 1141. The King commanded the centre of his army, with Alan of Brittany on his right and William of Aumale on his left. Robert and Ranulf's forces had superiority in cavalry and Stephen dismounted many of his own knights to form a solid infantry block; he joined them himself, fighting on foot in the battle. Stephen was not a gifted public speaker, and delegated the pre-battle speech to Baldwin of Clare, who delivered a rousing declaration. After an initial success in which William's forces destroyed the Angevins' Welsh infantry, the battle went badly for Stephen. Robert and Ranulf's cavalry encircled Stephen's centre, and the King found himself surrounded by the enemy army. Many of his supporters, including Waleran de Beaumont and William of Ypres, fled from the field at this point but Stephen fought on, defending himself first with his sword and then, when that broke, with a borrowed battle axe. Finally, he was overwhelmed by Robert's men and taken away from the field in custody. Robert took Stephen back to Gloucester, where the King met with the Empress Matilda, and was then moved to Bristol Castle, traditionally used for holding high-status prisoners. He was initially left confined in relatively good conditions, but his security was later tightened and he was kept in chains. The Empress now began to take the necessary steps to have herself crowned queen in his place, which would require the agreement of the church and her coronation at Westminster. Stephen's brother Henry summoned a council at Winchester before Easter in his capacity as papal legate to consider the clergy's view. He had made a private deal with the Empress Matilda that he would deliver the support of the church, if she agreed to give him control over church business in England. Henry handed over the royal treasury, rather depleted except for Stephen's crown, to the Empress, and excommunicated many of Stephen's supporters who refused to switch sides. Archbishop Theobald of Canterbury was unwilling to declare Matilda queen so rapidly, however, and a delegation of clergy and nobles, headed by Theobald, travelled to see Stephen in Bristol and consult about their moral dilemma: should they abandon their oaths of fealty to the King? Stephen agreed that, given the situation, he was prepared to release his subjects from their oath of fealty to him, and the clergy gathered again in Winchester after Easter to declare the Empress "Lady of England and Normandy" as a precursor to her coronation. When Matilda advanced to London in an effort to stage her coronation in June, though, she faced an uprising by the local citizens in support of Stephen that forced her to flee to Oxford, uncrowned. Once news of Stephen's capture reached him, Geoffrey of Anjou invaded Normandy again and, in the absence of Waleran of Beaumont, who was still fighting in England, Geoffrey took all the duchy south of the river Seine and east of the river Risle. No help was forthcoming from Stephen's brother Theobald this time either, who appears to have been preoccupied with his own problems with France—the new French king, Louis VII, had rejected his father's regional alliance, improving relations with Anjou and taking a more bellicose line with Theobald, which would result in war the following year. Geoffrey's success in Normandy and Stephen's weakness in England began to influence the loyalty of many Anglo-Norman barons, who feared losing their lands in England to Robert and the Empress, and their possessions in Normandy to Geoffrey. Many started to leave Stephen's faction. His friend and advisor Waleran was one of those who decided to defect in mid-1141, crossing into Normandy to secure his ancestral possessions by allying himself with the Angevins, and bringing Worcestershire into the Empress's camp. Waleran's twin brother, Robert of Leicester, effectively withdrew from fighting in the conflict at the same time. Other supporters of the Empress were restored in their former strongholds, such as Bishop Nigel of Ely, or received new earldoms in the west of England. The royal control over the minting of coins broke down, leading to coins being struck by local barons and bishops across the country. Stephen's wife Matilda played a critical part in keeping the King's cause alive during his captivity. Queen Matilda gathered Stephen's remaining lieutenants around her and the royal family in the south-east, advancing into London when the population rejected the Empress. Stephen's long-standing commander William of Ypres remained with the Queen in London; William Martel, the royal steward, commanded operations from Sherborne in Dorset, and Faramus of Boulogne ran the royal household. The Queen appears to have generated genuine sympathy and support from Stephen's more loyal followers. Henry's alliance with the Empress proved short-lived, as they soon fell out over political patronage and ecclesiastical policy; the bishop met the Queen at Guildford and transferred his support to her. The King's eventual release resulted from the Angevin defeat at the rout of Winchester. Robert of Gloucester and the Empress besieged Henry in the city of Winchester in July. Queen Matilda and William of Ypres then encircled the Angevin forces with their own army, reinforced with fresh troops from London. In the subsequent battle the Empress's forces were defeated and Robert of Gloucester himself was taken prisoner. Further negotiations attempted to deliver a general peace agreement but the Queen was unwilling to offer any compromise to the Empress, and Robert refused to accept any offer to encourage him to change sides to Stephen. Instead, in November the two sides simply exchanged Robert and the King, with Stephen releasing Robert on 1 November 1141. Stephen began re-establishing his authority. Henry held another church council, which this time reaffirmed Stephen's legitimacy to rule, and a fresh coronation of Stephen and Matilda occurred at Christmas 1141. At the beginning of 1142 Stephen fell ill, and by Easter rumours had begun to circulate that he had died. Possibly this illness was the result of his imprisonment the previous year, but he finally recovered and travelled north to raise new forces and to successfully convince Ranulf of Chester to change sides once again. Stephen then spent the summer attacking some of the new Angevin castles built the previous year, including Cirencester, Bampton and Wareham. In September, he spotted an opportunity to seize the Empress Matilda herself in Oxford. Oxford was a secure town, protected by walls and the river Isis, but Stephen led a sudden attack across the river, leading the charge and swimming part of the way. Once on the other side, the King and his men stormed into the town, trapping the Empress in the castle. Oxford Castle, however, was a powerful fortress and, rather than storming it, Stephen had to settle down for a long siege, albeit secure in the knowledge that Matilda was now surrounded. Just before Christmas, the Empress left the castle unobserved, crossed the icy river on foot and made her escape to Wallingford. The garrison surrendered shortly afterwards, but Stephen had lost an opportunity to capture his principal opponent. Stalemate (1143–46) The war between the two sides in England reached a stalemate in the mid-1140s, while Geoffrey of Anjou consolidated his hold on power in Normandy. 1143 started precariously for Stephen when he was besieged by Robert of Gloucester at Wilton Castle, an assembly point for royal forces in Herefordshire. Stephen attempted to break out and escape, resulting in the battle of Wilton. Once again, the Angevin cavalry proved too strong, and for a moment it appeared that Stephen might be captured for a second time. On this occasion, however, William Martel, Stephen's steward, made a fierce rear guard effort, allowing Stephen to escape from the battlefield. Stephen valued William's loyalty sufficiently to agree to exchange Sherborne Castle for his safe release—this was one of the few instances where Stephen was prepared to give up a castle to ransom one of his men. In late 1143, Stephen faced a new threat in the east, when Geoffrey de Mandeville, Earl of Essex, rose up in rebellion against him in East Anglia. The King had disliked the Earl for several years, and provoked the conflict by summoning Geoffrey to court, where the King arrested him. He threatened to execute Geoffrey unless the Earl handed over his various castles, including the Tower of London, Saffron Walden and Pleshey, all important fortifications because they were in, or close to, London. Geoffrey gave in, but once free he headed north-east into the Fens to the Isle of Ely, from where he began a military campaign against Cambridge, with the intention of progressing south towards London. With all of his other problems and with Hugh Bigod, 1st Earl of Norfolk, in open revolt in Norfolk, Stephen lacked the resources to track Geoffrey down in the Fens and made do with building a screen of castles between Ely and London, including Burwell Castle. For a period, the situation continued to worsen. Ranulf of Chester revolted once again in the summer of 1144, splitting up Stephen's Honour of Lancaster between himself and Prince Henry. In the west, Robert of Gloucester and his followers continued to raid the surrounding royalist territories, and Wallingford Castle remained a secure Angevin stronghold, too close to London for comfort. Meanwhile, Geoffrey of Anjou finished securing his hold on southern Normandy and in January 1144 he advanced into Rouen, the capital of the duchy, concluding his campaign. Louis VII recognised him as Duke of Normandy shortly after. By this |
Yamato, its crew, and the Wave Motion Gun, which came from Sexaroid, an erotic comedy manga written by Matsumoto in 1968. In the earliest stages of production, Space Battleship Yamato was planned to be 52 episodes in length, before reducing this to 39, and ultimately, 26. The bulk of the cut content centered around Gamilas, who had more characters, and more complex motivations and goals. Additionally, in this earlier stage, the Yamato's battles were more closely tied to events in World War II – for example, the battle near Neptune in the first episode represented Germany circumventing the Maginot Line. The first draft for Space Battleship Yamato was completed on May 21, 1974. In August, a ten minute pilot episode was created, with at least nine copies being sent to the relevant organisations, and, after the pilot's success, pre-production of the anime began, with the first episode airing in October that year. The original series contained 26 episodes, following the Yamatos voyage out of the Milky Way and back again. A continuing story, it featured the declining health of Yamatos Captain Okita (Avatar in the Star Blazers dub), and the transformation of the brash young orphan Susumu Kodai (Derek Wildstar) into a mature officer, as well as his budding romance with female crewmember Yuki Mori (Nova Forrester). The foreign edits tend to play up the individual characters, while the Japanese original is often more focused on the ship itself. In a speech at the 1995 Anime Expo, series episode director Noboru Ishiguro said low ratings and high production expenses forced producer Yoshinobu Nishizaki to trim down the episode count from the original 39 episodes to only 26. The cut episodes would have introduced Captain Harlock as a new series character. Plot In the year 2199, an alien race known as Gamilas (Gamilons in the English Star Blazers dub) unleash radioactive meteorite bombs on Earth, rendering the planet's surface uninhabitable. Humanity has retreated into deep underground cities, but the radioactivity is slowly affecting them as well, with humanity's extinction estimated in one year. Earth has a space fleet, but they do not yet have interstellar capability, and they are hopelessly outclassed by Gamilas. All seems lost until a message capsule from a mysterious crashed spaceship is retrieved on Mars. The capsule yields blueprints for a faster-than-light engine and an offering of help from Queen Starsha of the planet Iscandar in the Large Magellanic Cloud. She says that her planet has a device, the Cosmo-Cleaner D (Cosmo DNA), which can cleanse Earth of its radiation damage. The inhabitants of Earth secretly build a massive spaceship inside the ruins of the gigantic Japanese battleship Yamato which lies exposed at the former bottom of the ocean location where she was sunk in World War II. This becomes the "Space Battleship Yamato" for which the story is titled. In the English Star Blazers dub, the ship is noted as being the historical Yamato, but is then renamed the Argo (after the ship of Jason and the Argonauts). Using Starsha's blueprints, they equip the new ship with a space warp drive, called the "wave motion engine", and in an apparently unexpected move, weaponize the technology to create a new, incredibly powerful weapon at the bow called the "Wave Motion Gun". The is capable of converting tachyon particles which travel faster than light and enables the Yamato to "ride" the wave of tachyons and travel faster than light. The , also called the Dimensional Wave Motion Explosive Compression Emitter, is the "trump card" of the Yamato that functions by connecting the Wave Motion Engine to the enormous firing gate at the ship's bow, enabling the tachyon energy power of the engine to be fired in a stream directly forwards. Enormously powerful, it can vaporize a fleet of enemy ships—or a small continent (as seen in the first season, fifth episode)—with one shot; however, it takes a brief but critical period to charge before firing. A crew of 114 departs for Iscandar in the Yamato to retrieve the radiation-removing device and return to Earth within the one-year deadline. Along the way, they discover the motives of their blue-skinned adversaries: the planet Gamilas, sister planet to Iscandar, is dying; and its leader, Lord Dessler (Desslok in the Star Blazers dub), is trying to irradiate Earth enough for his people to move there, at the expense of the "barbarians" he considers humanity to be. Film edition The series was condensed into a 130-minute-long movie by combining elements from a few key episodes of the first season. Additional animation was created for the movie (such as the scenes on Iscandar) or recycled from the series' test footage (such as the opening sequence). The movie, which was released in Japan on August 6, 1977, was edited down further and dubbed into English in 1978; entitled Space Cruiser Yamato or simply Space Cruiser, it was only given a limited theatrical release in Europe and Latin America, where it was called (Star Patrol, in Brazilian Portuguese) or (Starship Intrepid, in Spanish), though it was later released on video in most countries. Fictional chronology 2199–2200: Space Battleship Yamato (1974–1975), Yamato the Movie (1977), Space Battleship Yamato (2010, live action version), Yamato 2199 (2012–2013), Space Battleship Yamato 2199: Odyssey of the Celestial Ark (2014) 2201: Farewell to Space Battleship Yamato (1978), Space Battleship Yamato II (1978–1979), Yamato: The New Voyage (1979) 2202: Be Forever Yamato (1980), Yamato 2202 (2017–2019) 2203: Space Battleship Yamato III (1980–1981), Final Yamato (1983) 2205: Yamato 2205 (2021–2022) 2220: Space Battleship Yamato: Resurrection (2009) 2520: Yamato 2520 (1995–1996) 3199: Great Yamato No. 0 (2004–2007) Sequels Farewell to Space Battleship Yamato (1978) The success of the Yamato movie in Japan eclipsed that of the local release of Star Wars, leading to the production of a second movie that would end the story. Also going by the name Yamato, Farewell to Space Battleship Yamato, set in the year 2201, shows the Yamato crew going up against the White Comet Empire, a mobile city fortress called Gatlantis, from the Andromeda Galaxy. A titanic space battle results in the crew going out on a suicide mission to save humanity. The film has been considered as a non-canonical, alternate timeline. Space Battleship Yamato II (1978) Viewer dissatisfaction with the ending of Farewell to Space Battleship Yamato prompted the production of a second Yamato television season which retconned the film and presented a slightly different plot against Zōdah (Prince Zordar in the Star Blazers dub) and his Comet Empire, and ended without killing off the Yamato or its primary characters. Like Farewell, the story is set in the year 2201, and expands the film story to 26 episodes. This second season featured additional plots such as a love story between Teresa (Trelaina) and Yamato crew member Daisuke Shima (Mark Venture), and an onboard antagonism between Kodai and Saito (Knox), leader of a group of space marines. Footage from Farewell to Space Battleship Yamato was reused in the second season, particularly in the opening titles. The sequence of the Yamato launching from water was also reused in two of the subsequent movies. Yamato: The New Voyage (1979) The television movie Yamato: The New Voyage (aka Yamato: The New Journey), came next, featuring a new enemy, the Black Nebula Empire. The story opens in late 2201. In the film, later modified into a theatrical movie, Dessler sees his homeworld, Gamilas, destroyed by the grey-skinned aliens, and its twin planet Iscandar next in line for invasion. He finds an eventual ally in the Yamato, then on a training mission under deputy captain Kodai. Be Forever Yamato (1980) The theatrical movie Be Forever Yamato, set in the year 2202, sees the Black Nebula Empire launch a powerful weapon at Earth, a hyperon bomb which will annihilate humanity if they resist a full-scale invasion. The Yamato, under new captain, Yamanami, travels to the aliens' home galaxy only to discover what appears to be a future Earth—defeated and ruled by the enemy. Appearing in this film is Sasha, the daughter of Queen Starsha of Iscandar and Mamoru Kodai (Susumu's older brother). Space Battleship Yamato III (1980) Following these movies, a third season of the television series was produced, broadcast on Japanese television in 1980. Its date was not mentioned in the broadcast, but design documents, as well as anime industry publications, cited the year 2205 as the time it takes place. In the story, the Sun is hit by a stray proton missile from a nearby battle between forces of the Galman Empire and Bolar Federation. This missile greatly accelerates nuclear fusion in the Sun, and humanity must either evacuate to a new home or find a means of preventing a supernova. During the course of the story, it is learned that the people of the Galman Empire are actually the forebears of Dessler and the Gamilas race. Dessler and the remnants of his space fleet have found and liberated Galman from the Bolar Federation. Originally conceived as a 52-episode story, funding cuts meant the season had to be truncated to 25 episodes, with a corresponding loss of overall story development. This third season was adapted into English several years after the original Star Blazers run and, to the dissatisfaction of fans, used different voice actors than the earlier seasons. Final Yamato (1983) Premiering in Japanese theaters on March 19, 1983, Final Yamato reunites the crew one more time to combat the threat of the Denguilu, a militaristic alien civilization that intends to use the water planet, Aquarius, to flood Earth and resettle there, having lost their home planet to a galactic collision. Captain Okita, who was found to be in cryogenic sleep since the first season, returns to command the Yamato and sacrifices himself to stop the Denguili's plan. Kodai and Yuki also get married. The story is set in the year 2203, contradicting earlier assumptions that its predecessor, Yamato III, took place in 2205. Yamato 2520 (1994) In the mid-1990s, Nishizaki attempted to create a sequel to Yamato, set hundreds of years after the original. Yamato 2520 was to chronicle the adventures of the eighteenth starship to bear the name, and its battle against the Seiren Federation. Much of the continuity established in the original series (including the destruction of Earth's moon) is ignored in this sequel. In place of Leiji Matsumoto, American artist Syd Mead, known for works such as ∀ Gundam, and Blade Runner, provided the conceptual art. Due to the bankruptcy of Nishizaki's company Office Academy (former Academy Productions), and legal disputes with Matsumoto over the ownership of the Yamato copyrights, the series was never finished and only three episodes were produced, which were only released on home video. Space Battleship Great Yamato (2000) is a graphic novel comic created by the animator Leiji Matsumoto. It was temporarily available for streaming online. New Space Battleship Yamato (2004, cancelled) In March 2002, a Tokyo court ruled that Yoshinobu Nishizaki legally owned the Yamato copyrights. Nishizaki and Matsumoto eventually settled, and Nishizaki pushed ahead with developing a new Yamato television series. Project proposals for a 26-episode television series were drawn up in early 2004, but no further work was done with Tohoku Shinsha not backing the project. American series expert Tim Eldred was able to secure a complete package of art, mecha designs, and story outline at an auction over Japanese store Mandarake in April 2014. Set 20 years after Final Yamato, the series would have shown Susumu Kodai leading a salvage operation for the remains of the Yamato. The ship is rebuilt as the Earth Defense Force builds a second Space Battleship Yamato to | salvage operation for the remains of the Yamato. The ship is rebuilt as the Earth Defense Force builds a second Space Battleship Yamato to combat the Balbard Empire, an alien race that has erected a massive honeycombed cage called Ru Sak Gar over Earth, in a bid to stop the human race's spacefaring efforts. A feature film to be released after the series ended would have featured the original space battleship fighting the Balbards' attempt to launch a black hole at Earth. Kodai, Yuki, and Sanada are the only original series characters who would have returned in the series. Great Yamato No. Zero (2004) is the second original animated video based on Space Battleship Yamato. It was released in five episodes from 2004 to 2007. The story begins in 3199, when a mighty enemy attacks the Milky Way from a neighbouring galaxy, and defeats the Milky Way Alliance, reducing them to just six fleets. After the Alliance headquarters is destroyed, and when the collapse of the central Milky Way Alliance is imminent, the Great Yamato "Zero" embarks on a mission to assist the Milky Way Alliance in one last great battle. Yamato: Resurrection (2009) Although New Space Battleship Yamato was abandoned, Nishizaki promptly began work on a new movie titled , set after the original series, while Matsumoto planned a new Yamato series. However, additional legal conflicts stalled both projects until August 2008, when Nishizaki announced plans for the release of his film on December 12, 2009. Set 17 years after the events of Final Yamato, Resurrection brings together some members of the Yamato crew, who lead Earth's inhabitants to resettle in a far-flung star system after a black hole which will destroy the solar system in three months is discovered. Remakes Live-action film (2010) Released on December 1, 2010, Space Battleship Yamato is the franchise's first live-action film. Directed by Takashi Yamazaki, the movie stars Takuya Kimura as Susumu Kodai and Meisa Kuroki as Yuki. It was revealed originally that the plot would be based on that of the 1974 series. However, an official trailer released during June 2010 on Japanese television has also shown elements from the series' second season (1978). The film had a budget of over ¥2 billion, and was the fourth highest grossing Japanese live-action film of the year, and the 31st highest grossing Japanese film of all time at the time of release. Yamato 2199 (2012) Debuting in Japanese cinemas on April 7, 2012, 2199 is a remake of the 1974 series. Yutaka Izubuchi serves as supervising director, with character designs by Nobuteru Yuki, and Junichiro Tamamori and Makoto Kobayashi in charge of mecha and conceptual designs. The series is a joint project of Xebec and AIC. Hideaki Anno designed the new series' opening sequence. Yamato 2202 (2017) The sequel to the first remake heptalogy, and debuting in Japanese cinemas on February 25, 2017, 2202 is a remake of the second series, with Nobuyoshi Habara as director and Harutoshi Fukui as writer. Most of the staff and original cast from the first remake were brought back to the project. It is animated by Xebec. Yamato 2205 (2021) The sequel to the second remake heptalogy, it debuted in Japanese cinemas on October 8, 2021. 2205 is a remake of the film Space Battleship Yamato: The New Voyage. Kenji Yasuda directed the film while Harutoshi Fukui returned as writer. It is be the first Yamato work animated by Satelight. Be Forever Yamato: REBEL 3199 An upcoming sequel in the remake series, 3199 is presumably a remake of Be Forever Yamato with which it shares a subtitle. Staff is currently unannounced. Timeline(s) With the retelling of Farewell to Space Battleship Yamato as the open-ended Yamato II television series (ending in late 2201), Farewell to Space Battleship Yamato was redesignated as a discardable, alternate timeline. The follow-on film, Yamato: The New Voyage, took place in late 2201; and its successor, Be Forever Yamato, in early 2202. Yamato III was commonly believed to be set in 2205 (several printed publications used this date, although it was never stated in the show's broadcast). But the following film, Final Yamato, was set in 2203. The opening narration of Final mentioned the Bolar/Galman conflict, implying that the date for Yamato III was to be regarded as some time between 2202 and 2203 (making for an unrealistic and compressed timeline). It is not known if this change was due to the lackluster response to Yamato III, the production staff's dissatisfaction with the truncated series (additionally, Nishizaki and Matsumoto had limited involvement with it), or a mere oversight. In 2220, the ship is rebuilt following the events of Final Yamato. The new captain of the ship is Susumu Kodai, who was the main character in the previous movies. It is stated in Space Battleship Yamato: Resurrection that it is set 17 years after Final Yamato. Staff Video games Arcade game Space Battleship Yamato was a 1985 Japanese exclusive Laserdisc video game designed by Taito which was based on the television series of the same name. Game Machine listed Space Battleship Yamato on their August 1, 1985 issue as being the second most-successful upright/cockpit arcade unit of the month. Space Battleship Yamato (Nintendo Game Boy) Released in 1992 for the Game Boy, Space Battleship Yamato is a turn-based strategy game, with the player fighting against Dessler. The player can move a few places on the battlefield at a time, and, if they encounter an enemy, it will start a shoot 'em up section that they must complete without losing all their Cosmo Tigers in order to advance. The Faraway Planet Iscandar Released in 1999 for the PlayStation, the game's story is based loosely on events from Leiji Matsumoto's manga. The game requires the player to manage the Yamato, and its crew, flying the ship, attacking enemies, and using individual crewmen to invade enemy territory. Farewell to Space Battleship Yamato, Soldiers of Love Released in 2000 for the PlayStation, this game is based on the events of Farewell to Space Battleship Yamato. It features the same basic gameplay as The Faraway Planet Iscandar, but allows for a branching story, with events coming from either Farewell to Space Battleship Yamato or Space Battleship Yamato II. The Reminiscences for Planet Iscandar The first PlayStation 2 Yamato game, released in 2004, The Reminiscences for Planet Iscandar is more action-oriented than previous titles, focusing more on combat between the Yamato and Gamilas, rather than micromanaging the crew, though it is heavy on dialogue and cutscenes, which make up the majority of the content of the game. Counterattack of the Dark Nebula A 2005 game, and the first Yamato game to be a third-person shooter, but still offers a branching story like the other games. Pachinko games Three pachinko games for Space Battleship Yamato have been created, released in 2007, 2009, and 2013. Typing games Three separate Yamato typing games have been released – Typing Wave-Motion Gun (2000), Typing Warp (2001), and Typing Dispersion Wave-Motion Gun (2001). Merchandise Due to its extensive financial success, Space Battleship Yamato has since its release seen a long line of merchandise. Starting in 1974, many Yamato-themed products have been sold, including clothing, tableware, stationery, and models of the characters, with the Cosmo Tigers and Yamato itself receiving particular attention. Additionally, models of Dessler's fleet were available, and at the time it was uncommon for the villain's ships or mecha to be sold. Bandai was responsible for most of the merchandising, and their choice to sponsor Space Battleship Yamato at such an early stage of its production is considered influential in the company's financial success. Bandai produced an extensive number of models of the Yamato, in a variety of sizes, the largest, and most elaborate one being a 70 cm (27.5 inch) model released in 2007. The ship comes with a remote control, designed to look like the Wave-Motion Gun's pistol grip, with which the Yamato's shutters, main and auxiliary guns, pulse lasers, and Wave-Motion Gun can all be interacted with. The ship was sold for ¥47,250 ($450). Legacy and impact Initially, Space Battleship Yamato was ignored – the original 1974 anime was forced to halve its episode count due to low ratings and viewership. However, with the release of the 1977 film, it had a surge in popularity, and ultimately achieved a cult status. During the original broadcast, despite the general lack of interest, Leiji Matsumoto received a "very surprising" amount of fan mail from women who had watched the show, which came as a surprise due to the fact he had intended for it to be watched mostly by a male audience. Prior to the release of Yamato in 1974, anime was called terebi manga (TV manga). The success of Yamato, both because of its tone and themes that were ambitious for an anime at that time, and the fact it was an original work, made it influential in the move towards the term anime. Cultural impact Space Battleship Yamato is one of the most influential anime series in Japan. Its turn toward serious themes and complex storylines influenced future works in the genre, including Gundam, Evangelion, and Macross. Yamato would go on to influence many later anime, including Mobile Suit Gundam and Neon Genesis Evangelion. Its popularity subsequently lead to various parodies and references, such as in Sgt. Frog, Haruhi Suzumiya and Space Battleship Tiramisu. Hideaki Anno has |
membrane and gel), to ensure good and even contact between gel and membrane. If transferring by suction, 20X SSC buffer is used to ensure a seal and prevent drying of the gel. Buffer transfer by capillary action from a region of high water potential to a region of low water potential (usually filter paper and paper tissues) is then used to move the DNA from the gel onto the membrane; ion exchange interactions bind the DNA to the membrane due to the negative charge of the DNA and positive charge of the membrane. The membrane is then baked in a vacuum or regular oven at 80 °C for 2 hours (standard conditions; nitrocellulose or nylon membrane) or exposed to ultraviolet radiation (nylon membrane) to permanently attach the transferred DNA to the membrane. The membrane is then exposed to a hybridization probe—a single DNA fragment with a specific sequence whose presence in the target DNA is to be determined. The probe DNA is labelled so that it can be detected, usually by incorporating radioactivity or tagging the molecule with a fluorescent or chromogenic dye. In some cases, the hybridization probe may be made from RNA, rather than DNA. To ensure the specificity of the binding of the probe to the sample DNA, most common hybridization methods use salmon or herring sperm DNA for blocking of the membrane surface and target DNA, deionized formamide, and detergents such as SDS to reduce non-specific binding of the probe. After hybridization, excess probe is washed from the membrane (typically using SSC buffer), and the pattern of hybridization is visualized on X-ray film by autoradiography in the case of a radioactive or fluorescent probe, or by development of colour on the membrane if a chromogenic detection method is used. Result Hybridization of the probe to a specific DNA fragment on the filter membrane indicates that this fragment contains DNA sequence that is complementary to the probe. The transfer step of the DNA from the electrophoresis gel to a membrane permits easy binding of the labeled hybridization probe to the size-fractionated DNA. It also allows for the fixation of the target-probe hybrids, required for analysis by autoradiography or other detection methods. Southern blots performed with restriction enzyme-digested genomic DNA may be used | similar principles, but using RNA or protein, have later been named in reference to Edwin Southern's name. As the label is eponymous, Southern is capitalised, as is conventional of proper nouns. The names for other blotting methods may follow this convention, by analogy. Method Restriction endonucleases are used to cut high-molecular-weight DNA strands into smaller fragments. The DNA fragments are then electrophoresed on an agarose gel to separate them by size. If some of the DNA fragments are larger than 15 kb, then prior to blotting, the gel may be treated with an acid, such as dilute HCl. This depurinates the DNA fragments, breaking the DNA into smaller pieces, thereby allowing more efficient transfer from the gel to membrane. If alkaline transfer methods are used, the DNA gel is placed into an alkaline solution (typically containing sodium hydroxide) to denature the double-stranded DNA. The denaturation in an alkaline environment may improve binding of the negatively charged thymine residues of DNA to a positively charged amino groups of membrane, separating it into single DNA strands for later hybridization to the probe (see below), and destroys any residual RNA that may still be present in the DNA. The choice of alkaline over neutral transfer methods, however, is often empirical and may result in equivalent results. A sheet of nitrocellulose (or, alternatively, nylon) membrane is placed on top of (or below, depending on the direction of the transfer) the gel. Pressure is applied evenly to the gel (either using suction, or by placing a stack of paper towels and a weight on top of the membrane and gel), to ensure good and even contact between gel and membrane. If transferring by suction, 20X SSC buffer is used to ensure a seal and prevent drying of the gel. Buffer transfer by capillary action from a region of high water potential to a region of low water potential (usually filter paper and paper tissues) is then used to move the DNA from the gel onto the membrane; ion exchange interactions bind the DNA to the membrane due to the negative charge of the DNA and positive charge of the membrane. The membrane is then baked in a vacuum or regular oven at 80 °C for 2 hours (standard conditions; nitrocellulose or nylon membrane) or exposed to ultraviolet radiation (nylon membrane) to permanently attach the transferred DNA to the membrane. The membrane is then exposed to a hybridization probe—a single DNA fragment with a specific sequence whose presence in the target DNA is to be determined. The probe DNA is labelled so that it can be detected, usually by incorporating radioactivity or tagging the molecule with a fluorescent or chromogenic dye. In some cases, the hybridization probe may be made from RNA, rather than DNA. To ensure the specificity of the binding of the probe to the sample DNA, most common hybridization methods use salmon or herring sperm DNA for blocking of the membrane surface and target DNA, deionized formamide, |
were already in use on the wagonways in the mines. The railway used this gauge for 15 years before a change was made to the gauge. The historic Mount Washington Cog Railway, the world's first mountain-climbing rack railway, is still in operation in the 21st century, and has used the earlier gauge since its inauguration in 1868. George Stephenson used the gauge (including a belated extra of free movement to reduce binding on curves) for the Liverpool and Manchester Railway, authorised in 1826 and opened 30 September 1830. The success of this project led to Stephenson and his son Robert being employed to engineer several other larger railway projects. Thus the gauge became widespread and dominant in Britain. Robert was reported to have said that if he had had a second chance to choose a standard gauge, he would have chosen one wider than . "I would take a few inches more, but a very few". During the "gauge war" with the Great Western Railway, standard gauge was called narrow gauge, in contrast to the Great Western's broad gauge. The modern use of the term "narrow gauge" for gauges less than standard did not arise for many years, until the first such locomotive-hauled passenger railway, the Ffestiniog Railway was built. Adoption In 1845, in the United Kingdom of Great Britain and Ireland, a Royal Commission on Railway Gauges reported in favour of a standard gauge. The subsequent Gauge Act ruled that new passenger-carrying railways in Great Britain should be built to a standard gauge of , and those in Ireland to a new standard gauge of . In Great Britain, Stephenson's gauge was chosen on the grounds that existing lines of this gauge were eight times longer than those of the rival (later ) gauge adopted principally by the Great Western Railway. It allowed the broad-gauge companies in Great Britain to continue with their tracks and expand their networks within the "Limits of Deviation" and the exceptions defined in the Act. After an intervening period of mixed-gauge operation (tracks were laid with three rails), the Great Western Railway finally completed the conversion of its network to standard gauge in 1892. In North East England, some early lines in colliery (coal mining) areas were , while in Scotland some early lines were . All these lines had been widened to standard gauge by 1846. The British gauges converged starting from 1846 as the advantages of equipment interchange became increasingly apparent. By the 1890s, the entire network was converted to standard gauge. The Royal Commission made no comment about small lines narrower than standard gauge (to be called "narrow gauge"), such as the Ffestiniog Railway. Thus it permitted a future multiplicity of narrow gauges in the UK. It also made no comments about future gauges in British colonies, which allowed various gauges to be adopted across the colonies. Parts of the United States, mainly in the Northeast, adopted the same gauge, because some early trains were purchased from Britain. The American gauges converged, as the advantages of equipment interchange became increasingly apparent. Notably, all the broad gauge track in the South was converted to "almost standard" gauge over the course of two days beginning on 31 May 1886. See Track gauge in the United States. In continental Europe, France and Belgium adopted a gauge (measured between the midpoints of each rail's profile) for their early railways. The gauge between the interior edges of the rails (the measurement adopted from 1844) differed slightly between countries, and even between networks within a country (for example, to in France). The first tracks in Austria and in the Netherlands had other gauges ( in Austria for the Donau Moldau line and in the Netherlands for the Hollandsche IJzeren Spoorweg-Maatschappij), but for interoperability reasons (the first rail service between Paris and Berlin began in 1849, first Chaix timetable) Germany adopted standard gauges, as did most other European countries. The modern method of measuring rail gauge was agreed in the first Berne rail convention of 1886, according to the "Revue générale des chemins de fer, July 1928". Early railways by gauge Non-standard gauge Monkland and Kirkintilloch Railway, authorised 1824 and opened 1825, used . Dundee and Newtyle Railway, authorised 1829 and opened 1831, used . The Eastern Counties Railway, authorised on 4 July 1836, used The London and Blackwall Railway, authorised on 28 July 1836, used . The Dundee and Arbroath Railway, incorporated on 19 May 1836 and opened October 1838, used until standardised in 1847. The Arbroath and Forfar Railway, incorporated on 19 May 1836 and opened November 1838, used . The Northern and Eastern Railway, authorised on 4 July 1836, used gauge. Aberdeen Railway, opened 1848, used until standardised. Almost standard gauge The Huddersfield Corporation Tramways, used The Portsdown and Horndean Light Railway, used The Portsmouth Corporation Transport, used The Killingworth colliery railway, used . The Hetton colliery railway, opened 1822, used . The Stockton and Darlington Railway, authorised 1821, opened 1825, used . The New Orleans and Carrollton Railroad used The Pontchartrain Railroad used The trams in Nuremberg nominally used during much of their existence, but have since been converted to standard gauge in name as well as fact. Standard gauge The Baltimore and Ohio Railroad, begun 1827, opened 1830. The Liverpool and Manchester Railway, authorised 1824, opened 1830. The Saint-Étienne–Lyon railway, authorised 1826, opened 1833 (all the early French railways including Saint-Etienne Andrezieux, authorised 1823, opened 1827 had a French Gauge of from rail axis to rail axis, compatible with early standard gauge tolerances) The Dublin and Kingstown Railway, authorised 1831, opened for passenger traffic 1834. The Newcastle & Carlisle Railway, authorised 1829, opened 1834, isolated from LMR. The Grand Junction Railway, authorised 1833, opened 1837, connected to LMR. The London and Birmingham Railway, authorised 1833, opened 1838, connected to | and expanded, one of the key issues was the track gauge (the distance, or width, between the inner sides of the rails) to be used. Different railways used different gauges, and where rails of different gauge met – a "gauge break" – loads had to be unloaded from one set of rail cars and re-loaded onto another, a time-consuming and expensive process. The result was the adoption throughout a large part of the world of a "standard gauge" of , allowing interconnectivity and interoperability. Origins A popular legend that has been around since at least 1937 traces the origin of the gauge even further back than the coalfields of northern England, pointing to the evidence of rutted roads marked by chariot wheels dating from the Roman Empire. Snopes categorised this legend as "false", but commented that "it is perhaps more fairly labelled as 'True, but for trivial and unremarkable reasons. The historical tendency to place the wheels of horse-drawn vehicles approximately apart probably derives from the width needed to fit a carthorse in between the shafts. Research however has been undertaken which supports the hypothesis that "the origin of the standard gauge of the railway might result from an interval of wheel ruts of prehistoric ancient carriages". In addition, while road-travelling vehicles are typically measured from the outermost portions of the wheel rims (and there is some evidence that the first railways were measured in this way as well), it became apparent that for vehicles travelling on rails it was better to have main wheel flanges that fit inside the rails, and thus the minimum distance between the wheels (and, by extension, the inside faces of the rail heads) was the important one. There was never a standard gauge for horse railways but there were rough groupings: in the north of England none was less than . Wylam colliery's system, built before 1763, was , as was John Blenkinsop's Middleton Railway; the old plateway was relaid to so that Blenkinsop's engine could be used. Others were (in Beamish) or (in Bigges Main (in Wallsend), Kenton, and Coxlodge). The English railway pioneer George Stephenson spent much of his early engineering career working for the coal mines of County Durham. He favoured () for wagonways in Northumberland and Durham, and used it on his Killingworth line. The Hetton and Springwell wagonways also used this gauge. Stephenson's Stockton and Darlington railway (S&DR) was built primarily to transport coal from mines near Shildon to the port at Stockton-on-Tees. The initial gauge of was set to accommodate the existing gauge of hundreds of horse-drawn chaldron wagons that were already in use on the wagonways in the mines. The railway used this gauge for 15 years before a change was made to the gauge. The historic Mount Washington Cog Railway, the world's first mountain-climbing rack railway, is still in operation in the 21st century, and has used the earlier gauge since its inauguration in 1868. George Stephenson used the gauge (including a belated extra of free movement to reduce binding on curves) for the Liverpool and Manchester Railway, authorised in 1826 and opened 30 September 1830. The success of this project led to Stephenson and his son Robert being employed to engineer several other larger railway projects. Thus the gauge became widespread and dominant in Britain. Robert was reported to have said that if he had had a second chance to choose a standard gauge, he would have chosen one wider than . "I would take a few inches more, but a very few". During the "gauge war" with the Great Western Railway, standard gauge was called narrow gauge, in contrast to the Great Western's broad gauge. The modern use of the term "narrow gauge" for gauges less than standard did not arise for many years, until the first such locomotive-hauled passenger railway, the Ffestiniog Railway was built. Adoption In 1845, in the United Kingdom of Great Britain and Ireland, a Royal Commission on Railway Gauges reported in favour of a standard gauge. The subsequent Gauge Act ruled that new passenger-carrying railways in Great Britain should be built to a standard gauge of , and those in Ireland to a new standard gauge of . In Great Britain, Stephenson's gauge was chosen on the grounds that existing lines of this gauge were eight times longer than those of the rival (later ) gauge adopted principally by the Great Western Railway. It allowed the broad-gauge companies in Great Britain to continue with their tracks and expand their networks within the "Limits of Deviation" and the exceptions defined in the Act. After an intervening period of mixed-gauge operation (tracks were laid with three rails), the Great Western Railway finally completed the conversion of its network to standard gauge in 1892. In North East England, some early lines in colliery (coal mining) areas were , while in Scotland some early lines were . All these lines had been widened to standard gauge by 1846. The British gauges converged starting from 1846 as the advantages of equipment interchange became increasingly apparent. By the 1890s, the entire network was converted to standard gauge. The Royal Commission made no comment about small lines narrower than standard gauge (to be called "narrow gauge"), such as the Ffestiniog Railway. Thus it permitted a future multiplicity of narrow gauges in the UK. |
the number represented by n is specified in the name, for example laureth-2 sulfate. The product is heterogeneous in the number of ethoxyl groups, where n is the mean. Laureth-3 sulfate is the most common one in commercial products. Production SLES is prepared by ethoxylation of dodecyl alcohol, which is produced industrially from palm kernel oil or coconut oil. The resulting ethoxylate is converted to a half ester of sulfuric acid, which is neutralized by conversion to the sodium salt. The related surfactant sodium lauryl sulfate (also known as sodium dodecyl sulfate or SDS) is produced similarly, but without the ethoxylation step. SLS and ammonium lauryl sulfate (ALS) are commonly used alternatives to SLES in consumer products. Safety Tests in the US indicate that it is safe for consumer use. The Australian government's Department of Health and Ageing and its National Industrial Chemicals Notification and Assessment Scheme (NICNAS) have determined SLES does not react with DNA. Irritation Like many other detergents, SLES is an irritant. It has also been shown that SLES | or coconut oil. The resulting ethoxylate is converted to a half ester of sulfuric acid, which is neutralized by conversion to the sodium salt. The related surfactant sodium lauryl sulfate (also known as sodium dodecyl sulfate or SDS) is produced similarly, but without the ethoxylation step. SLS and ammonium lauryl sulfate (ALS) are commonly used alternatives to SLES in consumer products. Safety Tests in the US indicate that it is safe for consumer use. The Australian government's Department of Health and Ageing and its National Industrial Chemicals Notification and Assessment Scheme (NICNAS) have determined SLES does not react with DNA. Irritation Like many other detergents, SLES is an irritant. It has also been shown that SLES causes eye or skin irritation in experiments conducted on animals and humans. The related surfactant SLS is also a known irritant. 1,4-Dioxane contamination Some products containing SLES contain traces (up to 300 ppm) of 1,4-dioxane, which is formed as a by-product during the ethoxylation step of its production. 1,4-Dioxane is classified by the International Agency for Research on Cancer as |
Ghaggar-Hakra River, the possible remains of the Sarasvati River in India and Pakistan Saraswati River (Bengal), a distributary of the Hooghly River which was active till around | River (Bengal), a distributary of the Hooghly River which was active till around the 16th century AD Saraswati River |
to Adelaide, the links in his surveyor's chain ere found to have been stretched. Poeppel's border post was too far west by 300 m. In 1884, surveyor Larry Wells moved the post to its proper position on the eastern bank of Lake Poeppel. The tristate border is now known as Poeppel Corner. In January 1886, surveyor David Lindsay ventured into the desert from the western edge, in the process discovering and documenting, with the help of a Wangkangurru Aboriginal man, 9 native wells, and travelling as far east as the Queensland/Northern Territory border. In 1936, Ted Colson became the first nonindigenous person to cross the desert in its entirety, riding camels. The name Simpson Desert was coined by Cecil Madigan, after Alfred Allen Simpson, an Australian industrialist, philanthropist, and geographer, and president of the South Australian branch of the Royal Geographical Society of Australasia. Mr Simpson was the owner of the Simpson washing machine company. In September 1962, geologist Reg Sprigg, his wife Griselda, and their two children completed the first vehicular crossing of the desert. In 1980, Bob Beer became the first person to run across the Simpson. Beer ran 420 km across the desert in 6.5 days, starting at Alka Seltzer Bore, South Australia and finishing at Birdsville, Queensland. A documentary was made about this trip called “The Runner”. In 1984, Dennis Bartel was the first white man to successfully walk solo and unsupported west-to-east across the Simpson, 390 km in 24 days, relying on old Aboriginal wells for water. In 2006, Lucas Trihey was the first nonindigenous person to walk across the desert through the geographical centre away from vehicle tracks and unsupported. He carried all his equipment in a two-wheeled cart, and crossed from East Bore on the western edge of the desert to Birdsville in the east. In 2008, Michael Giacometti completed the first, and only, east-to-west walk across the Simpson Desert. Starting at Bedourie in Queensland, he walked solo and unsupported, towing all his equipment, food, and water in a two-wheeled cart to Old Andado homestead. Also in 2008, Belgian Louis-Philippe Loncke became the first non-indigenous person to complete a north–south crossing of the desert on foot, unsupported, and through the geographical centre. In 2016, explorer Sebastian Copeland and partner Mark George completed the longest unsupported latitudinal crossing (west-to-east across the dunes) of the Simpson They linked the Madigan Line, Colson Track and French Line for the first time, walking from Old Andado homestead to Birdsville, a distance of in 26 days. In 1967, the Queensland government established the Munga-Thirri National Park, formerly known as the Simpson Desert National Park. Access No maintained roads cross the desert. The Donohue Highway is an unpaved outback track passing from near Boulia towards the Northern Territory border in the north of the desert. Some tracks were created during seismic surveys in the search for gas and oil during the 1960s and 1970s. These include the French Line, the Rig Road, and the QAA Line. Such tracks are still navigable by well-equipped four-wheel drive vehicles that must carry extra fuel and water. Towns providing access to the South Australian edge of the Simpson Desert include Innamincka to the south and Oodnadatta to the southwest; and from the eastern (Queensland) side include Birdsville, Bedourie, Thargomindah, and Windorah. The last fuel on the western side is at the Mount Dare hotel and store. Before 1980, a section of | from Old Andado homestead to Birdsville, a distance of in 26 days. In 1967, the Queensland government established the Munga-Thirri National Park, formerly known as the Simpson Desert National Park. Access No maintained roads cross the desert. The Donohue Highway is an unpaved outback track passing from near Boulia towards the Northern Territory border in the north of the desert. Some tracks were created during seismic surveys in the search for gas and oil during the 1960s and 1970s. These include the French Line, the Rig Road, and the QAA Line. Such tracks are still navigable by well-equipped four-wheel drive vehicles that must carry extra fuel and water. Towns providing access to the South Australian edge of the Simpson Desert include Innamincka to the south and Oodnadatta to the southwest; and from the eastern (Queensland) side include Birdsville, Bedourie, Thargomindah, and Windorah. The last fuel on the western side is at the Mount Dare hotel and store. Before 1980, a section of the Commonwealth Railways Central Australian line passed along the western side of the Simpson Desert. Visitor attractions The desert is popular with tourists, particularly in winter, and popular landmarks include the ruins and mound springs at Dalhousie Springs, Purnie Bore wetlands, Approdinna Attora Knoll and Poeppel Corner (where Queensland, South Australia and the Northern Territory meet). Because of the excessive heat and inadequately experienced drivers attempting to access the desert in the past, the Department of Environment and Natural Resources has decided since 2008–2009 to close the Simpson Desert during the summer – to save unprepared "adventurers" from themselves. Another attraction is the Big Red Bash, which is billed as the most remote music festival on Earth. The event features concerts and a Big Red Bash drag race across sand dunes to raise money for the Royal Flying Doctor Service of Australia. The desert can also be crossed by bicycle. The Simpson Desert Bike Challenge crosses the Simpson Desert every year in September. Climate The area has an extremely hot, dry desert climate. Rainfall is minimal, averaging only about 150 mm per year and falling mainly in summer. Temperatures in summer can approach 50 °C and large sand storms are common. Winters are generally cool, but heatwaves even in the middle of July are not unheard of. Some of the heaviest rain in decades occurred during 2009–2010, and caused the Simpson Desert to burst into life and colour. In early March 2010, Birdsville recorded more rain in 24 hours than is usual in a whole year. Rain inundated Queensland's north-west and Gulf regions. In total, 17 million megalitres of water entered the State's western river systems, leading to Lake Eyre. In 2010, researchers uncovered the courses of ancient river systems under the desert. Ecology The Simpson Desert is also a large part of the World Wildlife Fund ecoregion of the same name, which consists of the Channel Country and the Simpson Strzelecki Dunefields bioregions of the Interim Biogeographic Regionalisation for Australia (IBRA). The flora of the Simpson Desert ecoregion is limited to drought-resistant shrubs and grasses, especially Zygochloa paradoxa grass that holds the dunes together and the spinifex and other tough grasses of side slopes and sandy desert floor between the dunes. The Channel Country section of the ecoregion lies to the northeast of the desert proper around the towns of Bedourie and Windorah in Queensland, and consists of low hills covered with Mitchell grass cut through with rivers lined with coolabah trees. The ecoregion also includes areas of rocky upland and seasonally wet clay and salt pans, particularly Lake Eyre, the centre of one of the largest inland drainage systems in the world, including the Georgina and Diamantina Rivers. Wildlife adapted to this hot, dry environment and seasonal flooding includes the water-holding frog (Litoria platycephala) and a number of reptiles that inhabit the desert grasses. Endemic mammals of the desert include the kowari (Dasycercus byrnei), while birds include the grey grasswren (Amytornis barbatus) and Eyrean grasswren (Amytornis goyderi). Lake Eyre and the other seasonal wetlands are important habitats for fish and birds, especially as a breeding ground for waterbirds, while the rivers are home to birds, bats, and frogs. The seasonal wetlands of the ecoregion include Lake Eyre and the Coongie Lakes, as well as the swamps that emerge when Cooper Creek, Strzelecki Creek, and the Diamantina River are in flood. The birds that use these wetlands include the freckled duck (Stictonetta naevosa), musk duck (Biziura lobata), silver gull (Larus novaehollandiae), Australian pelican (Pelecanus conspicillatus), great egret (Ardea alba), glossy ibis (Plegadis falcinellus), and banded stilt (Cladorhynchus leucocephalus). Also, the mound springs of the Great Artesian Basin are important habitat for a number of plants, fish, snails, and other invertebrates. Native vegetation is largely intact as the desert is uninhabitable, so habitats are not threatened by agriculture, but are damaged by introduced species, particularly rabbits and feral camels. The only human activity in the desert proper has been the construction of the gas pipelines, while the country on its fringes has been used for cattle grazing and contains towns such as Innamincka. Mound springs and other waterholes are vulnerable to overuse and damage. Protected areas of the ecoregion include the Simpson Desert, Goneaway, Lochern, Bladensburg, Witjira and Kati Thanda-Lake Eyre National Parks as well as the Innamincka Regional Reserve, and the Munga-Thirri–Simpson Desert National Park. Ethabuka Reserve is a nature reserve in the north of the desert owned and managed by Bush Heritage Australia. Dunefields The extensive dunefields of the Simpson Desert display a range of colours from brilliant white to dark red, and include pinks and oranges. Morphology The sand ridges have a trend of SSE-NNW and continue parallel for great distances. This pattern is seen throughout the deserts of Australia. Some of the ridges continue |
John W. Pitts. Stout Skycar, a series of four one-off light aircraft designed by William Bushnell Stout in the 1930s. Moller Skycar M400 a prototype American flying car | at vertical take-off flight by US inventor John W. Pitts. Stout Skycar, a series of four one-off light aircraft designed by William Bushnell Stout in the |
in descending order of population (as of 2019): Economy The gross domestic product (GDP) of the province was 61 billion € in 2018, accounting for 12.3% of the Polish economic output. GDP per capita adjusted for purchasing power was 22,200 € or 74% of the EU27 average in the same year. The GDP per employee was 83% of the EU average. Silesia Voivodship is the province with the fourth highest GDP per capita in Poland. The Silesian voivodship is predominantly an industrial region. Most of the mining is derived from one of the world's largest bituminous coalfields of the Upper Silesian Industrial District () and the Rybnik Coal District () with its major cities Rybnik, Jastrzębie Zdrój, Żory and Wodzisław Śląski. Lead and zinc can be found near Bytom, Zawiercie and Tarnowskie Góry; iron ore and raw materials for building – near Częstochowa. The most important regional industries are: mining, iron, lead and zinc metallurgy, power industry, engineering, automobile, chemical, building materials and textile. In the past, the Silesian economy was determined by coal mining. Now, considering the investment volume, car manufacturing is becoming more and more important. The most profitable company in the region is Fiat Auto-Poland S.A. in Bielsko-Biała with a revenue of PLN 6.2 billion in 1997. Recently a new car factory has been opened by GM Opel in Gliwice. There are two Special Economic Zones in the area: Katowice and Częstochowa. The voivodship's economy consists of about 323,000, mostly small and medium-sized, enterprises employing over 3 million people. The biggest Polish steel-works "Huta Katowice" is situated in Dąbrowa Górnicza. The unemployment rate stood at 3.9% in 2017 and was lower than the national average. Transport Katowice International Airport (in Tarnowskie Góry County) is used for domestic and international flights, Other Nearby Airports are John Paul II International Airport Kraków-Balice and Warsaw Frédéric Chopin Airport. The Silesian agglomeration railway network has the largest concentration in the country. The voivodship capital enjoys good railway and road connections with Gdańsk (motorway A1) and Ostrava (motorway A1), Kraków (motorway A4), Wrocław (motorway A4), Łódź (motorway A1) and Warsaw. It is also the crossing point for many international routes like E40 connecting Calais, Brussels, Cologne, Dresden, Wrocław, Kraków and Kiev and E75 from Scandinavia to the Balkans. A relatively short distance to Vienna facilitates cross-border co-operation and may positively influence the process of European integration. Linia Hutnicza Szerokotorowa (known by its acronym LHS, English: Broad gauge metallurgy line) in Sławków is the longest broad gauge railway line in Poland. The line runs on a single track for almost 400 km from the Polish-Ukrainian border, crossing it just east of Hrubieszów. It is the westernmost broad gauge railway line in Europe that is connected to the broad gauge rail system of the countries of the former Soviet Union. Education There are eleven public universities in the voivodship. The biggest university is the University of Silesia in Katowice, with 43,000 students. The region's capital boasts the Medical University, The Karol Adamiecki University of Economics in Katowice, the University of Music in Katowice, the Physical Education Academy and the Academy of Fine Arts. Częstochowa is the seat of the Częstochowa University of Technology and Pedagogic University. The Silesian University of Technology in Gliwice is nationally renowned. Bielsko-Biała is home of the Technical-Humanistic Academy. In addition, 17 new private schools have been established in the region. There are over 300,000 people currently studying in the Voivodeship. Politics The Silesian voivodeship's government is headed by the province's (governor) who is appointed by the Polish Prime Minister. The is then assisted in performing his duties by the voivodeship's marshal, who is the appointed speaker for the voivodeship's executive and is elected by the (provincial assembly). The current of Silesia is Jarosław Wieczorek, whilst the present marshal is Wojciech Saługa. The Sejmik of Silesia consists of 48 members. 2018 election Administrative division Silesian Voivodeship is divided into 36 counties (powiats). These include 19 city counties (far more than any other voivodeship) and 17 land counties. The counties are further divided into 167 gminas. The counties are listed in the following table (ordering within categories is by decreasing population). Protected areas Protected areas in Silesian Voivodeship include eight areas designated as Landscape Parks: Eagle Nests Landscape Park (partly in Lesser Poland Voivodeship) Little Beskids Landscape Park (partly in Lesser Poland Voivodeship) Rudy Landscape Park Silesian Beskids Landscape Park Stawki Landscape Park Upper Liswarta Forests Landscape Park Załęcze Landscape Park (partly in Łódź Voivodeship) Żywiec Landscape Park See also History of Silesia Silesian Uprisings References External links The Website | of the voivodeship are surrounded by a green belt. Bielsko-Biała is enveloped by the Beskidy Mountains which are popular with winter sports fans. It offers over 150 ski lifts and 200 kilometres of ski routes. More and more slopes are illuminated and equipped with artificial snow generators. Szczyrk, Brenna, Wisła and Ustroń are the most popular winter mountain resorts. Rock climbing sites can be found in Jura Krakowsko-Czestochowska. The ruins of castles forming the Eagle Nests Trail are a famous attraction of the region. Often visited is the Black Madonna's Jasna Góra Sanctuary in Częstochowa – the annual destination of over 4 million pilgrims from all over the world. In the south-western part of the voivodeship are parks, palaces and old monasteries (Rudy Raciborskie, Wodzisław Śląski). Along the Oder River are interesting natural reserves and places for swimming during the summer. With its more than two centuries of industrial history, the region has a number of technical heritage memorials. These include narrow and standard gauge railways, coal and silver mines, and shafts and their equipment from the 19th and 20th centuries. Cities and towns Due to its industrial and urban nature, the voivodeship has many cities and large towns. Of Poland's 40 most-populous cities, 12 are in Silesian Voivodeship. 19 of the cities in the voivodeship have the legal status of city-county (see powiat). In all it has 71 cities and towns (with legal city rights), listed below in descending order of population (as of 2019): Economy The gross domestic product (GDP) of the province was 61 billion € in 2018, accounting for 12.3% of the Polish economic output. GDP per capita adjusted for purchasing power was 22,200 € or 74% of the EU27 average in the same year. The GDP per employee was 83% of the EU average. Silesia Voivodship is the province with the fourth highest GDP per capita in Poland. The Silesian voivodship is predominantly an industrial region. Most of the mining is derived from one of the world's largest bituminous coalfields of the Upper Silesian Industrial District () and the Rybnik Coal District () with its major cities Rybnik, Jastrzębie Zdrój, Żory and Wodzisław Śląski. Lead and zinc can be found near Bytom, Zawiercie and Tarnowskie Góry; iron ore and raw materials for building – near Częstochowa. The most important regional industries are: mining, iron, lead and zinc metallurgy, power industry, engineering, automobile, chemical, building materials and textile. In the past, the Silesian economy was determined by coal mining. Now, considering the investment volume, car manufacturing is becoming more and more important. The most profitable company in the region is Fiat Auto-Poland S.A. in Bielsko-Biała with a revenue of PLN 6.2 billion in 1997. Recently a new car factory has been opened by GM Opel in Gliwice. There are two Special Economic Zones in the area: Katowice and Częstochowa. The voivodship's economy consists of about 323,000, mostly small and medium-sized, enterprises employing over 3 million people. The biggest Polish steel-works "Huta Katowice" is situated in Dąbrowa Górnicza. The unemployment rate stood at 3.9% in 2017 and was lower than the national average. Transport Katowice International Airport (in Tarnowskie Góry County) is used for domestic and international flights, Other Nearby Airports are John Paul II International Airport Kraków-Balice and Warsaw Frédéric Chopin Airport. The Silesian agglomeration railway network has the largest concentration in the country. The voivodship capital enjoys good railway and road connections with Gdańsk (motorway A1) and Ostrava (motorway A1), Kraków (motorway A4), Wrocław (motorway A4), Łódź (motorway A1) and Warsaw. It is also the crossing point for many international routes like E40 connecting Calais, Brussels, Cologne, Dresden, Wrocław, Kraków and Kiev and E75 from Scandinavia to the Balkans. A relatively short distance to Vienna facilitates cross-border co-operation and may positively influence the process of European integration. Linia Hutnicza Szerokotorowa (known by its acronym LHS, English: Broad gauge metallurgy line) in Sławków is the longest broad gauge railway line in Poland. The line runs on a single track for almost 400 km from the Polish-Ukrainian border, crossing it just east of Hrubieszów. It is the westernmost broad gauge railway line in Europe that is connected to the broad gauge rail system of the countries of the former Soviet Union. Education There are eleven public universities in the voivodship. The biggest university is the University of Silesia in Katowice, with 43,000 students. The region's capital boasts the Medical University, The Karol Adamiecki University of Economics in Katowice, the University of Music in Katowice, the Physical Education Academy and the Academy of Fine Arts. Częstochowa is the seat of the Częstochowa University of Technology and Pedagogic University. The Silesian University of Technology in Gliwice is nationally renowned. Bielsko-Biała is home of the Technical-Humanistic Academy. In addition, 17 new private schools have been established in the region. There are over 300,000 people currently studying in the Voivodeship. Politics The Silesian voivodeship's government |
be put on the dimension of the stack. The C register points at the head of the code or instruction list that will be evaluated. Once the instruction there has been executed, the C is pointed at the next instruction in the list—it is similar to an instruction pointer (or program counter) in conventional machines, except that subsequent instructions are always specified during execution and are not by default contained in subsequent memory locations, as is the case with the conventional machines. The current variable environment is managed by the E register, which points at a list of lists. Each individual list represents one environment level: the parameters of the current function are in the head of the list, variables that are free in the current function, but bound by a surrounding function, are in other elements of E. The dump, at whose head the D register points, is used as temporary storage for values of the other registers, for example during function calls. It can be likened to the return stack of other machines. The memory organization of the SECD machine is similar to the model used by most functional language interpreters: a number of memory cells, each of which can hold either an atom (a simple value, for example 13), or represent an empty or non-empty list. In the latter case, the cell holds two pointers to other cells, one representing the first element, the other representing the list except for the first element. The two pointers are traditionally named car and cdr respectively—but the more modern terms head and tail are often used instead. The different types of values that a cell can hold are distinguished by a tag. Often different types of atoms (integers, strings, etc.) are distinguished as well. So, a list holding the numbers 1, 2, and 3, usually written as (1 2 3), might be represented as follows: Address Tag Content (value for integers, car & cdr for lists) 9 [ integer | 2 ] 8 [ integer | 3 ] 7 [ list | 8 | 0 ] 6 [ list | 9 | 7 ] ... 2 [ list | 1 | 6 ] 1 [ integer | 1 ] 0 [ nil ] The memory cells 3 to 5 do not belong to our list, the cells of which can be distributed randomly over the memory. Cell 2 is the head of the list, it points to cell 1, which holds the first element's value, and the list containing only 2 and 3 (beginning at cell 6). Cell 6 points at a cell holding 2 and at cell 7, which represents the list containing only 3. It does so by pointing at cell 8 containing the value 3, and pointing at an empty list (nil) as cdr. In the SECD machine, cell 0 always implicitly represents the empty list, so no special tag value is needed to signal an empty list (everything needing that can simply point to cell 0). The principle that the cdr in a list cell must point at another list is just a convention. If both car and cdr point at atoms, that will yield a pair, usually written like (1 . 2) Instructions nil pushes a nil pointer onto the stack ldc pushes a constant argument onto the stack ld pushes the value of a variable onto the stack. The variable is indicated by the argument, a pair. The | [ integer | 2 ] 8 [ integer | 3 ] 7 [ list | 8 | 0 ] 6 [ list | 9 | 7 ] ... 2 [ list | 1 | 6 ] 1 [ integer | 1 ] 0 [ nil ] The memory cells 3 to 5 do not belong to our list, the cells of which can be distributed randomly over the memory. Cell 2 is the head of the list, it points to cell 1, which holds the first element's value, and the list containing only 2 and 3 (beginning at cell 6). Cell 6 points at a cell holding 2 and at cell 7, which represents the list containing only 3. It does so by pointing at cell 8 containing the value 3, and pointing at an empty list (nil) as cdr. In the SECD machine, cell 0 always implicitly represents the empty list, so no special tag value is needed to signal an empty list (everything needing that can simply point to cell 0). The principle that the cdr in a list cell must point at another list is just a convention. If both car and cdr point at atoms, that will yield a pair, usually written like (1 . 2) Instructions nil pushes a nil pointer onto the stack ldc pushes a constant argument onto the stack ld pushes the value of a variable onto the stack. The variable is indicated by the argument, a pair. The pair's car specifies the level, the cdr the position. So (1 . 3) gives the current function's (level 1) third parameter. sel expects two list arguments, and pops a value from the stack. The first list is executed if the popped value was non-nil, the second list otherwise. Before one of these list pointers is made the new C, a pointer to the instruction following is saved on the dump. join pops a list reference from the dump and makes this the new value of C. This instruction occurs at the end of both alternatives of a sel. ldf takes one list argument representing a function. It constructs a closure (a pair containing the function and the current environment) and pushes that onto the stack. ap pops a closure and a list of parameter values from the stack. The closure is applied to the parameters by installing its environment as the current one, pushing the parameter list in front of that, clearing the stack, and setting C to the closure's function pointer. The previous values of S, E, and the next value of C are saved on the dump. ret pops one return value from the stack, restores S, E, and C from the dump, and pushes the return value onto the now-current stack. dum pushes a "dummy", an empty list, in front of the environment list. rap works like , only that it replaces an occurrence of a dummy environment with the current one, thus making recursive functions possible A number of additional instructions for basic functions like car, cdr, list construction, integer addition, I/O, etc. exist. They all take any necessary parameters from the stack. See also Krivine machine References Further reading Danvy, Olivier. A Rational Deconstruction of Landin's SECD Machine. BRICS research report RS-04-30, 2004. ISSN 0909-0878 Field, Anthony J. Field and Peter G. Harrison. 1988 Functional Programming. Addison-Wesley. Graham, Brian T. 1992 "The SECD Microprocessor: A Verification Case Study". Springer. Kogge, Peter M. The Architecture of Symbolic Computers. External links SECD collection 1964 in computing Implementation of functional programming |
turn. A player must move a piece in his turn; there is no "pass" (as in the game of Go). Two zones in the middle of the board, each 2×2, cannot be entered by either player's pieces at any time. They are shown as lakes on the battlefield and serve as choke points to make frontal assaults less direct. The game can be won by capturing the opponent's Flag or all of his moveable pieces. It is possible to have ranked pieces that are not moveable because they are trapped behind bombs. In unusual cases, it is possible to draw, for example, when both players' flags are protected by bombs and each player has one remaining piece which is not a miner. The average game has 381 moves. The number of legal positions is 10115. The number of possible games is 10535. Stratego has many more moves and substantially greater complexity than other familiar games such as chess and backgammon; however, unlike those games where a single bad move at any point may result in loss of the game, most moves in Stratego are inconsequential. Rules of movement All movable pieces, with the exception of the Scout, may move only one step to any adjacent space vertically or horizontally (but not diagonally). A piece may not move onto a space occupied by a like-color piece. Bomb and Flag pieces are not moveable. The Scout may move any number of spaces in a straight line (such as the rook in chess). In the older versions of Stratego the Scout could not move and strike in the same turn; in newer versions this was allowed. Even before that, sanctioned play usually amended the original Scout movement to allow moving and striking in the same turn because it facilitates gameplay. No piece can move back and forth between the same two spaces for more than three consecutive turns (two square rule), nor can a piece endlessly chase a piece it has no hope of capturing (more square rule). When the player wants to attack, they move their piece onto a square occupied by an opposing piece. Both players then reveal their piece's rank; the weaker piece (see exceptions below) is removed from the board. If the engaging pieces are of equal rank, both are removed. A piece may not move onto a square already occupied unless it attacks. Two pieces have special attack powers. One special piece is the Bomb which only Miners can defuse. It immediately eliminates any other piece striking it, without itself being destroyed. Each player also has one Spy, which succeeds only if it attacks the Marshal or the Flag. If the Spy attacks any other piece, or is attacked by any piece (including the Marshal), the Spy is defeated. The original rules contained a provision that following a strike, the winning piece immediately occupies the space vacated by the losing piece. Recording the game Competitive play does not include recording the game, unlike chess. The game is fast-paced, no standard notation exists, and players keep their setups secret, so recording games is impractical. However, digital interfaces such as web-based gaming interfaces may have a facility for recording, replaying and downloading the game. Those interfaces use an algebraic-style notation that numbers the rows ('ranks') 1 to 10 from bottom to top and the columns ('files') A to J from left to right. Alternately, a few interfaces designate the files as A to K, omitting 'I'. Moves are recorded as source square followed by destination square separated by a "-" (move) or "x" (strike). Revealed pieces on strikes precede the square designation, and may be by either rank name or rank number for brevity, for example "major B2xcaptain B3". The bottom half of the board is by default considered to be the 'red' side, and the top half the 'blue' side. Strategy Unlike chess, Stratego is a game of incomplete information. In addition to calculated sequences of moves, this gives rise to aspects of battle psychology such as concealment, bluffing, lying in wait and guessing. Pieces Classic pieces There are seven immobile pieces – six Bombs and one Flag – and 33 mobile pieces per player. They can move to the adjacent square in horizontal or vertical direction, with exception of the Scout, which moves any distance. From highest rank to lowest the pieces are: {| class="wikitable" |- ! Rank || Piece || No. per player || Special properties |- | B || Bomb || 6 || Immovable; is captured by Miner |- | 10/1 ||Marshal || 1 || Can be captured by the Spy if the Spy attacks first. |- | 9/2 ||General || 1 || |- | 8/3 ||Colonel || 2 || |- | 7/4 ||Major || 3 || |- | 6/5 ||Captain || 4 || |- | 5/6 ||Lieutenant || 4 || |- | 4/7 ||Sergeant || 4 || |- | 3/8 ||Miner || 5 || Can defuse (i. e. capture) bombs |- | 2/9 ||Scout || 8 ||moves any distance in a horizontal or vertical straight line, without leaping over pieces/lakes |- | 1/S ||Spy || 1 || Defeats the Marshal, but only if the Spy makes the attack |- | F || Flag || 1 || Immovable; capturing the opponent's Flag wins the game |} The higher ranked piece always captures the lower, except when stated otherwise. Some versions (primarily those released since 2000) make 10 (the Marshal) the highest rank with the Spy ranked 1, while others (versions prior to 2000, as well as the Nostalgia version released in 2002) have the Marshal piece ranked at 1 and the Spy designated S. The European version depicts pieces with the lower number to be higher ranked, whereas the American version depicts pieces with the higher number to be higher ranked. Variant pieces Variant versions of the game have a few different pieces with different rules of movement, such as the Cannon, Archer (possibly a different name for the Cannon), Spotter, Infiltrator, Corporal and Cavalry Captain. In one version, mobile pieces are allowed to "carry" the Flag. In some variants such as Stratego Waterloo and Fire and Ice Stratego, all or most of the pieces have substantially different moves. History Japanese Military Chess Japanese Military Chess (:jp:軍人将棋) has been sold and played since as early as 1895, although it is unknown by whom and when it was invented. Dr. Chiristian Junghans reported this game in Monstshefte magazine in Germany in 1905. It seems, only after reading his article, Julie Berg took out a patent on a war game in London and Paris in 1907. Similarly, Hermance Edan took a patent for L'attaque game in 1909 and sold them in 1910. The main differences between Japanese Military Chess and Stratego are: Japanese Military Chess needs a referee to resolve the battles of the pieces. The Flag is placed only on the headquarters and a player who successfully occupied the headquarters of the opponent shall win the game. There are no Scout pieces,but Engineer can remove mines and tanks. French L'Attaque In nearly its present form Stratego appeared in France from La Samaritaine in 1910, and then in Britain before World War I, as a game called L'attaque. Historian and game collector Thierry Depaulis writes: It was in fact designed by a lady, Mademoiselle Hermance Edan, who filed a patent for a "jeu de bataille avec pièces mobiles sur damier" (a battle game with mobile pieces on a gameboard) on 1908-11-26. The patent was released by the French Patent Office in 1909 (patent #396.795). Hermance Edan had given no name to her game but a French manufacturer named Au Jeu Retrouvé was selling the game as L'Attaque as early as 1910. Depaulis further notes that the 1910 version was played with 36 pieces per player on a 9×10 board and the armies were divided into red and blue colors. The rules of L'attaque were basically the same as for the game we know as Stratego. It featured standing cardboard rectangular pieces, color printed with soldiers who wore contemporary (to 1900) uniforms, not Napoleonic uniforms. In papers of her estate, Ms. Edan states that she developed the game in the 1880s. L'attaque was later produced in England by game maker H.P. Gibson and Sons, who bought the rights to the game in 1925, at least until the 1970s, initially retaining the French name before changing it. The early H. P. Gibson & Sons games Dover Patrol – a naval warfare game on a board of 12×8 squares devised by Harry A. Gibson in 1911, but very similar to L'Attaque (and hence Stratego) Aviation (game) – an air battle variation designed by Harry Gibson in 1925, with a variant called Battle of Britain sold in the 1970s Tri-Tactics – a game combining land, sea and air warfare on a 12×12 board, with 56 pieces per person, dating from 1932, evolved from the above games. Stratego (classic) Stratego was created by Dutchman Jacques Johan Mogendorff sometime before 1942. The name was registered as a trademark in 1942 by the Dutch company Van Perlstein & Roeper Bosch N.V. (which also produced the first edition of Monopoly). After WW2, Mogendorff licensed Stratego to Smeets and Schippers, a Dutch company, in 1946. Hausemann and Hotte acquired a license in 1958 for European distribution, and in 1959 for global distribution. After Mogendorff's death in 1961, Hausemann and Hotte purchased the trademark from his heirs, and sublicensed it to Milton Bradley (which was acquired by Hasbro in 1984) in 1961 for United States distribution. It is introduced to the people of the United States as, "the American version of the game now popular on the Continent." In 2009, Hausemann and Hotte was succeeded by Koninklijke Jumbo B.V. in the Netherlands. The modern game of Stratego, with its Napoleonic imagery, was originally manufactured in the Netherlands. Pieces were originally made of printed cardboard and inserted in metal clip stands. After World War II, painted wood pieces became standard. Starting in the early 1960s all versions switched to plastic pieces. The change from wood to plastic was made for economical reasons, as was the case with many products during that period, but with Stratego the change also served a structural function: Unlike the wooden pieces, the plastic pieces were designed with a small base. The wooden pieces had none, often resulting in pieces tipping over. This was disastrous for that player, since it often immediately revealed the piece's rank, as well as unleashing a literal domino effect by having a falling piece knock over other pieces. European versions introduced cylindrical castle-shaped pieces that proved to be popular. American editions later introduced new rectangular pieces with a more stable base and colorful stickers, not images directly imprinted on the plastic. European versions of the game give the Marshal the highest number (10), while the initial American versions give the Marshal the lowest number (1) to show the highest value (i.e. it is the #1 or most powerful tile). More recent American versions of the game, which adopted the European system, caused considerable complaint among American players who grew up in the 1960s and 1970s. This may have been a factor in the release of a Nostalgic edition, in a wooden box, reproducing the Classic edition of the early 1970s. Modern Stratego variations Electronic Stratego was introduced by Milton Bradley in 1982. It has features that make many aspects of the game strikingly different from those of classic Stratego. Each type of playing piece in Electronic Stratego has a unique series of bumps on its bottom that are read by the game's battery-operated touch-sensitive "board". When attacking another piece a player hits their Strike button, presses their piece and then the targeted piece: the game either rewards a successful attack or punishes a failed strike with an appropriate bit of music. In this way the players never know for certain the rank of the piece that wins the attack, only whether the attack wins, fails, or ties (similar to the role of the referee in the Chinese game of Luzhanqi). Instead of choosing to move a piece, a player can opt to "probe" an opposing piece by hitting the Probe button and pressing down on the enemy piece: the game then beeps out a rough approximation of the strength of that piece. There are no Bomb pieces: Bombs are set using pegs placed on a touch-sensitive "peg board" that is closed from view prior to the start of the game. Hence, it is possible for a player to have their piece occupying a square with a bomb on it. If an opposing piece lands on the seemingly empty square, the game plays the sound of an explosion and that piece is removed from play. As in classic Stratego, only a Miner can remove a Bomb from play. A player who successfully captures the opposing Flag is rewarded with a triumphant bit of music from the 1812 Overture. In the late 1990s, the Jumbo Company released several European variants, including a three- and four-player version, and a new Cannon piece (which jumps two squares to capture any piece, but loses to any attack against it). It also included some alternate rules such as Barrage (a quicker two-player game with fewer pieces) and Reserves (reinforcements in the three- and four-player games). The four-player version appeared in America in 1997. Starting in the 2000s, Hasbro, under its Milton Bradley label, released a series of popular media-themed Stratego editions. Besides themed variants with substantially different rules, current production includes three slightly different editions: sets with classic (1961) piece numbering (highest rank=1), sets with European piece numbering (highest | the outcome of the game. Gameplay Players alternate moving; red moves first. Each player moves one piece per turn. A player must move a piece in his turn; there is no "pass" (as in the game of Go). Two zones in the middle of the board, each 2×2, cannot be entered by either player's pieces at any time. They are shown as lakes on the battlefield and serve as choke points to make frontal assaults less direct. The game can be won by capturing the opponent's Flag or all of his moveable pieces. It is possible to have ranked pieces that are not moveable because they are trapped behind bombs. In unusual cases, it is possible to draw, for example, when both players' flags are protected by bombs and each player has one remaining piece which is not a miner. The average game has 381 moves. The number of legal positions is 10115. The number of possible games is 10535. Stratego has many more moves and substantially greater complexity than other familiar games such as chess and backgammon; however, unlike those games where a single bad move at any point may result in loss of the game, most moves in Stratego are inconsequential. Rules of movement All movable pieces, with the exception of the Scout, may move only one step to any adjacent space vertically or horizontally (but not diagonally). A piece may not move onto a space occupied by a like-color piece. Bomb and Flag pieces are not moveable. The Scout may move any number of spaces in a straight line (such as the rook in chess). In the older versions of Stratego the Scout could not move and strike in the same turn; in newer versions this was allowed. Even before that, sanctioned play usually amended the original Scout movement to allow moving and striking in the same turn because it facilitates gameplay. No piece can move back and forth between the same two spaces for more than three consecutive turns (two square rule), nor can a piece endlessly chase a piece it has no hope of capturing (more square rule). When the player wants to attack, they move their piece onto a square occupied by an opposing piece. Both players then reveal their piece's rank; the weaker piece (see exceptions below) is removed from the board. If the engaging pieces are of equal rank, both are removed. A piece may not move onto a square already occupied unless it attacks. Two pieces have special attack powers. One special piece is the Bomb which only Miners can defuse. It immediately eliminates any other piece striking it, without itself being destroyed. Each player also has one Spy, which succeeds only if it attacks the Marshal or the Flag. If the Spy attacks any other piece, or is attacked by any piece (including the Marshal), the Spy is defeated. The original rules contained a provision that following a strike, the winning piece immediately occupies the space vacated by the losing piece. Recording the game Competitive play does not include recording the game, unlike chess. The game is fast-paced, no standard notation exists, and players keep their setups secret, so recording games is impractical. However, digital interfaces such as web-based gaming interfaces may have a facility for recording, replaying and downloading the game. Those interfaces use an algebraic-style notation that numbers the rows ('ranks') 1 to 10 from bottom to top and the columns ('files') A to J from left to right. Alternately, a few interfaces designate the files as A to K, omitting 'I'. Moves are recorded as source square followed by destination square separated by a "-" (move) or "x" (strike). Revealed pieces on strikes precede the square designation, and may be by either rank name or rank number for brevity, for example "major B2xcaptain B3". The bottom half of the board is by default considered to be the 'red' side, and the top half the 'blue' side. Strategy Unlike chess, Stratego is a game of incomplete information. In addition to calculated sequences of moves, this gives rise to aspects of battle psychology such as concealment, bluffing, lying in wait and guessing. Pieces Classic pieces There are seven immobile pieces – six Bombs and one Flag – and 33 mobile pieces per player. They can move to the adjacent square in horizontal or vertical direction, with exception of the Scout, which moves any distance. From highest rank to lowest the pieces are: {| class="wikitable" |- ! Rank || Piece || No. per player || Special properties |- | B || Bomb || 6 || Immovable; is captured by Miner |- | 10/1 ||Marshal || 1 || Can be captured by the Spy if the Spy attacks first. |- | 9/2 ||General || 1 || |- | 8/3 ||Colonel || 2 || |- | 7/4 ||Major || 3 || |- | 6/5 ||Captain || 4 || |- | 5/6 ||Lieutenant || 4 || |- | 4/7 ||Sergeant || 4 || |- | 3/8 ||Miner || 5 || Can defuse (i. e. capture) bombs |- | 2/9 ||Scout || 8 ||moves any distance in a horizontal or vertical straight line, without leaping over pieces/lakes |- | 1/S ||Spy || 1 || Defeats the Marshal, but only if the Spy makes the attack |- | F || Flag || 1 || Immovable; capturing the opponent's Flag wins the game |} The higher ranked piece always captures the lower, except when stated otherwise. Some versions (primarily those released since 2000) make 10 (the Marshal) the highest rank with the Spy ranked 1, while others (versions prior to 2000, as well as the Nostalgia version released in 2002) have the Marshal piece ranked at 1 and the Spy designated S. The European version depicts pieces with the lower number to be higher ranked, whereas the American version depicts pieces with the higher number to be higher ranked. Variant pieces Variant versions of the game have a few different pieces with different rules of movement, such as the Cannon, Archer (possibly a different name for the Cannon), Spotter, Infiltrator, Corporal and Cavalry Captain. In one version, mobile pieces are allowed to "carry" the Flag. In some variants such as Stratego Waterloo and Fire and Ice Stratego, all or most of the pieces have substantially different moves. History Japanese Military Chess Japanese Military Chess (:jp:軍人将棋) has been sold and played since as early as 1895, although it is unknown by whom and when it was invented. Dr. Chiristian Junghans reported this game in Monstshefte magazine in Germany in 1905. It seems, only after reading his article, Julie Berg took out a patent on a war game in London and Paris in 1907. Similarly, Hermance Edan took a patent for L'attaque game in 1909 and sold them in 1910. The main differences between Japanese Military Chess and Stratego are: Japanese Military Chess needs a referee to resolve the battles of the pieces. The Flag is placed only on the headquarters and a player who successfully occupied the headquarters of the opponent shall win the game. There are no Scout pieces,but Engineer can remove mines and tanks. French L'Attaque In nearly its present form Stratego appeared in France from La Samaritaine in 1910, and then in Britain before World War I, as a game called L'attaque. Historian and game collector Thierry Depaulis writes: It was in fact designed by a lady, Mademoiselle Hermance Edan, who filed a patent for a "jeu de bataille avec pièces mobiles sur damier" (a battle game with mobile pieces on a gameboard) on 1908-11-26. The patent was released by the French Patent Office in 1909 (patent #396.795). Hermance Edan had given no name to her game but a French manufacturer named Au Jeu Retrouvé was selling the game as L'Attaque as early as 1910. Depaulis further notes that the 1910 version was played with 36 pieces per player on a 9×10 board and the armies were divided into red and blue colors. The rules of L'attaque were basically the same as for the game we know as Stratego. It featured standing cardboard rectangular pieces, color printed with soldiers who wore contemporary (to 1900) uniforms, not Napoleonic uniforms. In papers of her estate, Ms. Edan states that she developed the game in the 1880s. L'attaque was later produced in England by game maker H.P. Gibson and Sons, who bought the rights to the game in 1925, at least until the 1970s, initially retaining the French name before changing it. The early H. P. Gibson & Sons games Dover Patrol – a naval warfare game on a board of 12×8 squares devised by Harry A. Gibson in 1911, but very similar to L'Attaque (and hence Stratego) Aviation (game) – an air battle variation designed by Harry Gibson in 1925, with a variant called Battle of Britain sold in the 1970s Tri-Tactics – a game combining land, sea and air warfare on a 12×12 board, with 56 pieces per person, dating from 1932, evolved from the above games. Stratego (classic) Stratego was created by Dutchman Jacques Johan Mogendorff sometime before 1942. The name was registered as a trademark in 1942 by the Dutch company Van Perlstein & Roeper Bosch N.V. (which also produced the first edition of Monopoly). After WW2, Mogendorff licensed Stratego to Smeets and Schippers, a Dutch company, in 1946. Hausemann and Hotte acquired a license in 1958 for European distribution, and in 1959 for global distribution. After Mogendorff's death in 1961, Hausemann and Hotte purchased the trademark from his heirs, and sublicensed it to Milton Bradley (which was acquired by Hasbro in 1984) in 1961 for United States distribution. It is introduced to the people of the United States as, "the American version of the game now popular on the Continent." In 2009, Hausemann and Hotte was succeeded by Koninklijke Jumbo B.V. in the Netherlands. The modern game of Stratego, with its Napoleonic imagery, was originally manufactured in the Netherlands. Pieces were originally made of printed cardboard and inserted in metal clip stands. After World War II, painted wood pieces became standard. Starting in the early 1960s all versions switched to plastic pieces. The change from wood to plastic was made for economical reasons, as was the case with many products during that period, but with Stratego the change also served a structural function: Unlike the wooden pieces, the plastic pieces were designed with a small base. The wooden pieces had none, often resulting in pieces tipping over. This was disastrous for that player, since it often immediately revealed the piece's rank, as well as unleashing a literal domino effect by having a falling piece knock over other pieces. European versions introduced cylindrical castle-shaped pieces that proved to be popular. American editions later introduced new rectangular pieces with a more stable base and colorful stickers, not images directly imprinted on the plastic. European versions of the game give the Marshal the highest number (10), while the initial American versions give the Marshal the lowest number (1) to show the highest value (i.e. it is the #1 or most powerful tile). More recent American versions of the game, which adopted the European system, caused considerable complaint among American players who grew up in the 1960s and 1970s. This may have been a factor in the release of a Nostalgic edition, in a wooden box, reproducing the Classic edition of the early 1970s. Modern Stratego variations Electronic Stratego was introduced by Milton Bradley in 1982. It has features that make many aspects of the game strikingly different from those of classic Stratego. Each type of playing piece in Electronic Stratego has a unique series of bumps on its bottom that are read by the game's battery-operated touch-sensitive "board". When attacking another piece a player hits their Strike button, presses their piece and then the targeted piece: the game either rewards a successful attack or punishes a failed strike with an appropriate bit of music. In this way the players never know for certain the rank of the piece that wins the attack, only whether the attack wins, fails, or ties (similar to the role of the referee in the Chinese game of Luzhanqi). Instead of choosing to move a piece, a player can opt to "probe" an opposing piece by hitting the Probe button and pressing down on the enemy piece: the game then beeps out a rough approximation of the strength of that piece. There are no Bomb pieces: Bombs are set using pegs placed on a touch-sensitive "peg board" that is closed from view prior to the start of the game. Hence, it is possible for a player to have their piece occupying a square with a bomb on it. If an opposing piece lands on the seemingly empty square, the game plays the sound of an explosion and that piece is removed from play. As in classic Stratego, only a Miner can remove a Bomb from play. A player who successfully captures the opposing Flag is rewarded with a triumphant bit of music from the 1812 Overture. In the late 1990s, the Jumbo Company released several European variants, including a three- and four-player version, and a new Cannon piece (which jumps two squares to capture any piece, but loses to any attack against it). It also included some alternate rules such as Barrage (a quicker two-player game with fewer pieces) and Reserves (reinforcements in the three- and four-player games). The four-player version appeared in America in 1997. Starting in the 2000s, Hasbro, under its Milton Bradley label, released a series of popular media-themed Stratego editions. Besides themed variants with substantially different rules, current production includes three slightly different editions: sets with classic (1961) piece numbering (highest rank=1), sets with European piece numbering (highest rank=10), and sets that allow substitution of one or two variant pieces such as Cannons, usually in place of scouts. Sets produced since 1970 or so have uniformly adopted the rule that scouts can move and strike in the same turn. Digital Stratego and AIs Accolade first introduced a Microsoft DOS-based Stratego AI in 1990, but it was not even so good as a rank beginner human player, lacking any apparent strategic conception and making many tactical blunders. Modern AIs exist and compete |
such as the Tughluks and the Khaljis. Samma Dynasty period In 1339 Jam Unar founded a Sindhi Muslim Rajput Samma Dynasty and challenged the Sultans of Delhi. He used the title of the Sultan of Sindh. The Samma tribe reached its peak during the reign of Jam Nizamuddin II (also known by the nickname Jám Nindó). During his reign from 1461 to 1509, Nindó greatly expanded the new capital of Thatta and its Makli hills, which replaced Debal. He patronized Sindhi art, architecture and culture. The Samma had left behind a popular legacy especially in architecture, music and art. Important court figures included the poet Kazi Kadal, Sardar Darya Khan, Moltus Khan, Makhdoom Bilawal and the theologian Kazi Kaadan. However, Thatta was a port city; unlike garrison towns, it could not mobilize large armies against the Arghun and Tarkhan Mongol invaders, who killed many regional Sindhi Mirs and Amirs loyal to the Samma. Some parts of Sindh still remained under the Sultans of Delhi and the ruthless Arghuns and the Tarkhans sacked Thatta during the rule of Jam Ferozudin. Migration of Baloch According to Dr. Akhtar Baloch, Professor at University of Karachi, and Nadeem Wagan, General Manager at HANDS, the Balochi migrated from Balochistan during the Little Ice Age and settled in Sindh and Punjab. The Little Ice Age is conventionally defined as a period extending from the sixteenth to the nineteenth centuries, or alternatively, from about 1300 to about 1850. According to Professor Baloch, the climate of Balochistan was very cold during this epoch and the region was uninhabitable during the winters so the Baloch people emigrated in waves to Sindh and Punjab. Mughal era In the year 1524, the few remaining Sindhi Amirs welcomed the Mughal Empire and Babur dispatched his forces to rally the Arghuns and the Tarkhans, branches of a Turkic dynasty. In the coming centuries, Sindh became a region loyal to the Mughals, a network of forts manned by cavalry and musketeers further extended Mughal power in Sindh. In 1540 a mutiny by Sher Shah Suri forced the Mughal Emperor Humayun to withdraw to Sindh, where he joined the Sindhi Emir Hussein Umrani. In 1541 Humayun married Hamida Banu Begum, who gave birth to the infant Akbar at Umarkot in the year 1542. During the reign of Akbar the Great, Sindh produced scholars and others such as Mir Ahmed Nasrallah Thattvi, Tahir Muhammad Thattvi and Mir Ali Sir Thattvi and the Mughal chronicler Abu'l-Fazl ibn Mubarak and his brother the poet Faizi was a descendant of a Sindhi Shaikh family from Rel, Siwistan in Sindh. Abu'l-Fazl ibn Mubarak was the author of Akbarnama (an official biographical account of Akbar) and the Ain-i-Akbari (a detailed document recording the administration of the Mughal Empire). Shah Jahan carved a subah (imperial province), covering Sindh, called Thatta after its capital, out of Multan, further bordering on the Ajmer and Gujarat subahs as well as the rival Persian Safavid empire. During the Kalhora period, Sindhi literature began to flourish and historical figures such as Shah Abdul Latif Bhittai, Sulatn-al-Aoliya Muhammad Zaman and Sachal Sarmast became prominent throughout the land. In 1603 Shah Jahan visited the State of Sindh; at Thatta, he was generously welcomed by the locals after the death of his father Jahangir. Shah Jahan ordered the construction of the Shahjahan Mosque, which was completed during the early years of his rule under the supervision of Mirza Ghazi Beg. During his reign, in 1659 in the Mughal Empire, Muhammad Salih Tahtawi of Thatta created a seamless celestial globe with Arabic and Persian inscriptions using a wax casting method. Sindh was home to several wealthy merchant-rulers such as Mir Bejar of Sindh, whose great wealth had attracted the close ties with the Sultan bin Ahmad of Oman. Kalhora Nawabs Dynasty In the year 1701, the Kalhora Nawabs were authorized in a firman by the Mughal Emperor Aurangzeb to administer subah Sindh. Maratha empire From 1752 to 1762, Marathas collected Chauth or tributes from Sindh. region was administered by 10,000 marathas Maratha power was decimated in the entire region after the Third Battle of Panipat in 1761. In 1762, Mian Ghulam Shah Kalhoro brought stability in Sindh, he reorganized and killed all the Marathas and their prominent vassal the Rao of Kuch in the Thar Desert with the help of Durrani empire Sikh empire After the Sikhs annexed Multan, the Kalhora Dynasty supported counterattacks against the Sikhs and defined their borders. In 1783 a firman which designated Mir Fateh Ali Khan Talpur as the new Nawab of Sindh, and mediated peace particularly after the Battle of Halani and the defeat of the ruling Kalhora by the Talpur Baloch tribes. Talpurs The Talpur dynasty was established by members of the Talpur tribe. The Talpur tribes migrated from Dera Ghazi Khan in Punjab to Sindh on the invitation of Kalhora to help them organize unruly Baloch tribes living in Sindh. Talpurs, who learned the Sindhi language, settled in northern Sindh. Very soon they united all the Baloch tribes of Sindh and formed a confederacy against the Kalhora Dynasty. Four branches of the dynasty were established following the defeat of the Kalhora dynasty at the Battle of Halani in 1743: one ruled lower Sindh from the city of Hyderabad, another ruled over upper Sindh from the city of Khairpur, a third ruled around the eastern city of Mirpur Khas, and a fourth was based in Tando Muhammad Khan. The Talpurs were ethnically Baloch, and Shia by faith. They ruled from 1783, until 1843, when they were in turn defeated by the forces of the East India Company at the Battle of Miani and Dubbo. The northern Khairpur branch of the Talpur dynasty, however, continued to maintain a degree of sovereignty during the period colonial rule as the princely state of Khairpur, whose ruler elected to join the new Dominion of Pakistan in October 1947 as an autonomous region, before being fully amalgamated in the West Pakistan in 1955. Modern period (1800-Present) Colonial period In 1802, when Mir Ghulam Ali Khan Talpur succeeded as the Talpur Nawab, internal tensions broke out in the state. As a result, the following year the Maratha Empire declared war on Sindh and Berar Subah, during which Arthur Wellesley took a leading role causing much early suspicion between the Emirs of Sindh and the East India Company administration. The East India Company made its first contacts in the Sindhi port city of Thatta, which according to a report was: "a city as large as London containing 50,000 houses which were made of stone and mortar with large verandahs some three or four stories high ... the city has 3,000 looms ... the textiles of Sindh were the flower of the whole produce of the East, the international commerce of Sindh gave it a place among that of Nations, Thatta has 400 schools and 4,000 Dhows at its docks, the city is guarded by well armed Sepoys". Bengal Presidency forces under General Charles James Napier arrived in Sindh in the mid-19th century and captured Sindh in February 1843. The Baloch coalition led by Talpur under Mir Nasir Khan Talpur was defeated at the Battle of Miani during which 5,000 Talpur Baloch were killed in action. Shortly afterwards, Hoshu Sheedi commanded another army at the Battle of Dubbo, where 5,000 Baloch were also killed in action. The first Agha Khan, who was escaping persecution in Persia and looking for an ally, helped the East India Company in their capture of Sindh. As a result, he was granted a lifetime pension. A British journal by Thomas Postans mentions the Sindhi Amirs as prisoners of war: "The Amirs as being the prisoners of 'Her Majesty'... they are maintained in strict seclusion; they are described as Broken-Hearted and Miserable men, maintaining much of the dignity of fallen greatness, and without any querulous or angry complaining at this unlivable source of sorrow, refusing to be comforted". Within weeks, Charles Napier and his forces occupied Sindh. After 1853, the Company administration divided Sindh into districts and later made it part of the Bombay Presidency. In the year 1868, the Bombay Presidency assigned Narayan Jagannath Vaidya to replace the Abjad used in Sindhi, with the Khudabadi script. The script was decreed a standard script by the Bombay Presidency thus inciting anarchy in the Muslim majority region. A powerful unrest followed, after which twelve separate periods of martial law were imposed by the colonial government. During the period of Company rule,the city saw the rise of nationalist leaders such as Sibghatullah Shah Rashidi, who pioneered the Sindhi Muslim Hur Movement. He was hanged on 20March 1943 in Hyderabad, Sindh. His burial place is unknown. During the colonial period, railways, printing presses and bridges were introduced in the province. Writers like Mirza Kalich Beg compiled and traced the literary history of Sindh. Although Sindh had a culture of religious syncretism, communal harmony and tolerance due to Sindh's strong Sufi culture in which both Sindhi Muslims and Sindhi Hindus partook, the mostly Muslim peasantry was oppressed by the Hindu moneylending class and also by the landed Muslim elite. Sindhi Muslims eventually demanded the separation of Sindh from the Bombay Presidency, a move opposed by Sindhi Hindus. By 1936 Sindh was separated from the Bombay Presidency. Elections in 1937 resulted in local Sindhi Muslim parties winning the bulk of seats. By the mid-1940s the Muslim League gained a foothold in the province and after winning over the support of local Sufi pirs, it didn't take long for the overwhelming majority of Sindhi Muslims to campaign for the creation of Pakistan. Modern period Prior to its struggle for Pakistan during colonial period, in 1947 Sindh joined Pakistan after Muslim League's major victory against Indian National Congress at first it was proposed that the eastern half of Sindh (Tharparkar Region or simply Thar) was to be carved out from Sindh and be given to India due to its majority Hindu population but that plan was never made official and Sindh as a whole was acceded to Pakistan When Sindh joined Pakistan in 1947 it comprised three polities: Karachi (Then Federal Capital of Pakistan), Sind Province (Inherited from British India) and Khairpur (Princely State), in 1955 when One Unit Policy was implemented all of these 3 polities merged to form West Pakistan however in 1970 when One Unit Policy was abolished a single, united province of Sindh came into being with Karachi as its capital Population Demographics Sindh has the 2nd highest Human Development Index out of all of Pakistan's provinces at 0.628. The 2017 Census of Pakistan indicated a population of 47.9 million. The major ethnic group of the province is the Sindhis, but there is also a significant presence of other groups. Sindhis of Baloch origin make up about 30% of the total Sindhi population (although they have completely assimilated and speak Sindhi their native tongue), while Urdu-speaking Muhajirs make up over 19% of the total population of the province, while Punjabi are 10% and Pashtuns are 7%. In August 1947, before the partition of India, the total population of Sindh was 3,887,070 out of which 2,832,000 were Muslims and 1,015,000 were Hindus Religion Islam in Sindh has a long history, starting with the capture of Sindh by Muhammad Bin Qasim in 712 CE. Over time, the majority of the population in Sindh converted to Islam, especially in rural areas. Today, Muslims make up over 90% of the population, and are more dominant in urban than rural areas. Islam in Sindh has a strong Sufi ethos with numerous Muslim saints and mystics, such as the Sufi poet Shah Abdul Latif Bhittai, having lived in Sindh historically. One popular legend which highlights the strong Sufi presence in Sindh is that 125,000 Sufi saints and mystics are buried on Makli Hill near Thatta. The development of Sufism in Sindh was similar to the development of Sufism in other parts of the Muslim world. In the 16th century two Sufi tareeqat (orders) – Qadria and Naqshbandia – were introduced in Sindh. Sufism continues to play an important role in the daily lives of Sindhis. Sindh also has Pakistan's highest percentage of Hindu residents, which make up 8.7% of its population overall, and 13.3% of the province's rural population. These numbers also include the scheduled caste population, which stands at 1.7% of the total in Sindh (or 3.1% in rural areas), and is believed to have been under-reported, with some community members instead counted under the main Hindu category. Umerkot district in the Thar Desert is Pakistan's only Hindu-majority district. The Shri Ramapir Temple in Tandoallahyar whose annual festival is the second largest Hindu pilgrimage in Pakistan is in Sindh. Sindh is also the only province in Pakistan to have a separate law for governing Hindu marriages. There are approximately 10,000 Sikhs in Sindh. Languages According to the 2017 census, the most widely spoken language in the province is Sindhi, the first language of % of the population. It is followed by Urdu (%), Pashto (%), Punjabi (%), Saraiki (%), Balochi (2%) and Hindko (). Other minority languages include Kutchi, Gujarati, Aer, Bagri, Bhaya, Brahui, Dhatki, Ghera, Goaria, Gurgula, Jadgali, Jandavra, Jogi, Kabutra, Kachi Koli, Parkari Koli, Wadiyari Koli, Loarki, Marwari, Sansi, and Vaghri. Karachi city is Pakistan's most multiethnic city. Urdu-speakers form a plurality, while Pashtos are the second-largest group. Sindhis themselves are 8.1% of the population in Karachi, a number that has increased due to migration of rural Sindhis to the city for work. Geography and nature Sindh is in the western corner of South Asia, bordering the Iranian plateau in the west. Geographically it is the third largest province of Pakistan, stretching about from north to south and (extreme) or (average) from east to west, with an area of of Pakistani territory. Sindh is bounded by the Thar Desert to the east, the Kirthar Mountains to the west and the Arabian Sea and Rann of Kutch to the south. In the centre is a fertile plain along the Indus River. Flora The province is mostly arid with scant vegetation except for the irrigated Indus Valley. The dwarf palm, Acacia Rupestris (kher), and Tecomella undulata (lohirro) trees are typical of the western hill region. In the Indus valley, the Acacia nilotica (babul) (babbur) is the most dominant and occurs in thick forests along the Indus banks. The Azadirachta indica (neem) (nim), Zizyphys vulgaris (bir) (ber), Tamarix orientalis (jujuba lai) and Capparis aphylla (kirir) are among the more common trees. Mango, date palms and the more recently introduced banana, guava, orange and chiku are the typical fruit-bearing trees. The coastal strip and the creeks abound in semi-aquatic and aquatic plants and the inshore Indus delta islands have forests of Avicennia tomentosa (timmer) and Ceriops candolleana (chaunir) trees. Water lilies grow in abundance in the numerous lake and ponds, particularly in the lower Sindh region. Fauna Among the wild animals, the Sindh ibex (sareh), blackbuck, wild sheep (Urial or gadh) and wild bear are found in the western rocky range. The leopard is now rare and the Asiatic cheetah extinct. The Pirrang (large tiger cat or fishing cat) of the eastern desert region is also disappearing. Deer occur in the lower rocky plains and in the eastern region, as do the Striped hyena (charakh), jackal, fox, porcupine, common gray mongoose and hedgehog. The Sindhi phekari, red lynx or Caracal cat, is found in some areas. Phartho (hog deer) and wild bear occur, particularly in the central inundation belt. There are bats, lizards and reptiles, including the cobra, lundi (viper) and the mysterious Sindh krait of the Thar region, which is supposed to suck the victim's breath in his sleep. Some unusual sightings of Asian cheetah occurred in 2003 near the Balochistan border in Kirthar Mountains. The rare houbara bustard find Sindh's warm climate suitable to rest and mate. Unfortunately, it is hunted by locals and foreigners. Crocodiles are rare and inhabit only the backwaters of the Indus, eastern Nara channel and Karachi backwater. Besides a large variety of marine fish, the plumbeous dolphin, the beaked dolphin, rorqual or blue whale and skates frequent the seas along the Sindh coast. The Pallo (Sable fish), a marine fish, ascends the Indus annually from February to April to spawn. The Indus river dolphin is among the most endangered species in Pakistan and is found in the part of the Indus river in northern Sindh. Hog deer and wild bear occur, particularly in the central inundation belt. Although Sindh has a semi arid climate, through its coastal and riverine forests, its huge fresh water lakes and mountains and deserts, Sindh supports a large amount of varied wildlife. Due to the semi-arid climate of Sindh the left out forests support an average population of jackals and snakes. The national parks established by the Government of Pakistan in collaboration with many organizations such as World Wide Fund for Nature and Sindh Wildlife Department support a huge variety of animals and birds. The Kirthar National Park in the Kirthar range spreads over more than 3000 km2 of desert, stunted tree forests and a lake. The KNP supports Sindh ibex, wild sheep (urial) and black bear along with the rare leopard. There are also occasional sightings of The Sindhi phekari, ped lynx or Caracal cat. There is a project to introduce tigers and Asian elephants too in KNP near the huge Hub Dam Lake. Between July and November when the monsoon winds blow onshore from the ocean, giant olive ridley turtles lay their eggs along the seaward side. The turtles are protected species. After the mothers lay and leave them buried under the sands the SWD and WWF officials take the eggs and protect them until they are hatched to keep them from predators. Climate Sindh lies in a tropical to subtropical region; it is hot in the summer and mild to warm in winter. Temperatures frequently rise above between May and August, and the minimum average temperature of occurs during December and January in the northern and higher elevated regions. The annual rainfall averages | The new governor of Sindh was to create a better, stronger and stable government. Once he became the governor, he allotted several key positions to his family and friends; thus Al-Khafif or Sardar Khafif Soomro formed the Soomro Dynasty in Sindh; and became its first ruler. Until the Siege of Baghdad (1258) the Soomro dynasty was the Abbasid Caliphate's functionary in Sindh, but after that it became independent. When the Soomro dynasty lost ties with the Abbasid Caliphate after the Siege of Baghdad (1258,) the Soomra ruler Dodo-I established their rule from the shores of the Arabian Sea to the Punjab in the north and in the east to Rajasthan and in the west to Pakistani Balochistan. The Soomros were one of the first indigenous Muslim dynasties in Sindh of Parmar Rajput origin. They were the first Muslims to translate the Quran into the Sindhi language. The Soomros created a chivalrous culture in Sindh, which eventually facilitated their rule centred at Mansura. It was later abandoned due to changes in the course of the Puran River; they ruled for the next 95 years until 1351. During this period, Kutch was ruled by the Samma Dynasty, who enjoyed good relations with the Soomras in Sindh. Since the Soomro Dynasty lost its support from the Abbasid Caliphate, the Sultans of Delhi wanted a piece of Sindh. The Soomros successfully defended their kingdom for about 36 years, but their dynasties soon fell to the might of the Sultanate of Delhi's massive armies such as the Tughluks and the Khaljis. Samma Dynasty period In 1339 Jam Unar founded a Sindhi Muslim Rajput Samma Dynasty and challenged the Sultans of Delhi. He used the title of the Sultan of Sindh. The Samma tribe reached its peak during the reign of Jam Nizamuddin II (also known by the nickname Jám Nindó). During his reign from 1461 to 1509, Nindó greatly expanded the new capital of Thatta and its Makli hills, which replaced Debal. He patronized Sindhi art, architecture and culture. The Samma had left behind a popular legacy especially in architecture, music and art. Important court figures included the poet Kazi Kadal, Sardar Darya Khan, Moltus Khan, Makhdoom Bilawal and the theologian Kazi Kaadan. However, Thatta was a port city; unlike garrison towns, it could not mobilize large armies against the Arghun and Tarkhan Mongol invaders, who killed many regional Sindhi Mirs and Amirs loyal to the Samma. Some parts of Sindh still remained under the Sultans of Delhi and the ruthless Arghuns and the Tarkhans sacked Thatta during the rule of Jam Ferozudin. Migration of Baloch According to Dr. Akhtar Baloch, Professor at University of Karachi, and Nadeem Wagan, General Manager at HANDS, the Balochi migrated from Balochistan during the Little Ice Age and settled in Sindh and Punjab. The Little Ice Age is conventionally defined as a period extending from the sixteenth to the nineteenth centuries, or alternatively, from about 1300 to about 1850. According to Professor Baloch, the climate of Balochistan was very cold during this epoch and the region was uninhabitable during the winters so the Baloch people emigrated in waves to Sindh and Punjab. Mughal era In the year 1524, the few remaining Sindhi Amirs welcomed the Mughal Empire and Babur dispatched his forces to rally the Arghuns and the Tarkhans, branches of a Turkic dynasty. In the coming centuries, Sindh became a region loyal to the Mughals, a network of forts manned by cavalry and musketeers further extended Mughal power in Sindh. In 1540 a mutiny by Sher Shah Suri forced the Mughal Emperor Humayun to withdraw to Sindh, where he joined the Sindhi Emir Hussein Umrani. In 1541 Humayun married Hamida Banu Begum, who gave birth to the infant Akbar at Umarkot in the year 1542. During the reign of Akbar the Great, Sindh produced scholars and others such as Mir Ahmed Nasrallah Thattvi, Tahir Muhammad Thattvi and Mir Ali Sir Thattvi and the Mughal chronicler Abu'l-Fazl ibn Mubarak and his brother the poet Faizi was a descendant of a Sindhi Shaikh family from Rel, Siwistan in Sindh. Abu'l-Fazl ibn Mubarak was the author of Akbarnama (an official biographical account of Akbar) and the Ain-i-Akbari (a detailed document recording the administration of the Mughal Empire). Shah Jahan carved a subah (imperial province), covering Sindh, called Thatta after its capital, out of Multan, further bordering on the Ajmer and Gujarat subahs as well as the rival Persian Safavid empire. During the Kalhora period, Sindhi literature began to flourish and historical figures such as Shah Abdul Latif Bhittai, Sulatn-al-Aoliya Muhammad Zaman and Sachal Sarmast became prominent throughout the land. In 1603 Shah Jahan visited the State of Sindh; at Thatta, he was generously welcomed by the locals after the death of his father Jahangir. Shah Jahan ordered the construction of the Shahjahan Mosque, which was completed during the early years of his rule under the supervision of Mirza Ghazi Beg. During his reign, in 1659 in the Mughal Empire, Muhammad Salih Tahtawi of Thatta created a seamless celestial globe with Arabic and Persian inscriptions using a wax casting method. Sindh was home to several wealthy merchant-rulers such as Mir Bejar of Sindh, whose great wealth had attracted the close ties with the Sultan bin Ahmad of Oman. Kalhora Nawabs Dynasty In the year 1701, the Kalhora Nawabs were authorized in a firman by the Mughal Emperor Aurangzeb to administer subah Sindh. Maratha empire From 1752 to 1762, Marathas collected Chauth or tributes from Sindh. region was administered by 10,000 marathas Maratha power was decimated in the entire region after the Third Battle of Panipat in 1761. In 1762, Mian Ghulam Shah Kalhoro brought stability in Sindh, he reorganized and killed all the Marathas and their prominent vassal the Rao of Kuch in the Thar Desert with the help of Durrani empire Sikh empire After the Sikhs annexed Multan, the Kalhora Dynasty supported counterattacks against the Sikhs and defined their borders. In 1783 a firman which designated Mir Fateh Ali Khan Talpur as the new Nawab of Sindh, and mediated peace particularly after the Battle of Halani and the defeat of the ruling Kalhora by the Talpur Baloch tribes. Talpurs The Talpur dynasty was established by members of the Talpur tribe. The Talpur tribes migrated from Dera Ghazi Khan in Punjab to Sindh on the invitation of Kalhora to help them organize unruly Baloch tribes living in Sindh. Talpurs, who learned the Sindhi language, settled in northern Sindh. Very soon they united all the Baloch tribes of Sindh and formed a confederacy against the Kalhora Dynasty. Four branches of the dynasty were established following the defeat of the Kalhora dynasty at the Battle of Halani in 1743: one ruled lower Sindh from the city of Hyderabad, another ruled over upper Sindh from the city of Khairpur, a third ruled around the eastern city of Mirpur Khas, and a fourth was based in Tando Muhammad Khan. The Talpurs were ethnically Baloch, and Shia by faith. They ruled from 1783, until 1843, when they were in turn defeated by the forces of the East India Company at the Battle of Miani and Dubbo. The northern Khairpur branch of the Talpur dynasty, however, continued to maintain a degree of sovereignty during the period colonial rule as the princely state of Khairpur, whose ruler elected to join the new Dominion of Pakistan in October 1947 as an autonomous region, before being fully amalgamated in the West Pakistan in 1955. Modern period (1800-Present) Colonial period In 1802, when Mir Ghulam Ali Khan Talpur succeeded as the Talpur Nawab, internal tensions broke out in the state. As a result, the following year the Maratha Empire declared war on Sindh and Berar Subah, during which Arthur Wellesley took a leading role causing much early suspicion between the Emirs of Sindh and the East India Company administration. The East India Company made its first contacts in the Sindhi port city of Thatta, which according to a report was: "a city as large as London containing 50,000 houses which were made of stone and mortar with large verandahs some three or four stories high ... the city has 3,000 looms ... the textiles of Sindh were the flower of the whole produce of the East, the international commerce of Sindh gave it a place among that of Nations, Thatta has 400 schools and 4,000 Dhows at its docks, the city is guarded by well armed Sepoys". Bengal Presidency forces under General Charles James Napier arrived in Sindh in the mid-19th century and captured Sindh in February 1843. The Baloch coalition led by Talpur under Mir Nasir Khan Talpur was defeated at the Battle of Miani during which 5,000 Talpur Baloch were killed in action. Shortly afterwards, Hoshu Sheedi commanded another army at the Battle of Dubbo, where 5,000 Baloch were also killed in action. The first Agha Khan, who was escaping persecution in Persia and looking for an ally, helped the East India Company in their capture of Sindh. As a result, he was granted a lifetime pension. A British journal by Thomas Postans mentions the Sindhi Amirs as prisoners of war: "The Amirs as being the prisoners of 'Her Majesty'... they are maintained in strict seclusion; they are described as Broken-Hearted and Miserable men, maintaining much of the dignity of fallen greatness, and without any querulous or angry complaining at this unlivable source of sorrow, refusing to be comforted". Within weeks, Charles Napier and his forces occupied Sindh. After 1853, the Company administration divided Sindh into districts and later made it part of the Bombay Presidency. In the year 1868, the Bombay Presidency assigned Narayan Jagannath Vaidya to replace the Abjad used in Sindhi, with the Khudabadi script. The script was decreed a standard script by the Bombay Presidency thus inciting anarchy in the Muslim majority region. A powerful unrest followed, after which twelve separate periods of martial law were imposed by the colonial government. During the period of Company rule,the city saw the rise of nationalist leaders such as Sibghatullah Shah Rashidi, who pioneered the Sindhi Muslim Hur Movement. He was hanged on 20March 1943 in Hyderabad, Sindh. His burial place is unknown. During the colonial period, railways, printing presses and bridges were introduced in the province. Writers like Mirza Kalich Beg compiled and traced the literary history of Sindh. Although Sindh had a culture of religious syncretism, communal harmony and tolerance due to Sindh's strong Sufi culture |
guarantee Despite the Jets' accomplishments, AFL teams were generally not regarded as having the same caliber of talent as NFL teams. However, three days before the game, an intoxicated Namath appeared at the Miami Touchdown Club and boldly predicted to the audience, "We're gonna win the game. I guarantee it". Coach Ewbank later joked that he "could have shot" Namath for the statement. Namath made his famous "guarantee" in response to a rowdy Colts supporter at the club, who boasted the Colts would easily defeat the Jets. Namath said he never intended to make such a public prediction, and would not have done so if he had not been confronted by the fan. Sportswriter Dave Anderson did not think that the remark was notable because, he recalled, Namath had said similar things during the week ("I know we're gonna win" for example), but an article by Luther Evans of the Miami Herald made the statement famous. Namath's comments and subsequent performance in the game itself are one of the more famous instances in NFL lore. The Colts, linebacker Curtis recalled, "sort of laughed at" Namath's guarantee. The team did not adjust the defense it had used during the season against the Jets because "that should be good enough," Curtis said. The AFL champions shared the confident feelings of their quarterback. According to Matt Snell, all of the Jets, not just Namath, were insulted and angry that they were 19½-point underdogs. Most of the Jets considered the Raiders, whom they barely beat (27–23) in the AFL title game, a better team than the Colts. Indeed, watching films of the Colts and in preparation for the game, Jets coaching staff and offensive players noted that their offense was particularly suited against the Colts defense. The Colts defensive schemes relied on frequent blitzing, which covered up weak points in pass coverage. The Jets had an automatic contingency for such blitzes by short passing to uncovered tight ends or backs. After a film session the Wednesday prior to the game, Jets tight end Pete Lammons, a Texas native, was heard to drawl, "Damn, y'all, we gotta stop watching these films. We gonna get overconfident". Media coverage Television The game was broadcast in the United States by NBC Sports – at the time, still a "Service of NBC News" – with Curt Gowdy handling the play-by-play duties and joined by color commentators Al DeRogatis and Kyle Rote in the broadcast booth. Also helping with NBC's coverage were Jim Simpson (reporting from the sidelines) and Pat Summerall, on loan from CBS (helping conduct player interviews for the pregame show, along with Rote). In an interview later done with NFL Films, Gowdy called it the most memorable game he ever called because of its historical significance. While the Orange Bowl was sold out for the game, the live telecast was not shown in Miami due to both leagues' unconditional blackout rules at the time. This game is thought to be the earliest surviving Super Bowl game preserved on videotape in its entirety, save for a portion of the Colts' fourth quarter scoring drive. The original NBC broadcast was aired as part of the NFL Network Super Bowl Classics series. 41.66 million people in the US watched the game on television, resulting in a rating of 36 and a market share of 70. Ceremonies and entertainment "Mr. Football" was the title of the pregame show, which featured marching bands playing "Mr. Touchdown, U.S.A." as people in walking footballs representing all NFL and AFL teams except the Jets and Colts were paraded, after which performers representing a Jets player and a Colts player appeared on top of a large, multi-layered, smoke topped cake. Astronauts of the Apollo 8 mission (Frank Borman, Jim Lovell, and William Anders), the first manned flight around the Moon, which had returned to Earth just 18 days prior to the game, then led the Pledge of Allegiance. Lloyd Geisler, first trumpeter of the Washington National Symphony Orchestra, performed the national anthem. The Florida A&M University band was featured during the "America Thanks" halftime show. Game summary New York entered the game with their primary deep threat, wide receiver Don Maynard, playing with a pulled hamstring. But his 112-yard, two touchdown performance against the Oakland Raiders in the AFL championship game made the Colts defense pay special attention to him, not realizing he was injured. Using Maynard as a decoy—he had no receptions in the game—Joe Namath was able to take advantage of single coverage on wide receiver George Sauer Jr. (After studying the Colts' zone defense, Ewbank had told his receivers, "Find the dead spots in the zone, hook up, and Joe will hit you.") The Jets had a conservative game plan, emphasizing the run as well as short high-percentage passes to minimize interceptions. Meanwhile, with the help of many fortunate plays, the Jets defense kept the Colts offense from scoring for most of the game. Also, Baltimore had a distinctly older group of players with 10+ years experience (Braase, Shinnick, Lyles, Boyd) on their defense's right side versus New York's younger, bigger left offensive side (Hill, Talamini, Schmitt, Sauer)--and back Snell when running left behind left tackle Hill, who thoroughly defeated defensive end Braase. First quarter Namath recalled that he did not become "dead serious" until, on the sideline before the game, he saw Unitas. The Jets, led by captains Namath and Johnny Sample, and Colts, led by captains Preston Pearson, Unitas, and Lyles, met at midfield where referee Tom Bell announced that the Jets had won the coin toss and had elected to receive the football. The coin toss had been conducted an hour prior to kickoff but this was done for the benefit of the spectators. Colts kicker Lou Michaels (the younger brother of Jets defensive coordinator, Walt Michaels) kicked the ball off to Earl Christy who returned the ball 25 yards to the Jets' 23-yard line. Namath handed the ball off to Snell on first down who carried it 3 yards. On second down, Snell carried the ball for 9 yards, earning the Jets their first first down of the game. Colts' free safety Rick Volk sustained a concussion when he tackled Snell and was subsequently lost for the game. On the ensuing play, Emerson Boozer lost four yards when he was tackled behind the line of scrimmage by Don Shinnick. Namath threw his first pass to Snell that gained 9 yards on 2nd and 14, but a 2-yard loss by Snell on the following play forced the Jets to punt the ball. The Jets noticed, however, from watching film the predictability of the Colts' defense based on how players lined up. Instead of calling plays in the huddle, Namath usually gave formations to his team and operated from the line of scrimmage. Center John Schmitt recalled that the Colts were "in shock" and "it drove them crazy ... no matter what [the Colts] did, [Snell] would run it the other way". The Colts began their first offensive series on their own 27-yard line. Quarterback Earl Morrall completed a 19-yard pass to tight end John Mackey and then running back Tom Matte ran for 10 yards to place the ball on the Jets' 44-yard line. Jerry Hill's runs of 7 and 5 yards picked up another Colts first down, then Morrall's pass to tight end Tom Mitchell gained 15 yards on third and thirteen and saw the ball placed at the Jets' 19-yard line. In scoring position, Morrall attempted to score quickly against a reeling Jets defense. Receiver Willie Richardson dropped Morrall's pass on first down followed by an incompletion on second down after Mitchell was overthrown. On third down, none of his receivers were open and Morrall was tackled at the line of scrimmage by Al Atkinson. Michaels was brought out to attempt a 27-yard field goal, but it was wide left. "You could almost feel the steam go out of them", said Snell. The Jets did not only rely on Snell; Namath said "if they're going to blitz, then we're going to throw". Shula said that Namath "beat our blitz" with his fast release, which let him quickly dump the football off to a receiver. On the Jets' second possession, Namath threw deep to Maynard, who, despite his pulled hamstring, was open by a step. The ball was overthrown, but this one play helped change the outcome of the game. Fearing the speedy Maynard, the Colts decided to rotate their zone defense to help cover Maynard, leaving Sauer covered one-on-one by Lenny Lyles, helping Sauer catch 8 passes for 133 yards, including a crucial third quarter 39-yard reception that kept a scoring drive alive. The Jets kept rushing Snell to their strong left, rushing off tackle with Boozer blocking the linebacker, and gained first down after first down as the Colts defense gave ground. The Colts defense was more concerned about Maynard, the passing game, and the deep threat of a Namath to Maynard touchdown. Although the Colts were unaware of Maynard's injury, the Jets were aware that Lyles had been weakened by tonsillitis all week, causing them great glee when they saw the one-on-one matchup with Sauer. With less than two minutes left in the period, Colts punter David Lee booted a 51-yard kick that pinned the Jets back at their own 4-yard line. Three plays later, Sauer caught a 3-yard pass from Namath, but fumbled while being tackled by Lyles, and Baltimore linebacker Ron Porter recovered it at New York's 12-yard line. Second quarter However, on third down (the second play of the second quarter), Morrall's pass was tipped by Jets linebacker Al Atkinson, bounced crazily, high into the air off tight end Tom Mitchell, and was intercepted by Jets cornerback Randy Beverly in the end zone for a touchback. "That was the game in a nutshell," says Matte. Starting from their own 20-yard line, Snell rushed on the next 4 plays, advancing the ball 26 yards. The Jets would have success all day running off left tackle behind the blocking of Winston Hill, who, according to Snell, was overpowering 36-year-old defensive end Ordell Braase, the man who had tormented the rookie Hill in Colts' training camp. Said Snell, "Braase pretty much faded out." Namath later completed 3 consecutive passes, moving the ball to the Colts 23-yard line. Boozer gained just 2 yards on the next play, but Snell followed it up with a 12-yard reception at the 9-yard line and a 5-yard run to the 4-yard line, and capped the drive with a 4-yard touchdown run, once again off left tackle. The score gave the Jets a 7–0 lead, and marked the first time in history that an AFL team led in the Super Bowl. On Baltimore's ensuing drive, a 30-yard completion from Morrall to running back Tom Matte helped the Colts advance to the New York 42-yard line, but they once again failed to score as Jets cornerback Johnny Sample broke up Morrall's third down pass and Michaels missed his second field goal attempt, this time from 46 yards. Two plays after the Jets took over following the missed field goal, Namath's 36-yard completion to Sauer enabled New York to eventually reach the Baltimore 32-yard line. But Namath then threw two incompletions, and was sacked on third down by Colts linebacker Dennis Gaubatz for a 2-yard loss. New York kicker Jim Turner tried to salvage the drive with a 41-yard field goal attempt, but he missed. On their next possession, Baltimore went from their own 20-yard line to New York's 15-yard line in three plays, aided by Matte's 58-yard run (the longest play from scrimmage in the game). However, with 2 minutes left in the half, Morrall was intercepted again, by Sample at the Jets' 2-yard line, deflating the Colts considerably. The Jets then were forced to punt on their ensuing drive, and the Colts advanced the ball to New York's 41-yard line. What followed is one of the most famous plays in Super Bowl history. Baltimore tried a flea flicker play, which had a huge impact on the momentum of the game. Matte ran off right tackle after taking a handoff, then pitched the ball back to Morrall. The play completely fooled the NBC Camera Crew, and the Jets defense, leaving receiver Jimmy Orr wide open near the end zone. However, Morrall failed to spot him and instead threw a pass intended for running back Jerry Hill that was intercepted by Jets safety Jim Hudson as time expired, maintaining the Jets' 7–0 lead at halftime. Earlier in the season, against the Atlanta Falcons, on the same play, Morrall had completed the same pass for a touchdown to Orr, the play's intended target. "I was the primary receiver," Orr said later. "Earl said he just didn't see me. I was open from here to Tampa." "I'm just a lineman, but I looked up and saw Jimmy open," added center Bill Curry. "I don't know what happened." Some speculated that Morrall couldn't see Orr because the Florida A&M marching band (in blue uniforms similar to the Colts) was gathering behind the end zone for the halftime show. Third quarter The third quarter belonged to the Jets, who controlled the ball for all but three minutes of the period. Baltimore ran only seven offensive plays all quarter, gaining only 11 yards. Matte lost a fumble on the first play from scrimmage in the second half, yet another demoralizing event, which was recovered by linebacker Ralph Baker on the Colts 33-yard line, leading to Turner's 32-yard field goal to increase the Jets' lead, 10–0. Then after forcing the Colts to punt again, Namath completed 4 passes for 40 yards to set up Turner's 30-yard field goal to increase the lead, 13–0. On that drive, Namath temporarily went out of the game after injuring his right thumb, and was replaced by backup quarterback Babe Parilli for a few plays. Namath returned by the end of the third quarter, but the Jets would not run a pass play for the entire fourth quarter. Matt Snell said, "By this time, the Colts were pressing. You saw the frustration and worry on all their faces." After Turner's second field goal, with 4 minutes left in the third quarter, Colts head coach Don Shula took Morrall out of the game and put in the sore-armed Johnny Unitas to see if he could provide a spark to Baltimore's offense. Unitas could not get the Colts offense moving on their next drive and they were forced to punt again after 3 plays. Fourth quarter Aided by a 39-yard pass from Namath to Sauer, the Jets drove all the way to the Colts 2-yard line. Baltimore's defense would not quit, and kept them out of the end zone. Turner kicked his third field goal early in the final period to make the score 16–0. The Colts' inability to score made Namath so confident by the fourth quarter, that he told Ewbank | playoffs, and the Colts dismissed Ewbank after a 7–7 record in 1962. He was soon hired by New York's new AFL franchise, which had just changed its name from the Titans to the Jets. In Ewbank's place, Baltimore hired an untested young head coach, Don Shula, who would also go on to become one of the game's greatest coaches. The Colts did well under Shula, despite losing to the Cleveland Browns in the 1964 NFL Championship Game and, in 1965, losing in overtime to the Green Bay Packers in a tie-breaker game to decide the NFL Western Conference title. The Colts finished a distant second in the West to the Packers in 1966, and in 1967, with the NFL realigned into four divisions of four teams each, went undefeated with two ties through their first 13 games, but lost the game and the Coastal Division championship to the Los Angeles Rams on the final Sunday of the season—under newly instituted tiebreakers procedures, L.A. won the division championship as it had better net points in the two games the teams played (the Rams win and an earlier tie). The Colts finished 11–1–2, tied for the best record in the league, but were excluded from the playoffs. In 1968, Shula and the Colts were considered a favorite to win the NFL championship again, which carried with it an automatic berth what was now becoming popularly known as the "Super Bowl" against the champion of the younger AFL. The NFL champion, in both cases the Green Bay Packers, had easily won the first two Super Bowls (1967 and 1968) over the AFL winner, establishing for a while then the superiority of the older NFL circuit. Baltimore's quest for a championship seemed doomed from the start when long-time starting quarterback Johnny Unitas suffered a pre-season injury to his throwing arm and was replaced by Earl Morrall, a veteran who had started inconsistently over the course of his 12 seasons with four teams. But Morrall would go on to have the best year of his career, leading the league in passer rating (93.2) during the regular season. His performance was so impressive that Colts coach Don Shula decided to keep Morrall in the starting lineup after Unitas was healthy enough to play. The Colts had won ten games in a row, including four shutouts, and finished the season with an NFL-best 13–1 record. In those ten games, they had allowed only seven touchdowns. Then, the Colts avenged their sole regular-season loss against the Cleveland Browns by crushing them 34–0 in the NFL Championship Game. The Colts offense ranked second in the NFL in points scored (402). Wide receivers Jimmy Orr (29 receptions, 743 yards, 6 touchdowns) and Willie Richardson (37 receptions, 698 yards, 8 touchdowns) provided Baltimore with two deep threats, with Orr averaging 25.6 yards per catch, and Richardson averaging 18.9. Tight end John Mackey also recorded 45 receptions for 644 yards and 5 touchdowns. Pro Bowl running back Tom Matte was the team's top rusher with 662 yards and 9 touchdowns. He also caught 25 passes for 275 yards and another touchdown. Running backs Terry Cole and Jerry Hill combined for 778 rushing yards and 236 receiving yards. The Colts defense led the NFL in fewest points allowed (144, tying the then all-time league record), and ranked third in total rushing yards allowed (1,339), while also recording 29 interceptions (2nd in the league) and holding their opponents to an NFL-low 9 touchdown passes. Bubba Smith, a 6'7" 295-pound defensive end considered the NFL's best pass rusher, anchored the line. Linebacker Mike Curtis, who intercepted two passes and recovered three fumbles, was considered one of the top linebackers in the NFL. Baltimore's secondary consisted of defensive backs Bobby Boyd (8 interceptions), Rick Volk (6 interceptions), Lenny Lyles (5 interceptions), and Jerry Logan (3 interceptions). The Colts were the only NFL team to routinely play a zone defense. That gave them an advantage in the NFL because the other NFL teams were inexperienced against a zone defense. (This would not give them an advantage over the upstart New York Jets, however, because zone defenses were common in the AFL and the Jets knew how to attack them.) New York Jets The New York Jets, led by head coach Weeb Ewbank (who was the head coach of the Colts when they won the famous 1958 NFL Championship game and later the '59 title also), finished the season with an 11–3 regular season record (one of the losses was to the Oakland Raiders in the infamous "Heidi Game") and had to rally to defeat those same Raiders, 27–23, in a thrilling AFL Championship Game. Jets quarterback Joe Namath threw for 3,147 yards during the regular season and completed 49.2 percent of his passes, but threw more interceptions (17) than touchdowns (15). Still, he led the offense effectively enough for them to finish the regular season with more total points scored (419) than Baltimore, and finished fourth in completion percentage, fifth in touchdown passes, and third in passing yards as one of only three quarterbacks to pass for over 3,000 yards in the AFL that season. More importantly, Namath usually found ways to win. For example, late in the fourth quarter of the AFL championship game, Namath threw an interception that allowed the Raiders to take the lead. But he then made up for his mistake by completing 3 consecutive passes on the ensuing drive, advancing the ball 68 yards in just 55 seconds to score a touchdown to regain the lead for New York. Future Hall of Fame wide receiver Don Maynard caught the game-winning pass in the end zone but strained his hamstring on the play. The Jets had a number of offensive weapons that Namath used. Maynard had the best season of his career, catching 57 passes for 1,297 yards (an average of 22.8 yards per catch) and 10 touchdowns. Wide receiver George Sauer Jr. recorded 66 receptions for 1,141 yards and 3 touchdowns. Tight end Pete Lammons added 32 receptions for 400 yards and three touchdowns. The Jets rushing attack was also effective. Fullback Matt Snell, a power runner, was the top rusher on the team with 747 yards and 6 touchdowns, while elusive halfback Emerson Boozer contributed 441 yards and 5 touchdowns. Meanwhile, kicker Jim Turner made 34 field goals and 43 extra points for a combined total of 145 points. The Jets defense led the AFL in total rushing yards allowed (1,195). Gerry Philbin, Paul Rochester, John Elliott, and Verlon Biggs anchored the defensive line. The Jets linebacking core was led by middle linebacker Al Atkinson. The secondary was led by defensive backs Johnny Sample (a former Colt who played on their 1958 NFL Championship team) who recorded 7 interceptions, and Jim Hudson, who recorded 5. Several of the Jets' players had been cut by NFL teams. Maynard had been cut by the New York Giants after they lost the 1958 NFL Championship Game to the Colts. "I kept a little bitterness in me," he says. Sample had been cut by the Colts. "I was almost in a frenzy by the time the game arrived," he says. "I held a private grudge against the Colts. I was really ready for that game. All of us were." Offensive tackle Winston Hill had been cut five years earlier by the Colts as a rookie in training camp. "Ordell Braase kept making me look bad in practice," he says. Hill would be blocking Braase in Super Bowl III. At an all-night party to celebrate the Jets' victory over the Raiders at Namath's nightclub, Bachelors III, Namath poured champagne over Johnny Carson as the comedian commented, "First time I ever knew you to waste the stuff." Postseason The Colts advanced to the Super Bowl with two dominating wins. First, they jumped to a 21–0 fourth quarter lead against the Minnesota Vikings and easily held off their meager comeback attempt in the final period for a 24–14 win. Then they faced the Cleveland Browns, who had defeated them in week 5 of the regular season. But in this game, they proved to be no challenge as Baltimore held them to just 173 total yards and only allowed them to cross midfield twice in the entire game. Matte scored three of the Colts' four rushing touchdowns as the team won easily, 34–0. Meanwhile, New York in the AFL championship game faced a red hot Oakland Raiders team who had just defeated the Kansas City Chiefs 41–6 one week earlier, with quarterback Daryle Lamonica throwing five touchdown passes. The championship game was close and hard-fought the whole way through, with both teams trading scores at a relatively even pace. The momentum seemed to swing in the Raiders' favor when George Atkinson picked off a pass from Namath and returned it 32 yards to the Jets 5-yard line, setting up a touchdown that gave Oakland their first lead of the game at 23–20 with 8:18 left in regulation. But Namath quickly led the team back, completing a 10-yard pass to Sauer and a 52-yard pass to Maynard on the Raiders' six-yard line. On the next play, his six-yard touchdown pass to Maynard gave them a 27–23 lead they would never relinquish. Oakland's final three possessions of the game would result in a turnover on downs, a lost fumble, and time expiring in the game. Super Bowl pregame news and notes After the Jets' AFL championship victory, Namath stated to The New York Times sportswriter Dave Anderson, "There are five quarterbacks in the AFL who are better than Morrall." The five were himself, his backup Babe Parilli, Lamonica, John Hadl of the San Diego Chargers, and Bob Griese of the Miami Dolphins. Namath added, "You put Babe Parilli with Baltimore instead of Morrall and Baltimore might be better. Babe throws better than Morrall." Namath's guarantee Despite the Jets' accomplishments, AFL teams were generally not regarded as having the same caliber of talent as NFL teams. However, three days before the game, an intoxicated Namath appeared at the Miami Touchdown Club and boldly predicted to the audience, "We're gonna win the game. I guarantee it". Coach Ewbank later joked that he "could have shot" Namath for the statement. Namath made his famous "guarantee" in response to a rowdy Colts supporter at the club, who boasted the Colts would easily defeat the Jets. Namath said he never intended to make such a public prediction, and would not have done so if he had not been confronted by the fan. Sportswriter Dave Anderson did not think that the remark was notable because, he recalled, Namath had said similar things during the week ("I know we're gonna win" for example), but an article by Luther Evans of the Miami Herald made the statement famous. Namath's comments and subsequent performance in the game itself are one of the more famous instances in NFL lore. The Colts, linebacker Curtis recalled, "sort of laughed at" Namath's guarantee. The team did not adjust the defense it had used during the season against the Jets because "that should be good enough," Curtis said. The AFL champions shared the confident feelings of their quarterback. According to Matt Snell, all of the Jets, not just Namath, were insulted and angry that they were 19½-point underdogs. Most of the Jets considered the Raiders, whom they barely beat (27–23) in the AFL title game, a better team than the Colts. Indeed, watching films of the Colts and in preparation for the game, Jets coaching staff and offensive players noted that their offense was particularly suited against the Colts defense. The Colts defensive schemes relied on frequent blitzing, which covered up weak points in pass coverage. The Jets had an automatic contingency for such blitzes by short passing to uncovered tight ends or backs. After a film session the Wednesday prior to the game, Jets tight end Pete Lammons, a Texas native, was heard to drawl, "Damn, y'all, we gotta stop |
McGrew recovered a fumble from Walter Payton at the Chicago 19-yard line on the second play of the game (the Bears themselves would break this record in Super Bowl XLI when Devin Hester ran back the opening kickoff for a touchdown). Bears quarterback Jim McMahon took responsibility for this fumble after the game, saying he had called the wrong play. This set up Tony Franklin's 36-yard field goal 1:19 into the first quarter after three incomplete passes by Tony Eason (during the first of those three, starting tight end Lin Dawson went down with torn ligaments in his knee). "I looked up at the message board", said Chicago linebacker Mike Singletary, "and it said that 15 of the 19 teams that scored first won the game. I thought, yeah, but none of those 15 had ever played the Bears." Chicago struck back with a 7-play, 59-yard drive, featuring a 43-yard pass completion from McMahon to wide receiver Willie Gault, to set up a field goal from Kevin Butler, tying the score at 3–3. After both teams traded punts, Richard Dent and linebacker Wilber Marshall shared a sack on Eason, forcing a fumble that lineman Dan Hampton recovered on the Patriots 13-yard line. Chicago then drove to the 3-yard line, but had to settle for another field goal from Butler after rookie defensive lineman William "The Refrigerator" Perry was tackled (and technically sacked) for a 1-yard loss while trying to throw his first NFL pass on a halfback option play. On the Patriots' ensuing drive, Dent forced running back Craig James to fumble, which was recovered by Singletary at the 13-yard line. Two plays later, Bears fullback Matt Suhey scored on an 11-yard touchdown run to increase the lead to 13–3. New England took the ensuing kickoff and ran one play before the first quarter ended, which resulted in positive yardage for the first time in the game (a 3-yard run by James). Second quarter After an incomplete pass and a 4-yard loss, the Patriots had to send in punter Rich Camarillo again, and receiver Keith Ortego returned the ball 12 yards to the 41-yard line. The Bears subsequently drove 59 yards in 10 plays, featuring a 24-yard reception by Suhey, to score on McMahon's 2-yard touchdown run to increase their lead, 20–3. After the ensuing kickoff, New England lost 13 yards in 3 plays and had to punt again, but got the ball back with great field position when defensive back Raymond Clayborn recovered a fumble from Suhey at their own 46-yard line. On the punt, Ortego forgot what the play call was for the punt return, and the ensuing chaos resulted in him being penalized for running after a fair catch and teammate Leslie Frazier suffering a knee injury, which ended his career. Patriots head coach Raymond Berry then replaced Eason with Steve Grogan, who had spent the previous week hoping he would have the opportunity to step onto the NFL's biggest stage. "I probably won't get a chance", he had told reporters a few days before the game. "I just hope I can figure out some way to get on the field. I could come in on the punt-block team and stand behind the line and wave my arms, or something." But on his first drive, Grogan could only lead them to the 37-yard line, and they decided to punt rather than risk a 55-yard field goal attempt. The Bears then marched 72 yards in 11 plays, moving the ball inside the Patriots' 10-yard line. New England kept them out of the end zone, but Butler kicked his third field goal on the last play of the half to give Chicago a 23–3 halftime lead. The end of the first half was controversial. With 21 seconds left, McMahon scrambled to the Patriots' 3-yard line and was stopped inbounds. With the clock ticking down, players from both teams were fighting, and the Bears were forced to snap the ball before the officials formally put it back into play, allowing McMahon to throw the ball out of bounds and stop the clock with three seconds left. The Bears were penalized five yards for delay of game, but according to NFL rules, 10 seconds should have also been run off the clock during such a deliberate clock-stopping attempt in the final two minutes of a half. In addition, a flag should have been thrown for fighting (also according to NFL rules). This would have likely resulted in offsetting penalties, which would still allow for a field goal attempt. Meanwhile, the non-call on the illegal snap was promptly acknowledged by the officials and reported by NBC sportscasters during halftime, but the resulting three points were not taken away from the Bears (because of this instance, the NFL instructed officials to strictly enforce the 10-second run-off rule at the start of the 1986 season). The Bears had dominated New England in the first half, holding them to 21 offensive plays (only four of which resulted in positive yardage), −19 total offensive yards, two pass completions, one first down, and 3 points. While Eason was in the game, the totals were six possessions, one play of positive yardage out of 15 plays, no first downs, 3 points, 3 punts, 2 turnovers, no pass completions, and -36 yards of total offense. Meanwhile, Chicago gained 236 yards and scored 23 points themselves. Third quarter After the Patriots received the second-half kickoff, they managed to get one first down, but then had to punt after Grogan was sacked twice. Camarillo, who punted four times in the first half, managed to pin the Bears back at their own 4-yard line with a then-Super Bowl record 62-yard punt. But the Patriots' defense still had no ability to stop Chicago's offense. On their very first play, McMahon faked a handoff to Payton, then threw a 60-yard completion to Gault. Eight plays later, McMahon finished the Super Bowl-record 96-yard drive with a 1-yard touchdown run to increase the Bears' lead to 30–3. On New England's second drive of the quarter, Chicago cornerback Reggie Phillips (who replaced Frazier) intercepted a pass from Grogan and returned it 28 yards for a touchdown to increase the lead to 37–3. On the second play of their ensuing possession, the Patriots turned the ball over again, when receiver Cedric Jones lost a fumble after catching a 19-yard pass from Grogan, and Wilber Marshall returned the fumble 13 yards to New England's 37-yard line. A few plays later, McMahon's 27-yard completion to receiver Dennis Gentry moved the ball to the 1-yard line, setting up perhaps the most memorable moment of the game. William "The Refrigerator" Perry was brought on to score on offense, as he had done twice in the regular season. His touchdown (while running over Patriots linebacker Larry McGrew in the process) made the score 44–3. The Bears' 21 points in the third quarter is still a record for the most points scored in that period, and their 41-point lead remains the record for widest margin after three quarters in a Super Bowl. Perry's surprise touchdown cost Las Vegas sports books hundreds of thousands of dollars in losses from prop bets. Fourth quarter The Patriots finally scored a touchdown early in the fourth quarter, advancing the ball 76 yards in 12 plays and scoring on an 8-yard fourth-down pass from Grogan to receiver Irving Fryar. But the Bears' defense dominated New England for the rest of the game, forcing another fumble, another interception, and defensive lineman Henry Waechter's sack on Grogan in the end zone for a safety to make the final score 46–10. One oddity in the Bears' victory was that Walter Payton had a relatively poor performance running the ball and never scored a touchdown in Super Bowl XX, his only Super Bowl appearance during his Hall of Fame career. Many people including Mike Ditka have claimed that the reason for this was due to the fact that the Patriots' defensive scheme was centered on stopping Payton. Although Payton was ultimately the Bears' leading rusher during the game, the Patriots' defense held him to only 61 yards on 22 carries, with his longest run being only 7 yards. He was given several opportunities to score near the goal line, but New England stopped him every time before he reached the end zone (such as his 2-yard loss from the New England 3-yard line a few plays before Butler's second field goal, and his 2-yard run from the 4-yard line right before McMahon's first rushing touchdown). Thus, Chicago head coach Mike Ditka opted to go for other plays to counter the Patriots' defense. Ditka has since stated that his biggest regret of his career was not creating a scoring opportunity for Payton during the game. McMahon, who completed 12 out of 20 passes for 256 yards, became the first quarterback in a Super Bowl to score 2 rushing touchdowns. Bears receiver Willie Gault finished the game with 129 receiving yards on just 4 receptions, an average of 32.3 yards per catch. He also returned 4 kickoffs for 49 yards. Suhey had 11 carries for 52 yards and a touchdown, and caught a pass for 24 yards. Singletary tied a Super Bowl record with 2 fumble recoveries. Eason became the first Super Bowl starting quarterback to fail to complete a pass, going 0 for 6 attempts. Grogan completed 17 out of 30 passes for 177 yards and 1 touchdown, | the best reserve quarterbacks in the league. Grogan was the starter in six of the Patriots' games, and finished the regular season with 85 out of 156 completions for 1,311 yards, 7 touchdowns, and 5 interceptions. Wide receiver Stanley Morgan provided the team with a good deep threat, catching 39 passes for 760 yards and 5 touchdowns. On the other side of the field, multi-talented wide receiver Irving Fryar was equally effective, catching 39 passes for 670 yards, while also rushing for 27 yards, gaining another 559 yards returning punts and kickoffs, and scoring 10 touchdowns. But like the Bears, the Patriots' main strength on offense was their rushing attack. Halfback Craig James rushed for 1,227 yards, caught 27 passes for 370 yards, and scored 7 touchdowns. Fullback Tony Collins rushed for 657 yards, recorded a team-leading 52 receptions for 549 yards, and scored 5 touchdowns. The Patriots also had an outstanding offensive line, led by Pro Bowl tackle Brian Holloway and future Hall of Fame guard John Hannah. New England's defense ranked 5th in the league in fewest yards allowed (5,048). Pro Bowl linebacker Andre Tippett led the AFC with 16.5 sacks and recovered 3 fumbles. Pro Bowl linebacker Steve Nelson was also a big defensive weapon, excelling at pass coverage and run stopping. Also, the Patriots' secondary only gave up 14 touchdown passes during the season, second fewest in the league. Pro Bowl defensive back Raymond Clayborn recorded 6 interceptions for 80 return yards and 1 touchdown, while Pro Bowler Fred Marion had 7 interceptions for 189 return yards. Playoffs In the playoffs, the Patriots qualified as the AFC's second wild card. But the Patriots, under head coach Raymond Berry, defied the odds, beating the New York Jets 26–14, Los Angeles Raiders 27–20, and the Dolphins 31–14 – all on the road – to make it to the Super Bowl. The win against Miami had been especially surprising, not only because Miami was the only team to beat Chicago in the season, but also because New England had not won in the Orange Bowl (Miami's then-home field) since 1966, the Dolphins' first season (then in the AFL). The Patriots had lost to Miami there 18 consecutive times, including a 30–27 loss in their 15th game of the season. But New England dominated the Dolphins in the AFC Championship Game, recording two interceptions from quarterback Dan Marino and recovering 4 fumbles. New England remains the only team to finish third in their division and qualify for the Super Bowl in the same season. Meanwhile, the Bears became the first and only team in NFL history to shut out both of their opponents in the playoffs, beating the New York Giants 21–0 and the Los Angeles Rams 24–0. Super Bowl pregame hype Much of the Super Bowl pregame hype centered on Bears quarterback Jim McMahon. First, he was fined by the NFL during the playoffs for a violation of the league's dress code, wearing a head band from Adidas. He then started to wear a head band where he hand-wrote "Rozelle", after then-league commissioner Pete Rozelle. McMahon suffered a strained glute as the result of a hit taken in the NFC Championship Game and flew his acupuncturist into New Orleans to get treatment. During practice four days before the Super Bowl, he wore a headband reading "Acupuncture". During a Bears practice before the Super Bowl, McMahon mooned a helicopter that was hovering over the practice. Another anecdote involving McMahon during the Super Bowl anticipation involved WDSU sports anchor Buddy Diliberto reporting a quote attributed to McMahon, where he had allegedly referred to the women of New Orleans as "sluts" on a local morning sports talk show. This caused wide controversy among the women of New Orleans and McMahon began receiving calls from irate fans in his hotel. A groggy McMahon, who had not been able to sleep well because of all the calls he had gotten, was confronted by Mike Ditka later that morning and denied making the statement, saying he would not have even been awake to make the comment when he was said to have done so. He was supported in his claim by WLS reporter Les Grobstein, who was present when the alleged statements were made. WDSU would later retract the statement, have an on-air apology read by the station's general manager during the noon newscast on January 23, and suspended Diliberto. As the designated home team in the annual rotation between AFC and NFC teams, the Patriots wore their red jerseys with white pants, even though they wore white jerseys with red pants for all home games during the regular season. New England made the switch for the Super Bowl after winning vs. the Jets and Dolphins wearing red jerseys. The Bears donned their road white uniforms with navy pants. Broadcasting The NBC telecast of the game, with play-by-play announcer Dick Enberg and color commentators Merlin Olsen and Bob Griese (who was not in the booth with Enberg and Olsen), garnered the third highest Nielsen rating of any Super Bowl to date at 48.3, but it ended up being the first Super Bowl to garner over 90 million viewers, the highest ever at that time. While Dick Enberg, Merlin Olsen and Bob Griese called the game, Bob Costas and his NFL '85 castmates, Ahmad Rashad and Pete Axthelm anchored the pregame, halftime and postgame coverage. Other contributors included Charlie Jones (recapping Super Bowl I), Larry King (interviewing Mike Ditka and Raymond Berry), and Bill Macatee (profiling Patriots owner Billy Sullivan and his family). Also, the pregame coverage included what became known as "the silent minute"; a 60-second countdown over a black screen (a concept devised by then-NBC Sports executive Michael Weisman); a skit featuring comedian Rodney Dangerfield and an interview by NBC Nightly News anchor Tom Brokaw of United States President Ronald Reagan at the White House (this would not become a regular Super Bowl pregame feature until Super Bowl XLIII, when Today show host Matt Lauer interviewed U.S. President Barack Obama). The Last Precinct debuted on NBC after the game. Super Bowl XX was simulcast in Canada on CTV and also broadcast on Channel 4 in the United Kingdom, and Canal 5 in Mexico, with play-by-play announcers Toño de Valdés, Enrique Burak and color commentator Pepe Segarra. Super Bowl XX is featured on NFL's Greatest Games under the title Super Bears with narration by Don LaFontaine. The national radio broadcast was aired by NBC Radio, which outbid CBS Radio for the nationwide NFL contract in March 1985. Don Criqui was the play-by-play announcer, with Bob Trumpy as the color analyst. WGN-AM carried the game in the Chicago area (and thanks to WGN's 50,000-watt clear-channel signal, to much of the continental United States), with Wayne Larrivee on play-by-play, and Jim Hart and Dick Butkus providing commentary. WEEI carried the game in the Boston area, with John Carlson and Jon Morris on the call. Entertainment This was the first year that the NFL itself implemented the pregame entertainment. The pregame entertainment show began after the players left the field and ended with kick-off. Lesslee Fitzmorris created and directed the show. To celebrate the 20th Super Bowl game, the Most Valuable Players of the previous Super Bowls were featured during the pregame festivities. The number one song of the year coupled with video plays from each Super Bowl accompanied the presentation of each player. Performers formed the score of each championship game. The show concluded with the question of who would be the next Super Bowl Champions. This would start a tradition occurring every ten years (in Super Bowls XXX, XL and 50) in which past Super Bowl MVPs would be honored before the game. After trumpeter Wynton Marsalis performed the national anthem, Bart Starr, MVP of Super Bowl I and Super Bowl II, tossed the coin. The performance event group Up with People performed during the halftime show titled "Beat of the Future". Up with People dancers portrayed various scenes into the future. This was the last Super Bowl to feature Up with People as a halftime show, though they later performed in the Super Bowl XXV pregame show. The halftime show was dedicated to the memory of Dr. Martin Luther King Jr. (the first observance of Martin Luther King Jr. Day had been held the previous Monday). Game summary First quarter The Patriots took the then-quickest lead in Super Bowl history after linebacker Larry McGrew recovered a fumble from Walter Payton at the Chicago 19-yard line on the second play of the game (the Bears themselves would break this record in Super Bowl XLI when Devin Hester ran back the opening kickoff for a touchdown). Bears quarterback Jim McMahon took responsibility for this fumble after the game, saying he had called the wrong play. This set up Tony Franklin's 36-yard field goal 1:19 into the first quarter after three incomplete passes by Tony Eason (during the first of those three, starting tight end Lin Dawson went down with torn ligaments in his knee). "I looked up at the message board", said Chicago linebacker Mike Singletary, "and it said that 15 of the 19 teams that scored first won the game. I thought, yeah, but none of those 15 had ever played the Bears." Chicago struck back with a 7-play, 59-yard drive, featuring a 43-yard pass completion from McMahon to wide receiver Willie Gault, to set up a field goal from Kevin Butler, tying the score at 3–3. After both teams traded punts, Richard Dent and linebacker Wilber Marshall shared a sack on Eason, forcing a fumble that lineman Dan Hampton recovered on the Patriots 13-yard line. Chicago then drove to the 3-yard line, but had to settle for another field goal from Butler after rookie defensive lineman William "The Refrigerator" Perry was tackled (and technically sacked) for a 1-yard loss while trying to throw his first NFL pass on a halfback option play. On the Patriots' ensuing drive, Dent forced running back Craig James to fumble, which was recovered by Singletary at the 13-yard line. Two plays later, Bears fullback Matt Suhey scored on an 11-yard touchdown run to increase the lead to 13–3. New England took the ensuing kickoff and ran one play before the first quarter ended, which resulted in positive yardage for the first time in the game (a 3-yard run by James). Second quarter After an incomplete pass and a 4-yard loss, the Patriots had to send in punter Rich Camarillo again, and receiver Keith Ortego returned the ball 12 yards to the 41-yard line. The Bears subsequently drove 59 yards in 10 plays, featuring a 24-yard reception by Suhey, to score on McMahon's 2-yard touchdown run to increase their lead, 20–3. After the ensuing kickoff, New England lost 13 yards in 3 plays and had to punt again, but got the ball back with great field position when defensive back Raymond Clayborn recovered a fumble from Suhey at their own 46-yard line. On the punt, Ortego forgot what the play call was for the punt return, and the ensuing chaos resulted in him being penalized for running after a fair catch and teammate Leslie Frazier suffering a knee injury, which ended his career. Patriots head coach Raymond Berry then replaced Eason with Steve Grogan, who had spent the previous week hoping he would have the opportunity to step onto the NFL's biggest stage. "I probably won't get a chance", he had told reporters a few days before the game. "I just hope I can figure out some way to get on the field. I could come in on the punt-block team and stand behind the line and wave my arms, or something." But on his first drive, Grogan could only lead them to the 37-yard line, and they decided to punt rather than risk a 55-yard field goal attempt. The Bears then marched 72 yards in 11 plays, moving the ball inside the Patriots' 10-yard line. New England kept them out of the end zone, but Butler kicked his third field goal on the last play of the half to give Chicago a 23–3 halftime lead. The end of the first half was controversial. With 21 seconds left, McMahon scrambled to the Patriots' 3-yard line and was stopped inbounds. With the clock ticking down, players from both teams were fighting, and the Bears were forced to snap the ball before the officials formally put it back into play, allowing McMahon to throw the ball out of bounds and stop the clock with three seconds left. The Bears were penalized five yards for delay of game, but according to NFL rules, 10 seconds should have also been run off the clock during such a deliberate clock-stopping attempt in the final two minutes |
showed respect and trust. As a matter of courtesy a warship would fire her guns harmlessly out to sea, to show that she had no hostile intent. At first, ships were required to fire seven guns, and forts, with their more numerous guns and a larger supply of gunpowder, to fire 21 times. Later, as the quality of gunpowder improved, the British increased the number of shots required from ships to match the forts. The system of odd-numbered rounds originated from Samuel Pepys, Secretary to the Navy in the Restoration, as a way of economising on the use of powder, the rule until that time having been that all guns had to be fired. Odd numbers were chosen, as even numbers indicated a death. As naval customs evolved, the 21-gun salute came to be reserved for heads of state, with fewer rounds used to salute lower-ranking officials. Today, In the US Armed Forces, heads of government and cabinet ministers (e.g., the Vice President, U.S. cabinet members, and service secretaries), and military officers with five-star rank receive 19 rounds; four-stars receive 17 rounds; three-stars receive 15; two-stars receive 13; and a one-star general or admiral receives 11. These same standards are currently adhered to by ground-based saluting batteries. Multiples of 21-gun salutes may be fired for particularly important celebrations. In monarchies this is often done at births of members of the royal family of the country and other official celebrations associated with the royal family. United States Army Presidential Salute Battery A specialty platoon of the 3rd US Infantry Regiment (The Old Guard), the Presidential Salute Battery is based at Fort Myer, Virginia. The Guns Platoon (as it is known for short) has the task of rendering military honors in the National Capital Region, including armed forces full-honors funerals; state funerals; presidential inaugurations; full-honors wreath ceremonies at the Tomb of the Unknowns in Arlington National Cemetery; state arrivals at the White House and Pentagon, and retirement ceremonies for general-grade officers in the Military District of Washington, which are normally conducted at Fort Myer. The Presidential Salute Battery also participates in A Capitol Fourth, the Washington Independence Day celebration; the guns accompany the National Symphony Orchestra in performing the "1812 Overture". The platoon maintains its battery of ten ceremonially-modified World War II-vintage M5 anti-tank guns at the Old Guard regimental motor pool. Aerial salute A ceremonial or celebratory form of aerial salute is the flypast (known as a "flyover" in the United States), which often follows major parades such as the annual Trooping the Colour in the United Kingdom and the French Bastille Day military parade (défilé du 14 juillet). It is seen in other countries as well, notably Singapore and Canada. In Singapore, the Republic of Singapore Air Force usually conducts aerial salutes during the annual National Day Parade and major state events, such as during the funeral of Lee Kuan Yew. Gun salute by aircraft, primarily displayed during funerals, began with simple flypasts during World War I and have evolved into the missing man formation, where either a formation of aircraft is conspicuously missing an element or a single aircraft abruptly leaves a formation. A casual salute by an aircraft, somewhat akin to waving to a friend, is the custom of "waggling" the wings by partially rolling the aircraft first to one side, and then the other. By country Australia and New Zealand In both countries, the right-hand salute is generally identical to, and drawn from the traditions of, the British armed forces. The salute of the Australian or New Zealand Army is best described as the right arm taking the path of the longest way up and then the shortest way down. Similar in many ways, the salute of the Royal Australian Air Force and Royal New Zealand Air Force takes the longest way up and the shortest way down. The Royal Australian Navy and Royal New Zealand Navy, however, take the shortest way up, palm down, and the shortest way down. The action of the arm rotating up is slower than the action of the conclusion of the salute which is the arm being quickly "snapped" down to the saluter's side. Junior members are required to salute first and the senior member is obliged to return the compliment. Protocol dictates that the monarch, members of the royal family, the governor-general, and state governors are to be saluted at all times by all ranks. Except where a drill manual (or parade) protocol dictates otherwise, the duration of the salute is timed at three beats of the quick-time march (approximately 1.5 seconds), timed from the moment the senior member first returns it. In situations where cover (or "headdress", as it is called in the Australian Army) is not being worn, the salute is given verbally; the junior party (or at least the senior member thereof) will first come to attention, then offer the salute "Good morning/afternoon Your Majesty/Your Royal Highness/Prime Minister/Your Grace/Sir/Ma'am", etc., as the case may be. It is this, rather than the act of standing to attention, which indicates that a salute is being offered. If either party consists of two or more members, all will come to attention, but only the most senior member of the party will offer (or return) the physical or verbal salute. The party wearing headdress must always offer, or respond with, a full salute. But within the Forward Edge of the Battle Area (FEBA) no salutes of any kind are given, under any circumstances; it is always sensible to assume that there are snipers in the area who may see or overhear. In this case, parties personally known to each other are addressed familiarly by their first or given names, regardless of rank; senior officers are addressed as one might address a stranger, courteously, but without any naming or mark of respect. Canada Much as the British salute described above (except the palm is level with the ground, without the U.S.A. slight over-rotation of the wrist), the Canadian military salutes to demonstrate a mark of respect and courtesy for the commissioned ranks. When in uniform and not wearing headdress one does not salute. Instead, compliments shall be paid by standing at attention. If on the march, arms shall be swung and the head turned to the left or right as required. On Remembrance Day, 2009, The Prince of Wales attended the national ceremony in Ottawa with Governor General Michaëlle Jean—both wearing Canadian military dress. CBC live television coverage of the event noted that, when Prince Charles saluted, he performed the Canadian form of the salute with a cupped hand (the British "naval salute"—appropriate, as he did his military service as an officer in the Royal Navy), adopted by all elements of the Canadian Forces after unification in 1968, rather than the British (Army) form with the palm facing forward. Denmark In the Danish military, there are two types of military salutes. The first type is employed by the Royal Danish Navy, Royal Danish Air Force, and Guard Hussar Regiment Mounted Squadron, and is the same as the one used by the U.S. The second is employed by the Royal Danish Army, and goes as follows: Raise the right arm forward, as to have upper arm 90 degrees from the body. Move the right hand to the temple, and have it parallel to the ground. France The fraternity and courtesy for all soldiers; subordinates salute superiors and every salute is given back. Salutes are not performed if a member is wearing a headdress or if he is holding a weapon. The French salute, is performed with a flat hand, palm facing forwards; the upper arm is horizontal and the tips of the fingers come near the corner of the eyes. The hand, unlike the British salute, remains at a 45-degree angle in line with the lower arm. The five fingers are lined together. It mirrors the gesture made by knights greeting each other, raising their visors to show their faces. A crisp tension may be given when the salute is taken or broken. Some "creative" salutes are in use in certain mounted (cavalry) units. The fingers can be spread out with only the right thumb brushing the temple, or the hand can be cocked vertically along the cheek, with the little finger detached or not. These unusual regimental salutes are Mannerisms which are lost during official ceremonies. A civilian (even if he has a hat) never salutes, but a nod to a patrolling soldier is generally appreciated. Germany In the German Bundeswehr, the salute is performed with a flat hand, with the thumb resting on the index finger. The hand is slightly tilted to the front so that the thumb can not be seen. The upper arm is horizontal and the fingers point to the temple but do not touch it or the headgear. Every soldier saluting another uniformed soldier is entitled to be saluted in return. Soldiers below the rank of Feldwebel are not permitted to speak while saluting. Since the creation of the Bundeswehr, soldiers are required to salute with and without headgear. Originally, in the Reichswehr it was not permitted to perform the salute when the soldier is not wearing uniform headgear. In the Wehrmacht, the traditional military salute was required when wearing headgear, but the Nazi salute was performed when not wearing headgear. The Wehrmacht eventually fully adopted the Nazi salute following the 20 July Plot. East German National People's Army followed the Reichswehr protocol. India In India, the three forces have different salutes with the Indian Army and the Indian Navy following the British tradition. In the Indian army, the salute is performed by keeping the open palm forward, with fingers and thumb together and middle finger almost touching the hatband or right eyebrow. This is often accompanied by the salutation "Jai Hind" which means long live India or Victory to India, or the regimental salutation, e.g. "Sat Sri Akal" in the Sikh Regiment. The Navy salute has the palm facing towards the ground at a 90-degree angle. The Indian Air Force salute involves the right arm being sharply raised from the front by the shortest possible way, with the plane of the palm at 45-degree angle to the forehead. Indonesia In Indonesia, executing a salute has its regulations. Members who are part of a uniformed institution and wearing a uniform will implement a gesture of salute according to the regulations of the institution the member is part of. In this case, personnel of the TNI and Indonesian National Police are to implement a hand salute by forming the right hand up making an angle of 90 degrees and is bent 45 degrees, fingers are pressed together and placed near the temple of the right eye, palm facing down. Personnel wearing a headdress place the tip of the right index finger touching the front right tip of the headdress. Other uniformed organizations/institutions which are not part of the military/police will implement a hand salute as done by members of the military/police. The command for this gesture in Indonesian is Hormat, Gerak!. Military and police personnel armed with a rifle during a ceremony will implement a present arms while personnel unarmed will execute the hand salute. This is done during the raising and/or lowering of the national flag, rendition or singing of the national anthem, and when saluting a person or object worth saluting. Israel In the Israel Defense Forces, saluting is normally reserved for special ceremonies. Unlike in the US Army, saluting is not a constant part of day to day barracks life. Italy The hand salute is still performed according to the army "Infantry Training – Formal Instructions" regulation, chapter II, section 12 (1939) "The salute is completed sharply ... bringing the right hand vigorously to the visor of the headdress, with the tip of the fingers over the right eye; the hand in line with the forearm, with the palm facing downwards, the fingers joined and stretched, the index finger in contact with the edge of the visor; horizontal arm, forearm naturally inclined". The air force and navy use the same procedure, with the single exception of the navy boatswains that salute left-handed while giving the traditional "pipe aboard", as their right hand is used to hold the boatswain's call. When given individually, the salute is given by inferior to superior ranks and is held until returned, and by word of command when given by a formed unit. For personnel not wearing hats, holding weapons or with otherwise encumbered hands, the salute is given by coming to attention. During marching armed parades only the officer in command salutes for the whole unit, briefly bringing the flat of his sword to his face if in full dress, or giving the standard hand salute if in combat uniform. During flag-rising and flag-lowering armed parades all officers and senior NCOs hand salute the flag, while other ranks present arms, and the whole unit sings the national anthem. Flag parties give salute by slightly inclining the flag only, with the flag-bearer and the escort not giving individual salutes. Japan In Japan, the angle of salute depends on the branch. In the Ground and the Air Self-Defense Forces, the salute is 90 degrees under the armpit like the U.S. Armed Forces. In the Maritime Self-Defense Forces, the salute is a 45-degree angle because of the narrowness of a ship's interior spaces. To prevent a member's elbow from hitting other members, subordinates may be given approval to not salute in a corridor inside the ship. Furthermore, in all the branches, if a member is not wearing their cap, then they should salute by bowing 10 degrees. Pakistan In Pakistan, the salute is generally identical to that of British armed forces. In the Army and Air Force, the salute is given with the right hand palm facing forward and fingers slightly touching the right side of the forehead, but not on the forehead. The Navy continues to salute palm down. The salute must be performed by the lower rank officials to the higher rank officials under all conditions except when the higher rank official is not in uniform or if the lower rank official is the driver and the vehicle is in motion. The salute is never performed by the left hand even if the right hand is occupied. People's Republic of China Military personnel of the People's Liberation Army salute palm-down, similar to the Royal Navy or US Military salutes. Poland Polish military personnel use two fingers to salute, with the middle and index fingers extended and touching each other, while the ring and little fingers are bent and touched by the thumb. Sweden Salutes are similar to those of the Royal Navy. The official instruction for stationary salute states: "The right hand is quickly raised straight up to the headgear. The fingers straight but not stiff next to each other, the little finger edge facing forward. One or two finger tips lightly resting against the right part of the head gear (visor), so that the hand does not obstruct the eye. The wrist straight, the elbow angled forward and slightly lower than the shoulder." Salutes to persons are normally not made when further away than 30 m. Hand salutes are performed only when carrying head gear, if bare headed (normally only indoors) a swift turning of the head towards the person that is being saluted is made instead. The same applies if the right hand is carrying any item that cannot easily be transferred to the left hand. During inspections and when on guard duty, the salute is made by coming to attention. Drivers of moving vehicles never salute. In formations, only the commander salutes. Switzerland Swiss soldiers are required to salute any higher-ranking military personnel whenever they encounter them. When the soldier announces to a higher-ranking person he has to state the superior's rank, his rank and his name. When a military formation encounters a superior, it has to state the name of the formation. The salute is given like that of the British navy with the palm pointing towards the shoulder, the tips of the fingers pointing towards the temple. Turkey Within the Turkish military hand salutes are only given when a cover (protection for the head, usually a hat) is worn. If the head is not covered or when the personnel is carrying a rifle on the shoulder the head salute is performed by nodding the head forward slightly while maintaining erect posture. The salute (hand or head) must be performed first by the lower ranking personnel to the higher ranking personnel, and higher official is expected to return the salute, under all conditions except: Personnel who are driving vehicles. Personnel who are on sentry, patrol, observation duty or defending a specific point. Personnel on combat orders. Personnel who are transporting live ammunition. Military prisoners and personnel escorting them. The casket of a soldier killed in the line of duty (irrespective of rank) has to be saluted by all ranks of personnel. United Kingdom British Army Since 1917, the British Army's salute has been given with the right hand palm facing forwards with the fingers almost touching the cap or beret. Before 1917, for Other Ranks (i.e. not officers) the salute was given with whichever hand was furthest from the person being saluted, whether that was the right or the left. Officers always saluted with the right hand (as the left, in theory, would always be required to hold the scabbard of their sword). The salute is given to acknowledge the Queen's commission. A salute may not be given unless a soldier is wearing his regimental headdress, for example a beret, caubeen, Tam o' Shanter, Glengarry, field service cap or peaked cap. This does not apply to members of The Blues and Royals (RHG/1stD) The Household Cavalry who, after The Battle of Warburg were allowed to salute without headdress. If a soldier or officer is not wearing headdress then he or she must come to attention instead of giving/returning the salute. The subordinate salutes first and maintains the salute until the superior has responded in kind. There is a widespread though erroneous belief that it is statutory for "all ranks to salute a bearer of the Victoria Cross". There is no official requirement that appears in the official Warrant of the VC, nor in Queen's Regulations and Orders, but tradition dictates that this occurs and as such the Chiefs of Staff will salute a Private awarded either a VC or George Cross. Royal Air Force The custom of saluting commissioned officers relates wholly to the commission given by Her Majesty the Queen to that officer, not the person. Therefore, when a subordinate airman salutes an officer, he is indirectly acknowledging Her Majesty as Head of State. A salute returned by the officer is on behalf of the Queen. The RAF salute is similar to the British Army, the hand is brought upwards in a circular motion out from the body, it is stopped 1 inch (25 mm) to the rear and to the right of the right eye, the elbow and wrist are kept in line with the shoulder. The hand is then brought straight down back to the position of attention, this movement is completed to the timing "UP TWO-THREE DOWN". Royal Navy The Naval salute differs in that the palm of the hand faces down towards the shoulder. This dates back to the days of sailing ships, when tar and pitch were used to seal a ship's timbers from seawater. To protect their hands, officers wore white gloves and it was considered most undignified to present a dirty palm in the salute, so the hand was turned through 90 degrees. A common story is that Queen Victoria, having been saluted by an individual with a dirty palm, decreed that in future sailors of the fleet would salute palm down, with the palm facing the ground. Royal Marines The Royal Marines follow the British Army and salute with the right hand palm facing forward. British Empire In the British Empire (originally in the maritime and hinterland sphere of influence of the East India Company, HEIC, | Restoration, as a way of economising on the use of powder, the rule until that time having been that all guns had to be fired. Odd numbers were chosen, as even numbers indicated a death. As naval customs evolved, the 21-gun salute came to be reserved for heads of state, with fewer rounds used to salute lower-ranking officials. Today, In the US Armed Forces, heads of government and cabinet ministers (e.g., the Vice President, U.S. cabinet members, and service secretaries), and military officers with five-star rank receive 19 rounds; four-stars receive 17 rounds; three-stars receive 15; two-stars receive 13; and a one-star general or admiral receives 11. These same standards are currently adhered to by ground-based saluting batteries. Multiples of 21-gun salutes may be fired for particularly important celebrations. In monarchies this is often done at births of members of the royal family of the country and other official celebrations associated with the royal family. United States Army Presidential Salute Battery A specialty platoon of the 3rd US Infantry Regiment (The Old Guard), the Presidential Salute Battery is based at Fort Myer, Virginia. The Guns Platoon (as it is known for short) has the task of rendering military honors in the National Capital Region, including armed forces full-honors funerals; state funerals; presidential inaugurations; full-honors wreath ceremonies at the Tomb of the Unknowns in Arlington National Cemetery; state arrivals at the White House and Pentagon, and retirement ceremonies for general-grade officers in the Military District of Washington, which are normally conducted at Fort Myer. The Presidential Salute Battery also participates in A Capitol Fourth, the Washington Independence Day celebration; the guns accompany the National Symphony Orchestra in performing the "1812 Overture". The platoon maintains its battery of ten ceremonially-modified World War II-vintage M5 anti-tank guns at the Old Guard regimental motor pool. Aerial salute A ceremonial or celebratory form of aerial salute is the flypast (known as a "flyover" in the United States), which often follows major parades such as the annual Trooping the Colour in the United Kingdom and the French Bastille Day military parade (défilé du 14 juillet). It is seen in other countries as well, notably Singapore and Canada. In Singapore, the Republic of Singapore Air Force usually conducts aerial salutes during the annual National Day Parade and major state events, such as during the funeral of Lee Kuan Yew. Gun salute by aircraft, primarily displayed during funerals, began with simple flypasts during World War I and have evolved into the missing man formation, where either a formation of aircraft is conspicuously missing an element or a single aircraft abruptly leaves a formation. A casual salute by an aircraft, somewhat akin to waving to a friend, is the custom of "waggling" the wings by partially rolling the aircraft first to one side, and then the other. By country Australia and New Zealand In both countries, the right-hand salute is generally identical to, and drawn from the traditions of, the British armed forces. The salute of the Australian or New Zealand Army is best described as the right arm taking the path of the longest way up and then the shortest way down. Similar in many ways, the salute of the Royal Australian Air Force and Royal New Zealand Air Force takes the longest way up and the shortest way down. The Royal Australian Navy and Royal New Zealand Navy, however, take the shortest way up, palm down, and the shortest way down. The action of the arm rotating up is slower than the action of the conclusion of the salute which is the arm being quickly "snapped" down to the saluter's side. Junior members are required to salute first and the senior member is obliged to return the compliment. Protocol dictates that the monarch, members of the royal family, the governor-general, and state governors are to be saluted at all times by all ranks. Except where a drill manual (or parade) protocol dictates otherwise, the duration of the salute is timed at three beats of the quick-time march (approximately 1.5 seconds), timed from the moment the senior member first returns it. In situations where cover (or "headdress", as it is called in the Australian Army) is not being worn, the salute is given verbally; the junior party (or at least the senior member thereof) will first come to attention, then offer the salute "Good morning/afternoon Your Majesty/Your Royal Highness/Prime Minister/Your Grace/Sir/Ma'am", etc., as the case may be. It is this, rather than the act of standing to attention, which indicates that a salute is being offered. If either party consists of two or more members, all will come to attention, but only the most senior member of the party will offer (or return) the physical or verbal salute. The party wearing headdress must always offer, or respond with, a full salute. But within the Forward Edge of the Battle Area (FEBA) no salutes of any kind are given, under any circumstances; it is always sensible to assume that there are snipers in the area who may see or overhear. In this case, parties personally known to each other are addressed familiarly by their first or given names, regardless of rank; senior officers are addressed as one might address a stranger, courteously, but without any naming or mark of respect. Canada Much as the British salute described above (except the palm is level with the ground, without the U.S.A. slight over-rotation of the wrist), the Canadian military salutes to demonstrate a mark of respect and courtesy for the commissioned ranks. When in uniform and not wearing headdress one does not salute. Instead, compliments shall be paid by standing at attention. If on the march, arms shall be swung and the head turned to the left or right as required. On Remembrance Day, 2009, The Prince of Wales attended the national ceremony in Ottawa with Governor General Michaëlle Jean—both wearing Canadian military dress. CBC live television coverage of the event noted that, when Prince Charles saluted, he performed the Canadian form of the salute with a cupped hand (the British "naval salute"—appropriate, as he did his military service as an officer in the Royal Navy), adopted by all elements of the Canadian Forces after unification in 1968, rather than the British (Army) form with the palm facing forward. Denmark In the Danish military, there are two types of military salutes. The first type is employed by the Royal Danish Navy, Royal Danish Air Force, and Guard Hussar Regiment Mounted Squadron, and is the same as the one used by the U.S. The second is employed by the Royal Danish Army, and goes as follows: Raise the right arm forward, as to have upper arm 90 degrees from the body. Move the right hand to the temple, and have it parallel to the ground. France The fraternity and courtesy for all soldiers; subordinates salute superiors and every salute is given back. Salutes are not performed if a member is wearing a headdress or if he is holding a weapon. The French salute, is performed with a flat hand, palm facing forwards; the upper arm is horizontal and the tips of the fingers come near the corner of the eyes. The hand, unlike the British salute, remains at a 45-degree angle in line with the lower arm. The five fingers are lined together. It mirrors the gesture made by knights greeting each other, raising their visors to show their faces. A crisp tension may be given when the salute is taken or broken. Some "creative" salutes are in use in certain mounted (cavalry) units. The fingers can be spread out with only the right thumb brushing the temple, or the hand can be cocked vertically along the cheek, with the little finger detached or not. These unusual regimental salutes are Mannerisms which are lost during official ceremonies. A civilian (even if he has a hat) never salutes, but a nod to a patrolling soldier is generally appreciated. Germany In the German Bundeswehr, the salute is performed with a flat hand, with the thumb resting on the index finger. The hand is slightly tilted to the front so that the thumb can not be seen. The upper arm is horizontal and the fingers point to the temple but do not touch it or the headgear. Every soldier saluting another uniformed soldier is entitled to be saluted in return. Soldiers below the rank of Feldwebel are not permitted to speak while saluting. Since the creation of the Bundeswehr, soldiers are required to salute with and without headgear. Originally, in the Reichswehr it was not permitted to perform the salute when the soldier is not wearing uniform headgear. In the Wehrmacht, the traditional military salute was required when wearing headgear, but the Nazi salute was performed when not wearing headgear. The Wehrmacht eventually fully adopted the Nazi salute following the 20 July Plot. East German National People's Army followed the Reichswehr protocol. India In India, the three forces have different salutes with the Indian Army and the Indian Navy following the British tradition. In the Indian army, the salute is performed by keeping the open palm forward, with fingers and thumb together and middle finger almost touching the hatband or right eyebrow. This is often accompanied by the salutation "Jai Hind" which means long live India or Victory to India, or the regimental salutation, e.g. "Sat Sri Akal" in the Sikh Regiment. The Navy salute has the palm facing towards the ground at a 90-degree angle. The Indian Air Force salute involves the right arm being sharply raised from the front by the shortest possible way, with the plane of the palm at 45-degree angle to the forehead. Indonesia In Indonesia, executing a salute has its regulations. Members who are part of a uniformed institution and wearing a uniform will implement a gesture of salute according to the regulations of the institution the member is part of. In this case, personnel of the TNI and Indonesian National Police are to implement a hand salute by forming the right hand up making an angle of 90 degrees and is bent 45 degrees, fingers are pressed together and placed near the temple of the right eye, palm facing down. Personnel wearing a headdress place the tip of the right index finger touching the front right tip of the headdress. Other uniformed organizations/institutions which are not part of the military/police will implement a hand salute as done by members of the military/police. The command for this gesture in Indonesian is Hormat, Gerak!. Military and police personnel armed with a rifle during a ceremony will implement a present arms while personnel unarmed will execute the hand salute. This is done during the raising and/or lowering of the national flag, rendition or singing of the national anthem, and when saluting a person or object worth saluting. Israel In the Israel Defense Forces, saluting is normally reserved for special ceremonies. Unlike in the US Army, saluting is not a constant part of day to day barracks life. Italy The hand salute is still performed according to the army "Infantry Training – Formal Instructions" regulation, chapter II, section 12 (1939) "The salute is completed sharply ... bringing the right hand vigorously to the visor of the headdress, with the tip of the fingers over the right eye; the hand in line with the forearm, with the palm facing downwards, the fingers joined and stretched, the index finger in contact with the edge of the visor; horizontal arm, forearm naturally inclined". The air force and navy use the same procedure, with the single exception of the navy boatswains that salute left-handed while giving the traditional "pipe aboard", as their right hand is used to hold the boatswain's call. When given individually, the salute is given by inferior to superior ranks and is held until returned, and by word of command when given by a formed unit. For personnel not wearing hats, holding weapons or with otherwise encumbered hands, the salute is given by coming to attention. During marching armed parades only the officer in command salutes for the whole unit, briefly bringing the flat of his sword to his face if in full dress, or giving the standard hand salute if in combat uniform. During flag-rising and flag-lowering armed parades all officers and senior NCOs hand salute the flag, while other ranks present arms, and the whole unit sings the national anthem. Flag parties give salute by slightly inclining the flag only, with the flag-bearer and the escort not giving individual salutes. Japan In Japan, the angle of salute depends on the branch. In the Ground and the Air Self-Defense Forces, the salute is 90 degrees under the armpit like the U.S. Armed Forces. In the Maritime Self-Defense Forces, the salute is a 45-degree angle because of the narrowness of a ship's interior spaces. To prevent a member's elbow from hitting other members, subordinates may be given approval to not salute in a corridor inside the ship. Furthermore, in all the branches, if a member is not wearing their cap, then they should salute by bowing 10 degrees. Pakistan In Pakistan, the salute is generally identical to that of British armed forces. In the Army and Air Force, the salute is given with the right hand palm facing forward and fingers slightly touching the right side of the forehead, but not on the forehead. The Navy continues to salute palm down. The salute must be performed by the lower rank officials to the higher rank officials under all conditions except when the higher rank official is not in uniform or if the lower rank official is the driver and the vehicle is in motion. The salute is never performed by the left hand even if the right hand is occupied. People's Republic of China Military personnel of the People's Liberation Army salute palm-down, similar to the Royal Navy or US Military salutes. Poland Polish military personnel use two fingers to salute, with the middle and index fingers extended and touching each other, while the ring and little fingers are bent and touched by the thumb. Sweden Salutes are similar to those of the Royal Navy. The official instruction for stationary salute states: "The right hand is quickly raised straight up to the headgear. The fingers straight but not stiff next to each other, the little finger edge facing forward. One or two finger tips lightly resting against the right part of the head gear (visor), so that the hand does not obstruct the eye. The wrist straight, the elbow angled forward and slightly lower than the shoulder." Salutes to persons are normally not made when further away than 30 m. Hand salutes are performed only when carrying head gear, if bare headed (normally only indoors) a swift turning of the head towards the person that is being saluted is made instead. The same applies if the right hand is carrying any item that cannot easily be transferred to the left hand. During inspections and when on guard duty, the salute is made by coming to attention. Drivers of moving vehicles never salute. In formations, only the commander salutes. Switzerland Swiss soldiers are required to salute any higher-ranking military personnel whenever they encounter them. When the soldier announces to a higher-ranking person he has to state the superior's rank, his rank and his name. When a military formation encounters a superior, it has to state the name of the formation. The salute is given like that of the British navy with the palm pointing towards the shoulder, the tips of the fingers pointing towards the temple. Turkey Within the Turkish military hand salutes are only given when a cover (protection for the head, usually a hat) is worn. If the head is not covered or when the personnel is carrying a rifle on the shoulder the head salute is performed by nodding the head forward slightly while maintaining erect posture. The salute (hand or head) must be performed first by the lower ranking personnel to the higher ranking personnel, and higher official is expected to return the salute, under all conditions except: Personnel who are driving vehicles. Personnel who are on sentry, patrol, observation duty or defending a specific point. Personnel on combat orders. Personnel who are transporting live ammunition. Military prisoners and personnel escorting them. The casket of a soldier killed in the line of duty (irrespective of rank) has to be saluted by all ranks of personnel. United Kingdom British Army Since 1917, the British Army's salute has been given with the right hand palm facing forwards with the fingers almost touching the cap or beret. Before 1917, for Other Ranks (i.e. not officers) the salute was given with whichever hand was furthest from the person being saluted, whether that was the right or the left. Officers always saluted with the right hand (as the left, in theory, would always be required to hold the scabbard of their sword). The salute is given to acknowledge the Queen's commission. A salute may not be given unless a soldier is wearing his regimental headdress, for example a beret, caubeen, Tam o' Shanter, Glengarry, field service cap or peaked cap. This does not apply to members of The Blues and Royals (RHG/1stD) The Household Cavalry who, after The Battle of Warburg were allowed to salute without headdress. If a soldier or officer is not wearing headdress then he or she must come to attention instead of giving/returning the salute. The subordinate salutes first and maintains the salute until the superior has responded in kind. There is a widespread though erroneous belief that it is statutory for "all ranks to salute a bearer of the Victoria Cross". There is no official requirement that appears in the official Warrant of the VC, nor in Queen's Regulations and Orders, but tradition dictates that this occurs and as such the Chiefs of Staff will salute a Private awarded either a VC or George Cross. Royal Air Force The custom of saluting commissioned officers relates wholly to the commission given by Her Majesty the Queen to that officer, not the person. Therefore, when a subordinate airman salutes an officer, he is indirectly acknowledging Her Majesty as Head of State. A salute returned by the officer is on behalf of the Queen. The RAF salute is similar to the British Army, the hand is brought upwards in a circular motion out from the body, it is stopped 1 inch (25 mm) to the rear and to the right of the right eye, the elbow and wrist are kept in line with the shoulder. The hand is then brought straight down back to the position of attention, this movement is completed to the timing "UP TWO-THREE DOWN". Royal Navy The Naval salute differs in that the palm of the hand faces down towards the shoulder. This dates back to the days of sailing ships, when tar and pitch were used to seal a ship's timbers from seawater. To protect their hands, officers wore white gloves and it was considered most undignified to present a dirty palm in the salute, so the hand was turned through 90 degrees. A common story is that Queen Victoria, having been saluted by an individual with a dirty palm, decreed that in future sailors of the fleet would salute palm down, with the palm facing the ground. Royal Marines The Royal Marines follow the British Army and salute with the right hand palm facing forward. British Empire In the British Empire (originally in the maritime and hinterland sphere of influence of the East India Company, HEIC, later transformed into crown territories), mainly in British India, the numbers of guns fired as a gun salute to the ruler of a so-called princely state became a politically highly significant indicator of his status, not governed by objective rules, but awarded (and in various cases increased) by the British paramount power, roughly reflecting his state's socio-economic, political and/or military weight, but also as a prestigious reward for loyalty to the Raj, in classes (always odd numbers) from three to twenty-one (seven lacking), for the "vassal" indigenous rulers (normally hereditary with a throne, sometimes raised as a personal distinction for an individual ruling prince). Two sovereign monarchies officially outside the Empire were granted a higher honour: thirty-one guns for the royal houses of Afghanistan (under British and Russian influence), and Siam (which was then ruled by the Rattanakosin Kingdom). In addition, the right to style himself Highness (Majesty, which since its Roman origin expresses the sovereign authority of the state, was denied to all "vassals"), a title of great importance in international relations, was formally restricted to rulers of relatively high salute ranks (originally only those with eleven guns or more, later also those with nine guns). United States U.S. Armed Forces Within the United States military, the salute is a courteous exchange of greetings, with the HDB individual salute, the head and eyes are turned toward the Colors or person saluted. Military personnel in uniform are required to salute when they meet and recognize persons entitled to a salute, except when it is inappropriate or impractical (in public conveyances such as planes and buses, in public places such as inside theaters, or when driving a vehicle). It is believed that the U.S. military's salute was influenced by British military, although it differs slightly, in that the palm of the hand faces down towards the shoulder. This difference may date back to the days of sailing ships, when tar and pitch were used to seal the timber from seawater. During such times, it was considered undignified to present a dirty palm in the salute, so the hand was turned through 90 degrees. Specifically, a proper salute goes as follows: Raise the right hand sharply, fingers and thumb extended and joined, palm facing down, and place the tip of the right forefinger on the rim of the visor, slightly to the right of the eye. The outer edge of the hand is barely canted downward so that neither the back of the hand nor the palm is clearly visible from the front. The hand and wrist are straight, the elbow inclined slightly forward, and the upper arm is horizontal. The United States Army and United States Air Force give salutes with head both covered and uncovered, but saluting indoors is forbidden except when formally reporting to a superior officer or during an indoor ceremony. When outdoors, a head cover is to be worn at all times when wearing Army Combat Uniforms, but is not required when wearing physical training (PT) gear. The United States Navy, Marine Corps and Coast Guard do not salute when the head is uncovered or out of uniform. US State defense forces State Defense Forces (SDF; also known as state military, state guards, state militias, or state military reserves) in the United States are military units that operate under the sole authority of a state government. State defense forces are authorized by state and federal law and are under the command of the governor of each state. State defense forces soldiers are subject to the Uniform Code of Military Justice. They are also subject to their state military laws and regulations and render the same customs and courtesies as active duty, Reserve and National Guard personnel. Zogist salute The Zogist salute is a military salute that was instituted by Zog I of Albania. It is a gesture whereby the right hand is placed over the heart, with the palm facing downwards. It was first widely used by Zog's personal police force and was later adopted by the Royal Albanian Army. In Mexico, a salute similar to the Zogist one is rendered by Mexican civilians during the playing of the Mexican national anthem. Non-military services Canadian police All Police forces are taught to salute like the Canadian Armed Forces with a level palm and the middle finger aligned with the right eye, and not the brim of the hat. Although over time soldiers will end up saluting however they wish. Non-police Similar salutes are used by guards of honour for non-police services (e.g. Toronto Fire Services, Toronto Transit Commission) during funerals or ceremonial events. Hong Kong All uniform branches of the Hong Kong Police, Police Auxiliary, Police Pipeband, Fire (including Ambulance service members), Immigration, Customs, Correctional Services, Government Flying Service, Civil Aid Service) salute according to British Army traditions. Personnel stationed with the People's Liberation Army in Hong Kong salute using the Chinese military standards and similar to those used by the Royal Navy. Non-government organizations like Hong Kong Air Cadet Corps, Hong Kong Adventure Corps, the Boys' Brigade, Hong Kong, Hong Kong Sea Cadet Corps and St. John Ambulance all follow the same military salutes due to their ties with the British Armed Forces. Civilian military auxiliaries (U.S.) Civil Air Patrol In the United States, civilian military auxiliaries such as the Civil Air Patrol are required to salute all commissioned and warrant officers of higher rank and return the salute of those with lower ranks of the U.S. Uniformed Services (Army, Navy, Air Force, Marine Corps, Coast Guard, U.S. Public Health Service, National Oceanic and Atmospheric Administration Commissioned Corps) senior in rank to them, as well as all friendly foreign officers, though military members are not required to reciprocate (they may salute voluntarily if they choose). CAP officers are required to salute one another though this is not uniformly observed throughout the CAP. Cadets are required to salute all senior members and military/uniformed services personnel. U.S. Coast Guard Auxiliary The U.S. Coast Guard Auxiliary requires its members to salute all commissioned and warrant officers of higher rank and return the salute of those with lower ranks; since Auxiliarists hold "office" rather than "grade" (indicated by modified military insignia), all Auxiliarists are required to perform this courtesy. Saluting between Auxiliarists is not usually the custom, but is not out of protocol to do so. When operating in direct support of the USCG, or when on military installations in general, Auxiliarists usually wear "member" insignia unless specified otherwise by the officer/NCO in charge. Civilian salutes In most countries, civilians have their own form of salutes. Albania The same salute of the United States was instituted in Albania as the "Zog salute" by King Zog I. Indonesia In Indonesia, executing a salute is also regulated for civilians according to the Constitution of Indonesia. The salute gesture for civilians in civilian clothing is to stand upright |
Norway after ingesting counterfeit rohypnol tablets containing scopolamine. In January 2018, 9 individuals were hospitalized in Perth, Western Australia, after reportedly ingesting scopolamine. However, the alkaloid scopolamine, when taken recreationally for its psychoactive effect is usually taken in the form of preparations from plants of the genera Datura or Brugmansia, often by adolescents or young adults in order to achieve hallucinations and an altered state of consciousness induced by muscarinic antagonism. In circumstances such as these, the intoxication is usually built on a synergistic but even more toxic mixture of the additional alkaloids in the plants which includes atropine and hyoscyamine. Historically, the various plants that produce scopolamine have been used psychoactively for spiritual and magical purposes. When entheogenic preparations of these plants were used, scopolamine was considered to be the main psychoactive compound and was largely responsible for the hallucinogenic effects, particularly when the preparation was made into a topical ointment (most notably flying ointment). Scopolamine is reported to be the only active alkaloid within these plants that can effectively be absorbed through the skin to cause effects. Different recipes for these ointments were explored in European witchcraft at least as far back as the Early Modern period and included multiple ingredients to help with the transdermal absorption of scopolamine (such as animal fat), as well as other possible ingredients to counteract its noxious and dysphoric effects. In Christianity, although not explicitly designated for ritualistic or spiritual use; in the Bible there are multiple mentions of Mandrake which is a psychoactive and hallucinogenic plant root that contains scopolamine. It was associated with fertility power and (sexual) desire where it was yearned for by Rachel, who apparently was "barren" (infertile) but trying to conceive. Interrogation The effects of scopolamine were studied for use as a truth serum in interrogations in the early 20th century, but because of the side effects, investigations were dropped. In 2009, the Czechoslovak state security secret police were proven to have used scopolamine at least three times to obtain confessions from alleged antistate dissidents. Crime A travel advisory published by the Overseas Security Advisory Council (OSAC) in 2012 stated: Between 1998 and 2004, 13% of emergency-room admissions for "poisoning with criminal intentions" in a clinic of Bogotá, Colombia, have been attributed to scopolamine, and 44% to benzodiazepines. Most commonly, the person has been poisoned by a robber who gave the victim a scopolamine-laced beverage, in the hope that the victim would become unconscious or unable to effectively resist the robbery. Beside robberies, it is also allegedly involved in express kidnappings and sexual assault. The Hospital Clínic in Barcelona introduced a protocol in 2008 to help medical workers identify cases, while Madrid hospitals adopted a similar working document in February 2015. Hospital Clínic has found little scientific evidence to support this use and relies on the victims' stories to reach any conclusion. Although poisoning by scopolamine appears quite often in the media as an aid for raping, kidnapping, killing, or robbery, the effects of this drug and the way it is applied by criminals (transdermal injection, on playing cards and papers, etc.) are often exaggerated, especially skin exposure, as the dose that can be absorbed by the skin is too low to have any effect. Scopolamine transdermal patches must be used for hours to days. Certain other aspects | gastrointestinal motility Interactions Due to interactions with metabolism of other drugs, scopolamine can cause significant unwanted side effects or unpredictable synergies when taken with other medications or compounds. Specific attention should be paid to other medications in the same pharmacologic class as scopolamine, also known as anticholinergics. These additional compounds could also potentially interact with the metabolism of scopolamine: receptor-binding analgesic/pain medication such as gabapentinoids or opioids, ethanol, cannabinoids, zolpidem, thiazide diuretics, nicotine, benzodiazepines, buprenorphine, and especially anticholinergic drugs such as tiotropium, diphenhydramine, dimenhydrinate, etc. Route of administration Scopolamine can be taken by mouth, subcutaneously, in the eye, and intravenously, as well as via a transdermal patch. Pharmacokinetic Scopolamine undergoes first-pass metabolism and about 2.6% is excreted unchanged in urine. Grapefruit juice decreases metabolism of scopolamine consequently increasing plasma concentration. Pharmacodynamics Scopolamine is a nonspecific muscarinic antagonist at all four muscarinic acetylcholine receptors (M1, M2, M3, and M4)., Biosynthesis in plants Scopolamine is among the secondary metabolites of plants from Solanaceae (nightshade) family of plants, such as henbane (Hyoscyamus niger), jimson weed (Datura), angel's trumpets (Brugmansia), deadly nightshade (Belladonna), mandrake (Mandragora officinarum), and corkwood (Duboisia). The biosynthesis of scopolamine begins with the decarboxylation of L-ornithine to putrescine by ornithine decarboxylase. Putrescine is methylated to N-methylputrescine by putrescine N-methyltransferase. A putrescine oxidase that specifically recognizes methylated putrescine catalyzes the deamination of this compound to 4-methylaminobutanal, which then undergoes a spontaneous ring formation to N-methyl-pyrrolium cation. In the next step, the pyrrolium cation condenses with acetoacetic acid yielding hygrine. No enzymatic activity could be demonstrated to catalyze this reaction. Hygrine further rearranges to tropinone. Subsequently, tropinone reductase I converts tropinone to tropine, which condenses with phenylalanine-derived phenyllactate to littorine. A cytochrome P450 classified as Cyp80F1 oxidizes and rearranges littorine to hyoscyamine aldehyde. In the final step, hyoscyamine undergoes epoxidation catalyzed by 6beta-hydroxyhyoscyamine epoxidase yielding scopolamine. History One of the earlier alkaloids isolated from plant sources, scopolamine has been in use in its purified forms (such as various salts, including hydrochloride, hydrobromide, hydroiodide, and sulfate), since its isolation by the German scientist Albert Ladenburg in 1880, and as various preparations from its plant-based form since antiquity and perhaps prehistoric times. Following the description of the structure and activity of scopolamine by Ladenburg, the search for synthetic analogues, and methods for total synthesis, of scopolamine and atropine in the 1930s and 1940s resulted in the discovery of diphenhydramine, an early antihistamine and the prototype of its chemical subclass of these drugs, and pethidine, the first fully synthetic opioid analgesic, known as Dolantin and Demerol amongst many other trade names. In 1899, a Dr. Schneiderlin recommended the use of scopolamine and morphine for surgical anaesthesia, and it started to be used sporadically for that purpose. The use of this combination in obstetric anesthesiology was first proposed by Richard von Steinbuchel in 1902 and was picked up and further developed by Carl Gauss in Freiburg, Germany, starting in 1903. The method came to be known as Dämmerschlaf ("twilight sleep") or the "Freiburg method". It spread rather slowly, and different clinics experimented with different dosages and ingredients; in 1915, the Canadian Medical Association Journal reported, "the method [was] really still in a state of development". It remained widely used in the US until the 1960s, when growing chemophobia and a desire for more natural childbirth led to its abandonment. Society and culture Names Hyoscine hydrobromide is the international nonproprietary name, and scopolamine hydrobromide is the United States Adopted Name. Other names include levo-duboisine, devil's breath, and burundanga. Australian bush medicine A bush medicine developed by Aboriginal peoples of the eastern states of Australia from the soft corkwood tree (Duboisia myoporoides) was used by the Allies in World War II to stop soldiers from getting seasick when they sailed across the English Channel on their way to France during the Invasion of Normandy. Later, the same substance was found to be usable in the production of scopolamine and hyoscyamine, which are used in eye surgery, and a multimillion dollar industry was built in Queensland based on this substance. Recreational and religious use While it has been occasionally used recreationally for its hallucinogenic properties, the experiences are often unpleasant, mentally and physically. It is also physically dangerous and officially classified as a deliriant drug, so repeated recreational use is rare. In June 2008, more than 20 people were hospitalized with psychosis in Norway after ingesting counterfeit rohypnol tablets containing scopolamine. In January 2018, 9 individuals were hospitalized in Perth, Western Australia, after reportedly ingesting scopolamine. However, the alkaloid scopolamine, when taken recreationally for its psychoactive effect is usually taken in the form of preparations from plants of the genera Datura or Brugmansia, often by adolescents or young adults in order to achieve hallucinations and an altered state of consciousness induced by muscarinic antagonism. In circumstances such as these, the intoxication is usually built on a synergistic but even more toxic mixture of the additional alkaloids in the plants which includes atropine and hyoscyamine. Historically, the various plants that produce scopolamine have been used psychoactively for spiritual and magical purposes. When entheogenic preparations of these plants were used, scopolamine was considered to be the main psychoactive compound and was largely responsible for the hallucinogenic effects, particularly when the preparation was made into a topical ointment (most notably flying ointment). Scopolamine is reported to be the only active alkaloid within these plants that can effectively be absorbed through the skin to cause effects. Different |
parlance). SCA scribes produce illuminated scrolls to be given by SCA royalty as awards for various achievements. Most local groups in the SCA hold weekly fighter practices, and many also hold regular archery practices, dance practices, A&S (Arts & Science) nights and other regular gatherings. Some kingdoms and regions also have occasional war practices, where fighters practice formations and group tactics in preparation for large scale "war" events. The research and approach by members of the SCA toward the recreation of history has led to new discoveries about medieval life. The SCA does not require participants to wear historically accurate clothing or equipment. According to the newcomer's guide: Events The SCA holds its own events as a non-profit education organization for the benefit of SCA members and their guests. This is unlike most Renaissance fairs, that are held mainly for profit to entertain customers and open to the public. Other noticeable differences are SCA events are historically earlier than most Renaissance fairs. Each kingdom in the SCA runs its own schedule of events which are announced in their kingdom newsletters (and usually posted on the kingdom web site), but some of the largest SCA-sanctioned events, often called "wars", attract members from many kingdoms. Pennsic War, fought annually between the East Kingdom and Middle Kingdom, is the biggest event in the SCA. Likewise, Estrella War has been held for over thirty years, mainly between two large regional SCA groups: the Kingdom of Atenveldt and the Kingdom of the Outlands. Most Estrella wars are held near Phoenix, Arizona in late February and last around 7–9 days. Several thousand people attend each year, some from as far as Sweden, Germany, France, Italy, Greece, and Australia. Other annual SCA wars include Gulf Wars in Gleann Abhann (formerly Meridies), Great Western War in Caid, War of the Lillies in Calontir and others. Other annual or semi-annual Kingdom-level events held analogously by most or all SCA kingdoms include Crown Tournament, Coronation, Kingdom Arts and Sciences competition and Queen's Prize. Additionally, most baronies in the SCA have their own traditional annual events such as Baronial Arts and Sciences competition, a championship tournament, and often a Yule or Twelfth Night feast. Various SCA groups also sometimes host collegia or symposia, where members gather for a raft of classes on various medieval arts and sciences and other SCA-related topics. The minimum standard for attendance at an SCA event is "an attempt at pre-17th century clothing", and there is a general goal of maintaining a historical atmosphere. However, SCA members will use modern elements when necessary for personal comfort, medical needs, or to promote safety (e.g. wearing prescription eye-wear, using rattan for swords or shear thickening substances for padding). Unlike some other living history groups, most SCA gatherings do not reenact a specific time or place in history, leaving members free to dress as any culture within the SCA's time period. Publications The SCA produces two quarterly publications, The Compleat Anachronist and Tournaments Illuminated, and each kingdom publishes a monthly newsletter. The Compleat Anachronist is a quarterly monographic series, each issue focused on a specific topic related to the period of circa 600–1600 in European history. Issues are written by SCA members and have covered a wide range of topics. Tournaments Illuminated is a quarterly magazine, each issue covering a range of topics and including several features such as news, a humor column, book reviews, war reports and various articles on SCA-related topics of interest. Organization Corporate organization The SCA is incorporated as a 501(c)(3) non-profit corporation in California, with its current headquarters in the city of Milpitas, California. It is headed by a board of directors, each of whom is nominated by the membership of the SCA, selected by sitting directors, and elected to serve for 3.5 years. Each director serves as an ombudsman for various kingdoms and society officers. The BoD, as it is called, is responsible for handling the corporate affairs of the SCA and is also in charge of certain disciplinary actions, such as revoking the membership status of participants who have broken Corpora regulations or modern law while participating in SCA activities. Because the SCA now has groups all over the world, it has also been incorporated in other countries, e.g. SCAA in Australia, SCANZ in New Zealand, SKA Nordmark in Sweden, SKA in Finland, and the UK CIC which covers both the UK and Ireland. These affiliated bodies work with the US board of directors with regards to societal issues, but make all decisions affected by local law independently of the US parent body. Although they agree to work in unity with the US SCA board of directors, they are autonomous and are not bound by any ruling of the US body. Branches The SCA is divided into administrative regions which it calls kingdoms. Smaller branches within those kingdoms include Principalities, Regions, Baronies, and Provinces, and local chapters are known as Cantons, Ridings, Shires, Colleges, Strongholds, and Ports. Kingdoms, Principalities, and Baronies have ceremonial rulers who preside over activities and issue awards to individuals and groups. Colleges, Strongholds, and Ports are local chapters (like a shire) that are associated with an institution, such as a school, military base, or even a military ship at sea. All SCA branches are organized in descending order as follows: Kingdom: area ruled by a King and Queen (typically covering several U.S. states or Canadian provinces, and can be as large as countries or collections of countries). Minimum members required 400. Principality: area within a kingdom ruled by Prince and Princess (large area sometimes comprising entire states). Minimum members required 100. Region: equivalent of principality without ceremonial representative Barony: area administered by a Baron and/or Baroness, the ceremonial representative(s) of the Crown. Minimum members required 25. Canton: local branch reporting through a barony (local chapter, which may be on the way to becoming a shire) Province: equivalent of barony without ceremonial representative Riding: local branch reporting through a province Shire: local branch reporting directly to a kingdom or principality. Minimum members required 5. College: institutional branch based at a school, research facility, etc. (may be a part of a larger local group or report directly to a principality or kingdom) Stronghold: institutional branch based at a military installation (may be a part of a larger local group or report directly to a principality or kingdom) Port: institutional branch based at a military installation in situations where groups of members will be detached for long periods, as with ships at sea (may be a part of a larger local group or report directly to a principality or kingdom) Groups are active all over the United States, Canada, Europe, Australia, South Africa, and New Zealand, with scattered groups elsewhere, including China, Panama and Thailand. At one time there was even a group on the aircraft carrier USS Nimitz, known as the "Shire of Curragh Mor" (anglicized Irish for "Big Boat"), and the shire's arms played on the Nimitz's ship's badge. There is also an active chapter in South Korea, the Stronghold of Warrior's Gate, with a mix of active duty military personnel from the several services and military-connected civilians. There are also non-territorial, usually called "households", which are not part of the Society's formal organization, the largest of which is the Mongol Empire-themed Great Dark Horde. Kingdoms The twenty SCA Kingdoms and the geographic areas they cover are (in order of | from the Kingdom of the East. It covers northeastern/central/western Pennsylvania, central/western New York, and West Virginia. The Kingdom of Ealdormere was created in 1998 from the Kingdom of the Middle. It comprises most of the Canadian province of Ontario. The Kingdom of Lochac was created in 2002 from the West Kingdom (Australia) and the Kingdom of Caid (New Zealand). It encompasses the entirety of Australia and New Zealand, and was granted prior title by the Board of the Society to the Australian administered parts of Antarctica, in 2017, the SCA groups in China became part of Lochac from the West Kingdom, in contradiction of the later claim put forward by the Kingdom of Trimaris. The Kingdom of Northshield was created in 2004 from the Kingdom of the Middle. It covers North Dakota, South Dakota, Minnesota, Wisconsin, and the upper peninsula of Michigan. It also extends into Canada, encompassing Manitoba and northwestern Ontario. The Kingdom of Gleann Abhann was created in 2005 from the Kingdom of Meridies. It covers Mississippi, Louisiana, most of Arkansas, and the western edge of Tennessee including the Memphis area. The Kingdom of Avacal was created in 2015 from the Kingdom of An Tir. It covers Alberta, Saskatchewan, Yukon, Northwest Territories and part of British Columbia. Officers The Society as a whole, each kingdom, and each local group within a kingdom, all have a standard group of officers with titles loosely based on medieval equivalents. Seneschal: The seneschal acts as the administrative head, or president of the group. Every local group is required to have a local seneschal who reports to the kingdom's seneschal. Chancellor of the Exchequer or Reeve: The treasurer, who handles the financial matters of the group. Every local group is required to have one. The Society Chancellor of the Exchequer, who administrates the kingdom and local reeves, reports to the Society Treasurer who handles the corporate finances. In most kingdoms the Exchequer (kingdom or local) are some of the only officers to have a financial warrant to collect gate fees and handle money for the society. Knight Marshal: The combat supervisor, the knight marshal administrates all combat activities for the branch, including armored combat, rapier combat, archery and equestrian. A local group is required to have one in order to host combat activities. Minister of Arts and Sciences: Sometimes split into two offices, one for arts and one for sciences, this office coordinates arts and sciences activities for the group, arranging both monthly classes and demonstrations as well as larger yearly collegium (a 2 to 3 day workshop with multiple classes), and leading participants to others who work in fields of their interest. Herald: This officer is in charge of heraldic activities, such as the creation and registration of names and arms. Each kingdom has a College of Heralds which prepares submissions to go to the Society College of Arms, headed by the Laurel Sovereign of Arms. Chatelaine or Hospitaller or Gold Key : In charge of welcoming and facilitating new participants into the SCA including recruiting, onboarding, and transitioning members from other branches. They are also responsible for Gold Key, which provides loaner garb, and occasionally feast gear and introductory literature, for new members. Marshal: Supervises a specific combat-related activity, insuring safety of participants and refereeing where applicable. A marshal must be certified for the type of activity they oversee; as such there are armored combat marshals, rapier marshals, target archery marshals, equestrian marshals, etc. A marshal of a given certification must be present for that particular activity to take place at an event. Constable: In all kingdoms they handle public safety and security, and may collect gate fees depending on the policy of the kingdom the event is in. Kingdom Waiver Secretary: In charge of maintaining and tracking liability waivers for events. Chronicler: Produces and edits the group's newsletter. The Society Chronicler monitors each of the kingdom and local group's chroniclers, while the SCA's two organization-wide publications, Tournaments Illuminated and The Compleat Anachronist, each have their own editor-in-chief. Minister of Children, Minister of Youth or Youth Activities Officer: Arranging and officiating children's activities. Historian: Recording the history of the group, from the local to the Society level. Webminister: Derived from webmaster, this officer is in charge of maintaining the Internet presence of the group. Social Media: Responsible for use of social media on a variety of platforms and to serve as the "official voice" of the branch groups of the S.C.A. Chirurgeon: In charge of safety and modern first aid. First formed in 1983, the office was dissolved on August 10, 2015 amid concerns of legal liability. Culture of the group Members of the SCA study and take part in a variety of activities, including combat and chivalry, archery, heraldry, equestrian activities, costuming, cooking, metalwork, woodworking, leathercrafting, music, dance, calligraphy, fiber arts, and others as practiced during the member's time period. Personae To aid historical recreation, participants in the SCA create historically plausible characters known individually as personae. To new members, a persona can simply be a costume and a name used for weekend events, while other members may study and create an elaborate personal history. The goal of a well-crafted persona is a historically accurate person who might have lived in a particular historical time and place. The SCA has onomastic students who assist members in creating an appropriate persona name. The SCA rules state that: "We allow elements and patterns for personal names from beyond Europe, but we require them to be from cultures that were known to medieval and Renaissance Europeans or whose members might reasonably have traveled to Europe". So, while less common, there are members with Saracen, Chinese, Japanese or Native American personas. In addition, claiming to be a specific historical individual, especially a very familiar one (e.g. Genghis Khan, Julius Caesar, Henry Plantagenet, Queen Elizabeth I), is not permitted. Likewise, one is not allowed to claim the persona of a fellow SCA member, alive or dead. Nor is one allowed to take on the persona of a sufficiently familiar fictional character (e.g. Robin of Locksley/Robin Hood). Heraldry A major dimension to the SCA is its internal system of Heraldry. Any member of the society may apply to register a name and device for their persona, which are checked by the heralds for uniqueness and period authenticity, before being blazoned and recorded in the society's Armorial. The system has evolved since the formation of the society; and now has three Sovereigns of Arms, with Principal Heralds for each Kingdom, who oversee deputy officers for matters such as heraldic education and processing registrations, and local officers (generally one for each local chapter) who assist the local participants. In addition to design of arms, heralds in the Society also provide services such as voice heraldry (similar to a master of ceremonies) at tournaments and official functions, and organizing tournament brackets or "lists." Royalty The SCA has ceremonial rulers chosen by winning tournaments (Kings/Queens, Princes/Princesses) in SCA armoured combat. Barons and Baronesses are appointed by Royalty, although some baronies hold elections or competitions to choose their preferred Baron and/or Baroness. One of the primary functions of state for reigning monarchs is to recognize participant achievement through awards. Most awards denote excellence in a specific pursuit such as local service, arts and sciences, and combat. Some awards change the precedence and title of the recipient, giving him or her the privilege of being known as "Lord"/"Lady", "Baron", "Duchess", "Master", and so forth. High level awards are often given with the consultation of the other people who have received the award, such as peerages and consulting orders. The Crown has some authority over other matters relating to leadership, but the extent of this varies from kingdom to kingdom. Rule by right of arms Each SCA kingdom is "ruled" by a king and queen chosen by winning a Crown Tournament in armored combat. Corpora require this to be held as a "properly constituted armored combat" tournament. The winner of the Crown Tournament and his/her Consort are styled "Crown Prince and Princess" and serve an advisory period (three to six months, depending upon the scheduling of the Crown Tournament) under the current King and Queen prior to acceding to the throne and ruling in their turn. This selection method is not based on how actual medieval monarchs were chosen, as there is no record of one being selected by Tournament combat in this manner. There are, however, literary and historical bases for the custom, most famously the tournament in Sir Walter Scott's Ivanhoe. In the Middle Ages, there were a number of different "mock king" games, some of which involved some form of combat, such as King of the Mountain or the King of Archers. In the 17th century the Cotswold Games were developed, the winner of which was declared to be "king". Also, the medieval sagas contain accounts of uniting petty kingdoms under a single king through actual combat. The SCA's first event did not choose a "king". Fighters vied for the right to declare their ladies (only men fought at the first event) "fairest", later called the "Queen of Love and Beauty". Peerage orders The highest ranking titles in the SCA belong to the royalty, followed by the former royalty. Former kings and queens become counts and countesses (dukes and duchesses if they have reigned more than once), and former princes and princesses of Principalities become viscounts and viscountesses. This system is not historically based, but was developed out of practical necessity early in the Society's history. Directly beneath this "landed" nobility (current and former royalty) rank the highest awards, the Peerages. The SCA has four orders of peerage with one split into two parts: the Order of the Chivalry, awarded for skill at arms in Armored Combat, split into the knights and the Masters of arms; the Order of the Laurel, awarded for skill in the arts and sciences; the Order of the Pelican, awarded for outstanding service to the Society; and the Order of the Masters of Defense, awarded for skill at arms in Rapier Combat. In Several of the Kingdoms the Order of the Rose, made up of former Consorts, is considered a peerage equal to the other four. Elevation to peerage Peerages are bestowed by the Crown (the Sovereign and Consort) of a Kingdom. In most cases, this is done with the consent of the members of a given peerage, often at their suggestion. The Society's Bylaws state that "the Crown may elevate subjects to the Peerage by granting membership in one of the Orders conferring a Patent of Arms, after consultation with the members of the Order within the Kingdom, and in accordance with the laws and customs of the kingdom. Restriction: to advance a candidate to the Order of the Chivalry, a Knight of the Society (usually the King) must bestow the accolade". Cultural impact In May 1999, The Onion ran a front-page article headlined "Society for Creative Anachronism Seizes Control of Russia" featuring photos of actual SCA participants from the Barony of Jaravellir (Madison, Wisconsin). In Number of the Beast (1980), Robert A. Heinlein portrayed an SCA tournament where live weapons were used and the battles actually fought to the "death". The defeated combatants were either transported to an alternate reality where medical technology was advanced enough that they could be revived from any wound or transported to the alternate reality that was Valhalla. The contestants' desires were placed in sealed envelopes prior to the tournament, which were destroyed if the competitor won and obeyed if a competitor lost. In Ariel (1983), a post-apocalyptic fantasy by Steven R. Boyett, technology suddenly stops working and sorcery and sword fight take over. Several characters who are former SCA members attribute their survival to their SCA experience. The fantasy 1986 novel The Folk of the Air by Peter S. Beagle was written after the author attended a few early SCA events circa 1968; but he has repeatedly stated that he then studiously avoided any contact with the actual SCA itself for almost two decades, so that his description of a fictitious "League for Archaic Pleasures" would not be "contaminated" by contact with the actual real-life organization. Members of the SCA are given pivotal roles in S. M. Stirling's Emberverse series, where their skills in pre-industrial technology and warfare become invaluable in helping humanity adapt when all modern technology (including firearms) ceases working. The novel Murder at the War (Knightfall in paperback edition) by Mary Monica Pulver is a murder mystery set entirely at the SCA's largest annual event, Pennsic War. In David Weber's 1996 science fiction novel Honor Among Enemies, main character Honor Harrington mentions that her uncle is a member of the SCA and that he taught her to shoot from the hip (the time the SCA covers having been moved up to the 19th century in the future era in which the novel is set, to include cowboy and Civil War reenactors). In his conclusion to the Space Odyssey series, 3001: The Final Odyssey (1997), Arthur C. Clarke portrays the SCA as still being active in the year 3001. In Christopher Stasheff's "Warlock" series the inhabitants of the planet Gramarye are revealed to be descended from SCA participants. A prequel, Escape Velocity, describes how the SCAdians first came to Gramarye, and how lands were assigned to the royal peers. In John Ringo's The Council Wars science-fiction series, characters with SCA or SCA-like experience help their society recover from a catastrophic loss of technology. References Further reading Burns, C. (Director) and Cardinale, T. (Director). (2001). In Service to the Dream [Motion Picture]. Burbank, CA: Mythos Productions LLC. Geist, |
Through the precise measurement of this palaeomagnetism, it is possible to estimate the latitude (but not the longitude) where the rock matrix was formed. Palaeomagnetic measurements have indicated that some sediments of glacial origin in the Neoproterozoic rock record were deposited within 10 degrees of the equator, although the accuracy of this reconstruction is in question. This palaeomagnetic location of apparently glacial sediments (such as dropstones) has been taken to suggest that glaciers extended from land to sea level in tropical latitudes at the time the sediments were deposited. It is not clear whether this implies a global glaciation, or the existence of localized, possibly land-locked, glacial regimes. Others have even suggested that most data do not constrain any glacial deposits to within 25° of the equator. Skeptics suggest that the palaeomagnetic data could be corrupted if Earth's ancient magnetic field was substantially different from today's. Depending on the rate of cooling of Earth's core, it is possible that during the Proterozoic, the magnetic field did not approximate a simple dipolar distribution, with north and south magnetic poles roughly aligning with the planet's axis as they do today. Instead, a hotter core may have circulated more vigorously and given rise to 4, 8 or more poles. Palaeomagnetic data would then have to be re-interpreted, as the sedimentary minerals could have aligned pointing to a 'West Pole' rather than the North Pole. Alternatively, Earth's dipolar field could have been oriented such that the poles were close to the equator. This hypothesis has been posited to explain the extraordinarily rapid motion of the magnetic poles implied by the Ediacaran palaeomagnetic record; the alleged motion of the north pole would occur around the same time as the Gaskiers glaciation. Another weakness of reliance on palaeomagnetic data is the difficulty in determining whether the magnetic signal recorded is original, or whether it has been reset by later activity. For example, a mountain-building orogeny releases hot water as a by-product of metamorphic reactions; this water can circulate to rocks thousands of kilometers away and reset their magnetic signature. This makes the authenticity of rocks older than a few million years difficult to determine without painstaking mineralogical observations. Moreover, further evidence is accumulating that large-scale remagnetization events have taken place which may necessitate revision of the estimated positions of the palaeomagnetic poles. There is currently only one deposit, the Elatina deposit of Australia, that was indubitably deposited at low latitudes; its depositional date is well-constrained, and the signal is demonstrably original. Low-latitude glacial deposits Sedimentary rocks that are deposited by glaciers have distinctive features that enable their identification. Long before the advent of the snowball Earth hypothesis many Neoproterozoic sediments had been interpreted as having a glacial origin, including some apparently at tropical latitudes at the time of their deposition. However, it is worth remembering that many sedimentary features traditionally associated with glaciers can also be formed by other means. Thus the glacial origin of many of the key occurrences for snowball Earth has been contested. As of 2007, there was only one "very reliable"—still challenged—datum point identifying tropical tillites, which makes statements of equatorial ice cover somewhat presumptuous. However, evidence of sea-level glaciation in the tropics during the Sturtian is accumulating. Evidence of possible glacial origin of sediment includes: Dropstones (stones dropped into marine sediments), which can be deposited by glaciers or other phenomena. Varves (annual sediment layers in periglacial lakes), which can form at higher temperatures. Glacial striations (formed by embedded rocks scraped against bedrock): similar striations are from time to time formed by mudflows or tectonic movements. Diamictites (poorly sorted conglomerates). Originally described as glacial till, most were in fact formed by debris flows. Open-water deposits It appears that some deposits formed during the snowball period could only have formed in the presence of an active hydrological cycle. Bands of glacial deposits up to 5,500 meters thick, separated by small (meters) bands of non-glacial sediments, demonstrate that glaciers melted and re-formed repeatedly for tens of millions of years; solid oceans would not permit this scale of deposition. It is considered possible that ice streams such as seen in Antarctica today could have caused these sequences. Further, sedimentary features that could only form in open water (for example: wave-formed ripples, far-traveled ice-rafted debris and indicators of photosynthetic activity) can be found throughout sediments dating from the snowball-Earth periods. While these may represent "oases" of meltwater on a completely frozen Earth, computer modelling suggests that large areas of the ocean must have remained ice-free; arguing that a "hard" snowball is not plausible in terms of energy balance and general circulation models. Carbon isotope ratios There are two stable isotopes of carbon in sea water: carbon-12 (12C) and the rare carbon-13 (13C), which makes up about 1.109 percent of carbon atoms. Biochemical processes, of which photosynthesis is one, tend to preferentially incorporate the lighter 12C isotope. Thus ocean-dwelling photosynthesizers, both protists and algae, tend to be very slightly depleted in 13C, relative to the abundance found in the primary volcanic sources of Earth's carbon. Therefore, an ocean with photosynthetic life will have a lower 13C/12C ratio within organic remains, and a higher ratio in corresponding ocean water. The organic component of the lithified sediments will remain very slightly, but measurably, depleted in 13C. During the proposed episode of snowball Earth, there are rapid and extreme negative excursions in the ratio of 13C to 12C. Close analysis of the timing of 13C 'spikes' in deposits across the globe allows the recognition of four, possibly five, glacial events in the late Neoproterozoic. Banded iron formations Banded iron formations (BIF) are sedimentary rocks of layered iron oxide and iron-poor chert. In the presence of oxygen, iron naturally rusts and becomes insoluble in water. The banded iron formations are commonly very old and their deposition is often related to the oxidation of Earth's atmosphere during the Palaeoproterozoic era, when dissolved iron in the ocean came in contact with photosynthetically produced oxygen and precipitated out as iron oxide. The bands were produced at the tipping point between an anoxic and an oxygenated ocean. Since today's atmosphere is oxygen-rich (nearly 21% by volume) and in contact with the oceans, it is not possible to accumulate enough iron oxide to deposit a banded formation. The only extensive iron formations that were deposited after the Palaeoproterozoic (after 1.8 billion years ago) are associated with Cryogenian glacial deposits. For such iron-rich rocks to be deposited there would have to be anoxia in the ocean, so that much dissolved iron (as ferrous oxide) could accumulate before it met an oxidant that would precipitate it as ferric oxide. For the ocean to become anoxic it must have limited gas exchange with the oxygenated atmosphere. Proponents of the hypothesis argue that the reappearance of BIF in the sedimentary record is a result of limited oxygen levels in an ocean sealed by sea-ice, while opponents suggest that the rarity of the BIF deposits may indicate that they formed in inland seas. Being isolated from the oceans, such lakes could have been stagnant and anoxic at depth, much like today's Black Sea; a sufficient input of iron could provide the necessary conditions for BIF formation. A further difficulty in suggesting that BIFs marked the end of the glaciation is that they are found interbedded with glacial sediments. BIFs are also strikingly absent during the Marinoan glaciation. Cap carbonate rocks Around the top of Neoproterozoic glacial deposits there is commonly a sharp transition into a chemically precipitated sedimentary limestone or dolomite metres to tens of metres thick. These cap carbonates sometimes occur in sedimentary successions that have no other carbonate rocks, suggesting that their deposition is result of a profound aberration in ocean chemistry. These cap carbonates have unusual chemical composition, as well as strange sedimentary structures that are often interpreted as large ripples. The formation of such sedimentary rocks could be caused by a large influx of positively charged ions, as would be produced by rapid weathering during the extreme greenhouse following a snowball Earth event. The isotopic signature of the cap carbonates is near −5 ‰, consistent with the value of the mantle—such a low value is usually/could be taken to signify an absence of life, since photosynthesis usually acts to raise the value; alternatively the release of methane deposits could have lowered it from a higher value, and counterbalance the effects of photosynthesis. The precise mechanism involved in the formation of cap carbonates is not clear, but the most cited explanation suggests that at the melting of a snowball Earth, water would dissolve the abundant from the atmosphere to form carbonic acid, which would fall as acid rain. This would weather exposed silicate and carbonate rock (including readily attacked glacial debris), releasing large amounts of calcium, which when washed into the ocean would form distinctively textured layers of carbonate sedimentary rock. Such an abiotic "cap carbonate" sediment can be found on top of the glacial till that gave rise to the snowball Earth hypothesis. However, there are some problems with the designation of a glacial origin to cap carbonates. Firstly, the high carbon dioxide concentration in the atmosphere would cause the oceans to become acidic, and dissolve any carbonates contained within—starkly at odds with the deposition of cap carbonates. Further, the thickness of some cap carbonates is far above what could reasonably be produced in the relatively quick deglaciations. The cause is further weakened by the lack of cap carbonates above many sequences of clear glacial origin at a similar time and the occurrence of similar carbonates within the sequences of proposed glacial origin. An alternative mechanism, which may have produced the Doushantuo cap carbonate at least, is the rapid, widespread release of methane. This accounts for incredibly low—as low as −48 ‰— values—as well as unusual sedimentary features which appear to have been formed by the flow of gas through the sediments. Changing acidity Isotopes of the element boron suggest that the pH of the oceans dropped dramatically before and after the Marinoan glaciation. This may indicate a buildup of carbon dioxide in the atmosphere, some of which would dissolve into the oceans to form carbonic acid. Although the boron variations may be evidence of extreme climate change, they need not imply a global glaciation. Space dust Earth's surface is very depleted in the element iridium, which primarily resides in Earth's core. The only significant source of the element at the surface is cosmic particles that reach Earth. During a snowball Earth, iridium would accumulate on the ice sheets, and when the ice melted the resulting layer of sediment would be rich in iridium. An iridium anomaly has been discovered at the base of the cap carbonate formations, and has been used to suggest that the glacial episode lasted for at least 3 million years, but this does not necessarily imply a global extent to the glaciation; indeed, a similar anomaly could be explained by the impact of a large meteorite. Cyclic climate fluctuations Using the ratio of mobile cations to those that remain in soils during chemical weathering (the chemical index of alteration), it has been shown that chemical weathering varied in a cyclic fashion within a glacial succession, increasing during interglacial periods and decreasing during cold and arid glacial periods. This pattern, if a true reflection of events, suggests that the "snowball Earths" bore a stronger resemblance to Pleistocene ice age cycles than to a completely frozen Earth. In addition, glacial sediments of the Port Askaig Tillite Formation in Scotland clearly show interbedded cycles of glacial and shallow marine sediments. The significance of these deposits is highly reliant upon their dating. Glacial sediments are difficult to date, and the closest dated bed to the Portaskaig group is 8 km stratigraphically above the beds of interest. Its dating to 600 Ma means the beds can be tentatively correlated to the Sturtian glaciation, but they may represent the advance or retreat of a snowball Earth. Mechanisms The initiation of a snowball Earth event would involve some initial cooling mechanism, which would result in an increase in Earth's coverage of snow and ice. The increase in Earth's coverage of snow and ice would in turn increase Earth's albedo, which would result in positive feedback for cooling. If enough snow and ice accumulates, run-away cooling would result. This positive feedback is facilitated by an equatorial continental distribution, which would allow ice to accumulate in the regions closer to the equator, where solar radiation is most direct. Many possible triggering mechanisms could account for the beginning of a snowball Earth, such as the eruption of a supervolcano, a reduction in the atmospheric concentration of greenhouse gases such as methane and/or carbon dioxide, changes in Solar energy output, or perturbations of Earth's orbit. Regardless of the trigger, initial cooling results in an increase in the area of Earth's surface covered by ice and snow, and the additional ice and snow reflects more Solar energy back to space, further cooling Earth and further increasing the area of Earth's surface covered by ice and snow. This positive feedback loop could eventually produce a frozen equator as cold as modern Antarctica. Global warming associated with large accumulations of carbon dioxide in the atmosphere over millions of years, emitted primarily by volcanic activity, is the proposed trigger for melting a snowball Earth. Due to positive feedback for melting, the eventual melting of the snow and ice covering most of Earth's surface would require as little as a millennium. Continental distribution A tropical distribution of the continents is, perhaps counter-intuitively, necessary to allow the initiation of a snowball Earth. Firstly, tropical continents are more reflective than open ocean, and so absorb less of the Sun's heat: most absorption of Solar energy on Earth today occurs in tropical oceans. Further, tropical continents are subject to more rainfall, which leads to increased river discharge—and erosion. When exposed to air, silicate rocks undergo weathering reactions which remove carbon dioxide from the atmosphere. These reactions proceed in the general form: Rock-forming mineral + CO2 + H2O → cations + bicarbonate + SiO2. An example of such a reaction is the weathering of wollastonite: CaSiO3 + 2CO2 + H2O → Ca2+ + SiO2 + 2HCO3− The released calcium cations react with the dissolved bicarbonate in the ocean to form calcium carbonate as a chemically precipitated sedimentary rock. This transfers carbon dioxide, a greenhouse gas, from the air into the geosphere, and, in steady-state on geologic time scales, offsets the carbon dioxide emitted from volcanoes into the atmosphere. As of 2003, a precise continental distribution during the Neoproterozoic was difficult to establish because there were too few suitable sediments for analysis. Some reconstructions point towards polar continents—which have been a feature of all other major glaciations, providing a point upon which ice can nucleate. Changes in ocean circulation patterns may then have provided the trigger of snowball Earth. Additional factors that may have contributed to the onset of the Neoproterozoic snowball include the introduction of atmospheric free oxygen, which may have reached sufficient quantities to react with methane in the atmosphere, oxidizing it to carbon dioxide, a much weaker greenhouse gas, and a younger—thus fainter—Sun, which would have emitted 6 percent less radiation in the Neoproterozoic. Normally, as Earth gets colder due to natural climatic fluctuations and changes in incoming solar radiation, the cooling slows these weathering reactions. As a result, less carbon dioxide is removed from the atmosphere and Earth warms as this greenhouse gas accumulates—this 'negative feedback' process limits the magnitude of cooling. During the Cryogenian period, however, Earth's continents were all at tropical latitudes, which made this moderating process less effective, as high weathering rates continued on land even as Earth cooled. This let ice advance beyond the polar regions. Once ice advanced to within 30° of the equator, a positive feedback could ensue such that the increased reflectiveness (albedo) of the ice led to further cooling and the formation of more ice, until the whole Earth is ice-covered. Polar continents, due to low rates of evaporation, are too dry to allow substantial carbon deposition—restricting the amount of atmospheric carbon dioxide that can be removed from the carbon cycle. A gradual rise of the proportion of the isotope carbon-13 relative to carbon-12 in sediments pre-dating "global" glaciation indicates that draw-down before snowball Earths was a slow and continuous process. The start of snowball Earths are always marked by a sharp downturn in the δ13C value of sediments, a hallmark that may be attributed | the accuracy of this reconstruction is in question. This palaeomagnetic location of apparently glacial sediments (such as dropstones) has been taken to suggest that glaciers extended from land to sea level in tropical latitudes at the time the sediments were deposited. It is not clear whether this implies a global glaciation, or the existence of localized, possibly land-locked, glacial regimes. Others have even suggested that most data do not constrain any glacial deposits to within 25° of the equator. Skeptics suggest that the palaeomagnetic data could be corrupted if Earth's ancient magnetic field was substantially different from today's. Depending on the rate of cooling of Earth's core, it is possible that during the Proterozoic, the magnetic field did not approximate a simple dipolar distribution, with north and south magnetic poles roughly aligning with the planet's axis as they do today. Instead, a hotter core may have circulated more vigorously and given rise to 4, 8 or more poles. Palaeomagnetic data would then have to be re-interpreted, as the sedimentary minerals could have aligned pointing to a 'West Pole' rather than the North Pole. Alternatively, Earth's dipolar field could have been oriented such that the poles were close to the equator. This hypothesis has been posited to explain the extraordinarily rapid motion of the magnetic poles implied by the Ediacaran palaeomagnetic record; the alleged motion of the north pole would occur around the same time as the Gaskiers glaciation. Another weakness of reliance on palaeomagnetic data is the difficulty in determining whether the magnetic signal recorded is original, or whether it has been reset by later activity. For example, a mountain-building orogeny releases hot water as a by-product of metamorphic reactions; this water can circulate to rocks thousands of kilometers away and reset their magnetic signature. This makes the authenticity of rocks older than a few million years difficult to determine without painstaking mineralogical observations. Moreover, further evidence is accumulating that large-scale remagnetization events have taken place which may necessitate revision of the estimated positions of the palaeomagnetic poles. There is currently only one deposit, the Elatina deposit of Australia, that was indubitably deposited at low latitudes; its depositional date is well-constrained, and the signal is demonstrably original. Low-latitude glacial deposits Sedimentary rocks that are deposited by glaciers have distinctive features that enable their identification. Long before the advent of the snowball Earth hypothesis many Neoproterozoic sediments had been interpreted as having a glacial origin, including some apparently at tropical latitudes at the time of their deposition. However, it is worth remembering that many sedimentary features traditionally associated with glaciers can also be formed by other means. Thus the glacial origin of many of the key occurrences for snowball Earth has been contested. As of 2007, there was only one "very reliable"—still challenged—datum point identifying tropical tillites, which makes statements of equatorial ice cover somewhat presumptuous. However, evidence of sea-level glaciation in the tropics during the Sturtian is accumulating. Evidence of possible glacial origin of sediment includes: Dropstones (stones dropped into marine sediments), which can be deposited by glaciers or other phenomena. Varves (annual sediment layers in periglacial lakes), which can form at higher temperatures. Glacial striations (formed by embedded rocks scraped against bedrock): similar striations are from time to time formed by mudflows or tectonic movements. Diamictites (poorly sorted conglomerates). Originally described as glacial till, most were in fact formed by debris flows. Open-water deposits It appears that some deposits formed during the snowball period could only have formed in the presence of an active hydrological cycle. Bands of glacial deposits up to 5,500 meters thick, separated by small (meters) bands of non-glacial sediments, demonstrate that glaciers melted and re-formed repeatedly for tens of millions of years; solid oceans would not permit this scale of deposition. It is considered possible that ice streams such as seen in Antarctica today could have caused these sequences. Further, sedimentary features that could only form in open water (for example: wave-formed ripples, far-traveled ice-rafted debris and indicators of photosynthetic activity) can be found throughout sediments dating from the snowball-Earth periods. While these may represent "oases" of meltwater on a completely frozen Earth, computer modelling suggests that large areas of the ocean must have remained ice-free; arguing that a "hard" snowball is not plausible in terms of energy balance and general circulation models. Carbon isotope ratios There are two stable isotopes of carbon in sea water: carbon-12 (12C) and the rare carbon-13 (13C), which makes up about 1.109 percent of carbon atoms. Biochemical processes, of which photosynthesis is one, tend to preferentially incorporate the lighter 12C isotope. Thus ocean-dwelling photosynthesizers, both protists and algae, tend to be very slightly depleted in 13C, relative to the abundance found in the primary volcanic sources of Earth's carbon. Therefore, an ocean with photosynthetic life will have a lower 13C/12C ratio within organic remains, and a higher ratio in corresponding ocean water. The organic component of the lithified sediments will remain very slightly, but measurably, depleted in 13C. During the proposed episode of snowball Earth, there are rapid and extreme negative excursions in the ratio of 13C to 12C. Close analysis of the timing of 13C 'spikes' in deposits across the globe allows the recognition of four, possibly five, glacial events in the late Neoproterozoic. Banded iron formations Banded iron formations (BIF) are sedimentary rocks of layered iron oxide and iron-poor chert. In the presence of oxygen, iron naturally rusts and becomes insoluble in water. The banded iron formations are commonly very old and their deposition is often related to the oxidation of Earth's atmosphere during the Palaeoproterozoic era, when dissolved iron in the ocean came in contact with photosynthetically produced oxygen and precipitated out as iron oxide. The bands were produced at the tipping point between an anoxic and an oxygenated ocean. Since today's atmosphere is oxygen-rich (nearly 21% by volume) and in contact with the oceans, it is not possible to accumulate enough iron oxide to deposit a banded formation. The only extensive iron formations that were deposited after the Palaeoproterozoic (after 1.8 billion years ago) are associated with Cryogenian glacial deposits. For such iron-rich rocks to be deposited there would have to be anoxia in the ocean, so that much dissolved iron (as ferrous oxide) could accumulate before it met an oxidant that would precipitate it as ferric oxide. For the ocean to become anoxic it must have limited gas exchange with the oxygenated atmosphere. Proponents of the hypothesis argue that the reappearance of BIF in the sedimentary record is a result of limited oxygen levels in an ocean sealed by sea-ice, while opponents suggest that the rarity of the BIF deposits may indicate that they formed in inland seas. Being isolated from the oceans, such lakes could have been stagnant and anoxic at depth, much like today's Black Sea; a sufficient input of iron could provide the necessary conditions for BIF formation. A further difficulty in suggesting that BIFs marked the end of the glaciation is that they are found interbedded with glacial sediments. BIFs are also strikingly absent during the Marinoan glaciation. Cap carbonate rocks Around the top of Neoproterozoic glacial deposits there is commonly a sharp transition into a chemically precipitated sedimentary limestone or dolomite metres to tens of metres thick. These cap carbonates sometimes occur in sedimentary successions that have no other carbonate rocks, suggesting that their deposition is result of a profound aberration in ocean chemistry. These cap carbonates have unusual chemical composition, as well as strange sedimentary structures that are often interpreted as large ripples. The formation of such sedimentary rocks could be caused by a large influx of positively charged ions, as would be produced by rapid weathering during the extreme greenhouse following a snowball Earth event. The isotopic signature of the cap carbonates is near −5 ‰, consistent with the value of the mantle—such a low value is usually/could be taken to signify an absence of life, since photosynthesis usually acts to raise the value; alternatively the release of methane deposits could have lowered it from a higher value, and counterbalance the effects of photosynthesis. The precise mechanism involved in the formation of cap carbonates is not clear, but the most cited explanation suggests that at the melting of a snowball Earth, water would dissolve the abundant from the atmosphere to form carbonic acid, which would fall as acid rain. This would weather exposed silicate and carbonate rock (including readily attacked glacial debris), releasing large amounts of calcium, which when washed into the ocean would form distinctively textured layers of carbonate sedimentary rock. Such an abiotic "cap carbonate" sediment can be found on top of the glacial till that gave rise to the snowball Earth hypothesis. However, there are some problems with the designation of a glacial origin to cap carbonates. Firstly, the high carbon dioxide concentration in the atmosphere would cause the oceans to become acidic, and dissolve any carbonates contained within—starkly at odds with the deposition of cap carbonates. Further, the thickness of some cap carbonates is far above what could reasonably be produced in the relatively quick deglaciations. The cause is further weakened by the lack of cap carbonates above many sequences of clear glacial origin at a similar time and the occurrence of similar carbonates within the sequences of proposed glacial origin. An alternative mechanism, which may have produced the Doushantuo cap carbonate at least, is the rapid, widespread release of methane. This accounts for incredibly low—as low as −48 ‰— values—as well as unusual sedimentary features which appear to have been formed by the flow of gas through the sediments. Changing acidity Isotopes of the element boron suggest that the pH of the oceans dropped dramatically before and after the Marinoan glaciation. This may indicate a buildup of carbon dioxide in the atmosphere, some of which would dissolve into the oceans to form carbonic acid. Although the boron variations may be evidence of extreme climate change, they need not imply a global glaciation. Space dust Earth's surface is very depleted in the element iridium, which primarily resides in Earth's core. The only significant source of the element at the surface is cosmic particles that reach Earth. During a snowball Earth, iridium would accumulate on the ice sheets, and when the ice melted the resulting layer of sediment would be rich in iridium. An iridium anomaly has been discovered at the base of the cap carbonate formations, and has been used to suggest that the glacial episode lasted for at least 3 million years, but this does not necessarily imply a global extent to the glaciation; indeed, a similar anomaly could be explained by the impact of a large meteorite. Cyclic climate fluctuations Using the ratio of mobile cations to those that remain in soils during chemical weathering (the chemical index of alteration), it has been shown that chemical weathering varied in a cyclic fashion within a glacial succession, increasing during interglacial periods and decreasing during cold and arid glacial periods. This pattern, if a true reflection of events, suggests that the "snowball Earths" bore a stronger resemblance to Pleistocene ice age cycles than to a completely frozen Earth. In addition, glacial sediments of the Port Askaig Tillite Formation in Scotland clearly show interbedded cycles of glacial and shallow marine sediments. The significance of these deposits is highly reliant upon their dating. Glacial sediments are difficult to date, and the closest dated bed to the Portaskaig group is 8 km stratigraphically above the beds of interest. Its dating to 600 Ma means the beds can be tentatively correlated to the Sturtian glaciation, but they may represent the advance or retreat of a snowball Earth. Mechanisms The initiation of a snowball Earth event would involve some initial cooling mechanism, which would result in an increase in Earth's coverage of snow and ice. The increase in Earth's coverage of snow and ice would in turn increase Earth's albedo, which would result in positive feedback for cooling. If enough snow and ice accumulates, run-away cooling would result. This positive feedback is facilitated by an equatorial continental distribution, which would allow ice to accumulate in the regions closer to the equator, where solar radiation is most direct. Many possible triggering mechanisms could account for the beginning of a snowball Earth, such as the eruption of a supervolcano, a reduction in the atmospheric concentration of greenhouse gases such as methane and/or carbon dioxide, changes in Solar energy output, or perturbations of Earth's orbit. Regardless of the trigger, initial cooling results in an increase in the area of Earth's surface covered by ice and snow, and the additional ice and snow reflects more Solar energy back to space, further cooling Earth and further increasing the area of Earth's surface covered by ice and snow. This positive feedback loop could eventually produce a frozen equator as cold as modern Antarctica. Global warming associated with large accumulations of carbon dioxide in the atmosphere over millions of years, emitted primarily by volcanic activity, is the proposed trigger for melting a snowball Earth. Due to positive feedback for melting, the eventual melting of the snow and ice covering most of Earth's surface would require as little as a millennium. Continental distribution A tropical distribution of the continents is, perhaps counter-intuitively, necessary to allow the initiation of a snowball Earth. Firstly, tropical continents are more reflective than open ocean, and so absorb less of the Sun's heat: most absorption of Solar energy on Earth today occurs in tropical oceans. Further, tropical continents are subject to more rainfall, which leads to increased river discharge—and erosion. When exposed to air, silicate rocks undergo weathering reactions which remove carbon dioxide from the atmosphere. These reactions proceed in the general form: Rock-forming mineral + CO2 + H2O → cations + bicarbonate + SiO2. An example of such a reaction is the weathering of wollastonite: CaSiO3 + 2CO2 + H2O → Ca2+ + SiO2 + 2HCO3− The released calcium cations react with the dissolved bicarbonate in the ocean to form calcium carbonate as a chemically precipitated sedimentary rock. This transfers carbon dioxide, a greenhouse gas, from the air into the geosphere, and, in steady-state on geologic time scales, offsets the carbon dioxide emitted from volcanoes into the atmosphere. As of 2003, a precise continental distribution during the Neoproterozoic was difficult to establish because there were too few suitable sediments for analysis. Some reconstructions point towards polar continents—which have been a feature of all other major glaciations, providing a point upon which ice can nucleate. Changes in ocean circulation patterns may then have provided the trigger of snowball Earth. Additional factors that may have contributed to the onset of the Neoproterozoic snowball include the introduction of atmospheric free oxygen, which may have reached sufficient quantities to react with methane in the atmosphere, oxidizing it to carbon dioxide, a much weaker greenhouse gas, and a younger—thus fainter—Sun, which would have emitted 6 percent less radiation in the Neoproterozoic. Normally, as Earth gets colder due to natural climatic fluctuations and changes in incoming solar radiation, the cooling slows these weathering reactions. As a result, less carbon dioxide is removed from the atmosphere and Earth warms as this greenhouse gas accumulates—this 'negative feedback' process limits the magnitude of cooling. During the Cryogenian period, however, Earth's continents were all at tropical latitudes, which made this moderating process less effective, as high weathering rates continued on land even as Earth cooled. This let ice advance beyond the polar regions. Once ice advanced to within 30° of the equator, a positive feedback could ensue such that the increased reflectiveness (albedo) of the ice led to further cooling and the formation of more ice, until the whole Earth is ice-covered. Polar continents, due to low rates of evaporation, are too dry to allow substantial carbon deposition—restricting the amount of atmospheric carbon dioxide that can be removed from the carbon cycle. A gradual rise of the proportion of the isotope carbon-13 relative to carbon-12 in sediments pre-dating "global" glaciation indicates that draw-down before snowball Earths was a slow and continuous process. The start of snowball Earths are always marked by a sharp downturn in the δ13C value of sediments, a hallmark that may be attributed to a crash in biological productivity as a result of the cold temperatures and ice-covered oceans. In January 2016, Gernon et al. proposed a "shallow-ridge hypothesis" involving the breakup of the supercontinent Rodinia, linking the eruption and rapid alteration of hyaloclastites along shallow ridges to massive increases in alkalinity in an ocean with thick ice cover. Gernon et al. demonstrated that the increase in alkalinity over the course of glaciation is sufficient to explain the thickness of cap carbonates formed in the aftermath of Snowball Earth events. During the frozen period Global temperature fell so low that the equator was as cold as modern-day Antarctica. This low temperature was maintained by the high albedo of the ice sheets, which reflected most incoming solar energy into space. A lack of heat-retaining clouds, caused by water vapor freezing out of the atmosphere, amplified this effect. Breaking out of global glaciation The carbon dioxide levels necessary to thaw Earth have been estimated as being 350 times what they are today, about 13% of the atmosphere. Since Earth was almost completely covered with ice, carbon dioxide could not be withdrawn from the atmosphere by release of alkaline metal ions weathering out of siliceous rocks. Over 4 to 30 million years, enough and methane, mainly emitted by volcanoes but also produced by microbes converting organic carbon trapped under the ice into the gas, would accumulate to finally cause enough greenhouse effect to make surface ice melt in the tropics until a band of permanently ice-free land and water developed; this would be darker than the ice, and thus absorb more energy from the Sun—initiating a "positive feedback". Destabilization of substantial deposits of methane hydrates locked up in low-latitude permafrost may also have acted as a trigger and/or strong positive feedback for deglaciation and warming. On the continents, the melting of glaciers would release massive amounts of glacial deposit, which would erode and weather. The resulting sediments supplied to the ocean would be high in nutrients such as phosphorus, which combined with the abundance of would trigger a cyanobacteria population explosion, which would cause a relatively rapid reoxygenation of the atmosphere, which may have contributed to the rise of the Ediacaran biota and the subsequent Cambrian explosion—a higher oxygen concentration allowing large multicellular lifeforms to develop. Although the positive feedback loop would melt the ice in geological short order, perhaps less than 1,000 years, replenishment of atmospheric oxygen and depletion of the levels would take further millennia. It is possible that carbon dioxide levels fell enough for Earth to freeze again; this cycle may have repeated until the continents had drifted to more polar latitudes. More recent evidence suggests that with colder oceanic temperatures, the resulting higher ability of the oceans to dissolve gases led to the carbon content of sea water being more quickly oxidized to carbon dioxide. This leads directly to an increase of atmospheric |
on, Lazio reverted to the colours which they wear today. Some seasons Lazio have used a sky blue and white shirt with stripes, but usually it is sky blue with a white trim, with the white shorts and socks. The club's colours have led to their Italian nickname of Biancocelesti. Lazio's traditional club badge and symbol is the eagle, which was chosen by founding member Luigi Bigiarelli. It is an acknowledgment to the emblem of Zeus (the god of sky and thunder in Greek mythology) commonly referred to as Aquila; Lazio's use of the symbol has led to two of their nicknames; le Aquile ("the Eagles") and Aquilotti ("Eaglets"). The current club badge features a golden eagle above a white shield with a blue border; inside the shield is the club's name and a smaller tripartite shield with the colours of the club. Stadium Stadio Olimpico, located on the Foro Italico, is the major stadium of Rome. It is the home of the Italy national football team as well as of both local teams Lazio and Roma. It was opened in 1937 and after its latest renovation in 2008, the stadium has a capacity of 70,634 seats. It was the site of the 1960 Summer Olympics, but has also served as the location of the 1987 World Athletics Championships, the 1980 European Championship final, the 1990 World Cup and the Champions League Final in 1996 and 2009. Also on the Foro Italico lies the Stadio dei Marmi, or "marble stadium", which was built in 1932 and designed by Enrico Del Debbio. It has tiers topped by 60 white marble statues that were gifts from Italian cities in commemoration of 60 athletes. During the 1989–90 season, Lazio and Roma played their games at the Stadio Flaminio of Rome, located in the district Flaminio, because of the renovation works carried out at the Stadio Olimpico. In June 2018, Lazio President Claudio Lotito stated that "Lazio should be granted the same favour and treatment as Roma – the ability to also build a new stadium. He also added that "Lazio's stadium will be built before Roma's stadium." In June 2019, Lazio President Claudio Lotito was set to present the designs of a potential future stadium for Lazio, named the Stadio delle Aquile. However, this did not occur for reasons unknown. Supporters and rivalries Lazio is the sixth-most supported football club in Italy and the second in Rome, with around 2% of Italian football fans supporting the club (according to La Repubblica's research of August 2008). Historically, the largest section of Lazio supporters in the city of Rome has come from the far northern section, creating an arch-like shape across Rome with affluent areas such as Parioli, Prati, Flaminio, Cassia and Monte Mario. Founded in 1987, Irriducibili Lazio were the club's biggest ultras group for over 30 years. They typically create traditional Italian ultra displays during the Derby della Capitale (Rome Derby), the match between Lazio and their main rivals, Roma. It is amongst the most heated and emotional footballing rivalries in the world, such as where Lazio fan Vincenzo Paparelli was killed at one of the derby games during the 1979–80 season after being hit in the eye by an emergency rocket thrown by a Roma fan. A minority of Lazio's ultras used to use swastikas and fascist symbols on their banners, and they have displayed racist behaviour in several occasions during the derbies. Most notably, at a derby of the season 1998–99, laziali unfurled a 50-metre banner around the Curva Nord that read, "Auschwitz is your town, the ovens are your houses". Black players of Roma have often been receivers of racist and offensive behaviour. After 33 years, the Irriducibili disbanded on 27 February 2020, citing "too much blood, too many banning orders, too many arrests." Lazio's ultras now go by the name Ultras Lazio. Lazio also have a strong rivalry with Napoli and Livorno, as well as with Pescara and Atalanta. The club also maintains strong competitive rivalries with Fiorentina, Juventus, and Milan. Conversely, the ultras have friendly relationships with Internazionale, Triestina, and Hellas Verona. Internationally, Lazio's fans maintain a long-standing strong friendship with the supporters of the Bulgarian club Levski Sofia and as such, Lazio were invited to participate in the centenary football match honouring the birthday of the Bulgarian club. Players Current squad Other players under contract Out on loan Youth Sector Retired numbers 12 – Since the 2003–04 season, Curva Nord of Stadio Olimpico, as a sign of recognition towards the Curva Nord, is considered the 12th man in the field. Notable managers The following managers have all won at least one trophy when in charge of Lazio: Honours National Serie A Winners (2): 1973–74, 1999–2000 Coppa Italia Winners (7): 1958, 1997–98, 1999–2000, 2003–04, 2008–09, 2012–13, 2018–19 Supercoppa Italiana Winners (5): 1998, 2000, 2009, 2017, 2019 Serie B Winners (1): 1968–69 European UEFA Cup Winners' Cup Winners (1): 1998–99 UEFA Super Cup Winners (1): 1999 Statistics and records Ștefan Radu holds Lazio's official appearance record, having played 416 appearances. The record for total appearances by a goalkeeper is held by Luca Marchegiani, with 339 appearances, while the record for most league appearances is held by Aldo Puccinelli with 339. The all-time leading goalscorer for Lazio is Ciro Immobile, with 170 goals scored, followed by Silvio Piola with 159 goals. Piola, who played also with Pro Vercelli, Torino, Juventus and Novara, is also the highest goalscorer in Serie A history, with 274 goals. Simone Inzaghi is the all-time top goalscorer in European competitions, with 20 goals. He is also one of the five players who scored four goals in a single UEFA Champions League match. Officially, Lazio's highest home attendance is approximately 80,000 for a Serie A match against Foggia on 12 May 1974, the match that awarded to Lazio their first Scudetto. This is also the record for the Stadio Olimpico, including matches held by Roma and the Italy national football team. Società Sportiva Lazio as a company In 1998, during Sergio Cragnotti's period in charge as the chairman, Società Sportiva Lazio S.p.A. became a listed company: Lazio were the first Italian club to do so. However, Cragnotti resigned as chairman in 2001, after a "huge hole in the budget" of the club. Claudio Lotito, the current chairman of Lazio, purchased the club from Cragnotti in 2004, but owned just 26.969% of shares as the largest shareholders at that time. It was followed by banking group Capitalia (and its subsidiaries Mediocredito Centrale, Banca di Roma and Banco di Sicilia) as the second largest shareholders for 17.717%. Capitalia also hold 49% stake of Italpetroli (via Capitalia's subsidiary Banca di Roma), the parent company of city rival Roma (via Italpetroli's subsidiary "Roma 2000"). Lotito later purchased the minority stake from Capitalia. , Claudio Lotito owns just over two-thirds of the shares of Lazio. Lazio is one of only three Italian clubs listed on the Borsa Italiana, the others being Juventus and Roma. In the past, Lazio was the only one with a single primary share holder (Lotito). However, following several capital increases by Roma and Juventus, they also are significantly owned by a shareholder. According to The Football Money League, published by consultants Deloitte, in the 2004–05 season, Lazio was the 20th highest earning football club in the world with an estimated revenue of €83 million; the 2005 ranking of the club was 15th. However, in 2016 ranking (the rank used data in 2014–15 season), Lazio was not in the top 20. Lazio was one of the few clubs that self-sustain from the financial support of a shareholder, and also consistently make an aggregate profit after every season. Unlike Inter Milan, Roma and Milan, who were sanctioned by UEFA due to breaches of Financial Fair Play, Lazio passed the regulations held by the administrative body with the high achievements. Lotito also received a prize that joint awarded by and DGS Sport&Cultura, due to Lazio's financial health. In 2017, the club renewed their sponsorship deal with shirt manufacturer Macron. It was worth €16 million a season, plus variables of about €9 million stemming from league and European competition finishes. In February 2022, Lazio announced that they had parted ways with Macron after 10 years. Mizuno would become the team’s new sportswear and technical gear provider, with the Biancocelesti receiving €20 million over the next five years as a result of their new agreement with the Japanese company. Kit suppliers and shirt sponsors See also Football in Italy Lazio (futsal) Lazio Women References Sources External links S.S. Lazio at Serie A S.S. Lazio at UEFA S.S. Lazio at FIFA Football clubs in Rome Association football clubs established in 1900 Publicly traded sports companies Companies listed on the Borsa Italiana Italian football First Division clubs Serie A clubs Serie B clubs Serie A winning clubs Coppa | finish. In 1986, Lazio was hit with a nine-point deduction (a true deathblow back in the day of the two-point win) for a betting scandal involving player Claudio Vinazzani. An epic struggle against relegation followed the same season in Serie B, with the club led by trainer Eugenio Fascetti only avoiding relegation to the Serie C after play-off wins over Taranto and Campobasso. This would prove a turning point in the club's history, with Lazio returning to Serie A in 1988 and, under the careful financial management of Gianmarco Calleri, the consolidation of the club's position as a solid top-flight club. The arrival of Sergio Cragnotti in 1992 changed the club's history due to his long-term investments in new players to make the team a Scudetto competitor. A notable early transfer during his tenure was the capture of English midfielder Paul Gascoigne from Tottenham Hotspur for £5.5 million. Gascoigne's transfer to Lazio is credited with the increase of interest in Serie A in the United Kingdom during the 1990s. Cragnotti repeatedly broke transfer records in pursuit of players who were considered major stars – Juan Sebastián Verón for £18 million, Christian Vieri for £19 million and breaking the world transfer record, albeit only for a matter of weeks, to sign Hernán Crespo from Parma for £35 million. Lazio were Serie A runners-up in 1995, third in 1996 and fourth in 1997, then losing the championship just by one point to Milan on the last championship's match in 1999 before, with the likes of Siniša Mihajlović, Alessandro Nesta, Marcelo Salas and Pavel Nedvěd in the side, winning its second Scudetto in 2000, as well as the Coppa Italia double with Sven-Göran Eriksson (1997–2001) as manager. Lazio had two more Coppa Italia triumphs in 1998 and 2004, as well as the last UEFA Cup Winners' Cup in 1999. They also reached the UEFA Cup, but lost 0–3 against Internazionale. In addition, Lazio won the Supercoppa Italiana twice and defeated Manchester United in 1999 to win the UEFA Super Cup. In 2000, Lazio became also the first Italian football club to be quoted on the Italian Piazza Affari stock market. With money running out, however, Lazio's results slowly worsened in the years. In 2002, a financial scandal involving Cragnotti and his food products multinational Cirio forced him to leave the club, and Lazio was controlled until 2004 by caretaker financial managers and a bank pool. This forced the club to sell their star players and even fan favourite captain Alessandro Nesta. In 2004, entrepreneur Claudio Lotito acquired the majority of the club. In 2006, the club qualified to the 2006–07 UEFA Cup under coach Delio Rossi. The club, however, was excluded from European competitions due to their involvement in a match-fixing scandal. In the 2006–07 season, despite a later-reduced points deduction, Lazio achieved a third-place finish, thus gaining qualification to the UEFA Champions League third qualifying round, where they defeated Dinamo București to reach the group phase, and ended fourth place in the group composed of Real Madrid, Werder Bremen and Olympiacos. Things in the league did not go much better, with the team spending most of the season in the bottom half of the table, sparking the protests of the fans, and eventually ending the Serie A season in 12th place. In the 2008–09 season, Lazio won their fifth Coppa Italia, beating Sampdoria in the final. Lazio started the 2009–10 season playing the Supercoppa Italiana against Inter in Beijing and winning the match 2–1, with goals from Matuzalém and Tommaso Rocchi. Lazio won the 2012–13 Coppa Italia 1–0 over rivals Roma with the lone goal coming from Senad Lulić. Lazio won the 2018–19 Coppa Italia 2–0 over Atalanta, winning their seventh title overall. On 22 December 2019, Lazio won their fifth Supercoppa Italiana title, following a 3–1 victory over Juventus. Lazio mounted an unexpected title challenge during the 2019–20 Serie A season. A poor run of form following the restart of the Serie A campaign after the COVID-19 suspension saw Lazio fall out of the title race. On 24 July 2020, Lazio qualified for the Champions League for the first time in 12 years after securing a top 4 finish. Colours, badge and nicknames Lazio's colours of white and sky blue were inspired by the national emblem of Greece, due to the fact that Lazio is a mixed sports club this was chosen in recognition of the fact that the Ancient Olympic Games and along with it the sporting tradition in Europe is linked to Greece. Originally, Lazio wore a shirt which was divided into white and sky blue quarters, with black shorts and socks. After a while of wearing a plain white shirt very early on, Lazio reverted to the colours which they wear today. Some seasons Lazio have used a sky blue and white shirt with stripes, but usually it is sky blue with a white trim, with the white shorts and socks. The club's colours have led to their Italian nickname of Biancocelesti. Lazio's traditional club badge and symbol is the eagle, which was chosen by founding member Luigi Bigiarelli. It is an acknowledgment to the emblem of Zeus (the god of sky and thunder in Greek mythology) commonly referred to as Aquila; Lazio's use of the symbol has led to two of their nicknames; le Aquile ("the Eagles") and Aquilotti ("Eaglets"). The current club badge features a golden eagle above |
among the Britons; that his episcopal see was named after Saint Martin of Tours; that he preached to and converted the southern Picts; that his base was in a place called " Ad Candidam Casam", which was in the province of the Bernicians; and that he was buried there, along with many other saints. Aelred (c. 1160) Leaving aside the stories regarding miracles, in the Vita Sancti Niniani Aelred includes the following incidental information regarding Saint Ninian: that his father was a Christian king; that he was consecrated a bishop in Rome and that he met Saint Martin in Tours; that Saint Martin sent masons with him on his homeward journey, at his request; that these masons built a church of stone, situated on the shore, and that on learning of Saint Martin's death, Ninian dedicated the church to him; that a certain rich and powerful "King Tuduvallus" was converted by him; that he died after having converted the Picts and returned home, being buried in a stone sarcophagus near the altar of his church; and that he had once travelled with his brother, named "Plebia". Aelred said that in addition to finding information about Ninian in Bede, he took much additional information for his Life of S. Ninian from a source written in a "barbarous language"; there is no further information about this text. Aelred wrote his Life of S. Ninian sometime after spending ten years at the Scottish court and thus had close connections both to the Scottish royal family and to Fergus of Galloway (who would resurrect the Bishopric of Galloway), all of whom would have been pleased to have a manuscript with such a glowing description of a Galwegian and Scottish saint. His work is what Thomas Heffernan refers to as a "sacred biography," probably intended for a politically ambitious audience. Ussher (1639) Ussher wrote that Ninian left Candida Casa for Cluayn-coner in Ireland, and eventually died in Ireland; that his mother was a Spanish princess; that his father wished to regain him after having assented to his training for an ecclesiastical state; that a bell comes from heaven to call together his disciples; that a wooden church was raised by him, with beams delivered by stags; and that a harper with no experience at architecture was the builder of the church. He adds that a smith and his son, named respectively "Terna" and "Wyn", witnessed a miracle by Ninian and that the saint was granted lands to be called "Wytterna". In addition, Skene attributes the "traditional" date of Ninian's death (16 September 432) ultimately to Ussher's Life of Ninian, noting that the date is "without authority." Ussher's contribution is often disparaged, as he both invented fictitious histories and misquoted legitimate manuscripts to suit his own purposes. Still, he had access to legitimate manuscripts, and he has contributed to some versions of the traditional stories. Other sources Others who wrote of Saint Ninian used the accounts of Bede, Aelred, or Ussher, | in 1639 James Ussher discusses Ninian in his Brittanicarum Ecclesiarum Antiquitates. These are the sources of information about Ninian of Whithorn, and all provide seemingly innocuous personal details about his life. However, there is no unchallenged historical evidence to support any of their stories, and all sources had political and religious agendas that were served by their accounts of Saint Ninian (discussed below). Tradition holds that Ninian was a Briton who had studied in Rome, that he established an episcopal see at the Candida Casa in Whithorn, that he named the see for Saint Martin of Tours, that he converted the southern Picts to Christianity, and that he is buried at Whithorn. Variations of the story add that he had actually met Saint Martin, that his father was a Christian king, and that he was buried in a stone sarcophagus near the altar of his church. Further variations assert that he left for Ireland, and died there in 432. Dates for his birth are derived from the traditional mention of Saint Martin, who died in 397. Bede (c. 731) Bede says that Ninian (whose name he only renders in the ablative case Nynia) was a Briton who had been instructed in Rome; that he made his church of stone, which was unusual among the Britons; that his episcopal see was named after Saint Martin of Tours; that he preached to and converted the southern Picts; that his base was in a place called " Ad Candidam Casam", which was in the province of the Bernicians; and that he was buried there, along with many other saints. Aelred (c. 1160) Leaving aside the stories regarding miracles, in the Vita Sancti Niniani Aelred includes the following incidental information regarding Saint Ninian: that his father was a Christian king; that he was consecrated a bishop in Rome and that he met Saint Martin in Tours; that Saint Martin sent masons with him on his homeward journey, at his request; that these masons built a church of stone, situated on the shore, and that on learning of Saint Martin's death, Ninian dedicated the church to him; that a certain rich and powerful "King Tuduvallus" was converted by him; that he died after having converted the Picts and returned home, being buried in a stone sarcophagus near the altar of his church; and that he had once travelled with his brother, named "Plebia". Aelred said that in addition to finding information about Ninian in Bede, he took much additional information for his Life of S. Ninian from a source written in a "barbarous language"; there is no further information about this text. Aelred wrote his Life of S. Ninian sometime after spending ten years at the Scottish court and thus had close connections both to the Scottish royal family and to Fergus of Galloway (who would resurrect the Bishopric of Galloway), all of whom would have been pleased to have a manuscript with such a glowing description of a Galwegian and Scottish saint. His work is what Thomas Heffernan refers to as a "sacred biography," probably intended for a politically ambitious audience. Ussher (1639) Ussher wrote that Ninian left Candida Casa for Cluayn-coner in Ireland, and eventually died in Ireland; that his mother was a Spanish princess; that his father wished to regain him after having assented to his training for an ecclesiastical state; that a bell comes from heaven to call together his disciples; that a wooden church was raised by him, with beams delivered by stags; and that a harper with no experience at architecture was the builder of the church. He adds that a smith and his son, named respectively "Terna" and "Wyn", witnessed a miracle by Ninian and that the saint was granted lands to be called "Wytterna". In addition, Skene attributes the "traditional" date of Ninian's death (16 September 432) ultimately to Ussher's Life of Ninian, noting that the date is "without authority." Ussher's contribution is often disparaged, as he both invented fictitious histories and misquoted legitimate manuscripts to suit his own |
containing one top-most element and its contents. An SGML document may be composed from many entities (discrete pieces of text). In SGML, the entities and element types used in the document may be specified with a DTD, the different character sets, features, delimiter sets, and keywords are specified in the SGML Declaration to create the concrete syntax of the document. Although full SGML allows implicit markup and some other kinds of tags, the XML specification (s4.3.1) states: For introductory information on a basic, modern SGML syntax, see XML. The following material concentrates on features not in XML and is not a comprehensive summary of SGML syntax. Optional features SGML generalizes and supports a wide range of markup languages as found in the mid 1980s. These ranged from terse Wiki-like syntaxes to RTF-like bracketed languages to HTML-like matching-tag languages. SGML did this by a relatively simple default reference concrete syntax augmented with a large number of optional features that could be enabled in the SGML Declaration. Not every SGML parser can necessarily process every SGML document. Because each processor's System Declaration can be compared to the document's SGML Declaration it is always possible to know whether a document is supported by a particular processor. Many SGML features relate to markup minimization. Other features relate to concurrent (parallel) markup (CONCUR), to linking processing attributes (LINK), and to embedding SGML documents within SGML documents (SUBDOC). The notion of customizable features was not appropriate for Web use, so one goal of XML was to minimize optional features. However, XML's well-formedness rules cannot support Wiki-like languages, leaving them unstandardized and difficult to integrate with non-text information systems. Concrete and abstract syntaxes The usual (default) SGML concrete syntax resembles this example, which is the default HTML concrete syntax: <QUOTE TYPE="example"> typically something like <ITALICS>this</ITALICS> </QUOTE> SGML provides an abstract syntax that can be implemented in many different types of concrete syntax. Although the markup norm is using angle brackets as start- and end- tag delimiters in an SGML document (per the standard-defined reference concrete syntax), it is possible to use other characters—provided a suitable concrete syntax is defined in the document's SGML declaration. For example, an SGML interpreter might be programmed to parse GML, wherein the tags are delimited with a left colon and a right full stop, thus, an :e prefix denotes an end tag: :xmp.Hello, world:exmp.. According to the reference syntax, letter-case (upper- or lower-) is not distinguished in tag names, thus the three tags: (i) <quote>, (ii) <QUOTE>, and (iii) <quOtE> are equivalent. (NOTE: A concrete syntax might change this rule via the NAMECASE NAMING declarations). Markup minimization SGML has features for reducing the number of characters required to mark up a document, which must be enabled in the SGML Declaration. SGML processors need not support every available feature, thus allowing applications to tolerate many types of inadvertent markup omissions; however, SGML systems usually are intolerant of invalid structures. XML is intolerant of syntax omissions, and does not require a DTD for checking well-formedness. OMITTAG Both start tags and end tags may be omitted from a document instance, provided: the OMITTAG feature is enabled in the SGML Declaration, the DTD indicates that the tags are permitted to be omitted, (for start tags) the element has no associated required (#REQUIRED) attributes, and the tag can be unambiguously inferred by context. For example, if OMITTAG YES is specified in the SGML Declaration (enabling the OMITTAG feature), and the DTD includes the following declarations: <!ELEMENT chapter - - (title, section+)> <!ELEMENT title o o (#PCDATA)> <!ELEMENT section - - (title, subsection+)> then this excerpt: <chapter>Introduction to SGML <section>The SGML Declaration <subsection> ... which omits two tags and two tags, would represent valid markup. Omitting tags is optional – the same excerpt could be tagged like this: <chapter><title>Introduction to SGML</title> <section><title>The SGML Declaration</title> <subsection> ... and would still represent valid markup. Note: The OMITTAG feature is unrelated to the tagging of elements whose declared content is EMPTY as defined in the DTD: <!ELEMENT image - o EMPTY> Elements defined like this have no end tag, and specifying one in the document instance would result in invalid markup. This is syntactically different from XML empty elements in this regard. SHORTREF Tags can be replaced with delimiter strings, for a terser markup, via the SHORTREF feature. This markup style is now associated with wiki markup, e.g. wherein two equals-signs (==), at the start of a line, are the "heading start-tag", and two equals signs (==) after that are the "heading end-tag". SHORTTAG SGML markup languages whose concrete syntax enables the SHORTTAG VALUE feature, do not require attribute values containing only alphanumeric characters to be enclosed within quotation marks—either double " " (LIT) or single ' ' (LITA)—so that the previous markup example could be written: <QUOTE TYPE=example> typically something like <ITALICS>this</> </QUOTE> One feature of SGML markup languages is the "presumptuous empty tagging", such that the empty end tag </> in <ITALICS>this</> "inherits" its value from the nearest previous full start tag, which, in this example, is <ITALICS> (in other words, it closes the most recently opened item). The expression is thus equivalent to <ITALICS>this</ITALICS>. NET Another feature is the NET (Null End Tag) construction: <ITALICS/this/, which is structurally equivalent to <ITALICS>this</ITALICS>. Other features Additionally, the SHORTTAG NETENABL IMMEDNET | them unstandardized and difficult to integrate with non-text information systems. Concrete and abstract syntaxes The usual (default) SGML concrete syntax resembles this example, which is the default HTML concrete syntax: <QUOTE TYPE="example"> typically something like <ITALICS>this</ITALICS> </QUOTE> SGML provides an abstract syntax that can be implemented in many different types of concrete syntax. Although the markup norm is using angle brackets as start- and end- tag delimiters in an SGML document (per the standard-defined reference concrete syntax), it is possible to use other characters—provided a suitable concrete syntax is defined in the document's SGML declaration. For example, an SGML interpreter might be programmed to parse GML, wherein the tags are delimited with a left colon and a right full stop, thus, an :e prefix denotes an end tag: :xmp.Hello, world:exmp.. According to the reference syntax, letter-case (upper- or lower-) is not distinguished in tag names, thus the three tags: (i) <quote>, (ii) <QUOTE>, and (iii) <quOtE> are equivalent. (NOTE: A concrete syntax might change this rule via the NAMECASE NAMING declarations). Markup minimization SGML has features for reducing the number of characters required to mark up a document, which must be enabled in the SGML Declaration. SGML processors need not support every available feature, thus allowing applications to tolerate many types of inadvertent markup omissions; however, SGML systems usually are intolerant of invalid structures. XML is intolerant of syntax omissions, and does not require a DTD for checking well-formedness. OMITTAG Both start tags and end tags may be omitted from a document instance, provided: the OMITTAG feature is enabled in the SGML Declaration, the DTD indicates that the tags are permitted to be omitted, (for start tags) the element has no associated required (#REQUIRED) attributes, and the tag can be unambiguously inferred by context. For example, if OMITTAG YES is specified in the SGML Declaration (enabling the OMITTAG feature), and the DTD includes the following declarations: <!ELEMENT chapter - - (title, section+)> <!ELEMENT title o o (#PCDATA)> <!ELEMENT section - - (title, subsection+)> then this excerpt: <chapter>Introduction to SGML <section>The SGML Declaration <subsection> ... which omits two tags and two tags, would represent valid markup. Omitting tags is optional – the same excerpt could be tagged like this: <chapter><title>Introduction to SGML</title> <section><title>The SGML Declaration</title> <subsection> ... and would still represent valid markup. Note: The OMITTAG feature is unrelated to the tagging of elements whose declared content is EMPTY as defined in the DTD: <!ELEMENT image - o EMPTY> Elements defined like this have no end tag, and specifying one in the document instance would result in invalid markup. This is syntactically different from XML empty elements in this regard. SHORTREF Tags can be replaced with delimiter strings, for a terser markup, via the SHORTREF feature. This markup style is now associated with wiki markup, e.g. wherein two equals-signs (==), at the start of a line, are the "heading start-tag", and two equals signs (==) after that are the "heading end-tag". SHORTTAG SGML markup languages whose concrete syntax enables the SHORTTAG VALUE feature, do not require attribute values containing only alphanumeric characters to be enclosed within quotation marks—either double " " (LIT) or single ' ' (LITA)—so that the previous markup example could be written: <QUOTE TYPE=example> typically something like <ITALICS>this</> </QUOTE> One feature of SGML markup languages is the "presumptuous empty tagging", such that the empty end tag </> in <ITALICS>this</> "inherits" its value from the nearest previous full start tag, which, in this example, is <ITALICS> (in other words, it closes the most recently opened item). The expression is thus equivalent to <ITALICS>this</ITALICS>. NET Another feature is the NET (Null End Tag) construction: <ITALICS/this/, which is structurally equivalent to <ITALICS>this</ITALICS>. Other features Additionally, the SHORTTAG NETENABL IMMEDNET feature allows shortening tags surrounding an empty text value, but forbids shortening full tags: <QUOTE></QUOTE> can be written as <QUOTE// wherein the first slash ( / ) stands for the NET-enabling "start-tag close" (NESTC), and the second slash stands for the NET. NOTE: XML defines NESTC with a /, and NET with an > (angled bracket)—hence the corresponding construct in XML appears as . The third feature is 'text on the same line', allowing a markup item to be ended with a line-end; especially useful for headings and such, requiring using either SHORTREF or DATATAG minimization. For example, if the DTD includes the following declarations: <!ELEMENT lines (line*)> <!ELEMENT line O - (#PCDATA)> <!ENTITY line-tagc "</line>"> <!SHORTREF one-line "&#RE;&#RS;" line-tagc> <!USEMAP one-line line> (and "&#RE;&#RS;" is a short-reference delimiter in the concrete syntax), then: <lines> first line second line </lines> is equivalent to: <lines> <line>first line</line> <line>second line</line> </lines> Formal characterization SGML has many features that defied convenient description with the popular formal automata theory and the contemporary parser technology of the 1980s and the 1990s. The standard warns in Annex H: A report on an early implementation of a parser for basic SGML, the Amsterdam SGML Parser, notes and specifies various differences. There appears to be no definitive classification of full SGML against a known class of formal grammar. Plausible classes may include tree-adjoining grammars and adaptive grammars. XML is described as being generally parsable like a two-level grammar for non-validated XML and a Conway-style pipeline of coroutines (lexer, parser, validator) for valid XML. The SGML productions in the ISO standard are reported to be LL(3) or LL(4). XML-class subsets are reported to be expressible using a W-grammar. According to one paper, and probably considered at an information set or parse tree level rather than a character or delimiter level: The SGML standard does not define SGML with formal data structures, such as parse trees; however, an SGML document is constructed of a rooted directed acyclic graph (RDAG) of physical storage units known as "entities", which is parsed into a RDAG of structural units known as "elements". The physical graph is loosely characterized as an entity tree, but entities might appear multiple |
of a sexual species has stimulated the proliferation of field guides on birds, mammals, reptiles, insects, and many other taxa, in which a species can be described with a single illustration (or two, in the case of sexual dimorphism). Once a population has become as homogeneous in appearance as is typical of most species (and is illustrated in the photograph of the African pygmy kingfisher), its members will avoid mating with members of other populations that look different from themselves. Thus, the avoidance of mates displaying rare and unusual phenotypic features inevitably leads to reproductive isolation, one of the hallmarks of speciation. In the contrasting case of organisms that reproduce asexually, there is no cost of rarity; consequently, there are only benefits to fine-scale adaptation. Thus, asexual organisms very frequently show the continuous variation in form (often in many different directions) that Darwin expected evolution to produce, making their classification into "species" (more correctly, morphospecies) very difficult. Modes All forms of natural speciation have taken place over the course of evolution; however, debate persists as to the relative importance of each mechanism in driving biodiversity. One example of natural speciation is the diversity of the three-spined stickleback, a marine fish that, after the last glacial period, has undergone speciation into new freshwater colonies in isolated lakes and streams. Over an estimated 10,000 generations, the sticklebacks show structural differences that are greater than those seen between different genera of fish including variations in fins, changes in the number or size of their bony plates, variable jaw structure, and color differences. Allopatric During allopatric (from the ancient Greek allos, "other" + patrā, "fatherland") speciation, a population splits into two geographically isolated populations (for example, by habitat fragmentation due to geographical change such as mountain formation). The isolated populations then undergo genotypic or phenotypic divergence as: (a) they become subjected to dissimilar selective pressures; (b) they independently undergo genetic drift; (c) different mutations arise in the two populations. When the populations come back into contact, they have evolved such that they are reproductively isolated and are no longer capable of exchanging genes. Island genetics is the term associated with the tendency of small, isolated genetic pools to produce unusual traits. Examples include insular dwarfism and the radical changes among certain famous island chains, for example on Komodo. The Galápagos Islands are particularly famous for their influence on Charles Darwin. During his five weeks there he heard that Galápagos tortoises could be identified by island, and noticed that finches differed from one island to another, but it was only nine months later that he reflected that such facts could show that species were changeable. When he returned to England, his speculation on evolution deepened after experts informed him that these were separate species, not just varieties, and famously that other differing Galápagos birds were all species of finches. Though the finches were less important for Darwin, more recent research has shown the birds now known as Darwin's finches to be a classic case of adaptive evolutionary radiation. Peripatric In peripatric speciation, a subform of allopatric speciation, new species are formed in isolated, smaller peripheral populations that are prevented from exchanging genes with the main population. It is related to the concept of a founder effect, since small populations often undergo bottlenecks. Genetic drift is often proposed to play a significant role in peripatric speciation. Case studies include Mayr's investigation of bird fauna; the Australian bird Petroica multicolor; and reproductive isolation in populations of Drosophila subject to population bottlenecking. Parapatric In parapatric speciation, there is only partial separation of the zones of two diverging populations afforded by geography; individuals of each species may come in contact or cross habitats from time to time, but reduced fitness of the heterozygote leads to selection for behaviours or mechanisms that prevent their interbreeding. Parapatric speciation is modelled on continuous variation within a "single", connected habitat acting as a source of natural selection rather than the effects of isolation of habitats produced in peripatric and allopatric speciation. Parapatric speciation may be associated with differential landscape-dependent selection. Even if there is a gene flow between two populations, strong differential selection may impede assimilation and different species may eventually develop. Habitat differences may be more important in the development of reproductive isolation than the isolation time. Caucasian rock lizards Darevskia rudis, D. valentini and D. portschinskii all hybridize with each other in their hybrid zone; however, hybridization is stronger between D. portschinskii and D. rudis, which separated earlier but live in similar habitats than between D. valentini and two other species, which separated later but live in climatically different habitats. Ecologists refer to parapatric and peripatric speciation in terms of ecological niches. A niche must be available in order for a new species to be successful. Ring species such as Larus gulls have been claimed to illustrate speciation in progress, though the situation may be more complex. The grass Anthoxanthum odoratum may be starting parapatric speciation in areas of mine contamination. Sympatric Sympatric speciation is the formation of two or more descendant species from a single ancestral species all occupying the same geographic location. Often-cited examples of sympatric speciation are found in insects that become dependent on different host plants in the same area. The best known example of sympatric speciation is that of the cichlids of East Africa inhabiting the Rift Valley lakes, particularly Lake Victoria, Lake Malawi and Lake Tanganyika. There are over 800 described species, and according to estimates, there could be well over 1,600 species in the region. Their evolution is cited as an example of both natural and sexual selection. A 2008 study suggests that sympatric speciation has occurred in Tennessee cave salamanders. Sympatric speciation driven by ecological factors may also account for the extraordinary diversity of crustaceans living in the depths of Siberia's Lake Baikal. Budding speciation has been proposed as a particular form of sympatric speciation, whereby small groups of individuals become progressively more isolated from the ancestral stock by breeding preferentially with one another. This type of speciation would be driven by the conjunction of various advantages of inbreeding such as the expression of advantageous recessive phenotypes, reducing the recombination load, and reducing the cost of sex. The hawthorn fly (Rhagoletis pomonella), also known as the apple maggot fly, appears to be undergoing sympatric speciation. Different populations of hawthorn fly feed on different fruits. A distinct population emerged in North America in the 19th century some time after apples, a non-native species, were introduced. This apple-feeding population normally feeds only on apples and not on the historically preferred fruit of hawthorns. The current hawthorn feeding population does not normally feed on apples. Some evidence, such as that six out of thirteen allozyme loci are different, that hawthorn flies mature later in the season and take longer to mature than apple flies; and that there is little evidence of interbreeding (researchers have documented a 4–6% hybridization rate) suggests that sympatric speciation is occurring. Methods of selection Reinforcement Reinforcement, also called the Wallace effect, is the process by which natural selection increases reproductive isolation. It may occur after two populations of the same species are separated and then come back into contact. If their reproductive isolation was complete, then they will have already developed into two separate incompatible species. If their reproductive isolation is incomplete, then further mating between the populations will produce hybrids, which may or may not be fertile. If the hybrids are infertile, or fertile but less fit than their ancestors, then there will be further reproductive isolation and speciation has essentially occurred, as in horses and donkeys. One reasoning behind this is that if the parents of the hybrid offspring each have naturally selected traits for their own certain environments, the hybrid offspring will bear traits from both, therefore would not fit either ecological niche as well as either parent (ecological speciation). The low fitness of the hybrids would cause selection to favor assortative mating, which would control hybridization. This is sometimes called the Wallace effect after the evolutionary biologist Alfred Russel Wallace who suggested in the late 19th century that it might be an important factor in speciation. Conversely, if the hybrid offspring are more fit than their ancestors, then the populations will merge back into the same species within the area they are in contact. Another imporant theoretical mechanism is the arise of intrinsic genetic incompatibilities, addressed in the Bateson-Dobzhansky-Muller model. Genes from allopatric populations will have different evolutionary backgrounds and are never tested together until hybridization at secondary contact, when negative epistatic interactions will be exposed. In other words, new alleles will emerge in a population and only pass through selection if they work well together with other genes in the same population, but it may not be compatible with genes in an allopatric population, be those other newly derived alleles or retained ancestral alleles. This is only revealed through new hybridization. Such incompatibilities cause lower fitness in hybrids regardless of the ecological environment, and are thus intrinsic, although they can originate from the adaptation to different environments. The accumulation of such incompatibilities increases faster and faster with time, creating a "snowball" effect. There is a large amount of evidence supporting this thoery, primarily from laboratory populations such as Drosophila and Mus, and some genes involved in incompatibilities have been identified. Reinforcement favoring reproductive isolation is required for both parapatric and sympatric speciation. Without reinforcement, the geographic area of contact between different forms of the same species, called their "hybrid zone", will not develop into a boundary between the different species. Hybrid zones are regions where diverged populations meet and interbreed. Hybrid offspring are common in these regions, | fitness of the heterozygote leads to selection for behaviours or mechanisms that prevent their interbreeding. Parapatric speciation is modelled on continuous variation within a "single", connected habitat acting as a source of natural selection rather than the effects of isolation of habitats produced in peripatric and allopatric speciation. Parapatric speciation may be associated with differential landscape-dependent selection. Even if there is a gene flow between two populations, strong differential selection may impede assimilation and different species may eventually develop. Habitat differences may be more important in the development of reproductive isolation than the isolation time. Caucasian rock lizards Darevskia rudis, D. valentini and D. portschinskii all hybridize with each other in their hybrid zone; however, hybridization is stronger between D. portschinskii and D. rudis, which separated earlier but live in similar habitats than between D. valentini and two other species, which separated later but live in climatically different habitats. Ecologists refer to parapatric and peripatric speciation in terms of ecological niches. A niche must be available in order for a new species to be successful. Ring species such as Larus gulls have been claimed to illustrate speciation in progress, though the situation may be more complex. The grass Anthoxanthum odoratum may be starting parapatric speciation in areas of mine contamination. Sympatric Sympatric speciation is the formation of two or more descendant species from a single ancestral species all occupying the same geographic location. Often-cited examples of sympatric speciation are found in insects that become dependent on different host plants in the same area. The best known example of sympatric speciation is that of the cichlids of East Africa inhabiting the Rift Valley lakes, particularly Lake Victoria, Lake Malawi and Lake Tanganyika. There are over 800 described species, and according to estimates, there could be well over 1,600 species in the region. Their evolution is cited as an example of both natural and sexual selection. A 2008 study suggests that sympatric speciation has occurred in Tennessee cave salamanders. Sympatric speciation driven by ecological factors may also account for the extraordinary diversity of crustaceans living in the depths of Siberia's Lake Baikal. Budding speciation has been proposed as a particular form of sympatric speciation, whereby small groups of individuals become progressively more isolated from the ancestral stock by breeding preferentially with one another. This type of speciation would be driven by the conjunction of various advantages of inbreeding such as the expression of advantageous recessive phenotypes, reducing the recombination load, and reducing the cost of sex. The hawthorn fly (Rhagoletis pomonella), also known as the apple maggot fly, appears to be undergoing sympatric speciation. Different populations of hawthorn fly feed on different fruits. A distinct population emerged in North America in the 19th century some time after apples, a non-native species, were introduced. This apple-feeding population normally feeds only on apples and not on the historically preferred fruit of hawthorns. The current hawthorn feeding population does not normally feed on apples. Some evidence, such as that six out of thirteen allozyme loci are different, that hawthorn flies mature later in the season and take longer to mature than apple flies; and that there is little evidence of interbreeding (researchers have documented a 4–6% hybridization rate) suggests that sympatric speciation is occurring. Methods of selection Reinforcement Reinforcement, also called the Wallace effect, is the process by which natural selection increases reproductive isolation. It may occur after two populations of the same species are separated and then come back into contact. If their reproductive isolation was complete, then they will have already developed into two separate incompatible species. If their reproductive isolation is incomplete, then further mating between the populations will produce hybrids, which may or may not be fertile. If the hybrids are infertile, or fertile but less fit than their ancestors, then there will be further reproductive isolation and speciation has essentially occurred, as in horses and donkeys. One reasoning behind this is that if the parents of the hybrid offspring each have naturally selected traits for their own certain environments, the hybrid offspring will bear traits from both, therefore would not fit either ecological niche as well as either parent (ecological speciation). The low fitness of the hybrids would cause selection to favor assortative mating, which would control hybridization. This is sometimes called the Wallace effect after the evolutionary biologist Alfred Russel Wallace who suggested in the late 19th century that it might be an important factor in speciation. Conversely, if the hybrid offspring are more fit than their ancestors, then the populations will merge back into the same species within the area they are in contact. Another imporant theoretical mechanism is the arise of intrinsic genetic incompatibilities, addressed in the Bateson-Dobzhansky-Muller model. Genes from allopatric populations will have different evolutionary backgrounds and are never tested together until hybridization at secondary contact, when negative epistatic interactions will be exposed. In other words, new alleles will emerge in a population and only pass through selection if they work well together with other genes in the same population, but it may not be compatible with genes in an allopatric population, be those other newly derived alleles or retained ancestral alleles. This is only revealed through new hybridization. Such incompatibilities cause lower fitness in hybrids regardless of the ecological environment, and are thus intrinsic, although they can originate from the adaptation to different environments. The accumulation of such incompatibilities increases faster and faster with time, creating a "snowball" effect. There is a large amount of evidence supporting this thoery, primarily from laboratory populations such as Drosophila and Mus, and some genes involved in incompatibilities have been identified. Reinforcement favoring reproductive isolation is required for both parapatric and sympatric speciation. Without reinforcement, the geographic area of contact between different forms of the same species, called their "hybrid zone", will not develop into a boundary between the different species. Hybrid zones are regions where diverged populations meet and interbreed. Hybrid offspring are common in these regions, which are usually created by diverged species coming into secondary contact. Without reinforcement, the two species would have uncontrollable inbreeding. Reinforcement may be induced in artificial selection experiments as described below. Ecological Ecological selection is "the interaction of individuals with their environment during resource acquisition". Natural selection is inherently involved in the process of speciation, whereby, "under ecological speciation, populations in different environments, or populations exploiting different resources, experience contrasting natural selection pressures on the traits that directly or indirectly bring about the evolution of reproductive isolation". Evidence for the role ecology plays in the process of speciation exists. Studies of stickleback populations support ecologically-linked speciation arising as a by-product, alongside numerous studies of parallel speciation, where isolation evolves between independent populations of species adapting to contrasting environments than between independent populations adapting to similar environments. Ecological speciation occurs with much of the evidence, "...accumulated from top-down studies of adaptation and reproductive isolation". Sexual selection Sexual selection can drive speciation in a clade, independently of natural selection. However the term "speciation", in this context, tends to be used in two different, but not mutually exclusive senses. The first and most commonly used sense refers to the "birth" of new species. That is, the splitting of an existing species into two separate species, or the budding off of a new species from a parent species, both driven by a biological "fashion fad" (a preference for a feature, or features, in one or both sexes, that do not necessarily have any adaptive qualities). In the second sense, "speciation" refers to the wide-spread tendency of sexual creatures to be grouped into clearly defined species, rather than forming a continuum of phenotypes both in time and space – which would be the more obvious or logical consequence of natural selection. This was indeed recognized by Darwin as problematic, and included in his On the Origin of Species (1859), under the heading "Difficulties with the Theory". There are several suggestions as to how mate choice might play a significant role in resolving Darwin's dilemma. If speciation takes place in the absence of natural selection, it might be referred to as nonecological speciation. Artificial speciation New species have been created by animal husbandry, but the dates and methods of the initiation of such species are not clear. Often, the domestic counterpart can still interbreed and produce fertile offspring with its wild ancestor. This is the case with domestic cattle, which can be considered the same species as several varieties of wild ox, gaur, and yak; and with domestic sheep that can interbreed with the mouflon. The best-documented creations of new species in the laboratory were performed in the late 1980s. William R. Rice and George W. Salt bred Drosophila melanogaster fruit flies using a maze with three different choices of habitat such as light/dark and wet/dry. Each generation was placed into the maze, and the groups of flies that came out of two of the eight exits were set apart to breed with each other in their respective groups. After thirty-five generations, the two groups and their offspring were isolated reproductively because of their strong habitat preferences: they mated only within the areas they preferred, and so did not mate with flies that preferred the other areas. The history of such attempts is described by Rice and Elen E. Hostert (1993). Diane Dodd used a laboratory experiment to show how reproductive isolation can develop in Drosophila pseudoobscura fruit flies after several generations by placing them in different media, starch- and maltose-based media. Dodd's experiment has been replicated many times, including with other kinds of fruit flies and foods. Such rapid evolution of reproductive isolation may sometimes be a relic of infection by Wolbachia bacteria. An alternative |
Structured Query Language. After testing SQL at customer test sites to determine the usefulness and practicality of the system, IBM began developing commercial products based on their System R prototype, including System/38, SQL/DS, and DB2, which were commercially available in 1979, 1981, and 1983, respectively. In the late 1970s, Relational Software, Inc. (now Oracle Corporation) saw the potential of the concepts described by Codd, Chamberlin, and Boyce, and developed their own SQL-based RDBMS with aspirations of selling it to the U.S. Navy, Central Intelligence Agency, and other U.S. government agencies. In June 1979, Relational Software introduced one of the first commercially available implementations of SQL, Oracle V2 (Version2) for VAX computers. By 1986, ANSI and ISO standard groups officially adopted the standard "Database Language SQL" language definition. New versions of the standard were published in 1989, 1992, 1996, 1999, 2003, 2006, 2008, 2011, and most recently, 2016. Syntax The SQL language is subdivided into several language elements, including: Clauses, which are constituent components of statements and queries. (In some cases, these are optional.) Expressions, which can produce either scalar values, or tables consisting of columns and rows of data Predicates, which specify conditions that can be evaluated to SQL three-valued logic (3VL) (true/false/unknown) or Boolean truth values and are used to limit the effects of statements and queries, or to change program flow. Queries, which retrieve the data based on specific criteria. This is an important element of SQL. Statements, which may have a persistent effect on schemata and data, or may control transactions, program flow, connections, sessions, or diagnostics. SQL statements also include the semicolon (";") statement terminator. Though not required on every platform, it is defined as a standard part of the SQL grammar. Insignificant whitespace is generally ignored in SQL statements and queries, making it easier to format SQL code for readability. Procedural extensions SQL is designed for a specific purpose: to query data contained in a relational database. SQL is a set-based, declarative programming language, not an imperative programming language like C or BASIC. However, extensions to Standard SQL add procedural programming language functionality, such as control-of-flow constructs. These include: In addition to the standard SQL/PSM extensions and proprietary SQL extensions, procedural and object-oriented programmability is available on many SQL platforms via DBMS integration with other languages. The SQL standard defines SQL/JRT extensions (SQL Routines and Types for the Java Programming Language) to support Java code in SQL databases. Microsoft SQL Server 2005 uses the SQLCLR (SQL Server Common Language Runtime) to host managed .NET assemblies in the database, while prior versions of SQL Server were restricted to unmanaged extended stored procedures primarily written in C. PostgreSQL lets users write functions in a wide variety of languages—including Perl, Python, Tcl, JavaScript (PL/V8) and C. Interoperability and standardization Overview SQL implementations are incompatible between vendors and do not necessarily completely follow standards. In particular, date and time syntax, string concatenation, NULLs, and comparison case sensitivity vary from vendor to vendor. Particular exceptions are PostgreSQL and Mimer SQL which strive for standards compliance, though PostgreSQL does not adhere to the standard in all cases. For example, the folding of unquoted names to lower case in PostgreSQL is incompatible with the SQL standard, which says that unquoted names should be folded to upper case. Thus, Foo should be equivalent to FOO not foo according to the standard. Popular implementations of SQL commonly omit support for basic features of Standard SQL, such as the DATE or TIME data types. The most obvious such examples, and incidentally the most popular commercial and proprietary SQL DBMSs, are Oracle (whose DATE behaves as DATETIME, and lacks a TIME type) and MS SQL Server (before the 2008 version). As a result, SQL code can rarely be ported between database systems without modifications. Reasons for incompatibility Several reasons for this lack of portability between database systems include: The complexity and size of the SQL standard means that most implementers do not support the entire standard. The standard does not specify database behavior in several important areas (e.g. indices, file storage...), leaving implementations to decide how to behave. The SQL standard precisely specifies the syntax that a conforming database system must implement. However, the standard's specification of the semantics of language constructs is less well-defined, leading to ambiguity. Many database vendors have large existing customer bases; where the newer version of the SQL standard conflicts with the prior behavior of the vendor's database, the vendor may be unwilling to break backward compatibility. Little commercial incentive exists for vendors to make changing database suppliers easier (see vendor lock-in). Users evaluating database software tend to place other factors such as performance higher in their priorities than standards conformance. Standardization history SQL was adopted as a standard by the ANSI in 1986 as SQL-86 and the ISO in 1987. It is maintained by ISO/IEC JTC 1, Information technology, Subcommittee SC 32, Data management and interchange. Until 1996, the National Institute of Standards and Technology (NIST) data-management standards program certified SQL DBMS compliance with the SQL standard. Vendors now self-certify the compliance of their products. The original standard declared that the official pronunciation for "SQL" was an initialism: ("ess cue el"). Regardless, many English-speaking database professionals (including Donald Chamberlin himself) use the acronym-like pronunciation of ("sequel"), mirroring the language's prerelease development name, "SEQUEL". The SQL standard has gone through a number of revisions: Current standard The standard is commonly denoted by the pattern: ISO/IEC 9075-n:yyyy Part n: title, or, as a shortcut, ISO/IEC 9075. ISO/IEC 9075 is complemented by ISO/IEC 13249: SQL Multimedia and Application Packages (SQL/MM), which defines SQL-based interfaces and packages to widely spread applications such as video, audio, and spatial data. Interested parties may purchase SQL standards documents from ISO, IEC or ANSI. A draft of SQL:2008 is freely available as a zip archive. Anatomy of SQL Standard The SQL standard is divided into 10 parts, but with gaps in the numbering due to the withdrawal of outdated parts. ISO/IEC 9075-1:2016 Part 1: Framework (SQL/Framework). It provides logical concepts. ISO/IEC 9075-2:2016 Part 2: Foundation (SQL/Foundation). It contains the most central elements of the language and consists of both mandatory and optional features. ISO/IEC 9075-3:2016 Part 3: Call-Level Interface (SQL/CLI). It defines interfacing components (structures, procedures, variable bindings) that can be used to execute SQL statements from applications written in Ada, C respectively C++, COBOL, Fortran, MUMPS, Pascal or PL/I. (For Java see part 10.) SQL/CLI is defined in such a way that SQL statements and SQL/CLI procedure calls are treated as separate from the calling application's source code. Open Database Connectivity is a well-known superset of SQL/CLI. This part of the standard consists solely of mandatory features. ISO/IEC 9075-4:2016 Part 4: Persistent stored modules (SQL/PSM). It standardizes procedural extensions for SQL, including flow of control, condition handling, statement condition signals and resignals, cursors and local variables, and assignment of expressions to variables and parameters. In addition, SQL/PSM formalizes declaration and maintenance of persistent database language routines (e.g., "stored procedures"). This part of the standard consists solely of optional features. ISO/IEC 9075-9:2016 Part 9: Management of External Data (SQL/MED). It provides extensions to SQL that define foreign-data wrappers and datalink types to allow SQL to manage external data. External data is data that is accessible to, but not managed by, an SQL-based DBMS. This part of the standard consists solely of optional features. ISO/IEC 9075-10:2016 Part 10: Object language bindings (SQL/OLB). It defines the syntax and semantics of SQLJ, which is SQL embedded in Java (see also part 3). The standard also describes mechanisms to ensure binary portability of SQLJ applications, and specifies various Java packages and their contained classes. This part of the standard consists solely of optional features. Unlike SQL/OLB JDBC defines an API and is not part of the SQL standard. ISO/IEC 9075-11:2016 Part 11: Information and definition schemas (SQL/Schemata). It defines the Information Schema and Definition Schema, providing a common set of tools to make SQL databases and objects self-describing. These tools include the SQL object identifier, structure and integrity constraints, security and authorization specifications, features and packages of ISO/IEC 9075, support of features provided by SQL-based DBMS implementations, SQL-based DBMS implementation information and sizing items, and the values supported by the DBMS implementations. This part of the standard contains both mandatory and optional features. ISO/IEC 9075-13:2016 Part 13: SQL Routines and types using the Java TM programming language (SQL/JRT). It specifies the ability to invoke static Java methods as routines from within SQL applications ('Java-in-the-database'). It also calls for the ability to use Java classes as SQL structured user-defined types. This part of the standard consists solely of optional features. ISO/IEC 9075-14:2016 Part 14: XML-Related Specifications (SQL/XML). It specifies SQL-based extensions for using XML in conjunction with SQL. The XML data type is introduced, as well as several routines, functions, and XML-to-SQL data type mappings to support manipulation and storage of XML in an SQL database. This part of the standard consists solely of optional features. ISO/IEC 9075-15:2019 Part 15: Multi-dimensional arrays (SQL/MDA). It specifies a multidimensional array type (MDarray) for SQL, along with operations on MDarrays, MDarray slices, MDarray cells, and related features. This part of the standard consists solely of optional features. Extensions to the ISO/IEC Standard ISO/IEC 9075 is complemented by ISO/IEC 13249 SQL Multimedia and Application Packages. This closely related | the data based on specific criteria. This is an important element of SQL. Statements, which may have a persistent effect on schemata and data, or may control transactions, program flow, connections, sessions, or diagnostics. SQL statements also include the semicolon (";") statement terminator. Though not required on every platform, it is defined as a standard part of the SQL grammar. Insignificant whitespace is generally ignored in SQL statements and queries, making it easier to format SQL code for readability. Procedural extensions SQL is designed for a specific purpose: to query data contained in a relational database. SQL is a set-based, declarative programming language, not an imperative programming language like C or BASIC. However, extensions to Standard SQL add procedural programming language functionality, such as control-of-flow constructs. These include: In addition to the standard SQL/PSM extensions and proprietary SQL extensions, procedural and object-oriented programmability is available on many SQL platforms via DBMS integration with other languages. The SQL standard defines SQL/JRT extensions (SQL Routines and Types for the Java Programming Language) to support Java code in SQL databases. Microsoft SQL Server 2005 uses the SQLCLR (SQL Server Common Language Runtime) to host managed .NET assemblies in the database, while prior versions of SQL Server were restricted to unmanaged extended stored procedures primarily written in C. PostgreSQL lets users write functions in a wide variety of languages—including Perl, Python, Tcl, JavaScript (PL/V8) and C. Interoperability and standardization Overview SQL implementations are incompatible between vendors and do not necessarily completely follow standards. In particular, date and time syntax, string concatenation, NULLs, and comparison case sensitivity vary from vendor to vendor. Particular exceptions are PostgreSQL and Mimer SQL which strive for standards compliance, though PostgreSQL does not adhere to the standard in all cases. For example, the folding of unquoted names to lower case in PostgreSQL is incompatible with the SQL standard, which says that unquoted names should be folded to upper case. Thus, Foo should be equivalent to FOO not foo according to the standard. Popular implementations of SQL commonly omit support for basic features of Standard SQL, such as the DATE or TIME data types. The most obvious such examples, and incidentally the most popular commercial and proprietary SQL DBMSs, are Oracle (whose DATE behaves as DATETIME, and lacks a TIME type) and MS SQL Server (before the 2008 version). As a result, SQL code can rarely be ported between database systems without modifications. Reasons for incompatibility Several reasons for this lack of portability between database systems include: The complexity and size of the SQL standard means that most implementers do not support the entire standard. The standard does not specify database behavior in several important areas (e.g. indices, file storage...), leaving implementations to decide how to behave. The SQL standard precisely specifies the syntax that a conforming database system must implement. However, the standard's specification of the semantics of language constructs is less well-defined, leading to ambiguity. Many database vendors have large existing customer bases; where the newer version of the SQL standard conflicts with the prior behavior of the vendor's database, the vendor may be unwilling to break backward compatibility. Little commercial incentive exists for vendors to make changing database suppliers easier (see vendor lock-in). Users evaluating database software tend to place other factors such as performance higher in their priorities than standards conformance. Standardization history SQL was adopted as a standard by the ANSI in 1986 as SQL-86 and the ISO in 1987. It is maintained by ISO/IEC JTC 1, Information technology, Subcommittee SC 32, Data management and interchange. Until 1996, the National Institute of Standards and Technology (NIST) data-management standards program certified SQL DBMS compliance with the SQL standard. Vendors now self-certify the compliance of their products. The original standard declared that the official pronunciation for "SQL" was an initialism: ("ess cue el"). Regardless, many English-speaking database professionals (including Donald Chamberlin himself) use the acronym-like pronunciation of ("sequel"), mirroring the language's prerelease development name, "SEQUEL". The SQL standard has gone through a number of revisions: Current standard The standard is commonly denoted by the pattern: ISO/IEC 9075-n:yyyy Part n: title, or, as a shortcut, ISO/IEC 9075. ISO/IEC 9075 is complemented by ISO/IEC 13249: SQL Multimedia and Application Packages (SQL/MM), which defines SQL-based interfaces and packages to widely spread applications such as video, audio, and spatial data. Interested parties may purchase SQL standards documents from ISO, IEC or ANSI. A draft of SQL:2008 is freely available as a zip archive. Anatomy of SQL Standard The SQL standard is divided into 10 parts, but with gaps in the numbering due to the withdrawal of outdated parts. ISO/IEC 9075-1:2016 Part 1: Framework (SQL/Framework). It provides logical concepts. ISO/IEC 9075-2:2016 Part 2: Foundation (SQL/Foundation). It contains the most central elements of the language and consists of both mandatory and optional features. ISO/IEC 9075-3:2016 Part 3: Call-Level Interface (SQL/CLI). It defines interfacing components (structures, procedures, variable bindings) that can be used to execute SQL statements from applications written in Ada, C respectively C++, COBOL, Fortran, MUMPS, Pascal or PL/I. (For Java see part 10.) SQL/CLI is defined in such a way that SQL statements and SQL/CLI procedure calls are treated as separate from the calling application's source code. Open Database Connectivity is a well-known superset of SQL/CLI. This part of the standard consists solely of mandatory features. ISO/IEC 9075-4:2016 Part 4: Persistent stored modules (SQL/PSM). It standardizes procedural extensions for SQL, including flow of control, condition handling, statement condition signals and resignals, cursors and local variables, and assignment of expressions to variables and parameters. In addition, SQL/PSM formalizes declaration and maintenance of persistent database language routines (e.g., "stored procedures"). This part of the standard consists solely of optional features. ISO/IEC 9075-9:2016 Part 9: Management of External Data (SQL/MED). It provides extensions to SQL that define foreign-data wrappers and datalink types to allow SQL to manage external data. External data is data that is accessible to, but not managed by, an SQL-based DBMS. This part of the standard consists solely of optional features. ISO/IEC 9075-10:2016 Part 10: Object language bindings (SQL/OLB). It defines the syntax and semantics of SQLJ, which is SQL embedded in Java (see also part 3). The standard also describes mechanisms to ensure binary portability of SQLJ applications, and specifies various Java packages and their contained classes. This part of the standard consists solely of optional features. Unlike SQL/OLB JDBC defines an API and is not part of the SQL standard. ISO/IEC 9075-11:2016 Part 11: Information and definition schemas (SQL/Schemata). It defines the Information Schema and Definition Schema, providing a common set of tools to make SQL databases and objects self-describing. These tools include the SQL object identifier, structure and integrity constraints, security and authorization specifications, features and packages of ISO/IEC 9075, support of features provided by SQL-based DBMS implementations, SQL-based DBMS implementation information and sizing items, and the values supported by the DBMS implementations. This part of the standard contains both mandatory and optional features. ISO/IEC 9075-13:2016 Part 13: SQL Routines and types using the Java TM programming language (SQL/JRT). It specifies the ability to invoke static Java methods as routines from within SQL applications ('Java-in-the-database'). It also calls for the ability to use Java classes as SQL structured user-defined types. This part of the standard consists solely of optional features. ISO/IEC 9075-14:2016 Part 14: XML-Related Specifications (SQL/XML). It specifies SQL-based extensions for using XML in conjunction with SQL. The XML data type is introduced, as well as several routines, functions, and XML-to-SQL data type mappings to support manipulation and storage of XML in an SQL database. This part of the standard consists solely of optional features. ISO/IEC 9075-15:2019 Part 15: Multi-dimensional arrays (SQL/MDA). It specifies a multidimensional array type (MDarray) for SQL, along with operations on MDarrays, MDarray slices, MDarray cells, and related features. This part of the standard consists solely of optional features. Extensions to the ISO/IEC Standard ISO/IEC 9075 is complemented by ISO/IEC 13249 SQL Multimedia and Application Packages. This closely related but separate standard is developed by the same committee. It defines interfaces and packages based on SQL. The aim is a unified access to typical database applications like text, pictures, data mining or spatial data. ISO/IEC 13249-1:2016 Part 1: Framework ISO/IEC 13249-2:2003 Part 2: Full-Text ISO/IEC 13249-3:2016 Part 3: Spatial ISO/IEC 13249-5:2003 Part 5: Still image ISO/IEC 13249-6:2006 Part 6: Data mining ISO/IEC 13249-7:2013 Part 7: History ISO/IEC 13249-8:xxxx Part 8: Metadata Registry Access MRA (work in progress) Technical reports ISO/IEC 9075 is also accompanied by a series of Technical Reports, published as ISO/IEC TR 19075. These Technical Reports explain the justification for and usage of some features of SQL, giving examples where appropriate. The Technical Reports are non-normative; if there is any discrepancy from 9075, the text in 9075 holds. Currently available 19075 Technical Reports are: ISO/IEC TR 19075-1:2011 Part 1: XQuery Regular Expression Support in SQL ISO/IEC TR 19075-2:2015 Part 2: SQL Support for Time-Related Information ISO/IEC TR 19075-3:2015 Part 3: SQL Embedded in Programs using the Java programming language ISO/IEC TR 19075-4:2015 Part 4: SQL with Routines and types using the Java programming language ISO/IEC TR 19075-5:2016 Part 5: Row Pattern Recognition in SQL ISO/IEC TR 19075-6:2017 Part 6: SQL support for JavaScript Object Notation (JSON) ISO/IEC TR 19075-7:2017 Part 7: Polymorphic table functions in SQL ISO/IEC TR 19075-8:2019 Part 8: Multi-Dimensional Arrays |
threat, with oil analyst Thorbjoern Bak Jensen of Global Risk Management concluding that "they cannot stop the flow for a longer period due to the amount of U.S. hardware in the area". On 3 January 2012, Iran threatened to take action if the U.S. Navy moves an aircraft carrier back into the Persian Gulf. Iranian Army chief Ataollah Salehi said the United States had moved an aircraft carrier out of the Persian Gulf because of Iran's naval exercises, and Iran would take action if the ship returned. "Iran will not repeat its warning...the enemy's carrier has been moved to the Gulf of Oman because of our drill. I recommend and emphasize to the American carrier not to return to the Persian Gulf", he said. The U.S. Navy spokesman Commander Bill Speaks quickly responded that deployment of U.S. military assets would continue as has been the custom stating: "The U.S. Navy operates under international maritime conventions to maintain a constant state of high vigilance in order to ensure the continued, safe flow of maritime traffic in waterways critical to global commerce." While earlier statements from Iran had little effect on global oil markets, coupled with the new sanctions, these comments from Iran are driving crude futures higher, up over 4%. Pressure on prices reflect a combination of uncertainty driven further by China's recent response – reducing oil January 2012 purchases from Iran by 50% compared to those made in 2011. The U.S. led sanctions may be "beginning to bite" as Iranian currency has recently lost some 12% of its value. Further pressure on Iranian currency was added by French Foreign Minister Alain Juppé who was quoted as calling for more "strict sanctions" and urged EU countries to follow the US in freezing Iranian central bank assets and imposing an embargo on oil exports. On 7 January 2012, the British government announced that it would be sending the Type 45 destroyer to the Persian Gulf. Daring, which is the lead ship of her class is one of the "most advanced warships" in the world, and will undertake its first mission in the Persian Gulf. The British Government however have said that this move has been long-planned, as Daring will replace another Armilla patrol frigate. On 9 January 2012, Iranian Defense Minister Ahmad Vahidi denied that Iran had ever claimed that it would close the Strait of Hormuz, saying that "the Islamic Republic of Iran is the most important provider of security in the strait... if one threatens the security of the Persian Gulf, then all are threatened." The Iranian Foreign Ministry confirmed on 16 January 2012 that it has received a letter from the United States concerning the Strait of Hormuz, "via three different channels." Authorities were considering whether to reply, although the contents of the letter were not divulged. The United States had previously announced its intention to warn Iran that closing the Strait of Hormuz is a "red line" that would provoke an American response. Gen. Martin E. Dempsey, the chairman of the Joint Chiefs of Staff, said this past weekend that the United States would "take action and re-open the strait", which could be accomplished only by military means, including minesweepers, warship escorts and potentially airstrikes. Defense Secretary Leon E. Panetta told troops in Texas that the United States would not tolerate Iran's closing of the strait. Nevertheless, Iran continued to discuss the impact of shutting the Strait on world oil markets, saying that any disruption of supply would cause a shock to markets that "no country" could manage. By 23 January, a flotilla had been established by countries opposing Iran's threats to close the Hormuz Strait. These ships operated in the Persian Gulf and Arabian Sea off the coast of Iran. The flotilla included three American aircraft carriers (the , the and ) and three destroyers (, , ), seven British warships, including the destroyer and a number of Type 23 frigates (, , and ), and a French warship, the frigate La Motte-Picquet . On 24 January, tensions rose further after the European Union imposed sanctions on Iranian oil. A senior member of Iran's parliament said that the Islamic Republic would close the entry point to the Persian Gulf if new sanctions block its oil exports. "If any disruption happens regarding the sale of Iranian oil, the Strait of Hormuz will definitely be closed," Mohammad Kossari, deputy head of parliament's foreign affairs and national security committee, told the semi-official Fars News Agency. 2015 seizure of MV Maersk Tigris On 28 April 2015, IRGCN patrol boats contacted the Marshall Islands-flagged container ship Maersk Tigris, which was westbound through the strait, and directed the ship to proceed further into Iranian territorial waters, according to a spokesman for the U.S. Defense Department. When the ship's master declined, one of the Iranian craft fired shots across the bridge of Maersk Tigris. The captain complied and proceeded into Iranian waters near Larak Island. The US Navy sent aircraft and a destroyer, USS Farragut, to monitor the situation. Maersk says they have agreed to pay an Iranian company $163,000 over a dispute about 10 container boxes transported to Dubai in 2005. The court ruling allegedly ordered a fine of $3.6 million. 2018 threats of strait closure In July 2018, Iran again made threats to close the strait. Citing looming American sanctions after the U.S withdrew from the JCPOA deal earlier in the year. Iran's Revolutionary Guards reported they were ready to carry out the action if required. In August 2018, Iran test-fired a ballistic missile for the first time in 2018. According to the officials, the anti-ship Fateh-110 Mod 3 flew over 100 miles on a flight path over the Strait | not recognize any of the claims by Oman and Iran and has contested each of them. Oman has a radar site Link Quality Indicator (LQI) to monitor the TSS in the Strait of Hormuz. This site is on a small island on the peak of Musandam Governorate. Oil trade flow A 2007 report from the Center for Strategic and International Studies also stated that 17 million barrels passed out of the Persian Gulf daily, but that oil flows through the Strait accounted for roughly 40% of all world-traded oil. According to the U.S. Energy Information Administration, in 2011, an average of 14 tankers per day passed out of the Persian Gulf through the Strait carrying of crude oil. This was said to represent 35% of the world's seaborne oil shipments and 20% of oil traded worldwide. The report stated that more than 85% of these crude oil exports went to Asian markets, with Japan, India, South Korea and China the largest destinations. In 2018 alone, 21 million barrels a day were passing through the strait - this means $1.17 billion worth of oil a day, at September 2019 prices. Events Tanker War The Tanker War phase of the Iran–Iraq War started when Iraq attacked the oil terminal and oil tankers at Iran's Kharg Island in early 1984. Saddam Hussein's aim in attacking Iranian shipping was, among other things, to provoke the Iranians to retaliate with extreme measures, such as closing the Strait of Hormuz to all maritime traffic, thereby bringing American intervention. Iran limited the retaliatory attacks to Iraqi shipping, leaving the strait open. Operation Praying Mantis On 18 April 1988, the U.S. Navy waged a one-day battle against Iranian forces in and around the strait. The battle, dubbed Operation Praying Mantis by the United States, was launched in retaliation for the USS Samuel B. Roberts striking a mine laid in the channel by Iran on 14 April 1988. U.S. forces sank one frigate, one gunboat, and up to six armed speedboats, as well as seriously damaging a second frigate. Downing of Iran Air 655 On 3 July 1988, 290 people were killed when an Iran Air Airbus A300 was shot down over the strait by the United States Navy guided missile cruiser USS Vincennes (CG-49) when it was wrongly identified as a jet fighter. Collision between USS Newport News and tanker Mogamigawa On 8 January 2007, the nuclear submarine USS Newport News, traveling submerged, struck , a 300,000-ton Japanese-flagged very large crude tanker, south of the strait. There were no injuries, and no oil leaked from the tanker. Tensions in 2008 2008 U.S.–Iranian naval dispute A series of naval stand-offs between Iranian speedboats and U.S. warships in the Strait of Hormuz occurred in December 2007 and January 2008. U.S. officials accused Iran of harassing and provoking their naval vessels, but Iranian officials denied the allegations. On 14 January 2008, U.S. Navy officials appeared to contradict the Pentagon version of the 16 January event, in which the Pentagon had reported that U.S. vessels had almost fired on approaching Iranian boats. The Navy's regional commander, Vice Admiral Kevin Cosgriff, said the Iranians had "neither anti-ship missiles nor torpedoes" and he "wouldn't characterize the posture of the US 5th Fleet as afraid of these small boats". Iranian defence policy On 29 June 2008, the commander of Iran's Revolutionary Guard, Mohammad Ali Jafari, said that if either Israel or the United States attacked Iran, it would seal off the Strait of Hormuz to wreak havoc in the oil markets. This followed more ambiguous threats from Iran's oil minister and other government officials that an attack on Iran would result in turmoil in the world's oil supply. Vice Admiral Kevin Cosgriff, commander of the U.S. 5th Fleet stationed in Bahrain across the Persian Gulf from Iran, warned that such Iranian action would be considered an act of war, and the U.S. would not allow Iran to hold hostage nearly a third of the world's oil supply. On 8 July 2008, Ali Shirazi, a mid-level clerical aide to Iran's Supreme Leader Ayatollah Ali Khamenei, was quoted by the student news agency ISNA as telling the Revolutionary Guards, "The Zionist regime is pressuring White House officials to attack Iran. If they commit such a stupidity, Tel Aviv and U.S. shipping in the Persian Gulf will be Iran's first targets and they will be burned." Naval activity in 2008 In the last week of July 2008, in the Operation Brimstone, dozens of U.S. and foreign naval ships came to undergo joint exercises for possible military activity in the shallow waters off the coast of Iran. As of 11 August 2008, more than 40 U.S. and allied ships reportedly were en route to the Strait of Hormuz. One U.S. carrier battle group from Japan would complement the two which are already in the Persian Gulf, for a total of five battle groups, not including the submarines. Collision between USS Hartford and USS New Orleans On 20 March 2009, United States Navy collided with the in the strait. The collision, which slightly injured 15 sailors aboard Hartford, ruptured a fuel tank aboard New Orleans, spilling of marine diesel fuel. U.S.–Iran tensions in 2011–2012 On 27 December 2011, Iranian Vice President Mohammad-Reza Rahimi threatened to cut off oil supply from the Strait of Hormuz should economic sanctions limit, or cut off, Iranian oil exports. A U.S. Fifth Fleet spokeswoman said in response that the Fleet was "always ready to counter malevolent actions", whilst Admiral Habibollah Sayyari of the Islamic Republic of Iran Navy claimed that cutting off oil shipments would be "easy". Despite an initial 2% rise in oil prices, oil markets ultimately did not react significantly to the Iranian threat, with oil analyst Thorbjoern Bak Jensen of Global Risk Management concluding that "they cannot stop the flow for a longer period due to the amount of U.S. hardware in the area". On 3 January 2012, Iran threatened to take action if the U.S. Navy moves an aircraft carrier back into the Persian Gulf. Iranian Army chief Ataollah Salehi said the United States had moved an aircraft carrier out of the Persian Gulf because of Iran's naval exercises, and Iran would take action if the ship returned. "Iran will not repeat its warning...the enemy's carrier has been moved to the Gulf of Oman because of our drill. I recommend and emphasize to |
Spitzer's proposal called for a large telescope that would not be hindered by Earth's atmosphere. After lobbying in the 1960s and 70s for such a system to be built, Spitzer's vision ultimately materialized into the Hubble Space Telescope, which was launched on April 24, 1990 by the Space Shuttle Discovery (STS-31). The first operational space telescopes were the American Orbiting Astronomical Observatory, OAO-2 launched in 1968, and the Soviet Orion 1 ultraviolet telescope aboard space station Salyut 1 in 1971. Advantages Performing astronomy from ground-based observatories on Earth is limited by the filtering and distortion of electromagnetic radiation (scintillation or twinkling) due to the atmosphere. A telescope orbiting Earth outside the atmosphere is subject neither to twinkling nor to light pollution from artificial light sources on Earth. As a result, the angular resolution of space telescopes is often much higher than a ground-based telescope with a similar aperture. Many larger terrestrial telescopes, however, reduce atmospheric effects with adaptive optics. Space-based astronomy is more important for frequency ranges which are outside the optical window and the radio window, the only two wavelength ranges of the electromagnetic spectrum that are not severely attenuated by the atmosphere. For example, X-ray astronomy is nearly impossible when done from Earth, and has reached its current importance in astronomy only due to orbiting X-ray telescopes such as the Chandra observatory and the XMM-Newton observatory. Infrared and ultraviolet are also largely blocked. Disadvantages Space telescopes are much more expensive to build than ground-based telescopes. Due to their location, space telescopes are also extremely difficult to maintain. The Hubble Space Telescope was serviced by the Space Shuttle, but most space telescopes cannot be serviced at all. Future of space observatories Satellites have been launched and operated by NASA, ISRO, ESA, CNSA, JAXA and the Soviet space program | the entire sky (astronomical survey), and satellites which focus on selected astronomical objects or parts of the sky and beyond. Space telescopes are distinct from Earth imaging satellites, which point toward Earth for satellite imaging, applied for weather analysis, espionage, and other types of information gathering. History Wilhelm Beer and Johann Heinrich Mädler in 1837 discussed the advantages of an observatory on the Moon. In 1946, American theoretical astrophysicist Lyman Spitzer proposed a telescope in space. Spitzer's proposal called for a large telescope that would not be hindered by Earth's atmosphere. After lobbying in the 1960s and 70s for such a system to be built, Spitzer's vision ultimately materialized into the Hubble Space Telescope, which was launched on April 24, 1990 by the Space Shuttle Discovery (STS-31). The first operational space telescopes were the American Orbiting Astronomical Observatory, OAO-2 launched in 1968, and the Soviet Orion 1 ultraviolet telescope aboard space station Salyut 1 in 1971. Advantages Performing astronomy from ground-based observatories on Earth is limited by the filtering and distortion of electromagnetic radiation (scintillation or twinkling) due to the atmosphere. A telescope orbiting Earth outside the atmosphere is subject neither to twinkling nor to light pollution from artificial light sources on Earth. As a result, the angular resolution of space telescopes is often much higher than a ground-based telescope with |
Henry: "I wear it for a memorable honour; for I am Welsh, you know, good countryman". Connections to Glastonbury Rhigyfarch counted Glastonbury Abbey among the churches David founded. Around forty years later William of Malmesbury, believing the Abbey older, said that David visited Glastonbury only to rededicate the Abbey and to donate a travelling altar including a great sapphire. He had had a vision of Jesus who said that "the church had been dedicated long ago by Himself in honour of His Mother, and it was not seemly that it should be re-dedicated by human hands". So David instead commissioned an extension to be built to the abbey, east of the Old Church. (The dimensions of this extension given by William were verified archaeologically in 1921.) One manuscript indicates that a sapphire altar was among the items Henry VIII of England confiscated from the abbey during the Dissolution of the Monasteries a thousand years later. Death Though the exact date of his death is not certain, tradition holds that it was on 1 March, which is the date now marked as Saint David's Day. The two most common years given for his death are 601 and 589. The monastery is said to have been "filled with angels as Christ received his soul". His last words to his followers were in a sermon on the previous Sunday. The Welsh Life of St David gives these as, "Arglwyddi, brodyr, a chwiorydd, Byddwch lawen a chadwch eich ffyd a'ch credd, a gwnewch y petheu bychain a glywsoch ac y welsoch gennyf i. A mwynhau a gerdaf y fford yd aeth an tadeu idi", which translates as, "Lords, brothers and sisters, Be joyful, and keep your faith and your creed, and do the little things that you have seen me do and heard about. And as for me, I will walk the path that our fathers have trod before us." "Do ye the little things in life" ("Gwnewch y pethau bychain mewn bywyd") is today a very well known phrase in Welsh. The same passage states that he died on a Tuesday, from which attempts have been made to calculate the year of his death. David was buried at St David's Cathedral at St Davids, Pembrokeshire, where his shrine was a popular place of pilgrimage throughout the Middle Ages. During the 10th and 11th centuries the Cathedral was regularly raided by Vikings, who removed the shrine from the church and stripped off the precious metal adornments. In 1275 a new shrine was constructed, the ruined base of which remains to this day (see photo), which was originally surmounted by an ornamental wooden canopy with murals of David, Patrick and Denis. The relics of David and Justinian of Ramsey Island were kept in a portable casket on the stone base of the shrine. It was at this shrine that Edward I came to pray in 1284. During the reformation Bishop Barlow (1536–48), a staunch Protestant, stripped the shrine of its jewels and confiscated the relics of David and Justinian. Veneration David was officially recognised at the Holy See by Pope Callixtus II in 1120, thanks to the work of Bernard, Bishop of St David's. Music for his Liturgy of the Hours has been edited by O. T. Edwards in Matins, Lauds and Vespers for St David's Day: the Medieval Office of the Welsh Patron Saint in National Library of Wales MS 20541 E (Cambridge, 1990). David was also canonized by the Eastern Orthodox Church at an unknown date. Over 50 churches in South Wales were dedicated to him in pre-Reformation days. In the 2004 edition of the Roman Martyrology, David is listed under 1 March with the Latin name Dávus. He is recognised as bishop of Menevia in | leek upon Saint Tavy's day". King Henry: "I wear it for a memorable honour; for I am Welsh, you know, good countryman". Connections to Glastonbury Rhigyfarch counted Glastonbury Abbey among the churches David founded. Around forty years later William of Malmesbury, believing the Abbey older, said that David visited Glastonbury only to rededicate the Abbey and to donate a travelling altar including a great sapphire. He had had a vision of Jesus who said that "the church had been dedicated long ago by Himself in honour of His Mother, and it was not seemly that it should be re-dedicated by human hands". So David instead commissioned an extension to be built to the abbey, east of the Old Church. (The dimensions of this extension given by William were verified archaeologically in 1921.) One manuscript indicates that a sapphire altar was among the items Henry VIII of England confiscated from the abbey during the Dissolution of the Monasteries a thousand years later. Death Though the exact date of his death is not certain, tradition holds that it was on 1 March, which is the date now marked as Saint David's Day. The two most common years given for his death are 601 and 589. The monastery is said to have been "filled with angels as Christ received his soul". His last words to his followers were in a sermon on the previous Sunday. The Welsh Life of St David gives these as, "Arglwyddi, brodyr, a chwiorydd, Byddwch lawen a chadwch eich ffyd a'ch credd, a gwnewch y petheu bychain a glywsoch ac y welsoch gennyf i. A mwynhau a gerdaf y fford yd aeth an tadeu idi", which translates as, "Lords, brothers and sisters, Be joyful, and keep your faith and your creed, and do the little things that you have seen me do and heard about. And as for me, I will walk the path that our fathers have trod before us." "Do ye the little things in life" ("Gwnewch y pethau bychain mewn bywyd") is today a very well known phrase in Welsh. The same passage states that he died on a Tuesday, from which attempts have been made to calculate the year of his death. David was buried at St David's Cathedral at St Davids, Pembrokeshire, where his shrine was a popular place of pilgrimage throughout the Middle Ages. During the 10th and 11th centuries the Cathedral was regularly raided by Vikings, who removed the shrine from the church and stripped off the precious metal adornments. In 1275 a new shrine was constructed, the ruined base of which remains to this day (see photo), which was originally surmounted by an ornamental wooden canopy with murals of David, Patrick and Denis. The relics of David and Justinian of Ramsey Island were kept in a portable casket on the stone base of the shrine. It was at this shrine that Edward I came to pray in 1284. During the reformation Bishop Barlow (1536–48), a staunch Protestant, stripped the shrine of its jewels and confiscated the relics of David and Justinian. Veneration David was officially recognised at the Holy See by Pope Callixtus II in 1120, thanks to the work of Bernard, Bishop of St David's. Music |
in chains, thus priests of Church of St. George chain the sick especially the mentally ill to a chain for overnight or longer for healing. This is sought after by both Muslims and Christians. According to Elizabeth Anne Finn's Home in the Holy land (1866): The mosque of Nabi Jurjis, which was restored by Timur in the 14th century, was located in Mosul and supposedly contained the tomb of George. It was however destroyed in July 2014 by the Islamic State of Iraq and the Levant, who also destroyed the Mosque of the Prophet Sheeth (Seth) and the Mosque of the Prophet Younis (Jonah). The militants claim such mosques have become places for apostasy instead of prayer. George or Hazrat Jurjays was the patron saint of Mosul. Along with Theodosius, he was revered by both Christian and Muslim communities of Jazira and Anatolia. The wall paintings of Kırk Dam Altı Kilise at Belisırma dedicated to him are dated between 1282 and 1304. These paintings depict him as a mounted knight appearing between donors including a Georgian lady called Thamar and her husband, the Emir and Consul Basil, while the Seljuk Sultan Mesud II and Byzantine Emperor Androncius II are also named in the inscriptions. A shrine attributed to prophet George can be found in Diyarbakir, Turkey. Evliya Celebi states in his Seyahatname that he visited the tombs of prophet Jonah and prophet George in the city. Feast days In the General Roman Calendar, the feast of George is on 23 April. In the Tridentine Calendar of 1568, it was given the rank of "Semidouble". In Pope Pius XII's 1955 calendar this rank was reduced to "Simple", and in Pope John XXIII's 1960 calendar to a "Commemoration". Since Pope Paul VI's 1969 revision, it appears as an "optional memorial". In some countries such as England, the rank is higher – it is a Solemnity (Roman Catholic) or Feast (Church of England): if it falls between Palm Sunday and the Second Sunday of Easter inclusive, it is transferred to the Monday after the Second Sunday of Easter. George is very much honoured by the Eastern Orthodox Church, wherein he is referred to as a "Great Martyr", and in Oriental Orthodoxy overall. His major feast day is on 23 April (Julian calendar 23 April currently corresponds to Gregorian calendar 6 May). If, however, the feast occurs before Easter, it is celebrated on Easter Monday, instead. The Russian Orthodox Church also celebrates two additional feasts in honour of George. One is on 3 November, commemorating the consecration of a cathedral dedicated to him in Lydda during the reign of Constantine the Great (305–37). When the church was consecrated, the relics of George were transferred there. The other feast is on 26 November for a church dedicated to him in Kiev, circa 1054. In Bulgaria, George's day () is celebrated on 6 May, when it is customary to slaughter and roast a lamb. George's day is also a public holiday. In Serbia and Bosnia and Herzegovina, the Serbian Orthodox Church refers to George as Sveti Djordje (Свети Ђорђе) or Sveti Georgije (Свети Георгије). George's day (Đurđevdan) is celebrated on 6 May, and is a common slava (patron saint day) among ethnic Serbs. In Egypt, the Coptic Orthodox Church of Alexandria refers to George () as the "Prince of Martyrs" and celebrates his martyrdom on the 23rd of Paremhat of the Coptic calendar, equivalent to 1 May. The Copts also celebrate the consecration of the first church dedicated to him on the seventh of the month of Hatour of the Coptic calendar usually equivalent to 17 November. In India, the Syro-Malabar Catholic Church, one of the oriental catholic churches (Eastern Catholic Churches), and Malankara Orthodox Church venerate George. The main pilgrim centers of the saint in India are at Aruvithura and Puthuppally in Kottayam District, Edathua in Alappuzha district, and Edappally in Ernakulam district of the southern state of Kerala. The saint is commemorated each year from 27 April to 14 May at Edathua. On 27 April after the flag hoisting ceremony by the parish priest, the statue of the saint is taken from one of the altars and placed at the extension of the church to be venerated by devotees till 14 May. The main feast day is 7 May, when the statue of the saint along with other saints is taken in procession around the church. Intercession to George of Edathua is believed to be efficacious in repelling snakes and in curing mental ailments. The sacred relics of George were brought to Antioch from Mardin in 900 and were taken to Kerala, India, from Antioch in 1912 by Mar Dionysius of Vattasseril and kept in the Orthodox seminary at Kundara, Kerala. H.H. Mathews II Catholicos had given the relics to St. George churches at Puthupally, Kottayam District, and Chandanappally, Pathanamthitta district. George is remembered in the Church of England with a Festival on 23 April. Patronages George is a highly celebrated saint in both the Western and Eastern Christian churches, and many Patronages of Saint George exist throughout the world. George is the patron saint of England. His cross forms the national flag of England, and features within the Union Flag of the United Kingdom and other national flags containing the Union Flag, such as those of Australia and New Zealand. By the 14th century, the saint had been declared both the patron saint and the protector of the royal family. George is the patron saint of Ethiopia. He is also the patron saint of the Ethiopian Orthodox Church; George slaying the dragon is one of the most frequently used subjects of icons in the church. The country of Georgia, where devotions to the saint date back to the fourth century, is not technically named after the saint, but is a well-attested back-formation of the English name. However, many towns and cities around the world are. George is one of the patron saints of Georgia. Exactly 365 Orthodox churches in Georgia are named after George according to the number of days in a year. According to legend, George was cut into 365 pieces after he fell in battle and every single piece was spread throughout the entire country. George is also one of the patron saints of the Mediterranean islands of Malta and Gozo. In a battle between the Maltese and the Moors, George was alleged to have been seen with Saint Paul and Saint Agata, protecting the Maltese. George is the protector of the island of Gozo and the patron of Gozo's largest city, Victoria. The St. George's Basilica in Victoria is dedicated to him. Devotions to George in Portugal date back to the 12th century. Nuno Álvares Pereira attributed the victory of the Portuguese in the battle of Aljubarrota in 1385 to George. During the reign of John I of Portugal (1357–1433), George became the patron saint of Portugal and the King ordered that the saint's image on the horse be carried in the Corpus Christi procession. The flag of George (white with red cross) was also carried by the Portuguese troops and hoisted in the fortresses, during the 15th century. "Portugal and Saint George" became the battle cry of the Portuguese troops, being still today the battle cry of the Portuguese Army, with simply "Saint George" being the battle cry of the Portuguese Navy. Devotions to Saint George in Brazil was influenced by the Portuguese colonization. George is the unofficial patron saint of the city of Rio de Janeiro (title officially attributed to Saint Sebastian) and of the city of São Jorge dos Ilhéus (Saint George of Ilhéus). Additionally, George is the patron saint of Scouts and of the Cavalry of the Brazilian Army. In May 2019, he was made official as the patron saint of the State of Rio de Janeiro, next to Saint Sebastian. George is also revered in several Afro-Brazilian religions, such as Umbanda, where it is syncretized in the form of Ogum. However, the connection of George with the Moon is purely Brazilian, with a strong influence of African culture, and in no way related to the European saint. Tradition says that the spots at the Moon's surface represent the miraculous saint, his horse and his sword slaying the dragon and ready to defend those who seek his help. George, is also the patron saint of the region of Aragon, in Spain, where his feast day is celebrated on 23 April and is known as "Aragon Day", or 'Día de Aragón''' in Spanish. He became the patron saint of the former Kingdom of Aragon and Crown of Aragon when King Pedro I of Aragon won the Battle of Alcoraz in 1096. Legend has it that victory eventually fell to the Christian armies when George appeared to them on the battlefield, helping them secure the reconquest of the city of Huesca which had been under the Muslim control of the Taifa of Zaragoza. The battle, which had begun two years earlier in 1094, was long and arduous, and had also taken the life of King Pedro's own father, King Sancho Ramirez. With the Aragonese spirits flagging, it is said that George descending from heaven on his charger and bearing a dark red cross, appeared at the head of the Christian cavalry leading the knights into battle. Interpreting this as a sign of protection from God, the Christian militia returned emboldened to the battle field, more energized than ever, convinced theirs was the banner of the one true faith. Defeated, the moors rapidly abandoned the battlefield. After two years of being locked down under siege, Huesca was liberated and King Pedro made his triumphal entry into the city. To celebrate this victory, the cross of St. George was adopted as the personal coat of arms of Huesca and Aragon, in honour of their saviour. After the taking of Huesca, King Pedro aided the military leader and nobleman, Rodrigo Díaz de Vivar, otherwise known as El Cid, with a coalition army from Aragon in the long reconquest of the Kingdom of Valencia. Tales of King Pedro's success at Huesca and in leading his expedition of armies with El Cid against the Moors, under the auspices of George on his standard, spread quickly throughout the realm and beyond the Crown of Aragon, and Christian armies throughout Europe quickly began adopting George as their protector and patron, during all subsequent Crusades to the Holy Lands. By 1117, the military order of Templars adopted the Cross of St. George as a simple, unifying sign for international Christian militia embroidered on the left hand side of their tunics, placed above the heart. The Cross of St. George, also known in Aragon as The Cross of Alcoraz, continues to emblazon the flags of all of Aragon's provinces. The association of St. George with chivalry and noblemen in Aragon continued through the ages. Indeed, even the author Miguel de Cervantes, in his book on the adventures of Don Quixote, also mentions the jousting events that took place at the festival of St. George in Zaragoza in Aragon where one could gain international renown in winning a joust against any of the knights of Aragon. In Valencia, Catalonia, the Balearics, Malta, Sicily and Sardinia, the origins of the veneration of St. George go back to their shared history as territories under the Crown of Aragon, thereby sharing the same legend. One of the highest civil distinctions awarded in Catalonia is the St. George's Cross (Creu de Sant Jordi). The Sant Jordi Awards have been awarded in Barcelona since 1957. Saint George (Sant Jordi in Catalan) is also the patron saint of Catalonia. His cross appears in many buildings and local flags, including the flag of Barcelona, the Catalan capital. A Catalan variation to the traditional legend places George's life story as having occurred in the town of Montblanc, near Tarragona. In 1469 the Order of St. George (Habsburg-Lorraine) was founded in Rome by Emperor Friedrich III. of Habsburg in the presence of Pope Paul II in honor of Saint George. The order was continued and promoted by his son, Emperor Maximilian of Habsburg. The later history of the order was eventful, in particular the order was dissolved by Nazi Germany. Only after the fall of the Iron Curtain and the collapse of communism in Central and Eastern Europe was the order reactivated as a European association in association with Saint George by the Habsburg family. Arms and flag It became fashionable in the 15th century, with the full development of classical heraldry, to provide attributed arms to saints and other historical characters from the pre-heraldic ages. The widespread attribution to George of the red cross on a white field in Western art – "Saint George's Cross" – probably first arose in Genoa, which had adopted this image for their flag and George as their patron saint in the 12th century. A vexillum beati Georgii is mentioned in the Genovese annals for the year 1198, referring to a red flag with a depiction of George and the dragon. An illumination of this flag is shown in the annals for the year 1227. The Genoese flag with the red cross was used alongside this "George's flag", from at least 1218, and was known as the insignia cruxata comunis Janue ("cross ensign of the commune of Genoa"). The flag showing the saint himself was the city's principal war flag, but the flag showing the plain cross was used alongside it in the 1240s. In 1348 Edward III of England chose George as the patron saint of his Order of the Garter, and also took to using a red-on-white cross in the hoist of his Royal Standard. The term "Saint George's cross" was at first associated with any plain Greek cross touching the edges of the field (not necessarily red on white). Thomas Fuller in 1647 spoke of "the plain or St George's cross" as "the mother of all the others" (that is, the other heraldic crosses). Iconography George is most commonly depicted in early icons, mosaics, and frescos wearing armour contemporary with the depiction, executed in gilding and silver colour, intended to identify him as a Roman soldier. Particularly after the Fall of Constantinople and George's association with the crusades, he is often portrayed mounted upon a white horse. Thus, a 2003 Vatican stamp (issued on the anniversary of the Saint's death) depicts an armoured George atop a white horse, killing the dragon. Eastern Orthodox iconography also permits George to ride a black horse, as in a Russian icon in the British museum collection. In the south Lebanese village of Mieh Mieh, the Saint George Church for Melkite Catholics commissioned for its 75th jubilee in 2012 (under the guidance of Mgr Sassine Gregoire) the only icons in the world portraying the whole life of George, as well as the scenes of his torture and martyrdom (drawn in eastern iconographic style). George may also be portrayed with Saint Demetrius, another early soldier saint. When the two saintly warriors are together and mounted upon horses, they may resemble earthly manifestations of the archangels Michael and Gabriel. Eastern traditions distinguish the two as George rides a white horse and Demetrius a red horse (the red pigment may appear black if it has bituminized). George can also be identified by his spearing a dragon, whereas Demetrius may be spearing a human figure, representing Maximian. Gallery Eastern Western See also Saint George's Day Saint Andrew "St. George and the Dragon", a 17th-century ballad comparing the myth of George to that of other heroes Dragon Hill, Uffington, English hill named due to a legend that George slew the dragon there Fort St George, an English-built fort in Chennai, India "Georgslied", 9th-century Old High German poem about the life of George "Georgslegende", 13th-century Middle High German poem about the martyrdom of George Ederlezi, song and Romani name for the Bulgarian, Macedonian and Serbian Feast of Saint George Knights of St George Uastyrdzhi, Ossetian name for George Tetri Giorgi, Georgian name for George Moors and Christians of Alcoy, an international historical festival dedicated to George in Alcoy (Alicante), Spain The Magic Sword, a 1962 film loosely based on the legend of St George and the Dragon Patrick Woodroffe, author of several poems about St George collated in a book called Hallelujah Anyway St George's Church, churches dedicated to St George St George's School, schools dedicated to St George St George's College, colleges dedicated to St George St George's Castle, castles dedicated to St George St George's Hospital, hospitals dedicated to St | Al-Tha`labi states that he was from Palestine and lived in the times of some disciples of Jesus. He was killed many times by the king of Mosul, and resurrected each time. When the king tried to starve him, he touched a piece of dry wood brought by a woman and turned it green, with varieties of fruits and vegetables growing from it. After his fourth death, the city was burnt along with him. Ibn al-Athir's account of one of his deaths is parallel to the crucifixion of Jesus, stating, "When he died, God sent stormy winds and thunder and lightning and dark clouds, so that darkness fell between heaven and earth, and people were in great wonderment." The account adds that the darkness was lifted after his resurrection. Veneration History A titular church built in Lydda during the reign of Constantine the Great (reigned 306–337) was consecrated to "a man of the highest distinction", according to the church history of Eusebius; the name of the titulus "patron" was not disclosed, but later he was asserted to have been George. The veneration of George spread from Syria Palaestina through Lebanon to the rest of the Byzantine Empire – though the martyr is not mentioned in the Syriac Breviarium – and the region east of the Black Sea. By the 5th century, the veneration of George had reached the Christian Western Roman Empire, as well: in 494, George was canonized as a saint by Pope Gelasius I, among those "whose names are justly reverenced among men, but whose acts are known only to [God]." The early cult of the saint was localized in Diospolis (Lydda), in Palestine. The first description of Lydda as a pilgrimage site where George's relics were venerated is De Situ Terrae Sanctae by the archdeacon Theodosius, written between 518 and 530. By the end of the 6th century, the center of his veneration appears to have shifted to Cappadocia. The Life of Saint Theodore of Sykeon, written in the 7th century, mentions the veneration of the relics of the saint in Cappadocia. By the time of the early Muslim conquests of the mostly Christian and Zoroastrian Middle East, a basilica in Lydda dedicated to George existed. A new church was erected in 1872 and is still standing, where the feast of the translation of the relics of Saint George to that location is celebrated on November 3 each year. In England, he was mentioned among the martyrs by the 8th-century monk Bede. The Georgslied is an adaptation of his legend in Old High German, composed in the late 9th century. The earliest dedication to the saint in England is a church at Fordington, Dorset, that is mentioned in the will of Alfred the Great. George did not rise to the position of "patron saint" of England, however, until the 14th century, and he was still obscured by Edward the Confessor, the traditional patron saint of England, until in 1552 during the reign of Edward VI all saints' banners other than George's were abolished in the English Reformation. Belief in an apparition of George heartened the Franks at the Battle of Antioch in 1098, and a similar appearance occurred the following year at Jerusalem. The chivalric military Order of Sant Jordi d'Alfama was established by king Peter the Catholic from the Crown of Aragon in 1201, Republic of Genoa, Kingdom of Hungary (1326), and by Frederick III, Holy Roman Emperor. Edward III of England put his Order of the Garter under the banner of George, probably in 1348. The chronicler Jean Froissart observed the English invoking George as a battle cry on several occasions during the Hundred Years' War. In his rise as a national saint, George was aided by the very fact that the saint had no legendary connection with England, and no specifically localized shrine, as that of Thomas Becket at Canterbury: "Consequently, numerous shrines were established during the late fifteenth century," Muriel C. McClendon has written, "and his did not become closely identified with a particular occupation or with the cure of a specific malady." In the wake of the Crusades, George became a model of chivalry in works of literature, including medieval romances. In the 13th century, Jacobus de Voragine, Archbishop of Genoa, compiled the Legenda Sanctorum, (Readings of the Saints) also known as Legenda Aurea (the Golden Legend). Its 177 chapters (182 in some editions) include the story of George, among many others. After the invention of the printing press, the book became a bestseller. The establishment of George as a popular saint and protective giant in the West, that had captured the medieval imagination, was codified by the official elevation of his feast to a festum duplex at a church council in 1415, on the date that had become associated with his martyrdom, 23 April. There was wide latitude from community to community in celebration of the day across late medieval and early modern England, and no uniform "national" celebration elsewhere, a token of the popular and vernacular nature of George's cultus and its local horizons, supported by a local guild or confraternity under George's protection, or the dedication of a local church. When the English Reformation severely curtailed the saints' days in the calendar, Saint George's Day was among the holidays that continued to be observed. In April 2019, the parish church of São Jorge, in São Jorge, Madeira Island, Portugal, solemnly received the relics of George, patron saint of the parish. During the celebrations the 504th anniversary of its foundation. the relics were brought by the new Bishop of Funchal, D. Nuno Brás. Veneration in the Levant George is renowned throughout the Middle East, as both saint and prophet. His veneration by Christians and Muslims lies in his composite personality combining several Biblical, Quranic and other ancient mythical heroes. William Dalrymple, who reviewed the literature in 1999, tells us that J. E. Hanauer in his 1907 book Folklore of the Holy Land: Muslim, Christian and Jewish "mentioned a shrine in the village of Beit Jala, beside Bethlehem, which at the time was frequented by Christians who regarded it as the birthplace of George and some Jews who regarded it as the burial place of the Prophet Elias. According to Hanauer, in his day the monastery was "a sort of madhouse. Deranged persons of all the three faiths are taken thither and chained in the court of the chapel, where they are kept for forty days on bread and water, the Eastern Orthodox priest at the head of the establishment now and then reading the Gospel over them, or administering a whipping as the case demands." In the 1920s, according to Tawfiq Canaan's Mohammedan Saints and Sanctuaries in Palestine, nothing seemed to have changed, and all three communities were still visiting the shrine and praying together." Dalrymple himself visited the place in 1995. "I asked around in the Christian Quarter in Jerusalem, and discovered that the place was very much alive. With all the greatest shrines in the Christian world to choose from, it seemed that when the local Arab Christians had a problem – an illness, or something more complicated – they preferred to seek the intercession of George in his grubby little shrine at Beit Jala rather than praying at the Church of the Holy Sepulchre in Jerusalem or the Church of the Nativity in Bethlehem." He asked the priest at the shrine "Do you get many Muslims coming here?" The priest replied, "We get hundreds! Almost as many as the Christian pilgrims. Often, when I come in here, I find Muslims all over the floor, in the aisles, up and down." The Encyclopædia Britannica quotes G. A. Smith in his Historic Geography of the Holy Land, p. 164, saying: "The Mahommedans who usually identify St. George with the prophet Elijah, at Lydda confound his legend with one about Christ himself. Their name for Antichrist is Dajjal, and they have a tradition that Jesus will slay Antichrist by the gate of Lydda. The notion sprang from an ancient bas-relief of George and the Dragon on the Lydda church. But Dajjal may be derived, by a very common confusion between n and l, from Dagon, whose name two neighbouring villages bear to this day, while one of the gates of Lydda used to be called the Gate of Dagon." Veneration in the Muslim world George is described as a prophetic figure in Islamic sources. George is venerated by some Christians and Muslims because of his composite personality combining several Biblical, Quranic and other ancient mythical heroes. In some sources he is identified with Elijah or Mar Elis, George or Mar Jirjus and in others as al-Khidr. The last epithet meaning the "green prophet", is common to Christian, Muslim, and Druze folk piety. Samuel Curtiss who visited an artificial cave dedicated to him where he is identified with Elijah, reports that childless Muslim women used to visit the shrine to pray for children. Per tradition, he was brought to his place of martyrdom in chains, thus priests of Church of St. George chain the sick especially the mentally ill to a chain for overnight or longer for healing. This is sought after by both Muslims and Christians. According to Elizabeth Anne Finn's Home in the Holy land (1866): The mosque of Nabi Jurjis, which was restored by Timur in the 14th century, was located in Mosul |
Castello (soccer), Canadian soccer player Sebastian Castellio | may refer: Sebastian Castello (soccer), Canadian soccer |
a Liberal Arts college in Westchester County, New York. Sarah Lawrence may also refer to: Sarah Lawrence | 1986), Australian actress and TV personality Sarah Lawrence, British actress best known for playing Darlene Taylor in soap opera Hollyoaks See also Sara Lawrence (disambiguation) Sara Lawrence-Lightfoot (born |
represents the official defining statement of World Humanism. All member organisations of the International Humanist and Ethical Union are required by bylaw 5.1 to accept the Minimum Statement on Humanism: Humanism is a democratic and ethical life stance, which affirms that human beings have the right and responsibility to give meaning and shape to their own lives. It stands for the building of a more humane society through an ethic based on human and other natural values in the spirit of reason and free inquiry through human capabilities. It is not theistic, and it does not accept supernatural views of reality. To promote and unify "Humanist" identity, prominent members of the IHEU have endorsed the following statements on Humanist identity: All Humanists, nationally and internationally, should always use the one word Humanism as the name of Humanism: no added adjective, and the initial letter capital (by life stance orthography); All Humanists, nationally and internationally, should use a clear, recognizable and uniform symbol on their publications and elsewhere: our Humanist symbol the "Happy Human"; All Humanists, nationally and internationally, should seek to establish recognition of the fact that Humanism is a life stance. Council for Secular Humanism According to the Council for Secular Humanism, within the United States, the term "secular humanism" describes a world view with the following elements and principles: Need to test beliefs – A conviction that dogmas, ideologies and traditions, whether religious, political or social, must be weighed and tested by each individual and not simply accepted by faith. Reason, evidence, scientific method – A commitment to the use of critical reason, factual evidence and scientific method of inquiry in seeking solutions to human problems and answers to important human questions. Fulfillment, growth, creativity – A primary concern with fulfillment, growth and creativity for both the individual and humankind in general. Search for truth – A constant search for objective truth, with the understanding that new knowledge and experience constantly alter our imperfect perception of it. This life – A concern for this life (as opposed to an afterlife) and a commitment to making it meaningful through better understanding of ourselves, our history, our intellectual and artistic achievements, and the outlooks of those who differ from us. Ethics – A search for viable individual, social and political principles of ethical conduct, judging them on their ability to enhance human well-being and individual responsibility. Justice and fairness – an interest in securing justice and fairness in society and in eliminating discrimination and intolerance. Building a better world – A conviction that with reason, an open exchange of ideas, good will, and tolerance, progress can be made in building a better world for ourselves and our children. A Secular Humanist Declaration was issued in 1980 by the Council for Secular Humanism's predecessor, CODESH. It lays out ten ideals: Free inquiry as opposed to censorship and imposition of belief; separation of church and state; the ideal of freedom from religious control and from jingoistic government control; ethics based on critical intelligence rather than that deduced from religious belief; moral education; religious skepticism; reason; a belief in science and technology as the best way of understanding the world; evolution; and education as the essential method of building humane, free, and democratic societies. American Humanist Association A general outline of Humanism is also set out in the Humanist Manifesto prepared by the American Humanist Association. Ethics and relationship to religious belief In the 20th and 21st centuries, members of Humanist organizations have disagreed as to whether Humanism is a religion. They categorize themselves in one of three ways. Religious (or ethical) humanism, in the tradition of the earliest humanist organizations in the UK and US, attempts to fulfil the traditional social role of religion. Contemporary use of the word "religious" did not have the same connotations as its today. Secular humanism considers all forms of religion, including religious humanism, to be superseded. However, distinctions between "ethical" and "secular" humanists are for the most part historical, and practically meaningless in the present day or to contemporary individuals who identify with humanism. Since the mid-20th century, the development of new concepts such as the "life stance" (which encompasses both humanist views and religious outlooks) has defused this conflict. Most humanist organisations identify with "humanism" without a pre-modifier (such a "secular" or "ethical") and assert humanism as a non-religious philosophy or approach to life. Generally speaking, all humanists, including religious humanists, reject deference to supernatural beliefs; promote the practical, methodological naturalism of science; and largely endorse the stance of metaphysical naturalism. The result is an approach to issues in a secular way. Humanism addresses ethics without reference to the supernatural as well, attesting that ethics is a human enterprise (see naturalistic ethics). Accounts of humanism are also careful not to treat secular humanism analogously with religions, which implies a community who strictly attempt to adhere to the same obligations or beliefs. Holding a secular humanist philosophy does not prescribe a specific theory of morality or code of ethics. As stated by the Council for Secular Humanism, Secular humanists affirm that with the present state of scientific knowledge, dogmatic belief in an absolutist moral or ethical system (e.g. Kantian, Islamic, Christian) is unreasonable. However, it affirms that individuals engaging in rational moral/ethical deliberations can discover some universal "objective standards". Many humanists adopt principles of the Golden Rule. Some believe that universal moral standards are required for the proper functioning of society. However, they believe such necessary universality can and should be achieved by developing a richer notion of morality through reason, experience and scientific inquiry rather than through faith in a supernatural realm or source. Humanists Andrew Copson and Alice Roberts, in their casual introduction to humanism The Little Book of Humanism, propose that a distinctive aspect of humanist morality is its recognition that every moral situation is in some sense unique, and so potentially calls for different approach than the last (i.e. the ability to vacillate situationally between consequentialism and virtue ethics). In the book, they quote from Kristen Bell's advocacy of moral particularism as developed by Jonathan Dancy. Humanism is compatible with atheism, and by definition usually entails at least a form of weak or agnostic atheism, and agnosticism, but being atheist or agnostic does not automatically make one a humanist. Nevertheless, humanism is diametrically opposed to state atheism. According to Paul Kurtz, considered by some to be the founder of the American secular humanist movement, one of the differences between Marxist–Leninist atheists and humanists is the latter's commitment to "human freedom and democracy" while stating that the militant atheism of the Soviet Union consistently violated basic human rights. Kurtz also stated that the "defense of religious liberty is as precious to the humanist as are the rights of the believers". Greg M. Epstein states that, "modern, organized Humanism began, in the minds of its founders, as nothing more nor less than a religion without a God". Many humanists address ethics from the point of view of ethical naturalism, and some support an actual science of morality. Modern context Secular humanist organizations are found in all parts of the world. Those who call themselves humanists are estimated to number between four and five million people worldwide in 31 countries, but there is uncertainty because of the lack of universal definition throughout censuses. Humanism is a non-theistic belief system and, as such, it could be a sub-category of "Religion" only if that term is defined to mean "Religion and (any) belief system". This is the case in the International Covenant on Civil and Political Rights on freedom of religion and beliefs. Many national censuses contentiously define Humanism as a further sub-category of the sub-category "No Religion", which typically includes atheist, rationalist and agnostic thought. In England, Wales 25% of people specify that they have 'No religion' up from 15% in 2001 and in Australia, around 30% of the population specifies "No Religion" in the national census. In the US, the decennial census does not inquire about religious affiliation or its lack; surveys report the figure at roughly 13%. In the 2001 Canadian census, 16.5% of the populace reported having no religious affiliation. In the 2011 Scottish census, 37% stated they had no religion up from 28% in 2001. One of the largest Humanist organizations in the world (relative to population) is Norway's Human-Etisk Forbund, which had over 86,000 members out of a population of around 4.6 million in 2013 – approximately 2% of the population. The International Humanist and Ethical Union (IHEU) is the worldwide umbrella organization for those adhering to the Humanist life stance. It represents the views of over three million Humanists organized in over 100 national organizations in 30 countries. Originally based in the Netherlands, the IHEU now operates from London. Some regional groups that adhere to variants of the Humanist life stance, such as the humanist subgroup of the Unitarian Universalist Association, do not belong to the IHEU. Although the European Humanist Federation is also separate from the IHEU, the two organisations work together and share an agreed protocol. Starting in the mid-20th century, religious fundamentalists and the religious right began using the term "secular humanism" in hostile fashion. Francis A. Schaeffer, an American theologian based in Switzerland, seizing upon the exclusion of the divine from most humanist writings, argued that rampant secular humanism would lead to moral relativism and ethical bankruptcy in his book How Should We Then Live: The Rise and Decline of Western Thought and Culture (1976). Schaeffer portrayed secular humanism as pernicious and diabolical, and warned it would undermine the moral and spiritual tablet of America. His themes have been very widely repeated in Fundamentalist preaching in North America. Toumey (1993) found that secular humanism is typically portrayed as a vast evil conspiracy, deceitful and immoral, responsible for feminism, pornography, abortion, homosexuality, and New Age spirituality. In certain areas of the world, Humanism finds itself in conflict with religious fundamentalism, especially over the issue of the separation of church and state. Many Humanists see religions as superstitious, repressive and closed-minded, while religious fundamentalists may see Humanists as a threat to the values set out in their sacred texts. In recent years, humanists such as Dwight Gilbert Jones and R. Joseph Hoffmann have decried the over-association of Humanism with affirmations of non-belief and atheism. Jones cites a lack of new ideas being presented or debated outside of secularism, while Hoffmann is unequivocal: "I regard the use of the term 'humanism' to mean secular humanism or atheism to be one of the greatest tragedies of twentieth century movementology, perpetrated by second-class minds and perpetuated by third-class polemicists and village atheists. The attempt to sever humanism from the religious and the spiritual was a flatfooted, largely American way of taking on the religious right. It lacked finesse, subtlety, and the European sense of history." Humanist celebrations Humanism, as a term which describes a person's non-religious views, comes with no obligation to celebrate or revere specific days in the year as a religion would. As a result, individual humanists choose of their own accord whether to take part in prevailing national holidays where they live. For example, humanists in Europe and North America typically celebrate holidays, such as Christmas, but as secular holidays rather than Christian festivals. Other humanists choose to mark the winter and summer solstice and the equinoxes. European humanists may often emphasise the fact that human beings have found reasons to celebrate at these times in the Northern Hemisphere for thousands of years before the arrival of Christianity. Humanists may also identify culturally with religious traditions and holidays celebrated in their family in the community. For example, humanists with a Jewish identity will often celebrate most Jewish holidays in a secular manner. Humanists International endorses World Humanist Day (21 June), Darwin Day (12 February), Human Rights Day (10 December) and HumanLight (23 December) as official days of humanist celebration, though none are yet a public holiday. Humanist organisations typically organise events around these dates which draw attention to their programmes of activities. In many | to be superseded. However, distinctions between "ethical" and "secular" humanists are for the most part historical, and practically meaningless in the present day or to contemporary individuals who identify with humanism. Since the mid-20th century, the development of new concepts such as the "life stance" (which encompasses both humanist views and religious outlooks) has defused this conflict. Most humanist organisations identify with "humanism" without a pre-modifier (such a "secular" or "ethical") and assert humanism as a non-religious philosophy or approach to life. Generally speaking, all humanists, including religious humanists, reject deference to supernatural beliefs; promote the practical, methodological naturalism of science; and largely endorse the stance of metaphysical naturalism. The result is an approach to issues in a secular way. Humanism addresses ethics without reference to the supernatural as well, attesting that ethics is a human enterprise (see naturalistic ethics). Accounts of humanism are also careful not to treat secular humanism analogously with religions, which implies a community who strictly attempt to adhere to the same obligations or beliefs. Holding a secular humanist philosophy does not prescribe a specific theory of morality or code of ethics. As stated by the Council for Secular Humanism, Secular humanists affirm that with the present state of scientific knowledge, dogmatic belief in an absolutist moral or ethical system (e.g. Kantian, Islamic, Christian) is unreasonable. However, it affirms that individuals engaging in rational moral/ethical deliberations can discover some universal "objective standards". Many humanists adopt principles of the Golden Rule. Some believe that universal moral standards are required for the proper functioning of society. However, they believe such necessary universality can and should be achieved by developing a richer notion of morality through reason, experience and scientific inquiry rather than through faith in a supernatural realm or source. Humanists Andrew Copson and Alice Roberts, in their casual introduction to humanism The Little Book of Humanism, propose that a distinctive aspect of humanist morality is its recognition that every moral situation is in some sense unique, and so potentially calls for different approach than the last (i.e. the ability to vacillate situationally between consequentialism and virtue ethics). In the book, they quote from Kristen Bell's advocacy of moral particularism as developed by Jonathan Dancy. Humanism is compatible with atheism, and by definition usually entails at least a form of weak or agnostic atheism, and agnosticism, but being atheist or agnostic does not automatically make one a humanist. Nevertheless, humanism is diametrically opposed to state atheism. According to Paul Kurtz, considered by some to be the founder of the American secular humanist movement, one of the differences between Marxist–Leninist atheists and humanists is the latter's commitment to "human freedom and democracy" while stating that the militant atheism of the Soviet Union consistently violated basic human rights. Kurtz also stated that the "defense of religious liberty is as precious to the humanist as are the rights of the believers". Greg M. Epstein states that, "modern, organized Humanism began, in the minds of its founders, as nothing more nor less than a religion without a God". Many humanists address ethics from the point of view of ethical naturalism, and some support an actual science of morality. Modern context Secular humanist organizations are found in all parts of the world. Those who call themselves humanists are estimated to number between four and five million people worldwide in 31 countries, but there is uncertainty because of the lack of universal definition throughout censuses. Humanism is a non-theistic belief system and, as such, it could be a sub-category of "Religion" only if that term is defined to mean "Religion and (any) belief system". This is the case in the International Covenant on Civil and Political Rights on freedom of religion and beliefs. Many national censuses contentiously define Humanism as a further sub-category of the sub-category "No Religion", which typically includes atheist, rationalist and agnostic thought. In England, Wales 25% of people specify that they have 'No religion' up from 15% in 2001 and in Australia, around 30% of the population specifies "No Religion" in the national census. In the US, the decennial census does not inquire about religious affiliation or its lack; surveys report the figure at roughly 13%. In the 2001 Canadian census, 16.5% of the populace reported having no religious affiliation. In the 2011 Scottish census, 37% stated they had no religion up from 28% in 2001. One of the largest Humanist organizations in the world (relative to population) is Norway's Human-Etisk Forbund, which had over 86,000 members out of a population of around 4.6 million in 2013 – approximately 2% of the population. The International Humanist and Ethical Union (IHEU) is the worldwide umbrella organization for those adhering to the Humanist life stance. It represents the views of over three million Humanists organized in over 100 national organizations in 30 countries. Originally based in the Netherlands, the IHEU now operates from London. Some regional groups that adhere to variants of the Humanist life stance, such as the humanist subgroup of the Unitarian Universalist Association, do not belong to the IHEU. Although the European Humanist Federation is also separate from the IHEU, the two organisations work together and share an agreed protocol. Starting in the mid-20th century, religious fundamentalists and the religious right began using the term "secular humanism" in hostile fashion. Francis A. Schaeffer, an American theologian based in Switzerland, seizing upon the exclusion of the divine from most humanist writings, argued that rampant secular humanism would lead to moral relativism and ethical bankruptcy in his book How Should We Then Live: The Rise and Decline of Western Thought and Culture (1976). Schaeffer portrayed secular humanism as pernicious and diabolical, and warned it would undermine the moral and spiritual tablet of America. His themes have been very widely repeated in Fundamentalist preaching in North America. Toumey (1993) found that secular humanism is typically portrayed as a vast evil conspiracy, deceitful and immoral, responsible for feminism, pornography, abortion, homosexuality, and New Age spirituality. In certain areas of the world, Humanism finds itself in conflict with religious fundamentalism, especially over the issue of the separation of church and state. Many Humanists see religions as superstitious, repressive and closed-minded, while religious fundamentalists may see Humanists as a threat to the values set out in their sacred texts. In recent years, humanists such as Dwight Gilbert Jones and R. Joseph Hoffmann have decried the over-association of Humanism with affirmations of non-belief and atheism. Jones cites a lack of new ideas being presented or debated outside of secularism, while Hoffmann is unequivocal: "I regard the use of the term 'humanism' to mean secular humanism or atheism to be one of the greatest tragedies of twentieth century movementology, perpetrated by second-class minds and perpetuated by third-class polemicists and village atheists. The attempt to sever humanism from the religious and the spiritual was a flatfooted, largely American way of taking on the religious right. It lacked finesse, subtlety, and the European sense of history." Humanist celebrations Humanism, as a term which describes a person's non-religious views, comes with no obligation to celebrate or revere specific days in the year as a religion would. As a result, individual humanists choose of their own accord whether to take part in prevailing national holidays where they live. For example, humanists in Europe and North America typically celebrate holidays, such as Christmas, but as secular holidays rather than Christian festivals. Other humanists choose to mark the winter and summer solstice and the equinoxes. European humanists may often emphasise the fact that human beings have found reasons to celebrate at these times in the Northern Hemisphere for thousands of years before the arrival of Christianity. Humanists may also identify culturally with religious traditions and holidays celebrated in their family in the community. For example, humanists with a Jewish identity will often celebrate most Jewish holidays in a secular manner. Humanists International endorses World Humanist Day (21 June), Darwin Day (12 February), Human Rights Day (10 December) and HumanLight (23 December) as official days of humanist celebration, though none are yet a public holiday. Humanist organisations typically organise events around these dates which draw attention to their programmes of activities. In many countries, humanist celebrants (officiants) perform celebrancy services for weddings, funerals, child namings, coming of age ceremonies, and other rituals. In countries like Scotland and Norway, these are extremely popular. In Scotland, more people have a humanist wedding than are married by any religious denomination, including Scotland's largest churches; over 20% of Scottish weddings are humanist. In Norway, over 20% of young people choose humanist coming-of-age ceremonies every year. Legal mentions in the United States The issue of whether and in what sense secular humanism might be considered a religion, and what the implications of this would be, has become the subject of legal maneuvering and political debate in the United States. The first reference to "secular humanism" in a US legal context was in 1961, although church-state separation lawyer Leo Pfeffer had referred to it in his 1958 book, Creeds in Competition. Hatch amendment The Education for Economic Security Act of 1984 included a section, Section 20 U.S.C.A. 4059, which initially read: "Grants under this subchapter ['Magnet School Assistance'] may not be used for consultants, for transportation or for any activity which does not augment academic improvement." With no public notice, Senator Orrin Hatch tacked onto the proposed exclusionary subsection the words "or for any course of instruction the substance of which is Secular Humanism". Implementation of this provision ran into practical problems because neither the Senator's staff, nor the Senate's Committee on Labor and Human Resources, nor the Department of Justice could propose a definition of what would constitute a "course of instruction the substance of which is Secular Humanism". So, this determination was left up to local school boards. The provision provoked a storm of controversy which within a year led Senator Hatch to propose, and Congress to pass, an amendment to delete from the statute all reference to secular humanism. While this episode did not dissuade fundamentalists from continuing to object to what they regarded as the "teaching of Secular Humanism", it did point out the vagueness of the claim. Case law Torcaso v. Watkins The phrase "secular humanism" became prominent after it was used in the United States Supreme Court case Torcaso v. Watkins. In the 1961 decision, Justice Hugo Black commented in a footnote, "Among religions in this country which do not teach what would generally be considered a belief in the existence of God are Buddhism, Taoism, Ethical Culture, Secular Humanism, and others." Fellowship of Humanity v. County of Alameda The footnote in Torcaso v. Watkins referenced Fellowship of Humanity v. County of Alameda, a 1957 case in which an organization of humanists sought a tax exemption on the ground that they used their property "solely and exclusively for religious worship." Despite the group's non-theistic beliefs, the court determined that the activities of the Fellowship of Humanity, which included weekly Sunday meetings, were analogous to the activities of theistic churches and thus entitled to an exemption. The Fellowship of Humanity case itself referred to Humanism but did not mention the term secular humanism. Nonetheless, this case was cited by Justice Black to justify the inclusion of secular humanism in the list of religions in his note. Presumably Justice Black added the word secular to emphasize the non-theistic nature of the Fellowship of Humanity and distinguish their brand of humanism from that associated with, for example, Christian humanism. Washington Ethical Society v. District of Columbia Another case alluded to in the Torcaso v. Watkins footnote, and said by some to have established secular humanism as a religion under the law, is the 1957 tax case of Washington Ethical Society v. District of Columbia, 249 F.2d 127 (D.C. Cir. 1957). The Washington Ethical Society functions much like a church, but regards itself as a non-theistic religious institution, honoring the importance of ethical living without mandating a belief in a supernatural origin for ethics. The case involved denial of the Society's application for tax exemption as a religious organization. The U.S. Court of Appeals reversed the Tax Court's ruling, defined the Society as a religious organization, and granted its tax exemption. The Society terms its practice Ethical Culture. Though Ethical Culture is based on a humanist philosophy, it is regarded by some as a type of religious humanism. Hence, it would seem most accurate to say that this case affirmed that a religion need not be theistic to qualify as a religion under the law, rather than asserting that it established generic secular humanism as a religion. In the cases of both the Fellowship of Humanity and the Washington Ethical Society, the court decisions turned not so much on the particular beliefs of practitioners as on the function and form of the practice being similar to the function and form of the practices in other religious institutions. Peloza v. Capistrano School District The implication in Justice Black's footnote that secular humanism is a religion has been seized upon by religious opponents of the teaching of evolution, who have made the argument that teaching evolution amounts to teaching a religious idea. The claim that secular humanism could be considered a religion for legal purposes was examined by the United States Court of Appeals for the Ninth Circuit in Peloza v. Capistrano School District, 37 F.3d 517 (9th Cir. 1994), cert. denied, 515 U.S. 1173 (1995). In this case, a science teacher argued that, by requiring him to teach evolution, his school district was forcing him to teach the "religion" of secular humanism. The Court responded, "We reject this claim because neither the Supreme Court, nor this circuit, has ever held that evolutionism or Secular Humanism are 'religions' for Establishment Clause purposes." The Supreme Court refused to review the case. The decision in a subsequent case, Kalka v. Hawk et al., offered this commentary: The Court's statement in Torcaso does not stand for the proposition that humanism, no matter in what form and no matter how practiced, amounts to a religion under the First Amendment. The Court offered no test for determining what system of beliefs qualified as a "religion" under the First Amendment. The most one may read into the Torcaso footnote is the idea that a particular non-theistic group calling itself the "Fellowship of Humanity" qualified as a religious organization under California law. Controversy Decisions about tax status have been based on whether an organization functions like a church. On the other hand, Establishment Clause cases turn on whether the ideas or symbols involved are inherently religious. An organization can function like a church while advocating beliefs that are not necessarily inherently religious. Author Marci Hamilton has pointed out: "Moreover, the debate is not between secularists and the religious. The debate is believers and non-believers on the one side debating believers and non-believers on the other side. You've got citizens who are [...] of faith who believe in the separation of church and state and you have a set of believers who do not believe in the separation of church and state." In the 1987 case of Smith v. Board of School Commissioners of Mobile County a group of plaintiffs brought a case alleging that the school system was teaching the tenets of an anti-religious religion called "secular humanism" in violation of the Establishment Clause. The complainants asked that 44 different elementary through high school level textbooks (including books on home economics, social science and literature) be removed from the curriculum. Federal judge William Brevard Hand ruled for the plaintiffs agreeing that the books promoted secular humanism, which he ruled to be a religion. The Eleventh Circuit Court unanimously reversed him, with Judge Frank stating that Hand |
license from Sega. Reception of the Game Gear was mixed, with praise for its full-color backlit screen and processing power for its time, criticisms over its large size and short battery life, and questions over the quality of its game library. The Game Gear Micro, a retroconsole, was announced in June 2020 and released in October of the same year. History Developed under the name "Project Mercury", the Game Gear was first released in Japan on October 6, 1990, in North America and Europe in 1991, and in Australia in 1992. Originally retailing at JP¥19,800 in Japan, US$149.99 in North America, and GB£99.99 in Europe, the Game Gear was developed to compete with the Game Boy, which Nintendo had released in 1989. The decision to make a handheld console was made by Sega's then-CEO Hayao Nakayama and the name was chosen by newly appointed Sega of America CEO Michael Katz. Both Sega's chairman Isao Okawa and cofounder David Rosen approved of the name. The console had been designed as a portable version of the Master System, and featured more powerful systems than the Game Boy, including a full-color screen, in contrast to the monochromatic screen of its rival. According to former Sega console hardware research and development head Hideki Sato, Sega saw the Game Boy's black and white screen as "a challenge to make our own color handheld system." To improve upon the design of their competition, Sega modeled the Game Gear with a similar shape to a Genesis controller, with the idea being that the curved surfaces and longer length would make the Game Gear more comfortable to hold than the Game Boy. The console's mass was carefully considered from the beginning of the development, aiming for a total mass between that of the Game Boy and the Atari Lynx, another full-color screen competing product. Despite the similarities the Game Gear shared with the Master System, the games of the latter were not directly playable on the Game Gear, and were only able to be played on the handheld by the use of an accessory called the Master Gear. The original Game Gear pack-in game was Columns, which was similar to the Tetris cartridge that Nintendo had included when it launched the Game Boy. With a late start into the handheld gaming market, Sega rushed to get the Game Gear into stores quickly, having lagged behind Nintendo in sales without a handheld on the market. As one method of doing so, Sega based the hardware of the Game Gear on the Master System, albeit with a much larger color palette than its predecessor: the Game Gear supported 4096 colors, compared to the 64 colors supported by the Master System. Part of the intention of this move was to make Master System games easy to port to the Game Gear. Though the Game Gear was designed to be technologically superior to the Game Boy, its design came at a cost of battery life: whereas the Game Boy could run for more than 30 hours on four AA batteries, the Game Gear required six AA batteries and could only run for three to five hours. With its quick launch in Japan, the handheld sold 40,000 units in its first two days, 90,000 within a month, and the number of back orders for the system was over 600,000. According to Sega of America marketing director Robert Botch, "there is clearly a need for a quality portable system that provides features other systems have failed to deliver. This means easy-to-view, full-color graphics and exciting quality games that appeal to all ages." Release and marketing Before the Game Gear's launch in 1990, Sega had success marketing its 16-bit home console, the Sega Genesis, by advertising it as a "more mature" option for gamers. In keeping with this approach, Sega positioned the Game Gear as a "grown-up" option compared to the Game Boy. While Sega's marketing in Japan did not take this perspective, instead opting for advertisements with Japanese women featuring the handheld, Sega's worldwide advertising prominently positioned the Game Gear as the "cooler" console than the Game Boy. In North America, marketing for the Game Gear included side-by-side comparisons of Sega's new handheld with the Game Boy and likened Game Boy players to the obese and uneducated. Most of those commercials featured the "Sega Scream", which showed a person yelling the logo. One Sega advertisement in early 1994 featured the quote, "If you were color blind and had an IQ of less than 12, then you wouldn't mind which portable you had." Such advertising drew outrage from Nintendo, who sought to have protests organized against Sega for insulting disabled persons. Sega responded with a statement from Sega of America president Tom Kalinske saying that Nintendo "should spend more time improving their products and marketing rather than working on behind-the-scenes coercive activities". Ultimately, | Battletank. This version was also compatible with all previous Game Gear games, but was incompatible with the TV Tuner and some Master System converters. Over ten years later, on March 2, 2011, Nintendo announced that their 3DS Virtual Console service on the Nintendo eShop would feature games from the Game Gear. Technical specifications A handheld game console, the Game Gear was designed to be played while being held horizontally. The console contains an 8-bit 3.5MHz Zilog Z80 chip for a central processing unit, the same as the Master System. Its screen measures on the diagonal and is able to display up to 32 colors at a time from a total palette of 4096 colors, with a frame rate of 59.922751013551Hz at a display resolution of 160 × 144 non-square pixels. The screen is backlit in order to allow players to game in low-lighting situations. Powered by six AA batteries, the Game Gear has an approximate battery life of 3 to 5 hours. In order to lengthen this duration and to save money for consumers, Sega also released two types of external rechargeable battery packs for the Game Gear. The system contains 8kB of RAM and an additional 16kB of video RAM. It produces sound using a Texas Instruments SN76489 PSG, which was also used in the Master System; however, unlike the Master System, stereo sound is able to be supplied through an output for headphones. Physically, the Game Gear measures wide, high, and deep. Several accessories were created for the Game Gear during its lifespan. A TV Tuner accessory with a whip antenna plugs into the system's cartridge slot, allowing the viewing of analog television stations over-the-air on the Game Gear's screen like a handheld television. Released at (equivalent to ), the add-on was expensive but unique for collectors and contributed to the system's popularity. Another accessory, the Super Wide Gear, magnifies the Game Gear screen to compensate for its relatively small size. Also released was the Car Gear adapter that plugs into cars or cigarette lighters to power the system while traveling, and the Gear to Gear Cable (VS Cable in Japan) that establishes a data connection between two Game Gear systems using the same multiplayer game and let users play against each other. A device called the Master Gear enables the Game Gear to play Master System games. Over the course of its lifespan, the Game Gear also received a number of variations. Later releases included several different colors for the console, including a blue "sports" variation released in North America bundled with World Series Baseball '95 or The Lion King. A white version was also released, sold in a bundle with a TV tuner. Other versions included a red Coca-Cola-themed unit, bundled with the game Coca-Cola Kid, and the Kids Gear, a Japan-only variation targeted toward children. Game library Over 300 games were released for the Game Gear, although at the time of the console's launch, there were only six software games available. Prices for game cartridges initially ranged from $24.99 to $29.99 each. The casings were molded black plastic with a rounded front to aid in removal. Games for the system included Sonic the Hedgehog, The GG Shinobi, Space Harrier, and Land of Illusion Starring Mickey Mouse, which was considered the best game for the system by GamesRadar+. Later games took advantage of the success of the Genesis, Sega's 16-bit video game console, with games released from franchises originally released on the Genesis. A large part of the Game Gear's library consists of Master System ports. Because of the landscape orientation of the Game Gear's screen and the similarities in hardware between the handheld console and the Master System, it was easy for developers to port Master System games to the Game Gear. Because of Nintendo's control over the video game market, few third-party developers were available to create games for Sega's system. This was a contributing factor to the large number of Master System ports for the Game Gear. Likewise, because of this, the Game Gear library contained many games that were not available on other handhelds, pulling sales away from the Atari Lynx and NEC TurboExpress and helping to establish the Game Gear's position in the market. While the Game Gear's library consisted of over 300 games, however, the Game Boy's library contained over 1000 individual games. Several Game Gear games were released years later on the Nintendo 3DS's Virtual Console service on the Nintendo eShop. The emulator for the Virtual Console releases was handled by M2. Game Gear Micro On June 3, 2020, as part of their 60th anniversary, Sega revealed the retroconsole. The Micro was released in Japan on October 6, 2020, through Japanese storefronts in four different versions, varying in color and the game selection, with each containing four separate Game Gear games. Each unit otherwise is the same size, measuring with a display, and is powered by 2 AAA batteries or through a separate USB charger. Each unit also includes a headphone jack. A magnifying accessory modeled after the original system's Big Window accessory will be offered to customers who preorder all four variations. An international release has yet to be announced. A special version of the device (published by M2 and licensed by Sega) was being shipped with a limited edition of Aleste Collection in December of 2020. This version includes a newly developed Game Gear title G.G. Aleste 3 as well as four other Aleste titles. Reception Game Gear surpassed the Atari Lynx and NEC TurboExpress, but lagged far behind the Game Boy in the handheld marketplace. Retrospective reception to the Game Gear is mixed. In 2008, GamePro listed the Game Gear as 10th on their list of the "10 Worst-Selling Handhelds of All Time" and criticized aspects of the implementation of its technology, but also stated that the Game Gear could be considered a success for having nearly 11 million units sold. According to GamePro reviewer Blake Snow, "Unlike the Game Boy, the Game Gear rocked the landscape holding position, making it less cramped for human beings with two hands to hold. And even though the Game Gear could be considered a success, its bulky frame, relative high price, constant consumption of AA batteries, and a lack of appealing games ultimately kept Sega from releasing a true successor." In speaking with Famitsu DC for their November |
by the end of 1994, selling the rest at steep discounts until it was discontinued in 1996 as Sega turned its focus to the Saturn. The 32X is considered a commercial failure. Initial reception was positive, highlighting the low price and power expansion to the Genesis. However, later reviews, both contemporary and retrospective, were mostly negative because of its shallow game library, poor market timing and its market fragmentation of the Genesis. History Sega released the Mega Drive, a 16-bit video game console, in 1988. It was released in North America as the Genesis in 1989, with releases in other regions a year later. In 1991, Sega released an add-on for the Genesis, the Sega CD, which did not meet commercial expectations. Sega began to develop a second add-on that would bridge the gap between the Genesis and its upcoming Sega Saturn, serving as a less expensive entry into the 32-bit era. Sega was determined to release the new add-on before the end of 1994. According to former Sega of America CEO Tom Kalinske, "Initially, the argument was that we could get another year of life out of the Genesis before we had to introduce the Saturn. Japan disagreed with me on that, so as kind of a stopgap measure, the 32X came up." Development During the Winter Consumer Electronics Show in January 1994, Sega of America research and development head Joe Miller took a phone call in his Las Vegas hotel suite from Sega president Hayao Nakayama, in which Nakayama stressed the importance of coming up with a quick response to the Atari Jaguar. Included on this call were Bayless, Sega hardware team head Hideki Sato, and Sega of America vice president of technology Marty Franz. One potential idea for this came from a concept from the Japanese team. This concept, later known as "Project Jupiter" and referred to by former Sega of America producer Michael Latham as "Genesis 2", was an entirely new independent console. Project Jupiter was initially slated to be a new version of the Genesis, with an upgraded color palette and a lower cost than the upcoming Saturn, as well as with some limited 3D capabilities thanks to integration of ideas from the development of the Sega Virtua Processor chip. Miller pushed for a different strategy — according to Latham, Miller dismissed Project Jupiter as "just a horrible idea. If all you're going to do is enhance the system, you should make it an add-on. If it's a new system with legitimate new software, great. But if the only thing it does is double the colors...." Miller said his idea was to leverage the existing Genesis as a way to keep from alienating Sega customers, who would otherwise be required to discard their Genesis systems entirely to play 32-bit games, and to control the cost of the new system in the form of an add-on. From these discussions, Project Jupiter was discontinued and the new add-on, codenamed "Project Mars", was advanced. At the suggestion from Miller that his American team would be able to design the system, the 32X was designed as a peripheral for the existing Genesis, expanding its power with two 32-bit SuperH-2 processors, the same as those that would be used in the Saturn but with a lower clock speed. The SH-2 had been developed in 1993 as a joint venture between Sega and Japanese electronics company Hitachi. The original design for the 32X add-on, according to Bayless, was created on a cocktail napkin, but Miller denied this. In another account, Bayless claimed that Franz began designing the 32X on a hotel notepad, drawing two SH-2 processors with separate framebuffers. Although the new unit was a stronger console than originally proposed, it was not compatible with Saturn games. This was justified by Sega's statement that both platforms would run at the same time, and that the 32X would be aimed at players who could not afford the more expensive Saturn. Bayless praised the potential of this system at this point, calling it "a coder's dream for the day" with its twin processors and 3D capabilities. Sega of America headed up the development of the 32X, with some assistance from Sato's team in Japan. Shortages of processors due to the same 32-bit chips being used in both the 32X and the Saturn hindered the development of the 32X, as did the language barrier between the teams in Japan and the United States. Before the 32X was launched, the release date of the Saturn was announced for November 1994 in Japan, coinciding with the 32X's target launch date in North America. Sega of America was tasked with marketing the 32X with the Saturn's Japan release occurring simultaneously. Their answer was to describe the 32X a "transitional device" between the Genesis and the Saturn; Bayless said this "just made us look greedy and dumb to consumers". Promotion and release The unveiling of the 32X to the public came at the Summer Consumer Electronics Show in June 1994 in Chicago. Promoted as the "poor man's entry into 'next generation' games", 32X was marketed for its US$159 price point as a less-expensive alternative to the Saturn. However, Sega would not answer as to whether or not a Genesis console equipped with a Sega CD and a 32X would be able to run Saturn software. Trip Hawkins, founder of The 3DO Company, was willing to point out that it would not, stating, "Everyone knows that 32X is a Band-Aid. It's not a 'next generation system.' It's fairly expensive. It's not particularly high-performance. It's hard to program for, and it's not compatible with the Saturn." In response to these comments, Sega executive Richard Brudvik-Lindner pointed out that the 32X would play Genesis games, and had the same system architecture as the Saturn. In August of that year, GamePro highlighted the advantages of the upcoming add-on in its 32-bit processors and significantly lower price, noting that "[n]o doubt gotta-get-it-now gamers will spend the big bucks to grab Saturn or PlayStation systems and games from Japan. For the rest of us, however, 32X may well be the system of choice in '94." In promotion for the new system, Sega promised 12 games available at launch and 50 games due for release in 1995 from third-party developers. The 32X was released on November 21, 1994, in North America, in time for the holiday season that year. As announced, it retailed for $159.99, and had a reasonably successful launch in the marketplace. Demand among retailers was high, and Sega could not keep up with orders for the new system. Over 1,000,000 orders had been placed for 32X units, but Sega had only managed to ship 600,000 units by January 1995. In the United States, nearly 500,000 units were sold by Christmas 1994, exceeding Sega's initial sales projection. Launching at about the same price as a Genesis console, the price of the 32X was less than half of what the Saturn's price would be at launch. Despite Sega's initial | catch on with the public, and is considered a commercial failure. By 1995, the Genesis had still not proven successful in Japan, where it was known as Mega Drive, and the Saturn was beating the PlayStation, so Sega CEO Hayao Nakayama decided to force Sega of America to focus on the Saturn and cut support for Genesis products, executing a surprise early launch of the Saturn in the early summer of 1995. Sega was supporting five different consoles before this—Saturn, Genesis, Game Gear, Pico, and the Master System—as well as the Sega CD and Sega 32X add-ons. Sales estimates for the 32X stood at 665,000 units at the end of 1994. Despite assurances from Sega that many games would be developed for the system, in early 1996, Sega finally conceded that it had promised too much out of the add-on and decided to discontinue the 32X in order to focus on the Saturn. In September 1995, the retail price for the 32X dropped to $99, and later the remaining inventory was cleared out of stores at $19.95, with 800,000 units sold in total. Sega Neptune The Sega Neptune is an unproduced two-in-one Genesis and 32X console which Sega planned to release in fall 1995, with the retail price planned to be something less than US$200. It was featured as early as March 1995, with Sega Magazine saying the console "shows [Sega's] commitment to the hardware", and that the system would be compatible with the Mega-CD. Sega cancelled the Neptune in October 1995, citing fears that it would dilute their marketing for the Saturn while being priced too close to the Saturn to be a viable competitor. Electronic Gaming Monthly used the Sega Neptune as an April Fools' Day prank in its April 2001 issue. The issue included a small article in which the writers announced that Sega had found a warehouse full of old Sega Neptunes, and were selling them on a website for $199. Technical aspects and specifications The 32X can be used only in conjunction with a Genesis system. It is inserted into the system like a standard game cartridge. The add-on requires its own separate power supply, a connection cable linking it to the Genesis, and an additional conversion cable for the original model of the Genesis. As well as playing its own library of cartridges, the 32X is backwards-compatible with Genesis games, and can also be used in conjunction with the Sega CD to play games that use both add-ons. The 32X also came with a spacer so it would fit properly with the second model of the Genesis; an optional spacer was offered for use with the Sega Genesis CDX system, but ultimately never shipped due to risks of electric shock when the 32X and CDX were connected. Installation of the 32X also requires the insertion of two included electromagnetic shield plates into the Genesis' cartridge slot. Seated on top of a Genesis, the 32X measures . The 32X contains two Hitachi SH-2 32-bit RISC processors with a clock speed of 23 MHz, which Sega claimed would allow the system to work 40 times faster than a stand-alone Genesis. Its visual display unit is capable of producing 32,768 colors, which provides a noticeable improvement over the Genesis's color palette. The 32X also includes 256 kilobytes of random-access memory (RAM), along with 256 kilobytes of video RAM. Sound is supplied through a pulse-width modulation sound source. Input/output is supplied to a television set via a provided A/V cable that supplies composite video and stereo audio, or through an RF modulator. Stereo audio can also be played through headphones via a headphone jack on the attached Genesis. Game library The 32X library consists of 40 games, including six that required both the 32X and Sega CD. Among them were ports of arcade games After Burner, Space Harrier, and Star Wars Arcade, a sidescroller with a hummingbird as a main character in Kolibri, and a 32X-exclusive Sonic the Hedgehog spinoff Knuckles' Chaotix. Several of the games released for the 32X are enhanced ports of Genesis games, including NFL Quarterback Club and World Series Baseball '95. In a retrospective review of the console, Star Wars Arcade was considered the best game for the 32X by IGN for its cooperative play, soundtrack, and faithful reproduction of the experiences of Star Wars. In a separate review, IGN's Levi Buchanan praised the 32X game Shadow Squadron as superior to Star Wars Arcade. Retro Gamer writer Damien McFerran, however, praised Virtua Fighter as "the jewel in the 32X's crown", and GamesRadar+ named Knuckles' Chaotix as the best game for the system. Next Generation called Virtua Fighter "the colorful wreath on 32X's coffin", reflecting the consensus among contemporary critics that the game was at once arguably the 32X's best release and a clear harbinger of the platform's imminent discontinuation, since it was inferior to the already-released Saturn version of Virtua Fighter Remix, as well as the forthcoming Saturn release of Virtua Fighter 2. In response to fan inquiries, Sega stated that the 32X architecture was not powerful enough to handle a port of Virtua Fighter 2. Despite its 32-bit processing and potential for better graphics and sound than the Genesis, most games did not take advantage of the 32X hardware. Doom for the 32X received near-perfect reviews, but was later criticized as inferior to versions for the PC and the Atari Jaguar, with missing levels, poor graphics and audio, jerky movement, and windowed gameplay. Franz believes few developers were willing to invest in designing games to work with the 32X's improved audio abilities. One cause was the rush to release games for the 32X launch; former Sega of America executive producer Michael Latham said it took "a lot of convincing" to release the 32X launch game Cosmic Carnage. With Doom, id Software programmer John Carmack had to cut a third of the levels to have the game ready for the 32X launch. Because of time limitations, game designs were intentionally conservative and did not show what the 32X hardware was able to do. In an interview at the end of 1995, Sega vice president of marketing Mike Ribero insisted that Sega was not abandoning the 32X, but acknowledged that first-party support had been lackluster: "I won't lie to you, we screwed up with 32X. We overpromised and underdelivered." Reception and legacy Initial reception to the 32X and its games upon the launch of the add-on was very positive. Four reviewers from Electronic Gaming Monthly scored the add-on 8, 7, 8, and 8 out of 10 in their 1995 Buyer's Guide, highlighting the add-on's enhancements to the Genesis but questioning how long the system would be supported. GamePro commented that the 32X's multiple input and power cords make it "as complicated as setting up your VCR" and noted some performance glitches with the prototype such as freezes and overheating, but expressed confidence that the production models would perform well and gave the add-on their overall approval. Reviews of its launch games, such as Doom, were likewise positive. By late 1995, feedback to the add-on had soured. In its 1996 Buyer's Guide, Electronic Gaming Monthly'''s four reviewers scored the add-on 3, 3, 3, and 2 out of 10, criticizing the game library and Sega's abandonment of the system in favor of the Saturn. A review in Next Generation panned the 32X for its weak polygon processing, the tendency of developers to show off its capabilities with garishly colored games, and its apparent function as "simply a way of grabbing extra 1994 mind and market share while waiting for Saturn". The review gave it one out of five stars. Game Players assessed it as so much less powerful than the Saturn and PlayStation that its lower price could not be considered an enticement, and said that the vast majority of its games could have been done just as well on the Super NES. Additionally commenting that both first party and third party software support had been weak, they concluded, "The lack of support [and] good games, and the release of Saturn make the 32X a system that never was." Retrospectively, the 32X is widely criticized as having a shallow library with a lack of support and a poor idea in the wake of the release of the Sega Saturn in Japan. 1UP.com's Jeremy Parish stated that the 32X "tainted just about everything it touched." GamesRadar+ also panned the system, placing it as their ninth-worst console with reviewer Mikel Reparaz criticizing that "it was a stopgap system that would be thrown under the bus when the Sega Saturn came out six months later, and everyone seemed to know it except for die-hard Sega fans and the company itself." Retro Gamer's Damien McFerran offered some praise for the power increase of the 32X to offer ports of Space Harrier, After Burner, and Virtua Fighter that were accurate to the original arcade versions, as well as the add-on's price point, stating, "If you didn't have deep enough pockets to afford a Saturn, then the 32X was a viable option; it's just a shame that it sold so poorly because the potential was there for true greatness." Levi Buchanan, writing for IGN, saw some sense in the move for Sega to create the 32X but criticized its implementation. According to Buchanan, "I actually thought the 32X was a better idea than the SEGA CD... The 32X, while underpowered, at least advanced the ball. Maybe it only gained a few inches in no small part due to a weak library, but at least the idea was the right one." In particular, the console's status as an add-on and poor timing after the announcement of the Saturn has been identified by reviewers as being responsible factors for fracturing the audience for Sega's video game consoles in terms of both developers and consumers. Allgame's Scott Alan Marriott states that "[e]very add-on whittled away at the number of potential buyers and discouraged third-party companies from making the games necessary to boost sales." GamePro criticized the concept of the add-on, noting the expenses involved in purchasing the system. According to reviewer Blake Snow, "Just how many 16-bit attachments did one need? All in all, if you were one of the unlucky souls who completely bought into Sega's add-on frenzy, you would have spent a whopping $650 for something that weighed about as much as a small dog." Writing for GamesRadar+, Reparaz noted that "developers—not wanting to waste time on a technological dead-end—abandoned the 32X in droves. Gamers quickly followed suit, turning what was once a promising idea into an embarrassing footnote in console history, as well as an object lesson in why console makers shouldn't split their user base with pricey add-ons." Reparaz went on to criticize Sega's decision to release the 32X, noting that "(u)ltimately, the 32X was the product of boneheaded short-sightedness: its existence put Sega into competition with itself once the Saturn rolled out." Writing for IGN'', Buchanan points out, "Notice that we haven't seen many add-ons like the 32X since 1994? I think the 32X killed the idea of an add-on like this—a power booster—permanently. And that's a good thing. Because add-ons, if not implemented properly, just splinter an audience." Former executives at Sega have mixed opinions of the 32X. Bayless believes firmly that the 32X serves as a warning to the video game industry not to risk splintering the market for consoles by creating add-ons, and was critical of the Kinect and PlayStation Move for doing so. Franz places the 32X's commercial failure on its inability to function without an attached Genesis and lack of a CD drive, despite its compatibility with the Sega CD, stating, "The 32X was destined to die because it didn't have a CD drive and was an add-on. An add-on device is never as well thought out as a built-from-scratch device." Miller, on the other hand, remembers the 32X positively, stating, "I think the 32X actually was an interesting, viable platform. The timing was wrong, and certainly our ability to stick with it, given what |
kept those forces wintered in Syria, where they became attracted to the young Elagabalus. After months of mild rebellion by the bulk of the army in Syria, Macrinus took his loyal troops to meet the army of Elagabalus near Antioch. Despite a good fight by the Praetorian Guard, his soldiers were defeated. Macrinus managed to escape to Chalcedon but his authority was lost. He was betrayed and executed after a reign of only 14 months. Marcus Opelius Diadumenianus (known as Diadumenian) was the son of Macrinus, born in 208. He was given the imperial rank of caesar in 217, when his father became augustus. After his father's defeat outside Antioch, he tried to escape east to Parthia but was captured and killed. Elagabalus (218–222) Elagabalus was born Varius Avitus Bassianus in 204 and became known later as Marcus Aurelius Antonius. The name "Elagabalus" followed the Latin nomenclature for the Syrian sun god Elagabal, of whom he had become a priest at an early age. Elagabal was represented by a large, dark rock called a baetyl. Elagabalus's grandmother, Julia Maesa, Julia Domna's sister and sister-in-law of Emperor Septimius Severus, arranged for the restoration of the Severan dynasty and persuaded soldiers from the Gallic Third Legion, which was stationed near Emesa, by using her enormous wealth as well as the claim that Caracalla had slept with her daughter and that the boy was his bastard to swear fealty to Elagabalus. He was later invited alongside his mother and daughters to the military camp, clad in imperial purple and crowned as emperor by the soldiers. His reign in Rome has long been known for being outrageous although the historical sources are few and in many cases not to be fully trusted. He is said to have smothered guests at a banquet by flooding the room with rose petals, married his male lover (who was later referred to as the "empress's husband") and married a Vestal Virgin called Aquilia Severa. Dio suggests that he was transgender and offered large sums to the physician who could give him female genitalia. Seeing that her grandson's outrageous behaviour could mean the loss of power, Julia Maesa persuaded Elagabalus to accept his young cousin Severus Alexander as caesar (and thus the nominal future augustus). Alexander was popular with the troops, who increasingly objected to Elagabalus's behaviour. Jealous of this popularity, Elagabalus removed the title of caesar from his cousin, which enraged the Praetorian Guard. Elagabalus, his mother, and other advisors close to him were assassinated in a Praetorian Guard camp mutiny. Alexander Severus (222–235) Born Marcus Julius Gessius Bassianus Alexianus in around 208, Alexander was adopted as heir apparent by his slightly older and very unpopular cousin, Elagabalus, at the urging of Julia Maesa, who was the grandmother of both cousins and who had arranged for the emperor's acclamation by the Third Gallica Legion. On March 6, 222, when Alexander was 14, a rumour went around the city's troops that Alexander had been killed, ironically triggering his ascension as emperor. Elagabalus was said to have initiated the rumour or attempted to murder Alexander. The 18-year-old Elagabalus and his mother were taken from the palace, dragged through the streets, murdered and thrown in the river Tiber by the Praetorian Guard, which proclaimed Alexander Severus as Augustus. Ruling from the age of 14 under the influence of his mother, Julia Avita Mamaea, Alexander restored to some extent the moderation that had characterised the rule of Septimius Severus. The rising strength of the Sasanian Empire () heralded perhaps the greatest external challenge that Rome faced in the 3rd century. His prosecution of the war against a German invasion of Gaul led to his overthrow by his own troops, whose regard the 27-year-old had lost during the affair. His death was the epochal event beginning the troubled Crisis of the Third Century, where a succession of briefly-reigning military emperors, rebellious generals, and counter-claimants presided over governmental chaos, civil war, general instability and great economic disruption. He was succeeded by Maximinus Thrax (), the first of a series of weak emperors, each ruling on average only 2 to 3 years, which ended 50 years later with the Tetrarchy instituted in the reign of Diocletian.(). Women The women of the Severan dynasty, beginning with Septimius Severus's wife Julia Domna, were notably active in advancing the careers of their male relatives. Other notable women who exercised power behind the scenes included Julia | 18-year-old Elagabalus and his mother were taken from the palace, dragged through the streets, murdered and thrown in the river Tiber by the Praetorian Guard, which proclaimed Alexander Severus as Augustus. Ruling from the age of 14 under the influence of his mother, Julia Avita Mamaea, Alexander restored to some extent the moderation that had characterised the rule of Septimius Severus. The rising strength of the Sasanian Empire () heralded perhaps the greatest external challenge that Rome faced in the 3rd century. His prosecution of the war against a German invasion of Gaul led to his overthrow by his own troops, whose regard the 27-year-old had lost during the affair. His death was the epochal event beginning the troubled Crisis of the Third Century, where a succession of briefly-reigning military emperors, rebellious generals, and counter-claimants presided over governmental chaos, civil war, general instability and great economic disruption. He was succeeded by Maximinus Thrax (), the first of a series of weak emperors, each ruling on average only 2 to 3 years, which ended 50 years later with the Tetrarchy instituted in the reign of Diocletian.(). Women The women of the Severan dynasty, beginning with Septimius Severus's wife Julia Domna, were notably active in advancing the careers of their male relatives. Other notable women who exercised power behind the scenes included Julia Maesa, sister of Julia Domna, and Maesa's two daughters Julia Soaemias, mother of Elagabalus, and Julia Avita Mamaea, mother of Severus Alexander. Also of interest, Publia Fulvia Plautilla, daughter of Gaius Fulvius Plautianus, the Prefect Commander of the Praetorian Guard, was married to but despised by Caracalla, who had her exiled and eventually executed. Dynastic timeline See also Severan art References Bibliography Anthony Birley., Septimius Severus: The African Emperor, Routledge, London, 1999. Markus Handy, Die Severer und das Heer, Berlin, Verlag Antike, 2009 (Studien zur Alten Geschichte, 10). Harold Mattingly, Edward A. Sydenham, The Roman Imperial Coinage, vol. IV, part I, Pertinax to Geta, London, Spink & Son, 1936. Harold Mattingly, Edward A. Sydenham, C. H. V. Sutherland, The Roman Imperial Coinage, vol. IV, part II, Marcinus to Pupienus, London, Spink & Son, 1938. Simon Swain, Stephen Harrison and Jas Elsner (editors), Severan culture, Cambridge University Press, 2007. Further reading Alföldy, Géza. 1974. "The Crisis of the Third Century as Seen by Contemporaries." Greek, Roman, and Byzantine Studies 15:89–111. Benario, Herbert W. 1958. "Rome of the Severi." Latomus 17:712–722. Birley, Eric. 1969. "Septimius Severus and the Roman Army." Epigraphische Studien 8:63–82. Campbell, Brian. 2005. "The Severan Dynasty." In Cambridge Ancient History: The Crisis of Empire (A.D. 193–337). Edited by Alan K. Bowman, Peter Garnsey, and Averil Cameron, 1–27. Cambridge, UK: Cambridge Univ. Press. De Blois, Lukas. 2003. "The Perception of Roman Imperial Authority in Herodian’s Work." In The Representation and Perception of Roman Imperial Power. Edited by Lukas De Blois, Paul Erdkamp, Olivier Hekster, Gerda de Kleijn, and S. Mols, 148–156. Amsterdam: J. C. Gieben. De Sena, Eric C., ed. 2013. The Roman Empire During the Severan Dynasty: Case Studies in History, Art, Architecture, Economy and Literature. American Journal of Ancient History 6–8. Piscataway, NJ: Gorgias. Langford, Julie. 2013. Maternal Megalomania: Julia Domna and the Imperial Politics of Motherhood. Baltimore: Johns Hopkins Univ. Press. Manders, Erika. 2012. Coining Images of Power: Patterns in the Representation of Roman Emperors on Imperial Coinage, A.D. 193–284. Leiden, The Netherlands, and |
data than the CD drive was designed to provide. Launch As early as 1990, magazines were covering a CD-ROM expansion for the Genesis. Sega announced the release of the Mega-CD in Japan for late 1991, and North America (as the Sega CD) in 1992. It was unveiled to the public at the 1991 Tokyo Toy Show, to positive reception from critics, and at the Consumer Electronic Show in Chicago in mid-1991. It was released in Japan on December 12, 1991, initially retailing at JP¥49,800. Though the Mega-CD sold quickly, the small install base of the Mega Drive in Japan meant that sales declined rapidly. Within its first three months, the Mega-CD sold 200,000 units, but only sold an additional 200,000 over the next three years. Third-party game development suffered because Sega took a long time to release software development kits. Other factors affecting sales included the high launch price of the Mega-CD in Japan and only two games available at launch, with only five published by Sega within the first year. On October 15, 1992, the Mega-CD was released in North America as the Sega CD, with a retail price of US$299. Advertising included one of Sega's slogans, "Welcome to the Next Level". Though only 50,000 units were available at launch due to production problems, the Sega CD sold over 200,000 units by the end of 1992 and 300,000 by July 1993. As part of Sega's sales, Blockbuster LLC purchased Sega CD units for rental in their stores. Sega of America emphasized that the Sega CD's additional storage space allowed for full-motion video (FMV) games, with Digital Pictures becoming an important partner. After the initial competition between Sega and Nintendo to develop a CD-based add-on, Nintendo canceled development of a CD add-on for the Super Nintendo Entertainment System after having partnered with Sony and then Philips to develop one. The Mega-CD was launched in Europe in April 1993, starting with the United Kingdom on April 2, 1993, at a price of GB£269.99. The European version was packaged with Sol-Feace and Cobra Command in a two-disc set, along with a compilation CD of five Mega Drive games. Only 70,000 units were initially available in the UK, but 60,000 units were sold by August 1993. The Mega-CD was released in Australia in March 1993. Brazilian toy company Tectoy released the Sega CD in Brazil in October 1993, retaining the North American name despite the use of the name Mega Drive for the base console there. Sega released a second model, the Sega CD 2 (Mega-CD 2), on April 23, 1993, in Japan. It was released in North America several months later, bundled with one of the bestselling Sega CD games, Sewer Shark. Designed to bring down the manufacturing costs of the Sega CD, the newer model is smaller and does not use a motorized disc tray. A limited number of games were developed that used the Sega CD and another Genesis add-on, the 32X, released in November 1994. Night Trap controversy On December 9, 1993, the United States Congress began hearings on video game violence and the marketing of violent video games to children. The Sega CD game Night Trap, an FMV adventure game by Digital Pictures, was at the center of debate. Night Trap had been brought to the attention of United States Senator Joe Lieberman, who said: "It ends with this attack scene on this woman in lingerie, in her bathroom. I know that the creator of the game said it was all meant to be a satire of Dracula; but nonetheless, I thought it sent out the wrong message." Lieberman's research concluded that the average video game player was between seven and twelve years old and that video game publishers were marketing violence to children. In the United Kingdom, Night Trap was discussed in parliament. Former Sega Europe development director Mike Brogan noted that Night Trap brought Sega publicity, and helped reinforce Sega's image as an "edgy company with attitude". Despite the increased sales, Sega recalled Night Trap and rereleased it with revisions in 1994. Following the congressional hearings, video game manufacturers came together in 1994 to establish a unified rating system, the Entertainment Software Rating Board. Decline By the end of 1993, sales of the Sega CD had stalled in Japan and were slowing in North America. In Europe, sales of Mega-CD games were outpaced by games for the Amiga CD32. Newer CD-based consoles such as the 3DO Interactive Multiplayer rendered the Sega CD technically obsolete, reducing public interest. In late 1993, less than a year after the Sega CD had launched in North America and Europe, the media reported that Sega was no longer accepting in-house development proposals for the Mega-CD in Japan. By 1994, units had been sold in the United States and 415,000 in Western Europe. Kalinske blamed the Sega CD's high price for limiting its potential market; Sega attempted to add value in the US and the UK by bundling more games, with some packages including up to five games. In early 1995, Sega shifted its focus to the Sega Saturn and discontinued advertising for Genesis hardware, including the Sega CD. Sega discontinued the Sega CD in the first quarter of 1996, saying that it needed to concentrate on fewer platforms and that the Sega CD could not compete due to its high price and outdated single-speed drive. According to Thorpe, the Sega CD only reached a more popular price point in 1995, by which time customers were willing to wait for newer consoles. The last scheduled Sega CD games, ports of Myst and Brain Dead 13, were cancelled. 2.24 million Sega CD units were sold worldwide. Technical specifications The Sega CD can only be used in conjunction with a Genesis system, attaching through an expansion slot on the side of the main console. It requires its own power supply. A core feature of the Sega CD is the increase in data storage by its games being CD-ROMs; whereas ROM cartridges of the day typically contained 8 to 16 megabits of data, a CD-ROM disc can hold more than 640 megabytes of data, more than 320 times the storage of a Genesis cartridge. This increase in storage allows the Sega CD to play FMV games. In addition to playing its own library of games in CD-ROM format, the Sega CD can also play compact discs and karaoke CD+G discs, and can be used in conjunction with the 32X to play 32-bit games that use both add-ons. The second model, also known as the Sega CD 2, includes a steel joining plate to be screwed into the bottom of the Genesis and an extension spacer to work with the original Genesis model. The main CPU of the Sega CD is a 12.5MHz 16-bit Motorola 68000 processor, which runs 5 MHz faster than the Genesis processor. It contains 1 Mbit of boot ROM, allocated for the CD game BIOS, CD player software, and compatibility with CD+G discs. 6 Mbit of RAM are allocated to data for programs, pictures, and sounds; 512 Kbit to PCM waveform memory; 128 Kbit to CD-ROM data cache memory; and an additional 64 Kbit are allocated as the backup memory. Additional backup memory in the form of a 1 Mbit Backup RAM Cartridge was also available as a separate purchase, released near the end of the system's life. The graphics chip is a custom ASIC, and can perform similarly to the SNES's Mode 7, but with the ability to handle more objects at the same time. Audio is supplied through the Ricoh RF5C164, and two RCA pin jacks allow the Sega CD to output stereophonic sound separate from the Genesis. Combining stereo sound from a Genesis to either version of the Sega CD requires a cable between the Genesis's headphone jack and an input jack on the back of the CD unit. This is not required for the second model of the Genesis. Sega released an additional accessory to be used with the Sega CD for karaoke, including a microphone input and various sound controls. Models Several models of the Sega CD were released. The original model used a front-loading motorized disc tray and sat underneath the Genesis. The second model was redesigned to sit next to the Genesis and featured a top-loading disc tray. Sega also released the Genesis CDX (Multi-Mega in Europe), a combined Genesis and Sega CD, with additional functionality as a portable CD player. Three additional system models were created by other electronics companies. Working with Sega, JVC released the Wondermega, a combination of the Genesis and Sega CD with high-quality audio, on April 1, 1992, in Japan. The Wondermega was redesigned by JVC and released as the X'Eye in North America in September 1994. Its high price kept it out of the hands of average consumers. Another console, the LaserActive by Pioneer Corporation, can play Genesis and Sega CD games if equipped with the Mega-LD attachment developed by Sega. The LaserActive was positioned to compete with the 3DO Interactive Multiplayer, but the combined system and Mega-LD pack retailed at too expensive a price for most consumers. Aiwa released the CSD-GM1, a combination Genesis and Sega CD unit built into a boombox. The CSD-GM1 was released in Japan in 1994. Games The Sega CD supports a library of more than 200 games created by Sega and third-party publishers. Six Sega CD games were also released in versions that used both the Sega CD and 32X add-ons. Well regarded Sega CD games include Sonic CD, Lunar: The Silver Star, Lunar: Eternal Blue, Popful Mail, and Snatcher, as well as the controversial Night Trap. Although Sega created Streets of Rage for the Genesis to compete against the SNES port of the arcade hit Final Fight, the Sega CD received an enhanced version of Final Fight that has been praised for its greater faithfulness to the arcade original. Eternal Champions: Challenge from the Dark Side was noted for its impressive use of the Sega CD hardware as well as its violent content. In particular, Sonic CD garnered acclaim for its graphics and time travel gameplay, which improved upon the traditional Sonic formula. The Sega CD also received enhanced ports of Genesis games including Batman Returns and Ecco the Dolphin. The Sega CD library includes several FMV games. FMV quality was substandard on the Sega CD due to poor video compression software and limited color palette, and the concept never caught on with the public. According to Digital Pictures founder Tom Zito, the Sega CD's limited color palette created "a horrible grainy look". Likewise, most Genesis ports for the Sega CD featured additional FMV sequences, extra levels, and enhanced audio, but were otherwise | Sega took a long time to release software development kits. Other factors affecting sales included the high launch price of the Mega-CD in Japan and only two games available at launch, with only five published by Sega within the first year. On October 15, 1992, the Mega-CD was released in North America as the Sega CD, with a retail price of US$299. Advertising included one of Sega's slogans, "Welcome to the Next Level". Though only 50,000 units were available at launch due to production problems, the Sega CD sold over 200,000 units by the end of 1992 and 300,000 by July 1993. As part of Sega's sales, Blockbuster LLC purchased Sega CD units for rental in their stores. Sega of America emphasized that the Sega CD's additional storage space allowed for full-motion video (FMV) games, with Digital Pictures becoming an important partner. After the initial competition between Sega and Nintendo to develop a CD-based add-on, Nintendo canceled development of a CD add-on for the Super Nintendo Entertainment System after having partnered with Sony and then Philips to develop one. The Mega-CD was launched in Europe in April 1993, starting with the United Kingdom on April 2, 1993, at a price of GB£269.99. The European version was packaged with Sol-Feace and Cobra Command in a two-disc set, along with a compilation CD of five Mega Drive games. Only 70,000 units were initially available in the UK, but 60,000 units were sold by August 1993. The Mega-CD was released in Australia in March 1993. Brazilian toy company Tectoy released the Sega CD in Brazil in October 1993, retaining the North American name despite the use of the name Mega Drive for the base console there. Sega released a second model, the Sega CD 2 (Mega-CD 2), on April 23, 1993, in Japan. It was released in North America several months later, bundled with one of the bestselling Sega CD games, Sewer Shark. Designed to bring down the manufacturing costs of the Sega CD, the newer model is smaller and does not use a motorized disc tray. A limited number of games were developed that used the Sega CD and another Genesis add-on, the 32X, released in November 1994. Night Trap controversy On December 9, 1993, the United States Congress began hearings on video game violence and the marketing of violent video games to children. The Sega CD game Night Trap, an FMV adventure game by Digital Pictures, was at the center of debate. Night Trap had been brought to the attention of United States Senator Joe Lieberman, who said: "It ends with this attack scene on this woman in lingerie, in her bathroom. I know that the creator of the game said it was all meant to be a satire of Dracula; but nonetheless, I thought it sent out the wrong message." Lieberman's research concluded that the average video game player was between seven and twelve years old and that video game publishers were marketing violence to children. In the United Kingdom, Night Trap was discussed in parliament. Former Sega Europe development director Mike Brogan noted that Night Trap brought Sega publicity, and helped reinforce Sega's image as an "edgy company with attitude". Despite the increased sales, Sega recalled Night Trap and rereleased it with revisions in 1994. Following the congressional hearings, video game manufacturers came together in 1994 to establish a unified rating system, the Entertainment Software Rating Board. Decline By the end of 1993, sales of the Sega CD had stalled in Japan and were slowing in North America. In Europe, sales of Mega-CD games were outpaced by games for the Amiga CD32. Newer CD-based consoles such as the 3DO Interactive Multiplayer rendered the Sega CD technically obsolete, reducing public interest. In late 1993, less than a year after the Sega CD had launched in North America and Europe, the media reported that Sega was no longer accepting in-house development proposals for the Mega-CD in Japan. By 1994, units had been sold in the United States and 415,000 in Western Europe. Kalinske blamed the Sega CD's high price for limiting its potential market; Sega attempted to add value in the US and the UK by bundling more games, with some packages including up to five games. In early 1995, Sega shifted its focus to the Sega Saturn and discontinued advertising for Genesis hardware, including the Sega CD. Sega discontinued the Sega CD in the first quarter of 1996, saying that it needed to concentrate on fewer platforms and that the Sega CD could not compete due to its high price and outdated single-speed drive. According to Thorpe, the Sega CD only reached a more popular price point in 1995, by which time customers were willing to wait for newer consoles. The last scheduled Sega CD games, ports of Myst and Brain Dead 13, were cancelled. 2.24 million Sega CD units were sold worldwide. Technical specifications The Sega CD can only be used in conjunction with a Genesis system, attaching through an expansion slot on the side of the main console. It requires its own power supply. A core feature of the Sega CD is the increase in data storage by its games being CD-ROMs; whereas ROM cartridges of the day typically contained 8 to 16 megabits of data, a CD-ROM disc can hold more than 640 megabytes of data, more than 320 times the storage of a Genesis cartridge. This increase in storage allows the Sega CD to play FMV games. In addition to playing its own library of games in CD-ROM format, the Sega CD can |
the Hedgehog series. Overall, Sega claims sales of 3.4 million Pico consoles and 11.2 million game cartridges, and over 350,000 Beena consoles and 800,000 cartridges. Design and software Powered by the same hardware used in the Sega Genesis, the physical shape of the Pico was designed to appear similar to a laptop. Included in the Pico is a stylus called the "Magic Pen" and a pad to draw on. Controlling the games for the system is accomplished either by using the Magic Pen like a mouse or by pressing the directional buttons on the console. The Pico does not include its screen or RF output, and instead must be connected to a monitor through Composite video or a VCR to be played on an RF screen. Touching the pen to the pad would either allow drawing or animate a character on the screen. Cartridges for the system were referred to as "Storyware", and take the form of picture books with a cartridge slot on the bottom. The Pico changes the television display and the set of tasks for the player to accomplish each time a page is turned. Sound, including voices and music, also accompanied every page. Games for the Pico focused on education, including on subjects such as music, counting, spelling, reading, matching, and coloring. Titles included licensed animated characters from various franchises, such as Disney's The Lion King: Adventures at Pride Rock and A Year at Pooh Corner. Sega also released titles including their mascot, Sonic the Hedgehog, including Sonic Gameworld and Tails and the Music Maker. According to former Sega console hardware research and development head Hideki Sato, the development of the Sega Pico was possible due to the company's past work on the MyCard cartridges developed for the SG-1000, as well as on drawing tablets. The sensor technology used in the pad came from that developed for 1987 arcade game World Derby, while its CPU and graphics chip came from the Genesis. The Genesis' Yamaha YM2612 FM synthesis-based sound chip however is not present; the Texas Instruments SN76489 PSG is instead accompanied by an NEC ųPD7759 ADPCM chip, capable of speech and extra sound effects. History At the price of JP¥13,440, the Pico was released in Japan in June 1993. In North America, Sega unveiled the | the Pico was sold continuously in Japan through the release of the Beena, in North America and Europe the Pico was less successful and was discontinued in early 1998, later being re-released by Majesco Entertainment. Releases for the Pico were focused on education for children and included titles supported by licensed franchised animated characters, including Sega's own Sonic the Hedgehog series. Overall, Sega claims sales of 3.4 million Pico consoles and 11.2 million game cartridges, and over 350,000 Beena consoles and 800,000 cartridges. Design and software Powered by the same hardware used in the Sega Genesis, the physical shape of the Pico was designed to appear similar to a laptop. Included in the Pico is a stylus called the "Magic Pen" and a pad to draw on. Controlling the games for the system is accomplished either by using the Magic Pen like a mouse or by pressing the directional buttons on the console. The Pico does not include its screen or RF output, and instead must be connected to a monitor through Composite video or a VCR to be played on an RF screen. Touching the pen to the pad would either allow drawing or animate a character on the screen. Cartridges for the system were referred to as "Storyware", and take the form of picture books with a cartridge slot on the bottom. The Pico changes the television display and the set of tasks for the player to accomplish each time a page is turned. Sound, including voices and music, also accompanied every page. Games for the Pico focused on education, including on subjects such as music, counting, spelling, reading, matching, and coloring. Titles included licensed animated characters from various franchises, such as Disney's The Lion King: Adventures at Pride Rock and A Year at Pooh Corner. Sega also released titles including their mascot, Sonic the Hedgehog, including Sonic Gameworld and Tails and the Music Maker. According to former Sega console hardware research and development head Hideki Sato, the development of the Sega Pico was possible due to the company's past work on the MyCard cartridges developed for the SG-1000, as well as on drawing tablets. The sensor technology used in the pad came from that developed for 1987 arcade game World Derby, while its CPU and graphics chip came from the Genesis. The Genesis' Yamaha YM2612 FM synthesis-based sound chip however is not present; the Texas Instruments SN76489 PSG is instead accompanied by an NEC ųPD7759 ADPCM chip, capable of speech and extra sound effects. History At the price of JP¥13,440, the Pico was released in Japan in June 1993. In North America, Sega unveiled the Pico at the 1994 American International Toy Fair, showcasing its drawing and display abilities before releasing it in November. The console was advertised at a price of approximately US$160 |
from the success of its Mega Drive/Genesis, announced the peripheral in 1991. It was later seen in early 1993, at the Winter Consumer Electronics Show (CES). The magazine stated that the headset was planned to use the Genesis hardware and would be released in late 1993 at with four launch games, including a port of arcade game Virtua Racing. Sega later announced its release schedule for early 1994, according to Electronic Games. Because of development difficulties, the Sega VR headset remained only a prototype and was never released to the general public. Then-CEO Tom Kalinske stated that the system would not be released due to it inducing motion sickness and severe headaches in users. It was last seen at the 1993 Summer CES, where it was demonstrated by Alan Hunter. It vanished from release schedules in 1994. Four games were apparently developed for the system, each using 16 MB cartridges that were to be bundled with the headset. The company claimed to have terminated the project because the virtual reality effect was too realistic, so users might move while wearing the headset and injure themselves. The limited processing power of the system and apparent difficulties faced in converting it for use in PAL territories make this claim unlikely, although there were reports of testers developing headaches and motion sickness. Mark Pesce, who worked on the Sega VR project, says SRI International, a research institute, warned Sega of the "hazards of prolonged use". Games Only four original games were known to be in development. Nuclear Rush: A simulation in which users pilot a hovercraft in a futuristic war. Iron Hammer: In this helicopter simulation, gamers pilot a flying gunship as in EA's popular Strike series. Matrix Runner: Reported to be a cyberpunk adventure game inspired by Hideo Kojima's Snatcher. Outlaw Racing: A vehicle racing and combat game. Sega also announced a port of Sega AM2's hit 1992 arcade game Virtua Racing as a launch game for the device, though it is not known how far this reached in development. Legacy Since the cancellation of the Sega VR, few attempts have been made by the company to develop virtual reality technology. A similar peripheral was reportedly made, but never seen, for the Saturn. While Sega of America undertook development on the Sega VR, Sega of Japan endeavoured to create their own separate virtual | public. Then-CEO Tom Kalinske stated that the system would not be released due to it inducing motion sickness and severe headaches in users. It was last seen at the 1993 Summer CES, where it was demonstrated by Alan Hunter. It vanished from release schedules in 1994. Four games were apparently developed for the system, each using 16 MB cartridges that were to be bundled with the headset. The company claimed to have terminated the project because the virtual reality effect was too realistic, so users might move while wearing the headset and injure themselves. The limited processing power of the system and apparent difficulties faced in converting it for use in PAL territories make this claim unlikely, although there were reports of testers developing headaches and motion sickness. Mark Pesce, who worked on the Sega VR project, says SRI International, a research institute, warned Sega of the "hazards of prolonged use". Games Only four original games were known to be in development. Nuclear Rush: A simulation in which users pilot a hovercraft in a futuristic war. Iron Hammer: In this helicopter simulation, gamers pilot a flying gunship as in EA's popular Strike series. Matrix Runner: Reported to be a cyberpunk adventure game inspired by Hideo Kojima's Snatcher. Outlaw Racing: A vehicle racing and combat game. Sega also announced a port of Sega AM2's hit 1992 arcade game Virtua Racing as a launch game for the device, though it is not known how far this reached in development. Legacy Since the cancellation of the Sega VR, few attempts have been made by the company to develop virtual reality technology. A similar peripheral was reportedly made, but never seen, for the Saturn. While Sega of America undertook development on the Sega VR, Sega of Japan endeavoured to create their own separate virtual reality project. After creating an initial agreement to collaborate with the pioneering Virtuality |
Hitachi formed a joint venture to develop a new CPU for the Saturn, which resulted in the creation of the "SuperH RISC Engine" (or SH-2) later that year. The Saturn was designed around a dual-SH2 configuration. According to Kazuhiro Hamada, Sega's section chief for Saturn development during the system's conception, "the SH-2 was chosen for reasons of cost and efficiency. The chip has a calculation system similar to a DSP [digital signal processor], but we realized that a single CPU would not be enough to calculate a 3D world." Although the Saturn's design was largely finished before the end of 1993, reports in early 1994 of the technical capabilities of Sony's upcoming PlayStation console prompted Sega to include another video display processor (VDP) to improve 2D performance and 3D texture mapping. Sega considered making CD-ROM-based and cartridge-only versions of the Saturn, but discarded the idea due to concerns over the lower quality and higher price of cartridge games. According to Sega of America president Tom Kalinske, Sega of America "fought against the architecture of Saturn for quite some time". Seeking an alternative graphics chip for the Saturn, Kalinske attempted to broker a deal with Silicon Graphics, but Sega of Japan rejected the proposal. Silicon Graphics subsequently collaborated with Nintendo on the Nintendo 64. Kalinske, Sony Electronic Publishing's Olaf Olafsson, and Sony America's Micky Schulhof had discussed development of a joint "Sega/Sony hardware system", which never came to fruition due to Sega's desire to create hardware that could accommodate both 2D and 3D visuals and Sony's competing notion of focusing on 3D technology. Publicly, Kalinske defended the Saturn's design: "Our people feel that they need the multiprocessing to be able to bring to the home what we're doing next year in the arcades." In 1993, Sega restructured its internal studios in preparation for the Saturn's launch. To ensure high-quality 3D games would be available early in the Saturn's life, and to create a more energetic working environment, developers from Sega's arcade division were asked to create console games. New teams, such as Panzer Dragoon developer Team Andromeda, were formed during this time. In early 1994, the Sega Titan Video arcade system was announced as an arcade counterpart to the Saturn. In April 1994, Acclaim Entertainment announced they would be the first American publisher to produce software for the Titan. In January 1994, Sega began to develop an add-on for the Genesis, the Sega 32X, to serve as a less expensive entry into the 32-bit era. The decision to create the add-on was made by Sega CEO Hayao Nakayama and widely supported by Sega of America employees. According to former Sega of America producer Scot Bayless, Nakayama was worried that the Saturn would not be available until after 1994 and that the recently released Atari Jaguar would reduce Sega's hardware sales. As a result, Nakayama ordered his engineers to have the system ready for launch by the end of the year. The 32X would not be compatible with the Saturn, but Sega executive Richard Brudvik-Lindner pointed out that the 32X would play Genesis games, and had the same system architecture as the Saturn. This was justified by Sega's statement that both platforms would run at the same time, and that the 32X would be aimed at players who could not afford the more expensive Saturn. According to Sega of America research and development head Joe Miller, the 32X served a role in assisting development teams to familiarize themselves with the dual SH-2 architecture also used in the Saturn. Because the machines shared many parts and were being prepared to launch around the same time, tensions emerged between Sega of America and Sega of Japan when the Saturn was given priority. Launch Sega released the Saturn in Japan on November 22, 1994, at a price of ¥44,800. Virtua Fighter, a faithful port of the popular arcade game, sold at a nearly one-to-one ratio with the Saturn console at launch and was crucial to the system's early success in Japan. Though Sega had wanted to launch with Clockwork Knight and Panzer Dragoon, the only other first-party game available at launch was Wan Chai Connection. Fueled by the popularity of Virtua Fighter, Sega's initial shipment of 200,000 Saturn units sold out on the first day. Sega waited until the December 3 launch of the PlayStation to ship more units; when both were sold side by side, the Saturn proved more popular. Meanwhile, Sega released the 32X on November 21, 1994, in North America, December 3, 1994, in Japan, and January 1995 in PAL territories, and was sold at less than half of the Saturn's launch price. After the holiday season, however, interest in the 32X rapidly declined. Half a million Saturn units were sold in Japan by the end of 1994 (compared to 300,000 PlayStation units), and sales exceeded 1 million within the following six months. There were conflicting reports that the PlayStation enjoyed a higher sell-through rate, and the system gradually began to overtake the Saturn in sales during 1995. Sony attracted many third-party developers to the PlayStation with a liberal $10 licensing fee, excellent development tools, and the introduction of a 7- to 10-day order system that allowed publishers to meet demand more efficiently than the 10- to 12-week lead times for cartridges that had previously been standard in the Japanese video game industry. In March 1995, Sega of America CEO Tom Kalinske announced that the Saturn would be released in the U.S. on "Saturnday" (Saturday) September 2, 1995. However, Sega of Japan mandated an early launch to give the Saturn an advantage over the PlayStation. At the first Electronic Entertainment Expo (E3) in Los Angeles on May 11, 1995, Kalinske gave a keynote presentation in which he revealed the release price of US$399 (including a copy of Virtua Fighter), and described the features of the console. Kalinske also revealed that, due to "high consumer demand", Sega had already shipped 30,000 Saturns to Toys "R" Us, Babbage's, Electronics Boutique, and Software Etc. for immediate release. The announcement upset retailers who were not informed of the surprise release, including Best Buy and Walmart; KB Toys responded by dropping Sega from its lineup. Sony subsequently unveiled the retail price for the PlayStation: Olaf Olafsson, the head of Sony Computer Entertainment America (SCEA), summoned Steve Race to the stage, who said "$299", and then walked away to applause. The Saturn's release in Europe also came before the previously announced North American date, on July 8, 1995, at a price of £399.99. European retailers and press did not have time to promote the system or its games, harming sales. The PlayStation launched in Europe on September 29, 1995; by November, it had already outsold the Saturn by a factor of three in the United Kingdom, where Sony had allocated £20 million of marketing during the holiday season compared to Sega's £4 million. The Saturn's U.S. launch was accompanied by a reported $50 million advertising campaign that included coverage in publications such as Wired and Playboy. Early advertising for the system was targeted at a more mature, adult audience than the Sega Genesis ads. Because of the early launch, the Saturn had only six games (all published by Sega) available to start as most third-party games were slated to be released around the original launch date. Virtua Fighters relative lack of popularity in the West, combined with a release schedule of only two games between the surprise launch and September 1995, prevented Sega from capitalizing on the Saturn's early timing. Within two days of its September 9, 1995 launch in North America, the PlayStation (backed by a large marketing campaign) sold more units than the Saturn had in the five months following its surprise launch, with almost all of the initial shipment of 100,000 units being sold in advance, and the rest selling out across the U.S. A high-quality port of the Namco arcade game Ridge Racer contributed to the PlayStation's early success, and garnered favorable media in comparison to the Saturn version of Sega's Daytona USA, which was considered inferior to its arcade counterpart. Namco, a longtime arcade competitor with Sega, also unveiled the Namco System 11 arcade board, based on raw PlayStation hardware. Although the System 11 was technically inferior to Sega's Model 2 arcade board, its lower price made it attractive to smaller arcades. Following a 1994 acquisition of Sega developers, Namco released Tekken for the System 11 and PlayStation. Directed by former Virtua Fighter designer Seiichi Ishii, Tekken was intended to be fundamentally similar, with the addition of detailed textures and twice the frame rate. Tekken surpassed Virtua Fighter in popularity due to its superior graphics and nearly arcade-perfect console port, becoming the first million-selling PlayStation game. On October 2, 1995, Sega announced a Saturn price reduction to $299. High-quality Saturn ports of the Sega Model 2 arcade hits Sega Rally Championship, Virtua Cop, and Virtua Fighter 2 (running at 60 frames per second at a high resolution) were available by the end of the year, and were generally regarded as superior to competitors on the PlayStation. Notwithstanding a subsequent increase in Saturn sales during the 1995 holiday season, the games were not enough to reverse the PlayStation's decisive lead. By 1996, the PlayStation had a considerably larger library than the Saturn, although Sega hoped to generate interest with upcoming exclusives such as Nights into Dreams. An informal survey of retailers showed that the Saturn and PlayStation sold in roughly equal numbers during the first quarter of 1996. Within its first year, the PlayStation secured over 20% of the entire U.S. video game market. On the first day of the May 1996 E3 show, Sony announced a PlayStation price reduction to $199, a reaction to the release of the Model 2 Saturn in Japan at a price roughly equivalent to $199. On the second day, Sega announced it would match this price, though Saturn hardware was more expensive to manufacture. Changes at Sega Despite the launch of the PlayStation and Saturn, sales of 16-bit games and consoles continued to account for 64% of the video game market in 1995. Sega underestimated the continued popularity of the Genesis, and did not have the inventory to meet demand. Sega was able to capture 43% of the dollar share of the U.S. video game market and sell more than 2 million Genesis units in 1995, but Kalinske estimated that "we could have sold another 300,000 Genesis systems in the November/December timeframe." Nakayama's decision to focus on the Saturn over the Genesis, based on the systems' relative performance in Japan, has been cited as the major contributing factor in this miscalculation. Due to long-standing disagreements with Sega of Japan, Kalinske lost interest in his work as CEO of Sega of America. By early 1996, rumors were circulating that Kalinske planned to leave Sega, and a July 13 article in the press reported speculation that Sega of Japan was planning significant changes to Sega of America's management. On July 16, 1996, Sega announced that Kalinske would leave Sega after September 30, and that Shoichiro Irimajiri had been appointed chairman and CEO of Sega of America. A former Honda executive, Irimajiri had been involved with Sega of America since joining Sega in 1993. Sega also announced that David Rosen and Nakayama had resigned from their positions as chairman and co-chairman of Sega of America, though both remained with the company. Bernie Stolar, a former executive at Sony Computer Entertainment of America, was named Sega of America's executive vice president in charge of product development and third-party relations. Stolar, who had arranged a six-month PlayStation exclusivity deal for Mortal Kombat 3 and helped build close relations with Electronic Arts while at Sony, was perceived as a major asset by Sega officials. Finally, Sega of America made plans to expand its PC software business. Stolar was not supportive of the Saturn, feeling it was poorly designed, and publicly announced at E3 1997 that "the Saturn is not our future". While Stolar had "no interest in lying to people" about the Saturn's prospects, he continued to emphasize quality games for the system, and later said that "we tried to wind it down as cleanly as we could for the consumer". At Sony, Stolar had opposed the localization of Japanese games that he felt would not represent PlayStation well in North America, and advocated a similar policy for the Saturn, although he later sought to distance himself from this perception. These changes were accompanied by a softer image that Sega was beginning to portray in its advertising, including removing the "Sega!" scream and holding press events for the education industry. Marketing for the Saturn in Japan also changed with the introduction of Segata Sanshiro (played by Hiroshi Fujioka), a character in a series of TV advertisements starting in 1997; the character eventually starred in a Saturn game. Temporarily abandoning arcade development, Sega AM2 head Yu Suzuki began developing several Saturn-exclusive games, including a role-playing game in the Virtua Fighter series. Initially conceived as an obscure prototype "The Old Man and the Peach Tree" and intended to address the flaws of contemporary Japanese RPGs (such as poor non-player character artificial intelligence routines), Virtua Fighter RPG evolved into a planned 11-part, 45-hour "revenge epic in the tradition of Chinese cinema", which Suzuki hoped would become the Saturn's killer app. The game was eventually released as Shenmue for the Saturn's successor, the Dreamcast. Cancellation of Sonic X-treme As Sonic Team | to prepare for the launch of its successor. Only 12 Saturn games were released in North America in 1998 (Magic Knight Rayearth was the final official release), compared to 119 in 1996. The Saturn would last longer in Japan. Between June 1996 and August 1998, the Saturn sold a further 1,103,468 consoles and 29,685,781 games in Japan, giving the Saturn a Japanese attach rate of 16.71 games per console, the highest of that generation. Rumors about the upcoming Dreamcast—spread mainly by Sega itself—were leaked to the public before the last Saturn games were released. The Dreamcast was released on November 27, 1998 in Japan and on September 9, 1999 in North America. The decision to abandon the Saturn effectively left the Western market without Sega games for over one year. Sega suffered an additional ¥42.881 billion consolidated net loss in the fiscal year ending March 1999, and announced plans to eliminate 1,000 jobs, nearly a quarter of its workforce. Worldwide Saturn sales include at least the following amounts in each territory: 5.75 million in Japan (surpassing the Genesis' sales of 3.58 million there), 1.8 million in the United States, 1 million in Europe, and 530,000 elsewhere. With lifetime sales of 9.26 million units, the Saturn is considered a commercial failure, although its install base in Japan surpassed the Nintendo 64's 5.54 million. Lack of distribution has been cited as a significant factor contributing to the Saturn's failure, as the system's surprise launch damaged Sega's reputation with key retailers. Conversely, Nintendo's long delay in releasing a 3D console and damage caused to Sega's reputation by poorly supported add-ons for the Genesis are considered major factors allowing Sony to gain a foothold in the market. Technical specifications Featuring eight processors, the Saturn's central processing units are two Hitachi SH-2 microprocessors clocked at 28.6 MHz and capable of 56 MIPS. It uses a Motorola 68EC000 running at 11.3 MHz as a sound controller; a custom sound processor with an integrated Yamaha FH1 DSP running at 22.6 MHz capable of up to 32 sound channels with both FM synthesis and 16-bit 44.1 kHz pulse-code modulation; and two video display processors: the VDP1 (which handles sprites and polygons) and the VDP2 (which handles backgrounds). Its double-speed CD-ROM drive is controlled by a dedicated Hitachi SH-1 processor to reduce load times. The System Control Unit (SCU), which controls all buses and functions as a co-processor of the main SH-2 CPU, has an internal DSP running at 14.3 MHz. It features a cartridge slot that allows for memory expansion, 16 Mbit of work random-access memory (RAM), 12 Mbit of video RAM, 4 Mbit of RAM for sound functions, 4 Mbit of CD buffer RAM and 256 Kbit (32 KB) of battery backup RAM. Its video output, provided by a stereo AV cable, displays at resolutions from 320×224 to 704×224 pixels, and can display up to 16.77 million colors simultaneously. The Saturn measures . It was packaged with an instruction manual, control pad, stereo AV cable, and 100 V AC power supply, with a power consumption of approximately 15 W. The Saturn had technically impressive hardware at the time of its release, but its complexity made harnessing this power difficult for developers accustomed to conventional programming. The greatest disadvantage was that both CPUs shared the same bus and were unable to access system memory at the same time. Making full use of the 4 KB of cache memory in each CPU was critical to maintaining performance. For example, Virtua Fighter used one CPU for each character, while Nights used one CPU for 3D environments and the other for 2D objects. The Visual Display Processor 2 (VDP2), which can generate and manipulate backgrounds, has also been cited as one of the system's most important features. The Saturn's design elicited mixed commentary among game developers and journalists. Developers quoted by Next Generation in December 1995 described the Saturn as "a real coder's machine" for "those who love to get their teeth into assembly and really hack the hardware", with "more flexibility" and "more calculating power than the PlayStation". The sound board was also widely praised. By contrast, Lobotomy Software programmer Ezra Dreisbach described the Saturn as significantly slower than the PlayStation, whereas Kenji Eno of WARP observed little difference. In particular, Dreisbach criticized the Saturn's use of quadrilaterals as its basic geometric primitive, in contrast to the triangles rendered by the PlayStation and the Nintendo 64. Ken Humphries of Time Warner Interactive remarked that compared to the PlayStation, the Saturn was worse at generating polygons but better at sprites. Third-party development was initially hindered by the lack of useful software libraries and development tools, requiring developers to write in assembly language. During early Saturn development, programming in assembly could offer a two-to-fivefold speed increase over higher-level languages such as C. The Saturn hardware is extremely difficult to emulate. Sega responded to complaints about the difficulty of programming for the Saturn by writing new graphics libraries which were claimed to make development easier. Sega of America also purchased a United Kingdom-based development firm, Cross Products, to produce the Saturn's development system. Despite these challenges, Treasure CEO Masato Maegawa stated that the Nintendo 64 was more difficult to develop for than the Saturn. Traveller's Tales founder Jon Burton felt that while the PlayStation was easier "to get started on ... you quickly reach [its] limits", whereas the Saturn's "complicated" hardware had the ability to "improve the speed and look of a game when all used together correctly". A major criticism was the Saturn's use of 2D sprites to generate polygons and simulate 3D space. The PlayStation used a different design, based entirely on 3D triangle-based polygonal rendering, with no direct 2D support. As a result, several analysts described the Saturn as an "essentially" 2D system. For example, Steven L. Kent stated: "Although Nintendo and Sony had true 3D game machines, Sega had a 2D console that did a good job with 3D objects but wasn't optimized for 3D environments." Several Saturn models were produced in Japan. An updated model in a recolored light gray (officially white) was released at ¥20,000 to reduce the system's cost and raise its appeal among women and younger children. Two models were released by third parties: Hitachi released the Hi-Saturn (a smaller model equipped with a car navigation function), while JVC released the V-Saturn'''. Saturn controllers came in various color schemes to match different models of the console. The system also supports several accessories. A wireless controller powered by AA batteries uses infrared signal to connect. Designed to work with Nights, the Saturn 3D Pad includes both a control pad and an analog stick for directional input. Sega also released several versions of arcade sticks as peripherals, including the Virtua Stick, the Virtua Stick Pro, the Mission Analog Stick, and the Twin Stick. Sega also created a light gun peripheral, the Virtua Gun, for shooting games such as Virtua Cop and The Guardian, and the Arcade Racer, a wheel for racing games. The Play Cable allows two Saturn consoles to be connected for multiplayer gaming across two screens, while a multitap allows up to six players to play on the same console. The Saturn was designed to support up to 12 players on a single console, by using two multitaps. RAM cartridges expand the memory. Other accessories include a keyboard, mouse, floppy disk drive, and movie card. Like the Genesis, the Saturn had an internet-based gaming service. The Sega NetLink was a 28.8k modem that fit into the cartridge slot in the Saturn for direct dial multiplayer. In Japan, a pay-to-play service was used. It could also be used for web browsing, sending email, and online chat. Because the NetLink was released before the Saturn keyboard, Sega produced a series of CDs containing hundreds of website addresses so that Saturn owners could browse with the joypad. The NetLink functioned with Daytona USA, Duke Nukem 3D, Saturn Bomberman, Sega Rally, and Virtual On: Cyber Troopers. In 1995, Sega announced a variant of the Saturn featuring a built-in NetLink modem under the code name "Sega Pluto", but it was never released. Sega developed an arcade board based on the Saturn's hardware, the Sega ST-V (or Titan), intended as an affordable alternative to Sega's Model 2 arcade board and as a testing ground for upcoming Saturn software. The Titan was criticized for its comparatively weak performance compared to the Sega Model 2 arcade system by Yu Suzuki, and it was overproduced by Sega's arcade division. Because Sega already had the Die Hard license, members of Sega AM1 working at the Sega Technical Institute developed Die Hard Arcade for the Titan to clear excess inventory. Die Hard became the most successful Sega arcade game produced in the United States at that point. Other games released for the Titan include Golden Axe: The Duel and Virtua Fighter Kids. Game library Much of the Saturn's library comes from Sega's arcade ports, including Daytona USA, The House of the Dead, Last Bronx, Sega Rally Championship, the Virtua Cop series, the Virtua Fighter series, and Virtual-On. Saturn ports of 2D Capcom fighting games including Darkstalkers 3, Marvel Super Heroes vs. Street Fighter, and Street Fighter Alpha 3 were noted for their faithfulness to their arcade counterparts. Fighters Megamix, developed by Sega AM2 for the Saturn rather than arcades, combined characters from Fighting Vipers and Virtua Fighter to positive reviews. Highly rated Saturn exclusives include Panzer Dragoon Saga, Dragon Force, Guardian Heroes, Nights, Panzer Dragoon II Zwei, and Shining Force III.Shining creators Hiroyuki Takahashi and Shugo Takahashi have named Shining the Holy Ark and Shining Force 3 their favorite games in the series. See PlayStation games such as Castlevania: Symphony of the Night, Resident Evil, and Wipeout 2097 received Saturn ports with mixed results. The first-person shooter PowerSlave featured some of the most impressive 3D graphics on the system, leading Sega to contract its developers, Lobotomy Software, to produce Saturn ports of Duke Nukem 3D and Quake. While Electronic Arts' limited support for the Saturn and Sega's failure to develop a football game for late 1995 gave Sony the lead in the sports genre, "Sega Sports" published Saturn sports games including the well-regarded World Series Baseball and Sega Worldwide Soccer series.cf. cf. Due to the cancellation of Sonic X-treme, the Saturn lacks an exclusive Sonic the Hedgehog platformer; instead it received a graphically enhanced port of the Genesis game Sonic 3D Blast, the compilation Sonic Jam, and a racing game, Sonic R. The platformer Bug! received attention for its eponymous main character being a potential mascot for the Saturn, but it failed to catch on as the Sonic series had. Considered one of the most important Saturn releases, Sonic Team developed Nights into Dreams, a score attack game that attempted to simulate both the joy of flying and the fleeting sensation of dreams. The gameplay of Nights involves steering the imp-like androgynous protagonist, Nights, as it flies on a mostly 2D plane across surreal stages broken into four segments each. The levels repeat for as long as an in-game time limit allows, while flying over or looping around various objects in rapid succession earns additional points. Although it lacked the fully 3D environments of Nintendo's Super Mario 64, Nights' emphasis on unfettered movement and graceful acrobatic techniques showcased the intuitive potential of analog control. Sonic Team's Burning Rangers, a fully 3D action-adventure game involving a team of outer-space firefighters, garnered praise for its transparency effects and distinctive art direction, but was released in limited quantities late in the Saturn's lifespan and criticized for its short length. One of the biggest killer apps for the Saturn in Japan were the Sakura Wars games. Co-developed by Sega and Red Entertainment, Sakura Wars mixed elements of tactical RPGs, anime cutscenes and visual novels. Despite games such as the Sakura Wars series and Grandia helping make the Saturn popular in its homeland, they never saw a Western release due to Sega of America's policy of not localizing RPGs and other Japanese games that might have damaged the system's reputation in North America.cf. Despite appearing first on the Saturn, games such as Dead or Alive,cf. Grandia, and Lunar: Silver Star Story Complete only saw a Western release on the PlayStation. Working Designs localized several Japanese Saturn games before a public feud between Sega of America's Bernie Stolar and Working Designs president Victor Ireland resulted in the company switching their support to the PlayStation. Panzer Dragoon Saga was praised as perhaps the finest RPG for the system due to its cinematic presentation, evocative plot, and unique battle system—with a tactical emphasis on circling around opponents to identify weak points and the ability to "morph" the physical attributes of the protagonist's dragon companion during combat—but Sega released fewer than 20,000 retail copies of the game in North America in what IGN's Levi Buchanan characterized as one example of the Saturn's "ignominious send-off" in the region. Similarly, only the first of three installments of Shining Force III was released outside Japan. The Saturn's library also garnered criticism for its lack of sequels to high-profile Genesis-era Sega franchises, with Sega of Japan's cancellation of a planned third installment in Sega of America's popular Eternal Champions series cited as a significant source of controversy. Later ports of Saturn games including Guardian Heroes, Nights, and Shin Megami Tensei: Devil Summoner: Soul Hackers continued to garner positive reviews. Partly due to rarity, Saturn games such as Panzer Dragoon Saga and Radiant Silvergun are noted for their cult following. Due to the system's commercial failure and hardware limitations, Saturn projects such as Resident Evil 2, Shenmue, Sonic Adventure, and Virtua Fighter 3 were cancelled and moved to the Dreamcast. Reception and legacy At the time of the Saturn's release, Famicom Tsūshin awarded it 24 out of 40, higher than the PlayStation's 19 out of 40. In June 1995, Dennis Lynch of the Chicago Tribune and Albert Kim of Entertainment Weekly praised the Saturn as the most advanced console available; Lynch praised the double-speed CD-ROM drive and "intense surround-sound capabilities" and Kim cited Panzer Dragoon as a "lyrical and exhilarating epic" demonstrating the ability of new technology to "transform" the industry. In December 1995, Next Generation gave the Saturn three and a half stars out of five, highlighting Sega's marketing and arcade background as strengths but the system's complexity as a weakness. Four critics in Electronic Gaming Monthlys December 1996 Buyer's Guide rated the Saturn 8, 6, 7, and 8 out of 10 and the PlayStation 9, 10, 9, and 9. By December 1998, EGMs reviews were more mixed, with reviewers citing the lack of games as a major problem. According to EGM reviewer Crispin Boyer, "the Saturn is the only system that can thrill me one month and totally disappoint me the next". Retrospective feedback of the Saturn is mixed, but generally praises its game library. According to Greg Sewart of 1UP.com, "the Saturn will go down in history as one of the most troubled, and greatest, systems of all time". In 2009, IGN named the Saturn the 18th-best console of all time, praising its unique game library. According to the reviewers, "While the Saturn ended up losing the popularity contest to both Sony and Nintendo ... Nights into Dreams, the Virtua Fighter and Panzer Dragoon series are all examples of exclusive titles that made the console a fan favorite." Edge noted that "hardened loyalists continue to reminisce about the console that brought forth games like Burning Rangers, Guardian Heroes, Dragon Force and Panzer Dragoon Saga". In 2015, The Guardians Keith Stuart wrote that "the Saturn has perhaps the strongest line-up of 2D shooters and fighting games in console history".Retro Gamers Damien McFerran wrote: "Even today, despite the widespread availability of sequels and re-releases on other formats, the Sega Saturn is still a worthwhile investment for those who appreciate the unique gameplay styles of the companies that supported it." IGN's |
fighting game graphically enhanced for the system that went on to sell one million units), and Visual Concepts' high-quality football simulation NFL 2K. On November 4, Sega announced it had sold over one million Dreamcast units. Nevertheless, the launch was marred by a glitch at one of Sega's manufacturing plants, which produced defective GD-ROMs. Sega released the Dreamcast in Europe on October 14, 1999, at a price of GB£200. By November 24, 400,000 consoles had been sold in Europe. By Christmas of 1999, Sega of Europe reported selling 500,000 units, placing it six months ahead of schedule. Sales did not continue at this pace, and by October 2000, Sega had sold only about 1 million units in Europe. As part of Sega's promotions of the Dreamcast in Europe, the company sponsored four European football clubs: Arsenal F.C. (England), AS Saint-Étienne (France), U.C. Sampdoria (Italy), and Deportivo de La Coruña (Spain). Meanwhile, through regional distributor Ozisoft, the Dreamcast went on sale in Australia and New Zealand on November 30, 1999, at a price of A$499. The launch had been delayed from its original target of the end of September due to Internet compatibility and launch title availability issues, and then delayed again from the revised date of October 25 for various reasons. Despite the extra time given from the delays, there were several severe issues at launch; besides a severe shortage of the consoles themselves, only six of the thirty planned launch titles for the region were available for purchase on day one with no first-party software included, and additional peripherals were nonexistent on store shelves. Ozisoft representative Steve O'Leary, in a statement released the same day, explained that the Australian Customs Service had impounded virtually all supplied launch software, including demo discs, the previous week due to insufficient labeling of their country of origin; Ozisoft had received them only two days before launch, resulting in very few titles that were catalogued and prepared for shipment in time. O'Leary also noted that the Dreamcast's high demand in other markets resulted in few quantities of peripherals that were allotted to the region. Further complicating matters was the lack of an Internet disc due to localization issues and delays in securing an ISP contract, with the latter done through Telstra just the day before launch; it was not until March 2000 that the online component was ready, at which point Ozisoft sent out the necessary software to users that had sent in a filled-out reply paid card included with the console. The poor launch, combined with a minuscule advertising campaign and a high price point, translated to lackluster sales in Australia; two large retail chains there reported a combined total of 13 console sales over the first few days after launch. Competition Though the Dreamcast launch had been successful, Sony still held 60 percent of the overall video game market share in North America with the PlayStation at the end of 1999. On March 2, 1999, in what one report called a "highly publicized, vaporware-like announcement" Sony revealed the first details of its "next generation PlayStation", which Ken Kutaragi claimed would allow video games to convey unprecedented emotions. The center of Sony's marketing plan and the upcoming PlayStation 2 itself was a new CPU (clocked at 294 MHz) jointly developed by Sony and Toshiba—the "Emotion Engine"—which Kutaragi announced would feature a graphics processor with 1,000 times more bandwidth than contemporary PC graphics processors and a floating-point calculation performance of 6.2 gigaflops, rivaling most supercomputers. Sony, which invested $1.2 billion in two large-scale integration semiconductor fabrication plants to manufacture the PlayStation 2's "Emotion Engine" and "Graphics Synthesizer", designed the machine to push more raw polygons than any video game console in history. Sony claimed the PlayStation 2 could render 75 million raw polygons per second with absolutely no effects, and 38 million without accounting for features such as textures, artificial intelligence, or physics. With such effects, Sony estimated the PlayStation 2 could render 7.5 million to 16 million polygons per second, whereas independent estimates ranged from 3 million to 20 million, compared to Sega's estimates of more than 3 million to 6 million for the Dreamcast. The system would also utilize the DVD-ROM format, which could hold substantially more data than the Dreamcast's GD-ROM format. Because it could connect to the Internet while playing movies, music, and video games, Sony hyped PlayStation 2 as the future of home entertainment. Rumors spread that the PlayStation 2 was a supercomputer capable of guiding missiles and displaying Toy Story-quality graphics, while Kutaragi boasted its online capabilities would give consumers the ability to "jack into ‘The Matrix’!" In addition, Sony emphasized the PlayStation 2 would be backwards compatible with hundreds of popular PlayStation games. Sony's specifications appeared to render the Dreamcast obsolete months before its U.S. launch, although reports later emerged that the PlayStation 2 was not as powerful as expected and distinctly difficult to program games for. The same year, Nintendo announced its next generation console would meet or exceed anything on the market, and Microsoft began development of its own console. Sega's initial momentum proved fleeting as U.S. Dreamcast sales—which exceeded 1.5 million by the end of 1999—began to decline as early as January 2000. Poor Japanese sales contributed to Sega's ¥42.88 billion ($404 million) consolidated net loss in the fiscal year ending March 2000, which followed a similar loss of ¥42.881 billion the previous year and marked Sega's third consecutive annual loss. Although Sega's overall sales for the term increased 27.4%, and Dreamcast sales in North America and Europe greatly exceeded the company's expectations, this increase in sales coincided with a decrease in profitability due to the investments required to launch the Dreamcast in Western markets and poor software sales in Japan. At the same time, increasingly poor market conditions reduced the profitability of Sega's Japanese arcade business, prompting the company to close 246 locations. Knowing that "they have to fish where the fish are biting", Sega of America president Peter Moore (who assumed his position after Stolar had been fired) and Sega of Japan's developers focused on the U.S. market to prepare for the upcoming launch of the PS2. To that end, Sega of America launched its own Internet service provider, Sega.com, led by CEO Brad Huang. On September 7, 2000, Sega.com launched SegaNet, the Dreamcast's Internet gaming service, at a subscription price of $21.95 per month. Although Sega had previously released only one Dreamcast game in the U.S. that featured online multiplayer (ChuChu Rocket!, a puzzle game developed by Sonic Team), the launch of SegaNet (which allowed users to chat, send email, and surf the web) combined with NFL 2K1 (a football game including a robust online component) was intended to increase demand for the Dreamcast in the U.S. market. The service would later support games including Bomberman Online, Quake III Arena, and Unreal Tournament. The September 7 launch coincided with a new advertising campaign to promote SegaNet, including via the MTV Video Music Awards of the same day, which Sega sponsored for the second consecutive year. Sega employed aggressive pricing strategies with relation to online gaming. In Japan, every Dreamcast sold included a free year of Internet access, which Okawa personally paid for. Prior to the launch of SegaNet, Sega had already offered a $200 rebate to any Dreamcast owner who purchased two years of Internet access from Sega.com. To increase SegaNet's appeal in the U.S., Sega dropped the price of the Dreamcast to $149 (compared to the PS2's U.S. launch price of $299) and offered a rebate for the full $149 price of a Dreamcast (and a free Dreamcast keyboard) with every 18-month SegaNet subscription. Moore stated that the Dreamcast would need to sell 5 million units in the U.S. by the end of 2000 in order to remain a viable platform, but Sega ultimately fell short of this goal with some 3 million units sold. Moreover, Sega's attempts to spur increased Dreamcast sales through lower prices and cash rebates caused escalating financial losses. Instead of an expected profit, for the six months ending September 2000, Sega posted a ¥17.98 billion ($163.11 million) loss, with the company projecting a year-end loss of ¥23.6 billion. This estimate was more than doubled to ¥58.3 billion, and in March 2001, Sega posted a consolidated net loss of ¥51.7 billion ($417.5 million). While the PS2's October 26 U.S. launch was marred by shortages, this did not benefit the Dreamcast as much as expected; many consumers continued to wait for a PS2, while the PSone, a remodeled version of the original PlayStation, was the best-selling console in the U.S. at the start of the 2000 holiday season. According to Moore, "the PlayStation 2 effect that we were relying upon did not work for us... people will hang on for as long as possible... What effectively happened is the PlayStation 2 lack of availability froze the marketplace." Eventually, Sony and Nintendo held 50 and 35 percent of the U.S. video game market, respectively, while Sega held only 15 percent. According to Bellfield, Dreamcast software sold at an 8-to-1 ratio with the hardware, but this ratio "on a small install base didn't give us the revenue ... to keep this platform viable in the medium to long term." Decline On May 22, 2000, Okawa replaced Irimajiri as president of Sega. Okawa had long advocated that Sega abandon the console business. His sentiments were not unique; Sega co-founder David Rosen had "always felt it was a bit of a folly for them to be limiting their potential to Sega hardware", and Stolar had previously suggested Sega should have sold their company to Microsoft. In September 2000, in a meeting with Sega's Japanese executives and the heads of the company's major Japanese game development studios, Moore and Bellfield recommended that Sega abandon its console business and focus on software—prompting the studio heads to walk out. Nevertheless, on January 31, 2001, Sega announced the discontinuation of the Dreamcast after March 31 and the restructuring of the company as a "platform-agnostic" third-party developer. The decision was Moore's. Sega also announced a Dreamcast price reduction to $99 to eliminate its unsold inventory, which was estimated at 930,000 units as of April 2001. After a further reduction to $79, the Dreamcast was cleared out of stores at $49.95. The final Dreamcast unit manufactured was autographed by the heads of all nine of Sega's internal game development studios as well as the heads of Visual Concepts and Wave Master and given away with 55 first-party Dreamcast games through a competition organized by GamePro magazine. Okawa, who had previously loaned Sega $500 million in the summer of 1999, died on March 16, 2001; shortly before his death, he forgave Sega's debts to him and returned his $695 million worth of Sega and CSK stock, helping the company survive the third-party transition. As part of this restructuring, nearly one-third of Sega's Tokyo workforce was laid off in 2001. 9.13 million Dreamcast units were sold worldwide. After the Dreamcast's discontinuation, commercial games were still developed and released for the system, particularly in Japan. In the United States, game releases continued until the end of the first half of 2002. Sega of Japan continued to repair Dreamcast units until 2007. As of 2014, the console is still supported through various MIL-CD independent releases. After five consecutive years of financial losses, Sega finally posted a profit for the fiscal year ending March 2003. Reasons cited for the failure of the Dreamcast include hype for the PS2; a lack of support from EA and Squaresoft, considered the most popular third-parties in the U.S. and Japan respectively; disagreement among Sega executives over the company's future, and Okawa's lack of commitment to the product; Sega's lack of advertising money, with Bellfield doubting that Sega spent even "half" the $100 million it had pledged to promote the Dreamcast in the U.S.; that the market was not yet ready for online gaming; Sega's focus on "hardcore" gamers over the mainstream consumer; and poor timing. Perhaps the most frequently cited reason is the damage to Sega's reputation caused by several previous poorly supported Sega platforms. Writing for GamePro, Blake Snow stated "the much beloved console launched years ahead of the competition but ultimately struggled to shed the negative reputation [Sega] had gained during the Saturn, Sega 32X, and Sega CD days. As a result, casual gamers and jaded third-party developers doubted Sega's ability to deliver." Eurogamer's Dan Whitehead noted that the "wait and see" approach of consumers and the lack of support from EA were symptoms rather the cause of Sega's decline, concluding "Sega's misadventures during the 1990s had left both gamers and publishers wary of any new platform bearing its name." According to 1UP.com's Jeremy Parish, "While it would be easy to point an accusatory finger at Sony and blame them for killing the Dreamcast by overselling the PS2 ... there's a certain level of intellectual dishonesty in such a stance ... [Sega]'s poor U.S. support for hardware like the Sega CD, the 32X, and the Saturn made gamers gun shy. Many consumers felt burned after investing in expensive Sega machines and finding the resulting libraries comparatively lacking". The announcement of Sega's third-party transition was met with widespread enthusiasm. According to IGN's Travis Fahs, "Sega was a creatively fertile company with a rapidly expanding stable of properties to draw from. It seemed like they were in a perfect position to start a new life as a developer/publisher." Former Working Designs president Victor Ireland wrote, "It's actually a good thing ... because now Sega will survive, doing what they do best: software." The staff of Newsweek remarked "From Sonic to Shenmue, Sega's programmers have produced some of the most engaging experiences in the history of interactive media ... Unshackled by a struggling console platform, this platoon of world-class software developers can do what they do best for any machine on the market". Rosen predicted "they have the potential to catch Electronic Arts". Game Informer, commenting on Sega's tendency to produce under-appreciated cult classics, stated: "Let us rejoice in the fact that Sega is making games equally among the current console crop, so that history will not repeat itself." Technical specifications Hardware Physically, the Dreamcast measures and weighs . The Dreamcast's main CPU is a two-way 360 MIPS superscalar Hitachi SH-4 32-bit RISC clocked at 200 MHz with an 8 Kbyte instruction cache and 16 Kbyte data cache and a 128-bit graphics-oriented floating-point unit delivering 1.4 GFLOPS. Its 100 MHz NEC PowerVR2 rendering engine, integrated with the system's ASIC, is capable of drawing more than 3 million polygons per second and of deferred shading. Sega estimated the Dreamcast was theoretically capable of rendering 7 million raw polygons per second, or 6 million with textures and lighting, but noted that "game logic and physics reduce peak graphic performance." Graphics hardware effects include trilinear filtering, gouraud shading, z-buffering, spatial anti-aliasing, per-pixel translucency sorting and bump mapping. The system can output approximately 16.77 million colors simultaneously and displays interlaced or progressive scan video at 640 × 480 video resolution. Its 67 MHz Yamaha AICA sound processor, with a 32-bit ARM7 RISC CPU core, can generate 64 voices with PCM or ADPCM, providing ten times the performance of the Saturn's sound system. The Dreamcast has 16 MB main RAM, along with an additional 8 MB of RAM for graphic textures and 2 MB of RAM for sound. The system reads media using a 12x speed Yamaha GD-ROM Drive. In addition to Windows CE, the Dreamcast supports several Sega and middleware application programming interfaces. In most regions, the Dreamcast included a removable modem for online connectivity, which was modular for future upgrades. The original Japanese model and all PAL models had a transfer rate of 33.6 kbit/s, while consoles sold in the US and in Japan after September 9, 1999 featured a 56 kbit/s dial-up modem. Models Sega constructed numerous Dreamcast models, most of which were exclusive to Japan. A refurbished Dreamcast known as the R7 was originally used as a network console in Japanese pachinko parlors. Another model, the Divers 2000 CX-1, possesses a shape similar to Sonic's head and includes a television and software for teleconferencing. A Hello Kitty version, limited to 2000 units produced, was targeted at Japanese female gamers. Special editions were created for Seaman and Resident Evil Code: Veronica. Color variations were sold through a service called "Dreamcast Direct" in Japan. Toyota also offered special edition Dreamcast units at 160 of its dealers in Japan. In North America, a limited edition black Dreamcast was released with a Sega Sports logo on the lid, which included matching Sega Sports-branded black controllers and two games. Accessories The Dreamcast controller is based on the Saturn 3D controller and includes both an analog stick and a D-pad, four action buttons, start button and two analog triggers. The system has four ports for controller inputs, although it was bundled with only one controller. The design of the Dreamcast's controller has received mostly negative reviews from critics, described by the staff of Edge as "an ugly evolution of Saturn's 3D controller," and was called "[not] that great" by 1UP.com's Sam Kennedy and "lame" by Game Informer's Andy McNamara. The staff of IGN wrote that "unlike most controllers, Sega's pad forces the user's hands into an uncomfortable parallel position." In contrast to the Sega CD and Sega Saturn, which included internal backup memory, the Dreamcast uses a 128 kbyte memory card called the VMU (or "Visual Memory Unit") for data storage. The VMU features a small LCD screen, audio output from a one-channel PWM sound source, non-volatile memory, a D-pad, and four buttons. The VMU can present game information, be used as a minimal handheld gaming device, and connect to certain Sega arcade machines. For example, players use the VMU to call plays in NFL 2K or raise virtual pets in Sonic Adventure. Sega officials noted that the VMU could be used "as a private viewing area, the absence of which has prevented effective implementation of many types of games in the past." After a VMU slot was incorporated into the controller's design, Sega's engineers found many additional uses for it, so a second slot was added. This slot was generally used for vibration packs providing force feedback like Sega's "Jump Pack" and Performance's "Tremor Pack", although it could also be used for other peripherals including a microphone enabling voice control and player communication. Various third-party cards provide storage, and some contain the LCD screen addition. Iomega announced a Dreamcast-compatible zip drive that could store up to 100 MB of data on removable discs, but it was never released. Various third-party controllers from companies like Mad Catz include additional buttons and other extra features; third-parties also manufactured arcade-style joysticks for fighting games, such as Agetech's Arcade Stick and Interact's Alloy Arcade Stick. Mad Catz and Agetec created racing wheels for racing games. Sega decided against releasing its official Dreamcast light guns in the U.S., but some third party light guns were available. The Dreamcast supports a Sega fishing "reel and rod" motion controller and a keyboard for text entry. Although it was designed for fishing games such as Sega Bass Fishing, Soulcalibur was playable with the fishing controller, which translated vertical and horizontal movements into on-screen swordplay in a manner that was retroactively cited as a predecessor to the Wii Remote. The Japanese Dreamcast port of Sega's Cyber Troopers Virtual-On Oratorio Tangram supported a "Twin Sticks" peripheral, but the game's American publisher, Activision, opted not to release it in the U.S. The Dreamcast could connect to SNK's Neo Geo Pocket Color, predating Nintendo's GameCube – Game Boy Advance link cable. Sega also produced the Dreameye, a digital camera that could be connected to the Dreamcast and used to exchange pictures and participate in video chat over the system's Internet connection. Sega hoped developers would use the Dreameye for future software, as some later did with Sony's similar EyeToy peripheral. In addition, Sega investigated systems that would have allowed users to make telephone calls with the Dreamcast, and discussed with Motorola the development of an Internet-enabled cell phone that would have used technology from the console to enable quick downloads of games and other data. The console can supply video through several different accessories. The console came with A/V cables, considered at the time to be the standard for video and audio connectivity. Sega and various third parties also manufactured RF modulator connectors and S-Video cables. A VGA adapter allows Dreamcast games to be played on computer displays or enhanced-definition television sets in 480p. Game library Before the launch of the Dreamcast in Japan, Sega announced the release of its New Arcade Operation Machine Idea (NAOMI) arcade board, which served as a cheaper alternative to the Sega Model 3. NAOMI shared the same technology as the Dreamcast—albeit with twice as much system, video, and audio memory and a 160 Mbyte flash ROM board in place of a GD-ROM drive—allowing nearly identical home conversions of arcade games. The Atomiswave was itself based on the NAOMI so it also shares similarities with the Dreamcast. Games were ported from NAOMI to the Dreamcast by several leading Japanese arcade companies, including Capcom (Marvel vs. Capcom 2 and Project Justice), Tecmo (Dead or Alive 2), Treasure (Ikaruga), and Sega itself (F355 Challenge and Crazy Taxi). In what has been called "a brief moment of remarkable creativity", in 2000, Sega restructured its arcade and console development teams into nine semi-autonomous studios headed by the company's top designers. Studios included United Game Artists (UGA) (headed by former Sega Rally Championship producer Tetsuya Mizuguchi), Hitmaker (headed by Crazy Taxi creator and future Sega president Hisao Oguchi), Smilebit (headed by Shun Arai and including many former Panzer Dragoon and future Yakuza developers from Team Andromeda), Overworks (headed by Noriyoshi Oba and composed of developers from Sega franchises including Sakura Wars, Shinobi and Streets of Rage), Sega AM2 (Sega's most famous arcade studio and the developer of Sega's Virtua Fighter fighting game series, headed by the company's top developer, Yu Suzuki), and Sonic Team (the developer of Sega's flagship series, Sonic the Hedgehog, headed by Yuji Naka). Sega's design houses were encouraged to experiment and benefited | sold in the US and in Japan after September 9, 1999 featured a 56 kbit/s dial-up modem. Models Sega constructed numerous Dreamcast models, most of which were exclusive to Japan. A refurbished Dreamcast known as the R7 was originally used as a network console in Japanese pachinko parlors. Another model, the Divers 2000 CX-1, possesses a shape similar to Sonic's head and includes a television and software for teleconferencing. A Hello Kitty version, limited to 2000 units produced, was targeted at Japanese female gamers. Special editions were created for Seaman and Resident Evil Code: Veronica. Color variations were sold through a service called "Dreamcast Direct" in Japan. Toyota also offered special edition Dreamcast units at 160 of its dealers in Japan. In North America, a limited edition black Dreamcast was released with a Sega Sports logo on the lid, which included matching Sega Sports-branded black controllers and two games. Accessories The Dreamcast controller is based on the Saturn 3D controller and includes both an analog stick and a D-pad, four action buttons, start button and two analog triggers. The system has four ports for controller inputs, although it was bundled with only one controller. The design of the Dreamcast's controller has received mostly negative reviews from critics, described by the staff of Edge as "an ugly evolution of Saturn's 3D controller," and was called "[not] that great" by 1UP.com's Sam Kennedy and "lame" by Game Informer's Andy McNamara. The staff of IGN wrote that "unlike most controllers, Sega's pad forces the user's hands into an uncomfortable parallel position." In contrast to the Sega CD and Sega Saturn, which included internal backup memory, the Dreamcast uses a 128 kbyte memory card called the VMU (or "Visual Memory Unit") for data storage. The VMU features a small LCD screen, audio output from a one-channel PWM sound source, non-volatile memory, a D-pad, and four buttons. The VMU can present game information, be used as a minimal handheld gaming device, and connect to certain Sega arcade machines. For example, players use the VMU to call plays in NFL 2K or raise virtual pets in Sonic Adventure. Sega officials noted that the VMU could be used "as a private viewing area, the absence of which has prevented effective implementation of many types of games in the past." After a VMU slot was incorporated into the controller's design, Sega's engineers found many additional uses for it, so a second slot was added. This slot was generally used for vibration packs providing force feedback like Sega's "Jump Pack" and Performance's "Tremor Pack", although it could also be used for other peripherals including a microphone enabling voice control and player communication. Various third-party cards provide storage, and some contain the LCD screen addition. Iomega announced a Dreamcast-compatible zip drive that could store up to 100 MB of data on removable discs, but it was never released. Various third-party controllers from companies like Mad Catz include additional buttons and other extra features; third-parties also manufactured arcade-style joysticks for fighting games, such as Agetech's Arcade Stick and Interact's Alloy Arcade Stick. Mad Catz and Agetec created racing wheels for racing games. Sega decided against releasing its official Dreamcast light guns in the U.S., but some third party light guns were available. The Dreamcast supports a Sega fishing "reel and rod" motion controller and a keyboard for text entry. Although it was designed for fishing games such as Sega Bass Fishing, Soulcalibur was playable with the fishing controller, which translated vertical and horizontal movements into on-screen swordplay in a manner that was retroactively cited as a predecessor to the Wii Remote. The Japanese Dreamcast port of Sega's Cyber Troopers Virtual-On Oratorio Tangram supported a "Twin Sticks" peripheral, but the game's American publisher, Activision, opted not to release it in the U.S. The Dreamcast could connect to SNK's Neo Geo Pocket Color, predating Nintendo's GameCube – Game Boy Advance link cable. Sega also produced the Dreameye, a digital camera that could be connected to the Dreamcast and used to exchange pictures and participate in video chat over the system's Internet connection. Sega hoped developers would use the Dreameye for future software, as some later did with Sony's similar EyeToy peripheral. In addition, Sega investigated systems that would have allowed users to make telephone calls with the Dreamcast, and discussed with Motorola the development of an Internet-enabled cell phone that would have used technology from the console to enable quick downloads of games and other data. The console can supply video through several different accessories. The console came with A/V cables, considered at the time to be the standard for video and audio connectivity. Sega and various third parties also manufactured RF modulator connectors and S-Video cables. A VGA adapter allows Dreamcast games to be played on computer displays or enhanced-definition television sets in 480p. Game library Before the launch of the Dreamcast in Japan, Sega announced the release of its New Arcade Operation Machine Idea (NAOMI) arcade board, which served as a cheaper alternative to the Sega Model 3. NAOMI shared the same technology as the Dreamcast—albeit with twice as much system, video, and audio memory and a 160 Mbyte flash ROM board in place of a GD-ROM drive—allowing nearly identical home conversions of arcade games. The Atomiswave was itself based on the NAOMI so it also shares similarities with the Dreamcast. Games were ported from NAOMI to the Dreamcast by several leading Japanese arcade companies, including Capcom (Marvel vs. Capcom 2 and Project Justice), Tecmo (Dead or Alive 2), Treasure (Ikaruga), and Sega itself (F355 Challenge and Crazy Taxi). In what has been called "a brief moment of remarkable creativity", in 2000, Sega restructured its arcade and console development teams into nine semi-autonomous studios headed by the company's top designers. Studios included United Game Artists (UGA) (headed by former Sega Rally Championship producer Tetsuya Mizuguchi), Hitmaker (headed by Crazy Taxi creator and future Sega president Hisao Oguchi), Smilebit (headed by Shun Arai and including many former Panzer Dragoon and future Yakuza developers from Team Andromeda), Overworks (headed by Noriyoshi Oba and composed of developers from Sega franchises including Sakura Wars, Shinobi and Streets of Rage), Sega AM2 (Sega's most famous arcade studio and the developer of Sega's Virtua Fighter fighting game series, headed by the company's top developer, Yu Suzuki), and Sonic Team (the developer of Sega's flagship series, Sonic the Hedgehog, headed by Yuji Naka). Sega's design houses were encouraged to experiment and benefited from a relatively lax approval process, resulting in games such as Rez (an attempt to simulate synaesthesia in the form of a rail shooter), The Typing of the Dead (a version of The House of the Dead 2 remade into a touch typing trainer), Seaman (a pet simulator in which players use a microphone to interact with a grotesque humanoid fish whose growth is narrated by Leonard Nimoy), and Segagaga (a Japan-exclusive role-playing-game employing commentary on the perceived over-abundance of sequels produced by the video game industry, in which players are tasked with preventing Sega from going out of business). Sega also revived franchises from the Genesis era, such as Ecco the Dolphin. Sega's internal studios were consolidated starting in 2003, with Mizuguchi leaving the company following the merger of UGA with Sonic Team. UGA created the music game Space Channel 5, in which players help a female outer space news reporter named Ulala fight aliens with "groove energy" by dancing. Intended for a "female casual" audience, Space Channel 5 is considered one of Sega's "most daring and beloved" original properties, combining a "defiantly retro" and "uplifting" soundtrack with "dazzling" and "colorful" visual presentation—despite "a lack of real gameplay substance." Neither Space Channel 5 nor UGA's Rez were commercially successful, and Rez was only available in the U.S. market through a PS2 port released in limited quantities. Hitmaker's arcade ports included Crazy Taxi—an open-world arcade racing game known for its addictive gameplay, which sold over one million copies and has been frequently cited as one of the best Dreamcast games—and Virtua Tennis—which revitalized the tennis game genre with a simple two-button control scheme and use of minigames to test the player's technique. Smilebit's Jet Set Radio—in which players control a Tokyo-based gang of youthful, rebellious inline skaters called the "GGs", who use graffiti to claim territory from rival gangs while evading an oppressive police force—has been cited as a major example of Sega's commitment to original game concepts during the Dreamcast's lifespan. Lauded for composer Hideki Naganuma's "punchy, psychedelic" soundtrack incorporating elements of "J-pop and electro-funk" as well as its message of "self-expression and non-violent dissent", the game also popularized cel shaded graphics. Despite wide praise for its style, some criticized Jet Set Radio's gameplay as mediocre, and it failed to meet Sega's sales expectations. Produced by Rieko Kodama, the Overworks-developed traditional role-playing game Skies of Arcadia was acclaimed for its surreal Jules Verne-inspired fantasy world of floating islands and sky pirates, charming protagonists, unique emphasis on the environmental properties of weapons, exciting airship battles, and memorable plot (including a sequence viewed from multiple perspectives). AM2 developed what Sega hoped would be the Dreamcast's killer app, Shenmue, a "revenge epic in the tradition of Chinese cinema." The action-adventure game involved the quest of protagonist Ryo Hazuki to avenge his father's murder, but its main selling point was its rendition of the Japanese city of Yokosuka, which included a level of detail considered unprecedented for a video game. Incorporating a simulated day/night cycle with variable weather, non-player characters with regular schedules, and the ability to pick up and examine detailed objects (also introducing the Quick-time event in its modern form), Shenmue went over budget and was rumored to have cost Sega over $50 million. Originally planned as the first installment in an 11-part saga, Shenmue was eventually downsized to a trilogy—and only one sequel was ever released. While Shenmue was lauded for its innovation, visuals and music, its critical reception was mixed; points of criticism included "invisible walls" which limited the player's sense of freedom, boredom caused by the inability to progress without waiting for events scheduled to occur at specific times, excessive in-game cutscenes and a lack of challenge. According to Moore, Shenmue sold "extremely well", but the game had no chance of making a profit due to the Dreamcast's limited installed base. Shenmue II "was completed for a much more reasonable sum", while Sato defended Shenmue as an "investment [which] will someday be recouped" because "the development advances we learned ... can be applied to other games". In addition to the mixed reception for Shenmue, IGN's Travis Fahs stated that "the [Dreamcast] era wasn't as kind to [AM2] as earlier years"—citing (among others) F355 Challenge as an "acclaimed" arcade game that "didn't do much at home", and Genki's port of Virtua Fighter 3 as inferior to the arcade version, "which was already a couple years old and never as popular as its predecessors." The Virtua Fighter series would experience a "tremendous comeback" with the universally acclaimed Virtua Fighter 4—which saw a console release exclusively on PS2. As the first fully 3D platforming game starring Sega's mascot, Sonic the Hedgehog, Sonic Team's Sonic Adventure was considered "the centerpiece of the [Dreamcast] launch". Sonic Adventure garnered criticism for technical problems including erratic camera angles and glitches, but was praised for its "luscious" visuals, "vast, twisting environments" and iconic set pieces —including a segment in which Sonic runs down the side of a skyscraper —and has been described as the Sonic series' creative apex. However, it failed "to catch on with players in nearly the way that [Nintendo's] Mario 64 had done", perhaps due to a perceived lack of gameplay depth. Distinguished by its innovative use of multiple storylines with varied forms of play, Adventure sold 2.5 million copies, making it the Dreamcast's best-selling game. Sonic Team also developed the Dreamcast's first online game—ChuChu Rocket!—which was widely complimented for its addictive puzzle gameplay and "frantic" multiplayer matches, and the critically successful music game Samba de Amigo, which was noted for its expensive maracas peripheral and colorful aesthetic. Sonic Team's Phantasy Star Online, the first online console RPG, is considered a landmark game for refining and simplifing Diablos style of gameplay to appeal to console audiences. In sports, Visual Concepts' NFL 2K football series and its NBA 2K basketball series were critically acclaimed. NFL 2K was considered an outstanding launch game for its high-quality visuals and "insightful, context-friendly, and, yes, even funny commentary", while NFL 2K1 featured groundbreaking online multiplayer earlier than its chief competitor, EA's Madden NFL series. Madden and 2K continued to compete on other platforms through 2004—with the 2K series introducing innovations such as a first person perspective new to the genre, and eventually launching ESPN NFL 2K5 at the aggressively low price point of $19.95—until EA signed an exclusive agreement with the National Football League, "effectively putting every other pro-football game out of business." After Sega sold Visual Concepts for $24 million in 2005, the NBA 2K series continued with publisher Take-Two Interactive. During the Dreamcast's lifespan, Visual Concepts also collaborated with Sonic the Hedgehog level designer Hirokazu Yasuhara on the action-adventure game Floigan Bros. and developed the critically successful action game Ooga Booga. To appeal to the European market, Sega formed a French affiliate called No Cliché, which developed games such as Toy Commander. Sega Europe also approached Bizarre Creations to develop the critically successful racing game Metropolis Street Racer, which featured detailed recreations of London, Tokyo, and San Francisco—complete with consistent time zones and fictional radio stations—and 262 individual race tracks. Although Acclaim, SNK, Ubisoft, Midway, Activision, Infogrames, and Capcom supported the system during its first year, third-party developer support proved difficult to obtain due to the failure of the Sega Saturn and the profitability of publishing for the PlayStation. Namco's Soulcalibur, for example, was released for the Dreamcast because of the relative unpopularity of the Soul series at the time; Namco's more successful Tekken franchise was associated with the PlayStation console and PlayStation-based arcade boards. Nevertheless, Soulcalibur received overwhelming critical acclaim and has been frequently described as one of the best games for the system. Capcom produced a number of fighting games for the system, including the Power Stone series, in addition to a temporary exclusive in the popular Resident Evil series called Resident Evil - Code: Veronica. The Dreamcast is also known for several shoot 'em ups, most notably Treasure's Bangai-O and Ikaruga. In January 2000, three months after the system's |
is also present in the molecules of phospholipase and several cytoplasmic tyrosine kinases such as Abl and Src. It has also been identified in several other protein families such as: PI3 Kinase, Ras GTPase-activating protein, CDC24 and cdc25. SH3 domains are found in proteins of signaling pathways regulating the cytoskeleton, the Ras protein, and the Src kinase and many others. The SH3 proteins interact with adaptor proteins and tyrosine kinases. Interacting with tyrosine kinases, SH3 proteins usually bind far away from the active site. Approximately 300 SH3 domains are found in proteins encoded in the human genome. In addition to that, the SH3 domain was responsible for controlling protein-protein interactions in the signal transduction pathways and regulating the interactions of proteins involved in the cytoplasmic signaling. Structure The SH3 domain has a characteristic beta-barrel fold that consists of five or six β-strands arranged as two tightly packed anti-parallel β sheets. The linker regions may contain short helices. The SH3-type fold is an ancient fold found in eukaryotes as well as prokaryotes. Peptide binding The classical SH3 domain is usually found in proteins | recently, SH3 domains that bind to a core consensus motif R-x-x-K have been described. Examples are the C-terminal SH3 domains of adaptor proteins like Grb2 and Mona (a.k.a. Gads, Grap2, Grf40, GrpL etc.). Other SH3 binding motifs have emerged and are still emerging in the course of various molecular studies, highlighting the versatility of this domain. SH3 interactomes SH3 domain-mediated protein-protein interaction networks, i.e., SH3 interactomes, revealed that worm SH3 interactome resembles the analogous yeast network because it is significantly enriched for proteins with roles in endocytosis. Nevertheless, orthologous SH3 domain-mediated interactions are highly rewired between worm and yeast. Proteins with SH3 domain Signal transducing adaptor proteins CDC24 Cdc25 PI3 kinase Phospholipase Ras GTPase-activating protein Vav proto-oncogene GRB2 p54 S6 kinase 2 (S6K2) SH3D21 ARMH3 (potentially) STAC3 Some myosins SH3 and multiple ankyrin repeat domains: SHANK1, SHANK2, SHANK3 YAP1 ARHGAP12 vexin (VXN) TANGO1 Integrase Focal Adhesion Kinase (FAK, PTK2) Proline-rich tyrosine kinase (Pyk2, CADTK, PTK2beta) TRIP10 (cip4) See also Src homology 2 domain-containing Structural domain References External links Nash Lab Protein |
this means: closed forms, i.e., , have zero integral over boundaries, i.e. over manifolds that can be written as , and exact forms, i.e., , have zero integral over cycles, i.e. if the boundaries sum up to the empty set: . De Rham's theorem shows that this homomorphism is in fact an isomorphism. So the converse to 1 and 2 above hold true. In other words, if are cycles generating the th homology group, then for any corresponding real numbers, , there exist a closed form, , such that and this form is unique up to exact forms. Stokes' theorem on smooth manifolds can be derived from Stokes' theorem for chains in smooth manifolds, and vice versa. Formally stated, the latter reads: Underlying principle To simplify these topological arguments, it is worthwhile to examine the underlying principle by considering an example for dimensions. The essential idea can be understood by the diagram on the left, which shows that, in an oriented tiling of a manifold, the interior paths are traversed in opposite directions; their contributions to the path integral thus cancel each other pairwise. As a consequence, only the contribution from the boundary remains. It thus suffices to prove Stokes' theorem for sufficiently fine tilings (or, equivalently, simplices), which usually is not difficult. Generalization to rough sets The formulation above, in which is a smooth manifold with boundary, does not suffice in many applications. For example, if the domain of integration is defined as the plane region between two -coordinates and the graphs of two functions, it will often happen that the domain has corners. In such a case, the corner points mean that is not a smooth manifold with boundary, and so the statement of Stokes' theorem given above does not apply. Nevertheless, it is possible to check that the conclusion of Stokes' theorem is still true. This is because and its boundary are well-behaved away from a small set of points (a measure zero set). A version of Stokes' theorem that allows for roughness was proved by Whitney. Assume that is a connected bounded open subset of . Call a standard domain if it satisfies the following property: There exists a subset of , open in , whose complement in has Hausdorff -measure zero; and such that every point of has a generalized normal vector. This is a vector such that, if a coordinate system is chosen so that is the first basis vector, then, in an open neighborhood around , there exists a smooth function such that is the graph and is the region . Whitney remarks that the boundary of a standard domain is the union of a set of zero Hausdorff -measure and a finite or countable union of smooth -manifolds, each of which has the domain on only one side. He then proves that if is a standard domain in , is an -form which is defined, continuous, and bounded on , smooth on , integrable on , and such that is integrable on , then Stokes' theorem holds, that is, The study of measure-theoretic properties of rough sets leads to geometric measure theory. Even more general versions of Stokes' theorem have been proved by Federer and by Harrison. Special cases The general form of the Stokes theorem using differential forms is more powerful and easier to use than the special cases. The traditional versions can be formulated using Cartesian coordinates without the machinery of differential geometry, and thus are more accessible. Further, they are older and their names are more familiar as a result. The traditional forms are often considered more convenient by practicing scientists and engineers but the non-naturalness of the traditional formulation becomes apparent when using other coordinate systems, even familiar ones like spherical or cylindrical coordinates. There is potential for confusion in the way names are applied, and the use of dual formulations. Classical (vector calculus) case This is a (dualized) (1 + 1)-dimensional case, for a 1-form (dualized because it is a statement about vector fields). This special case is often just referred to as Stokes' theorem in many introductory university vector calculus courses and is used in physics and engineering. It is also sometimes known as the curl theorem. The classical Stokes' theorem relates the surface integral of the curl of a vector field over a surface in Euclidean three-space to the line integral of the vector field over its boundary. It is a special case of the general Stokes theorem (with ) once we identify a vector field with a 1-form using the metric on Euclidean 3-space. The curve of the line integral, , must have positive orientation, meaning that points counterclockwise when the surface normal, , points toward the viewer. One consequence of this theorem is that the field lines of a vector field with zero curl cannot be closed contours. The formula can be rewritten as: Green's theorem Green's theorem is immediately recognizable as the third integrand of both sides in the integral in terms of , , and cited above. In electromagnetism Two of the four Maxwell equations involve curls of 3-D vector fields, and their differential and integral forms are related | boundary. The boundary of is itself a manifold and inherits a natural orientation from that of . For example, the natural orientation of the interval gives an orientation of the two boundary points. Intuitively, inherits the opposite orientation as , as they are at opposite ends of the interval. So, "integrating" over two boundary points , is taking the difference . In even simpler terms, one can consider the points as boundaries of curves, that is as 0-dimensional boundaries of 1-dimensional manifolds. So, just as one can find the value of an integral () over a 1-dimensional manifold () by considering the anti-derivative () at the 0-dimensional boundaries (), one can generalize the fundamental theorem of calculus, with a few additional caveats, to deal with the value of integrals () over -dimensional manifolds () by considering the antiderivative () at the -dimensional boundaries () of the manifold. So the fundamental theorem reads: Formulation for smooth manifolds with boundary Let be an oriented smooth manifold with boundary of dimension and let be a smooth -differential form that is compactly supported on . First, suppose that is compactly supported in the domain of a single, oriented coordinate chart . In this case, we define the integral of over as i.e., via the pullback of to . More generally, the integral of over is defined as follows: Let be a partition of unity associated with a locally finite cover of (consistently oriented) coordinate charts, then define the integral where each term in the sum is evaluated by pulling back to as described above. This quantity is well-defined; that is, it does not depend on the choice of the coordinate charts, nor the partition of unity. The generalized Stokes theorem reads: Conventionally, is abbreviated as , since the pullback of a differential form by the inclusion map is simply its restriction to its domain: . Here is the exterior derivative, which is defined using the manifold structure only. The right-hand side is sometimes written as to stress the fact that the -manifold has no boundary. (This fact is also an implication of Stokes' theorem, since for a given smooth -dimensional manifold , application of the theorem twice gives for any -form , which implies that .) The right-hand side of the equation is often used to formulate integral laws; the left-hand side then leads to equivalent differential formulations (see below). The theorem is often used in situations where is an embedded oriented submanifold of some bigger manifold, often , on which the form is defined. Topological preliminaries; integration over chains Let be a smooth manifold. A (smooth) singular -simplex in is defined as a smooth map from the standard simplex in to . The group of singular -chains on is defined to be the free abelian group on the set of singular -simplices in . These groups, together with the boundary map, , define a chain complex. The corresponding homology (resp. cohomology) group is isomorphic to the usual singular homology group (resp. the singular cohomology group ), defined using continuous rather than smooth simplices in . On the other hand, the differential forms, with exterior derivative, , as the connecting map, form a cochain complex, which defines the de Rham cohomology groups . Differential -forms can be integrated over a -simplex in a natural way, by pulling back to . Extending by linearity allows one to integrate over chains. This gives a linear map from the space of -forms to the th group of singular cochains, , the linear functionals on . In other words, a -form defines a functional on the -chains. Stokes' theorem says that this is a chain map from de Rham cohomology to singular cohomology with real coefficients; the exterior derivative, , behaves like the dual of on forms. This gives a homomorphism from de Rham cohomology to singular cohomology. On the level of forms, this means: closed forms, i.e., , have zero integral over boundaries, i.e. over manifolds that can be written as , and exact forms, i.e., , have zero integral over cycles, i.e. if the boundaries sum up to the empty set: . De Rham's theorem shows that this homomorphism is in fact an isomorphism. So the converse to 1 and 2 above hold true. In other words, if are cycles generating the th homology group, then for any corresponding real numbers, , there exist a closed form, , such that and this form is unique up to exact forms. Stokes' theorem on smooth manifolds can be derived from Stokes' theorem for chains in smooth manifolds, and vice versa. Formally stated, the latter reads: Underlying principle To simplify these topological arguments, it is worthwhile to examine the underlying principle by considering an example for dimensions. The essential idea can be understood by the diagram on the left, which shows that, in an oriented tiling of a manifold, the interior paths are traversed in opposite directions; their contributions to the path integral thus cancel each other pairwise. As a consequence, only the contribution from the boundary remains. It thus suffices to prove Stokes' theorem for sufficiently fine tilings (or, equivalently, simplices), which usually is not difficult. Generalization to rough sets The formulation above, in which is a smooth manifold with boundary, does not suffice in many applications. For example, if the domain of integration is defined as the plane region between two -coordinates and the graphs of two functions, it will often happen that the domain has corners. In such a case, the corner points mean that is not a smooth manifold with boundary, and so the statement of Stokes' theorem given above does not apply. Nevertheless, it is possible to check that the conclusion of Stokes' theorem is still true. This is because and its boundary are well-behaved away from a small set of points (a measure zero set). A version of Stokes' theorem that allows for roughness was proved by Whitney. Assume that is a connected bounded open subset of . Call a standard domain if it satisfies the following property: There exists a subset of , open in , whose complement in has Hausdorff -measure zero; and such that every point of has a generalized normal vector. This is a vector such that, if a coordinate system is chosen so that is the first basis vector, then, in an open neighborhood around , there exists a smooth function such that is the graph and is the region . Whitney remarks that the boundary of a standard domain is the union of a set of zero Hausdorff -measure and a finite or countable union of smooth -manifolds, each of which has the domain |
Before the adoptive parents could return home to China, however, it was discovered that one of the babies was, in fact, the biological son of the surrogate. Doctors confirmed that the birth-mother had become pregnant with her and her partner's child roughly three weeks after becoming pregnant with the Chinese couple's child. There have been multiple cases reported to local US doctors with a week or less difference in age of twins and women who report two surges of ovulation occurring within a few days of each other. Though rare, this condition is believed to affect as many as 0.3% of women but often one twin is lost so the true numbers are not known. Research has found 10% of women released two eggs in a cycle, but both at the end of the same "wave" of follicullogenesis, which doesn't actually support the theory of superfetation in humans. In September 2020, a woman in Wiltshire, England, gave birth to fraternal twins who were conceived three weeks apart. Other animals Superfetation is normal for some species of poeciliid fish and has been clearly demonstrated for the European brown hare. In domestic cats, superfecundation is common but superfetation never has been definitively proven to occur. | occur during the same menstrual cycle, it is known as superfecundation. Humans While proposed cases of superfetation have been reported in humans, the existence of this phenomenon in humans has been deemed unlikely. Better explanations include differential growth between twins due to various reasons such as twin-to-twin transfusion syndrome. Artificially induced superfetation has been demonstrated, although only up to a short period after insemination. A 2008 French study found evidence to suggest that superfetation is a reality for humans, but that it is so rare that there have been fewer than 10 recorded cases in the world. In 2017, it was reported that an American woman who had agreed to act as a surrogate for a Chinese couple bore two babies initially believed to be twins. Before the adoptive parents could return home to China, however, it was |
process. The Steenbeck's lower light levels and controllable speed make it a preferred piece of equipment for film archives (such as the Library of Congress' motion picture collection) and restoration facilities as prints can be quickly and easily inspected with less risk of damage compared with a movie projector. Because there is no intermittent movement, the image is created through a rotating prism which scans the frames. Steenbeck machines were known to be exceptionally easy on film stock, due to their | has become synonymous with a type of flatbed film editing suite which is usable with both 16 mm and 35 mm optical sound and magnetic sound film. The Steenbeck company was founded in 1931 by Wilhelm Steenbeck in Hamburg, Germany. Since then, Steenbeck editing tables have become ubiquitous in the film editing community and have seen significant use in television production. In total, more than 25,000 machines are in operation around the world. The company relocated to Venray (The Netherlands) in September 2003, where it still manufactures editing tables. Despite the move away from physical film stock – much editing is now based on digital media – devices such as the Lightworks non-linear film editing controller and archives still use the Steenbeck for controlling the process. |
your own anatomy only, but to all creatures." Etymology The term speciesism, and the argument that it is a prejudice, first appeared in 1970 in a privately printed pamphlet written by British psychologist Richard D. Ryder. Ryder was a member of a group of academics in Oxford, England, the nascent animal rights community, now known as the Oxford Group. One of the group's activities was distributing pamphlets about areas of concern; the pamphlet titled "Speciesism" was written to protest against animal experimentation. The term was intended by its proponents to create a rhetorical and categorical link to racism and sexism. Ryder stated in the pamphlet that "[s]ince Darwin, scientists have agreed that there is no 'magical' essential difference between humans and other animals, biologically-speaking. Why then do we make an almost total distinction morally? If all organisms are on one physical continuum, then we should also be on the same moral continuum." He wrote that, at that time in the United Kingdom, 5,000,000 animals were being used each year in experiments, and that attempting to gain benefits for our own species through the mistreatment of others was "just 'speciesism' and as such it is a selfish emotional argument rather than a reasoned one". Ryder used the term again in an essay, "Experiments on Animals", in Animals, Men and Morals (1971), a collection of essays on animal rights edited by philosophy graduate students Stanley and Roslind Godlovitch and John Harris, who were also members of the Oxford Group. Ryder wrote: In as much as both "race" and "species" are vague terms used in the classification of living creatures according, largely, to physical appearance, an analogy can be made between them. Discrimination on grounds of race, although most universally condoned two centuries ago, is now widely condemned. Similarly, it may come to pass that enlightened minds may one day abhor "speciesism" as much as they now detest "racism." The illogicality in both forms of prejudice is of an identical sort. If it is accepted as morally wrong to deliberately inflict suffering upon innocent human creatures, then it is only logical to also regard it as wrong to inflict suffering on innocent individuals of other species. ... The time has come to act upon this logic. Spread of the idea The term was popularized by the Australian philosopher Peter Singer in his book Animal Liberation (1975). Singer had known Ryder from his own time as a graduate philosophy student at Oxford. He credited Ryder with having coined the term and used it in the title of his book's fifth chapter: "Man's Dominion ... a short history of speciesism", defining it as "a prejudice or attitude of bias in favour of the interests of members of one's own species and against those of members of other species": Racists violate the principle of equality by giving greater weight to the interests of members of their own race when there is a clash between their interests and the interests of those of another race. Sexists violate the principle of equality by favouring the interests of their own sex. Similarly, speciesists allow the interests of their own species to override the greater interests of members of other species. The pattern is identical in each case. Singer stated from a preference-utilitarian perspective, writing that speciesism violates the principle of equal consideration of interests, the idea based on Jeremy Bentham's principle: "each to count for one, and none for more than one." Singer stated that, although there may be differences between humans and nonhumans, they share the capacity to suffer, and we must give equal consideration to that suffering. Any position that allows similar cases to be treated in a dissimilar fashion fails to qualify as an acceptable moral theory. The term caught on; Singer wrote that it was an awkward word but that he could not think of a better one. It became an entry in the Oxford English Dictionary in 1985, defined as "discrimination against or exploitation of animal species by human beings, based on an assumption of mankind's superiority." In 1994 the Oxford Dictionary of Philosophy offered a wider definition: "By analogy with racism and sexism, the improper stance of refusing respect to the lives, dignity, or needs of animals of other than the human species." Anti-speciesism movement The French-language journal Cahiers antispécistes ("Antispeciesist notebooks") was founded in 1991, by David Olivier, Yves Bonnardel and Françoise Blanchon, who were the first French activists to speak out against speciesism. The aim of the journal was to disseminate anti-speciesist ideas in France and to encourage debate on the topic of animal ethics, specifically on the difference between animal liberation and ecology. Estela Díaz and Oscar Horta assert that in Spanish-speaking countries, unlike English-speaking countries, anti-speciesism has become the dominant approach for animal advocacy. In Italy, two distinct trends have been identified in the contemporary anti-speciesist movement, the first focusing on radical counter-hegemonic positions and the second on mainstream neoliberal ones. More recently, animal rights groups such as the Farm Animal Rights Movement and People for the Ethical Treatment of Animals have attempted to popularize the concept by promoting a World Day Against Speciesism on June 5. The World Day for the End of Speciesism is a similar annual observance held at the end of August. Social psychology and relationship with other prejudices Philosophers have argued there is a normative relationship between speciesism and other prejudices such as racism, sexism, homophobia and so forth. Studies suggest speciesism involves similar psychological processes and motivations as those underlying other prejudices. In the 2019 book Why We Love and Exploit Animals, Kristof Dhont, Gordon Hodson, Ana C. Leite, and Alina Salmen reveal the psychological connections between speciesism and other prejudices such as racism and sexism. Marjetka Golež Kaučič connects racism and speciesism saying that discriminations based on race and species are strongly interrelated, with human rights providing the legal ground for the development of the animal rights. Kaučič further argues that racism and speciesism are further connected to issues of freedom, both collective and individual. According to a study, people who score higher on speciesism also score higher on racism, sexism, and homophobia. Scholars say people supporting animal exploitation also tend to endorse racist and sexist views, furthering the beliefs in human supremacy and group dominance in order to justify systems of inequality and oppression. It is suggested that the connection rests in the ideology of social dominance. Psychologists have also considered examining speciesism as a specific psychological construct or attitude (as opposed to speciesism as a philosophy), which was achieved using a specifically designed Likert scale. Studies have found that speciesism is a stable construct that differs amongst personalities and correlates with other variables. For example, speciesism has been found to have a weak positive correlation with homophobia and right-wing authoritarianism, as well as slightly stronger correlations with political conservatism, racism and system justification. Moderate positive correlations were found with social dominance orientation and sexism. Social dominance orientation was theorised to be underpinning most of the correlations; controlling for social dominance orientation reduces all correlations substantially and renders many statistically insignificant. Speciesism likewise predicts levels of prosociality toward animals and behavioural food choices. Those who state that speciesism is unfair to individuals of nonhuman species have often invoked mammals and chickens in the context of research or farming. There is not yet a clear definition or line agreed upon by a significant segment of the movement as to which species are to be treated equally with humans or in some ways additionally protected: mammals, birds, reptiles, arthropods, insects, bacteria, etc. This question is all the more complex since a study by Miralles et al. (2019) has brought to light the evolutionary component of human empathic and compassionate reactions and the influence of anthropomorphic mechanisms in our affective relationship with the living world as a whole: the more an organism is evolutionarily distant from us, the less we recognize ourselves in it and the less we are moved by its fate. Some researchers have suggested that since speciesism could be considered, in terms of social psychology, a prejudice (defined as "any attitude, emotion, or behaviour toward members of a group, which directly or indirectly implies some negativity or antipathy toward that group"), then laypeople may be aware of a connection between it and other forms of "traditional" prejudice. Research suggests laypeople do indeed tend to infer similar personality traits and beliefs from a speciesist that they would from a racist, sexist or homophobe. However, it is not clear if there is a link between speciesism and non-traditional forms of prejudice such as negative attitudes towards the overweight or towards Christians. Psychological studies have furthermore argued that people tend to "morally value individuals of certain species less than others even when beliefs about intelligence and sentience are accounted for." Relationship with the animal–industrial complex Piers Beirne considers speciesism as the ideological anchor of the intersecting networks of the animal–industrial complex, such as factory farms, vivisection, hunting and fishing, zoos and aquaria, wildlife trade, and so forth. Amy Fitzgerald and Nik Taylor argue that the animal-industrial complex is both a consequence and cause of speciesism, which according to them is a form of discrimination similar to racism or sexism. They also argue that the obfuscation of meat's animal origins is a critical part of the animal–industrial complex under capitalist and neoliberal regimes. Speciesism results in the belief that humans have the right to use non-human animals, which is so pervasive in the modern society. Sociologist David Nibert states, Some scholars have argued that all kinds of animal production are rooted in speciesism, reducing animals to mere economic resources. Built on the production and slaughter of animals, the animal–industrial complex is perceived as the materialization of the institution of speciesism, with speciesism becoming "a mode of production". In his 2011 book Critical Theory and Animal Liberation, J. Sanbonmatsu argues that speciesism is not ignorance or the absence of a moral code towards animals, but is a mode of production and material system imbricated with capitalism. Arguments in favor Philosophical A common theme in defending speciesism is the argument that humans have the right to exploit other species to defend their own. Philosopher Carl Cohen stated in 1986: "Speciesism is not merely plausible; it is essential for right conduct, because those who will not make the morally relevant distinctions among species are almost certain, in consequence, to misapprehend their true obligations." Cohen writes that racism and sexism are wrong because there are no relevant differences between the sexes or races. Between people and animals, he states, there are significant differences; his view is that animals do not qualify for Kantian personhood, and as such have no rights. Nel Noddings, the American feminist, has criticized Singer's concept of speciesism for being simplistic, and for failing to take into account the context of species preference, as concepts of racism and sexism have taken into account the context of discrimination against humans. Peter Staudenmaier has stated that comparisons between speciesism and racism or sexism are trivializing: The central analogy to the civil rights movement and the women's movement is trivializing and ahistorical. Both of those social movements were initiated and driven by members of the dispossessed and excluded groups themselves, not by benevolent men or white people acting on their behalf. Both movements were built precisely around the idea of reclaiming and reasserting a shared humanity in the face of a society that had deprived it and denied it. No civil rights activist or feminist ever argued, "We're sentient beings too!" They argued, "We're fully human too!" Animal liberation doctrine, far from extending this humanist impulse, directly undermines it. A similar argument was made by Bernard Williams, who observed that a difference between speciesism versus racism and sexism is that racists and sexists deny any input from those of a different race or sex when it comes to questioning how they should be treated. Conversely, when it comes to how animals should be treated by humans, Williams observed that it is only possible for humans to discuss that question. Williams observed that being a human being is often used as an argument against discrimination on the grounds of race or sex, whereas racism and sexism are seldom deployed to counter discrimination. Williams also stated in favour of speciesism (which he termed 'humanism'), arguing that "Why are fancy properties which are grouped under the label of personhood "morally relevant" to issues of destroying a certain kind of animal, while the property of being a human being is not?" Williams states that to respond by arguing that it is because these are properties considered valuable by human beings does not undermine speciesism as humans also consider human beings to be valuable, thus justifying speciesism. Williams then states that the only way to resolve this would be by arguing that these properties are "simply better" but in that case, one would need to justify why these properties are better if not because of human attachment to them. Christopher Grau supported Williams, arguing that if one used properties like rationality, sentience and moral agency as criteria for moral status as an alternative to species-based moral status, then it would need to be shown why these particular properties are to be used instead of others; there must be something that gives them special status. Grau states that | dispossessed and excluded groups themselves, not by benevolent men or white people acting on their behalf. Both movements were built precisely around the idea of reclaiming and reasserting a shared humanity in the face of a society that had deprived it and denied it. No civil rights activist or feminist ever argued, "We're sentient beings too!" They argued, "We're fully human too!" Animal liberation doctrine, far from extending this humanist impulse, directly undermines it. A similar argument was made by Bernard Williams, who observed that a difference between speciesism versus racism and sexism is that racists and sexists deny any input from those of a different race or sex when it comes to questioning how they should be treated. Conversely, when it comes to how animals should be treated by humans, Williams observed that it is only possible for humans to discuss that question. Williams observed that being a human being is often used as an argument against discrimination on the grounds of race or sex, whereas racism and sexism are seldom deployed to counter discrimination. Williams also stated in favour of speciesism (which he termed 'humanism'), arguing that "Why are fancy properties which are grouped under the label of personhood "morally relevant" to issues of destroying a certain kind of animal, while the property of being a human being is not?" Williams states that to respond by arguing that it is because these are properties considered valuable by human beings does not undermine speciesism as humans also consider human beings to be valuable, thus justifying speciesism. Williams then states that the only way to resolve this would be by arguing that these properties are "simply better" but in that case, one would need to justify why these properties are better if not because of human attachment to them. Christopher Grau supported Williams, arguing that if one used properties like rationality, sentience and moral agency as criteria for moral status as an alternative to species-based moral status, then it would need to be shown why these particular properties are to be used instead of others; there must be something that gives them special status. Grau states that to claim these are simply better properties would require the existence of an impartial observer, an "enchanted picture of the universe", to state them to be so. Thus Grau states that such properties have no greater justification as criteria for moral status than being a member of a species does. Grau also states that even if such an impartial perspective existed, it still would not necessarily be against speciesism, since it is entirely possible that there could be reasons given by an impartial observer for humans to care about humanity. Grau then further observes that if an impartial observer existed and valued only minimalizing suffering, it would likely be overcome with horror at the suffering of all individuals and would rather have humanity annihilate the planet than allow it to continue. Grau thus concludes that those endorsing the idea of deriving values from an impartial observer do not seem to have seriously considered the conclusions of such an idea. Objectivist philosopher Leonard Peikoff stated: "By its nature and throughout the animal kingdom, life survives by feeding on life. To demand that man defer to the 'rights' of other species is to deprive man himself of the right to life. This is 'other-ism,' i.e. altruism, gone mad." Douglas Maclean agreed that Singer raised important questions and challenges, particularly with his argument from marginal cases. However, Maclean questioned if different species can be fitted with human morality, observing that animals were generally held exempt from morality; Maclean notes that most people would try to stop a man kidnapping and killing a woman but would regard a hawk capturing and killing a marmot with awe and criticise anyone who tried to intervene. Maclean thus suggests that morality only makes sense under human relations, with the further one gets from it the less it can be applied. The British philosopher Roger Scruton regards the emergence of the animal rights and anti-speciesism movement as "the strangest cultural shift within the liberal worldview", because the idea of rights and responsibilities is, he states, distinctive to the human condition, and it makes no sense to spread them beyond our own species. Scruton argues that if animals have rights, then they also have duties, which animals would routinely violate, such as by breaking laws or killing other animals. He accuses anti-speciesism advocates of "pre-scientific" anthropomorphism, attributing traits to animals that are, he says, Beatrix Potter-like, where "only man is vile." It is, he states, a fantasy, a world of escape. Thomas Wells states that Singer's call for ending animal suffering would justify simply exterminating every animal on the planet in order to prevent the numerous ways in which they suffer, as they could no longer feel any pain. Wells also stated that by focusing on the suffering humans inflict on animals and ignoring suffering animals inflict upon themselves or that inflicted by nature, Singer is creating a hierarchy where some suffering is more important than others, despite claiming to be committed to equality of suffering. Wells also states that the capacity to suffer, Singer's criteria for moral status, is one of degree rather than absolute categories; Wells observes that Singer denies moral status to plants on the grounds they cannot subjectively feel anything (even though they react to stimuli), yet Wells alleges there is no indication that nonhuman animals feel pain and suffering the way humans do. Robert Nozick notes that if species membership is irrelevant, then this would mean that endangered animals have no special claim. Religious The Rev. John Tuohey, founder of the Providence Center for Health Care Ethics, writes that the logic behind the anti-speciesism critique is flawed, and that, although the animal rights movement in the United States has been influential in slowing animal experimentation, and in some cases halting particular studies, no one has offered a compelling argument for species equality. Some proponents of speciesism believe that animals exist so that humans may make use of them. They state that this special status conveys special rights, such as the right to life, and also unique responsibilities, such as stewardship of the environment. This belief in human exceptionalism is often rooted in the Abrahamic religions, such as the Book of Genesis 1:26: "Then God said, 'Let us make mankind in our image, in our likeness, so that they may rule over the fish in the sea and the birds in the sky, over the livestock and all the wild animals, and over all the creatures that move along the ground.'" Some Christian theologists assert that dominion refers to stewardship, not ownership. Jesus Christ taught that a person is worth more than many sparrows. But the Imago Dei may be personhood itself, although we humans have only achieved efficiencies in educating and otherwise acculturating humans. Proverbs 12:10 says that "Whoever is righteous has regard for the life of his beast, but the mercy of the wicked is cruel." Arguments against Moral community, argument from marginal cases Paola Cavalieri writes that the current humanist paradigm is that only human beings are members of the moral community and that all are worthy of equal protection. Species membership, she writes, is ipso facto moral membership. The paradigm has an inclusive side (all human beings deserve equal protection) and an exclusive one (only human beings have that status). She writes that it is not only philosophers who have difficulty with this concept. Richard Rorty (1931–2007) stated that most human beings – those outside what he called our "Eurocentric human rights culture" – are unable to understand why membership of a species would in itself be sufficient for inclusion in the moral community: "Most people live in a world in which it would be just too risky – indeed, it would often be insanely dangerous – to let one's sense of moral community stretch beyond one's family, clan or tribe." Rorty wrote: Such people are morally offended by the suggestion that they should treat someone who is not kin as if he were a brother, or a nigger as if he were white, or a queer as if he were normal, or an infidel as if she were a believer. They are offended by the suggestion that they treat people whom they do not think of as human as if they were human. When utilitarians tell them that all pleasures and pains felt by members of our biological species are equally relevant to moral deliberation, or when Kantians tell them that the ability to engage in such deliberation is sufficient for membership in the moral community, they are incredulous. They rejoin that these philosophers seem oblivious to blatantly obvious moral distinctions, distinctions that any decent person will draw. Much of humanity is similarly offended by the suggestion that the moral community be extended to nonhumans. Nonhumans do possess some moral status in many societies, but it generally extends only to protection against what Cavalieri calls "wanton cruelty". Anti-speciesists state that the extension of moral membership to all humanity, regardless of individual properties such as intelligence, while denying it to nonhumans, also regardless of individual properties, is internally inconsistent. According to the argument from marginal cases, if infants, the senile, the comatose, and the cognitively disabled (marginal-case human beings) have a certain moral status, then nonhuman animals must be awarded that status too since there is no morally relevant ability that the marginal-case humans have that nonhumans lack. American legal scholar Steven M. Wise states that speciesism is a bias as arbitrary as any other. He cites the philosopher R.G. Frey (1941–2012), a leading animal rights critic, who wrote in 1983 that, if forced to choose between abandoning experiments on animals and allowing experiments on "marginal-case" humans, he would choose the latter, "not because I begin a monster and end up choosing the monstrous, but because I cannot think of anything at all compelling that cedes all human life of any quality greater value than animal life of any quality." "Discontinuous mind" Richard Dawkins, the evolutionary biologist, wrote against speciesism in The Blind Watchmaker (1986), The Great Ape Project (1993), and The God Delusion (2006), elucidating the connection with evolutionary theory. He compares former racist attitudes and assumptions to their present-day speciesist counterparts. In the chapter "The one true tree of life" in The Blind Watchmaker, he states that it is not only zoological taxonomy that is saved from awkward ambiguity by the extinction of intermediate forms but also human ethics and law. Dawkins states that what he calls the "discontinuous mind" is ubiquitous, dividing the world into units that reflect nothing but our use of language, and animals into discontinuous species: The director of a zoo is entitled to "put down" a chimpanzee that is surplus to requirements, while any suggestion that he might "put down" a redundant keeper or ticket-seller would be greeted with howls of incredulous outrage. The chimpanzee is the property of the zoo. Humans are nowadays not supposed to be anybody's property, yet the rationale for discriminating against chimpanzees is seldom spelled out, and I doubt if there is a defensible rationale at all. Such is the breathtaking speciesism of our Christian-inspired attitudes, the abortion of a single human zygote (most of them are destined to be spontaneously aborted anyway) can arouse more moral solicitude and righteous indignation than the vivisection of any number of intelligent adult chimpanzees! ... The only reason we can be comfortable with such a double standard is that the intermediates between humans and chimps are all dead. Dawkins elaborated in a discussion with Singer at The Center for Inquiry in 2007 when asked whether he continues to eat meat: "It's a little bit like the position which many people would have held a couple of hundred years ago over slavery. Where lots of people felt morally uneasy about slavery but went along with it because the whole economy of the South depended upon slavery." Centrality of consciousness "Libertarian extension" is the idea that the intrinsic value of nature can be extended beyond sentient beings. This seeks to apply the principle of individual rights not only to all animals but also to objects without a nervous system such as trees, plants, and rocks. Ryder rejects this argument, writing that "value cannot exist in the absence of consciousness or potential consciousness. Thus, rocks and rivers and houses have no interests and no rights of their own. This does not mean, of course, that they are not of value to us, and to many other [beings who experience pain], including those who need them as habitats and who would suffer without them." Comparisons to the Holocaust David Sztybel states in his paper, "Can the Treatment of Animals Be Compared to the Holocaust?" (2006), that the racism of the Nazis is comparable to the speciesism inherent in eating meat or using animal by-products, particularly those |
so a contest was called to create a language that would be closer to fulfilling them. The design that won this contest became the Ada programming language. The resulting language followed the Steelman requirements closely, though not exactly. The Ada 95 revision of the language went beyond the Steelman requirements, targeting general-purpose systems in addition to embedded ones, and adding features supporting object-oriented programming. See also ALGOL 68 Pascal Smalltalk Ada References External links Department of Defense (June 1978), Requirements for High Order Computer Programming Languages: "Steelman" David A. Wheeler (1996), Introduction to Steelman On-Line (Version 1.2). SoftTech Inc. (1976), "Evaluation of ALGOL 68, Jovial J3B, Pascal, SIMULA 67, and TACPOL Versus TINMAN - | the United States Department of Defense in The Department of Defense Common High Order Language program in 1978. The predecessors of this document were called, in order, "Strawman", "Woodenman", "Tinman" and "Ironman". The requirements focused on the needs of embedded computer applications, and emphasised reliability, maintainability, and efficiency. Notably, they included exception handling facilities, run-time checking, and parallel computing. It was concluded that no existing language met these criteria to a sufficient extent, so a contest was called to create a language that would be closer to fulfilling them. The design that won this contest became the Ada programming language. The resulting language followed the Steelman requirements closely, though not exactly. The Ada 95 |
in voice communications if the frequency error is small enough, and amateur radio operators are sometimes tolerant of even larger frequency errors that cause unnatural-sounding pitch shifting effects). Lower sideband can also be recovered as the real part of the complex-conjugate, which represents the negative frequency portion of When is large enough that has no negative frequencies, the product is another analytic signal, whose real part is the actual lower-sideband transmission: The sum of the two sideband signals is: which is the classic model of suppressed-carrier double sideband AM. Practical implementations Bandpass filtering One method of producing an SSB signal is to remove one of the sidebands via filtering, leaving only either the upper sideband (USB), the sideband with the higher frequency, or less commonly the lower sideband (LSB), the sideband with the lower frequency. Most often, the carrier is reduced or removed entirely (suppressed), being referred to in full as single sideband suppressed carrier (SSBSC). Assuming both sidebands are symmetric, which is the case for a normal AM signal, no information is lost in the process. Since the final RF amplification is now concentrated in a single sideband, the effective power output is greater than in normal AM (the carrier and redundant sideband account for well over half of the power output of an AM transmitter). Though SSB uses substantially less bandwidth and power, it cannot be demodulated by a simple envelope detector like standard AM. Hartley modulator An alternate method of generation known as a Hartley modulator, named after R. V. L. Hartley, uses phasing to suppress the unwanted sideband. To generate an SSB signal with this method, two versions of the original signal are generated, mutually 90° out of phase for any single frequency within the operating bandwidth. Each one of these signals then modulates carrier waves (of one frequency) that are also 90° out of phase with each other. By either adding or subtracting the resulting signals, a lower or upper sideband signal results. A benefit of this approach is to allow an analytical expression for SSB signals, which can be used to understand effects such as synchronous detection of SSB. Shifting the baseband signal 90° out of phase cannot be done simply by delaying it, as it contains a large range of frequencies. In analog circuits, a wideband 90-degree phase-difference network is used. The method was popular in the days of vacuum tube radios, but later gained a bad reputation due to poorly adjusted commercial implementations. Modulation using this method is again gaining popularity in the homebrew and DSP fields. This method, utilizing the Hilbert transform to phase shift the baseband audio, can be done at low cost with digital circuitry. Weaver modulator Another variation, the Weaver modulator, uses only lowpass filters and quadrature mixers, and is a favored method in digital implementations. In Weaver's method, the band of interest is first translated to be centered at zero, conceptually by modulating a complex exponential with frequency in the middle of the voiceband, but implemented by a quadrature pair of sine and cosine modulators at that frequency (e.g. 2 kHz). This complex signal or pair of real signals is then lowpass filtered to remove the undesired sideband that is not centered at zero. Then, the single-sideband complex signal centered at zero is upconverted to a real signal, by another pair of quadrature mixers, to the desired center frequency. Full, reduced, and suppressed-carrier SSB Conventional amplitude-modulated signals can be considered wasteful of power and bandwidth because they contain a carrier signal and two identical sidebands. Therefore, SSB transmitters are generally designed to minimize the amplitude of the carrier signal. When the carrier is removed from the transmitted signal, it is called suppressed-carrier SSB. However, in order for a receiver to reproduce the transmitted audio without distortion, it must be tuned to exactly the same frequency as the transmitter. Since this is difficult to achieve in practice, SSB transmissions can sound unnatural, and if the error in frequency is great enough, it can cause poor intelligibility. In order to correct this, a small amount of the original carrier signal can be transmitted so that receivers with the necessary circuitry to synchronize with the transmitted carrier can correctly demodulate the audio. This mode of transmission is called reduced-carrier single-sideband. In other cases, it may be desirable to maintain some degree of compatibility with simple AM receivers, while still reducing the signal's bandwidth. This can be accomplished by transmitting single-sideband with a normal or slightly reduced carrier. This mode is called compatible (or full-carrier) SSB or amplitude modulation equivalent (AME). In typical AME systems, harmonic distortion can reach 25%, and intermodulation distortion can be much higher than normal, but minimizing distortion in receivers with envelope detectors is generally considered less important than allowing them to produce intelligible audio. A second, and perhaps more correct, definition of "compatible single sideband" (CSSB) refers to a form of amplitude and phase modulation in which the carrier is transmitted along with a series of sidebands that are predominantly above or below the carrier term. Since phase modulation is present in the generation of the signal, energy is removed from the carrier term and redistributed into the sideband structure similar to that which occurs in analog frequency modulation. The signals feeding the phase modulator and the envelope modulator are further phase-shifted by 90° with respect to each other. This places the information terms in quadrature with each other; the Hilbert transform of information to be transmitted is utilized to cause constructive addition of one sideband and cancellation of the opposite primary sideband. Since phase modulation is employed, higher-order terms are also generated. Several methods have been employed to reduce the impact (amplitude) of most of these higher-order terms. In one system, the phase-modulated term is actually the log of the value of the carrier level plus the phase-shifted audio/information term. This produces an ideal CSSB signal, where at low modulation levels only a first-order term on one side of the carrier is predominant. As the modulation level is increased, the carrier level is reduced while a second-order term increases substantially in amplitude. At the point of 100% envelope modulation, 6 dB of power is removed from the carrier term, and the second-order term is identical in amplitude to carrier term. The first-order sideband has increased in level until it is now at the same level as the formerly unmodulated carrier. At the point of 100% modulation, the spectrum appears identical to a normal double-sideband AM transmission, with the center term (now the primary audio term) at a 0 dB reference level, and both terms on either side of the primary sideband at −6 dB. The difference is that what appears to be the carrier has shifted by the audio-frequency term towards the "sideband in use". At levels below 100% modulation, the sideband structure appears quite asymmetric. When voice is conveyed by a CSSB source of this type, low-frequency components are dominant, while higher-frequency terms are lower by as much as 20 dB at 3 kHz. The result is that the signal occupies approximately 1/2 the normal bandwidth of a full-carrier, DSB signal. There is one catch: the audio term utilized to phase-modulate the carrier is generated based on a log function that is biased by the carrier level. At negative 100% modulation, the term is driven to zero (0), and the modulator becomes undefined. Strict modulation control must be employed to maintain stability of the system and avoid splatter. This system is of Russian origin and was described in the late 1950s. It is uncertain whether it was ever deployed. A second series of approaches was designed and patented by Leonard R. Kahn. The various Kahn systems removed the hard limit imposed by the use of the strict log function in the generation of the signal. Earlier Kahn systems utilized various methods to reduce the second-order term through the insertion of a predistortion component. One example of this method was also used to generate one of the Kahn independent-sideband (ISB) AM stereo signals. It was known as the STR-77 exciter method, having been introduced in 1977. Later, the system was further improved by use of an arcsine-based modulator that included a 1-0.52E term in the denominator of the arcsin generator equation. E represents the envelope term; roughly half the modulation term applied to the envelope modulator is utilized to reduce the second-order term of the arcsin "phase"-modulated path; thus reducing the second-order term in the undesired sideband. A multi-loop modulator/demodulator feedback approach was used to generate an accurate arcsin signal. This approach was introduced in 1984 and became known as the STR-84 method. It was sold by Kahn Research Laboratories; later, Kahn Communications, Inc. of NY. An additional audio processing device further improved the sideband structure by selectively applying pre-emphasis to the modulating signals. Since the envelope of all the signals described remains an exact copy of the information applied to the modulator, it can be demodulated without distortion by an envelope detector such as a simple diode. In a practical receiver, some distortion may be present, usually at a low level (in AM broadcast, always below 5%), due to sharp filtering and nonlinear group delay in the IF filters of the receiver, which act to truncate the compatibility sideband – those terms that are not the result of a linear process of simply envelope modulating the signal as would be the case in full-carrier DSB-AM – and rotation of phase of these compatibility terms such that they no longer cancel the quadrature distortion term caused by a first-order SSB term along with the carrier. The small amount of distortion caused by this effect is generally quite low and acceptable. The Kahn CSSB method was also briefly used by Airphone as the modulation method employed for early consumer telephone calls that could be placed from an aircraft to ground. This was quickly supplanted by digital modulation methods to achieve even greater spectral efficiency. While CSSB is seldom used today in the AM/MW broadcast bands worldwide, some amateur radio operators still experiment with it. Demodulation The front end of an SSB receiver is similar to that of an AM or FM receiver, consisting of a superheterodyne RF front end that produces a frequency-shifted version of the radio frequency (RF) signal within a standard intermediate frequency (IF) band. To recover the original signal from the IF SSB signal, the single sideband must | based on a log function that is biased by the carrier level. At negative 100% modulation, the term is driven to zero (0), and the modulator becomes undefined. Strict modulation control must be employed to maintain stability of the system and avoid splatter. This system is of Russian origin and was described in the late 1950s. It is uncertain whether it was ever deployed. A second series of approaches was designed and patented by Leonard R. Kahn. The various Kahn systems removed the hard limit imposed by the use of the strict log function in the generation of the signal. Earlier Kahn systems utilized various methods to reduce the second-order term through the insertion of a predistortion component. One example of this method was also used to generate one of the Kahn independent-sideband (ISB) AM stereo signals. It was known as the STR-77 exciter method, having been introduced in 1977. Later, the system was further improved by use of an arcsine-based modulator that included a 1-0.52E term in the denominator of the arcsin generator equation. E represents the envelope term; roughly half the modulation term applied to the envelope modulator is utilized to reduce the second-order term of the arcsin "phase"-modulated path; thus reducing the second-order term in the undesired sideband. A multi-loop modulator/demodulator feedback approach was used to generate an accurate arcsin signal. This approach was introduced in 1984 and became known as the STR-84 method. It was sold by Kahn Research Laboratories; later, Kahn Communications, Inc. of NY. An additional audio processing device further improved the sideband structure by selectively applying pre-emphasis to the modulating signals. Since the envelope of all the signals described remains an exact copy of the information applied to the modulator, it can be demodulated without distortion by an envelope detector such as a simple diode. In a practical receiver, some distortion may be present, usually at a low level (in AM broadcast, always below 5%), due to sharp filtering and nonlinear group delay in the IF filters of the receiver, which act to truncate the compatibility sideband – those terms that are not the result of a linear process of simply envelope modulating the signal as would be the case in full-carrier DSB-AM – and rotation of phase of these compatibility terms such that they no longer cancel the quadrature distortion term caused by a first-order SSB term along with the carrier. The small amount of distortion caused by this effect is generally quite low and acceptable. The Kahn CSSB method was also briefly used by Airphone as the modulation method employed for early consumer telephone calls that could be placed from an aircraft to ground. This was quickly supplanted by digital modulation methods to achieve even greater spectral efficiency. While CSSB is seldom used today in the AM/MW broadcast bands worldwide, some amateur radio operators still experiment with it. Demodulation The front end of an SSB receiver is similar to that of an AM or FM receiver, consisting of a superheterodyne RF front end that produces a frequency-shifted version of the radio frequency (RF) signal within a standard intermediate frequency (IF) band. To recover the original signal from the IF SSB signal, the single sideband must be frequency-shifted down to its original range of baseband frequencies, by using a product detector which mixes it with the output of a beat frequency oscillator (BFO). In other words, it is just another stage of heterodyning. For this to work, the BFO frequency must be exactly adjusted. If the BFO frequency is off, the output signal will be frequency-shifted (up or down), making speech sound strange and "Donald Duck"-like, or unintelligible. For audio communications, there is a common agreement about the BFO oscillator shift of 1.7 kHz. A voice signal is sensitive to about 50 Hz shift, with up to 100 Hz still bearable. Some receivers use a carrier recovery system, which attempts to automatically lock on to the exact IF frequency. The carrier recovery doesn't solve the frequency shift. It gives better S/N ratio on the detector output. As an example, consider an IF SSB signal centered at frequency = 45000 Hz. The baseband frequency it needs to be shifted to is = 2000 Hz. The BFO output waveform is . When the signal is multiplied by (aka heterodyned with) the BFO waveform, it shifts the signal to , and to , which is known as the beat frequency or image frequency. The objective is to choose an that results in = 2000 Hz. (The unwanted components at can be removed by a lowpass filter; for which an output transducer or the human ear may serve). There are two choices for : 43000 Hz and 47000 Hz, called low-side and high-side injection. With high-side injection, the spectral components that were distributed around 45000 Hz will be distributed around 2000 Hz in the reverse order, also known as an inverted spectrum. That is in fact desirable when the IF spectrum is also inverted, because the BFO inversion restores the proper relationships. One reason for that is when the IF spectrum is the output of an inverting stage in the receiver. Another reason is when the SSB signal is actually a lower sideband, instead of an upper sideband. But if both reasons are true, then the IF spectrum is not inverted, and the non-inverting BFO (43000 Hz) should be used. If is off by a small amount, then the beat frequency is not exactly , which can lead to the speech distortion mentioned earlier. SSB as a speech-scrambling technique SSB techniques can also be adapted to frequency-shift and frequency-invert baseband waveforms (voice inversion). This voice scrambling method was made by running the audio of one side band modulated audio sample through its opposite (e.g. running an LSB modulated audio sample through a radio running USB modulation). These effects were used, in conjunction with other filtering techniques, during World War II as a simple method for speech encryption. Radiotelephone conversations between the US and Britain were intercepted and "decrypted" by the Germans; they included some early conversations between Franklin D. Roosevelt and Churchill. In fact, the signals could be understood directly by trained operators. Largely to allow secure communications between Roosevelt and Churchill, the SIGSALY system of digital encryption was devised. Today, such simple inversion-based speech encryption techniques are easily decrypted using simple techniques and are no longer regarded as secure. Vestigial sideband (VSB) Limitation of single-sideband modulation being used for voice signals and not available for video/TV signals leads to the usage of vestigial sideband. A vestigial sideband (in radio communication) is a sideband that has been only partly cut off or suppressed. Television broadcasts (in analog video formats) use this method if the video is transmitted in AM, due to the large bandwidth used. It may also be used in digital transmission, such as the ATSC standardized 8VSB. The broadcast or transport channel for TV in countries that use NTSC or ATSC has a bandwidth of 6 MHz. To conserve bandwidth, SSB would be desirable, but the video signal has significant low-frequency content (average brightness) and has rectangular synchronising pulses. The engineering compromise is vestigial-sideband transmission. In vestigial sideband, the full upper sideband of bandwidth W2 = 4.0 MHz is transmitted, but only W1 = 0.75 MHz of the lower sideband is transmitted, along with a carrier. The carrier frequency is 1.25 MHz above the lower edge of the 6MHz wide channel. This effectively makes the system AM at low modulation frequencies and SSB at high modulation frequencies. The absence of the lower sideband components at high frequencies must be compensated for, and this is done in the IF amplifier. Frequencies for LSB and USB in amateur radio voice communication When single-sideband is used in amateur radio voice communications, it is common practice that for frequencies below 10 MHz, lower sideband (LSB) is used and for frequencies of 10 MHz and above, upper sideband (USB) is used. For example, on the 40 m band, voice communications often take place around 7.100 MHz using LSB mode. On the 20 m band at 14.200 MHz, USB mode would be used. An exception to this rule applies to the five discrete amateur channels on the 60-meter band (near 5.3 MHz) where FCC rules specifically require USB. Extended single sideband (eSSB) Extended single sideband is any J3E (SSB-SC) mode that exceeds the audio bandwidth of standard or traditional 2.9 kHz SSB J3E modes (ITU 2K90J3E) to support higher-quality sound. Amplitude-companded single-sideband modulation (ACSSB) Amplitude-companded single sideband (ACSSB) is a narrowband modulation method using a single sideband with a pilot tone, allowing an expander in the receiver to restore the amplitude that was severely compressed by the transmitter. It offers improved effective range over standard SSB modulation while simultaneously retaining backwards compatibility with standard SSB radios. ACSSB also offers reduced bandwidth and improved range for a given power level compared with narrow band FM modulation. Controlled-envelope single-sideband modulation (CESSB) The generation of standard SSB modulation results in large envelope overshoots well above the average envelope level for a sinusoidal tone (even when the audio signal is peak-limited). The standard SSB envelope peaks are due to truncation of the spectrum and nonlinear phase distortion from the approximation errors of the practical implementation of the required Hilbert transform. It was recently shown that suitable overshoot compensation (so-called controlled-envelope single-sideband modulation or CESSB) achieves about 3.8 dB of peak reduction for speech transmission. This results in an effective average power increase of about 140%. Although the generation of the CESSB signal can be integrated into the SSB modulator, it is feasible to separate the generation of the CESSB signal (e.g. in form of an external speech preprocessor) from a standard SSB radio. This requires that the standard SSB radio's modulator be linear-phase and have a sufficient bandwidth to pass the CESSB signal. If a standard SSB modulator meets these requirements, then the envelope control by the CESSB process is preserved. ITU designations In 1982, the International Telecommunication Union (ITU) designated the types of amplitude modulation: See also ACSSB, amplitude-companded single sideband Independent sideband Modulation for other examples of modulation techniques Sideband for more general information about a sideband References Sources |
Sisters of Bethany, an Anglican order of sisters Society of Systematic Biologists Städtische Strassenbahn Bern, a former public transport operator in Switzerland Statistics Norway (Statistisk sentralbyrå), a Norwegian government statistics bureau Stuttgarter Straßenbahnen, a public transport operator in Germany Sustainable South Bronx, an environmental justice organization Swedish School Beijing Military Sashastra Seema Bal, an Indian paramilitary force, formerly called Special Service Bureau Presidency of Defense Industries () of Turkey Secret Service Bureau, of the United Kingdom, now called the Secret Intelligence Service Services Selection Board, for the selection of candidates in officer cadre of Indian Armed Forces Special Service Battalion, a South African military unit Strategic Support Branch, a U.S Department of Defense intelligence agency Science and technology Secure Scuttlebutt Single-sideband modulation, in radio technology Single-stranded binding protein Single-strand break, a | a break in only one of the two strands on DNA Site-specific browser, for an intranet or the Internet Sjogren syndrome antigen B, a human gene Speculative Store Bypass, a hardware security flaw affecting many processors Spontaneous symmetry breaking, in physics Stabilized soil block, a type of compressed earth block, a building material Entertainment Super Smash Bros., a fighting game series featuring characters from various video game franchises, primarily Nintendo focused Super Smash Bros. (video game), the first game in the series Swet Shop Boys, a hip hop group Sonic Soldier Borgman, a Japanese animated television series Other uses Ship Submersible Ballistic, a submarine Standard Southern British, a name for a variety |
Europe's feudal nobility. The clan/gens/ród system survived the whole of Polish history. Heraldry Coats of arms were very important to the szlachta. Its heraldic system evolved together with neighbouring states in Central Europe, while differing in many ways from the heraldry of other European countries. Polish Knighthood had its counterparts, links and roots in Moravia, e.g. Poraj coat of arms and in Germany, e.g. Junosza coat of arms. Families who had a common origin would also share a coat of arms. They would also share their crest with families adopted into the clan. Sometimes unrelated families would be falsely attributed to a clan on the basis of similarity of crests. Some noble families inaccurately claimed clan membership. The number of coats of arms in this system was comparatively low and did not exceed 200 in the late Middle Ages. There were 40,000 in the late 18th century. At the Union of Horodło, forty-seven families of Catholic Lithuanian lords and boyars were adopted by Polish szlachta families and allowed to use Polish coats of arms. Heritability The tradition of differentiating between a coat of arms and a lozenge granted to women, did not develop in Poland. By the 17th century, invariably, men and women inherited a coat of arms from their father. When mixed marriages developed after the partitions, that is between commoners and members of the nobility, as a courtesy, children could claim a coat of arms from their distaff side, but this was only tolerated and could not be passed on to the next generation. The brisure was rarely used. All children would inherit the coat of arms and title of their father. This partly accounts for the relatively large proportion of Polish families who had claim to a coat of arms by the 18th century. Another factor was the arrival of titled foreign settlers, especially from the German lands and the Habsburg Empire. Illegitimate children could adopt the mother's surname and title by the consent of the mother's father, but would sometimes be adopted and raised by the natural father's family, thereby acquiring the father's surname, though not the title or arms. Ennoblement Kingdom of Poland The number of lawfully granted ennoblements (naturalization) after the 15th century was minimal. In the Kingdom of Poland and later in the Polish–Lithuanian Commonwealth, ennoblement (nobilitacja) may be equated with an individual given legal status as a szlachcic member of the Polish nobility. Initially, this privilege could be granted by the monarch, but from 1641 onward, this right was reserved for the sejm. Most often the individual being ennobled would join an existing noble szlachta clan and assume the undifferentiated coat of arms of that clan. According to heraldic sources, the total number of lawful ennoblements issued between the 14th century and the mid-18th century is estimated at 800. This is an average of only about two ennoblements per year, or only 0.000,000,14 – 0.000,001 of the historical population. Compare: historical demography of Poland. Charles-Joseph, 7th Prince of Ligne, when trying to obtain Polish noble status, supposedly said in 1784, "It is easier to become a duke in Germany, than to be counted among Polish nobles." The close of the late 18th century (see below) was a period in which a definite increase in the number of ennoblements can be noted. This can most readily be explained in terms of the ongoing decline and eventual collapse of the Commonwealth and the resulting need for soldiers and other military leaders (see: Partitions of Poland, King Stanisław August Poniatowski). Estimated number of ennoblements According to heraldic sources 1,600 is the total estimated number of all lawful ennoblements throughout the history of Kingdom of Poland and Polish–Lithuanian Commonwealth from the 14th century onward (half of which were performed in the final years of the late 18th century). Types of ennoblement: Adopcja herbowa – The "old way" of ennoblement, popular in the 14th century, connected with adoption into an existing szlachta clan by an act of the king. The king granted a fragment of his own coat of arms establishing an alliance with the king's family, or a knight performed an adoption under their coat of arms, which required the confirmation of the king. This form of ennoblement was abolished in the 17th century. Skartabellat – Introduced by pacta conventa of the 17th century (since 1669), this was ennoblement into a sort of "conditional" or "graduated nobility" status. Skartabels could not hold public offices or be members of the Sejm, but after three generations, the descendants of these families would "mature" to full szlachta status. In 1775 another requirement was imposed - they had to acquire a landed estate. Indygenat – from the Latin expression, indigenatus, recognition of foreign noble status. A foreign noble, after acquiring indygenat status, received all privileges of a Polish szlachcic. In Polish history, 413 foreign noble families were recognized. Prior to the 17th century this was done by the King and Sejm, after the 17th century it was done only by the Sejm. "secret ennoblement" – This was of questionable legal status and was often not recognized by many szlachta members. It was typically granted by the elected monarch without the required legal approval of the Sejm. Grand Duchy of Lithuania In the late 14th century, in the Grand Duchy of Lithuania, Vytautas the Great reformed the Grand Duchy's army: instead of calling all men to arms, he created forces comprising professional warriors—bajorai ("nobles"; see the cognate "boyar"). As there were not enough nobles, Vytautas trained suitable men, relieving them of labor on the land and of other duties; for their military service to the Grand Duke, they were granted land that was worked by hired men (veldams). The newly formed noble families generally took up, as their family names, the Lithuanian pagan given names of their ennobled ancestors; this was the case with the Goštautai, Radvilos, Astikai, Kęsgailos and others. These families were granted their coats of arms under the Union of Horodlo (1413). In 1506, King Sigismund I the Old confirmed the position of the Lithuanian Council of Lords in state politics and limited entry into the nobility. Privileges Specific rights of the szlachta included: The right to hold outright ownership of land (Allod)—not as a fief, conditional upon service to the liege Lord, but absolutely in perpetuity unless sold. The szlachta had a monopoly on land. Peasants did not own land. See Polish landed gentry (Ziemiaństwo). The right to join in political and military assemblies of the regional nobility. The right to form independent administrative councils for their locality. The right to cast a vote for Polish Kings. The right to travel freely anywhere in the old Commonwealth of the Polish and Lithuanian nobility; or outside it, as foreign policy dictated. The right to demand information from Crown offices. The right to spiritual semi-independence from the clergy. The right to interdict, in suitable ways, the passage of foreigners and townsmen through their territories. The right of priority over the courts of the peasantry. Special rights in Polish courts, including freedom from arbitrary arrest and freedom from corporal punishment. The right to sell their military or administrative services. Heraldic rights. The right to receive higher pay when entitled in the "Levée en masse" (mobilization of the szlachta for defence of the nation). Educational rights The right of importing duty-free goods often. The exclusive right to enter the clergy until the time of the three partitions of Poland. The right to try their peasants for major offences (reduced to minor offences only, after the 1760s). Significant legislative changes in the status of the szlachta, as defined by Robert Bideleux and Ian Jeffries, consist of its 1374 exemption from the land tax, a 1425 guarantee against the 'arbitrary arrests and/or seizure of property' of its members, a 1454 requirement that military forces and new taxes be approved by provincial Sejms, and statutes issued between 1496 and 1611 that prescribed the rights of commoners. Real and false nobles Nobles were born into a noble family, or adopted into a noble clan by an act of the King (this was abolished in 1633). The rarest way of achieving szlachta status was through ennoblement (naturalization) by a king or Sejm for reasons such as bravery in combat, service to the state, etc. There were claims some nobles were, in fact, usurpers who were commoners that moved to another part of the country and falsely claimed noble status. In the first half of the 16th century, hundreds of such "false nobles" were denounced by (1550-1630) in his "Liber generationis plebeanorum (Liber chamorum)", or "Book of Plebeian Genealogy (Ham's Book)". Peasants were considered descendants of Ham, the son of Noah subject to bondage under the Curse of Ham. The law forbade commoners holding landed estates and promised such estates as a reward to denouncers. Trepka was himself an impoverished nobleman who lived a town dweller's life and documented hundreds of such false claims hoping to take over one of the usurped estates. He does not seem to have succeeded in his quest despite his employment as the king's secretary. Many sejms issued decrees over the centuries in an attempt to resolve this issue, but with little success. It is unknown what percentage of the Polish nobility came from the 'lower orders' of society, but there are historians who claim nobles of such base origins formed a 'significant' element of the szlachta. Self-promotion and aggrandizement were not confined to commoners. Often, members of the lower szlachta sought further ennoblement from foreign, therefore less verifiable, sources. That is, they might acquire by legitimate means or otherwise, such as by purchase, one of a selection of foreign titles ranging from Baron, Marchese, Freiherr to Comte, all readily translatable into the Polish Hrabia. Alternatively, they would simply appropriate a title by conferring it upon themselves. An example of this is cited in the case of the last descendant of the Ciechanowiecki family, who managed to restore a genuinely old Comital title, but whose actual origins are shrouded in 18th-century mystery. Accretion of sovereignty to the szlachta The szlachta secured many rights not secured to the nobility of other countries. Over time, each new monarch ceded to them further privileges. Those privileges became the basis of the Golden Liberty in the Polish–Lithuanian Commonwealth. Despite having a king, Poland was considered the 'nobility's Commonwealth' because Royal elections in Poland were in the hands of members of a hereditary class. Poland was therefore the domain of this class, and not that of the king or the ruling dynasty. This arose in part because of the extinction of male heirs in the original royal dynasties: first, the Piasts, then the Jagiellons. As a result, the nobility took it upon itself to choose "the Polish king" from among the dynasties' matrilinial descendants. Poland's successive kings granted privileges to the nobility upon their election to the throne - the privileges having been specified in the king-elect's Pacta conventa - and at other times, in exchange for ad hoc leave to raise an extraordinary tax or a pospolite ruszenie, a military call up. Poland's nobility thus accumulated a growing array of privileges and immunities. In 1355 in Buda King Casimir III the Great issued the first country-wide privilege for the nobility, in exchange for their agreeing that if Casimir had no male heirs, the throne would pass to his nephew, Louis I of Hungary. Casimir further decreed that the nobility would no longer be subject to 'extraordinary' taxes or have to use their own funds for foreign military expeditions. Casimir also promised that when the royal court toured, the king and the court would cover all expenses, instead of requiring facilities to be provided by the local nobility. Privilege of Koszyce and others In 1374 King Louis of Hungary approved the Privilege of Koszyce (przywilej koszycki) to guarantee the Polish throne for his daughter, Jadwiga. He broadened the definition of membership of the nobility and exempted the entire class from all but one tax (łanowy) a limit of 2 groszes per łan of land, Old Polish units of measurement. In addition, the King's right to raise taxes was effectively abolished: no new taxes would be levied without the agreement of the nobility. Henceforth, district offices were also reserved exclusively for local nobility, as the Privilege of Koszyce forbade the king to grant official posts and major Polish castles to foreign knights. Finally, the privilege obliged the king to pay indemnities to nobles injured or taken captive during a war outside Polish borders. In 1422 King Władysław II Jagiełło was constrained by the Privilege of Czerwińsk (przywilej czerwiński), which established the inviolability of nobles' property. Their estates could not be confiscated except upon the verdict of a court. It also made him cede some jurisdiction over fiscal policy to the Royal Council, later, the Senate of Poland, including the right to mint coinage. In 1430, with the Privileges of Jedlnia, confirmed at Kraków in 1433, Polish: przywileje jedlneńsko-krakowskie, based partially on his earlier Brześć Kujawski privilege (April 25, 1425), King Władysław II Jagiełło granted the nobility a guarantee against arbitrary arrest, similar to the English Magna Carta's habeas corpus, known from its own Latin name as "neminem captivabimus nisi jure victum". Henceforth, no member of the nobility could be imprisoned without a warrant from a court of justice. The king could neither punish nor imprison any noble on a whim. King Władysław's quid pro quo for the easement was the nobles' guarantee that the throne would be inherited by one of his sons, who would be bound to honour the privileges granted earlier to the nobility. On May 2, 1447, the same king issued the Wilno Pact, or Wilno Privilege, which gave the Lithuanian boyars the same rights as those already secured by the Polish szlachta. In 1454, King Casimir IV granted the Nieszawa Statutes - Polish: statuty cerkwicko-nieszawskie, clarifying the legal basis of voivodship sejmiks - local parliaments. The king could promulgate new laws, raise taxes, or call for a mass military call up pospolite ruszenie, only with the consent of the sejmiks, and the nobility were protected from judicial abuses. The Nieszawa Statutes also curbed the power of the magnates, as the Sejm, the national parliament, had the right to elect many officials, including judges, voivods and castellans. These privileges were demanded by the szlachta in exchange for their participation in the Thirteen Years' War. First Royal Election The first "free election" (Polish: wolna elekcja) of a king took place in 1492. In fact, some earlier Polish kings had been elected with help from assemblies such as those that put Casimir II on the throne, thereby setting a precedent for free elections. Only senators voted in the 1492 free election, which was won by John I Albert. For the duration of the Jagiellonian Dynasty, only members of that royal family were considered for election. Later, there would be no restrictions on the choice of candidates. In 1493 the Sejm, began meeting every two years at Piotrków. It comprised two chambers: a Senate of 81 bishops and other dignitaries a Chamber of Deputies of 54 deputies representing their respective domains. The numbers of senators and deputies later increased. On April 26, 1496, King John I Albert granted the Privilege of Piotrków. The Statutes of Piotrków increased the nobility's feudal power over serfs. It bound the peasant to the land, and only one son though not the eldest, was permitted to leave the village. Townsfolk mieszczaństwo were prohibited from owning land. Positions in the Church hierarchy were restricted to nobles. On 23 October 1501, the Polish–Lithuanian union was reformed by the Union of Mielnik. It was there that the tradition of a coronation Sejm was founded. Here again, the lesser nobility, lesser in wealth only - not in rank - attempted to reduce the power of the Magnates with a law that made them impeachable before the Senate for malfeasance. However, the Act of Mielnik of 25 October did more to strengthen the Magnate-dominated Senate of Poland than the lesser nobility. Nobles as a whole were given the right to disobey the King or his representatives — non praestanda oboedientia, and to form confederations, armed opposition against the king or state officials if the nobles found that the law or their legitimate privileges were being infringed. On 3 May 1505 King Alexander I Jagiellon granted the Act of Nihil novi nisi commune consensu - "I accept nothing new except by common consent". This forbade the king to pass new laws without the consent of the representatives of the nobility in the assembled Sejm, thus greatly strengthening the nobility's powers. Essentially, this act marked the transfer of legislative power from the king to the Sejm. It also marks the beginning of the First Rzeczpospolita, the period of a szlachta-run "Commonwealth". In 1520 the Act of Bydgoszcz granted the Sejm the right to convene every four years, with or without the king's permission. At about that time the Executionist Movement, seeking to oversee law enforcement, began to take shape. Its members sought to curb the power of the Magnates at the Sejm and to strengthen the power of the monarch. In 1562 at the Sejm in Piotrków they forced the Magnates to return many leased crown lands to the king, and the king to create a standing army wojsko kwarciane. One of the most famous members of this movement was Jan Zamoyski. End of the Jagiellonian dynasty Until the death of Sigismund II Augustus, the last king of the Jagiellonian dynasty, all monarchs had to be elected from within the royal family. However, from 1573, practically any Polish noble or foreigner of royal blood could potentially become a Polish–Lithuanian monarch. Every newly elected king was supposed to sign two documents: the Pacta conventa, the king's "pre-election pact", and the Henrican articles, named after the first freely elected king, Henry of Valois. The latter document was a virtual Polish constitution and contained the basic laws of the Commonwealth: Free election of kings Religious tolerance The Sejm to meet every two years Foreign policy controlled by the Sejm A royal advisory council chosen by the Sejm Official posts restricted to Polish and Lithuanian nobles Taxes and monopolies set up by the Sejm only Nobles' right to disobey the Monarch should s/he break any of these laws. In 1578 king, Stefan Batory, created the Crown Tribunal to reduce the enormous pressure on the Royal Court. This placed much of the monarch's juridical power in the hands of the elected szlachta deputies, further strengthening the nobility as a class. In 1581 the Crown Tribunal was joined by a counterpart in Lithuania, the Lithuanian Tribunal. Magnate oligarchy For many centuries, wealthy and powerful members of the szlachta sought to gain legal privileges over their peers. In 1459 Ostroróg presented a memorandum to the Sejm (parliament), submitting palatines, or Voivodes of the Polish–Lithuanian Commonwealth, receive the title of prince. Sons of the prince were to receive titles of counts and barons. Castellans of the Polish–Lithuanian Commonwealth were to receive the title of count. All these submissions were rejected. Few szlachta were wealthy enough to be known as Magnates, karmazyni, the "Crimsons" - from the crimson colour of their boots. A true Magnate had to be able to trace his ancestry for many generations and own at least 20 villages or estates. He also had to hold high office in the Commonwealth.. Thus, out of about one million szlachta, only 200–300 persons could be classed as Magnates with country-wide possessions and influence. Of these some 30–40 were considered as having significant impact on Poland's politics. Magnates often received gifts from monarchs, which greatly increased their wealth. Although such gifts were only temporary leases, often the Magnates never returned them. This gave rise in the 16th century, to a self-policing trend by the szlachta, known as the ruch egzekucji praw — movement for the enforcement of the law - against usurping Magnates to force them to return leased lands back to their rightful owner, the monarch. One of the most important victories of the Magnates was the late 16th century right to create Ordynacjas, similar to Fee tails under English law, which ensured that a family which gained landed wealth could more easily preserve it. The Ordynacjas that belonged to families such as the Radziwiłł, Zamoyski, Potocki or Lubomirskis often rivalled the estates of the king and were important power bases for them. The difference between the magnateria and the rest of the szlachta was primarily one of wealth and life-style, as both belonged to the same legally defined class being members of the same clans. Consequently, any power wrested from the king by the magnates was consequently trickled down to the entirety of the szlachta. This often meant the rest of the szlachta tended to cooperate with the magnates rather than struggle against them. Szlachta loss of influence The notion of the szlachta's accrued sovereignty ended in 1795 with the final Partitions of Poland, and until 1918 their legal status was dependent on the policies of the Russian Empire, the Kingdom of Prussia or the Habsburg Monarchy. In the 1840s Nicholas I reduced 64,000 of lesser szlachta to a particular commoner status known as odnodvortsy (literally "single-householders"). Despite this, 62.8% of all Russia's nobles were Polish szlachta in 1858 and still 46.1% in 1897. Serfdom was abolished in Russian Poland on February 19, 1864. It was deliberately enacted with the aim of ruining the szlachta. Only in the Russian Partition did peasants pay the market price for land redemption, the average for the rest of the Russian Empire was 34% above the market rates. All land taken from Polish peasants since 1846 was to be returned to them without redemption payments. The ex-serfs could only sell land to other peasants, not szlachta. 90% of the ex-serfs in the empire who actually gained land after 1861 lived in the 8 western provinces. Along with Romania, Polish landless or domestic serfs were the only ones to be given land after serfdom was abolished. All this was to punish the szlachta's role in the uprisings of 1830 and 1863. By 1864 80% of szlachta were déclassé - downward social mobility. One quarter of petty nobles were worse off than the average serf. While 48.9% of the land in Russian Poland was in peasant hands, nobles still held onto 46%. In the Second Polish Republic the privileges of the nobility were legally abolished by the March Constitution in 1921 and as such not reinstated by any succeeding Polish law. Cultural and international connections Despite preoccupations with warring, politics and status, the szlachta in Poland, as did people from all social classes, played its part in contributing in fields ranging from literature, art and architecture, philosophy, education, agriculture and the many branches of science, to technology and industry. Perhaps foremost among the cultural determinants of the nobility in Poland were its continuing international connections with the Rome-based Catholic Church. It was from the ranks of the szlachta that were drawn the church's leading Prelates until the 20th century. Other international influences came through the more or less secretive and powerful Christian and lay organisations such as the Sovereign Military Order of Malta, focused on hospital and other charitable activity. The most notable Polish Maltese Knight was the Pozńan commander, Bartłomiej Nowodworski, founder in 1588 of the oldest school in Poland. One alumnus was John III Sobieski. In the 18th century, after several false starts, international Freemasonry, wolnomularstwo, from western lodges, became established among the higher échelons of the szlachta, and in spite of membership of some clergy, it was intermittently but strongly opposed by the Catholic Church. After the partitions it became a cover for opposition to the occupying powers. Also in the 18th century there was a marked development in Patronage of the arts during the reign of Stanisław August Poniatowski, himself a freemason, and with the growth of social awareness, in Philanthropy. Women as purveyors of culture High-born women in Polish–Lithuanian Commonwealth exerted political and cultural influence throughout history in their own country and abroad, as queens, princesses and the wives or widows of magnates. Their cultural activities came into sharper relief in the 18th century with their hosting of salons in the French manner. They went on to publish as translators and writers and as facilitators of educational and social projects. Notable women members of the szlachta who exerted political and/or cultural influence include: Queen Jadwiga (1373 ог 1374 - 1399) Bona Sforza Zofia Lubomirska Anna Jabłonowska Elzbieta Lubomirska Eleonora Czartoryska Izabela Czartoryska Barbara Sanguszko (1718-1791), poet, translator and moralist Tekla Teresa Lubienska (1767-1810), poet, playwright and translator Gastronomy The szlachta, no less than the rest of the population, placed a particular accent on food. It was at the centre of courtly and estate entertaining and in good times, at the heart of village life. During the Age of Enlightenment, King Stanislaw August Poniatowski emulated the French Salons by holding his famed Thursday Lunches for intellectuals and artists, drawn chiefly from the szlachta. His Wednesday Lunches were gatherings for policy makers in science, education and politics. There was a tradition, particularly in Mazovia, kept till the 20th century, of estate owners laying on a festive banquet at the completion of harvest for their staff, known as Dożynki, as a way of expressing an acknowledgment of their work. It was equivalent to a harvest festival. Polish food varied according to region, as elsewhere in Europe, and was influenced by settlers, especially Jewish cuisine, and occupying armies. Hunting One of the favourite szlachta pastimes was hunting (łowiectwo). Before the formation of Poland as a state, hunting was accessible to everyone. With the introduction of rulers and rules, big game, generically zwierzyna: Aurochs, bison, deer and boar became the preserve of kings and princes on penalty of poachers' death. From the 13th century on the king would appoint a high-ranking courtier to the role of Master of the Hunt, Łowczy. In time, the penalties for poaching were commuted to fines and from around the 14th century, landowners acquired the right to hunt on their land. Small game, foxes, hare, badger and stoat etc. were 'fair game' to all comers. Hunting became one of the most popular social activities of the szlachta until the partitions, when different sets of restrictions in the three territories were introduced. This was with a view to curbing social interaction among the subject Poles. Over the centuries, at least two breeds of specialist hounds were bred in Poland. One was the Polish Hunting Dog, the brach. The other was the Ogar Polski. Count Xavier Branicki was so nostalgic about Polish hunting, that when he settled in France in the mid 19th century, and restored his estate at the Chateau de Montresor, he ordered a brace | in Poland, as did people from all social classes, played its part in contributing in fields ranging from literature, art and architecture, philosophy, education, agriculture and the many branches of science, to technology and industry. Perhaps foremost among the cultural determinants of the nobility in Poland were its continuing international connections with the Rome-based Catholic Church. It was from the ranks of the szlachta that were drawn the church's leading Prelates until the 20th century. Other international influences came through the more or less secretive and powerful Christian and lay organisations such as the Sovereign Military Order of Malta, focused on hospital and other charitable activity. The most notable Polish Maltese Knight was the Pozńan commander, Bartłomiej Nowodworski, founder in 1588 of the oldest school in Poland. One alumnus was John III Sobieski. In the 18th century, after several false starts, international Freemasonry, wolnomularstwo, from western lodges, became established among the higher échelons of the szlachta, and in spite of membership of some clergy, it was intermittently but strongly opposed by the Catholic Church. After the partitions it became a cover for opposition to the occupying powers. Also in the 18th century there was a marked development in Patronage of the arts during the reign of Stanisław August Poniatowski, himself a freemason, and with the growth of social awareness, in Philanthropy. Women as purveyors of culture High-born women in Polish–Lithuanian Commonwealth exerted political and cultural influence throughout history in their own country and abroad, as queens, princesses and the wives or widows of magnates. Their cultural activities came into sharper relief in the 18th century with their hosting of salons in the French manner. They went on to publish as translators and writers and as facilitators of educational and social projects. Notable women members of the szlachta who exerted political and/or cultural influence include: Queen Jadwiga (1373 ог 1374 - 1399) Bona Sforza Zofia Lubomirska Anna Jabłonowska Elzbieta Lubomirska Eleonora Czartoryska Izabela Czartoryska Barbara Sanguszko (1718-1791), poet, translator and moralist Tekla Teresa Lubienska (1767-1810), poet, playwright and translator Gastronomy The szlachta, no less than the rest of the population, placed a particular accent on food. It was at the centre of courtly and estate entertaining and in good times, at the heart of village life. During the Age of Enlightenment, King Stanislaw August Poniatowski emulated the French Salons by holding his famed Thursday Lunches for intellectuals and artists, drawn chiefly from the szlachta. His Wednesday Lunches were gatherings for policy makers in science, education and politics. There was a tradition, particularly in Mazovia, kept till the 20th century, of estate owners laying on a festive banquet at the completion of harvest for their staff, known as Dożynki, as a way of expressing an acknowledgment of their work. It was equivalent to a harvest festival. Polish food varied according to region, as elsewhere in Europe, and was influenced by settlers, especially Jewish cuisine, and occupying armies. Hunting One of the favourite szlachta pastimes was hunting (łowiectwo). Before the formation of Poland as a state, hunting was accessible to everyone. With the introduction of rulers and rules, big game, generically zwierzyna: Aurochs, bison, deer and boar became the preserve of kings and princes on penalty of poachers' death. From the 13th century on the king would appoint a high-ranking courtier to the role of Master of the Hunt, Łowczy. In time, the penalties for poaching were commuted to fines and from around the 14th century, landowners acquired the right to hunt on their land. Small game, foxes, hare, badger and stoat etc. were 'fair game' to all comers. Hunting became one of the most popular social activities of the szlachta until the partitions, when different sets of restrictions in the three territories were introduced. This was with a view to curbing social interaction among the subject Poles. Over the centuries, at least two breeds of specialist hounds were bred in Poland. One was the Polish Hunting Dog, the brach. The other was the Ogar Polski. Count Xavier Branicki was so nostalgic about Polish hunting, that when he settled in France in the mid 19th century, and restored his estate at the Chateau de Montresor, he ordered a brace of Ogar Polski hounds from the Polish breeder and szlachcic, Piotr Orda. Demographics and stratification The szlachta differed in many respects from the nobility in other countries. The most important difference was that, while in most European countries the nobility lost power as the ruler strove for absolute monarchy, in the Polish–Lithuanian Commonwealth a reverse process occurred: the nobility actually gained power at the expense of the king, and enabled the political system to evolve into an oligarchy. Szlachta members were also proportionately more numerous than their equivalents in all other European countries, constituting 6–12% of the entire population. By contrast, nobles in other European countries, except for Spain, amounted to a mere 1–3%. Most of the szlachta were "minor nobles" or smallholders. In Lithuania the minor nobility made up to 3/4 of the total szlachta population. By the mid-16th century the szlachta class consisted of at least 500,000 persons (some 25,000 families). Polish historian Tadeusz Korzon carried out an estimation of the social structure of Poland based on the documents of 1770-1780s, such as tax registers, partial censuses, etc. His estimate for the number of szlachta was 725,000 of total population 8.8 million. For comparison with other social classes, Christian clergy counted 50,000, Christian mieszczaństwo (burghers) counted 500,000, peasants of various categories (): 6.4 million, Jews (the fast growing group), e.g., 750,000 in 1764 and 900,000 in 1790. Korzon counted Armenians, Tatars, Greeks, and Russian raskolniks as separate social groups, totaling 250,000-300,000. The proportion of nobles in the population varied across regions. In the 16th century, the highest proportion of nobles lived in the Płock Voivodeship (24,6%) and in Podlachia (26,7%), while Galicia had numerically the largest szlachta population. In districts, such as Wizna and Łomża, the szlachta constituted nearly half of the population. Regions with the lowest percentage of nobles were the Kraków Voivodeship with (1,7%), Royal Prussia with (3%) and the Sieradz Voivodeship with 4,6%. Before the Union of Lublin, inequality among nobles in terms of wealth and power was far greater in the Grand Duchy of Lithuania than in the Polish Kingdom. The further south and east one went, the more the territory was dominated by magnate families and other nobles. In the Lithuanian and Ruthenian palatinates, poor nobles were more likely to rent smallholdings from magnates than to own land themselves. It has been said that the ruling elites were the only socio-political milieu to whom a sense of national consciousness could be attributed. All szlachta members, irrespective of their cultural/ethnic background, were regarded as belonging to a single "political nation" within the Commonwealth. Arguably, a common culture, the Catholic religion and the Polish language were seen as the main unifying factors in the dual state. Prior to the Partitions there was said to have been no Polish national identity as such. Only szlachta members, irrespective of their ethnicity or culture of origin, were considered as "Poles".Stauter-Halsted, Keely The Nation in the Village. The Genesis of Peasant National Identity in Austrian Poland, 1848–1914 (Ithaca 2001) Despite polonisation in Lithuania and Ruthenia in the 17th-18th centuries, a large part of the lower szlachta managed to retain their cultural identity in various ways. Due to poverty most of the local szlachta had never had access to formal education nor to Polish language teaching and hence could not be expected to self-identify as Poles. It was common even for wealthy and in practice polonised szlachta members still to refer to themselves as Lithuanian, Litwin or Ruthenian, Rusyn. According to Polish estimates from the 1930s, 300,000 members of the common nobles -szlachta zagrodowa - inhabited the subcarpathian region of the Second Polish Republic out of 800,000 in the whole country. 90% of them were Ukrainian-speaking and 80% were Ukrainian Greek Catholics. In other parts of the Ukraine with a significant szlachta population, such as the Bar or the Ovruch regions, the situation was similar despite russification and earlier polonization.Грушевський М. С. Барська околична шляхта до к[інця] XVIII ст. : Етнографічний нарис / М. С. Грушевський // Грушевський, Михайло Сергійович. Твори: у 50 т. / М. С. Грушевський; редкол.: П. Сохань (голов. ред.), І. Гирич та ін. – Львів: Видавництво "Світ". – 2003. Т. 5. Т. 5. – C. 323 - 336 As an example: thumb|right|upright|Polish Nobleman with a Parrot, by Józef Simmler, 1859. However the era of sovereign rule by the szlachta ended earlier than in other countries, excluding France, in 1795 (see Partitions of Poland). Since then their legitimacy and fate depended on the legislation and policies of the Russian Empire, Kingdom of Prussia and Habsburg Monarchy. Their privileges became increasingly limited, and were ultimately dissolved by the March Constitution of Poland in 1921. There were a number of avenues to upward social mobility and the attainment of nobility. The szlachta was not rigidly exclusive or closed as a class, but according to heraldic sources, the total number of legal ennoblements issued between the 14th and mid-18th century, is estimated at 800. This is an average of about two ennoblements per year. According to two English journalists Richard Holt Hutton and Walter Bagehot writing on the subject in 1864, and Sociologist and historian, Jerzy Ryszard Szacki said in this context, Others assert the szlachta were not a social class, but a caste, among them, historian Adam Zamoyski, Jerzy Szacki continues, Low-born individuals, including townsfolk mieszczanie, peasants chłopi, but not Jews Żydzi, could and did rise to official ennoblement in Commonwealth society, although Charles-Joseph, 7th Prince of Ligne, while trying to obtain Polish noble status, is supposed to have said in 1784, According to heraldic sources 1,600 is the total estimated number of all legal ennoblements throughout the history of Kingdom of Poland and Polish–Lithuanian Commonwealth from the 14th century onward, half of which were enacted in the final years of the late 18th century. Hutton and Bagehot, {{blockquote|text=... for the barrier of exclusion was partly thrown down in the last days of the monarchy ....}} Each szlachcic was said to hold enormous potential influence over the country's politics, far greater than that enjoyed by the citizens of modern democratic countries. Between 1652 and 1791, any nobleman could potentially nullify all the proceedings of a given sejm or sejmik by exercising his individual right of liberum veto - Latin for "I do not allow" - except in the case of a confederated sejm or confederated sejmik. In old Poland, a nobleman could only marry a noblewoman, as intermarriage between "castes" was fraught with difficulties (wiktionary:endogamy); but, children of a legitimate marriage followed the condition of the father, never the mother, therefore, only the father transmitted his nobility to his children. See patrilineality. A noble woman married to a commoner could not transmit her nobility to her husband and their children. Any individual could attain ennoblement () for special services to the state. A foreign noble might be naturalized as a Polish noble through the mechanism called the Indygenat, certified by the king. Later, from 1641, it could only be done by a general sejm. By the eighteenth century all these trends contributed to the great increase in the proportion of szlachta in the total population. In theory all szlachta members were social equals and were formally legal peers. Those who held civic appointments were more privileged but their roles were not hereditary. Those who held honorary appointments were superior in the hierarchy but these positions were only granted for a lifetime. Some tenancies became hereditary and went with both privilege and title. Nobles who were not direct Lessees of the Crown but held land from other lords were only peers "de iure". The poorest enjoyed the same rights as the wealthiest magnate. The exceptions were a few symbolically privileged families such as the Radziwiłł, Lubomirski and Czartoryski, who held honorary aristocratic titles bestowed by foreign courts and recognised in Poland which granted them use of titles such as "Prince" or "Count". See also The Princely Houses of Poland. All other szlachta simply addressed each other by their given name or as "Brother, Sir" Panie bracie or the feminine equivalent. The other forms of address would be "Illustrious and Magnificent Lord", "Magnificent Lord", "Generous Lord" or "Noble Lord" in descending order, or simply "His/Her Grace Lord/Lady". The notion that all Polish nobles were social equals, regardless of their financial status or offices held, is enshrined in a traditional Polish adage: equivalent to: Szlachta categories The nobility were divided by wealth into: magnates, the wealthiest class: owners of vast lands, towns, many villages, and thousands of peasants middle nobility (średnia szlachta): owners of one or more villages, often bearing official titles, or deputies from sejmiks (regional sejms) to the general Sejm petty nobility (drobna szlachta): owners of part of a village or of no land at all, they were often referred to by a variety of colourful Polish terms, including: – from zaścianek, poorer members of the szlachta settled together in related families in one village, neighborhood/village nobility. szaraczkowa – grey nobility, from their grey, woollen, undyed żupans okoliczna – local nobility, similar to zaściankowa zagrodowa – from zagroda, a croft, often little more than a peasant's dwelling zagonowa – from zagon, a small unit of land measure, hide nobility cząstkowa – partial, owners of only part of a single village panek – little pan (i.e., lordling), term used in Kaszuby, the Kashubian region, also one of the legal terms for legally separated lower nobility in late medieval and early modern Poland hreczkosiej – buckwheat sowers – those who had to work their fields themselves because they had no peasants. szlachta służebna - petty nobility who possessed land on the condition of military service (mainly of Ruthenian origin, in Eastern Poland) quit-rent szlachta (szlachta czynszowa) - a class of impoverished szlachta who rented estates in the vast lands of magnates (predominantly in Ruthenian lands) szlachta poddańcza - a step below the quit-rent szlachta: they required to work for the landlord who allotted them some land. szlachta-gołota – naked nobility, i.e., the landless szlachta; the poorest szlachta considered the "lowest of the high." brukowa – town-street nobility: landless szlachta who earned a living in towns like other townsfolk Polish landed gentry – ziemianie, or ziemiaństwo – was a social class of landowners with manorial estates. The vast majority were szlachta, including lesser nobility, and owned at least part of a village. Since titular manorial lordships were also open to burgers of certain privileged cities with royal charters, not all landed gentry had hereditary noble status. The term ziemiaństwo was also applied to wealthier landed peasants. Magnates, as owners of vast lands, generally were considered a separate social class. Landless szlachta were sometimes excluded from taking part in sejmiks. Its political rights were removed altogether by the Constitution of 3 May 1791. The purpose of the move was to eliminate the purchases of szlachta-gołota voices in sejmiks by magnates to use them, e.g., in voting or in executing liberum veto. Półpanek ("half-lord"); also podpanek/pidpanek ("sub-lord") in Podolia and Ukrainian accent – a derogatory term for a petty szlachcic pretending to be wealthy. In the Russian Partition of Poland, Tsar Nicholas I signed a 19-October-1831 ukase, "On the Division and Disposition of Nobility in the Western Governorates", which required those claiming noble status to provide evidence to the Russian Office of Heraldry. The result was a drastic decrease in the number of petty szlachta, who were demoted into estates of the realm required to pay taxes. Sarmatism The szlachtas prevalent ideology, especially in the 17th and 18th centuries, was manifested in its adoption of "Sarmatism", a word derived from the legend that its origins reached back to the ancient tribe of an Iranic people, the Sarmatians. This nostalgic belief system embracing chivalry and courtliness became an important part of szlachta culture and affected all aspects of their lives. It was popularized by poets who exalted traditional village life, peace and pacifism. It was also manifested in oriental-style apparel, the żupan, kontusz, sukmana, pas kontuszowy, delia and made the scimitar-like szabla a near-obligatory item of everyday szlachta apparel. Sarmatism served to integrate a nobility of disparate provenance, as it sought to create a sense of national unity and pride in the szlachta's "Golden Liberty" złota wolność. It was marked furthermore by a linguistic affectation among the szlachta of mixing Polish and Latin vocabulary, producing a form of Polish Dog Latin peppered with "macaronisms" in everyday conversation. See also List of Polish titled nobility List of szlachta Lithuanian nobility Polish heraldry Polish landed gentry (Ziemiaństwo) Polish name Silva rerum Ukrainian nobility from Galicia Explanatory notes a. Estimates of the proportion of szlachta vary widely: 10–12% of the total population of historic Polish–Lithuanian Commonwealth, around 8% of the total population in 1791 (up from 6.6% in the 16th century) or 6–8%. References General bibliography Aleksander Brückner, Słownik etymologiczny języka polskiego (Etymological Dictionary of the Polish Language), first edition, Kraków, Krakowska Spółka Wydawnicza, 1927 (9th edition, Warsaw, Wiedza Powszechna, 2000). . Żernicki-Szeliga Emilian v., Der Polnische Adel und die demselben hinzugetretenen andersländischen Adelsfamilien, General-Verzeichnis. Published by Verlag v. Henri Grand. Hamburg 1900. https://archive.org/details/derpolnischeade00szegoog |
Array[i,j]. Similarly an array element update is a procedure consisting of three arguments, for example set_array(Array, vector(i,j), value), but many languages provide syntax such as Array[i,j] = value. A construct in a language is syntactic sugar if it can be removed from the language without any effect on what the language can do: functionality and expressive power will remain the same. Language processors, including compilers and static analyzers, often expand sugared constructs into more fundamental constructs before processing, a process sometimes called "desugaring". Origins The term syntactic sugar was coined by Peter J. Landin in 1964 to describe the surface syntax of a simple ALGOL-like programming language which was defined semantically in terms of the applicative expressions of lambda calculus, centered on lexically replacing λ with "where". Later programming languages, such as CLU, ML and Scheme, extended the term to refer to syntax within a language which could be defined in terms of a language core of essential constructs; the convenient, higher-level features could be "desugared" and decomposed into that subset. This is, in fact, the usual mathematical practice of building up from primitives. Building on Landin's distinction between essential language constructs and syntactic sugar, in 1991, Matthias Felleisen proposed a codification of "expressive power" to align with "widely held beliefs" in the literature. He defined "more expressive" to mean that without the language constructs in question, a program would have to be completely reorganized. Notable examples In COBOL, many of the intermediate keywords are syntactic sugar that may optionally be omitted. For example, the sentence MOVE A B. and the sentence MOVE A TO B. perform exactly the same function, but the second makes the action to be performed clearer. Augmented assignment or compound assignment operators: For example, a += b is equivalent to a = a + b in C and similar languages, assuming a has no side effects such as if a is a regular variable. Some languages, such as Python may allow overloading augmented assignment operators, so they may behave differently than standard ones. In Perl, unless (condition) {...} is syntactic sugar for if (not condition) {...}. Additionally, any statement can be followed by a condition, so statement if condition is equivalent to if (condition) {statement}, but the former is more naturally formatted on a single line. In the C language, the a[i] notation is syntactic sugar for *(a + i). Likewise, the a->x notation is syntactic sugar for accessing members using the dereference operator (*a).x. The using statement in C# ensures that certain objects are disposed of correctly. The compiler expands the statement into a try-finally block. The C# language allows variables to be declared as var x = expr, which allows the compiler to infer the type of x from the expression expr, instead of requiring an explicit type declaration. Similarly, C++ allows auto x = expr since C++11 and Java allows var x = expr since Java 11. Python list comprehensions (such as [x*x for x in range(10)] for a list | Language processors, including compilers and static analyzers, often expand sugared constructs into more fundamental constructs before processing, a process sometimes called "desugaring". Origins The term syntactic sugar was coined by Peter J. Landin in 1964 to describe the surface syntax of a simple ALGOL-like programming language which was defined semantically in terms of the applicative expressions of lambda calculus, centered on lexically replacing λ with "where". Later programming languages, such as CLU, ML and Scheme, extended the term to refer to syntax within a language which could be defined in terms of a language core of essential constructs; the convenient, higher-level features could be "desugared" and decomposed into that subset. This is, in fact, the usual mathematical practice of building up from primitives. Building on Landin's distinction between essential language constructs and syntactic sugar, in 1991, Matthias Felleisen proposed a codification of "expressive power" to align with "widely held beliefs" in the literature. He defined "more expressive" to mean that without the language constructs in question, a program would have to be completely reorganized. Notable examples In COBOL, many of the intermediate keywords are syntactic sugar that may optionally be omitted. For example, the sentence MOVE A B. and the sentence MOVE A TO B. perform exactly the same function, but the second makes the action to be performed clearer. Augmented assignment or compound assignment operators: For example, a += b is equivalent to a = a + b in C and similar languages, assuming a has no side effects such as if a is a regular variable. Some languages, such as Python may allow overloading augmented assignment operators, so they may behave differently than standard ones. In Perl, unless (condition) {...} is syntactic sugar for if (not condition) {...}. Additionally, any statement can be followed by a condition, so statement if condition is equivalent to if (condition) {statement}, but the former is more naturally formatted on a single line. In the C language, the a[i] notation is syntactic sugar for *(a + i). Likewise, the a->x notation is syntactic sugar for accessing members using the dereference operator (*a).x. The using statement in C# ensures that certain objects are disposed of correctly. The compiler expands the statement into a try-finally block. The C# language allows variables to be declared as var x = expr, which allows the compiler to infer the type of x from the expression expr, instead of requiring an explicit type declaration. Similarly, C++ allows auto x = expr since C++11 and Java allows var x = expr since Java 11. Python list comprehensions (such as [x*x for x in range(10)] for a list of squares) and decorators (such as @staticmethod). In Haskell, a string, denoted in quotation marks, is semantically equivalent to a list of characters. In the tidyverse collection of R packages, the pipe, denoted by %>%, declares that the data (or output of the function) preceding the pipe will serve |
in a style reminiscent of the Mega Drive/Genesis games, and present-day "modern" Sonic, who uses the gameplay style present in Unleashed and Colors, going through stages from past games to save their friends. Sonic Generations features various theme songs including modern and retro versions that are able to be selected from throughout Sonic's twenty-year history. In April 2013, Sega announced that Sonic Lost World would launch in October 2013 for the Wii U and Nintendo 3DS. Sonic and the Secret Rings (2007) features Sonic in the storybook world of One Thousand and One Nights. A sequel, Sonic and the Black Knight (2009), continued the storybook theme, this time taking place within the realm of the Arthurian legend. Sonic has also been featured in other games of many genres other than 2D and 3D platform games. These include Sonic Spinball, Sonic Labyrinth (1995), the racing games Sonic Drift (1994), Sonic Drift 2 (1995), Sonic R (1996), Sonic Riders (2006), Sonic Rivals (2006), Sonic Rivals 2 (2007), Sonic Riders: Zero Gravity (2008), and Sonic Free Riders (2010), the fighting games Sonic the Fighters (1996) and Sonic Battle (2003), the mobile game Sonic Jump (2005), and the role-playing video game Sonic Chronicles: The Dark Brotherhood (2008). Video games such as Dr. Robotnik's Mean Bean Machine (1993), Knuckles' Chaotix (1995), Tails' Skypatrol (1995), Tails Adventure (1995), and Shadow the Hedgehog (2005) starred supporting characters of the Sonic series, although Sonic himself cameos in most of them. Cameos and crossovers Sonic makes cameos in various other games, such as Billy Hatcher and the Giant Egg as a power-up, in the main hallway in Phantasy Star Universe, and in the 2008 remake of Samba de Amigo. He is also a playable character in Christmas NiGHTS into Dreams. Nintendo, Sega's former rival, references Sonic in Donkey Kong Country 2: Diddy's Kong Quest, by showing Sonic's shoes next to a trash can that reads "No Hopers" on the Cranky's Video Game Heroes screen. Sonic has appeared in several crossover games, including playable appearances in Super Smash Bros. Brawl (2008), Super Smash Bros. for Nintendo 3DS and Wii U (2014), and Super Smash Bros. Ultimate (2018), Lego Dimensions (2015), and Cookie Run: Kingdom (2021). He appears in the crossover party game series Mario & Sonic at the Olympic Games and is also a playable character in all three Sega Superstars games. An official Sonic the Hedgehog skin is available in the platformer battle royale game Fall Guys. Sonic appears as a playable character in Puyo Puyo Tetris 2 via free update. An official Sonic the Hedgehog world with skins are available with DLC in Minecraft. Animation The first three animated series featuring Sonic were created by the international company DiC. The first of these series, Adventures of Sonic the Hedgehog, premiered in 1993, and depicts Sonic and his friend Tails opposing Doctor Ivo Robotnik and his robots on the planet Mobius. Another animated series premiering the same year, simply titled Sonic the Hedgehog, depicts Sonic and a group of rebels aiming to defeat Robotnik in a futuristic version of Mobius. The third animated series, Sonic Underground, premiered in 1999, and features Sonic as the protagonist alongside his siblings Sonia and Manic. In 1996, a two-part OVA, Sonic the Hedgehog, was released in Japan. For the American release, the two episodes combined and released as Sonic the Hedgehog: The Movie by ADV Films. A new series, Sonic X, began airing in 2003. The 78-episode anime series detailed Sonic's struggle to protect the Chaos Emeralds from Eggman and new villains. Featuring a cross-world and interstellar journey, Sonic X depicted Sonic and his human friend Chris Thorndyke in quests to save the world. Sonic: Night of the Werehog is a short film produced by Sega's VE Animation Studio, released to coincide with the release of Sonic Unleashed. In the film, Sonic and Chip enter a haunted house, and must deal with two ghosts trying to scare them in attempt to win the heart of the girl ghost. Sonic also makes multiple cameo appearances in the Disney films, Wreck-It Ralph and its sequel Ralph Breaks the Internet. In October 2013, Sega announced a CGI animated series, Sonic Boom. The show ran for 104 11-minute episodes between 2014 and 2017 on Cartoon Network in the U.S. and the UK, and Canal J and Gulli in France. Sonic makes several appearances in 2014 anime Hi-sCoool! SeHa Girls and guest-stars in the OK K.O.! Let's Be Heroes episode "Let's Meet Sonic". In February 2021, Sonic Prime was announced by Netflix with a 2022 release window, though the series' development was initially revealed in a deleted tweet in December 2020. The show will primarily be for children ages six to eleven, as well as longtime fans of the franchise. Live-action film On June 10, 2014, a film based on the Sonic series was announced. Simply known as Sonic the Hedgehog, it was produced by Neal Moritz on his Original Film banner alongside Takeshi Ito and Mie Onishi, with Toby Ascher as executive producer. The film was written by Pat Casey and Josh Miller and produced as a joint venture between Paramount Pictures and Marza Animation Planet. The film is a live-action and CGI hybrid. The movie was filmed in 2018, with a release date initially set for November 8, 2019. Upon the release of the film's first trailer in late April 2019, however, Sonic's appearance was heavily criticized, leading to the director, Jeff Fowler, to announce a redesign of him, pushing back the release date to February 14, 2020. The second trailer for the film was released on November 12, 2019, featuring the redesign, which drew in a far more positive response from both fans and critics alike. A sequel, Sonic the Hedgehog 2, is set to be released on April 8, 2022. Print media Sonic's first comic appearance was in a promotional comic printed in Disney Adventures magazine (and also given away as a free pull-out with a copy of Mean Machines magazine), which established a backstory for the character involving the origin of his color and abilities and the transformation of kindly scientist Dr. Ovi Kintobor into the evil Dr. Ivo Robotnik. Numerous British publications, including "Sega handbook" Stay Sonic (1993), four novels published by Virgin Books (1993–1994) and the comic book Sonic the Comic (1993–2001), published by Fleetway Publications/Egmont Publishing, used this premise as their basis. The American comics published by Archie Comics, Sonic the Hedgehog (1993–2017), Sonic X (2005–2008), and Sonic Universe (2009–2017) are based on the settings established by earlier animated TV series, the ABC "SatAM" cartoon, the Sonic X anime, and an expansion to the series, respectively. The former series is currently the second longest-running licensed comic series in the history of American comic books, second only to Marvel's Conan series (first issue released in 1970). In France two comic books named "Sonic Adventures" were published by Sirène in 1994. Guinness World Records recognized Sonic comic as the longest-running comic based on a game. Archie Comics also released a twelve part crossover with Mega Man beginning in 2013. Sonic has also been featured in two different manga. One series was simply called Sonic the Hedgehog, and featured a story about a normal hedgehog boy named Nicky Parlouzer who can change into Sonic. The other series was a compilation of short stories and was separated into two volumes, the first being called Dash and Spin, and the other called Super Fast Sonic!!. Characteristics According to various official materials from Sega, Sonic is described as a character who is "like the wind": a drifter who lives as he wants, and makes life a series of events and adventures. Sonic hates oppression and staunchly defends freedom. Although he is mostly quick-witted and easygoing, he has a short temper and is often impatient with slower things. Sonic is a habitual daredevil hedgehog who is honest, loyal to friends, keeps his promises, and dislikes tears. He took the young Tails under his wing like a little brother, and is uninterested in marital proposals from Amy Rose. In times of crisis, he focuses intensely on the challenge as if his personality had undergone an astonishing change. Sonic's greatest strength is his running speed, being known in the game's universe as the world's fastest hedgehog. Many of his abilities are variations on the tendency for hedgehogs to roll into tight balls for protection with the addition of spinning his body. Since his introduction in 1991's Sonic the Hedgehog, Sonic's primary offensive maneuver is the basic "Spin Attack" (or "Sonic Spin Attack"). Later games in the series expanded on this basic attack and two of these enhancements have become mainstays of his: the Spin Dash which was introduced in Sonic the Hedgehog 2 and involves Sonic spinning on the spot before blasting off at full speed, and the Homing Attack, officially introduced in Sonic Adventure, in which Sonic dashes toward a target in midair. Sonic's only weakness is that he cannot swim, sinking like a rock if plunged to a deep body of water. The only exception is that he can swim in the Sonic the Hedgehog Adventure Gamebooks. When the seven Chaos Emeralds are collected and used, Sonic transforms into "Super Sonic", a faster and invulnerable version of himself that can fly. In Super Sonic form, Sonic's irises turn red and his body becomes golden. Reception and legacy As Sega's mascot and one of the key reasons for the company's success during the 16-bit era of video game consoles, Sonic is one of the most famous video game characters in the world. In 1993, Sonic became the first video game character to have a balloon in Macy's Thanksgiving Day Parade. In 1996, Sonic was also the first video game character to be seen in a Rose Parade. Sonic was one of the three game characters inducted on the inaugural Walk of Game class in 2005, along with former rivals Mario and Link (both from Nintendo). One of a class of genes involved in fruit fly embryonic development, called hedgehog genes, has been named "sonic hedgehog" after him. On the other hand, Sonic's apparent romantic relationship with Princess Elise in the 2006 video game resulted in major criticism. Sonic's characterization and | aimed to be something that could be easily drawn by children and be familiar, as well as exhibit a "cool" attitude, representative of the United States at the time. Sonic's blue pigmentation was chosen to match Sega's cobalt blue logo, and his shoes evolved from a design inspired by both Santa Claus and Michael Jackson's boots with the addition of the color red, which was inspired by the contrast of those colors on Jackson's 1987 album Bad; his personality was based on then-presidential candidate and later President of the United States Bill Clinton's "Get it done" attitude during the 1992 presidential campaign. To help sell the idea to Sega's higher-ups, Ohshima pitched the concept framed by a fictional fighter pilot that had earned the name "Hedgehog" due to his spiky hair, and had decorated his plane with images of Sonic. When this pilot retired, he married a children's book author, who wrote stories about the Sonic character, the first which became the plot for the first Sonic game; Ohshima stated that this influence can be seen in the logo of the game, which features Sonic in a pilot's wing emblem. The origins of Sonic can be traced farther back to a tech demo created by Yuji Naka, who had developed an algorithm that allowed a sprite to move smoothly on a curve by determining its position with a dot matrix. Naka's original prototype was a platform game that involved a fast-moving character rolling in a ball through a long winding tube, and this concept was subsequently fleshed out with Oshima's character design and levels conceived by designer Hirokazu Yasuhara. Sonic was created without the ability to swim because of a mistaken assumption by Yuji Naka that all hedgehogs could not do so. A group of fifteen people started working on the first Sonic the Hedgehog game, and renamed themselves Sonic Team. The game's soundtrack was composed by Masato Nakamura of the band Dreams Come True. Sega sponsored the group's "Wonder 3" tour, painting Sonic on the tour bus, distributing pamphlets advertising the game, and having footage of the game broadcast above stage prior to its release. The original concepts gave Sonic fangs and put him in a band with a human girlfriend named Madonna. However, a team from Sega of America, led by Madeline Schroeder, who calls herself "Sonic's mother", "softened" the character up for an American audience by removing those elements. This sparked a heated issue with Sonic Team. Naka later admitted that it was probably for the best. Sonic's appearance varies greatly depending on the medium and the style in which he is drawn. In the video games, Sonic's original design by Oshima was short and round, with short quills, a round body, and no visible irises. Artwork featuring this design and drawn by Akira Watanabe was displayed on the package artwork for Sonic the Hedgehog. Sonic's proportions would change for the release of Sonic the Hedgehog 2 on the Mega Drive; Sonic's head to height ratio was changed from 1:2 to 1:2.5. For the 1998 release of Sonic Adventure, Sonic was redesigned by Yuji Uekawa as a character with longer legs and a less spherical body, longer and more drooping quills, and green-colored irises. For the 2006 game, Sonic was redesigned to make him look adult-like and taller to appeal to the next generation players. This was also done because Sonic would interact with humans more often and his design was supposed to fit. An alternative "Werehog" form was introduced in Sonic Unleashed, placing more emphasis on Sonic's melee skills rather than speed. Although Tetsu Katano acknowledged the large negative fan response to the Werehog, he believes it could return in a future game. Bob Raffei, CEO of Sonic Boom developer Big Red Button, stated that Sonic Boom Sonic is "very different... both in tone and art direction". Voice portrayal Sonic originally had a few voice samples in Sonic CD, with designer Masato Nishimura providing the voice. Sonic's first true voice actor was Takeshi Kusao for the arcade game SegaSonic the Hedgehog, with Junichi Kanemaru continually voicing the role beginning with the release of Sonic Adventure. Kanemaru also voices Sonic in Sonic X, Sonic Boom, and the Japanese dub of the Wreck-It Ralph films. In Sonic Unleashed, Sonic was voiced by Tomokazu Seki while in Werehog form. Jaleel White voiced the character in the DiC animated series Adventures of Sonic the Hedgehog, Sonic SatAM, and Sonic Underground. Starting with Sonic Adventure, Sonic was voiced in English by Ryan Drummond. Drummond was replaced by Jason Griffith starting from Sonic X, with Griffith voicing Sonic within the games starting with Shadow The Hedgehog in 2005. Griffith was replaced by Roger Craig Smith, starting with Sonic Free Riders and Sonic Colors. Smith announced on his Twitter account on January 29, 2021, that he would no longer voice Sonic, with his departure confirmed by Sega the same day. On May 26, 2021, Smith and Sega confirmed that he was voicing Sonic once again. Ben Schwartz voiced Sonic in the 2020 feature film, and will reprise his role for the 2022 sequel. Appearances Video games Sonic's first shown appearance in a video game was in the 1991 arcade racing game Rad Mobile, as a decorative ornament hanging from a rearview mirror. Sonic's first playable appearance was in the platform game Sonic the Hedgehog for the Sega Mega Drive/Genesis, which also introduced his nemesis Dr. Robotnik. His two-tailed fox friend Tails joined him in the game's 1992 sequel, Sonic the Hedgehog 2. Sonic CD, released in 1993, introduced Sonic's self-appointed girlfriend Amy Rose and recurring robotic doppelgänger Metal Sonic as Sonic traveled through time to ensure a good future for the world. Sonic 3 and its direct sequel Sonic & Knuckles, both released in 1994, saw Sonic and Tails battle Robotnik again, with the additional threat of Knuckles, who is tricked by Robotnik into thinking Sonic is a threat. Sonic 4 (2010–2012) continues where the story of Sonic 3 left off, reducing Sonic to the only playable character and releasing in episodic installments. The second episode sees the return of both Tails as Sonic's sidekick and Metal Sonic as a recurring enemy. Other two-dimensional platformers starring Sonic include Sonic Chaos (1993), Sonic Triple Trouble (1994), Sonic Blast (1996), Sonic the Hedgehog Pocket Adventure (1999), Sonic Advance (2001), Sonic Advance 2 (2002), Sonic Advance 3 (2004), Sonic Rush (2005), Sonic Rush Adventure (2007), Sonic Colors (2010), and Sonic Generations (2011), all in which were released for handheld consoles. Sonic Adventure (1998) was Sonic Team's return to the character for a major game. It featured Sonic returning from vacation to find the city of Station Square under attack by a new foe named Chaos, under the control of Dr. Robotnik (now known as Dr. Eggman). It was also the first Sonic game to feature a complete voice-over. Sonic Adventure 2 (2001) placed Sonic on-the-run from the military (G.U.N.) after being mistaken for Shadow the Hedgehog. Sonic Heroes (2003) featured Sonic teaming up with Tails and Knuckles, along with other character teams like Team Rose and Chaotix, against the newly rebuilt Metal Sonic, who had betrayed his master with intentions of world domination. Sonic the Hedgehog (2006) features Sonic in the city of water, "Soleanna," where he must rescue Princess Elise from Dr. Eggman while trying to avoid a new threat to his own life, Silver the Hedgehog. He is the only playable character in Sonic Unleashed (2008), in which he unwillingly gains a new personality, "Sonic the Werehog," the result of Sonic being fused with Dark Gaia's power. He gains strength and flexibility in exchange for his speed, and new friends including a strange creature named Chip who helps him along the way. In Sonic Colors (2010), Eggman tries to harness the energy of alien beings known as "Wisps" for a mind-control beam. Sonic Generations (2011) features two playable incarnations of Sonic: the younger "classic" Sonic, whose gameplay is presented in a style reminiscent of the Mega Drive/Genesis games, and present-day "modern" Sonic, who uses the gameplay style present in Unleashed and Colors, going through stages from past games to save their friends. Sonic Generations features various theme songs including modern and retro versions that are able to be selected from throughout Sonic's twenty-year history. In April 2013, Sega announced that Sonic Lost World would launch in October 2013 for the Wii U and Nintendo 3DS. Sonic and the Secret Rings (2007) features Sonic in the storybook world of One Thousand and One Nights. A sequel, Sonic and the Black Knight (2009), continued the storybook theme, this time taking place within the realm of the Arthurian legend. Sonic has also been featured in other games of many genres other than 2D and 3D platform games. These include Sonic Spinball, Sonic Labyrinth (1995), the racing games Sonic Drift (1994), Sonic Drift 2 (1995), Sonic R (1996), Sonic Riders (2006), Sonic Rivals (2006), Sonic Rivals 2 (2007), Sonic Riders: Zero Gravity (2008), and Sonic Free Riders (2010), the fighting games Sonic the Fighters (1996) and Sonic Battle (2003), the mobile game Sonic Jump (2005), and the role-playing video game Sonic Chronicles: The Dark Brotherhood (2008). Video games such as Dr. Robotnik's Mean Bean Machine (1993), Knuckles' Chaotix (1995), Tails' Skypatrol (1995), Tails Adventure (1995), and Shadow the Hedgehog (2005) starred supporting characters of the Sonic series, although Sonic himself cameos in most of them. Cameos and crossovers Sonic makes cameos in various other games, such as Billy Hatcher and the Giant Egg as a power-up, in the main hallway in Phantasy Star Universe, and in the 2008 remake of Samba de Amigo. He is also a playable character in Christmas NiGHTS into Dreams. Nintendo, Sega's former rival, references Sonic in Donkey Kong Country 2: Diddy's Kong Quest, by showing Sonic's shoes next to a trash can that reads "No Hopers" on the Cranky's Video Game Heroes screen. Sonic has appeared in several crossover games, including playable appearances in Super Smash Bros. Brawl (2008), Super Smash Bros. for Nintendo 3DS and Wii U (2014), and Super Smash Bros. Ultimate (2018), Lego Dimensions (2015), and Cookie Run: Kingdom (2021). He appears in the crossover party game series Mario & Sonic at the Olympic Games and is also a playable character in all three Sega Superstars games. An official Sonic the Hedgehog skin is available in the platformer battle royale game Fall Guys. Sonic appears as a playable character in Puyo Puyo Tetris 2 via free update. An official Sonic the Hedgehog world with skins are available with DLC in Minecraft. Animation The first three animated series featuring Sonic were created by the international company DiC. The first of these series, Adventures of Sonic the Hedgehog, premiered in 1993, and depicts Sonic and his friend Tails opposing Doctor Ivo Robotnik and his robots on the planet Mobius. Another animated series premiering the same year, simply titled Sonic the Hedgehog, depicts Sonic and a group of rebels aiming to defeat Robotnik in a futuristic version of Mobius. The third animated series, Sonic Underground, premiered in 1999, and features Sonic as the protagonist alongside his siblings Sonia and Manic. In 1996, a two-part OVA, Sonic the |
the Union, elected on the basis of the population with one deputy for every 300,000 people in the Soviet federation. The Soviet of Nationalities, which represented the ethnic populations as units, with members elected on the basis of 32 deputies from each union republic, 11 from each autonomous republic, five from each autonomous oblast (region), and one from each autonomous okrug (district). The administrative units of the same type would send the same number of members regardless of their size or population. By the Soviet constitutions of 1936 and 1977, the Supreme Soviet was defined as the highest organ of state power in the Soviet Union and was imbued with great lawmaking powers. In practice, however, it did little more than approve decisions made already by the USSR's executive organs and the Communist Party of the Soviet Union (CPSU). This was in accordance with the Communist Party's principle of democratic centralism, and became the norm for other Communist legislatures. The Supreme Soviet convened twice a year, usually for less than a week. For the rest of the year, the Presidium performed its ordinary functions. Often, the CPSU bypassed the Supreme Soviet altogether and had major laws enacted as Presidium decrees. Nominally, if such decrees were not ratified by the Supreme Soviet at its next session, they were considered revoked. In practice, however, the principle of democratic centralism rendered the process of ratifying Presidium decrees a mere formality. In some cases, even this formality was not observed. After 1989 it consisted of 542 deputies (divided into two 271 chambers). (decreased from previously 1,500). The meetings of the body were also more frequent, from six to eight months a year. In September 1991, after the August Coup, it was reorganised into the Soviet (council) of Republics and the Soviet of The Union, which would jointly amend the Soviet Constitution, admit new states, hear out the President of the Soviet Union on important home and foreign policy issues, approve the union budget, declare war and conclude peace. The Soviet of Republics would consist of 20 deputies from each union republic, plus 1 deputy to represent each autonomous region of each republic, delegated by the republics legislatures. Russia was an exception with 52 deputies. The Soviet Union consisted of deputies apportioned by the existing quotas. In 1989, its powers were: Passing and initiating laws. Submitting questions to the President of the Soviet Union, the Council of Ministers of the Soviet Union, scheduling elections of deputies. Convening the Congress of People's Deputies. Appointing the Chairman of the Council of Ministers on the submission of the president. Ratifying the composition of the Council of Ministers and changes in it on the submission on the Chairman. Forming and disbanding ministries and state committees on the Council of Ministers proposal. Overriding a presidential veto with a two-thirds majority. Ratifying presidential declarations of war. Impeaching the President. Hearing reports by organs of appointed officials. Implementing laws regulating property, management of the economy, social and cultural issues, budget and finance, | laws enacted as Presidium decrees. Nominally, if such decrees were not ratified by the Supreme Soviet at its next session, they were considered revoked. In practice, however, the principle of democratic centralism rendered the process of ratifying Presidium decrees a mere formality. In some cases, even this formality was not observed. After 1989 it consisted of 542 deputies (divided into two 271 chambers). (decreased from previously 1,500). The meetings of the body were also more frequent, from six to eight months a year. In September 1991, after the August Coup, it was reorganised into the Soviet (council) of Republics and the Soviet of The Union, which would jointly amend the Soviet Constitution, admit new states, hear out the President of the Soviet Union on important home and foreign policy issues, approve the union budget, declare war and conclude peace. The Soviet of Republics would consist of 20 deputies from each union republic, plus 1 deputy to represent each autonomous region of each republic, delegated by the republics legislatures. Russia was an exception with 52 deputies. The Soviet Union consisted of deputies apportioned by the existing quotas. In 1989, its powers were: Passing and initiating laws. Submitting questions to the President of the Soviet Union, the Council of Ministers of the Soviet Union, scheduling elections of deputies. Convening the Congress of People's Deputies. Appointing the Chairman of the Council of Ministers on the submission of the president. Ratifying the composition of the Council of Ministers and changes in it on the submission on the Chairman. Forming and disbanding ministries and state committees on the Council of Ministers proposal. Overriding a presidential veto with a two-thirds majority. Ratifying presidential declarations of war. Impeaching the President. Hearing reports by organs of appointed officials. Implementing laws regulating property, management of the economy, social and cultural issues, budget and finance, salaries, prices, taxes, environmental protection, natural resource, and civil rights, Laying down the principals of local and republic state power and the legal status of social organisations, Submitting for ratification (and ratifying and amending) by the congress long-term national and social and economic development plans, the national budget, monitoring implantation of the state plan and budget, and ratifying reports on their performance. Ratifying international treaties. Overseeing the granting of foreign aid and negotiating foreign loans. Determining basic measures for national security, including declarations of war, mobilizing troops, and meeting international treaty obligations. Acts by the Supreme Soviet entered into force after signature by the President and publication. Between 1938 and February 1990, more than 50 years, only 80 laws were passed by the Supreme Soviet, less than 1% of total |
comedy film), a 1917 film starring Oliver Hardy The Slave (1917 drama film), a 1917 Fox film starring Valeska Suratt The Slave (1918 film), a British silent crime film The Slave (1953 film), a French-Italian drama film The Slave (1962 film), a 1962 film starring Steve Reeves My Darling Slave or The Slave, a 1973 sex comedy film Literature Slave - My True Story, a 2002 autobiography by Mende Nazer The Slave (Singer novel), a novel by Isaac Bashevis Singer The Slave (Hichens novel), an 1899 novel by Robert Hichens The Slave, a 1978 novel by Elechi Amadi "The Slave" or "Lu Scavu", a fairy tale from Sicily, Italy Music Artists Slave (band), an Ohio funk band Slaves (American band), a Sacramento, California-based rock band, now known as Rain City Drive Slaves | 2002 autobiography by Mende Nazer The Slave (Singer novel), a novel by Isaac Bashevis Singer The Slave (Hichens novel), an 1899 novel by Robert Hichens The Slave, a 1978 novel by Elechi Amadi "The Slave" or "Lu Scavu", a fairy tale from Sicily, Italy Music Artists Slave (band), an Ohio funk band Slaves (American band), a Sacramento, California-based rock band, now known as Rain City Drive Slaves (English band), a British punk band Albums Slave (Amen album), 1994 Slave (Slave album), 1977 Slave, by Lucky Dube, 1987 Songs "Slave" (François Feldman song), 1987 "Slave" (James Reyne song), 1991 "Slave" (Rolling Stones song), 1981 "Slave", a song by Bleeding Through from Love Will Kill All "Slave", a song by Elton John from Honky Château "Slave", |
of veneration, because Leviticus 17:7 forbids Israelites from making sacrificial offerings to them and 2 Chronicles 11:15 mentions that a special cult was established for the śě’îrîm of Jeroboam I. Like satyrs, they were associated with desolate places and with some variety of dancing. Isaiah 13:21 predicts, in Karen L. Edwards's translation: "But wild animals [ziim] will lie down there, and its houses will be full of howling creatures [ohim]; there ostriches will live, and there goat-demons [śĕ’îr] will dance." Similarly, Isaiah 34:14 declares: "Wildcats [ziim] shall meet with hyenas [iim], goat-demons [śĕ’îr] shall call to each other; there too Lilith [lilit] shall repose and find a place to rest." Śě’îrîm were understood by at least some ancient commentators to be goat-like demons of the wilderness. In the Latin Vulgate translation of the Old Testament, śĕ’îr is translated as "pilosus", which also means "hairy". Jerome, the translator of the Vulgate, equated these figures with satyrs. Both satyrs and śě’îrîm have also been compared to the jinn of Pre-Islamic Arabia, who were envisioned as hairy demons in the forms of animals who could sometimes change into other forms, including human-like ones. In archaic and classical Greece Physical appearance In archaic and classical Greek art, satyrs are shown with the ears and tails of horses. They walk upright on two legs, like human beings. They are usually shown with bestial faces, snub noses, and manelike hair. They are often bearded and balding. Like other Greek nature spirits, satyrs are always depicted nude. Sometimes they also have the legs of horses, but, in ancient art, including both vase paintings and in sculptures, satyrs are most often represented with human legs and feet. Satyrs' genitals are always depicted as either erect or at least extremely large. Their erect phalli represent their association with wine and women, which were the two major aspects of their god Dionysus's domain. In some cases, satyrs are portrayed as very human-like, lacking manes or tails. As time progressed, this became the general trend, with satyrs losing aspects of their original bestial appearance over the course of Greek history and gradually becoming more and more human. In the most common depictions, satyrs are shown drinking wine, dancing, playing flutes, chasing nymphs, or consorting with Dionysus. They are also frequently shown masturbating or copulating with animals. In scenes from ceramic paintings depicting satyrs engaging in orgies, satyrs standing by and watching are often shown masturbating. Behavior One of the earliest written sources for satyrs is the Catalogue of Women, which is attributed to the Boeotian poet Hesiod. Here satyrs are born alongside the nymphs and Kouretes and are described as "good-for-nothing, prankster Satyrs". Satyrs were widely seen as mischief-makers who routinely played tricks on people and interfered with their personal property. They had insatiable sexual appetites and often sought to seduce or ravish both nymphs and mortal women alike, though these attempts were not always successful. Satyrs almost always appear in artwork alongside female companions of some variety. These female companions may be clothed or nude, but the satyrs always treat them as mere sexual objects. A single elderly satyr named Silenus was believed to have been the tutor of Dionysus on Mount Nysa. After Dionysus grew to maturity, Silenus became one of his most devout followers, remaining perpetually drunk. This image was reflected in the classical Athenian satyr play. Satyr plays were a genre of plays defined by the fact that their choruses were invariably made up of satyrs. These satyrs are always led by Silenus, who is their "father". According to Carl A. Shaw, the chorus of satyrs in a satyr play were "always trying to get a laugh with their animalistic, playfully rowdy, and, above all, sexual behavior." The satyrs play an important role in driving the plot of the production, without any of them actually being the lead role, which was always reserved for a god or tragic hero. Many satyr plays are named for the activity in which the chorus of satyrs engage during the production, such as Δικτυουλκοί (Diktyoulkoí; Net-Haulers), Θεωροὶ ἢ Ἰσθμιασταί (Theōroì ē Isthmiastaí; Spectators or Competitors at the Isthmian Games), and Ἰχνευταί (Ichneutaí; Searchers). Like tragedies, but unlike comedies, satyr plays were set in the distant past and dealt with mythological subjects. The third or second-century BC philosopher Demetrius of Phalerum famously characterized the satiric genre in his treatise De Elocutione as the middle ground between tragedy and comedy: a "playful tragedy" (, tragōdía paízdousa). The only complete extant satyr play is Euripides's Cyclops, which is a burlesque of a scene from the eighth-century BC epic poem, the Odyssey, in which Odysseus is captured by the Cyclops Polyphemus in a cave. In the play, Polyphemus has captured a tribe of satyrs led by Silenus, who is described as their "Father", and forced them to work for him as his slaves. After Polyphemus captures Odysseus, Silenus attempts to play Odysseus and Polyphemus off each other for his own benefit, primarily by tricking them into giving him wine. As in the original scene, Odysseus manages to blind Polyphemus and escape. Approximately 450 lines, most of which are fragmentary, have survived of Sophocles's satyr play Ichneutae (Tracking Satyrs). In the surviving portion of the play, the chorus of satyrs are described as "lying on the ground like hedgehogs in a bush, or like a monkey bending over to fart at someone." The character Cyllene scolds them: "All you [satyrs] do you do for the sake of fun!... Cease to expand your smooth phallus with delight. You should not make silly jokes and chatter, so that the gods will make you shed tears to make me laugh." In Dionysius I of Syracuse's fragmentary satyr play Limos (Starvation), Silenus attempts to give the hero Heracles an enema. A number of vase paintings depict scenes from satyr plays, including the Pronomos Vase, which depicts the entire cast of a victorious satyr play, dressed in costume, wearing shaggy leggings, erect phalli, and horse tails. The genre's reputation for crude humor is alluded to in other texts as well. In Aristophanes's comedy Thesmophoriazusae, the tragic poet Agathon declares that a dramatist must be able to adopt the personae of his characters in order to successfully portray them on stage. In lines 157–158, Euripides's unnamed relative retorts: "Well, let me know when you're writing satyr plays; I'll get behind you with my hard-on and show you how." This is the only extant reference to the genre of satyr plays from a work of ancient Greek comedy and, according to Shaw, it effectively characterizes satyr plays as "a genre of 'hard-ons.'" In spite of their bawdy behavior, however, satyrs were still revered as semi-divine beings and companions of the god Dionysus. They were thought to possess their own kind of wisdom that was useful to humans if they could be convinced to share it. In Plato's Symposium, Alcibiades praises Socrates by comparing him to the famous satyr Marsyas. He resembles him physically, since he is balding and has a snub-nose, but Alcibiades contends that he resembles him mentally as well, because he is "insulting and abusive", in possession of irresistible charm, "erotically inclined to beautiful people", and "acts as if he knows nothing". Alcibiades concludes that Socrates's role as a philosopher is similar to that of the paternal satyr Silenus, because, at first, his questions seem ridiculous and laughable, but, upon closer inspection, they are revealed to be filled with much wisdom. One story, mentioned by Herodotus in his Histories and in a fragment by Aristotle, recounts that King Midas once captured a silenus, who provided him with wise philosophical advice. Mythology According to classicist William Hansen, although satyrs were popular in classical art, they rarely appear in surviving mythological accounts. Different classical sources present conflicting accounts of satyrs' origins. According to a fragment from the Hesiodic Catalogue of Women, satyrs are sons of the five granddaughters of Phoroneus and therefore siblings of the Oreads and the Kouretes. The satyr Marsyas, however, is described by mythographers as the son of either Olympos or Oiagros. Hansen observes that "there may be more than one way to produce a satyr, as there is to produce a Cyclops or a centaur." The classical Greeks recognized that satyrs obviously could not self-reproduce since there were no female satyrs, but they seem to have been unsure whether satyrs were mortal or immortal. Rather than appearing en masse as in satyr-plays, when satyrs appear in myths it is usually in the form of a single, famous character. The comic playwright Melanippides of Melos ( 480–430 BC) tells the story in his lost comedy Marsyas of how, after inventing the aulos, the goddess Athena looked in the mirror while she was playing it. She saw how blowing into it puffed up her cheeks and made her look silly, so she threw the aulos away and cursed it so that whoever picked it up would meet an awful death. The aulos was picked up by the satyr Marsyas, who challenged Apollo to a musical contest. They both agreed beforehand that whoever won would be allowed to do whatever he wanted to the loser. Marsyas played the aulos and Apollo played the lyre. Apollo turned his lyre upside-down and played it. He asked Marsyas to do the same with his instrument. Since he could not, Apollo was deemed to victor. Apollo hung Marsyas from a pine tree and flayed him alive to punish him for his hubris in daring to challenge one of the gods. Later, this story became accepted as canonical and the Athenian sculptor Myron created a group of bronze sculptures based on it, which was installed before the western front of the Parthenon in around 440 BC. Surviving retellings of the legend are found in the Library of Pseudo-Apollodorus, Pausanias's Guide to Greece, and the Fabulae of Pseudo-Hyginus. In a myth referenced in multiple classical texts, including the Bibliotheke of Pseudo-Apollodorus and the Fabulae of Pseudo-Hyginus, a satyr from Argos once attempted to rape the nymph Amymone, but she called to the god Poseidon for help and he launched his trident at the satyr, knocking him to the ground. This myth may have originated from Aeschylus's lost satyr play Amymone. Scenes of one or more satyrs chasing Amymone became a common trope in Greek vase paintings starting in the late fifth century BC. Among the earliest depictions of the scene come from a bell krater in the style of the Peleus Painter from Syracuse (PEM 10, pl. 155) and a bell krater in the style of the Dinos Painter from Vienna (DM 7). List of Satyrs The names of the satyrs according to various vase paintings were: Babacchos, Briacchos, Dithyrambos, Demon, Dromis, Echon, Hedyoinos ("Sweet Wine"), Hybris ("Insolence"), Hedymeles, ("Sweet Song"), Komos ("Revelry"), Kissos ("Ivy"), Molkos, Oinos, Oreimachos, Simos ("Snub-nose"), Terpon and Tyrbas ("Rout"). Later antiquity Hellenistic Era The iconography of satyrs was gradually conflated with that of the Pans, plural forms of the god Pan, who were regularly depicted with the legs and horns of a goat. By the Hellenistic Period (323–31 BC), satyrs were beginning to sometimes be shown with goat-like features. Meanwhile, both satyrs and Pans also continued to be shown as more human and less bestial. Scenes of satyrs and centaurs were very popular during the Hellenistic Period. They often appear dancing or playing the aulos. The maenads that often accompany satyrs in Archaic and Classical representations are often replaced in Hellenistic portrayals with wood nymphs. Artists also began to widely represent scenes of nymphs repelling the unwanted advances of amorous satyrs. Scenes of this variety were used to express the dark, beastly side of human sexuality at a remove by attributing that sexuality to satyrs, who were part human and part animal. In this way, satyrs became vehicles of a metaphor for a phenomenon extending far beyond the original narrative purposes in which they served during earlier periods of Greek history. Some variants on this theme represent a satyr being rebuffed by a hermaphrodite, who, from the satyr's perspective, appears to be a beautiful, young girl. These sculptures may have been intended as kind of sophisticated erotic joke. The Athenian sculptor Praxiteles's statue Pouring Satyr represented the eponymous satyr as very human-like. The satyr was shown as very young, in line with Praxiteles's frequent agenda of representing deities and other figures as adolescents. This tendency is also attested in the descriptions of his sculptures of Dionysus and the Archer Eros written in the third or fourth century AD by the art critic Callistratus. The original statue is widely assumed to have depicted the satyr in the act of pouring an oinochoe over his head into a cup, probably a kantharos. Antonio Corso describes the satyr in this sculpture as a "gentle youth" and "a precious and gentle being" with "soft and velvety" skin. The only hints at his "feral nature" were his ears, which were slightly pointed, and his small tail. The shape of the sculpture was an S-shape, shown in three-quarter view. The satyr had short, boyish locks, derived from those of earlier Greek athletic sculpture. Although the original statue has been lost, a representation of the pouring satyr appears in a late classical relief sculpture from Athens and twenty-nine alleged "copies" of the statue from the time of the Roman Empire have also survived. Olga Palagia and J. J. Pollitt argue that, although the Pouring Satyr is widely accepted as a genuine work of Praxiteles, it may not have been a single work at all and the supposed "copies" of it may merely be Roman sculptures repeating the traditional Greek motif of pouring wine at symposia. Ancient Rome The Romans identified satyrs with their own nature spirits, fauns. Although generally similar to satyrs, fauns differed in that they were usually seen as "shy, woodland creatures" rather than the drunk and boisterous satyrs of the classical Greeks. Also, fauns generally lacked the association Greek satyrs had with secret wisdom. Unlike classical Greek satyrs, fauns were unambiguously goat-like; they had the upper bodies of men, but the legs, hooves, tail, and horns of goats. The first-century BC Roman poet Lucretius mentions in his lengthy poem De rerum natura that people of his time believed in "goat-legged" (capripedes) satyrs, along with nymphs who lived in the mountains and fauns who played rustic music on stringed instruments and pipes. In Roman-era depictions, satyrs and fauns are both often associated with music and depicted playing the Pan pipes or syrinx. The poet Virgil, who flourished during the early years of the Roman Empire, recounts a story in his sixth Eclogue about two boys who tied up the satyr Silenus while he was in a drunken stupor and forced him to sing them a song about the beginning of the universe. The first-century AD Roman poet Ovid makes Jupiter, the king of the gods, express worry that the viciousness of humans will leave fauns, nymphs, and satyrs without a place to live, so he gives them a home in the forests, woodlands, and mountains, where they will be safe. Ovid also retells the story of Marsyas's hubris. He describes a musical contest between Marsyas, playing the aulos, and the god Apollo, playing the lyre. Marsyas loses and Apollo flays him as punishment. The Roman naturalist and encyclopedist Pliny the Elder conflated satyrs with gibbons, which he describes using the word satyrus, a Latinized form of the Greek satyros. He characterizes them as "a savage and wild people; distinct voice and speech they have none, but in steed thereof, they keep a horrible gnashing and hideous noise: rough they are and hairie all over their bodies, eies they have red like the houlets [owls] and toothed they be like dogs." The second-century Greek Middle Platonist philosopher Plutarch records a legendary incident in his Life of Sulla, in which the soldiers of the Roman general Sulla are reported to have captured a satyr sleeping during a military campaign in Greece in 89 BC. Sulla's men brought the satyr to him and he attempted to interrogate it, but it spoke only in an unintelligible sound: a cross between the neighing of a horse and the bleating of a goat. The second-century Greek travel writer Pausanias reports having seen the tombs of deceased silenoi in Judaea and at Pergamon. Based on these sites, Pausanias concludes that silenoi must be | Silenus, who is their "father". According to Carl A. Shaw, the chorus of satyrs in a satyr play were "always trying to get a laugh with their animalistic, playfully rowdy, and, above all, sexual behavior." The satyrs play an important role in driving the plot of the production, without any of them actually being the lead role, which was always reserved for a god or tragic hero. Many satyr plays are named for the activity in which the chorus of satyrs engage during the production, such as Δικτυουλκοί (Diktyoulkoí; Net-Haulers), Θεωροὶ ἢ Ἰσθμιασταί (Theōroì ē Isthmiastaí; Spectators or Competitors at the Isthmian Games), and Ἰχνευταί (Ichneutaí; Searchers). Like tragedies, but unlike comedies, satyr plays were set in the distant past and dealt with mythological subjects. The third or second-century BC philosopher Demetrius of Phalerum famously characterized the satiric genre in his treatise De Elocutione as the middle ground between tragedy and comedy: a "playful tragedy" (, tragōdía paízdousa). The only complete extant satyr play is Euripides's Cyclops, which is a burlesque of a scene from the eighth-century BC epic poem, the Odyssey, in which Odysseus is captured by the Cyclops Polyphemus in a cave. In the play, Polyphemus has captured a tribe of satyrs led by Silenus, who is described as their "Father", and forced them to work for him as his slaves. After Polyphemus captures Odysseus, Silenus attempts to play Odysseus and Polyphemus off each other for his own benefit, primarily by tricking them into giving him wine. As in the original scene, Odysseus manages to blind Polyphemus and escape. Approximately 450 lines, most of which are fragmentary, have survived of Sophocles's satyr play Ichneutae (Tracking Satyrs). In the surviving portion of the play, the chorus of satyrs are described as "lying on the ground like hedgehogs in a bush, or like a monkey bending over to fart at someone." The character Cyllene scolds them: "All you [satyrs] do you do for the sake of fun!... Cease to expand your smooth phallus with delight. You should not make silly jokes and chatter, so that the gods will make you shed tears to make me laugh." In Dionysius I of Syracuse's fragmentary satyr play Limos (Starvation), Silenus attempts to give the hero Heracles an enema. A number of vase paintings depict scenes from satyr plays, including the Pronomos Vase, which depicts the entire cast of a victorious satyr play, dressed in costume, wearing shaggy leggings, erect phalli, and horse tails. The genre's reputation for crude humor is alluded to in other texts as well. In Aristophanes's comedy Thesmophoriazusae, the tragic poet Agathon declares that a dramatist must be able to adopt the personae of his characters in order to successfully portray them on stage. In lines 157–158, Euripides's unnamed relative retorts: "Well, let me know when you're writing satyr plays; I'll get behind you with my hard-on and show you how." This is the only extant reference to the genre of satyr plays from a work of ancient Greek comedy and, according to Shaw, it effectively characterizes satyr plays as "a genre of 'hard-ons.'" In spite of their bawdy behavior, however, satyrs were still revered as semi-divine beings and companions of the god Dionysus. They were thought to possess their own kind of wisdom that was useful to humans if they could be convinced to share it. In Plato's Symposium, Alcibiades praises Socrates by comparing him to the famous satyr Marsyas. He resembles him physically, since he is balding and has a snub-nose, but Alcibiades contends that he resembles him mentally as well, because he is "insulting and abusive", in possession of irresistible charm, "erotically inclined to beautiful people", and "acts as if he knows nothing". Alcibiades concludes that Socrates's role as a philosopher is similar to that of the paternal satyr Silenus, because, at first, his questions seem ridiculous and laughable, but, upon closer inspection, they are revealed to be filled with much wisdom. One story, mentioned by Herodotus in his Histories and in a fragment by Aristotle, recounts that King Midas once captured a silenus, who provided him with wise philosophical advice. Mythology According to classicist William Hansen, although satyrs were popular in classical art, they rarely appear in surviving mythological accounts. Different classical sources present conflicting accounts of satyrs' origins. According to a fragment from the Hesiodic Catalogue of Women, satyrs are sons of the five granddaughters of Phoroneus and therefore siblings of the Oreads and the Kouretes. The satyr Marsyas, however, is described by mythographers as the son of either Olympos or Oiagros. Hansen observes that "there may be more than one way to produce a satyr, as there is to produce a Cyclops or a centaur." The classical Greeks recognized that satyrs obviously could not self-reproduce since there were no female satyrs, but they seem to have been unsure whether satyrs were mortal or immortal. Rather than appearing en masse as in satyr-plays, when satyrs appear in myths it is usually in the form of a single, famous character. The comic playwright Melanippides of Melos ( 480–430 BC) tells the story in his lost comedy Marsyas of how, after inventing the aulos, the goddess Athena looked in the mirror while she was playing it. She saw how blowing into it puffed up her cheeks and made her look silly, so she threw the aulos away and cursed it so that whoever picked it up would meet an awful death. The aulos was picked up by the satyr Marsyas, who challenged Apollo to a musical contest. They both agreed beforehand that whoever won would be allowed to do whatever he wanted to the loser. Marsyas played the aulos and Apollo played the lyre. Apollo turned his lyre upside-down and played it. He asked Marsyas to do the same with his instrument. Since he could not, Apollo was deemed to victor. Apollo hung Marsyas from a pine tree and flayed him alive to punish him for his hubris in daring to challenge one of the gods. Later, this story became accepted as canonical and the Athenian sculptor Myron created a group of bronze sculptures based on it, which was installed before the western front of the Parthenon in around 440 BC. Surviving retellings of the legend are found in the Library of Pseudo-Apollodorus, Pausanias's Guide to Greece, and the Fabulae of Pseudo-Hyginus. In a myth referenced in multiple classical texts, including the Bibliotheke of Pseudo-Apollodorus and the Fabulae of Pseudo-Hyginus, a satyr from Argos once attempted to rape the nymph Amymone, but she called to the god Poseidon for help and he launched his trident at the satyr, knocking him to the ground. This myth may have originated from Aeschylus's lost satyr play Amymone. Scenes of one or more satyrs chasing Amymone became a common trope in Greek vase paintings starting in the late fifth century BC. Among the earliest depictions of the scene come from a bell krater in the style of the Peleus Painter from Syracuse (PEM 10, pl. 155) and a bell krater in the style of the Dinos Painter from Vienna (DM 7). List of Satyrs The names of the satyrs according to various vase paintings were: Babacchos, Briacchos, Dithyrambos, Demon, Dromis, Echon, Hedyoinos ("Sweet Wine"), Hybris ("Insolence"), Hedymeles, ("Sweet Song"), Komos ("Revelry"), Kissos ("Ivy"), Molkos, Oinos, Oreimachos, Simos ("Snub-nose"), Terpon and Tyrbas ("Rout"). Later antiquity Hellenistic Era The iconography of satyrs was gradually conflated with that of the Pans, plural forms of the god Pan, who were regularly depicted with the legs and horns of a goat. By the Hellenistic Period (323–31 BC), satyrs were beginning to sometimes be shown with goat-like features. Meanwhile, both satyrs and Pans also continued to be shown as more human and less bestial. Scenes of satyrs and centaurs were very popular during the Hellenistic Period. They often appear dancing or playing the aulos. The maenads that often accompany satyrs in Archaic and Classical representations are often replaced in Hellenistic portrayals with wood nymphs. Artists also began to widely represent scenes of nymphs repelling the unwanted advances of amorous satyrs. Scenes of this variety were used to express the dark, beastly side of human sexuality at a remove by attributing that sexuality to satyrs, who were part human and part animal. In this way, satyrs became vehicles of a metaphor for a phenomenon extending far beyond the original narrative purposes in which they served during earlier periods of Greek history. Some variants on this theme represent a satyr being rebuffed by a hermaphrodite, who, from the satyr's perspective, appears to be a beautiful, young girl. These sculptures may have been intended as kind of sophisticated erotic joke. The Athenian sculptor Praxiteles's statue Pouring Satyr represented the eponymous satyr as very human-like. The satyr was shown as very young, in line with Praxiteles's frequent agenda of representing deities and other figures as adolescents. This tendency is also attested in the descriptions of his sculptures of Dionysus and the Archer Eros written in the third or fourth century AD by the art critic Callistratus. The original statue is widely assumed to have depicted the satyr in the act of pouring an oinochoe over his head into a cup, probably a kantharos. Antonio Corso describes the satyr in this sculpture as a "gentle youth" and "a precious and gentle being" with "soft and velvety" skin. The only hints at his "feral nature" were his ears, which were slightly pointed, and his small tail. The shape of the sculpture was an S-shape, shown in three-quarter view. The satyr had short, boyish locks, derived from those of earlier Greek athletic sculpture. Although the original statue has been lost, a representation of the pouring satyr appears in a late classical relief sculpture from Athens and twenty-nine alleged "copies" of the statue from the time of the Roman Empire have also survived. Olga Palagia and J. J. Pollitt argue that, although the Pouring Satyr is widely accepted as a genuine work of Praxiteles, it may not have been a single work at all and the supposed "copies" of it may merely be Roman sculptures repeating the traditional Greek motif of pouring wine at symposia. Ancient Rome The Romans identified satyrs with their own nature spirits, fauns. Although generally similar to satyrs, fauns differed in that they were usually seen as "shy, woodland creatures" rather than the drunk and boisterous satyrs of the classical Greeks. Also, fauns generally lacked the association Greek satyrs had with secret wisdom. Unlike classical Greek satyrs, fauns were unambiguously goat-like; they had the upper bodies of men, but the legs, hooves, tail, and horns of goats. The first-century BC Roman poet Lucretius mentions in his lengthy poem De rerum natura that people of his time believed in "goat-legged" (capripedes) satyrs, along with nymphs who lived in the mountains and fauns who played rustic music on stringed instruments and pipes. In Roman-era depictions, satyrs and fauns are both often associated with music and depicted playing the Pan pipes or syrinx. The poet Virgil, who flourished during the early years of the Roman Empire, recounts a story in his sixth Eclogue about two boys who tied up the satyr Silenus while he was in a drunken stupor and forced him to sing them a song about the beginning of the universe. The first-century AD Roman poet Ovid makes Jupiter, the king of the gods, express worry that the viciousness of humans will leave fauns, nymphs, and satyrs without a place to live, so he gives them a home in the forests, woodlands, and mountains, where they will be safe. Ovid also retells the story of Marsyas's hubris. He describes a musical contest between Marsyas, playing the aulos, and the god Apollo, playing the lyre. Marsyas loses and Apollo flays him as punishment. The Roman naturalist and encyclopedist Pliny the Elder conflated satyrs with gibbons, which he describes using the word satyrus, a Latinized form of the Greek satyros. He characterizes them as "a savage and wild people; distinct voice and speech they have none, but in steed thereof, they keep a horrible gnashing and hideous noise: rough they are and hairie all over their bodies, eies they have red like the houlets [owls] and toothed they be like dogs." The second-century Greek Middle Platonist philosopher Plutarch records a legendary incident in his Life of Sulla, in which the soldiers of the Roman general Sulla are reported to have captured a satyr sleeping during a military campaign in Greece in 89 BC. Sulla's men brought the satyr to him and he attempted to interrogate it, but it spoke only in an unintelligible sound: a cross between the neighing of a horse and the bleating of a goat. The second-century Greek travel writer Pausanias reports having seen the tombs of deceased silenoi in Judaea and at Pergamon. Based on these sites, Pausanias concludes that silenoi must be mortal. The third-century Greek biographer Philostratus records a legend in his Life of Apollonius of Tyana of how the ghost of an Aethiopian satyr was deeply enamored with the women from the local village and had killed two of them. Then, the philosopher Apollonius of Tyana set a trap for it with wine, knowing that, after drinking it, the ghost-satyr would fall asleep forever. The wine diminished from the container before the onlookers' eyes, but the ghost-satyr himself remained invisible. Once all the wine had vanished, the ghost-satyr fell asleep and never bothered the villagers again. Amira El-Zein notes similarities between this story and later Arabic accounts of jinn. The treatise Saturnalia by the fifth-century AD Roman poet Macrobius connects both the word satyr and the name Saturn to the Greek word for "penis". Macrobius explains that this is on account of satyrs' sexual lewdness. Macrobius also equates Dionysus and Apollo as the same deity and states that a festival in honor of Bacchus is held every year atop Mount Parnassus, at which many satyrs are often seen. After antiquity Middle Ages Starting in late antiquity, Christian writers began to portray satyrs and fauns as dark, evil, and demonic. Jerome ( 347 – 420 AD) described them as symbols of Satan on account of their lasciviousness. Despite this, however, satyrs were sometimes clearly distinguished from demons and sometimes even portrayed as noble. Because Christians believed that the distinction between humans and animals was spiritual rather than physical, it was thought that even a satyr could attain salvation. Isidore of Seville ( 560 – 636) records an anecdote later recounted in the Golden Legend, that Anthony the Great encountered a satyr in the desert who asked to pray with him to their common God. During the Early Middle Ages, features and characteristics of satyrs and the god Pan, who resembled a satyr, became absorbed into traditional Christian iconography of Satan. Medieval storytellers in Western Europe also frequently conflated satyrs with wild men. Both satyrs and wild men were conceived as part human and part animal and both were believed to possess unrestrained sexual appetites. Stories of wild men during the Middle Ages often had an erotic tone and were primarily told orally by peasants, since the clergy officially disapproved of them. In this form, satyrs are sometimes described and represented in medieval bestiaries, where a satyr is often shown dressed in an animal skin, carrying a club and a serpent. In the Aberdeen Bestiary, the Ashmole Bestiary, and MS Harley 3244, a satyr is shown as a nude man holding a wand resembling a jester's club and leaning back, crossing his legs. Satyrs are sometimes juxtaposed with apes, which are characterized as "physically disgusting and akin to the Devil". |
the sail could rotate 90 degrees, allowing the submarine to surface through thin ice. Because the S5W reactor was used (the same as in the Skipjacks and Thresher/Permits), the sail was enlarged (increasing drag), and the displacement was increased, the Sturgeons' top speed was , 2 knots slower than the Thresher/Permits. The last nine Sturgeons were lengthened to provide more space for electronic equipment and habitability. The extra space also helped facilitate the use of dry deck shelters first deployed in 1982. The class received mid-life upgrades in the 1980s, including the BQQ-5 sonar suite with a retractable towed array, Mk 117 torpedo fire control equipment, and other electronics upgrades. Armament The Sturgeon-class boats were equipped to carry the Harpoon missile, the Tomahawk cruise missile, the UUM-44 SUBROC, the Mark 67 SLMM and Mark 60 CAPTOR mines, and the MK-48 and ADCAP torpedoes. Torpedo tubes were located amidships to accommodate the bow-mounted sonar. The bow covering the sonar sphere was made from steel or glass reinforced plastic (GRP), both varieties having been produced both booted and not booted. Booted domes are covered with a half-inch layer of rubber. The GRP domes improved the bow sonar sphere performance; though for intelligence gathering missions, the towed-array sonar was normally used as it was a much more sensitive array. Noise reduction Several Sturgeon boats and related submarines were modifications of the original designs to test ways to reduce noise. was outfitted with Raytheon Harmonic Power Conditioners which eliminated an electrical bus noise problem that was inherent in the class. This was done by harmonic conditioning of the power system. This successful feature was later outfitted on the entire class. was outfitted with SHT (special hull treatment) during a non-refueling overhaul, which reduced noise and the submarine sonar profile. , a one-ship class, was completed using a turbo-electric system for main propulsion rather than a reduction gear drive from the steam turbines. The massive motor and associated generators required her to be lengthened to . The Lipscombs trial of turbo-electric propulsion was not considered successful due to lower speed - top speed was , 5 | the sail could rotate 90 degrees, allowing the submarine to surface through thin ice. Because the S5W reactor was used (the same as in the Skipjacks and Thresher/Permits), the sail was enlarged (increasing drag), and the displacement was increased, the Sturgeons' top speed was , 2 knots slower than the Thresher/Permits. The last nine Sturgeons were lengthened to provide more space for electronic equipment and habitability. The extra space also helped facilitate the use of dry deck shelters first deployed in 1982. The class received mid-life upgrades in the 1980s, including the BQQ-5 sonar suite with a retractable towed array, Mk 117 torpedo fire control equipment, and other electronics upgrades. Armament The Sturgeon-class boats were equipped to carry the Harpoon missile, the Tomahawk cruise missile, the UUM-44 SUBROC, the Mark 67 SLMM and Mark 60 CAPTOR mines, and the MK-48 and ADCAP torpedoes. Torpedo tubes were located amidships to accommodate the bow-mounted sonar. The bow covering the sonar sphere was made from steel or glass reinforced plastic (GRP), both varieties having been produced both booted and not booted. Booted domes are covered with a half-inch layer of rubber. The GRP domes improved the bow sonar sphere performance; though for intelligence gathering missions, the towed-array sonar was normally used as it was a much more sensitive array. Noise reduction Several Sturgeon boats and related submarines were modifications of the original designs to test ways to reduce noise. was outfitted with Raytheon Harmonic Power Conditioners which eliminated an electrical bus noise problem that was inherent in the class. This was done by harmonic conditioning of the power system. This successful feature was later outfitted on the entire class. was outfitted with SHT (special hull treatment) during a non-refueling overhaul, which reduced noise and the submarine sonar profile. , a one-ship class, was completed using a turbo-electric system for main propulsion rather than a reduction gear drive from the steam turbines. The massive motor and associated generators required her to be lengthened to . The Lipscombs trial of turbo-electric propulsion was not considered successful due to lower speed - top speed was , 5 knots slower than the Thresher/Permits - and a lack of reliability, and she was decommissioned in 1989. , the most quiet submarine of her era, is often listed as a Sturgeon-class boat: nearly all references from the time of her construction in the 1960s identify her as such. However, later sources such as Friedman (1994) identify her as a unique design with very little in common with the Sturgeon-class. The published list of Ship Characteristics Board projects would seem to confirm this later view: the Thresher/Permit-class |
cost about $3 billion per unit ($3.5 billion for USS Jimmy Carter), making it the most expensive SSN submarine and second most expensive submarine ever, after the French SSBN . Design The Seawolf design was intended to combat the threat of advanced Soviet ballistic missile submarines such as the , and attack submarines such as the in a deep-ocean environment. Seawolf-class hulls are constructed from HY-100 steel, which is stronger than the HY-80 steel employed in previous classes, in order to withstand water pressure at greater depths. Seawolf submarines are larger, faster, and significantly quieter than previous Los Angeles-class submarines; they also carry more weapons and have twice as many torpedo tubes. The boats are able to carry up to 50 UGM-109 Tomahawk cruise missiles for attacking land and sea surface targets. The boats also have extensive equipment to allow shallow water operations. The class uses the more advanced ARCI Modified AN/BSY-2 combat system, which includes a larger spherical sonar array, a wide aperture array (WAA), and a new towed-array sonar. Each boat is powered by a single S6W nuclear reactor, delivering to a low-noise pump-jet. As a result of their advanced design, however, Seawolf submarines were much more expensive. | the intended successor to the , and design work began in 1983. A fleet of 29 submarines was to be built over a ten-year period, but that was reduced to 12 submarines. The end of the Cold War and budget constraints led to the cancellation of any further additions to the fleet in 1995, leaving the Seawolf class limited to just three boats. This, in turn, led to the design of the smaller . The Seawolf class cost about $3 billion per unit ($3.5 billion for USS Jimmy Carter), making it the most expensive SSN submarine and second most expensive submarine ever, after the French SSBN . Design The Seawolf design was intended to combat the threat of advanced Soviet ballistic missile submarines such as the , and attack submarines such as the in a deep-ocean environment. Seawolf-class hulls are constructed from HY-100 steel, which is stronger than the HY-80 steel employed in previous classes, in order to withstand water pressure at greater depths. Seawolf submarines are larger, faster, and significantly quieter than previous Los Angeles-class submarines; they also carry more weapons and have twice as |
History SunOS 1 only supported the Sun-2 series systems, including Sun-1 systems upgraded with Sun-2 (68010) CPU boards. SunOS 2 supported Sun-2 and Sun-3 (68020) series systems. SunOS 4 supported Sun-2 (until release 4.0.3), Sun-3 (until 4.1.1), Sun386i (4.0, 4.0.1 and 4.0.2 only) and Sun-4 (SPARC) architectures. Although SunOS 4 was intended to be the first release to fully support Sun's new SPARC processor, there was also a SunOS 3.2 release with preliminary support for Sun-4 systems. SunOS 4.1.2 introduced support for Sun's first sun4m-architecture multiprocessor machines (the SPARCserver 600MP series); since it had only a single lock for the kernel, only one CPU at a time could execute in the kernel. The last release of SunOS 4 was 4.1.4 (Solaris 1.1.2) in 1994. The sun4, sun4c and sun4m architectures were supported in 4.1.4; sun4d was not supported. Sun continued to ship SunOS 4.1.3 and 4.1.4 until December 27, 1998; they were supported until September 30, 2003. "SunOS" and "Solaris" In 1987, AT&T Corporation and Sun announced that they were collaborating on a project to merge the most popular Unix flavors on the market at that time: BSD (including many of the features then unique to SunOS), System V, and Xenix. This would become System V Release 4 (SVR4). On | then unique to SunOS), System V, and Xenix. This would become System V Release 4 (SVR4). On September 4, 1991, Sun announced that its next major OS release would switch from its BSD-derived source base to one based on SVR4. Although the internal designation of this release would be SunOS 5, from this point Sun began using the marketing name Solaris. The justification for this new "overbrand" was that it encompassed not only SunOS, but also the OpenWindows desktop environment and Open Network Computing (ONC) functionality. Even though the new SVR4-based OS was not expected to ship in volume until the following year, Sun immediately began using the new Solaris name to refer to the currently shipping SunOS 4 release (also including OpenWindows). Thus SunOS 4.1.1 was rebranded Solaris 1.0; SunOS 5.0 would be considered a part of Solaris 2.0. SunOS 4.1.x micro versions continued to be released through 1994, and each of these was also given a Solaris 1.x equivalent name. In practice, these were often still referred to by customers and even Sun personnel by their SunOS release names. Matching the version numbers was not straightforward: Today, SunOS 5 is universally known as Solaris, although the SunOS name is still visible within the OS itself in the startup banner, the output of the uname command, |
security practitioners, and the SANS Reading Room, a research archive of information security policy and research documents. SANS is one of the founding organizations of the Center for Internet Security. SANS offers news and analysis through Twitter feeds and e-mail newsletters. Additionally, there is a weekly news and vulnerability digest available to subscribers. Training When originally organized in 1989, SANS training events functioned like traditional technical conferences showcasing technical presentations. By the mid-1990s, SANS offered events which combined training with tradeshows. Beginning in 2006, SANS offered asynchronous online training (SANS OnDemand) and a virtual, synchronous classroom format (SANS vLive). Free webcasts and email newsletters (@Risk, Newsbites, Ouch!) have been developed in conjunction with security vendors. The actual content behind SANS training courses and training events remain "vendor-agnostic". Vendors cannot pay to offer their own official SANS course, although they can teach a SANS "hosted" event via sponsorship. In 1999, the SANS Institute formed Global Information Assurance Certification (GIAC), an independent entity that grants certifications in information security topics. It has developed and operates NetWars, a suite of interactive learning tools for simulating scenarios such as cyberattacks. NetWars is in use by the US Air Force and the US Army. Faculty The | majority of SANS faculty are not SANS employees, but industry professionals and experts in the field of information security. The faculty is organized into six different levels: Mentors, Community, Certified Instructors, Principal Instructors, Senior Instructors, and Fellows. SANS Technology Institute SANS established the SANS Technology Institute, an accredited college based on SANS training and GIAC certifications. On November 21, 2013, SANS Technology Institute was granted regional accreditation by the Middle States Commission on Higher Education. SANS Technology Institute focuses exclusively on cybersecurity, offering a Master of Science degree program in Information Security Engineering (MSISE), five post-baccalaureate certificate programs (Penetration Testing & Ethical Hacking, Incident Response, Industrial Control Systems, Cyber Defense Operations, and Cybersecurity Engineering (Core), and an upper-division undergraduate certificate program (Applied Cybersecurity). SANS continues to offer free security content via the SANS Technology Institute Leadership Lab and IT/Security related leadership information. See also Computer security Information security Information Security Forum IT |
in the United States to support President Richard Nixon during the Watergate scandal when Nixon was being pressured to resign his office. Church members prayed and fasted in support of Nixon for three days in front of the United States Capitol, under the motto: "Forgive, Love and Unite." On 1 February 1974 Nixon publicly thanked them for their support and officially received Moon. This brought the church into widespread public and media attention. In the 1970s, Moon, who had seldom before spoken to the general public, gave a series of public speeches to audiences in the United States, Japan, and South Korea. The largest were a rally in 1975 against North Korean aggression in Seoul and a speech at an event organized by the Unification Church in Washington D.C. United States v. Sun Myung Moon In 1982, Moon was convicted in the United States of filing false federal income tax returns and conspiracy. His conviction was upheld on appeal in a split decision. Moon was given an 18-month sentence and a $15,000 fine. He served 13 months of the sentence at the Federal Correctional Institution, Danbury before being released on good behavior to a halfway house. The case was the center of national freedom of religion and free speech debates. Prof. Laurence H. Tribe of the Harvard University Law School argued that the trial by jury had "doomed (Moon) to conviction based on religious prejudice." The American Baptist Churches in the U.S.A, the National Council of Churches, the National Black Catholic Clergy Caucus, and the Southern Christian Leadership Conference filed briefs in support of Moon. Many notable clergy, including Jerry Falwell and Joseph Lowery, signed petitions protesting the government's case and spoke out in defense of Moon. The Washington Times In 1982 The Washington Times was founded by News World Communications, an international media conglomerate associated with Moon which also owned newspapers in South Korea, Japan, and South America, as well as the news agency United Press International. The political views of The Washington Times have often been described as conservative. The Times was read by many Washington DC insiders, including Ronald Reagan. By 2002 Moon had invested roughly $1.7 billion to support the Times, which he called "the instrument in spreading the truth about God to the world". Twenty-first century events In 2000, Moon sponsored a United Nations conference which proposed the formation of "a religious assembly, or council of religious representatives, within the structure of the United Nations." In 2003, Moon sponsored the first Peace Cup international club football tournament. The Los Angeles Galaxy, which competes in Major League Soccer, played in South Korea in the Peace Cup. During the event Pelé, widely regarded as the best soccer player of all time and former Brazilian Sports Minister, met with Moon. In 2009, Moon's autobiography, As a Peace-Loving Global Citizen (), was published by Gimm-Young Publishers in South Korea. The book became a best-seller in Korea and Japan. Said to be the inspiration of Gimm-Young CEO Eun Ju Park, a devout Buddhist, the book focused more on Moon's role as a Korean patriot and an international peace advocate than as a religious figure. By 2010, Moon had given much of the responsibility for Family Federation for World Peace and Unification religious and business activities to his children, who were then in their 30s and 40s. In 2012, the South Korean press reported that Moon traveled worldwide in his private jet which cost $50 million. Illness and death On 14 August 2012, after suffering from pneumonia earlier in the month, Moon was admitted to Saint Mary's Hospital at The Catholic University of Korea in Seoul. On 15 August 2012, he was reported to be gravely ill and was put on a ventilator at the intensive care unit of St. Mary's Hospital. On 31 August 2012, Moon was transferred to a church-owned hospital near his home in Gapyeong, northeast of Seoul, after suffering multiple organ failure. Moon died on the morning of 3 September 2012 (1:54 am KST) at the age of 92. Activities and interests Politics In 1964 Moon founded the Korean Culture and Freedom Foundation, which promoted the interests of South Korea and sponsored Radio Free Asia. Former U.S. Presidents Harry S Truman, Dwight D. Eisenhower and Richard Nixon were honorary presidents or directors at various times. In 1972 Moon predicted the decline of communism, based on the teachings of the Divine Principle: "After 7,000 biblical years – 6,000 years of restoration history plus the millennium, the time of completion – communism will fall in its 70th year. Here is the meaning of the year 1978. Communism, begun in 1917, could maintain itself approximately 60 years and reach its peak. So 1978 is the border line and afterward communism will decline; in the 70th year it will be altogether ruined. This is true. Therefore, now is the time for people who are studying communism to abandon it." In 1980, Moon asked church members to found CAUSA International as an anti-communist educational organization, based in New York. In the 1980s, it was active in 21 countries. In the United States it sponsored educational conferences for Christian leaders as well as seminars and conferences for Senate staffers and other activists. In 1986, it produced the anti-communist documentary film Nicaragua Was Our Home. CAUSA supported the Nicaraguan Contras. In August 1985 the Professors World Peace Academy, an organization founded by Moon, sponsored a conference in Geneva to debate the theme "The situation in the world after the fall of the communist empire." In April 1990, Moon visited the Soviet Union and met with President Mikhail Gorbachev. Moon expressed support for the political and economic transformations under way in the Soviet Union. At the same time the Unification Church was expanding into formerly communist nations. After the dissolution of the Soviet Union in 1991, some American conservatives criticized Moon for his softening of his previous anti-communist stance. In 1991, Moon met with Kim Il Sung, the North Korean President, to discuss ways to achieve peace on the Korean peninsula, as well as on international relations, tourism, etc. In 1994, Moon was officially invited to the funeral of Kim Il Sung, in spite of the absence of diplomatic relations between North Korea and South Korea. Moon and his church are known for their efforts to promote Korean unification. In 2003, Korean Unification Church members started a political party in South Korea. It was named "The Party for God, Peace, Unification, and Home." In its inauguration declaration, the new party said it would focus on preparing for Korean reunification by educating the public about God and peace. Moon was a member of the Honorary Committee of the Unification Ministry of the Republic of Korea. In 2012 Moon was posthumously awarded North Korea's National Reunification Prize. In 2005, Rev. Sun Myung Moon and his wife, Dr. Hak Ja Han Moon, founded the Universal Peace Federation (UPF), an NGO in Special Consultative Status with the United Nations Economic and Social Council (ECOSOC). "We support and promote the work of the United Nations and the achievement of the Sustainable Development Goals." Moon's projects have been lobbied in the National Congress of Brazil by Brazilian MPs. Moon has held dialogues between members of the Israeli Knesset and the Palestinian Parliament as part of his Middle East Peace Initiatives. Business Tongil Group is a South Korean business group (chaebol "Tongil" is Korean for "unification," the name of the Unification Church in Korean is "Tongilgyo."), founded in 1963 by Moon as a nonprofit organization to provide revenue for the church. Its core focus was manufacturing but in the 1970s and 1980s it expanded by founding or acquiring businesses in pharmaceuticals, tourism, and publishing. Among Tongil Group's chief holdings are: The Ilwha Company, which produces ginseng and related products; Ilshin Stone, building materials; and Tongil Heavy Industries, machine parts including hardware for the South Korean military. News World Communications is an international news media corporation founded by Moon in 1976. It owns United Press International, World and I, Tiempos del Mundo (Latin America), The Segye Ilbo (South Korea), The Sekai Nippo (Japan), the Zambezi Times (South Africa), and The Middle East Times (Egypt). Until 2008 it published the Washington D.C.-based newsmagazine Insight on the News. Until 2010, it owned the Washington Times. On 2 November 2010, Sun Myung Moon and a group of former Times editors purchased the Times from News World. In 1982, Moon sponsored the film Inchon, an historical drama about the Battle of Inchon during the Korean War. It was not successful critically or financially, and was criticized for its unfair treatment of the North Korean government. In 1989, Moon founded Seongnam Ilhwa Chunma, the most successful soccer club in Korean football, having won a record 7 league titles, 2 FA Cups, 3 League Cups, and 2 AFC Champions League titles. The church is the largest owner of U.S. sushi restaurants and in the Kodiak region of Alaska, is the area's largest employer. The church founded the first currently operating automobile manufacturing plant in North Korea, Pyeonghwa Motors, and is the second largest exporter of Korean goods. In 2011, construction of $18 million Yeosu Expo Hotel was completed; the hotel located at Moon-owned The Ocean Resort in Yeosu, the venue of the Expo 2012. The opening ceremony was attended by the governor of the province. Another one, The Ocean Hotel, was completed in February 2012. Moon-owned Yeongpyeong Resort, The Ocean Resort and Pineridge Resort are scheduled to host the Expo 2012, 2018 Winter Olympics and Formula 1. Moon also managed the FIFA-accredited Peace Cup. The FIFA itself has funded more than $2m for the Peace Cup since 2003. Race relations Moon took a strong stance against racism and racial discrimination. In 1974 he urged Unification Church members to support an African American president of the United States: "We have had enough of white presidents. So, let's this time elect a president from the Negro race. What will you do if I say so? There's no question there. We must never forget that we are brothers and sisters in a huge human family. In any level of community, we must become like a family." In 1981 he said that he himself was a victim of racial prejudice in the United States (concerning his prosecution on tax charges in United States v. Sun Myung Moon), saying: "I would not be standing here today if my skin were white or my religion were Presbyterian. I am here today only because my skin is yellow and my religion is Unification Church. The ugliest things in this beautiful country of America are religious bigotry and racism." Several African American organizations and individuals spoke out in defense of Moon at this time including the National Black Catholic Clergy Caucus, the Southern Christian Leadership Conference, the National Conference of Black Mayors, and Joseph Lowery who was then the head of the Southern Christian Leadership Conference. In a later controversy over the use of the word "Moonie" by the American news media, which was said to be offensive, Moon's position was supported by civil rights activists Ralph Abernathy and James Bevel. In 2000 Moon and The Nation of Islam leader Louis Farrakhan got together to sponsor the Million Family March, a rally in Washington D.C. to celebrate family unity and racial and religious harmony; as well as to address other issues, including abortion, capital punishment, health care, education, welfare and Social Security reform, substance abuse prevention, and overhaul of the World Bank and International Monetary Fund. In his keynote speech Farrakhan called for racial harmony. Dance In 1962, Moon and other church members founded the Little Angels Children's Folk Ballet of Korea, a children's dance troupe which presents traditional Korean folk dances. He said that this was to project a positive image of South Korea to the world. In 1984, Moon founded the $8-million Universal Ballet project, with Soviet-born Oleg Vinogradov as its art director and Moon's daughter-in-law Julia as its prima ballerina. It was described by The New York Times as the top ballet company in Asia. In 1989, Moon founded Universal Ballet Academy which changed its name later to Kirov Academy of Ballet in Washington, D.C. Honorary degrees and other recognition Moon held honorary degrees from more than ten universities and colleges worldwide; at least one of which, the University of Bridgeport, received significant funding from his organizations. He was a member of the Honorary Committee of the Unification Ministry of the Republic of Korea. In 1985, he and his wife received Doctor of Divinity degrees from Shaw University. In 2004, Moon was honored as the Messiah at an event in the Dirksen Senate Office Building, Washington, D.C. This attracted much public attention and was criticized by The New York Times and The Washington Post as a possible violation of the principle of separation of church and state in the United States. Some of the political figures who had attended the event later told reporters that they had been misled as to its nature. Several months after his death, an award named after him and his wife (Sunhak Peace Prize) was proposed, inheriting his will to "recognize and empower innovations in human development, conflict resolution and ecological conservation." Its laureates receive a certificate, a medal, and US$1 million. Moon was posthumously awarded North Korea's National Reunification Prize in 2012 and a meritorious award by K-League. On the first anniversary of Moon's death, North Korean leader Kim Jong-un expressed condolences to Han and the family saying: "Kim Jong-un prayed for the repose of Moon, who worked hard for national concord, prosperity and reunification and world peace." In 2013, Zimbabwean Prime Minister Morgan Tsvangirai stated: "I remain greatly inspired by people like Reverend Dr. Sun Myung Moon, whose work and life across continents continue to impact positively on the lives of millions of others in the world." In 2021, Donald Trump praised Moon in an event linked to Unification Church. Previously, such events held by Unification Church named Rally of Hope, gathered speakers from Trump Administration, e.g. former Vice President Mike Pence, former Secretary of State Mike Pompeo and Advisor Paula White. Criticisms Moon's claim to be the Messiah and the Second Coming of Christ has been disputed by both Jewish and Christian scholars. The Divine Principle was labeled as heretical by Protestant churches in South Korea, including Moon's own Presbyterian Church. In the United States it was rejected by ecumenical organizations as being non-Christian. Protestant commentators have also criticized Moon's teachings as being contrary to the Protestant doctrine of salvation by faith alone. In their influential book The Kingdom of the Cults (first published in 1965), Walter Ralston Martin and Ravi K. Zacharias disagreed with the Divine Principle on the issues of the divinity of Christ, the virgin birth of Jesus, Moon's belief that Jesus should have married, the necessity of the crucifixion of Jesus, a literal resurrection of Jesus, as well as a literal second coming of Jesus. Commentators have criticized the Divine Principle for saying that the First World War, the Second World War, the Holocaust, and the Cold War served as indemnity conditions to prepare the world for the establishment of the Kingdom of God. In 2003, George D. Chryssides of the University of Wolverhampton criticized | country of America are religious bigotry and racism." Several African American organizations and individuals spoke out in defense of Moon at this time including the National Black Catholic Clergy Caucus, the Southern Christian Leadership Conference, the National Conference of Black Mayors, and Joseph Lowery who was then the head of the Southern Christian Leadership Conference. In a later controversy over the use of the word "Moonie" by the American news media, which was said to be offensive, Moon's position was supported by civil rights activists Ralph Abernathy and James Bevel. In 2000 Moon and The Nation of Islam leader Louis Farrakhan got together to sponsor the Million Family March, a rally in Washington D.C. to celebrate family unity and racial and religious harmony; as well as to address other issues, including abortion, capital punishment, health care, education, welfare and Social Security reform, substance abuse prevention, and overhaul of the World Bank and International Monetary Fund. In his keynote speech Farrakhan called for racial harmony. Dance In 1962, Moon and other church members founded the Little Angels Children's Folk Ballet of Korea, a children's dance troupe which presents traditional Korean folk dances. He said that this was to project a positive image of South Korea to the world. In 1984, Moon founded the $8-million Universal Ballet project, with Soviet-born Oleg Vinogradov as its art director and Moon's daughter-in-law Julia as its prima ballerina. It was described by The New York Times as the top ballet company in Asia. In 1989, Moon founded Universal Ballet Academy which changed its name later to Kirov Academy of Ballet in Washington, D.C. Honorary degrees and other recognition Moon held honorary degrees from more than ten universities and colleges worldwide; at least one of which, the University of Bridgeport, received significant funding from his organizations. He was a member of the Honorary Committee of the Unification Ministry of the Republic of Korea. In 1985, he and his wife received Doctor of Divinity degrees from Shaw University. In 2004, Moon was honored as the Messiah at an event in the Dirksen Senate Office Building, Washington, D.C. This attracted much public attention and was criticized by The New York Times and The Washington Post as a possible violation of the principle of separation of church and state in the United States. Some of the political figures who had attended the event later told reporters that they had been misled as to its nature. Several months after his death, an award named after him and his wife (Sunhak Peace Prize) was proposed, inheriting his will to "recognize and empower innovations in human development, conflict resolution and ecological conservation." Its laureates receive a certificate, a medal, and US$1 million. Moon was posthumously awarded North Korea's National Reunification Prize in 2012 and a meritorious award by K-League. On the first anniversary of Moon's death, North Korean leader Kim Jong-un expressed condolences to Han and the family saying: "Kim Jong-un prayed for the repose of Moon, who worked hard for national concord, prosperity and reunification and world peace." In 2013, Zimbabwean Prime Minister Morgan Tsvangirai stated: "I remain greatly inspired by people like Reverend Dr. Sun Myung Moon, whose work and life across continents continue to impact positively on the lives of millions of others in the world." In 2021, Donald Trump praised Moon in an event linked to Unification Church. Previously, such events held by Unification Church named Rally of Hope, gathered speakers from Trump Administration, e.g. former Vice President Mike Pence, former Secretary of State Mike Pompeo and Advisor Paula White. Criticisms Moon's claim to be the Messiah and the Second Coming of Christ has been disputed by both Jewish and Christian scholars. The Divine Principle was labeled as heretical by Protestant churches in South Korea, including Moon's own Presbyterian Church. In the United States it was rejected by ecumenical organizations as being non-Christian. Protestant commentators have also criticized Moon's teachings as being contrary to the Protestant doctrine of salvation by faith alone. In their influential book The Kingdom of the Cults (first published in 1965), Walter Ralston Martin and Ravi K. Zacharias disagreed with the Divine Principle on the issues of the divinity of Christ, the virgin birth of Jesus, Moon's belief that Jesus should have married, the necessity of the crucifixion of Jesus, a literal resurrection of Jesus, as well as a literal second coming of Jesus. Commentators have criticized the Divine Principle for saying that the First World War, the Second World War, the Holocaust, and the Cold War served as indemnity conditions to prepare the world for the establishment of the Kingdom of God. In 2003, George D. Chryssides of the University of Wolverhampton criticized Moon for introducing doctrines which tended to divide the Christian church rather than uniting it, which was his stated purpose in founding the Unification movement (originally named the Holy Spirit Association for the Unification of World Christianity). In his 2009 autobiography Moon himself wrote that he did not originally intend on founding a separate denomination. During the Cold War Moon was criticized by both the mainstream media and the alternative press for his anti-communist activism, which many said could lead to World War Three and a nuclear holocaust. Moon's anti-communist activities received financial support from controversial Japanese millionaire and activist Ryōichi Sasakawa. In 1977 the Subcommittee on International Organizations of the Committee on International Relations, of the United States House of Representatives, while investigating the Koreagate scandal found that the South Korean National Intelligence Service (KCIA) had worked with the Unification Church to gain political influence within the United States, with some members working as volunteers in Congressional offices. Together they founded the Korean Cultural Freedom Foundation, a nonprofit organization which undertook public diplomacy for the Republic of Korea. The committee also investigated possible KCIA influence on the Moon's campaign in support of Richard Nixon. After the dissolution of the Soviet Union in 1991, some American conservatives criticized Moon for his softening of his previous anti-communist stance. In the 1990s when Moon began to offer the Unification marriage blessing ceremony to members of other churches and religions he was criticized for creating possible confusion. In 1998, journalist Peter Maass reported, in The New Yorker, that some Unification members were dismayed and also grumbled when Moon extended the Blessing to non-members who had not gone through the same course that members had. In 2001, Moon came into conflict with the Roman Catholic Church when Catholic archbishop Emmanuel Milingo and Maria Sung, a 43-year-old Korean acupuncturist, married in a blessing ceremony, presided over by Rev. and Mrs. Moon. Following his marriage the Archbishop was called to the Vatican by Pope John Paul II, where he was asked not to see his wife anymore, and to move to a Capuchin monastery. Sung went on a hunger strike to protest their separation. This attracted much media attention. Milingo is now an advocate of the removal of the requirement for celibacy by priests in the Catholic Church. He is the founder of Married Priests Now!. In 2000 Moon was criticized, including by some members of his church, for his support of controversial Nation of Islam leader Louis Farrakhan's Million Family March. Moon was also criticized for his relationship with controversial Jewish scholar Richard L. Rubenstein, an advocate of the "death of God theology" of the 1960s. Rubenstein was a defender of the Unification Church and served on its advisory council, as well as on the board of directors of the church-owned Washington Times newspaper. In the 1990s, he served as president of the University of Bridgeport which was then affiliated with the church. In 1998 the Egyptian newspaper Al-Ahram criticized Moon's possible relationship with Israeli Prime Minister Benjamin Netanyahu and wrote that the Washington Times editorial policy was "rabidly anti-Arab, anti-Muslim and pro-Israel." Moon opposed homosexuality and compared gay people to "dirty dung-eating dogs". He said that "gays will be eliminated" in a "purge on God's orders". In 2009 Moon's support for the Japan–Korea Undersea Tunnel was criticized in Japan and South Korea as a possible threat to both nations' interests and national identities. Other criticisms include: Moon's apparent neglect of his wife, Hak Ja Han, and his appointments of their children and their spouses to leadership positions in the church and related businesses, including their daughter In Jin Moon to the presidency of the Unification Church of the United States against the wishes of some church members; his support of conservatives within the government of South Korea, his assignment of movement members and resources to business projects and political activism, including The Washington Times; as well as the relationship between the Unification Church and Islam, especially following the September 11 attacks in New York City. Moon has also been criticized for his advocacy of a world-wide "automatic theocracy," as well as for advising his followers that they should become "crazy for God." View of Moon by his followers The Divine Principle itself says about Moon: "With the fullness of time, God has sent one person to this earth to resolve the fundamental problems of human life and the universe. His name is Sun Myung Moon. For several decades he wandered through the spirit world so vast as to be beyond imagining. He trod a bloody path of suffering in search of the truth, passing through tribulations that God alone remembers. Since he understood that no one can find the ultimate truth to save humanity without first passing through the bitterest of trials, he fought alone against millions of devils, both in the spiritual and physical worlds, and triumphed over them all. Through intimate spiritual communion with God and by meeting with Jesus and many saints in Paradise, he brought to light all the secrets of Heaven." In 1978 Rodney Sawatsky wrote in an article in Theology Today: "Why trust Rev. Moon's dreams and visions of the new age and his role in it, we ask? Most converts actually have had minimal contact with him. Frederick Sontag (Sun Myung Moon and the Unification Church, Abingdon, 1977) in his interviews with Moon appears to have found a pleasant but not an overwhelming personality. Charisma, as traditionally understood, seems hardly applicable here. Rather, Moon provides a model. He suffered valiantly, he knows confidently, he prays assuredly, he lives lovingly, say his followers. The Divine Principle is not an unrealizable ideal; it is incarnate in a man, it lives, it is imitable. His truth is experienced to be their truth. His explanation of the universe becomes their understanding of themselves and the world in which they live." In 1980 sociologist Irving Louis Horowitz commented: "The Reverend Moon is a fundamentalist with a vengeance. He has a belief system that admits of no boundaries or limits, an all-embracing truth. His writings exhibit a holistic concern for the person, society, nature, and all things embraced by the human vision. |
be used to overcome the statute are limited, and some jurisdictions deny this possibility altogether. The "main purpose rule" as it relates to guarantee or suretyship type contracts: where the promisor's promise to answer for the debt of another is made mainly for the promisor's own economic advantage, then it is a primary promise, and enforceable even without a writing. Easements by implication: easements, which are agreements that permit the use of real estate by someone who has no property interest in the land, may be created by operation of law rather than by written instrument. This may happen where, for example, a piece of land is partitioned between owners and pre-existing utilities routes or access paths that would otherwise be trespassory over one of the plots is reasonably necessary for enjoyment of the other plot. In such case, the pre-existing use must be apparent and continuous at the time of the partition for an easement to be created by implication. The implied easement constitutes an interest in land that does not require a writing to be enforceable. Worldwide Canada The Statute of Frauds recites that it was enacted for the ". . . prevention of many fraudulent practices which are commonly endeavored to be upheld by perjury . . .". The mischief arising from claimants asserting oral agreements was to be avoided by requiring that certain contracts be evidenced by "some memorandum or note thereof . . . in writing and signed by the party to be charged therewith . . .". Contracts respecting land "created by livery and seisen only or by parole" would not be enforced absent such a writing. It quickly became apparent to the common law judges that the Statute might itself become an instrument of fraud (or at least injustice) if it was strictly enforced with respect to contracts that were wholly or partly performed. The courts developed the concept of "part performance" as an exception. If a contract concerning land was partly performed, that could displace the need for a note or memorandum in writing signed by the party to be charged. It was one thing to create an exception that displaced the need for a memorandum in writing, but something else to completely nullify the Statute's operation. The thrust of the Statute was that contracts concerning land could not be proved by parol evidence alone. Thus, part performance might be an exception, but it could not, in effect, mean that the underlying contract could be proven by parol evidence. In developing the "part performance" exception, a balancing of the competing considerations was required. An important factor in the case law became that the part performance must be "unequivocally" related to the alleged contract. Ireland The Statute of Frauds was passed in 1695 in Ireland. The statute is one of the few pre-Independence laws that survived the Statute Law Revision (Pre-1922) Act 2005 and the Statute Law Revision Act 2007, and remains largely in force today. Some effects of the law have been softened by equity, for example the requirement that all contracts for sale of land be evidenced in writing can be circumvented by reliance on the doctrine of part performance. United Kingdom England and Wales The Statute of Frauds (1677) was largely repealed in England and Wales by the Law Reform (Enforcement of Contracts) Act 1954 (2 & 3 Eliz 2 c 34). The only provision of it extant is part of Section 4 which means that contracts of guarantee (surety for another's debt) are unenforceable unless evidenced in writing. This requirement is clarified by section 3 of the Mercantile Law Amendment Act 1856 (19 & 20 Vict 97) which provides that the consideration for the guarantee need not appear in writing or by necessary inference from a written document. Section 6 of the Statute of Frauds Amendment Act 1828 (9 Geo 4 c 14) (commonly known as Lord Tenterden's Act) was enacted to prevent Section 4 being circumvented by bringing an action against a verbal guarantor for the tort of deceit (the tort in Freeman v. Palsey). A common summary of the law is "a verbal guarantee (for a debt) isn't worth the paper it is written on". Provisions in section 4 as to formalities for contracts for the sale of land were repealed by Schedule 7 to the Law of Property Act 1925 (15 Geo 5 c 20), however the requirement that contracts for the sale of land be evidenced in writing was maintained by section 40 of that Act, subsequently replaced by section 2 of the Law of Property (Miscellaneous Provisions) Act 1989 (c 34). Scotland Section 6 of the Mercantile Law Amendment Act Scotland 1856 was derived from those parts of section 4 of the Statute of Frauds (1677) which relate to contracts of guarantee and from section 6 of the Statute of Frauds Amendment Act 1828. It was repealed on 1 August 1995 by the Requirements of Writing (Scotland) Act 1995, sections 14(2) and Schedule 5 (with ss. 9(3)(5)(7), 13, 14(3)). United States In the United States, for contracts for the sale of goods that fall under the Uniform Commercial Code, additional exceptions may apply: Admission of the existence of a contract by the defendant under oath. However, the contract would only exist for the quantity of goods that were admitted. For instance, if the contract was for 100 televisions but the seller admitted in court that it was for 70 televisions, then the contract would exist only for 70 televisions and not the original 100. Merchant confirmation rule. If one merchant sends a writing sufficient to satisfy the statute of frauds to another merchant and the receiving merchant has reason to know of the contents of the sent confirmation and does not object to the confirmation within 10 days, the confirmation is good to satisfy the statute as to both parties, even if the confirmation was not signed by the party to be charged. The goods were specially manufactured for the buyer and the seller either 1) began manufacturing them, or 2) entered into a third party contract for their manufacture, and the manufacturer cannot without undue burden sell the goods to another person in the seller's ordinary course of business: for example, T-shirts with a Little League baseball team logo or wall-to-wall carpeting for an odd-sized room. State laws Every state has a statute that requires certain types of contracts to be in writing and signed by the party to be charged. The most common requirements are for contracts that involve the sale or transfer of land, and contracts that cannot be completed within one year. When the statute of frauds applies, a typical statute requires that the writing commemorating the agreement identify the contracting parties, recite the subject matter of the contract so that it is reasonably identifiable, and include the important terms and conditions of agreement. The statute of frauds in various states comes in three types: those that follow the English statute and provide that "no action shall be brought" on the contract or the contract "shall not be enforced" Those that declare contracts "void" Those that make the contract "voidable" at the affected party's election Texas In addition to the statute of frauds as conventionally defined, the State of Texas has two rules that govern the litigation process, each of which also has the character of a statute of frauds. One is a rule of general applicability and requires agreements between counsel (or a party, if self-represented) to be in writing to be enforceable. Tex. R. Civ. P. 11. Agreements under Texas Rule of Civil Procedure 11 are called "Rule 11 Agreements" and may either concern settlement or any procedural aspect, such as an agreement regarding scheduling, continuances of trial settings, or discovery matters. The rule has existed since 1840 and has contained the filing requirement since 1877. The number designation can cause confusion to non-Texas attorneys because the federal | that falls outside the Statute of Frauds and was enforceable to the extent it is executed. However, the unexecuted portion of the contract falls within the Statute of Frauds and is unenforceable. As a result, only the executed portion of the contract can be recovered, and the doctrine of part performance does not remove the contract from the statute. On the other hand, the court, in Schwedes v. Romain, held that partial performance and grounds for estoppel can make the contract effective. Promissory estoppel can be applied in many but not all jurisdictions when the charging party detrimentally relies on the otherwise unenforceable contract. In England and Wales, the circumstances where promissory estoppel may be used to overcome the statute are limited, and some jurisdictions deny this possibility altogether. The "main purpose rule" as it relates to guarantee or suretyship type contracts: where the promisor's promise to answer for the debt of another is made mainly for the promisor's own economic advantage, then it is a primary promise, and enforceable even without a writing. Easements by implication: easements, which are agreements that permit the use of real estate by someone who has no property interest in the land, may be created by operation of law rather than by written instrument. This may happen where, for example, a piece of land is partitioned between owners and pre-existing utilities routes or access paths that would otherwise be trespassory over one of the plots is reasonably necessary for enjoyment of the other plot. In such case, the pre-existing use must be apparent and continuous at the time of the partition for an easement to be created by implication. The implied easement constitutes an interest in land that does not require a writing to be enforceable. Worldwide Canada The Statute of Frauds recites that it was enacted for the ". . . prevention of many fraudulent practices which are commonly endeavored to be upheld by perjury . . .". The mischief arising from claimants asserting oral agreements was to be avoided by requiring that certain contracts be evidenced by "some memorandum or note thereof . . . in writing and signed by the party to be charged therewith . . .". Contracts respecting land "created by livery and seisen only or by parole" would not be enforced absent such a writing. It quickly became apparent to the common law judges that the Statute might itself become an instrument of fraud (or at least injustice) if it was strictly enforced with respect to contracts that were wholly or partly performed. The courts developed the concept of "part performance" as an exception. If a contract concerning land was partly performed, that could displace the need for a note or memorandum in writing signed by the party to be charged. It was one thing to create an exception that displaced the need for a memorandum in writing, but something else to completely nullify the Statute's operation. The thrust of the Statute was that contracts concerning land could not be proved by parol evidence alone. Thus, part performance might be an exception, but it could not, in effect, mean that the underlying contract could be proven by parol evidence. In developing the "part performance" exception, a balancing of the competing considerations was required. An important factor in the case law became that the part performance must be "unequivocally" related to the alleged contract. Ireland The Statute of Frauds was passed in 1695 in Ireland. The statute is one of the few pre-Independence laws that survived the Statute Law Revision (Pre-1922) Act 2005 and the Statute Law Revision Act 2007, and remains largely in force today. Some effects of the law have been softened by equity, for example the requirement that all contracts for sale of land be evidenced in writing can be circumvented by reliance on the doctrine of part performance. United Kingdom England and Wales The Statute of Frauds (1677) was largely repealed in England and Wales by the Law Reform (Enforcement of Contracts) Act 1954 (2 & 3 Eliz 2 c 34). The only provision of it extant is part of Section 4 which means that contracts of guarantee (surety for another's debt) are unenforceable unless evidenced in writing. This requirement is clarified by section 3 of the Mercantile Law Amendment Act 1856 (19 & 20 Vict 97) which provides that the consideration for the guarantee need not appear in writing or by necessary inference from a written document. Section 6 of the Statute of Frauds Amendment Act 1828 (9 Geo 4 c 14) (commonly known as Lord Tenterden's Act) was enacted to prevent Section 4 being circumvented by bringing an action against a verbal guarantor for the tort of deceit (the tort in Freeman v. Palsey). A common summary of the law is "a verbal guarantee (for a debt) isn't worth the paper it is written on". Provisions in section 4 as to formalities for contracts for the sale of land were repealed by Schedule 7 to the Law of Property Act 1925 (15 Geo 5 c |
or criminal prosecution, strictly speaking in modern texts in its own courts. A similar, stronger rule as regards foreign courts is named state immunity. In its older sense, sovereign immunity is the original forebear of state immunity based on the classical concept of sovereignty in the sense that a sovereign could not be subjected without his or her approval to the jurisdiction of another. There are two forms of sovereign immunity: immunity from suit (also known as immunity from jurisdiction or adjudication) immunity from enforcement. Immunity from suit means that neither a sovereign/head of state in person nor any in absentia or representative form (nor to a lesser extent the state) can be a defendant or subject of court proceedings, nor in most equivalent forums such as under arbitration awards and tribunal awards/damages. Immunity from enforcement means that even if a person succeeds in any way against their sovereign or state, they and the judgment may find themselves without means of enforcement. Separation of powers or natural justice coupled with a political status other than a totalitarian state dictates there be broad exceptions to immunity such as statutes which expressly bind the state (a prime example being constitutional laws) and judicial review. Furthermore, sovereign immunity of a state entity may be waived. A state entity may waive its immunity by: prior written agreement instituting proceedings without claiming immunity submitting to jurisdiction as a defendant in a suit intervening in or taking any steps in any suit (other than for the purpose of claiming immunity). In constitutional monarchies the sovereign is the historical origin of the authority which creates the courts. Thus the courts had no power to compel the sovereign to be bound by them as they were created by the sovereign for the protection of his or her subjects. This rule was commonly expressed by the popular legal maxim rex non potest peccare, meaning "the king can do no wrong". By country Australia There is no automatic Crown immunity in Australia, and the Australian Constitution does not establish a state of unfettered immunity of the Crown in respect of the states and the Commonwealth. The Constitution of Australia establishes matters on which the states and the Commonwealth legislate independently of each other; in practice this means the states legislate on some things and the Commonwealth legislates on others. In some circumstances, this can create ambiguity as to the applicability of legislation where there is no clearly established Crown immunity. The Australian Constitution does however, in s. 109, declare that, "When a law of a State is inconsistent with a law of the Commonwealth, the latter shall prevail, and the former shall, to the extent of the inconsistency, be invalid." Based on this, depending on the context of application and whether a particular statute infringes on the executive powers of the state or the Commonwealth the Crown may or may not be immune from any particular statute. Many Acts passed in Australia, both at the state and at the federal level, contain a section declaring whether the Act binds the Crown, and, if so, in what respect: Commonwealth Acts may contain wording similar to: "This Act binds the Crown in each of its capacities", or specify a more restricted application. State acts may contain wording similar to: "This Act binds the Crown in right of [the state] and, in so far as the legislative power of the Parliament of [the state] permits, the Crown in all its other capacities." While there is no ambiguity about the first aspect of this declaration about binding the Crown with respect to the state in question, there have been several cases about the interpretation of the second aspect extending it to the Crown in its other capacities. Rulings by the High Court of Australia on specific matters of conflict between the application of states laws on Commonwealth agencies have provided the interpretation that the Crown in all of its other capacities includes the Commonwealth, therefore if a state Act contains this text then the Act may bind the Commonwealth, subject to the s. 109 test of inconsistency. A landmark case which set a precedent for challenging broad Crown immunity and established tests for the applicability of state laws on the Commonwealth was Henderson v Defence Housing Authority in 1997. This case involved the arbitration of a dispute between Mr. Henderson and the Defence Housing Authority (DHA). Mr. Henderson owned a house which the DHA had leased to provide housing to members of the Australian Defence Force (ADF). Under the NSW Residential Tenancies Act 1997, Mr. Henderson sought orders from the Residential Tenancies Tribunal to enter the premises for the purposes of conducting inspections. In response, DHA claimed that as a Commonwealth agency the legislation of NSW did not apply to it and further sought writs of prohibition attempting to restrain Mr. Henderson from pursuing the matter further. Up until this point the Commonwealth and its agencies claimed an unfettered immunity from state legislation and had used s. 109 to justify this position, specifically that the NSW Act was in conflict with the Act which created the DHA and s. 109 of the constitution applied. Mr. Henderson took the case to the High Court and a panel of seven justices to arbitrate the matter. By a majority decision of six to one the court ruled that the DHA was bound by the NSW Act on the basis that the NSW Act did not limit, deny or restrict the activities of the DHA but sought to regulate them, an important distinction which was further explained in the rulings of several of the justices. It was ruled that the NSW Act was one of general application and therefore the Crown (in respect of the Commonwealth) could not be immune from it, citing other cases in which the same ruling had been made and that it was contrary to the rule of law. As a result of this case, the Commonwealth cannot claim a broad constitutional immunity from state legislation. In practice, three tests have been developed to determine whether a state law applies to the Commonwealth (and vice versa): Does the law seek to merely regulate the activities of the Commonwealth as opposed to deny, restrict or limit them? Is the state law constructed such that the act binds the Crown in respect of all of its capacities? Is there no inconsistency between a state law and a Commonwealth law on the same matter? If these three tests are satisfied, then the Act binds the Crown in respect of the Commonwealth. In Australia, there is no clear automatic Crown immunity or lack of it; as such there is a rebuttable presumption that the Crown is not bound by a statute, as noted in Bropho v State of Western Australia. The Crown's immunity may also apply to other parties in certain circumstances, as held in Australian Competition and Consumer Commission v Baxter Healthcare. Belgium Article 88 of the Constitution of Belgium states: "The King’s person is inviolable; his ministers are accountable." Bhutan According to the constitution of Bhutan, the monarch is not answerable in a court of law for his or her actions. Canada Canada inherited common law version of Crown immunity from British law. However, over time the scope of Crown immunity has been steadily reduced by statute law. As of 1994, section 14 of the Alberta Interpretation Act stated, "No enactment is binding on Her Majesty or affects Her Majesty or Her Majesty's rights or prerogatives in any manner, unless the enactment expressly states that it binds Her Majesty." However, in more recent times "All Canadian provinces ... and the federal government (the Crown Liability Act) have now rectified this anomaly by passing legislation which leaves the 'Crown' liable in tort as a normal person would be. Thus, the tort liability of the government is a relatively new development in Canada, statute-based, and is not a fruit of common law." Since 1918, it has been held that provincial legislatures cannot bind the federal Crown, as Fitzpatrick CJ noted in Gauthier v The King: It has also been a constitutional convention that the Crown in right of each province is immune from the jurisdiction of the courts in other provinces. However this is now in question. Lieutenant Governors do not enjoy the same immunity as the Sovereign in matters not relating to the powers of the office. In 2013, the Supreme Court refused | Authority (DHA). Mr. Henderson owned a house which the DHA had leased to provide housing to members of the Australian Defence Force (ADF). Under the NSW Residential Tenancies Act 1997, Mr. Henderson sought orders from the Residential Tenancies Tribunal to enter the premises for the purposes of conducting inspections. In response, DHA claimed that as a Commonwealth agency the legislation of NSW did not apply to it and further sought writs of prohibition attempting to restrain Mr. Henderson from pursuing the matter further. Up until this point the Commonwealth and its agencies claimed an unfettered immunity from state legislation and had used s. 109 to justify this position, specifically that the NSW Act was in conflict with the Act which created the DHA and s. 109 of the constitution applied. Mr. Henderson took the case to the High Court and a panel of seven justices to arbitrate the matter. By a majority decision of six to one the court ruled that the DHA was bound by the NSW Act on the basis that the NSW Act did not limit, deny or restrict the activities of the DHA but sought to regulate them, an important distinction which was further explained in the rulings of several of the justices. It was ruled that the NSW Act was one of general application and therefore the Crown (in respect of the Commonwealth) could not be immune from it, citing other cases in which the same ruling had been made and that it was contrary to the rule of law. As a result of this case, the Commonwealth cannot claim a broad constitutional immunity from state legislation. In practice, three tests have been developed to determine whether a state law applies to the Commonwealth (and vice versa): Does the law seek to merely regulate the activities of the Commonwealth as opposed to deny, restrict or limit them? Is the state law constructed such that the act binds the Crown in respect of all of its capacities? Is there no inconsistency between a state law and a Commonwealth law on the same matter? If these three tests are satisfied, then the Act binds the Crown in respect of the Commonwealth. In Australia, there is no clear automatic Crown immunity or lack of it; as such there is a rebuttable presumption that the Crown is not bound by a statute, as noted in Bropho v State of Western Australia. The Crown's immunity may also apply to other parties in certain circumstances, as held in Australian Competition and Consumer Commission v Baxter Healthcare. Belgium Article 88 of the Constitution of Belgium states: "The King’s person is inviolable; his ministers are accountable." Bhutan According to the constitution of Bhutan, the monarch is not answerable in a court of law for his or her actions. Canada Canada inherited common law version of Crown immunity from British law. However, over time the scope of Crown immunity has been steadily reduced by statute law. As of 1994, section 14 of the Alberta Interpretation Act stated, "No enactment is binding on Her Majesty or affects Her Majesty or Her Majesty's rights or prerogatives in any manner, unless the enactment expressly states that it binds Her Majesty." However, in more recent times "All Canadian provinces ... and the federal government (the Crown Liability Act) have now rectified this anomaly by passing legislation which leaves the 'Crown' liable in tort as a normal person would be. Thus, the tort liability of the government is a relatively new development in Canada, statute-based, and is not a fruit of common law." Since 1918, it has been held that provincial legislatures cannot bind the federal Crown, as Fitzpatrick CJ noted in Gauthier v The King: It has also been a constitutional convention that the Crown in right of each province is immune from the jurisdiction of the courts in other provinces. However this is now in question. Lieutenant Governors do not enjoy the same immunity as the Sovereign in matters not relating to the powers of the office. In 2013, the Supreme Court refused to hear the request of former Lieutenant Governor of Quebec Lise Thibault to have charges against her dropped. She was being prosecuted by the Attorney General of Quebec for misappropriation of public funds but invoked royal immunity on the basis that "the Queen can do no wrong". As per convention, the court did not disclose its reasons for not considering the matter. Thibault later petitioned the Court of Quebec for the same motives. Judge St-Cyr again rejected her demand, noting that constitutional law does not grant a lieutenant-governor the same benefits as the Queen and that in her case, royal immunity would only apply to actions involving official state functions, not personal ones. She was eventually found guilty and sentenced to 18 months in jail but was granted conditional release after serving six months. China China has consistently claimed that a basic principle of international law is for states and their property to have absolute sovereign immunity. China objects to restrictive sovereign immunity. It is held that a state can waive its immunity by voluntarily stating so, but that should a government intervene in a suit (e.g. to make protests), it should not be viewed as waiver of immunity. Chinese state-owned companies considered instrumental to the state have claimed sovereign immunity in lawsuits brought against them in foreign courts before. China's view is that sovereign immunity is a lawful right and interest that their enterprises are entitled to protect. Some examples of Chinese state-owned companies that have claimed sovereign immunity in foreign lawsuits are the Aviation Industry Corporation of China (AVIC) and China National Building Material. Hong Kong In 2011, the Hong Kong Court of Final Appeal ruled that absolute sovereign immunity applies in Hong Kong, as the Court found that Hong Kong, as a Special Administrative Region of China, could not have policies on state immunity that was inconsistent with China. The ruling was an outcome of the Democratic Republic of the Congo v FG Hemisphere Associates case in 2011. Democratic Republic of the Congo v FG Hemisphere Associates (2011) The Democratic Republic of the Congo and its state-owned electricity company Société nationale d'électricité (SNEL) defaulted on payments of a debt owed to an energy company, Energoinvest. During arbitration, Energoinvest was awarded damages against the Congolese government and SNEL. This was reassigned by Energoinvest to FG Hemisphere Associates LLC. FG Hemisphere subsequently learned that the Congolese government entered into a separate joint venture with Chinese companies later, in which the Congolese government would be paid US$221 million in mining entry fees. As a result, FG Hemisphere applied to collect these fees in order to enforce the earlier arbitral award. The Congolese government asserted sovereign immunity in the legal proceedings. This was eventually brought to the Hong Kong Court of Final Appeal, when the Congolese government fought to overturn an earlier Court of Appeal decision which had ruled that: as restrictive sovereign immunity applied in Hong Kong, the Congolese government had no immunity in commercial proceedings. if absolute sovereign immunity had applied in Hong Kong, the Congolese government had waived their sovereign immunity rights in this case. The Hong Kong Court of Final Appeal ruled 3:2 that the Congolese government had not waived its immunity in the Hong Kong courts, and that as a Special Administrative Region of China, Hong Kong could not have policies on state immunity that were inconsistent with China's. Therefore, the doctrine of sovereign immunity applied in Hong Kong should be absolute, and may be invoked when jurisdiction is sought in the foreign court in relation to an application to enforce a foreign judgment or arbitral award, or when execution is sought against assets in the foreign state. This means that sovereign states are absolutely immune to the jurisdiction in Hong Kong courts, including in commercial claims, unless the state waives its immunity. In order to waive immunity, there must be express, unequivocal submission to the jurisdiction of the Hong Kong courts "in the face of the court". Claimants should establish that the state party has waived their entitlement to immunity at the relevant stage, before proceedings can occur in court. Denmark Article 13 of the Constitution of Denmark states: Accordingly, the monarch cannot be sued in his or her personal capacity. On the other hand, this immunity from lawsuits does not extend to the state as such and article 63 explicitly authorises the courts to judge the executive authority: "The courts of justice shall be empowered to decide any question relating to the scope of the executive's authority; though any person wishing to question such authority shall not, by taking the case to the courts of justice, avoid temporary compliance with orders given by the executive authority." Furthermore, no other member of the royal family can be prosecuted for any crime under Article 25 of the old absolutist constitution Lex Regia (The King's Law), currently still valid, which states: "They shall answer to no magistrate judges, but their first and last Judge shall be the King, or to whom He to that decrees." Holy See The Holy See, of which the current pope is head (often referred to by metonymy as the Vatican or Vatican City State, a distinct entity), claims sovereign immunity for the pope, supported by many international agreements. Iceland According to article 11 of the Constitution of Iceland the president can only be held accountable and be prosecuted with the consent of parliament. India According to Article |
of debate within American human geography lay on political economic processes (though there also was a considerable number of accounts for a phenomenological perspective on social geography), while in the 1990s, geographical thought was heavily influenced by the "cultural turn". Both times, as Neil Smith noted, these approaches "claimed authority over the 'social'". In the American tradition, the concept of cultural geography has a much more distinguished history than social geography, and encompasses research areas that would be conceptualized as "social" elsewhere. In contrast, within some continental European traditions, social geography was and still is considered an approach to human geography rather than a sub-discipline, or even as identical to human geography in general. History Before the Second World War The term "social geography" (or rather "géographie sociale") originates from France, where it was used both by geographer Élisée Reclus and by sociologists of the Le Play School, perhaps independently from each other. In fact, the first proven occurrence of the term derives from a review of Reclus' Nouvelle géographie universelle from 1884, written by Paul de Rousiers, a member of the Le Play School. Reclus himself used the expression in several letters, the first one dating from 1895, and in his last work L'Homme et la terre from 1905. The first person to employ the term as part of a publication's title was Edmond Demolins, another member of the Le Play School, whose article Géographie sociale de la France was published in 1896 and 1897. After the death of Reclus as well as the main proponents of Le Play's ideas, and with Émile Durkheim turning away from his early concept of social morphology, Paul Vidal de la Blache, who noted that geography "is a science of places and not a science of men", remained the most influential figure of French geography. One of his students, Camille Vallaux, wrote the two-volume book Géographie sociale, published in 1908 and 1911. Jean Brunhes, one of Vidal's most influential disciples, included a level of (spatial) interactions among groups into his fourfold structure of human geography. Until the Second World War, no more theoretical framework for social geography was developed, though, leading to a concentration on rather descriptive rural and regional geography. However, Vidal's works were influential for the historical Annales School, who also shared the rural bias with the contemporary geographers, and Durkheim's concept of social morphology was later developed and set in connection with social geography by sociologists Marcel Mauss and Maurice Halbwachs. The first person in the Anglo-American tradition to use the term "social geography" was George Wilson Hoke, whose paper The Study of Social Geography was published in 1907, yet there is no indication it had any academic impact. Le Play's work, however, was taken up in Britain by Patrick Geddes and Andrew John Herbertson. Percy M. Roxby, a former student of Herbertson, in 1930 identified social geography as one of human geography's four main branches. By contrast, the American academic | a tradition of more than 100 years, there is no consensus on its explicit content. In 1968, Anne Buttimer noted that "[w]ith some notable exceptions, (...) social geography can be considered a field created and cultivated by a number of individual scholars rather than an academic tradition built up within particular schools". Since then, despite some calls for convergence centred on the structure and agency debate, its methodological, theoretical and topical diversity has spread even more, leading to numerous definitions of social geography and, therefore, contemporary scholars of the discipline identifying a great variety of different social geographies. However, as Benno Werlen remarked, these different perceptions are nothing else than different answers to the same two (sets of) questions, which refer to the spatial constitution of society on the one hand, and to the spatial expression of social processes on the other. The different conceptions of social geography have also been overlapping with other sub-fields of geography and, to a lesser extent, sociology. When the term emerged within the Anglo-American tradition during the 1960s, it was basically applied as a synonym for the search for patterns in the distribution of social groups, thus being closely connected to urban geography and urban sociology. In the 1970s, the focus of debate within American human geography lay on political economic processes (though there also was a considerable number of accounts for a phenomenological perspective on social geography), while in the 1990s, geographical thought was heavily influenced by the "cultural turn". Both times, as Neil Smith noted, these approaches "claimed authority over the 'social'". In the American tradition, the concept of cultural geography has a much more distinguished history than social geography, and encompasses research areas that would be conceptualized as "social" elsewhere. In contrast, within some continental European traditions, social geography was and still is considered an approach to human geography rather than a sub-discipline, or even as identical to human geography in general. History Before the Second World War The term "social geography" (or rather "géographie sociale") originates from France, where it was used both by geographer Élisée Reclus and by sociologists of the Le Play School, perhaps independently from each other. In fact, the first proven occurrence of the term derives from a review of Reclus' Nouvelle géographie universelle from 1884, written by Paul de Rousiers, a member of the Le Play School. Reclus himself used the expression in several letters, the first one dating from 1895, and in his last work L'Homme et la terre from 1905. The first person to employ the term as part of a publication's title was Edmond Demolins, another member of the Le Play School, whose article Géographie sociale de la France was published in 1896 and 1897. After the death of Reclus as well as the main proponents of Le Play's ideas, and with Émile Durkheim turning away from his early concept of social morphology, Paul Vidal de la Blache, who noted that geography "is a science of places and not a science of men", remained the most influential figure of French geography. One of his students, Camille Vallaux, wrote the two-volume book Géographie sociale, published in 1908 and 1911. Jean Brunhes, one of Vidal's most influential disciples, included a level of (spatial) interactions among groups into his fourfold structure of human geography. Until the Second World War, no more theoretical framework for social geography was developed, though, leading to a concentration on rather descriptive rural and regional geography. However, Vidal's works were influential for the historical Annales School, who also shared the rural bias with the contemporary geographers, and Durkheim's concept of social morphology was later developed and set in connection with social geography by sociologists Marcel Mauss and Maurice Halbwachs. The first person in the Anglo-American tradition to use the term "social geography" was George Wilson Hoke, whose paper The Study of Social Geography was published in 1907, yet there is no indication it had any academic impact. Le Play's work, however, was taken up in Britain by Patrick Geddes and Andrew John Herbertson. Percy M. Roxby, a former student of Herbertson, in 1930 identified social geography as one of human geography's four main branches. By contrast, the American academic geography of that time was dominated by the Berkeley School of Cultural Geography led by Carl O. Sauer, while the spatial distribution of social |
making fun of the hype before the product was released. Steve Jobs was quoted as saying that it was "as big a deal as the PC", (but later retracted that, saying that it "sucked", presumably referring to "the design" but commenting about the boutique price, asking, "You're sure your market is upscale consumers for transportation?") The device was unveiled on 3 December 2001, following months of public speculation, in Bryant Park, New York City, on the ABC News morning program Good Morning America, with the first units delivered to customers in early 2002. The original Segway models featured three speed settings: , with faster turning, and . Steering of early versions was controlled using a twist grip that varied the speeds of the two motors. The range of the p-Series was on a fully charged nickel metal hydride (NiMH) battery with a recharge time of 4–6 hours. In September 2003, the Segway PT was recalled, because if users ignored repeated low battery warnings on the PTs, it could ultimately lead them to fall. With a software patch to version 12.0, the PT would automatically slow down and stop in response to detecting low battery power. In August 2006, Segway discontinued all previous models and introduced the i2 and x2 products, which were steered by leaning the handlebars to the right or left, had a maximum speed of from a pair of Brushless DC electric motors with regenerative braking and a range of up to , depending on terrain, riding style and state of the batteries. Recharging took 8–10 hours. The i2 and x2 also introduced the wireless InfoKey which could show mileage and a trip odometer, and put the Segway into Security mode, which locked the wheels and set off an alarm if it was moved, and could also be used to turn on the PT from up to away. The company was acquired by British businessman Jimi Heselden, "known locally as Jimi, from its U.S. inventor Dean Kamen in December 2009." A year later, in an ironic and unfortunate accident, Heselden died after he "plunged into the River Wharfe while riding a rugged country version" of Segway. Versions of the product prior to 2011 included (in order of release): Segway i167 (2001 revealed, 2002 shipped) Segway e167: As i167, with addition of electric kickstand Segway p133: Smaller platform and wheels and less powerful motors than the i and e Series with top speed of in the p-Series Segway i180: With lithium-ion batteries Segway XT: The first Segway designed specifically for recreation Segway i2 (2006): The first on-road Segway PT with LeanSteer Segway x2 (2006): | was filed in 1994 and granted in 1997, followed by others, including one submitted in June 1999 and granted in October 2001. Prior to its introduction, a news report about a proposal for a book about the invention, development, and financing of the Segway led to speculation about the device and its importance. John Doerr speculated that it would be more important than the Internet. South Park devoted an episode to making fun of the hype before the product was released. Steve Jobs was quoted as saying that it was "as big a deal as the PC", (but later retracted that, saying that it "sucked", presumably referring to "the design" but commenting about the boutique price, asking, "You're sure your market is upscale consumers for transportation?") The device was unveiled on 3 December 2001, following months of public speculation, in Bryant Park, New York City, on the ABC News morning program Good Morning America, with the first units delivered to customers in early 2002. The original Segway models featured three speed settings: , with faster turning, and . Steering of early versions was controlled using a twist grip that varied the speeds of the two motors. The range of the p-Series was on a fully charged nickel metal hydride (NiMH) battery with a recharge time of 4–6 hours. In September 2003, the Segway PT was recalled, because if users ignored repeated low battery warnings on the PTs, it could ultimately lead them to fall. With a software patch to version 12.0, the PT would automatically slow down and stop in response to detecting low battery power. In August 2006, Segway discontinued all previous models and introduced the i2 and x2 products, which were steered by leaning |
magic: Chaos magic. Story The protagonist of Slayers is Lina Inverse, a teenage wandering genius sorceress with many nicknames and much infamy attached to her that she refuses to acknowledge. Lina narrates (within the novels) the history of her various adventures, ranging from whimsical and silly to dramatic to even outright world-threatening crises, in which she becomes involved along with her traveling companions everywhere she goes. Production The first Slayers light novel was written by Hajime Kanzaka for entrance into Fujimi Fantasia Bunko's first annual in 1989. After it won, the new author was asked to create a follow-up. Kanzaka initially thought this was an impossible task as the characters had already defeated the Dark Lord. He called the second book a turning point for him and said it was initially very difficult to write. However, as soon as he added the "spike-wolves and stuff", from his love of yōkai and kaiju, the "words just flew off the page". Kanzaka set the second book in a city so that Lina could not solve the story by simply casting one big spell. He said that this taught him how using circumstances and setting could change the "flavor" of a story. The author also said that the second book is intentionally "heavier" than the first. Kanzaka described his writing process as like trying to put together puzzle pieces that have been scattered about, figuring stuff out as he goes instead of following an outline written beforehand. As a new author, he said he was not good at submitting plot summaries to his supervisor, who wanted them before he started writing. When the supervisor passively accepted the plot summary of the third Slayers novel, but was then ecstatic with the finished book, he stopped asking for plot summaries. Kanzaka assumed that he had finally realized that the finished story was always going to widely diverge from the initial summary. The first three books were written as the author thought up stories, but volume four on tell a grander epic. Because the first novel was written as a one-off before evolving into a series, there are some inconsistencies with the later installments. A few of these inconsistencies were corrected in the 2008 reprints. Kanzaka makes references to people and events not depicted in the novels, such as Lina's older sister and Gourry Gabriev's first visit to Sairaag, which he referred to as "flavor" to stimulate the reader's imagination and clarified that they are not foreshadowing. He explained that the fictional world would feel smaller if everything that appears in the story is explained; something he learned from a teacher's comment in design school. Although some of these he has not even thought about, like Gourry's visit to Sairaag, others he has created a backstory to, such as Lina's sister. Zuma's backstory was omitted because the novels are told from Lina's first-person perspective, but Kanzaka gave some of the material to the staff of Slayers Revolution so it could be included in the anime. Media Light novels Slayers began serialization in Dragon Magazine in 1989 as a short story series written by Hajime Kanzaka and with artwork by Rui Araizumi. The chapters were then published as light novels under the Fujimi Fantasia Bunko imprint across 15 volumes from January 17, 1990 to May 10, 2000. Although the original story ended with the 15th volume in 2000, Kanzaka began a new arc 18 years later in the May 2018 issue of Dragon Magazine, which was published in March 2018, to celebrate the magazine and Fujimi Fantasia Bunko's 30th anniversary. He described it as "kind of a reunion" and said he had not decided to relaunch the series yet. Volume 16 was published on October 20, 2018. A third story arc began in the November 2019 issue of the magazine, released in September 2019. The author described this as "Rather than an official history, the third arc is going to be more like one of the possibilities, a parallel existence to the TRY TV anime and the Water Dragon King manga, I guess." Volume 17 was published on October 19, 2019. On September 7, 2004, Tokyopop began publishing the novels in English, ending with the release of volume 8 on January 2, 2008. On July 3, 2020, J-Novel Club announced their rescue license of the series at Anime Expo Lite. They first release the novels digitally, with the first chapter uploaded to their website that day. Their physical release of Slayers began in July 2021 and is a 3-1 hardcover omnibus edition based on Japan's 2008 revised edition that featured new illustrations and covers. is a spin-off prequel series of 30 novels published from 1991 to 2008. Each consisting of one-shot stories (sometimes, two-chapter stories) chronicling the exploits of Lina Inverse and Naga the Serpent before the events in Slayers. Five additional volumes were released under a new series title, between July 2008 and November 2011. , a four volume prequel featuring Lina and Naga, was released between 1997 and 1999. These four stories were originally published separately by Fujimi Fantasia in mini-bunko format, and later they were included in different Special novels. A one volume crossover between Slayers and the series Sorcerous Stabber Orphen was published in 2005 under the title Slayers VS Orphen and was later reprinted in 2013. is a best-of compilation of Slayers Special. Its five volumes were published in August 2008, September 2008, June 2009, February 2010, and March 2010. Slayers Anthology was released to mark the 25th anniversary of Slayers novels in January 2015. It is a compilation of six stories, one of which was written by Kanzaka and five by fan writers. It is illustrated with previously unpublished pictures by Araizumi and contributing artists. Manga Slayers (one volume, illustrated by Rui Araizumi, original story, published in 1995, reedited in 2001, also known as Slayers Medieval Mayhem) Chōbaku Madōden Slayers (超爆魔道伝スレイヤーズ) (eight volumes, illustrated by Shoko Yoshinaka, adapted from Slayers main novels volumes 1–8, fourth volume adapted from Slayers Return movie, 1995–2001, also known as Super Explosive Demon Story Slayers) Slayers Special (four volumes, illustrated by Tommy Ohtsuka and Yoshimiro Kamada, adapted from Slayers Special novels, 2000–2001) Slayers Premium (one volume, illustrated by Tommy Ohtsuka, adapted from the movie of the same name, 2002) Slayers Knight of the Aqualord (six volumes, illustrated by Tommy Ohtsuka and Yoshimiro Kamada, original storyline, 2003–2005) Slayers Revolution (one volume, illustrated by Issei Hyouji, adapted from the anime series of the same name, 2008) Shin Slayers: Falces no Sunadokei (新スレイヤーズ:ファルシェスの砂時計 / New Slayers: The Hourglass of Falces) (three volumes, illustrated by Asashi, 2008) Slayers Legend (two-volume compilation from old Slayers manga, with chapters from Slayers and Chōbaku Mahōden Slayers) Slayers Evolution-R (one volume, published in Monthly Dragon Age, illustrated by Issei Hyouji, adapted from the anime series of the same name, 2009) Between July 26, 2008 and March 2009, a new manga series entitled Slayers Light Magic (スレイヤーズ ライト・マジック) was serialised in Kadokawa Shoten's Kerokero Ace. The series was written by Yoshijirō Muramatsu and illustrated Shin Sasaki, and set in a technological world instead of a fantasy world. In July 1998, Central Park Media announced they had licensed the manga for distribution in North America. On June 15, 1999, Slayers: Medieval Mayhem was released. The four-volume series Slayers Special was published between October 12, 2002, and June 25, 2003. A seven-volume series Super-Explosive Demon Story followed between July 9, 2002 and December 1, 2004. Finally, Slayers Premium was published in North America on July 5, 2005. Anime television series The self-titled first season of the anime adapts volumes 1 and 3 of the light novels. The second season, Slayers NEXT, adapts volumes 2, 4, 5, 7, and 8 of the light novels. The third season, Slayers TRY, is an original story. However, a fourth season, Slayers AGAIN, was rumored following the success of TRY, but early scheduling conflicts caused interest in the project to dissipate. A fourth anime series, Slayers Revolution, premiered in Japan on July 2, 2008. Megumi Hayashibara, the voice actress for main character Lina Inverse, performed both the opening and ending theme songs. The new plot is told across two 13-episode arcs and follows an original storyline that has subplots based on events in the novels, with series director Takashi Watanabe and production studio J.C.Staff reprising their duties from the three original TV series. A fifth Slayers series titled Slayers Evolution-R is the second 13-episode arc of Slayers Revolution and was aired on AT-X starting on January 12, 2009 in Japan. Central Park Media licensed and distributed the anime in North America under the Software Sculptors label on VHS and Laserdisc between 1996 and 1998, collected in eight volumes. It was | license was released on August 27, 2007 retaining the Software Sculptors-produced English dub. A boxset of Slayers, NEXT and TRY was released by Funimation on August 4, 2009. Fox Kids won the rights to broadcast Slayers but eventually did not air the anime since it would be too heavy to edit it for content. The first North American television broadcast of The Slayers was February 17, 2002 on the International Channel. In 2009, MVM Films began releasing the series in the United Kingdom on a monthly basis. The first series was released on four DVDs between January 5, and April 6, 2009. The first volume of Slayers NEXT was released on May 11, 2009. Episodes have also been made available on the streaming video sites Hulu, YouTube, Crackle, Anime News Network, Netflix, and Funimation's website. FUNimation licensed both Slayers Revolution and Slayers Evolution-R for American release; the episodes in Japanese with English subtitles were uploaded to YouTube, as well as Funimation's website in July 2009. Funimation contracted NYAV Post to produce the English version of the series, with dialogue being recorded in both New York City and Los Angeles. NYAV Post was able to reunite most of the original Central Park Media main character cast for the new season. However, Michael Sinterniklaas replaced David Moo as Xellos. Other notable characters, such as Sylphiel, Prince Phil, and Naga the Serpent were also recast with new voice actors. In December 2009, Funimation announced that the first Slayers Revolution boxset would be released on March 16, 2010. Funimation released the first four English-dubbed episodes of Slayers Revolution to YouTube on January 19, 2010. They have also uploaded the first two English-dubbed episodes of Evolution-R to YouTube and released Evolution-R on DVD in June 2010. Funimation released both Slayers Revolution and Evolution-R on Blu-ray on September 21, 2010 Both seasons were later re-released together in a DVD/Blu-ray combo pack. Both Revolution and Evolution-R made their North American television debut when they began airing on the FUNimation Channel on September 6, 2010. Original video animations The first OVA series, , consists of three individual episodes directed by Hiroshi Watanabe. The first episode was released in Japan on July 25, 1996 by Kadokowa Shoten and J.C.Staff, approximately 10 months following broadcast of the final episode of the original anime series. A second three-episode OVA series, followed in 1998, also directed by Watanabe and produced by J.C.Staff. In North America, Slayers Special was initially sold as two separate titles, Slayers: Dragon Slave and Slayers: Explosion Array on VHS by licensee ADV Films. All three episodes were later compiled into Slayers: The Book of Spells, shipped on November 21, 2000. ADV Films released all the OVAs to VHS and DVD in both North America and the UK. Films Slayers The Motion Picture, also known as Slayers Perfect (or Slayers the Movie: Perfect Edition) and originally released in Japan simply as Slayers (スレイヤーズ), is a 1995 film written by Kazuo Yamazaki, based on an original story by Hajime Kanzaka, and directed by Yamazaki and Hiroshi Watanabe. , also known as Slayers Movie 2 - The Return, is a 1996 film written by Kanzaka and directed by Kunihiko Yuyama and Hiroshi Watanabe. It was adapted into a standalone manga. is a 1997 film written by Kanzaka and directed by Kunihiko Yuyama, Hiroshi Watanabe and Yoshimatsu Takahiro. is a 1998 film written by Kanzaka and directed by Hiroshi Watanabe. is a 2001 short film written and directed by Junichi Satō. Most of the films were produced by J.C.Staff and licensed for home video release in North America by ADV Films. Slayers Premium was animated by Hal Film Maker. Radio dramas Slayers Extra aka Slayers EX (four episodes, loosely (with Gourry replacing Naga and set after the first season of the anime television series) adapted from Slayers Special novels, 1995–1996) Slayers N'extra (four episodes, adapted from Slayers Special novels, 1997) Slayers Premium (one episode, prologue and epilogue to Slayers Premium movie, 2002) Slayers VS Orphen (one episode, adapted from Slayers VS Orphen novel, 2005) (three episodes, 2006) Games Role-playing games The series was adapted for two role-playing games (RPGs): Slayers became an add-on for the Japanese role-playing game system MAGIUS (Slayers MAGIUS RPG). In 2003, Guardians of Order published a licensed role-playing game, The Slayers d20, using the d20 System rules. Guardians also released three guidebooks for their Big Eyes, Small Mouth (BESM) game system that included game statistics for the TV series' major characters, spells and weapons. Collectible card game A collectible card game (CCG), Slayers Fight (スレイヤーズふぁいと), was developed by ORG and published by Kadokawa Shoten between 1999 and 2001. Video games A series of five Slayers role-playing video games were released exclusively in Japan between 1994 and 1998. Two different 16-bit games titled simply Slayers (including the one for the Super Famicom) were released in 1994. Three 32-bit / CD-ROM games followed in the late 1990s: Slayers Royal in 1997 and Slayers Royal 2 and Slayers Wonderful in 1998. In addition, Lina and other Slayers main characters have been featured in several other video games in crossover and guest appearances, in particular in mobile games since the late 2010s. Reception Including the spin-off series, the Slayers novels had 18 million copies in print by 2015. As of 2018, this number had grown to over 20million copies. Writing in 2020, Iyane Agossah from DualShockers opined Slayers "is still rarely equaled 30 years later, with an incredible mix of comedy and tragedy, an intricate amount of world-building, great story developments and iconic characters." Of the various media which make up the Slayers franchise, the anime has by far reached the largest audience and is considered to be one of the most popular series of the 1990s, both in Japan and abroad. As it is a parody of the high fantasy genre, the series' driving force lies in comic scenarios alluding to other specific anime, or more general genre tropes and clichés. Its focus on humor and entertainment and "old school" anime feel make it a nostalgic classic to many. According to Anime News Network's Daryl Surat, 1996 was the best year of Slayers anime with the releases of Next and Return. Slayers Next took the third place as the overall best anime of 1996 in the Anime Grand Prix '97 awards (in addition to winning in the category best female character), while the next year's series Slayers Try placed second but technically also third (the first place |
a Sanskrit root. It may also mean: National parliament Bangladesh Jatiya Sangsad ("National Parliament" of Bangladesh; Bengali: জাতীয় সংসদ Jatiyô Sôngsôd) Jatiya Sangsad Bhaban, National Parliament House of Bangladesh Speaker of the Jatiya Sangsad Sangsad Television India Bhāratīya Sansad (Parliament of India) Sansad Marg Sansad Adarsh Gram Yojana Nepal Federal Parliament | Sôngsôd) Jatiya Sangsad Bhaban, National Parliament House of Bangladesh Speaker of the Jatiya Sangsad Sangsad Television India Bhāratīya Sansad (Parliament of India) Sansad Marg Sansad Adarsh Gram Yojana Nepal Federal Parliament of Nepal (संघीय संसद नेपाल, Saṅghīya Sansada Nēpāla) Other uses Muktijoddha Sangsad, a non-political welfare association of the combatants during the Bangladesh Liberation |
Security experts have rejected this view as far back as 1851, and advise that obscurity should never be the only security mechanism. History An early opponent of security through obscurity was the locksmith Alfred Charles Hobbs, who in 1851 demonstrated to the public how state-of-the-art locks could be picked. In response to concerns that exposing security flaws in the design of locks could make them more vulnerable to criminals, he said: "Rogues are very keen in their profession, and know already much more than we can teach them." There is scant formal literature on the issue of security through obscurity. Books on security engineering cite Kerckhoffs' doctrine from 1883, if they cite anything at all. For example, in a discussion about secrecy and openness in Nuclear Command and Control: [T]he benefits of reducing the likelihood of an accidental war were considered to outweigh the possible benefits of secrecy. This is a modern reincarnation of Kerckhoffs' doctrine, first put forward in the nineteenth century, that the security of a system should depend on its key, not on its design remaining obscure. In the field of legal academia, Peter Swire has written about the trade-off between the notion that "security through obscurity is an illusion" and the military notion that "loose lips sink ships" as well as how competition affects the incentives to disclose. The principle of security through obscurity was more generally accepted in cryptographic work in the days when essentially all well-informed cryptographers were employed by national intelligence agencies, such as the National Security Agency. Now that cryptographers often work at universities, where researchers publish many or even all of their results, and publicly test others' designs, or in private industry, where results are more often controlled by patents and copyrights than by secrecy, the argument has lost some of its former popularity. An early example was PGP, whose source code is publicly available to anyone. The security technology in some of the best commercial browsers (such as Chromium or Mozilla Firefox) is also considered highly secure despite being open source. There are conflicting stories about the origin of this term. Fans of MIT's Incompatible Timesharing System (ITS) say it was | lost some of its former popularity. An early example was PGP, whose source code is publicly available to anyone. The security technology in some of the best commercial browsers (such as Chromium or Mozilla Firefox) is also considered highly secure despite being open source. There are conflicting stories about the origin of this term. Fans of MIT's Incompatible Timesharing System (ITS) say it was coined in opposition to Multics users down the hall, for whom security was far more an issue than on ITS. Within the ITS culture the term referred, self-mockingly, to the poor coverage of the documentation and obscurity of many commands, and to the attitude that by the time a tourist figured out how to make trouble he'd generally got over the urge to make it, because he felt part of the community. One instance of deliberate security through obscurity on ITS has been noted: the command to allow patching the running ITS system (altmode altmode control-R) echoed as $$^D. Typing Alt Alt Control-D set a flag that would prevent patching the system even if the user later got it right. In January 2020, NPR reported that Democratic party officials in Iowa declined to share information regarding the security of its caucus app, to "make sure we are not relaying information that could be used against us." Cybersecurity experts replied that "to withhold the technical details of its app doesn't do much to protect the system." Criticism Security by obscurity alone is discouraged and not recommended by standards bodies. The National Institute of Standards and Technology (NIST) in the United States sometimes recommends against this practice: "System security should not depend on the secrecy of the implementation or its components." The technique stands in contrast with security by design and open security, although many real-world projects include elements of all |
of the mad artist killing his models, as in A Bucket of Blood (1959), Color Me Blood Red (1965), or Decoy for Terror (1967) also known as Playgirl Killer. The concept of "snuff films" being made for profit became more widely known with the commercial film Snuff (1976). This low-budget exploitation horror film, originally titled Slaughter, was directed by Michael and Roberta Findlay. In an interview decades later, Roberta Findlay said the film's distributor Allan Shackleton had read about snuff films being imported from South America and retitled Slaughter to Snuff, to exploit the idea; he also added a new ending that depicted an actress being murdered on a film set. The promotion of Snuff on its second release suggested it featured the murder of an actress: "The film that could only be made in South America... where life is CHEAP", but that was false advertising. Shackleton put out false newspaper clippings that reported a citizens group's crusading against the film and hired people to act as protesters to picket screenings. False snuff films The Guinea Pig films The first two films in the Japanese Guinea Pig series are designed to look like snuff films; the video is grainy and unsteady, as if recorded by amateurs, and extensive practical and special effects are used to imitate such features as internal organs and graphic wounds. The sixth film in the series, Mermaid in a Manhole, allegedly served as an inspiration for Japanese serial killer Tsutomu Miyazaki, who murdered several preschool girls in the late 1980s. In 1991, actor Charlie Sheen became convinced that Flower of Flesh and Blood (1985), the second film in the series, depicted an actual homicide and contacted the FBI. The Bureau initiated an investigation but closed it after the series' producers released a "making of" film demonstrating the special effects used to simulate the murders. Cannibal Holocaust The Italian director Ruggero Deodato was charged after rumors that the depictions of the killing of the main actors in his film Cannibal Holocaust (1980) were real. He was able to clear himself of the charges after the actors made an appearance in court. Other than graphic gore, the film contains several scenes of sexual violence and the genuine deaths of six animals onscreen and one off screen, issues which find Cannibal Holocaust in the midst of controversy to this day. It has also been claimed that Cannibal Holocaust is banned in over 50 countries, although this has never been verified. In 2006, Entertainment Weekly magazine named Cannibal Holocaust as the 20th most controversial film of all-time. Down in It In September 1989, during the filming of the music video for "Down in It" by Nine Inch Nails in Chicago, Trent Reznor acted in a scene which ended with the implication that Reznor's character had fallen off a building | films being imported from South America and retitled Slaughter to Snuff, to exploit the idea; he also added a new ending that depicted an actress being murdered on a film set. The promotion of Snuff on its second release suggested it featured the murder of an actress: "The film that could only be made in South America... where life is CHEAP", but that was false advertising. Shackleton put out false newspaper clippings that reported a citizens group's crusading against the film and hired people to act as protesters to picket screenings. False snuff films The Guinea Pig films The first two films in the Japanese Guinea Pig series are designed to look like snuff films; the video is grainy and unsteady, as if recorded by amateurs, and extensive practical and special effects are used to imitate such features as internal organs and graphic wounds. The sixth film in the series, Mermaid in a Manhole, allegedly served as an inspiration for Japanese serial killer Tsutomu Miyazaki, who murdered several preschool girls in the late 1980s. In 1991, actor Charlie Sheen became convinced that Flower of Flesh and Blood (1985), the second film in the series, depicted an actual homicide and contacted the FBI. The Bureau initiated an investigation but closed it after the series' producers released a "making of" film demonstrating the special effects used to simulate the murders. Cannibal Holocaust The Italian director Ruggero Deodato was charged after rumors that the depictions of the killing of the main actors in his film Cannibal Holocaust (1980) were real. He was able to clear himself of the charges after the actors made an appearance in court. Other than graphic gore, the film contains several scenes of sexual violence and the genuine deaths of six animals onscreen and one off screen, |
emerging software disciplines such as extreme programming and the agile software development movement, adhere to a "test-driven software development" model. In this process, unit tests are written first, by the software engineers (often with pair programming in the extreme programming methodology). The tests are expected to fail initially. Each failing test is followed by writing just enough code to make it pass. This means the test suites are continuously updated as new failure conditions and corner cases are discovered, and they are integrated with any regression tests that are developed. Unit tests are maintained along with the rest of the software source code and generally integrated into the build process (with inherently interactive tests being relegated to a partially manual build acceptance process). The ultimate goals of this test process are to support continuous integration and to reduce defect rates. This methodology increases the testing effort done by development, before reaching any formal testing team. In some other development models, most of the test execution occurs after the requirements have been defined and the coding process has been completed. A sample testing cycle Although variations exist between organizations, there is a typical cycle for testing. The sample below is common among organizations employing the Waterfall development model. The same practices are commonly found in other development models, but might not be as clear or explicit. Requirements analysis: Testing should begin in the requirements phase of the software development life cycle. During the design phase, testers work to determine what aspects of a design are testable and with what parameters those tests work. Test planning: Test strategy, test plan, testbed creation. Since many activities will be carried out during testing, a plan is needed. Test development: Test procedures, test scenarios, test cases, test datasets, test scripts to use in testing software. Test execution: Testers execute the software based on the plans and test documents then report any errors found to the development team. This part could be complex when running tests with a lack of programming knowledge. Test reporting: Once testing is completed, testers generate metrics and make final reports on their test effort and whether or not the software tested is ready for release. Test result analysis: Or Defect Analysis, is done by the development team usually along with the client, in order to decide what defects should be assigned, fixed, rejected (i.e. found software working properly) or deferred to be dealt with later. Defect Retesting: Once a defect has been dealt with by the development team, it is retested by the testing team. Regression testing: It is common to have a small test program built of a subset of tests, for each integration of new, modified, or fixed software, in order to ensure that the latest delivery has not ruined anything and that the software product as a whole is still working correctly. Test Closure: Once the test meets the exit criteria, the activities such as capturing the key outputs, lessons learned, results, logs, documents related to the project are archived and used as a reference for future projects. Automated testing Many programming groups are relying more and more on automated testing, especially groups that use test-driven development. There are many frameworks to write tests in, and continuous integration software will run tests automatically every time code is checked into a version control system. While automation cannot reproduce everything that a human can do (and all the ways they think of doing it), it can be very useful for regression testing. However, it does require a well-developed test suite of testing scripts in order to be truly useful. Testing tools Program testing and fault detection can be aided significantly by testing tools and debuggers. Testing/debug tools include features such as: Program monitors, permitting full or partial monitoring of program code, including: Instruction set simulator, permitting complete instruction level monitoring and trace facilities Hypervisor, permitting complete control of the execution of program code including:- Program animation, permitting step-by-step execution and conditional breakpoint at source level or in machine code Code coverage reports Formatted dump or symbolic debugging, tools allowing inspection of program variables on error or at chosen points Automated functional Graphical User Interface (GUI) testing tools are used to repeat system-level tests through the GUI Benchmarks, allowing run-time performance comparisons to be made Performance analysis (or profiling tools) that can help to highlight hot spots and resource usage Some of these features may be incorporated into a single composite tool or an Integrated Development Environment (IDE). Capture and replay Capture and replay consists in collecting end-to-end usage scenario while interacting with an application and in turning these scenarios into test cases. Possible applications of capture and replay include the generation of regression tests. The SCARPE tool selectively captures a subset of the application under study as it executes. JRapture captures the sequence of interactions between an executing Java program and components on the host system such as files, or events on graphical user interfaces. These sequences can then be replayed for observation-based testing. Saieva et al. propose to generate ad-hoc tests that replay recorded user execution traces in order to test candidate patches for critical security bugs. Pankti collects object profiles in production to generate focused differential unit tests. This tool enhances capture and replay with the systematic generation of derived test oracles. Measurement in software testing Quality measures include such topics as correctness, completeness, security and ISO/IEC 9126 requirements such as capability, reliability, efficiency, portability, maintainability, compatibility, and usability. There are a number of frequently used software metrics, or measures, which are used to assist in determining the state of the software or the adequacy of the testing. Hierarchy of testing difficulty Based on the number of test cases required to construct a complete test suite in each context (i.e. a test suite such that, if it is applied to the implementation under test, then we collect enough information to precisely determine whether the system is correct or incorrect according to some specification), a hierarchy of testing difficulty has been proposed. It includes the following testability classes: Class I: there exists a finite complete test suite. Class II: any partial distinguishing rate (i.e., any incomplete capability to distinguish correct systems from incorrect systems) can be reached with a finite test suite. Class III: there exists a countable complete test suite. Class IV: there exists a complete test suite. Class V: all cases. It has been proved that each class is strictly included in the next. For instance, testing when we assume that the behavior of the implementation under test can be denoted by a deterministic finite-state machine for some known finite sets of inputs and outputs and with some known number of states belongs to Class I (and all subsequent classes). However, if the number of states is not known, then it only belongs to all classes from Class II on. If the implementation under test must be a deterministic finite-state machine failing the specification for a single trace (and its continuations), and its number of states is unknown, then it only belongs to classes from Class III on. Testing temporal machines where transitions are triggered if inputs are produced within some real-bounded interval only belongs to classes from Class IV on, whereas testing many non-deterministic systems only belongs to Class V (but not all, and some even belong to Class I). The inclusion into Class I does not require the simplicity of the assumed computation model, as some testing cases involving implementations written in any programming language, and testing implementations defined as machines depending on continuous magnitudes, have been proved to be in Class I. Other elaborated cases, such as the testing framework by Matthew Hennessy under must semantics, and temporal machines with rational timeouts, belong to Class II. Testing artifacts A software testing process can produce several artifacts. The actual artifacts produced are a factor of the software development model used, stakeholder and organisational needs. Test plan A test plan is a document detailing the approach that will be taken for intended test activities. The plan may include aspects such as objectives, scope, processes and procedures, personnel requirements, and contingency plans. The test plan could come in the form of a single plan that includes all test types (like an acceptance or system test plan) and planning considerations, or it may be issued as a master test plan that provides an overview of more than one detailed test plan (a plan of a plan). A test plan can be, in some cases, part of a wide "test strategy" which documents overall testing approaches, which may itself be a master test plan or even a separate artifact. Traceability matrix A traceability matrix is a table that correlates requirements or design documents to test documents. It is used to change tests when related source documents are changed, to select test cases for execution when planning for regression tests by considering requirement coverage. Test case A test case normally consists of a unique identifier, requirement references from a design specification, preconditions, events, a series of steps (also known as actions) to follow, input, output, expected result, and the actual result. Clinically defined, a test case is an input and an expected result. This can be as terse as 'for condition x your derived result is y', although normally test cases describe in more detail the input scenario and what results might be expected. It can occasionally be a series of steps (but often steps are contained in a separate test procedure that can be exercised against multiple test cases, as a matter of economy) but with one expected result or expected outcome. The optional fields are a test case ID, test step, or order of execution number, related requirement(s), depth, test category, author, and check boxes for whether the test is automatable and has been automated. Larger test cases may also contain prerequisite states or steps, and descriptions. A test case should also contain a place for the actual result. These steps can be stored in a word processor document, spreadsheet, database, or other common repositories. In a database system, you may also be able to see past test results, who generated the results, and what system configuration was used to generate those results. These past results would usually be stored in a separate table. Test script A test script is a procedure or programming code that replicates user actions. Initially, the term was derived from the product of work created by automated regression test tools. A test case will be a baseline to create test scripts using a tool or a program. Test suite The most common term for a collection of test cases is a test suite. The test suite often also contains more detailed instructions or goals for each collection of test cases. It definitely contains a section where the tester identifies the system configuration used during testing. A group of test cases may also contain prerequisite states or steps, and descriptions of the following tests. Test fixture or test data In most cases, multiple sets of values or data are used to test the same functionality of a particular feature. All the test values and changeable environmental components are collected in separate files and stored as test data. It is also useful to provide this data to the client and with the product or a project. There are techniques to generate test data. Test harness The software, tools, samples of data input and output, and configurations are all referred to collectively as a test harness. Test run A report of the results from running a test case or a test suite Certifications Several certification programs exist to support the professional aspirations of software testers and quality assurance specialists. Note that a few practitioners argue that the testing field is not ready for certification, as mentioned in the controversy section. Controversy Some of the major software testing controversies include: Agile vs. traditional Should testers learn to work under conditions of uncertainty and constant change or should they aim at process "maturity"? The agile testing movement has received growing popularity since 2006 mainly in commercial circles, whereas government and military software providers use this methodology but also the traditional test-last models (e.g., in the Waterfall model). Manual vs. automated testing Some writers believe that test automation is so expensive relative to its value that it should be used sparingly. The test automation then can be considered as a way to capture and implement the requirements. As a general rule, the larger the system and the greater the complexity, the greater the ROI in test automation. Also, the investment in tools and expertise can be amortized over multiple projects with the right level of knowledge sharing within an organization. Is the existence of the ISO 29119 software testing standard justified? Significant opposition has formed out of the ranks of the context-driven school of software testing about the ISO 29119 standard. Professional testing associations, such as the International Society for Software Testing, have attempted to have the standard withdrawn. Some practitioners declare that the testing field is not ready for certification No certification now offered actually requires the applicant to show their ability to test software. No certification is based on a widely accepted body of knowledge. Certification itself cannot measure an individual's productivity, their skill, or practical knowledge, and cannot guarantee their competence, or professionalism as a tester. Studies used to show the relative expense of fixing defects There are opposing views on the applicability of studies used to show the relative expense of fixing defects depending on their introduction and detection. For example: It is commonly believed that the earlier a defect is found, the cheaper it is to fix it. The following table shows the cost of fixing the defect depending on the stage it was found. For example, if a problem in the requirements is found only post-release, then it would cost 10–100 times more to fix than if it had already been found by the requirements review. With the advent of modern continuous deployment practices and cloud-based services, the cost of re-deployment and maintenance may lessen over time. The data from which this table is extrapolated is scant. Laurent Bossavit says in his analysis: The "smaller projects" curve turns out to be from only two teams of first-year students, a sample size | part of a quality management system. OAT is a common type of non-functional software testing, used mainly in software development and software maintenance projects. This type of testing focuses on the operational readiness of the system to be supported, or to become part of the production environment. Hence, it is also known as operational readiness testing (ORT) or Operations readiness and assurance (OR&A) testing. Functional testing within OAT is limited to those tests that are required to verify the non-functional aspects of the system. In addition, the software testing should ensure that the portability of the system, as well as working as expected, does not also damage or partially corrupt its operating environment or cause other processes within that environment to become inoperative. Contractual acceptance testing is performed based on the contract's acceptance criteria defined during the agreement of the contract, while regulatory acceptance testing is performed based on the relevant regulations to the software product. Both of these two testings can be performed by users or independent testers. Regulation acceptance testing sometimes involves the regulatory agencies auditing the test results. Testing types, techniques and tactics Different labels and ways of grouping testing may be testing types, software testing tactics or techniques. Installation testing Most software systems have installation procedures that are needed before they can be used for their main purpose. Testing these procedures to achieve an installed software system that may be used is known as installation testing. Compatibility testing A common cause of software failure (real or perceived) is a lack of its compatibility with other application software, operating systems (or operating system versions, old or new), or target environments that differ greatly from the original (such as a terminal or GUI application intended to be run on the desktop now being required to become a Web application, which must render in a Web browser). For example, in the case of a lack of backward compatibility, this can occur because the programmers develop and test software only on the latest version of the target environment, which not all users may be running. This results in the unintended consequence that the latest work may not function on earlier versions of the target environment, or on older hardware that earlier versions of the target environment were capable of using. Sometimes such issues can be fixed by proactively abstracting operating system functionality into a separate program module or library. Smoke and sanity testing Sanity testing determines whether it is reasonable to proceed with further testing. Smoke testing consists of minimal attempts to operate the software, designed to determine whether there are any basic problems that will prevent it from working at all. Such tests can be used as build verification test. Regression testing Regression testing focuses on finding defects after a major code change has occurred. Specifically, it seeks to uncover software regressions, as degraded or lost features, including old bugs that have come back. Such regressions occur whenever software functionality that was previously working correctly, stops working as intended. Typically, regressions occur as an unintended consequence of program changes, when the newly developed part of the software collides with the previously existing code. Regression testing is typically the largest test effort in commercial software development, due to checking numerous details in prior software features, and even new software can be developed while using some old test cases to test parts of the new design to ensure prior functionality is still supported. Common methods of regression testing include re-running previous sets of test cases and checking whether previously fixed faults have re-emerged. The depth of testing depends on the phase in the release process and the risk of the added features. They can either be complete, for changes added late in the release or deemed to be risky, or be very shallow, consisting of positive tests on each feature, if the changes are early in the release or deemed to be of low risk. In regression testing, it is important to have strong assertions on the existing behavior. For this, it is possible to generate and add new assertions in existing test cases, this is known as automatic test amplification. Acceptance testing Acceptance testing can mean one of two things: A smoke test is used as a build acceptance test prior to further testing, e.g., before integration or regression. Acceptance testing performed by the customer, often in their lab environment on their own hardware, is known as user acceptance testing (UAT). Acceptance testing may be performed as part of the hand-off process between any two phases of development. Alpha testing Alpha testing is simulated or actual operational testing by potential users/customers or an independent test team at the developers' site. Alpha testing is often employed for off-the-shelf software as a form of internal acceptance testing before the software goes to beta testing. Beta testing Beta testing comes after alpha testing and can be considered a form of external user acceptance testing. Versions of the software, known as beta versions, are released to a limited audience outside of the programming team known as beta testers. The software is released to groups of people so that further testing can ensure the product has few faults or bugs. Beta versions can be made available to the open public to increase the feedback field to a maximal number of future users and to deliver value earlier, for an extended or even indefinite period of time (perpetual beta). Functional vs non-functional testing Functional testing refers to activities that verify a specific action or function of the code. These are usually found in the code requirements documentation, although some development methodologies work from use cases or user stories. Functional tests tend to answer the question of "can the user do this" or "does this particular feature work." Non-functional testing refers to aspects of the software that may not be related to a specific function or user action, such as scalability or other performance, behavior under certain constraints, or security. Testing will determine the breaking point, the point at which extremes of scalability or performance leads to unstable execution. Non-functional requirements tend to be those that reflect the quality of the product, particularly in the context of the suitability perspective of its users. Continuous testing Continuous testing is the process of executing automated tests as part of the software delivery pipeline to obtain immediate feedback on the business risks associated with a software release candidate. Continuous testing includes the validation of both functional requirements and non-functional requirements; the scope of testing extends from validating bottom-up requirements or user stories to assessing the system requirements associated with overarching business goals. Destructive testing Destructive testing attempts to cause the software or a sub-system to fail. It verifies that the software functions properly even when it receives invalid or unexpected inputs, thereby establishing the robustness of input validation and error-management routines. Software fault injection, in the form of fuzzing, is an example of failure testing. Various commercial non-functional testing tools are linked from the software fault injection page; there are also numerous open-source and free software tools available that perform destructive testing. Software performance testing Performance testing is generally executed to determine how a system or sub-system performs in terms of responsiveness and stability under a particular workload. It can also serve to investigate, measure, validate or verify other quality attributes of the system, such as scalability, reliability and resource usage. Load testing is primarily concerned with testing that the system can continue to operate under a specific load, whether that be large quantities of data or a large number of users. This is generally referred to as software scalability. The related load testing activity of when performed as a non-functional activity is often referred to as endurance testing. Volume testing is a way to test software functions even when certain components (for example a file or database) increase radically in size. Stress testing is a way to test reliability under unexpected or rare workloads. Stability testing (often referred to as load or endurance testing) checks to see if the software can continuously function well in or above an acceptable period. There is little agreement on what the specific goals of performance testing are. The terms load testing, performance testing, scalability testing, and volume testing, are often used interchangeably. Real-time software systems have strict timing constraints. To test if timing constraints are met, real-time testing is used. Usability testing Usability testing is to check if the user interface is easy to use and understand. It is concerned mainly with the use of the application. This is not a kind of testing that can be automated; actual human users are needed, being monitored by skilled UI designers. Accessibility testing Accessibility testing may include compliance with standards such as: Americans with Disabilities Act of 1990 Section 508 Amendment to the Rehabilitation Act of 1973 Web Accessibility Initiative (WAI) of the World Wide Web Consortium (W3C) Security testing Security testing is essential for software that processes confidential data to prevent system intrusion by hackers. The International Organization for Standardization (ISO) defines this as a "type of testing conducted to evaluate the degree to which a test item, and associated data and information, are protected so that unauthorised persons or systems cannot use, read or modify them, and authorized persons or systems are not denied access to them." Internationalization and localization Testing for internationalization and localization validates that the software can be used with different languages and geographic regions. The process of pseudolocalization is used to test the ability of an application to be translated to another language, and make it easier to identify when the localization process may introduce new bugs into the product. Globalization testing verifies that the software is adapted for a new culture (such as different currencies or time zones). Actual translation to human languages must be tested, too. Possible localization and globalization failures include: Software is often localized by translating a list of strings out of context, and the translator may choose the wrong translation for an ambiguous source string. Technical terminology may become inconsistent, if the project is translated by several people without proper coordination or if the translator is imprudent. Literal word-for-word translations may sound inappropriate, artificial or too technical in the target language. Untranslated messages in the original language may be left hard coded in the source code. Some messages may be created automatically at run time and the resulting string may be ungrammatical, functionally incorrect, misleading or confusing. Software may use a keyboard shortcut that has no function on the source language's keyboard layout, but is used for typing characters in the layout of the target language. Software may lack support for the character encoding of the target language. Fonts and font sizes that are appropriate in the source language may be inappropriate in the target language; for example, CJK characters may become unreadable, if the font is too small. A string in the target language may be longer than the software can handle. This may make the string partly invisible to the user or cause the software to crash or malfunction. Software may lack proper support for reading or writing bi-directional text. Software may display images with text that was not localized. Localized operating systems may have differently named system configuration files and environment variables and different formats for date and currency. Development testing Development Testing is a software development process that involves the synchronized application of a broad spectrum of defect prevention and detection strategies in order to reduce software development risks, time, and costs. It is performed by the software developer or engineer during the construction phase of the software development lifecycle. Development Testing aims to eliminate construction errors before code is promoted to other testing; this strategy is intended to increase the quality of the resulting software as well as the efficiency of the overall development process. Depending on the organization's expectations for software development, Development Testing might include static code analysis, data flow analysis, metrics analysis, peer code reviews, unit testing, code coverage analysis, traceability, and other software testing practices. A/B testing A/B testing is a method of running a controlled experiment to determine if a proposed change is more effective than the current approach. Customers are routed to either a current version (control) of a feature, or to a modified version (treatment) and data is collected to determine which version is better at achieving the desired outcome. Concurrent testing Concurrent or concurrency testing assesses the behaviour and performance of software and systems that use concurrent computing, generally under normal usage conditions. Typical problems this type of testing will expose are deadlocks, race conditions and problems with shared memory/resource handling. Conformance testing or type testing In software testing, conformance testing verifies that a product performs according to its specified standards. Compilers, for instance, are extensively tested to determine whether they meet the recognized standard for that language. Output comparison testing Creating a display expected output, whether as data comparison of text or screenshots of the UI, is sometimes called snapshot testing or Golden Master Testing unlike many other forms of testing, this cannot detect failures automatically and instead requires that a human evaluate the output for inconsistencies. Property testing Property testing is a testing technique where, instead of asserting that specific inputs produce specific expected outputs, the practitioner randomly generates many inputs, runs the program on all of them, and asserts the truth of some "property" that should be true for every pair of input and output. For example, every input to a sort function should have the same length as its output. Every output from a sort function should be a monotonically increasing list. Property testing libraries allow the user to control the strategy by which random inputs are constructed, to ensure coverage of degenerate cases, or inputs featuring specific patterns that are needed to fully exercise aspects of the implementation under test. Property testing is also sometimes known as "generative testing" or "QuickCheck testing" since it was introduced and popularized by the Haskell library "QuickCheck." Metamorphic testing Metamorphic testing (MT) is a property-based software testing technique, which can be an effective approach for addressing the test oracle problem and test case generation problem. The test oracle problem is the difficulty of determining the expected outcomes of selected test cases or to determine whether the actual outputs agree with the expected outcomes. VCR testing VCR testing, also known as "playback testing" or "record/replay" testing, is a testing technique for increasing the reliability and speed of regression tests that involve a component that is slow or unreliable to communicate with, often a third-party API outside of the tester's control. It involves making a recording ("cassette") of the system's interactions with the external component, and then replaying the recorded interactions as a substitute for communicating with the external system on subsequent runs of the test. The technique was popularized in web development by the Ruby library vcr. Testing process Traditional waterfall development model A common practice in waterfall development is that testing is performed by an independent group of testers. This can happen: after the functionality is developed, but before it is shipped to the customer. This practice often results in the testing phase being used as a project buffer to compensate for project delays, thereby compromising the time devoted to testing. at the same moment the development project starts, as a continuous process until the project finishes. However, even in the waterfall development model, unit testing is often done by the software development team even when further testing is done by a separate team. Agile or XP development model In contrast, some emerging software disciplines such as extreme programming and the agile software development movement, adhere to a "test-driven software development" model. In this process, unit tests are written first, by the software engineers (often with pair programming in the extreme programming methodology). The tests are expected to fail initially. Each failing test is followed by writing just enough code to make it pass. This means the test suites are continuously updated as new failure conditions and corner cases are discovered, and they are integrated with any regression tests that are developed. Unit tests are maintained along with the rest of the software source code and generally integrated into the build process (with inherently interactive tests being relegated to a partially manual build acceptance process). The ultimate goals of this test process are to support continuous integration and to reduce defect rates. This methodology increases the testing effort done by development, before reaching any formal testing team. In some other development models, most of the test execution occurs after the requirements have been defined and the coding process has been completed. A sample testing cycle Although variations exist between organizations, there is a typical cycle for testing. The sample below is common among organizations employing the Waterfall development model. The same practices are commonly found in other development models, but might not be as clear or explicit. Requirements analysis: Testing should begin in the requirements phase of the software development life cycle. During the design phase, testers |
"USS" is dropped and it is referred to as "ex-Name." Reusable equipment is removed at the same time as the fuel. Spent fuel storage Spent nuclear fuel is shipped by rail to the Naval Reactor Facility in the Idaho National Laboratory (INL), located northwest of Idaho Falls, Idaho, where it is stored in special canisters. Hull salvage At PSNS the SRP proper begins. The salvage workers cut the submarine into three or four pieces: the aft section, the reactor compartment, the missile compartment if one exists, and the forward section. Missile compartments are dismantled according to the provisions of the Strategic Arms Reductions Treaty. Until 1991, the forward and aft sections of the submarines were rejoined and placed in floating storage. Various proposals for disposal of those hulls were considered, including sinking them at sea, but none proved economically practical. Some submarines built prior to the 1978 banning of polychlorinated biphenyl products (PCBs) had the chemicals on board, which are considered hazardous materials by the Environmental Protection Agency and United States Coast Guard, requiring their removal. Since then, and to help reduce costs, the remaining submarine sections are recycled, returning reusable materials to production. In the process of submarine recycling, all hazardous and toxic wastes are identified and removed, and reusable equipment is removed and put into inventory. Scrap metals and all other materials are sold to private companies or reused. The overall process is not profitable, but does provide some cost relief. Disposal of submarines by the SRP costs the Navy US$25–50 million per submarine. Reactor vessel disposal Once the de-fueled reactor compartment is removed, it is sealed at both ends and shipped by barge and multiple-wheel high-capacity trailers to the Department of Energy's Hanford Nuclear Reservation in Washington state, where they are currently, , kept in open dry storage and slated to be eventually buried. Russian submarine reactor compartments are stored in similar fashion at Sayda-Guba (Sayda Bay) in northwestern Russia. The burial trenches have been evaluated to be secure for at least 600 years before the first pinhole penetration of some lead containment areas of | recycling, all hazardous and toxic wastes are identified and removed, and reusable equipment is removed and put into inventory. Scrap metals and all other materials are sold to private companies or reused. The overall process is not profitable, but does provide some cost relief. Disposal of submarines by the SRP costs the Navy US$25–50 million per submarine. Reactor vessel disposal Once the de-fueled reactor compartment is removed, it is sealed at both ends and shipped by barge and multiple-wheel high-capacity trailers to the Department of Energy's Hanford Nuclear Reservation in Washington state, where they are currently, , kept in open dry storage and slated to be eventually buried. Russian submarine reactor compartments are stored in similar fashion at Sayda-Guba (Sayda Bay) in northwestern Russia. The burial trenches have been evaluated to be secure for at least 600 years before the first pinhole penetration of some lead containment areas of the reactor compartment packages occurs, and several thousand years before leakage becomes possible. Prior disposal methods In 1959 the US Navy removed a nuclear reactor from the submarine and replaced it with a new type. The removed reactor was scuttled in the Atlantic Ocean, east of Delaware, at a depth of . In 1972, the London Dumping Convention restricted ocean disposal of radioactive waste and in 1993, ocean disposal of radioactive waste was completely banned. The US Navy began a study on scrapping nuclear submarines; two years later shallow land burial of reactor compartments was selected as the most suitable option. In 1990, was the first US nuclear-powered submarine to be scrapped. Future salvage work By the end of 2005, 195 nuclear submarines had been ordered or built in the US (including the NR-1 Deep Submergence Craft and , but none of the later ). The last of the regular attack boats, , was decommissioned in 2001, and , a highly modified Sturgeon, was decommissioned in 2004. The last of the initial "41 for Freedom" fleet ballistic missile (FBM) submarines, , was decommissioned in 2002. Decommissioning of the boats began in 1995 with . Additionally, a handful of nuclear-powered cruisers have entered the program, and their dismantling is ongoing. The first aircraft carrier due for decommissioning that would enter the SRP is planned to be , which was withdrawn in 2013. Unlike the disposal of other nuclear powered surface ships, all of which have been recycled at the Puget Sound Naval Shipyard and Intermediate Maintenance Facility, the Navy is looking at other, commercial or private sector options for Enterprise in an effort to reduce both the cost of the work and the time taken to dismantle such a large vessel, as well as negating the difficulty of towing the hulk all the way from Newport News, where it is stored, to Puget Sound. In December 2020, it was announced that a further nine Los Angeles-class attack submarines, two guided missile submarines, and the aircraft carrier would be decommissioned and enter the recycling program by 2026. Hulls waiting or already processed by the recycling program are listed below. Lists of vessels by type Aircraft carriers As of Enterprise remains stored at Hampton Roads until final disposition plans are decided on by the US Navy. Cruisers † A dagger after a completion date indicates that portions of the hull were preserved as memorials. See the individual articles for details. |
Buddhism (禅 Chán), martial arts (武 wǔ), Buddhist art (艺 yì), and traditional Chinese medicine (医 yī). This Shaolin cultural heritage, still constituting the daily Temple life, is representative of the Chinese civilization and appreciated internationally. A large number of celebrities, political figures, eminent monks, Buddhist disciples and many other people, come to the Temple to visit, make pilgrimages, and cultural exchanges. In addition, owing to the work of official Shaolin overseas cultural centers and foreign disciples, the Shaolin culture spreads around the world as a distinctive symbol of Chinese culture and an important means of foreign cultural exchange. At present, Shaolin Temple is a Global Low-carbon Ecological Scenic Spot and a National 5A-level Tourist Attraction in China. It has been awarded the highest-level category used by Ministry of Culture and Tourism attributed to the most important and best-maintained tourist attractions in the People's Republic of China. History Northern Wei Dynasty Shaolin Temple was founded in the 19th year of the Taihe Era of the Northern Wei Dynasty (495 AD). The first patron of the Shaolin Monastery was the devout Emperor Xiaowen (r. 471–499), who in 495 transferred the capital of his Northern Wei Tuoba Dynasty (386–534) from Pingcheng (today's Datong, Shanxi) to Luoyang. The following year, the monarch provided the Indian-born monk Batuo with funds to establish the Shaolin Temple. Batuo, also referred to in the Chinese sources as Fotuo (in Sanskrit: Buddhabhadra), had met the emperor several years before. He had enjoyed Xiaowen's sponsorship ever since he arrived in Pingcheng via the silk route around 490. Thanks to Batuo, Shaolin became an important center for study and translation of original Buddhist scriptures. It also became a place of gathering for esteemed Buddhist masters. Historical sources on the early origins of Shaolin Kung Fu show that at this time martial arts practice was existent in the Temple. Batuo's teaching was continued by his two disciples, Sengchou (僧稠Sēngchóu, 480–560) and Huiguang (慧光Huìguāng, 487–536). In the first year of the Yongping Era (506), Indian monks Lenamoti 勒那摩提 (in Sanskrit: Ratnamati) and Putiliuzhi 菩提流支 (in Sanskrit: Bodhiruci) came to Shaolin to set up a scripture translation hall. Together with Huiguang, they translated master Shiqin's (世親 Shìqīn, in Sanskrit: Vasubandhu) commentary on the Ten Stages Sutra (Sanskrit: Daśabhūmika Sūtra; simplified Chinese: 十地经), an early, influential Mahayana Buddhist scripture. After that, Huiguang promoted the Vinaya in Four Parts (四分律Sì fēn lǜ, Sanskrit: Dharmagupta-Vinaya), which was the theoretical basis for the Luzong (律宗 Lǜzōng) School of Buddhism formed during the Tang Dynasty by Dao Xuan (596-667). In the third year of the Xiaochang Era (527) of Emperor Xiaoming of the Northern Wei Dynasty, Bodhidharma, the 28th patriarch of Mahayana Buddhism in India, came to the Shaolin Temple. Bodhidharma (达摩 Dá mó), an Indian monk, came to China around the 470s as a Chan Buddhist missionary and traveled for decades throughout China before settling on Mount Song in the 520s. Bodhidharma's teachings were primarily based on Lankavatara Sutra, which contains the conversation between Gautama Buddha and Bodhisattva Mahamatti, who is considered the first patriarch of Chan tradition. Using the teachings of Batuo and his disciples as a foundation, Bodhidharma introduced Chan Buddhism, and the Shaolin Temple community gradually grew to become the center of Chinese Chan Buddhism. Bodhidharma's teaching was transmitted to his disciple Huike, for whom the legend says to have cut off his arm to show his determination and devotion to the teachings of his master. Huike was forced to leave the Temple during the persecution of Buddhism and Daoism (574-580) by Emperor Wu of the Northern Zhou Dynasty. In 580 Emperor Jing of the Northern Zhou Dynasty restored the Temple and renamed it Zhi‘ao Temple (陟岵寺 Zhìhù sì). Sui, Tang and Song Dynasty Emperor Wen of the Sui Dynasty (隋文帝; 21 July 541 – 13 August 604), who was a Buddhist himself, returned the Temple's original name and offered to its community 100 hectares of land. Shaolin thus became a large temple with hundreds of hectares of fertile land and large properties. It was once again the center of Chan Buddhism, with eminent monks from all over China coming to the Temple on regular basis. At the end of the Sui Dynasty, the Shaolin Temple, with its huge monastery properties, became the target of thieves and bandits. The monks organized forces within their community to protect the Temple and fight against the intruders. At the beginning of the Tang Dynasty, thirteen Shaolin monks helped Li Shimin, the future founder of the Tang Dynasty, in his fight against Wang Shichong. They captured Shichong's nephew Wang Renze, whose army was stationed in the Cypress Valley. In 626, Li Shimin, later known as Emperor Taizong sent an official letter of gratitude to the Shaolin community for the help they provided in his fight against Shichong and thus the establishment of the Tang Dynasty. The Tang Dynasty also established several Shaolin branch monasteries throughout the country, and formulated policies for Shaolin monks and soldiers to assist local governments and regular military troops. Shaolin Temple also became a place where emperors and high officials would come for temporary reclusion. Emperor Gaozong and Empress Wu Zetian of the Tang Dynasty often visited the Shaolin Temple for good luck, and made large donations. During the Tang and Song dynasties, the Shaolin Temple was extremely prosperous. It had more than 14,000 acres of land, 540 acres of temple grounds, more than 5,000 rooms, and more than 2,000 monks. The Chan Buddhist School founded by Bodhidharma flourished during the Tang Dynasty and was the largest Buddhist school of that time. The information about the first century of the Northern Song Dynasty is very scarce. The rulers of Song supported the development of Buddhism, and Chan established itself as dominant over other Buddhist schools. Around 1093 Chan master Baoen (报恩Bào'ēn) promoted the Caodong School in the Shaolin Temple and achieved what is known in Buddhist history as “revolutionary turn into Chan”. This means that the Shaolin Temple officially became a Chan Buddhist Temple, while up to that point it was a Lǜzōng temple specialized in Vinaya with a Chan Hall. Yuan, Ming and Qing At the beginning of the Yuan Dynasty, Emperor Shizu, also known as Kublai Khan, placed the monk Xueting Fuyu (雪庭福裕, 1203–1275) as the abbot of Shaolin and in charge of all the temples in the Mount Song area. During this period, the abbot had undertaken important construction work including the building of the Bell Tower and the Drum Tower. He also introduced the generational lineage system of the Shaolin disciples through a 70-character poem – each character in line corresponding to the name of the next generation of disciples. In 1260, Fuyu was honored with the title of the Divine Buddhist Master and in 1312 posthumously named Duke of Jin (晋国共 Jìn guó gōng) by the Yuan Dynasty emperor. The fall of the Mongol empire and the establishment of the Ming dynasty brought much unrest, in which the Temple community needed to defend itself from the rebels and bandits. An important part of the Temple's material heritage was destroyed during the two decades of the Red Turban rebellions. With the establishment of the Ming dynasty by mid-14th century, Shaolin recovered and a large part of the monastic community that fled during the Red Turban attacks returned. In the beginning of the Ming Dynasty, the government did not advocate martial arts. During the Jiajing period (嘉靖Jiājìng, 1522–1566) of the Ming emperor Zhu Houcong (朱厚熜Zhūhòucōng) Japanese pirates harassed China's coastal areas, and generals Yu Dayou and Qi Jiguang led their troops against the pirates. During his stay in Fujian, Qi Jiguang convened martial artists from all over China, including local Shaolin monks, to develop a set of boxing and staff fighting techniques to be used against Japanese pirates. Owing to the monks' merits in fighting against the Japanese, the government renovated the Temple on a large scale, and Shaolin enjoyed certain privileges, such as food tax exemption, granted by the government. Since then, the Shaolin monks were recruited by the Ming government at least six times to participate in wars. Due to their outstanding contribution to the Chinese military success, the imperial court built monuments and buildings for Shaolin Temple on numerous occasions. This also contributed to the establishment of the legitimacy of Shaolin Kung Fu in the national martial arts community. During the Ming Dynasty (in mid-16th century) Shaolin reached its apogee, and held its position as the central place of the Caodong School of Chan Buddhism. During the Qing Dynasty, the Shaolin Temple was favored by the Qing emperors. In the 43rd year of Emperor Kangxi's rule (1704), the emperor gifted the tablet to the Temple with the characters 少林寺(Shàolín sì) engraved on it in his calligraphy (originally hung in the Heavenly King Hall, and later moved by the Mountain Gate). In the 13th year of Emperor Yongzheng's rule (1735), important reconstructions were financed by the court, including the rebuilding of the gate and the Thousand Buddha's Hall. In the 15th year of his rule (1750), Emperor Qianlong personally visited Shaolin Temple, stayed at the abbot's room overnight, and wrote poems and tablet inscriptions. Republic of China In the early days of the Republic of China, the Shaolin Temple was repeatedly hit by wars. In 1912, monk Yunsong Henglin from the Dengfeng County Monks Association, was elected by the local government as the head of the Shaolin Militia (Shaolin Guarding Corps). He organized the guards, and trained them in combat skills to maintain local order. In the autumn of 1920, famine and drought hit Henan province, which led to thieves surging throughout the area and endangering the local community. Henglin led the militia to fight the bandits in different occasions, thus enabling dozens of villages in the Temple's surroundings to live and work in peace. In the late 1920s, Shaolin monks became embroiled in the warlords’ feuds that swept the plains of northern China. They sided with General Fan Zhongxiu (1888–1930) against Shi Yousan (1891–1940). Monks sided with Fan who had studied martial arts at the Shaolin Temple as a child. Fan was defeated, and in the spring of 1928, Yousan's troops entered Dengfeng and Shaolin Temple, which served as Fan Zongxiu's headquarters. On March 15, Shi Yousan's subordinate Feng Yuxiang set fire to the monastery, destroying some of its ancient towers and halls. The flames partially damaged the “Shaolin Monastery Stele” (which recorded the politically astute choice made by other Shaolin clerics fifteen hundred years earlier), the Dharma Hall, the Heavenly King Hall, Mahavira Hall, Bell Tower, Drum Tower, Sixth Ancestor Hall, Chan Hall and other buildings, causing death of a number of monks who were at the Temple. Large number of cultural relics and 5480 volumes of Buddhist scriptures were destroyed in the fire. Japan 's activities in Manchuria in the early 1930s made the National Government very worried. The military then launched a strong patriotic movement to defend the country and resist the enemy. Nanjing Central Martial Arts Center and Wushu Institute together with other martial arts institutions were established around the country as part of this movement. The government also organized martial arts events such as “Martial arts returning to Shaolin”. This particular event served to encourage the people to remember the importance of patriotism through celebrating the contribution of the Shaolin martial arts to the country's defense from the foreign invasion at numerous occasions throughout history. People's Republic of China Since the founding of the People's Republic of China, the state recognized five official religions, including Buddhism, and established institutional relationship with them through religious associations. The Buddhist Association of China was founded in 1953, and was disbanded in the late 1960s during the Cultural Revolution, then reactivated following the end of that period. During the Cultural Revolution in the People's Republic of China, the monks of Shaolin Temple were forced to return to the secular life, Buddha statues were destroyed, and temple properties were invaded. After the Cultural Revolution, Shaolin Temple was repaired and rebuilt. The buildings and other material heritage which was destroyed, including the Mahavira Hall and the stone portraying “Bodhidharma facing the wall”, were reconstructed according to their originals. The others, such as the ancient martial arts | visited Shaolin Temple, stayed at the abbot's room overnight, and wrote poems and tablet inscriptions. Republic of China In the early days of the Republic of China, the Shaolin Temple was repeatedly hit by wars. In 1912, monk Yunsong Henglin from the Dengfeng County Monks Association, was elected by the local government as the head of the Shaolin Militia (Shaolin Guarding Corps). He organized the guards, and trained them in combat skills to maintain local order. In the autumn of 1920, famine and drought hit Henan province, which led to thieves surging throughout the area and endangering the local community. Henglin led the militia to fight the bandits in different occasions, thus enabling dozens of villages in the Temple's surroundings to live and work in peace. In the late 1920s, Shaolin monks became embroiled in the warlords’ feuds that swept the plains of northern China. They sided with General Fan Zhongxiu (1888–1930) against Shi Yousan (1891–1940). Monks sided with Fan who had studied martial arts at the Shaolin Temple as a child. Fan was defeated, and in the spring of 1928, Yousan's troops entered Dengfeng and Shaolin Temple, which served as Fan Zongxiu's headquarters. On March 15, Shi Yousan's subordinate Feng Yuxiang set fire to the monastery, destroying some of its ancient towers and halls. The flames partially damaged the “Shaolin Monastery Stele” (which recorded the politically astute choice made by other Shaolin clerics fifteen hundred years earlier), the Dharma Hall, the Heavenly King Hall, Mahavira Hall, Bell Tower, Drum Tower, Sixth Ancestor Hall, Chan Hall and other buildings, causing death of a number of monks who were at the Temple. Large number of cultural relics and 5480 volumes of Buddhist scriptures were destroyed in the fire. Japan 's activities in Manchuria in the early 1930s made the National Government very worried. The military then launched a strong patriotic movement to defend the country and resist the enemy. Nanjing Central Martial Arts Center and Wushu Institute together with other martial arts institutions were established around the country as part of this movement. The government also organized martial arts events such as “Martial arts returning to Shaolin”. This particular event served to encourage the people to remember the importance of patriotism through celebrating the contribution of the Shaolin martial arts to the country's defense from the foreign invasion at numerous occasions throughout history. People's Republic of China Since the founding of the People's Republic of China, the state recognized five official religions, including Buddhism, and established institutional relationship with them through religious associations. The Buddhist Association of China was founded in 1953, and was disbanded in the late 1960s during the Cultural Revolution, then reactivated following the end of that period. During the Cultural Revolution in the People's Republic of China, the monks of Shaolin Temple were forced to return to the secular life, Buddha statues were destroyed, and temple properties were invaded. After the Cultural Revolution, Shaolin Temple was repaired and rebuilt. The buildings and other material heritage which was destroyed, including the Mahavira Hall and the stone portraying “Bodhidharma facing the wall”, were reconstructed according to their originals. The others, such as the ancient martial arts training ground, the Pagoda Forest and some stone carvings that survived, still remain in their original state. In December 1996, Chuzu Temple and Shaolin Temple Pagoda Forest (No. 4-89) were listed as national key cultural relics protection units. The Shaolin Temple leadership was aiming for its historical architectural complex to become a United Nations World Heritage site, in order to obtain annual funding for maintenance and development from the United Nations. After repeated submissions, their application was finally accepted by the 34th World Heritage Committee on August 1, 2010. UNESCO reviewed and approved 8 sites and 11 architectural complexes including Shaolin's Resident Hall, Pagoda Forest, and Chuzu Temple as World Cultural Heritage. On March 22, 2006, the Russian President Putin visited Shaolin Temple and watched a Shaolin Kung Fu performance. He was the first foreign head of state to visit Shaolin Temple in its history. In May 2007, Shaolin Temple was named a National 5A Scenic Spot by China National Tourism Administration. In 2009, Shaolin Temple established Fengyinghang Co., Ltd. to prepare for the construction of the first Overseas Shaolin Cultural Center Headquarters (Hong Kong Shaolin Temple) outside of Mainland China. In April 2013, the Shaolin Temple Sutra Pavilion was selected as a National Key Protection Unit for Ancient Books, as its collection of documents and books related to Kung Fu theory and practice is unique in China. Shaolin Temple’s lineage Historical data record that in the period preceding the Yuan Dynasty, the Shaolin Temple nurtured five Buddhist schools. The abbot of Shaolin Temple Xueting Fuyu (雪庭福裕 Xuětíng Fúyù, 1203–1275) unified the five schools and established the Southern Branch Caodong School in the Temple. He also wrote a 70-character poem that defines the pattern of generational naming that has been followed up to this date. The current leadership of the Shaolin Temple: Venerable Abbot Shi Yongxin The current abbot of Shaolin Temple is Venerable Master Shi Yongxin, the 30th generation abbot of Shaolin Temple. Born as Liu Yingcheng, he comes from a devout Buddhist family from Yingshang, Anhui province. At the age of 17, he came to Shaolin Temple in Mount Songshan, where the Abbot Master Xingzheng took him as a disciple. His Buddhist name “Yongxin” means the one who “always believes in Buddhism”. Later he studied at the Yunju Mountain in Jianxi Province, Jiuhua Mountain in Anhui Province and Guangji Temple in Beijing. After having received his precepts in Puzhao Temple in Jianxi Province in 1984, he returned to Shaolin Temple. He continued serving his Master Xingzheng and was also a member of the newly established Democratic Management Committee of Shaolin Temple. In 1987, after his master died, he took over the position of Chairman of Shaolin Temple Management Committee and presided over the work of the monastery. In March 1993, Shi Yongxin was elected a member of Henan Provincial Political Consultative Conference and in October of the same year the Head of the Buddhist Association of China. He was elected as Deputy to the Ninth (1998), Tenth (2003), Eleventh (2008) and Twelfth (2013) National People's Congress. In July 1998, he became the President of Henan Buddhist Association. In August 1999, Shi Yongxin was honored as the Abbot of Shaolin Temple. In 2002 and again in 2010 he was elected the Vice President of the Buddhist Association of China. In 2010, he also became the Director of the Overseas Communication Committee of Buddhist Association of China. Abbot Shi Yongxin's published works in recent years include texts in the Dew of Chan journal series, and books My Heart My Buddha, Shaolin Temple in My Heart (Chinese and English version), etc. He also compiled dozens of books, including Shaolin Temple (large album), Collection of Shaolin Kung Fu (the second series), Medical Secret Records of Shaolin Kung Fu, Encyclopedia of Shaolin Temple (three volumes), Chan Buddhism Grand Ceremony (200 volumes), Chinese Martial Arts Grand Ceremony (101 volumes), Medical Encyclopedia of Chinese Buddhism (101 volumes), Essays of International Seminar on Chan Culture, Science of Shaolin Anthology, Shaolin Kung Fu, Chan Happiness, The Heart Sutra of Bodhisattva and so on. Acknowledgements Ancient honors Before Emperor Wuzong's Huichang prosecution of Buddhism and Taoism, Shaolin Temple enjoyed tax exemptions. Modern acknowledgements In 2004, the California State House of Representatives and the Senate passed two votes to officially establish March 21 as the “California Songshan Shaolin Temple Day.” In 2007, the Temple was proclaimed as a National 5A-level Scenic Spot, a Global Low-carbon Ecological Scenic Spot, a patriotism education base for religious circles of the People's Republic of China, and an education base for respecting and caring for the elderly of the People's Republic of China. On August 1, 2010, during the UNESCO 34th World Heritage Committee, 8 buildings including Shaolin Temple, Pagoda Forest and Chuzu Temple were listed as World Cultural Heritage. In April 2013, the Shaolin Temple Sutra Pavilion was selected as a National Key Protection Unit for Ancient Books, and its collection of documents and books related to Kung Fu theory and practice ranks first in the People's Republic of China. In May 2013, the State Council of the People's Republic of China listed the ancient buildings of Shaolin Temple (No. 7-1162) as the seventh batch of national key cultural relics protection units. International promotion of the Shaolin cultural heritage Shaolin Temple is an important religious and cultural institution both in China and internationally. Because of its uniqueness, the Shaolin culture is accepted and recognized by people of different races, beliefs, and cultural backgrounds. The Temple has become means for China to display its cultural soft power. Since the founding of the People's Republic of China, and especially since the 1970s, cultural exchanges between Shaolin Temple and the rest of the world have been continuously improved in terms of content, scale, frequency and scope. Temple has been visited by European and American dancers, World Muay Thai, NBA stars, Hollywood movie stars, but also renowned monks from traditional Buddhist countries such as Myanmar, Thailand, Cambodia, Nepal and Sri Lanka. Also, a large number of political leaders, such as Swedish King Carl XVI Gustaf, British Queen Elizabeth II, Spanish King Juan Carlos I, Australia's former Prime Minister Howard, South Africa Former President Mandela, Russian President Putin, former US Secretary of State Kissinger and Taiwan politician James Soong have met with the abbot in the Temple or abroad. Visits by Lien Chan and Wu Boxiong, former International Olympic Committee President Roger and others have further proved the importance of Shaolin Temple. In 2004, the California House of Representatives and the Senate passed two votes to pronounce March 21 as the "Songshan Shaolin Temple Day in California", which became a legislative holiday established by the California Assembly. Currently there are more than 40 overseas cultural institutions established by the Temple's leadership and its disciples in dozens of countries around the world. Shaolin monks come to the centers to teach about Buddhist classics, martial arts, mediation, etc. Another way of promoting the Shaolin intangible cultural heritage in the world is through the Shaolin Cultural Festivals, first of which was held in North America. These festivals and similar events convey the spiritual connotation of Chinese culture and Eastern values to societies internationally. Shaolin culture Shaolin Temple has developed numerous complementary cultural aspects that permeate and mutually reinforce each other and are inseparable when it comes to presenting the Temple's material and intangible cultural heritage. The most prominent aspects are those of Chan (禅 Chán), martial arts (武 wǔ), traditional medicine (中医 zhōngyī) and art (艺 yì). Shaolin Culture is rooted in Mahayana Buddhism, while the practice of Chan is its nucleus and finally, the martial arts, traditional medicine and art are its manifestations. Thanks to the efforts of the abbot Shi Yongxin, the monastic community and the Temple's disciples from all over the world, the Shaolin Culture continues to grow. During its historical development, the Shaolin Culture has also integrated the essential values of Confucianism and Taoism. The contemporary Temple establishment offers to all interested individuals and groups, regardless of cultural, social and religious values, the chance to experience the Shaolin culture through the Shaolin cultural exchange program. This program offers introduction to Chan meditation, Shaolin Kung Fu, Chan medicine, calligraphy, art, archery etc. Chan practice is supposed to help the individual in attaining calm and patience necessary for living optimistically, meaningfully, wisely and with compassion. Ways of practicing Chan are numerous and they range from everyday activities (e.g. eating, drinking, walking or sleeping) to specialized practices such as meditation, martial arts, and calligraphy. Shaolin Kung Fu is manifested through a system of different skills that are based on attack and defense movements with the form (套路 tàolù) as its unit. One form is a combination of different movements. The structure of movements is founded on the ancient Chinese medical knowledge which is compatible with the laws |
race from the Doctor Who episode "The Christmas Invasion" Sycorax (fly), a genus of moth flies in the family Psychodidae | Sycorax (typeface), a combination of typefaces and spelling used by the poet Kamau Brathwaite Sycorax, a fictional planet, and alien race from the Doctor Who episode "The Christmas Invasion" Sycorax (fly), a |
Corporation in the early 1950s. At the newly formed Sperry Rand, ERA became the "scientific computing" arm of their UNIVAC division. Control Data Corporation Cray, along with William Norris, later became dissatisfied with ERA, then spun off as Sperry Rand. In 1957, they founded a new company, Control Data Corporation. By 1960 he had completed the design of the CDC 1604, an improved low-cost ERA 1103 that had impressive performance for its price. Even as the CDC 1604 was starting to ship to customers in 1960, Cray had already moved on to designing other computers. He first worked on the design of an upgraded version (the CDC 3000 series), but company management wanted these machines targeted toward "business and commercial" data processing for average customers. Cray did not enjoy working on such "mundane" machines, constrained to design for low-cost construction, so CDC could sell many of them. His desire was to "produce the largest [fastest] computer in the world". So after some basic design work on the CDC 3000 series, he turned that over to others and went on to work on the CDC 6600. Nonetheless, several special features of the 6600 first started to appear in the 3000 series. Although in terms of hardware the 6600 was not on the leading edge, Cray invested considerable effort into the design of the machine in an attempt to enable it to run as fast as possible. Unlike most high-end projects, Cray realized that there was considerably more to performance than simple processor speed, that I/O bandwidth had to be maximized as well in order to avoid "starving" the processor of data to crunch. He later noted, "Anyone can build a fast CPU. The trick is to build a fast system." The 6600 was the first commercial supercomputer, outperforming everything then available by a wide margin. While expensive, for those that needed the absolutely fastest computer available there was nothing else on the market that could compete. When other companies (namely IBM) attempted to create machines with similar performance, they stumbled (IBM 7030 Stretch). In the 6600 Cray had solved the critical design problem of "imprecise interrupts", which was largely responsible for IBM's failure. He did this by replacing I/O interrupts with a polled request issued by one of ten so-called peripheral processors, which were built-in mini-computers that did all transfers in and out of the 6600's central memory. The following CDC 7600 even improved the speed advantage by a factor of five. In 1963, in a Business Week article announcing the CDC 6600, Seymour Cray clearly expressed an idea that is often misattributed to Herb Grosch as so-called Grosch's law: CDC's Chippewa Falls laboratory During this period Cray had become increasingly annoyed at what he saw as interference from CDC management. Cray always demanded an absolutely quiet work environment with a minimum of management overhead, but as the company grew he found himself constantly interrupted by middle managers who – according to Cray – did little but gawk and use him as a sales tool by introducing him to prospective customers. Cray decided that in order to continue development he would have to move from St. Paul, far enough that it would be too long a drive for a "quick visit" and long-distance telephone charges would be just enough to deter most calls, yet close enough that real visits or board meetings could be attended without too much difficulty. After some debate, Norris backed him and set up a new laboratory on land Cray owned in his hometown of Chippewa Falls. Part of the reason for the move may also have to do with Cray's worries about an impending nuclear war, which he felt made the Twin Cities a serious safety concern. His house, built a few hundred yards from the new CDC laboratory, included a huge bomb shelter. The new Chippewa Lab was set up during the middle of the 6600 project, although it does not seem to have delayed the project. After the 6600 shipped, the successor CDC 7600 system was the next product to be developed in Chippewa Falls, offering peak computational speeds of ten times the 6600. The failed follow-on to the 7600, the CDC 8600, was the project that finally ended his run of successes at CDC in 1972. Although the 6600 and 7600 had been huge successes in the end, both projects had almost bankrupted the company while they were being designed. The 8600 was running into similar difficulties and Cray eventually decided that the only solution was to start over fresh. This time Norris was not willing to take the risk, and another project within the company, the CDC STAR-100, seemed to be progressing more smoothly. Norris said he was willing to keep the project alive at a low level until the STAR was delivered, at which point full funding could be put into the 8600. Cray was unwilling to work under these conditions and left the company. Cray Research The split was fairly amicable, and when he started Cray Research in a new laboratory on the same Chippewa property a year later, Norris invested $250,000 in start-up money. Like CDC's organization, Cray R&D was based in Chippewa Falls and business headquarters were in Minneapolis. Unlike CDC, Cray's manufacturing was also in Chippewa Falls. At first there was some question as to what exactly the new company should do. It did not seem that there would be any way for them to afford to develop a new computer, given that the now-large CDC had been unable to support more than one. When the President in charge of financing traveled to Wall Street to look for seed money, he was surprised to find that Cray's reputation was very well known. Far from struggling for some role to play in the market, the financial world was more than willing to provide Cray with all the money they would need to develop a new machine. After several years of development, their first product was released in 1976 as the Cray-1. As with earlier Cray designs, the Cray-1 made sure that the entire computer was fast, as opposed to just the processor. When it was released it easily beat almost every machine in terms of speed, including the STAR-100 that had beaten the 8600 for funding. The only machine able to perform on the same sort of level was the ILLIAC IV, a specialized one-off machine that rarely operated near its maximum performance, | to run into difficulties. An upgrade of the X-MP using high-speed memory from the Cray-2 was under development and seemed to be making real progress, and once again management was faced with two projects and limited budgets. They eventually decided to take the safer route, releasing the new design as the Cray Y-MP. Cray Computer Corporation Cray decided to spin off the Colorado Springs laboratory to form Cray Computer Corporation. This new entity took the Cray-3 project with them. The 500 MHz Cray-3 proved to be Cray's second major failure. In order to provide the tenfold increase in performance that he always demanded of his newest machines, Cray decided that the machine would have to be built using gallium arsenide semiconductors. In the past Cray had always avoided using anything even near the state of the art, preferring to use well-known solutions and designing a fast machine based on them. In this case, Cray was developing every part of the machine, even the chips inside it. Nevertheless, the team were able to get the machine working and delivered their first example to NCAR on 24 May 1993. The machine was still essentially a prototype, and the company was using the installation to debug the design. By this time a number of massively parallel machines were coming into the market at price/performance ratios the Cray-3 could not touch. Cray responded through "brute force", starting design of the Cray-4 which would run at 1 GHz and outpower these machines, regardless of price. In 1995 there had been no further sales of the Cray-3, and the ending of the Cold War made it unlikely anyone would buy enough Cray-4s to offer a return on the development funds. The company ran out of money and filed for Chapter 11 bankruptcy 24 March 1995. SRC Computers Cray had always resisted the massively parallel solution to high-speed computing, offering a variety of reasons that it would never work as well as one very fast processor. He famously quipped "If you were plowing a field, which would you rather use: two strong oxen or 1024 chickens?" By the mid-1990s, this argument was becoming increasingly difficult to justify, and modern compiler technology made developing programs on such machines not much more difficult than their simpler counterparts. Cray set up a new company, SRC Computers, and started the design of his own massively parallel machine. The new design concentrated on communications and memory performance, the bottleneck that hampered many parallel designs. Design had just started when Cray died suddenly as a result of a car accident. SRC Computers carried on development and specialized in reconfigurable computing. Technical approaches Cray frequently cited two important aspects to his design philosophy: remove heat, and ensure that all signals that are supposed to arrive somewhere at the same time do indeed arrive at the same time. His computers were equipped with built-in cooling systems, extending ultimately to coolant channels cast into the mainframes and thermally coupled to metal plates within the circuit boards, and to systems immersed in coolants. In a story he told about himself, he realized early in his career that he should interlock the computers with the cooling systems so that the computers would not operate unless the cooling systems were operational. It did not originally occur to him to interlock in the other direction until a customer reported that localized power outages had shut down their computer, but left the cooling system running — so they arrived in the morning to find the machine encased in ice. Cray addressed the problem of skew by ensuring that every signal path in his later computers was the same electrical length, so that values that were to be acted upon at a particular time were indeed all valid values. When required, he would run the traces back and forth on the circuit boards until the desired length was achieved, and he employed Maxwell's equations in design of the boards to ensure that any radio frequency effects which altered the signal velocity and hence the electrical path length were accounted for. When asked what kind of CAD tools he used for the Cray-1, Cray said that he liked #3 pencils with 8-1/2" x 11" quadrille paper pads. Cray recommended using the backs of the pages so that the lines were not so dominant. Personal life Cray avoided publicity, and there are a number of unusual tales about his life away from work, termed "Rollwagenisms", from then-CEO of Cray Research, John A. Rollwagen. He enjoyed skiing, windsurfing, tennis, and other sports. Another favorite pastime was digging a tunnel under his home; he attributed the secret of his success to "visits by elves" while he worked in the tunnel: "While I'm digging in the tunnel, the elves will often come to me with solutions to my problem." One story has it that when Cray was asked by management to provide detailed one-year and five-year plans for his next machine, he simply wrote, "Five-year goal: Build the biggest computer in the world. One year goal: One-fifth of the above." And another time, when expected to write a multi-page detailed status report for the company executives, Cray's two sentence report read: "Activity is progressing satisfactorily as outlined under the June plan. There have been no significant changes or deviations from the June plan. Cray died on October 5, 1996, two weeks after his automobile was struck on the highway and rolled several times. The IEEE Computer Society's Seymour Cray Computer Engineering Award, established in late 1997, recognizes innovative contributions to high performance computing systems exemplifying Cray's creative spirit. Cray married Verene Voll in 1947. They had known each other since childhood. She was the daughter of a Methodist minister, just as was Cray's mother, and Verene worked as |
(pprinz@example.com) * / O \ **************************** Most email clients, including Mozilla Thunderbird, the built-in mail tool of the web browser Opera, Microsoft Outlook and Outlook Express, and Eudora, can be configured to automatically append an email signature with each new message. A shortened form of a signature block (sometimes called a "signature line"), only including one's name, often with some distinguishing prefix, can be used to simply indicate the end of a post or response. Most email servers can be configured to append email signatures to all outgoing mail as well. Email signature generator An email signature generator is an app or an online web app that allows users to create a designed email signature using a pre-made template (with no need for HTML coding skills). Signatures in Usenet postings Signature blocks are also used in the Usenet discussion system. Email signatures in business Businesses often automatically append signature blocks to messages—or have policies mandating a certain style. Generally they resemble standard business cards in their content—and often in their presentation—with company logos and sometimes even the exact appearance of a business card. In some cases, a vCard is automatically attached. In addition to these standard items, email disclaimers of various sorts are often automatically appended. These are typically couched in legal jargon, but it is unclear what weight they have in law, and they are routinely lampooned. Business emails may also use some signature block elements mandated by local laws: | ( > º < ) * Poppy Prinz * (")_(") `>>x<<´ * (pprinz@example.com) * / O \ **************************** Most email clients, including Mozilla Thunderbird, the built-in mail tool of the web browser Opera, Microsoft Outlook and Outlook Express, and Eudora, can be configured to automatically append an email signature with each new message. A shortened form of a signature block (sometimes called a "signature line"), only including one's name, often with some distinguishing prefix, can be used to simply indicate the end of a post or response. Most email servers can be configured to append email signatures to all outgoing mail as well. Email signature generator An email signature generator is an app or an online web app that allows users to create a designed email signature using a pre-made template (with no need for HTML coding skills). Signatures in Usenet postings Signature blocks are also used in the Usenet discussion system. Email signatures in business Businesses often automatically append signature blocks to messages—or have policies mandating a certain style. Generally they resemble standard business cards in their content—and often in their presentation—with company logos and sometimes even the exact appearance of a business card. In some cases, a vCard is automatically attached. In addition to these standard items, email disclaimers of various sorts are often automatically appended. These are typically couched in legal jargon, but it is unclear what weight they have in law, and they are routinely lampooned. Business emails may also use some signature block elements mandated by local laws: Germany requires companies to disclose their company name, registration number, place of registration etc. in email signatures, in any business-related emails. Ireland's Director of Corporate Enforcement requires all limited companies operating websites to disclose such information in their emails. The UK's ECommerce Regulations require this information in all emails from limited companies. While criticized by some as overly bureaucratic, these regulations only extend existing laws for paper business correspondence to email. Standard delimiter The Usenet news system standards say that a signature block is conventionally delimited from the body of the message by a single line consisting of exactly two hyphens, followed by a space, followed by the |
to accomplish this distinction, any part of a sentence that bears a meaning and combines with the meanings of other constituents is labeled as a semantic constituent. Semantic constituents that cannot be broken down into more elementary constituents are labeled minimal semantic constituents. Cross-cultural semantics Various fields or disciplines have long been contributing to cross-cultural semantics. Are words like love, truth, and hate universals? Is even the word sense – so central to semantics – a universal, or a concept entrenched in a long-standing but culture-specific tradition? These are the kind of crucial questions that are discussed in cross-cultural semantics. Translation theory, ethnolinguistics, linguistic anthropology and cultural linguistics specialize in the field of comparing, contrasting, and translating words, terms and meanings from one language to another (see Herder, W. von Humboldt, Boas, Sapir, and Whorf). But philosophy, sociology, and anthropology have long established traditions in contrasting the different nuances of the terms and concepts we use. And online encyclopaedias such as the Stanford Encyclopedia of Philosophy, and more and more Wikipedia itself have greatly facilitated the possibilities of comparing the background and usages of key cultural terms. In recent years the question of whether key terms are translatable or untranslatable has increasingly come to the fore of global discussions, especially since the publication of Barbara Cassin's Dictionary of Untranslatables: A Philosophical Lexicon, in 2014. Computational semantics Computational semantics is focused on the processing of linguistic meaning. In order to do this, concrete algorithms and architectures are described. Within this framework the algorithms and architectures are also analyzed in terms of decidability, time/space complexity, data structures that they require and communication protocols. Philosophy Many of the formal approaches to semantics in mathematical logic and computer science originated in early twentieth century philosophy of language and philosophical logic. Initially, the most influential semantic theory stemmed from Gottlob Frege and Bertrand Russell. Frege and Russell are seen as the originators of a tradition in analytic philosophy to explain meaning compositionally via syntax and mathematical functionality. Ludwig Wittgenstein, a former student of Russell, is also seen as one of the seminal figures in the analytic tradition. All three of these early philosophers of language were concerned with how sentences expressed information in the form of propositions. They also dealt with the truth values or truth conditions a given sentence has in virtue of the proposition it expresses. In present day philosophy, the term "semantics" is often used to refer to linguistic formal semantics, which bridges both linguistics and philosophy. There is also an active tradition of metasemantics, which studies the foundations of natural language semantics. Computer science In computer science, the term semantics refers to the meaning of language constructs, as opposed to their form (syntax). According to Euzenat, semantics "provides the rules for interpreting the syntax which do not provide the meaning directly but constrains the possible interpretations of what is declared". Programming languages The semantics of programming languages and other languages is an important issue and area of study in computer science. Like the syntax of a language, its semantics can be defined exactly. For instance, the following statements use different syntaxes, but cause the same instructions to be executed, namely, perform an arithmetical addition of 'y' to 'x' and store the result in a variable called 'x': Various ways have been developed to describe the semantics of programming languages formally, building on mathematical logic: Operational semantics: | to do this, concrete algorithms and architectures are described. Within this framework the algorithms and architectures are also analyzed in terms of decidability, time/space complexity, data structures that they require and communication protocols. Philosophy Many of the formal approaches to semantics in mathematical logic and computer science originated in early twentieth century philosophy of language and philosophical logic. Initially, the most influential semantic theory stemmed from Gottlob Frege and Bertrand Russell. Frege and Russell are seen as the originators of a tradition in analytic philosophy to explain meaning compositionally via syntax and mathematical functionality. Ludwig Wittgenstein, a former student of Russell, is also seen as one of the seminal figures in the analytic tradition. All three of these early philosophers of language were concerned with how sentences expressed information in the form of propositions. They also dealt with the truth values or truth conditions a given sentence has in virtue of the proposition it expresses. In present day philosophy, the term "semantics" is often used to refer to linguistic formal semantics, which bridges both linguistics and philosophy. There is also an active tradition of metasemantics, which studies the foundations of natural language semantics. Computer science In computer science, the term semantics refers to the meaning of language constructs, as opposed to their form (syntax). According to Euzenat, semantics "provides the rules for interpreting the syntax which do not provide the meaning directly but constrains the possible interpretations of what is declared". Programming languages The semantics of programming languages and other languages is an important issue and area of study in computer science. Like the syntax of a language, its semantics can be defined exactly. For instance, the following statements use different syntaxes, but cause the same instructions to be executed, namely, perform an arithmetical addition of 'y' to 'x' and store the result in a variable called 'x': Various ways have been developed to describe the semantics of programming languages formally, building on mathematical logic: Operational semantics: The meaning of a construct is specified by the computation it induces when it is executed on a machine. In particular, it is of interest how the effect of a computation is produced. Denotational semantics: Meanings are modelled by mathematical objects that represent the effect of executing the constructs. Thus only the effect is of interest, not how it is obtained. Axiomatic semantics: Specific properties of the effect of executing the constructs are expressed as assertions. Thus there may be aspects of the executions that are ignored. Semantic models The Semantic Web refers to the extension of the World Wide Web via embedding added semantic metadata, using semantic data modeling techniques such as Resource Description Framework (RDF) and Web Ontology Language (OWL). On the Semantic Web, terms such as semantic network and semantic data model are used to describe particular types of data model characterized by the use of directed graphs in which the vertices denote concepts or entities in the world and their properties, and the arcs denote relationships between them. These can formally be described as description logic concepts and roles, which correspond to OWL classes and properties. Psychology Semantic memory In psychology, semantic memory is memory for meaning – in other words, the aspect of memory that preserves only the gist, the general significance, of remembered experience – while episodic memory is memory for the ephemeral details – the individual features, or the unique particulars of experience. The term "episodic memory" was introduced by Tulving and Schacter in the context of "declarative memory", which involved simple association of factual or objective information concerning its object. Word meaning is measured by the company they keep, i.e. the relationships among words themselves in a semantic network. The memories may be transferred intergenerationally or isolated in one generation due to a cultural disruption. Different generations may have different experiences at similar points in their own time-lines. This may then create a vertically heterogeneous semantic net for certain words in an otherwise homogeneous culture. In a network created by people analyzing their understanding of the word (such as Wordnet) the links and decomposition structures of the network are few in number and kind, and include part of, kind of, and similar links. In automated ontologies the links are computed vectors without explicit meaning. Various automated technologies are being developed to compute the meaning of words: latent semantic indexing and support vector machines, as well as natural language processing, artificial neural networks and predicate calculus techniques. Ideasthesia Ideasthesia is a psychological phenomenon in which activation of concepts evokes sensory experiences. For example, in synesthesia, activation of a concept of a letter (e.g., that of the letter A) evokes sensory-like experiences (e.g., of red color). Psychosemantics In the 1960s, psychosemantic studies became popular after Charles E. Osgood's massive cross-cultural studies using his semantic differential (SD) method that used thousands of nouns and adjective bipolar scales. A specific form of the SD, Projective Semantics method uses only most common and neutral nouns that correspond to the 7 groups (factors) of adjective-scales most consistently found in cross-cultural studies (Evaluation, Potency, Activity as found by Osgood, and Reality, Organization, Complexity, Limitation as found in other studies). In this method, seven groups of bipolar adjective scales corresponded to seven types of nouns so the method was thought to have the object-scale symmetry (OSS) between the scales and nouns for evaluation using these scales. For example, the nouns corresponding to the listed 7 factors would be: Beauty, Power, Motion, Life, Work, Chaos, Law. Beauty was expected to be assessed unequivocally as "very good" on adjectives of Evaluation-related scales, Life as "very real" on Reality-related scales, etc. However, deviations in this symmetric and very basic matrix might show underlying biases of two types: scales-related bias and objects-related bias. This OSS design meant to increase the sensitivity of the SD method to |
networks can also be used as a method to analyze large texts and identify the main themes and topics (e.g., of social media posts), to reveal biases (e.g., in news coverage), or even to map an entire research field. History Examples of the use of semantic networks in logic, directed acyclic graphs as a mnemonic tool, dates back centuries. The earliest documented use being the Greek philosopher Porphyry's commentary on Aristotle's categories in the third century AD. In computing history, "Semantic Nets" for the propositional calculus were first implemented for computers by Richard H. Richens of the Cambridge Language Research Unit in 1956 as an "interlingua" for machine translation of natural languages. Although the importance of this work and the CLRU was only belatedly realized. Semantic networks were also independently implemented by Robert F. Simmons and Sheldon Klein, using the first order predicate calculus as a base, after being inspired by a demonstration of Victor Yngve. The "line of research was originated by the first President of the Association [Association for Computational Linguistics], Victor Yngve, who in 1960 had published descriptions of algorithms for using a phrase structure grammar to generate syntactically well-formed nonsense sentences. Sheldon Klein and I about 1962-1964 were fascinated by the technique and generalized it to a method for controlling the sense of what was generated by respecting the semantic dependencies of words as they occurred in text." Other researchers, most notably M. Ross Quillian and others at System Development Corporation helped contribute to their work in the early 1960s as part of the SYNTHEX project. It's from these publications at SDC that most modern derivatives of the term "semantic network" cite as their background. Later prominent works were done by Allan M. Collins and Quillian (e.g., Collins and Quillian; Collins and Loftus Quillian). Still later in 2006, Hermann Helbig fully described MultiNet. In the late 1980s, two Netherlands universities, Groningen and Twente, jointly began a project called Knowledge Graphs, which are semantic networks but with the added constraint that edges are restricted to be from a limited set of possible relations, to facilitate algebras on the graph. In the subsequent decades, the distinction between semantic networks and knowledge graphs was blurred. In 2012, Google gave their knowledge graph the name Knowledge Graph. The Semantic Link Network was systematically studied as a social semantics networking method. Its basic model consists of semantic nodes, semantic links between nodes, and a semantic space that defines the semantics of nodes and links and reasoning rules on semantic links. The systematic theory and model was published in 2004. This research direction can trace to the definition of inheritance rules for efficient model retrieval in 1998 and the Active Document Framework ADF. Since 2003, research has developed toward social semantic networking. This work is a systematic innovation at the age of the World Wide Web and global social networking rather than an application or simple extension of the Semantic Net (Network). Its purpose and scope are different from that of the Semantic Net (or network). The rules for reasoning | or even to map an entire research field. History Examples of the use of semantic networks in logic, directed acyclic graphs as a mnemonic tool, dates back centuries. The earliest documented use being the Greek philosopher Porphyry's commentary on Aristotle's categories in the third century AD. In computing history, "Semantic Nets" for the propositional calculus were first implemented for computers by Richard H. Richens of the Cambridge Language Research Unit in 1956 as an "interlingua" for machine translation of natural languages. Although the importance of this work and the CLRU was only belatedly realized. Semantic networks were also independently implemented by Robert F. Simmons and Sheldon Klein, using the first order predicate calculus as a base, after being inspired by a demonstration of Victor Yngve. The "line of research was originated by the first President of the Association [Association for Computational Linguistics], Victor Yngve, who in 1960 had published descriptions of algorithms for using a phrase structure grammar to generate syntactically well-formed nonsense sentences. Sheldon Klein and I about 1962-1964 were fascinated by the technique and generalized it to a method for controlling the sense of what was generated by respecting the semantic dependencies of words as they occurred in text." Other researchers, most notably M. Ross Quillian and others at System Development Corporation helped contribute to their work in the early 1960s as part of the SYNTHEX project. It's from these publications at SDC that most modern derivatives of the term "semantic network" cite as their background. Later prominent works were done by Allan M. Collins and Quillian (e.g., Collins and Quillian; Collins and Loftus Quillian). Still later in 2006, Hermann Helbig fully described MultiNet. In the late 1980s, two Netherlands universities, Groningen and Twente, jointly began a project called Knowledge Graphs, which are semantic networks but with the added constraint that edges are restricted to be from a limited set of possible relations, to facilitate algebras on the graph. In the subsequent decades, the distinction between semantic networks and knowledge graphs was blurred. In 2012, Google gave their knowledge graph the name Knowledge Graph. The Semantic Link Network was systematically studied as a social semantics networking method. Its basic model consists of semantic nodes, semantic links between nodes, and a semantic space that defines the semantics of nodes and links and reasoning rules on semantic links. The systematic theory and model was published in 2004. This research direction can trace to the definition of inheritance rules for efficient model retrieval in 1998 and the Active Document Framework ADF. Since 2003, research has developed toward social semantic networking. This work is a systematic innovation at the age of the World Wide Web and global social networking rather than an application or simple extension of the Semantic Net (Network). Its purpose and scope are different from that of the Semantic Net (or network). The rules for reasoning and evolution and automatic discovery of implicit links play an important role in the Semantic Link Network. Recently it has been developed to support Cyber-Physical-Social Intelligence. It was used for creating a general summarization method. The self-organised Semantic Link Network was integrated with a multi-dimensional category space to form a semantic space to support advanced applications with multi-dimensional abstractions and self-organised semantic links It has been verified that Semantic Link Network play an important role in understanding and representation through text summarisation applications. Semantic Link Network has been extended from cyberspace to cyber-physical-social space. Competition relation and symbiosis relation as well as their roles in evolving society were studied in the emerging topic: Cyber-Physical-Social Intelligence More specialized forms of semantic networks has been created for specific use. For example, in 2008, Fawsy Bendeck's PhD thesis formalized the Semantic Similarity Network (SSN) that contains specialized relationships and propagation algorithms to simplify the semantic similarity representation and calculations. Basics of semantic networks A semantic network is used when one has knowledge that is best understood as a set of concepts that are related to one another. Most semantic networks are cognitively based. They also consist of arcs and nodes which can be organized into a taxonomic hierarchy. Semantic networks contributed ideas of spreading activation, inheritance, and nodes as proto-objects. Examples In Lisp The following code shows an example of a semantic network in the Lisp programming language using an association list. (setq *database* '((canary (is-a bird) (color yellow) (size small)) (penguin (is-a bird) (movement swim)) (bird (is-a vertebrate) (has-part wings) (reproduction egg-laying)))) To extract all the information about the "canary" type, one would use the assoc function with a key of "canary". WordNet An example of a semantic network is WordNet, a lexical database of English. It groups English words into sets of synonyms called synsets, provides short, general definitions, and records the various semantic relations between these synonym sets. Some of the most common semantic relations defined are meronymy (A is a meronym of B if A is part of B), holonymy (B is a holonym of A if B contains A), hyponymy (or troponymy) (A is subordinate of B; A is kind of B), hypernymy (A is superordinate of B), synonymy (A denotes the same as B) and antonymy (A denotes the |
who had been supporting the Sture Party in the previous years. Thereafter King Christian II became known in Sweden as ('Christian the Tyrant'). Background Political factions in Sweden The Stockholm Bloodbath was a consequence of conflict between Swedish pro-unionists (in favour of the Kalmar Union, then dominated by Denmark) and anti-unionists (supporters of Swedish independence), and also between the anti-unionists and the Danish aristocracy, which in other aspects was opposed to King Christian. The anti-unionist party was headed by Sten Sture the Younger, and the pro-unionist party by the Archbishop Gustavus Trolle. Military interventions of King Christian King Christian, who had already taken measures to isolate Sweden politically, intervened to help Archbishop Trolle, who was under siege in his fortress at Stäket. However, he was defeated by Sture and his peasant soldiers at Vedila, and forced to return to Denmark. A second attempt to bring Sweden back under his control in 1518 was also countered by Sture's victory at Brännkyrka. Eventually, a third attempt made in 1520 with a large army of French, German and Scottish mercenaries proved successful. Sture was mortally wounded at the Battle of Bogesund on 19 January 1520. The Danish army, unopposed, was approaching Uppsala, where the members of the Swedish Riksdag of the Estates had already assembled. The senators agreed to render homage to Christian, on condition that he give a full amnesty for past actions and a guarantee that Sweden should be ruled according to Swedish laws and customs. A convention to this effect was confirmed by the king and the Danish Privy Council on 31 March. Sture's widow, Lady Kristina, was still resisting in Stockholm with support from the peasants of central Sweden, and defeated the Danes at Balundsås on 19 March. Eventually, her forces were defeated at the Battle of Uppsala (långfredagsslaget vid Uppsala) on Good Friday, 6 April. In May, the Danish fleet, led by King Christian, arrived and Stockholm was attacked by land and sea. Lady Kristina resisted for four months longer, and in the beginning of autumn Kristina's forces began winning. The inhabitants of Stockholm had a large supply of food and fared relatively well. Christian realized that his stockpile was dwindling and that it would doom his army to maintain the siege throughout the winter. With the help of Bishop Mattias, Hemming Gadh and other Swedes of high stature, Christian sent a proposal for retreat that was very advantageous for the Swedes. During a meeting on what is thought to be Beckholmen, outside of Djurgården, Christian swore that all acts against him would be forgotten, and gave pardon to several named persons (including Gustav Vasa, who had escaped from Denmark, where he had been held hostage). Lady Kristina would be given Hörningsholm and all Mörkön as a fief, and was also promised Tavastehus in Finland. When this had been written down on paper, the mayor of the city delivered the | castle. Archbishop Gustav Trolle, demanding economic compensation for things such as the demolition of Almarestäket's fortress, questioned whether the former Swedish regent Sten Sture the Younger and his supporters had been guilty of heresy. Supported by canon law, nearly 100 people were executed in the days following the meeting despite promises of amnesty. Among those killed were many people from the aristocracy who had been supporting the Sture Party in the previous years. Thereafter King Christian II became known in Sweden as ('Christian the Tyrant'). Background Political factions in Sweden The Stockholm Bloodbath was a consequence of conflict between Swedish pro-unionists (in favour of the Kalmar Union, then dominated by Denmark) and anti-unionists (supporters of Swedish independence), and also between the anti-unionists and the Danish aristocracy, which in other aspects was opposed to King Christian. The anti-unionist party was headed by Sten Sture the Younger, and the pro-unionist party by the Archbishop Gustavus Trolle. Military interventions of King Christian King Christian, who had already taken measures to isolate Sweden politically, intervened to help Archbishop Trolle, who was under siege in his fortress at Stäket. However, he was defeated by Sture and his peasant soldiers at Vedila, and forced to return to Denmark. A second attempt to bring Sweden back under his control in 1518 was also countered by Sture's victory at Brännkyrka. Eventually, a third attempt made in 1520 with a large army of French, German and Scottish mercenaries proved successful. Sture was mortally wounded at the Battle of Bogesund on 19 January 1520. The Danish army, unopposed, was approaching Uppsala, where the members of the Swedish Riksdag of the Estates had already assembled. The senators agreed to render homage to Christian, on condition that he give a full amnesty for past actions and a guarantee that Sweden should be ruled according to Swedish laws and customs. A convention to this effect was confirmed by the king and the Danish Privy Council on 31 March. Sture's widow, Lady Kristina, was still resisting in Stockholm with support from the peasants of central Sweden, and defeated the Danes at Balundsås on 19 March. Eventually, her forces were defeated at the Battle of Uppsala (långfredagsslaget vid Uppsala) on Good Friday, 6 April. In May, the Danish fleet, led by King Christian, arrived and Stockholm was attacked by land and sea. Lady |
MIT) Space Systems Laboratory (MIT), at the Massachusetts Institute of Technology (separate from the SSL that moved to UMD) Space Systems Laboratory, at additional universities Solid State Logic, a manufacturer of audio mixing consoles Sainsbury’s Supermarkets Ltd, a British supermarket chain Places South Salt Lake, Utah, a city in the US Social Science Library, Oxford, at the University of Oxford Science and technology Sodium stearoyl lactylate, a food additive Standard sea level, physical conditions at sea level Sumatra | Louis, a congregation of Roman Catholic nuns SSL (company), formerly Space Systems/Loral, a satellite manufacturer Space Sciences Laboratory, in Berkeley, California, US Space Systems Laboratory (Maryland), at the University of Maryland, US (formerly at MIT) Space Systems Laboratory (MIT), at the Massachusetts Institute of Technology (separate from the SSL that moved to UMD) Space Systems Laboratory, at additional universities Solid State Logic, a manufacturer of audio mixing consoles Sainsbury’s Supermarkets Ltd, a British supermarket chain Places South Salt Lake, Utah, a city in the US Social Science Library, Oxford, at the University of Oxford Science and technology Sodium stearoyl lactylate, a food additive Standard sea level, physical conditions at sea level Sumatra squall lines, a weather phenomenon that affects the Malay Peninsula and Singapore Computing and electronics Secure Sockets Layer, a cryptographic |
However its most astonishing success was in decrypting the Zimmermann Telegram, a telegram from the German Foreign Office sent via Washington to its ambassador Heinrich von Eckardt in Mexico. Postwar consolidation With the importance of interception and decryption firmly established by the wartime experience, countries established permanent agencies dedicated to this task in the interwar period. In 1919, the British Cabinet's Secret Service Committee, chaired by Lord Curzon, recommended that a peace-time codebreaking agency should be created. The Government Code and Cypher School (GC&CS) was the first peace-time codebreaking agency, with a public function "to advise as to the security of codes and cyphers used by all Government departments and to assist in their provision", but also with a secret directive to "study the methods of cypher communications used by foreign powers". GC&CS officially formed on 1 November 1919, and produced its first decrypt on 19 October. By 1940, GC&CS was working on the diplomatic codes and ciphers of 26 countries, tackling over 150 diplomatic cryptosystems. The US Cipher Bureau was established in 1919 and achieved some success at the Washington Naval Conference in 1921, through cryptanalysis by Herbert Yardley. Secretary of War Henry L. Stimson closed the US Cipher Bureau in 1929 with the words "Gentlemen do not read each other's mail." World War II The use of SIGINT had even greater implications during World War II. The combined effort of intercepts and cryptanalysis for the whole of the British forces in World War II came under the code name "Ultra" managed from Government Code and Cypher School at Bletchley Park. Properly used, the German Enigma and Lorenz ciphers should have been virtually unbreakable, but flaws in German cryptographic procedures, and poor discipline among the personnel carrying them out, created vulnerabilities which made Bletchley's attacks feasible. Bletchley's work was essential to defeating the U-boats in the Battle of the Atlantic, and to the British naval victories in the Battle of Cape Matapan and the Battle of North Cape. In 1941, Ultra exerted a powerful effect on the North African desert campaign against German forces under General Erwin Rommel. General Sir Claude Auchinleck wrote that were it not for Ultra, "Rommel would have certainly got through to Cairo". "Ultra" decrypts featured prominently in the story of Operation SALAM, László Almásy's mission across the desert behind Allied lines in 1942. Prior to the Normandy landings on D-Day in June 1944, the Allies knew the locations of all but two of Germany's fifty-eight Western-front divisions. Winston Churchill was reported to have told King George VI: "It is thanks to the secret weapon of General Menzies, put into use on all the fronts, that we won the war!" Supreme Allied Commander, Dwight D. Eisenhower, at the end of the war, described Ultra as having been "decisive" to Allied victory. Official historian of British Intelligence in World War II Sir Harry Hinsley, argued that Ultra shortened the war "by not less than two years and probably by four years"; and that, in the absence of Ultra, it is uncertain how the war would have ended. Technical definitions The United States Department of Defense has defined the term "signals intelligence" as: A category of intelligence comprising either individually or in combination all communications intelligence (COMINT), electronic intelligence (ELINT), and foreign instrumentation signals intelligence (FISINT), however transmitted. Intelligence derived from communications, electronic, and foreign instrumentation signals. Being a broad field, SIGINT has many sub-disciplines. The two main ones are communications intelligence (COMINT) and electronic intelligence (ELINT). Disciplines shared across the branches Targeting A collection system has to know to look for a particular signal. "System", in this context, has several nuances. Targeting is an output of the process of developing collection requirements: "1. An intelligence need considered in the allocation of intelligence resources. Within the Department of Defense, these collection requirements fulfill the essential elements of information and other intelligence needs of a commander, or an agency. "2. An established intelligence need, validated against the appropriate allocation of intelligence resources (as a requirement) to fulfill the essential elements of information and other intelligence needs of an intelligence consumer." Need for multiple, coordinated receivers First, atmospheric conditions, sunspots, the target's transmission schedule and antenna characteristics, and other factors create uncertainty that a given signal intercept sensor will be able to "hear" the signal of interest, even with a geographically fixed target and an opponent making no attempt to evade interception. Basic countermeasures against interception include frequent changing of radio frequency, polarization, and other transmission characteristics. An intercept aircraft could not get off the ground if it had to carry antennas and receivers for every possible frequency and signal type to deal with such countermeasures. Second, locating the transmitter's position is usually part of SIGINT. Triangulation and more sophisticated radio location techniques, such as time of arrival methods, require multiple receiving points at different locations. These receivers send location-relevant information to a central point, or perhaps to a distributed system in which all participate, such that the information can be correlated and a location computed. Intercept management Modern SIGINT systems, therefore, have substantial communications among intercept platforms. Even if some platforms are clandestine, there is still a broadcast of information telling them where and how to look for signals. A United States targeting system under development in the late 1990s, PSTS, constantly sends out information that helps the interceptors properly aim their antennas and tune their receivers. Larger intercept aircraft, such as the EP-3 or RC-135, have the on-board capability to do some target analysis and planning, but others, such as the RC-12 GUARDRAIL, are completely under ground direction. GUARDRAIL aircraft are fairly small, and usually work in units of three to cover a tactical SIGINT requirement, where the larger aircraft tend to be assigned strategic/national missions. Before the detailed process of targeting begins, someone has to decide there is a value in collecting information about something. While it would be possible to direct signals intelligence collection at a major sports event, the systems would capture a great deal of noise, news signals, and perhaps announcements in the stadium. If, however, an anti-terrorist organization believed that a small group would be trying to coordinate their efforts, using short-range unlicensed radios, at the event, SIGINT targeting of radios of that type would be reasonable. Targeting would not know where in the stadium the radios might be located, or the exact frequency they are using; those are the functions of subsequent steps such as signal detection and direction finding. Once the decision to target is made, the various interception points need to cooperate, since resources are limited. Knowing what interception equipment to use becomes easier when a target country buys its radars and radios from known manufacturers, or is given them as military aid. National intelligence services keep libraries of devices manufactured by their own country and others, and then use a variety of techniques to learn what equipment is acquired by a given country. Knowledge of physics and electronic engineering further narrows the problem of what types of equipment might be in use. An intelligence aircraft flying well outside the borders of another country will listen for long-range search radars, not short-range fire control radars that would be used by a mobile air defense. Soldiers scouting the front lines of another army know that the other side will be using radios that must be portable and not have huge antennas. Signal detection Even if a signal is human communications (e.g., a radio), the intelligence collection specialists have to know it exists. If the targeting function described above learns that a country has a radar that operates in a certain frequency range, the first step is to use a sensitive receiver, with one or more antennas that listen in every direction, to find an area where such a radar is operating. Once the radar is known to be in the area, the next step is to find its location. If operators know the probable frequencies of transmissions of interest, they may use a set of receivers, preset to the frequencies of interest. These are the frequency (horizontal axis) versus power (vertical axis) produced at the transmitter, before any filtering of signals that do not add to the information being transmitted. Received energy on a particular frequency may start a recorder, and alert a human to listen to the signals if they are intelligible (i.e., COMINT). If the frequency is not known, the operators may look for power on primary or sideband frequencies using a spectrum analyzer. Information from the spectrum analyzer is then used to tune receivers to signals of interest. For example, in this simplified spectrum, the actual information is at 800 kHz and 1.2 MHz. Real-world transmitters and receivers usually are directional. In the figure to the left, assume that each display is connected to a spectrum analyzer connected to a directional antenna aimed in the indicated direction. Countermeasures to interception Spread-spectrum communications is an electronic counter-countermeasures (ECCM) technique to defeat looking for particular frequencies. Spectrum analysis can be used in a different ECCM way to identify frequencies not being jammed or not in use. Direction-finding The earliest, and still common, means of direction finding is to use directional antennas as goniometers, so that a line can be drawn from the receiver through the position of the signal of interest. (See HF/DF.) Knowing the compass bearing, from a single point, to the transmitter does not locate it. Where the bearings from multiple points, using goniometry, are plotted on a map, the transmitter will be located at the point where the bearings intersect. This is the simplest case; a target may try to confuse listeners by having multiple transmitters, giving the same signal from different locations, switching on and off in a pattern known to their user but apparently random to the listener. Individual directional antennas have to be manually or automatically turned to find the signal direction, which may be too slow when the signal is of short duration. One alternative is the Wullenweber array technique. In this method, several concentric rings of antenna elements simultaneously receive the signal, so that the best bearing will ideally be clearly on a single antenna or a small set. Wullenweber arrays for high-frequency signals are enormous, referred to as "elephant cages" by their users. An alternative to tunable directional antennas, or large omnidirectional arrays such as the Wullenweber, is to measure the time of arrival of the signal at multiple points, using GPS or a similar method to have precise time synchronization. Receivers can be on ground stations, ships, aircraft, or satellites, giving great flexibility. Modern anti-radiation missiles can home in on and attack transmitters; military antennas are rarely a safe distance from the user of the transmitter. Traffic analysis When locations are known, usage patterns may emerge, from which inferences may be drawn. Traffic analysis is the discipline of drawing patterns from information flow among a set of senders and receivers, whether those senders and receivers are designated by location determined through direction finding, by addressee and sender identifications in the message, or even MASINT techniques for "fingerprinting" transmitters or operators. Message content, other than the sender and receiver, is not necessary to do traffic analysis, although more information can be helpful. For example, if a certain type of radio is known to be used only by tank units, even if the position is not precisely determined by direction finding, it may be assumed that a tank unit is in the general area of the signal. The owner of the transmitter can assume someone is listening, so might set up tank radios in an area where he wants the other side to believe he has actual tanks. As part of Operation Quicksilver, part of the deception plan for the invasion of Europe at the Battle of Normandy, radio transmissions simulated the headquarters and subordinate units of the fictitious First United States Army Group (FUSAG), commanded by George S. Patton, to make the German defense think that the main invasion was to come at another location. In like manner, fake radio transmissions from Japanese aircraft carriers, before the Battle of Pearl Harbor, were made from Japanese local waters, while the attacking ships moved under strict radio silence. Traffic analysis need not focus on human communications. For example, if the sequence of a radar signal, followed by an exchange of targeting data and a confirmation, followed by observation of artillery fire, this may identify an automated counterbattery system. A radio signal that triggers navigational beacons could be a landing aid system for an airstrip or helicopter pad that is intended to be low-profile. Patterns do emerge. Knowing a radio signal, with certain characteristics, originating from a fixed headquarters may be strongly suggestive that a particular unit will soon move out of its regular base. The contents of the message need not be known to infer the movement. There is an art as well as science of traffic analysis. Expert analysts develop a sense for what is real and what is deceptive. Harry Kidder, for example, was one of the star cryptanalysts of World War II, a star hidden behind the secret curtain of SIGINT. Electronic order of battle Generating an electronic order of battle (EOB) requires identifying SIGINT emitters in an area of interest, determining their geographic location or range of mobility, characterizing their signals, and, where possible, determining their role in the broader organizational order of battle. EOB covers both COMINT and ELINT. The Defense Intelligence Agency maintains an EOB by location. The Joint Spectrum Center (JSC) of the Defense Information Systems Agency supplements this location database with five more technical databases: FRRS: Frequency Resource Record System BEI: Background Environment Information SCS: Spectrum Certification System EC/S: Equipment Characteristics/Space TACDB: platform lists, sorted by nomenclature, which contain links to the C-E equipment complement of each platform, with links to the parametric data for each piece of equipment, military unit lists and their subordinate units with equipment used by each unit. For example, several voice transmitters might be identified as the command net (i.e., top commander and direct reports) in a tank battalion or tank-heavy task force. Another set of transmitters might identify the logistic net for that same unit. An inventory of ELINT sources might identify the medium- and long-range counter-artillery radars in a given area. Signals intelligence units will identify changes in the EOB, which might indicate enemy unit movement, changes in command relationships, and increases or decreases in capability. Using the COMINT gathering method enables the intelligence officer to produce an electronic order of battle by traffic analysis and content analysis among several enemy units. For example, if the following messages were intercepted: U1 to U2, requesting permission to proceed to checkpoint X. U2 to | receivers, preset to the frequencies of interest. These are the frequency (horizontal axis) versus power (vertical axis) produced at the transmitter, before any filtering of signals that do not add to the information being transmitted. Received energy on a particular frequency may start a recorder, and alert a human to listen to the signals if they are intelligible (i.e., COMINT). If the frequency is not known, the operators may look for power on primary or sideband frequencies using a spectrum analyzer. Information from the spectrum analyzer is then used to tune receivers to signals of interest. For example, in this simplified spectrum, the actual information is at 800 kHz and 1.2 MHz. Real-world transmitters and receivers usually are directional. In the figure to the left, assume that each display is connected to a spectrum analyzer connected to a directional antenna aimed in the indicated direction. Countermeasures to interception Spread-spectrum communications is an electronic counter-countermeasures (ECCM) technique to defeat looking for particular frequencies. Spectrum analysis can be used in a different ECCM way to identify frequencies not being jammed or not in use. Direction-finding The earliest, and still common, means of direction finding is to use directional antennas as goniometers, so that a line can be drawn from the receiver through the position of the signal of interest. (See HF/DF.) Knowing the compass bearing, from a single point, to the transmitter does not locate it. Where the bearings from multiple points, using goniometry, are plotted on a map, the transmitter will be located at the point where the bearings intersect. This is the simplest case; a target may try to confuse listeners by having multiple transmitters, giving the same signal from different locations, switching on and off in a pattern known to their user but apparently random to the listener. Individual directional antennas have to be manually or automatically turned to find the signal direction, which may be too slow when the signal is of short duration. One alternative is the Wullenweber array technique. In this method, several concentric rings of antenna elements simultaneously receive the signal, so that the best bearing will ideally be clearly on a single antenna or a small set. Wullenweber arrays for high-frequency signals are enormous, referred to as "elephant cages" by their users. An alternative to tunable directional antennas, or large omnidirectional arrays such as the Wullenweber, is to measure the time of arrival of the signal at multiple points, using GPS or a similar method to have precise time synchronization. Receivers can be on ground stations, ships, aircraft, or satellites, giving great flexibility. Modern anti-radiation missiles can home in on and attack transmitters; military antennas are rarely a safe distance from the user of the transmitter. Traffic analysis When locations are known, usage patterns may emerge, from which inferences may be drawn. Traffic analysis is the discipline of drawing patterns from information flow among a set of senders and receivers, whether those senders and receivers are designated by location determined through direction finding, by addressee and sender identifications in the message, or even MASINT techniques for "fingerprinting" transmitters or operators. Message content, other than the sender and receiver, is not necessary to do traffic analysis, although more information can be helpful. For example, if a certain type of radio is known to be used only by tank units, even if the position is not precisely determined by direction finding, it may be assumed that a tank unit is in the general area of the signal. The owner of the transmitter can assume someone is listening, so might set up tank radios in an area where he wants the other side to believe he has actual tanks. As part of Operation Quicksilver, part of the deception plan for the invasion of Europe at the Battle of Normandy, radio transmissions simulated the headquarters and subordinate units of the fictitious First United States Army Group (FUSAG), commanded by George S. Patton, to make the German defense think that the main invasion was to come at another location. In like manner, fake radio transmissions from Japanese aircraft carriers, before the Battle of Pearl Harbor, were made from Japanese local waters, while the attacking ships moved under strict radio silence. Traffic analysis need not focus on human communications. For example, if the sequence of a radar signal, followed by an exchange of targeting data and a confirmation, followed by observation of artillery fire, this may identify an automated counterbattery system. A radio signal that triggers navigational beacons could be a landing aid system for an airstrip or helicopter pad that is intended to be low-profile. Patterns do emerge. Knowing a radio signal, with certain characteristics, originating from a fixed headquarters may be strongly suggestive that a particular unit will soon move out of its regular base. The contents of the message need not be known to infer the movement. There is an art as well as science of traffic analysis. Expert analysts develop a sense for what is real and what is deceptive. Harry Kidder, for example, was one of the star cryptanalysts of World War II, a star hidden behind the secret curtain of SIGINT. Electronic order of battle Generating an electronic order of battle (EOB) requires identifying SIGINT emitters in an area of interest, determining their geographic location or range of mobility, characterizing their signals, and, where possible, determining their role in the broader organizational order of battle. EOB covers both COMINT and ELINT. The Defense Intelligence Agency maintains an EOB by location. The Joint Spectrum Center (JSC) of the Defense Information Systems Agency supplements this location database with five more technical databases: FRRS: Frequency Resource Record System BEI: Background Environment Information SCS: Spectrum Certification System EC/S: Equipment Characteristics/Space TACDB: platform lists, sorted by nomenclature, which contain links to the C-E equipment complement of each platform, with links to the parametric data for each piece of equipment, military unit lists and their subordinate units with equipment used by each unit. For example, several voice transmitters might be identified as the command net (i.e., top commander and direct reports) in a tank battalion or tank-heavy task force. Another set of transmitters might identify the logistic net for that same unit. An inventory of ELINT sources might identify the medium- and long-range counter-artillery radars in a given area. Signals intelligence units will identify changes in the EOB, which might indicate enemy unit movement, changes in command relationships, and increases or decreases in capability. Using the COMINT gathering method enables the intelligence officer to produce an electronic order of battle by traffic analysis and content analysis among several enemy units. For example, if the following messages were intercepted: U1 to U2, requesting permission to proceed to checkpoint X. U2 to U1, approved. please report at arrival. (20 minutes later) U1 to U2, all vehicles have arrived to checkpoint X. This sequence shows that there are two units in the battlefield, unit 1 is mobile, while unit 2 is in a higher hierarchical level, perhaps a command post. One can also understand that unit 1 moved from one point to another which are distant from each 20 minutes with a vehicle. If these are regular reports over a period of time, they might reveal a patrol pattern. Direction-finding and radio frequency MASINT could help confirm that the traffic is not deception. The EOB buildup process is divided as following: Signal separation Measurements optimization Data Fusion Networks build-up Separation of the intercepted spectrum and the signals intercepted from each sensor must take place in an extremely small period of time, in order to separate the different signals to different transmitters in the battlefield. The complexity of the separation process depends on the complexity of the transmission methods (e.g., hopping or time-division multiple access (TDMA)). By gathering and clustering data from each sensor, the measurements of the direction of signals can be optimized and get much more accurate than the basic measurements of a standard direction finding sensor. By calculating larger samples of the sensor's output data in near real-time, together with historical information of signals, better results are achieved. Data fusion correlates data samples from different frequencies from the same sensor, "same" being confirmed by direction finding or radiofrequency MASINT. If an emitter is mobile, direction finding, other than discovering a repetitive pattern of movement, is of limited value in determining if a sensor is unique. MASINT then becomes more informative, as individual transmitters and antennas may have unique side lobes, unintentional radiation, pulse timing, etc. Network build-up, or analysis of emitters (communication transmitters) in a target region over a sufficient period of time, enables creation of the communications flows of a battlefield. Communications intelligence COMINT (communications intelligence) is a sub-category of signals intelligence that engages in dealing with messages or voice information derived from the interception of foreign communications. COMINT is commonly referred to as SIGINT, which can cause confusion when talking about the broader intelligence disciplines. The US Joint Chiefs of Staff defines it as "Technical information and intelligence derived from foreign communications by other than the intended recipients". COMINT, which is defined to be communications among people, will reveal some or all of the following: Who is transmitting Where they are located, and, if the transmitter is moving, the report may give a plot of the signal against location If known, the organizational function of the transmitter The time and duration of transmission, and the schedule if it is a periodic transmission The frequencies and other technical characteristics of their transmission If the transmission is encrypted or not, and if it can be decrypted. If it is possible to intercept either an originally transmitted cleartext or obtain it through cryptanalysis, the language of the communication and a translation (when needed). The addresses, if the signal is not a general broadcast and if addresses are retrievable from the message. These stations may also be COMINT (e.g., a confirmation of the message or a response message), ELINT (e.g., a navigation beacon being activated) or both. Rather than, or in addition to, an address or other identifier, there may be information on the location and signal characteristics of the responder. Voice interception A basic COMINT technique is to listen for voice communications, usually over radio but possibly "leaking" from telephones or from wiretaps. If the voice communications are encrypted, traffic analysis may still give information. In the Second World War, for security the United States used Native American volunteer communicators known as code talkers, who used languages such as Navajo, Comanche and Choctaw, which would be understood by few people, even in the U.S. Even within these uncommon languages, the code talkers used specialized codes, so a "butterfly" might be a specific Japanese aircraft. British forces made limited use of Welsh speakers for the same reason. While modern electronic encryption does away with the need for armies to use obscure languages, it is likely that some groups might use rare dialects that few outside their ethnic group would understand. Text interception Morse code interception was once very important, but Morse code telegraphy is now obsolete in the western world, although possibly used by special operations forces. Such forces, however, now have portable cryptographic equipment. Specialists scan radio frequencies for character sequences (e.g., electronic mail) and fax. Signaling channel interception A given digital communications link can carry thousands or millions of voice communications, especially in developed countries. Without addressing the legality of such actions, the problem of identifying which channel contains which conversation becomes much simpler when the first thing intercepted is the signaling channel that carries information to set up telephone calls. In civilian and many military use, this channel will carry messages in Signaling System 7 protocols. Retrospective analysis of telephone calls can be made from Call detail record (CDR) used for billing the calls. Monitoring friendly communications More a part of communications security than true intelligence collection, SIGINT units still may have the responsibility of monitoring one's own communications or other electronic emissions, to avoid providing intelligence to the enemy. For example, a security monitor may hear an individual transmitting inappropriate information over an unencrypted radio network, or simply one that is not authorized for the type of information being given. If immediately calling attention to the violation would not create an even greater security risk, the monitor will call out one of the BEADWINDOW codes used by Australia, Canada, New Zealand, the United Kingdom, the United States, and other nations working under their procedures. Standard BEADWINDOW codes (e.g., "BEADWINDOW 2") include: Position: (e.g., disclosing, in an insecure or inappropriate way), "Friendly or enemy position, movement or intended movement, position, course, speed, altitude or destination or any air, sea or ground element, unit or force." Capabilities: "Friendly or enemy capabilities or limitations. Force compositions or significant casualties to special equipment, weapons systems, sensors, units or personnel. Percentages of fuel or ammunition remaining." Operations: "Friendly or enemy operation – intentions progress, or results. Operational or logistic intentions; mission participants flying programmes; mission situation reports; results of friendly or enemy operations; assault objectives." Electronic warfare (EW): "Friendly or enemy electronic warfare (EW) or emanations control (EMCON) intentions, progress, or results. Intention to employ electronic countermeasures (ECM); results of friendly or enemy ECM; ECM objectives; results of friendly or enemy electronic counter-countermeasures (ECCM); results of electronic support measures/tactical SIGINT (ESM); present or intended EMCON policy; equipment affected by EMCON policy." Friendly or enemy key personnel: "Movement or identity of friendly or enemy officers, visitors, commanders; movement of key maintenance personnel indicating equipment limitations." Communications security (COMSEC): "Friendly or enemy COMSEC breaches. Linkage of codes or codewords with plain language; compromise of changing frequencies or linkage with line number/circuit designators; linkage of changing |
Encoding similar information in a semantic web page might look like this: <item rdf:about="https://example.org/semantic-web/">Semantic Web</item> Tim Berners-Lee calls the resulting network of Linked Data the Giant Global Graph, in contrast to the HTML-based World Wide Web. Berners-Lee posits that if the past was document sharing, the future is data sharing. His answer to the question of "how" provides three points of instruction. One, a URL should point to the data. Two, anyone accessing the URL should get data back. Three, relationships in the data should point to additional URLs with data. Tags and identifiers Tags, including hierarchical categories and tags that are collaboratively added and maintained (e.g. with folksonomies) can be considered part of, of potential use to or a step towards the semantic Web vision. Unique identifiers, including hierarchical categories and collaboratively added ones, analysis tools (e.g. scite.ai algorithms) and metadata, including tags, can be used to create forms of semantic webs – webs that are to a certain degree semantic. In particular, such has been used for structuring scientific research i.a. by research topics and scientific fields by the projects OpenAlex, Wikidata and Scholia which are under development and provide APIs, Web-pages, feeds and graphs for various semantic queries. Web 3.0 Semantic Web Tim Berners-Lee has described the Semantic Web as a component of Web 3.0. "Semantic Web" is sometimes used as a synonym for "Web 3.0", though the definition of each term varies. Challenges Some of the challenges for the Semantic Web include vastness, vagueness, uncertainty, inconsistency, and deceit. Automated reasoning systems will have to deal with all of these issues in order to deliver on the promise of the Semantic Web. Vastness: The World Wide Web contains many billions of pages. The SNOMED CT medical terminology ontology alone contains 370,000 class names, and existing technology has not yet been able to eliminate all semantically duplicated terms. Any automated reasoning system will have to deal with truly huge inputs. Vagueness: These are imprecise concepts like "young" or "tall". This arises from the vagueness of user queries, of concepts represented by content providers, of matching query terms to provider terms and of trying to combine different knowledge bases with overlapping but subtly different concepts. Fuzzy logic is the most common technique for dealing with vagueness. Uncertainty: These are precise concepts with uncertain values. For example, a patient might present a set of symptoms that correspond to a number of different distinct diagnoses each with a different probability. Probabilistic reasoning techniques are generally employed to address uncertainty. Inconsistency: These are logical contradictions that will inevitably arise during the development of large ontologies, and when ontologies from separate sources are combined. Deductive reasoning fails catastrophically when faced with inconsistency, because "anything follows from a contradiction". Defeasible reasoning and paraconsistent reasoning are two techniques that can be employed to deal with inconsistency. Deceit: This is when the producer of the information is intentionally misleading the consumer of the information. Cryptography techniques are currently utilized to alleviate this threat. By providing a means to determine the information's integrity, including that which relates to the identity of the entity that produced or published the information, however credibility issues still have to be addressed in cases of potential deceit. This list of challenges is illustrative rather than exhaustive, and it focuses on the challenges to the "unifying logic" and "proof" layers of the Semantic Web. The World Wide Web Consortium (W3C) Incubator Group for Uncertainty Reasoning for the World Wide Web (URW3-XG) final report lumps these problems together under the single heading of "uncertainty". Many of the techniques mentioned here will require extensions to the Web Ontology Language (OWL) for example to annotate conditional probabilities. This is an area of active research. Standards Standardization for Semantic Web in the context of Web 3.0 is under the care of W3C. Components The term "Semantic Web" is often used more specifically to refer to the formats and technologies that enable it. The collection, structuring and recovery of linked data are enabled by technologies that provide a formal description of concepts, terms, and relationships within a given knowledge domain. These technologies are specified as W3C standards and include: Resource Description Framework (RDF), a general method for describing information RDF Schema (RDFS) Simple Knowledge Organization System (SKOS) SPARQL, an RDF query language Notation3 (N3), designed with human readability in mind N-Triples, a format for storing and transmitting data Turtle (Terse RDF Triple Language) Web Ontology Language (OWL), a family of knowledge representation languages Rule Interchange Format (RIF), a framework of web rule language dialects supporting rule interchange on the Web JavaScript Object Notation for Linked Data (JSON-LD), a JSON-based method to describe data ActivityPub, a generic way for client and server to communicate with each other. This is used by the popular decentralized social network Mastodon. The Semantic Web Stack illustrates the architecture of the Semantic Web. The functions and relationships of the components can be summarized as follows: XML provides an elemental syntax for content structure within documents, yet associates no semantics with the meaning of the content contained within. XML is not at present a necessary component of Semantic Web technologies in most cases, as alternative syntaxes exist, such as Turtle. Turtle is a de-facto standard, but has not been through a formal standardization process. XML Schema is a language for providing and restricting the structure and content of elements contained within XML documents. RDF is a simple language for expressing data models, which refer to objects ("web resources") and their relationships. An RDF-based model can be represented in a variety of syntaxes, e.g., RDF/XML, N3, Turtle, and RDFa. RDF is a fundamental standard of the Semantic Web. RDF Schema extends RDF and is a vocabulary for describing properties and classes of RDF-based resources, with semantics for generalized-hierarchies of such properties and classes. OWL adds more vocabulary for describing properties and classes: among others, relations between classes (e.g. disjointness), cardinality (e.g. "exactly one"), equality, richer typing of properties, characteristics of properties (e.g. symmetry), and enumerated classes. SPARQL is a protocol and query language for semantic web data sources. RIF is the W3C Rule Interchange Format. It's an XML language for expressing Web rules that computers can execute. RIF provides multiple versions, called dialects. It includes a RIF Basic Logic Dialect (RIF-BLD) and RIF Production Rules Dialect (RIF PRD). Current state of standardization Well-established standards: RDF RDFS Rule Interchange Format (RIF) SPARQL Unicode Uniform Resource Identifier Web Ontology Language (OWL) XML Not yet fully realized: Unifying Logic and Proof layers Semantic Web Rule Language (SWRL) Applications The intent is to enhance the usability and usefulness of the Web and its interconnected resources by creating semantic web services, such as: Servers that expose existing data systems using the RDF and SPARQL standards. Many converters to RDF exist from different applications. Relational databases are an important source. The semantic web server attaches to the existing system without affecting its operation. Documents "marked up" with semantic information (an extension of the HTML tags used in today's Web pages to supply information for Web search engines using web crawlers). This could be machine-understandable information about the human-understandable content of the document (such as the creator, title, description, etc.) or it could be purely metadata representing a set of facts (such as resources and services elsewhere on the site). Note that anything that can be identified with a Uniform Resource Identifier (URI) can be described, so the semantic web can reason about animals, people, places, ideas, etc. There are four semantic annotation formats that can be used in HTML documents; Microformat, RDFa, Microdata and JSON-LD. Semantic markup is often generated automatically, rather than manually. Common metadata vocabularies (ontologies) and maps between vocabularies that allow document creators to know how to mark up their documents so that agents can use the information in the supplied metadata (so that Author in the sense of 'the Author of the page' won't be confused with Author in the sense of a book that is the subject of a book review). Automated agents to perform tasks for users of the semantic web using this data. Semantic translation Web-based services (often with agents of their own) to supply information specifically to agents, for example, a Trust service that an agent could ask if some online store has a history of poor service or spamming. Such services could be useful to public search engines, or could be used for knowledge management within an organization. Business applications include: Facilitating the integration of information from mixed sources Dissolving ambiguities in corporate terminology Improving information retrieval thereby reducing information overload and increasing the refinement and precision of the data retrieved Identifying relevant information with respect to a given domain Providing decision making support In a corporation, there is a closed group of users and the management is able to enforce company guidelines like the adoption of specific ontologies and use of semantic annotation. Compared to the public Semantic Web there are lesser requirements on scalability and the information circulating within a company can be more trusted in general; privacy is less of an issue outside of handling of customer data. Skeptical reactions Practical feasibility Critics question the basic feasibility of a complete or even partial fulfillment of the Semantic Web, pointing out both difficulties in setting it up and a lack of general-purpose usefulness that prevents the required effort from being invested. In a 2003 paper, Marshall and Shipman point out the cognitive overhead inherent in formalizing knowledge, compared to the authoring of traditional web hypertext: According to Marshall and Shipman, the tacit and changing nature of much knowledge adds to the knowledge engineering problem, and limits the Semantic Web's applicability to specific domains. A further issue that they point out are domain- or organization-specific ways to express knowledge, which must be solved through community agreement rather than only technical means. As it turns out, specialized communities and organizations for intra-company projects have tended to adopt semantic web technologies greater than peripheral and less-specialized communities. The practical constraints toward adoption have appeared less challenging where domain and scope is more limited than that of the general public and the World-Wide Web. Finally, Marshall and Shipman see pragmatic problems in the idea of (Knowledge Navigator-style) intelligent agents working in the largely manually curated Semantic Web: Cory Doctorow's critique ("metacrap") is from the perspective of human behavior and personal preferences. For example, people may include spurious | of the World Wide Web Consortium ("W3C"), which oversees the development of proposed Semantic Web standards. He defines the Semantic Web as "a web of data that can be processed directly and indirectly by machines". Many of the technologies proposed by the W3C already existed before they were positioned under the W3C umbrella. These are used in various contexts, particularly those dealing with information that encompasses a limited and defined domain, and where sharing data is a common necessity, such as scientific research or data exchange among businesses. In addition, other technologies with similar goals have emerged, such as microformats. Limitations of HTML Many files on a typical computer can also be loosely divided into human-readable documents and machine-readable data. Documents like mail messages, reports, and brochures are read by humans. Data, such as calendars, address books, playlists, and spreadsheets are presented using an application program that lets them be viewed, searched, and combined. Currently, the World Wide Web is based mainly on documents written in Hypertext Markup Language (HTML), a markup convention that is used for coding a body of text interspersed with multimedia objects such as images and interactive forms. Metadata tags provide a method by which computers can categorize the content of web pages. In the examples below, the field names "keywords", "description" and "author" are assigned values such as "computing", and "cheap widgets for sale" and "John Doe". <meta name="keywords" content="computing, computer studies, computer" /> <meta name="description" content="Cheap widgets for sale" /> <meta name="author" content="John Doe" /> Because of this metadata tagging and categorization, other computer systems that want to access and share this data can easily identify the relevant values. With HTML and a tool to render it (perhaps web browser software, perhaps another user agent), one can create and present a page that lists items for sale. The HTML of this catalog page can make simple, document-level assertions such as "this document's title is 'Widget Superstore, but there is no capability within the HTML itself to assert unambiguously that, for example, item number X586172 is an Acme Gizmo with a retail price of €199, or that it is a consumer product. Rather, HTML can only say that the span of text "X586172" is something that should be positioned near "Acme Gizmo" and "€199", etc. There is no way to say "this is a catalog" or even to establish that "Acme Gizmo" is a kind of title or that "€199" is a price. There is also no way to express that these pieces of information are bound together in describing a discrete item, distinct from other items perhaps listed on the page. Semantic HTML refers to the traditional HTML practice of markup following intention, rather than specifying layout details directly. For example, the use of denoting "emphasis" rather than , which specifies italics. Layout details are left up to the browser, in combination with Cascading Style Sheets. But this practice falls short of specifying the semantics of objects such as items for sale or prices. Microformats extend HTML syntax to create machine-readable semantic markup about objects including people, organizations, events and products. Similar initiatives include RDFa, Microdata and Schema.org. Semantic Web solutions The Semantic Web takes the solution further. It involves publishing in languages specifically designed for data: Resource Description Framework (RDF), Web Ontology Language (OWL), and Extensible Markup Language (XML). HTML describes documents and the links between them. RDF, OWL, and XML, by contrast, can describe arbitrary things such as people, meetings, or airplane parts. These technologies are combined in order to provide descriptions that supplement or replace the content of Web documents. Thus, content may manifest itself as descriptive data stored in Web-accessible databases, or as markup within documents (particularly, in Extensible HTML (XHTML) interspersed with XML, or, more often, purely in XML, with layout or rendering cues stored separately). The machine-readable descriptions enable content managers to add meaning to the content, i.e., to describe the structure of the knowledge we have about that content. In this way, a machine can process knowledge itself, instead of text, using processes similar to human deductive reasoning and inference, thereby obtaining more meaningful results and helping computers to perform automated information gathering and research. An example of a tag that would be used in a non-semantic web page: <item>blog</item> Encoding similar information in a semantic web page might look like this: <item rdf:about="https://example.org/semantic-web/">Semantic Web</item> Tim Berners-Lee calls the resulting network of Linked Data the Giant Global Graph, in contrast to the HTML-based World Wide Web. Berners-Lee posits that if the past was document sharing, the future is data sharing. His answer to the question of "how" provides three points of instruction. One, a URL should point to the data. Two, anyone accessing the URL should get data back. Three, relationships in the data should point to additional URLs with data. Tags and identifiers Tags, including hierarchical categories and tags that are collaboratively added and maintained (e.g. with folksonomies) can be considered part of, of potential use to or a step towards the semantic Web vision. Unique identifiers, including hierarchical categories and collaboratively added ones, analysis tools (e.g. scite.ai algorithms) and metadata, including tags, can be used to create forms of semantic webs – webs that are to a certain degree semantic. In particular, such has been used for structuring scientific research i.a. by research topics and scientific fields by the projects OpenAlex, Wikidata and Scholia which are under development and provide APIs, Web-pages, feeds and graphs for various semantic queries. Web 3.0 Semantic Web Tim Berners-Lee has described the Semantic Web as a component of Web 3.0. "Semantic Web" is sometimes used as a synonym for "Web 3.0", though the definition of each term varies. Challenges Some of the challenges for the Semantic Web include vastness, vagueness, uncertainty, inconsistency, and deceit. Automated reasoning systems will have to deal with all of these issues in order to deliver on the promise of the Semantic Web. Vastness: The World Wide Web contains many billions of pages. The SNOMED CT medical terminology ontology alone contains 370,000 class names, and existing technology has not yet been able to eliminate all semantically duplicated terms. Any automated reasoning system will have to deal with truly huge inputs. Vagueness: These are imprecise concepts like "young" or "tall". This arises from the vagueness of user queries, of concepts represented by content providers, of matching query terms to provider terms and of trying to combine different knowledge bases with overlapping but subtly different concepts. Fuzzy logic is the most common technique for dealing with vagueness. Uncertainty: These are precise concepts with uncertain values. For example, a patient might present a set of symptoms that correspond to a number of different distinct diagnoses each with a different probability. Probabilistic reasoning techniques are generally employed to address uncertainty. Inconsistency: These are logical contradictions that will inevitably arise during the development of large ontologies, and when ontologies from separate sources are combined. Deductive reasoning fails catastrophically when faced with inconsistency, because "anything follows from a contradiction". Defeasible reasoning and paraconsistent reasoning are two techniques that can be employed to deal with inconsistency. Deceit: This is when the producer of the information is intentionally misleading the consumer of the information. Cryptography techniques are currently utilized to alleviate this threat. By providing a means to determine the information's integrity, including that which relates to the identity of the entity that produced or |
most controversial submarine incidents during the Cold War on Friday 3 October 1986. The 15-year-old vessel, which was on an otherwise routine Cold War nuclear deterrence patrol in the North Atlantic northeast of Bermuda, suffered an explosion and fire in a missile tube. While underway submerged the seal in a missile hatch cover failed, allowing high-pressure seawater to enter the missile tube and owing to the pressure differential rupture the missile fuel tanks, allowing missile's liquid fuel to mix and ultimately combust. Though there was no official announcement, the Soviet Union claimed the leak was caused by a collision with the submarine . Although the Augusta was operating within the area, both the United States Navy and the commander of K-219, Captain Second Rank Igor Britanov, deny that a collision took place. The incident was novelized in the book Hostile Waters, which reconstructed the incident from descriptions by the survivors, ships' logs, the official investigations, and participants both ashore and afloat from the Soviet and the American sides. Explosion Shortly after 0530 Moscow time, seawater leaking into silo six of K-219 reacted with missile fuel, producing chlorine and nitrogen dioxide gases and sufficient heat to explosively decompose additional fuming nitric acid to produce more nitrogen dioxide gas. K-219 weapons officer Alexander Petrachkov attempted to deal with this by disengaging the hatch cover and venting the missile tube to the sea. Shortly after 0532, an explosion occurred in silo six. K-219 had previously experienced a similar casualty; one of her missile tubes was already disabled and welded shut, having been permanently sealed after an explosion caused by reaction between seawater leaking into the silo and missile fuel residue. An article in Undersea warfare by Captain First Rank, Igor Kurdin, Russian Navy – K-219s previous XO (executive officer) – and Lieutenant Commander Wayne Grasdock, USN described the explosion occurrence as follows: Two sailors were killed outright in the explosion, | additional fuming nitric acid to produce more nitrogen dioxide gas. K-219 weapons officer Alexander Petrachkov attempted to deal with this by disengaging the hatch cover and venting the missile tube to the sea. Shortly after 0532, an explosion occurred in silo six. K-219 had previously experienced a similar casualty; one of her missile tubes was already disabled and welded shut, having been permanently sealed after an explosion caused by reaction between seawater leaking into the silo and missile fuel residue. An article in Undersea warfare by Captain First Rank, Igor Kurdin, Russian Navy – K-219s previous XO (executive officer) – and Lieutenant Commander Wayne Grasdock, USN described the explosion occurrence as follows: Two sailors were killed outright in the explosion, and a third died soon afterward from toxic gas poisoning. Through a breach in the hull, the vessel immediately started taking on sea water, quickly sinking from its original depth of to eventually reach a depth in excess of . Sealing of all of the compartments and full engagement of the sea water pumps in the stricken compartments enabled the depth to be stabilised. Up to 25 sailors were trapped in a sealed section, and it was only after a conference with his incident specialists that the Captain allowed the Chief Engineer to open the hatch and save the 25 lives. It could be seen from instruments that although the nuclear reactor should have automatically been shut down, it was not. Lt. Nikolai Belikov, one of the reactor control officers, entered the reactor compartment but ran out of oxygen after turning just one of the four rod assemblies on the first reactor. Twenty-year-old enlisted seaman Sergei Preminin then volunteered to shut down the reactor by following the instructions of the Chief Engineer. Working with a full-face gas mask, he successfully shut down the reactor. A large fire had developed within the compartment, raising the pressure. When Preminin tried to reach his comrades on the other side of a door, the pressure difference prevented him from opening it, and he subsequently died of asphyxiation in the reactor compartment.For his actions, Sergei Preminin was posthumously awarded the title Hero of the Russian Federation. In a nuclear safe condition, and with sufficient stability to allow it to surface, Captain Britanov surfaced K-219 on battery power alone. He was then ordered to have the ship towed by a Soviet freighter back to her home port of Gadzhiyevo, away. Although a towline was attached, towing attempts were unsuccessful, and after subsequent poison gas leaks into the final aft compartments and against orders, Britanov ordered the crew to evacuate onto the towing ship, but remained aboard K-219 himself. Displeased with Britanov's inability to repair his submarine and continue his patrol, Moscow ordered Valery Pshenichny, K-219 security officer, to assume command, transfer the surviving crew back to the submarine, and return to duty. Before those orders could be carried out the flooding reached a point beyond recovery and on 6 October 1986 the K-219 sank to the bottom of the Hatteras Abyssal Plain at a depth of about 6,000 m (18,000 ft). Britanov abandoned ship shortly before the sinking. K-219 full complement of nuclear weapons was lost along with the vessel. Aftermath Preminin was posthumously awarded the Order of the Red Star for his bravery in securing the reactors. Britanov was charged with negligence, sabotage, and treason. He was never imprisoned, |
nuclear weapons on board on April 12, 1970. A fire on April 8 had disabled the submarine and it was being towed in rough seas. Fifty-two crewmen were killed attempting the salvage of the boat when it sank. Accidents 1960 loss of coolant On 13 October 1960, while operating in the Barents Sea, K-8 suffered a ruptured steam generator tube, causing a loss-of-coolant accident. While the crew jury-rigged a system to supply emergency cooling water to the reactor, preventing a reactor core meltdown, large amounts of radioactive gas leaked out which contaminated the entire vessel. The gas radiation levels could not be determined because instrumentation could not measure such large scales. Three of the crew suffered visible radiation injuries, and many crewmen were exposed to doses of up to 1.8–2 Sv (180–200 rem). 1970 Bay of Biscay fire During the large-scale "Ocean-70" naval exercise, K-8 suffered fires in two compartments simultaneously on 8 April 1970. Due to short circuits that took place in III and VII compartments simultaneously at a depth of , a fire spread through the air-conditioning system. Both nuclear reactors were shut down. The captain ordered his entire crew to abandon ship but was countermanded once a towing vessel arrived. Fifty-two crewmen, including the commander, Captain 2nd Rank Vsevolod Bessonov, re-boarded the | well as the spread of the fire as soon as it was detected. All hands on board died due to carbon monoxide poisoning and the flooding of the surfaced submarine during 80 hours of damage control in stormy conditions. Seventy-three crewmen survived. K-8 sank with four nuclear torpedoes out of total 24 on board to a depth of approximately northwest of Spain. See also List of military nuclear accidents List of sunken nuclear submarines References The Bellona Foundation (http://bellona.no) Further reading 1959 ships 1970 in the Soviet Union Cold War submarines of the Soviet Union Lost submarines of the Soviet Union Maritime incidents in 1960 Maritime incidents in 1970 Maritime incidents in Spain Maritime incidents in the Soviet Union November-class submarines Nuclear submarines of the Soviet Navy Ships built in the Soviet Union Shipwrecks in the Bay |
Krasichkov and Captain 3rd class Vladimir Yenin, who had received doses of radiation that were otherwise considered deadly. For reasons of secrecy, the official diagnosis was not "radiation sickness" but "astheno-vegetative syndrome", a mental disorder. Crew members decorated On 6 August 1961, 26 members of the crew were decorated for courage and valor shown during the accident. Later operational history On 14 December 1961, the boat was fully upgraded to the Hotel II (658м) variant, which included upgrading to R-21 missiles, which had twice the effective range of the earlier missiles. Collision At 07:13 on 15 November 1969, K-19 collided with the attack submarine in the Barents Sea at a depth of . It was able to surface using an emergency main ballast tank blow. The impact completely destroyed the bow sonar systems and mangled the covers of the forward torpedo tubes. K-19 was able to return to port where it was repaired and returned to the fleet. Gato was relatively undamaged and continued her patrol. Fires On 24 February 1972, a fire broke out while the submarine was at a depth of , some from Newfoundland, Canada. The boat surfaced and the crew was evacuated to surface warships except for 12 men trapped in the aft torpedo room. Towing was delayed by a gale, and rescuers could not reach the aft torpedo room because of conditions in the engine room. The fire killed 28 sailors aboard K-19 and two others who died after they were transferred to rescue ships. Investigators determined that the fire was caused by a hydraulic fluid leak onto a hot filter. The rescue operation lasted more than 40 days and involved over 30 ships. From 15 June through 5 November 1972, K-19 was repaired and put back into service. On 15 November 1972, another fire broke out in compartment 6, but it was put out by the chemical fire-extinguisher system and there were no casualties. Reclassification On 25 July 1977, K-19 was reclassified in the Large Submarine class, and on 26 July 1979, she was reclassified as a communications submarine and given the symbol KS-19 (КС-19). On 15 August 1982, an electrical short circuit resulted in severe burns to two sailors; one, V. A. Kravchuk, died five days later. On 28 November 1985, the ship was upgraded to the 658s (658с) variant. Decommissioning On 19 April 1990 the submarine was decommissioned, and was transferred in 1994 to the naval repair yard at Polyarny. In March 2002, it was towed to the Nerpa Shipyard, Snezhnogorsk, Murmansk, to be scrapped. In 2006, a section of K-19 was purchased by Vladimir Romanov, who once served on the submarine as a conscript, with the intention of "Turning it into a Moscow-based meeting place to build links between submarine veterans from Russia and other countries." So far, the plans remain on hold, and many of K-19s survivors have objected to them. Theatre and film In 1969 writer Vasily Aksyonov wrote a play about the nuclear incident. The movie K-19: The Widowmaker (2002), starring Harrison Ford and Liam Neeson, is based on the story of the K-19s first disaster. The original crew of the submarine were allowed to read the script and had complaints, which led to several changes in the script. The production company attempted in March 2002 to secure access to the boat as a set for its production, but the Russian Navy declined. The nickname "The Widowmaker" referred to by the movie was fictional. The submarine did not gain a nickname until the nuclear accident on 4 July 1961, when it | loaded, an electrician was crushed to death by a missile-tube cover, and an engineer fell between two compartments and died. Gains unlucky reputation The boat was launched and named on 8 April 1959. Breaking with tradition, a man (Captain 3rd Rank V. V. Panov of the 5th Urgent Unit) instead of a woman, was chosen to smash the ceremonial champagne bottle across the ship's stern. The bottle failed to break, instead sliding along the propellers and bouncing off the rubber-coated hull. This is traditionally viewed among sea crews as a sign that the ship is unlucky. Captain 1st Rank Nikolai Vladimirovich Zateyev was the first commander of the submarine. Vasily Arkhipov was the executive officer of the new Hotel-class ballistic missile submarine K-19. Early problems In January 1960, confusion among the crew during a watch change led to improper operation of the reactor and a reactor-control rod was bent. The damage required the reactor to be dismantled for repairs. The officers on duty were removed and Captain Panov was demoted. The submarine's ensign was hoisted for the first time on 12 July 1960. It underwent sea trials from 13 through 17 July 1960 and again from 12 August through 8 November 1960, travelling . The ship was considered completed on 12 November 1960. After surfacing from a full-power run, the crew discovered that most of the hull's rubber coating had detached, and the entire surface of the boat had to be re-coated. During a test dive to the maximum depth of , flooding was reported in the reactor compartment, and Captain Zateyev ordered the submarine to immediately surface, where it heeled over on its port side due to the water it had taken on. It was later determined that during construction the workers had failed to replace a gasket. In October 1960, the galley crew disposed of wood from equipment crates through the galley's waste system, clogging it. This led to flooding of the ninth compartment, which filled one third full of water. In December 1960, a loss of coolant was caused by failure of the main circuit pump. Specialists called from Severodvinsk managed to repair it at sea within a week. The boat was commissioned on 30 April 1961. The submarine had a total of 139 men aboard, including missile men, reactor officers, torpedo men, doctors, cooks, stewards, and several observing officers who were not part of the standard crew. Nuclear accident On 4 July 1961, under the command of Captain First Rank Nikolai Vladimirovich Zateyev, K-19 was conducting exercises in the North Atlantic off the south-east coast of Greenland. At 04:15 local time the pressure in the starboard nuclear reactor's cooling system dropped to zero. The reactor department crew found a major leak in the reactor coolant system, causing the coolant pumps to fail. The boat could not contact Moscow and request assistance because a separate accident had damaged the long-range radio system. The control rods were automatically inserted by the emergency SCRAM system, but the reactor temperature rose uncontrollably. Decay heat from fission products produced during normal operation eventually heated the reactor to . Making a drastic decision, Zateyev ordered the engineering section to fabricate a new coolant system by cutting off an air vent valve and welding a water-supply pipe to it. This required men to work in high radiation for extended periods. The jury-rigged cooling water system successfully reduced the temperature in the reactor. The accident released radioactive steam containing fission products that were drawn into the ship's ventilation system and spread to other compartments of the ship. The entire crew was irradiated as was most of the ship and some of the ballistic missiles on board. All seven members of the engineering crew and their divisional officer died of radiation exposure within the next month. Fifteen more sailors died within the next two years. Instead of continuing on the mission's planned route, the captain decided to head south to meet diesel-powered submarines expected to be there. Worries about a potential crew mutiny prompted Zateyev to have all small arms thrown overboard except for five pistols distributed to his most trusted officers. A diesel submarine, , picked up K-19s low-power distress transmissions and joined up with it. American warships nearby had also heard the transmission and offered to help, but Zateyev, afraid of giving away Soviet military secrets to the West, refused and sailed to meet S-270. He evacuated the crew and had the boat towed to its home base. Over the next two years, repair crews removed and replaced the damaged reactors. The repair process contaminated the nearby environment, in a zone within , and the repair crew. The Soviet Navy dumped the original radioactive compartment into the |
Minor, forced Seleucus to flee from Babylon, but, supported by Ptolemy, the Satrap of Egypt, Seleucus returned in 312 BC. Seleucus' later conquests included Persia and Media. He formed an alliance with the Indian King Chandragupta Maurya (reigned 324-297 BC). Seleucus defeated Antigonus in the Battle of Ipsus in 301 BC and Lysimachus (King of Thrace, Macedon and Asia Minor) in the battle of Corupedium (near Sardis) in 281 BC. Ptolemy Ceraunus assassinated Seleucus later in the same year. Seleucus' eldest son Antiochus I succeeded him as ruler of the Seleucid territories. Seleucid rulers Family tree See also List of kings | an officer of Alexander the Great, commanding the élite infantry corps in the Macedonian army: the "Shield-bearers" (Hypaspistai), later known as the "Silvershields" (Ἀργυράσπιδες / Argyraspides). After the death of Alexander in 323 BC, the Partition of Triparadisus assigned Seleucus as satrap of Babylon in 321 BC. Antigonus, the satrap of much of Asia Minor, forced Seleucus to flee from Babylon, but, supported by Ptolemy, the Satrap of Egypt, Seleucus returned in 312 BC. Seleucus' later conquests included Persia and Media. He formed an alliance with the Indian King Chandragupta Maurya (reigned 324-297 BC). Seleucus defeated Antigonus in |
its broadcast, which was seen by 24.43 million people. Combined, the game received a market share of 79 and reached 51.18 million viewers. All known broadcast tapes of the game in its entirety were subsequently wiped by both NBC and CBS to save costs, a common practice in the TV industry at the time as videotapes were very expensive (one half-hour tape cost around $300 at the time, equivalent to $2260 in 2019 dollars), plus it was not foreseen how big the game was going to become. This has prevented studies comparing each network's respective telecast. For many years, only two small samples of the telecasts were known to have survived, showing Max McGee's opening touchdown and Jim Taylor's touchdown run. Both were shown in 1991 on HBO's Play by Play: A History of Sports Television and on the Super Bowl XXV pregame show. In January 2011, a partial recording of the CBS telecast was reported to have been found in a Pennsylvania attic and restored by the Paley Center for Media in New York. The two-inch color videotape is the most complete version of the broadcast yet discovered, missing only the halftime show and most of the third quarter. The NFL owns the broadcast copyright and has blocked its sale or distribution. After remaining anonymous and communicating with the media only through his lawyer since the recording's discovery, the owner of the recording, Troy Haupt, came forward to The New York Times in 2016 to tell his side of the story. NFL Films had a camera crew present, and retains a substantial amount of film footage in its archives, some of which have been released in its film productions. One such presentation was the NFL's Greatest Games episode about this Super Bowl, entitled The Spectacle of a Sport (also the title of the Super BowlI highlight film). On January 11, 2016, the NFL announced that "in an exhaustive process that took months to complete, NFL Films searched its enormous archives of footage and were able to locate all 145 plays from Super BowlI from more than a couple of dozen disparate sources. Once all the plays were located, NFL Films was able to put the plays in order and stitch them together while fully restoring, re-mastering, and color-correcting the footage. Finally, audio from the NBC Sports radio broadcast featuring announcers Jim Simpson and George Ratterman was layered on top of the footage to complete the broadcast. The final result represents the only known video footage of the entire action from Super BowlI." It then announced that NFL Network would broadcast the newly pieced together footage in its entirety on January 15, 2016–the 49th anniversary of the contest. This footage was nearly all on film with the exception of several player introductions and a post-game locker room chat between Pat Summerall and Pete Rozelle. Ceremonies and entertainment The Los Angeles Ramettes, majorettes who had performed at all Rams home games, entertained during pregame festivities and after each quarter. Also during the pregame, the University of Arizona band created a physical outline of the continental United States at the center of the field, with the famed Anaheim High School drill team placing banners of each NFL and AFL team at each team's geographical location. The postgame trophy presentation ceremony was handled by CBS' Pat Summerall and NBC's George Ratterman. Summerall and Ratterman were forced to share a single microphone. Halftime show The halftime show was produced by Tommy Walker, and featured trumpeter Al Hirt, the marching bands from the University of Arizona and Grambling State University, the Ana-Hi-Steppers (more information below), 300 pigeons, 10,000 balloons and a flying demonstration by the hydrogen-peroxide-propelled Bell Rocket Air Men. In addition, the halftime featured a local high school drill team, the Ana-Hi-Steppers from Anaheim High School. The team joined the two university marching bands to form an outline of a United States map. Their transportation to and from the game was by school bus. This team was chosen due to their connection to Tommy Walker, who's children attended Anaheim High School. He had seen the Ana-Hi-Steppers perform and chose them over nationally famous drill teams since he only three weeks to cast and produce the show. Game summary Balls from both leagues were used – when the Chiefs were on offense, the official AFL football (Spalding J5V) was used, and when the Packers were on offense, the official NFL ball (Wilson's "The Duke") was used. Even the officiating crew was a combination of AFL and NFL referees, with the NFL's Norm Schachter as the head referee. First quarter The teams traded punts on their first possessions, then the Packers jumped to an early 7–0 lead, driving 80 yards in six plays. The drive was highlighted by Starr's passes, to Marv Fleming for 11, to Elijah Pitts for 22 yards on a scramble, and to Carroll Dale for 12 yards. On the last play, Bart Starr threw a pass to reserve receiver Max McGee, who had replaced re-injured starter Boyd Dowler earlier in the drive. (Dowler had injured his shoulder two weeks prior after scoring a third-quarter touchdown; Cowboys defensive back Mike Gaechter had upended him several steps after scoring and he landed awkwardly.) McGee slipped past Chiefs cornerback Willie Mitchell, made a one-handed catch at the 23-yard line, and then took off for a 37-yard touchdown reception (McGee had also caught a touchdown pass after replacing an injured Dowler in the NFL championship game). On their ensuing drive, the Chiefs moved the ball to Green Bay's 33-yard line, but kicker Mike Mercer missed a 40-yard field goal. Second quarter Early in the second quarter, Kansas City drove 66 yards in six plays, featuring a 31-yard reception by the receiver Otis Taylor, to tie the game on a seven-yard pass to Curtis McClinton from quarterback Len Dawson. But the Packers responded on their next drive, advancing 73 yards down the field and scoring on fullback Jim Taylor's 14-yard touchdown run with the team's famed Packers sweep play. Taylor's touchdown run was the first in Super Bowl history. This drive was again highlighted by Starr's key passes. He hit McGee for 10 yards on third and five; Dale for 15 on third and ten; Fleming for 11 on third and five; and Pitts for 10 yards on third and seven to set up Taylor's TD run on the next play. Dawson was sacked for an eight-yard loss on the first play of the Chiefs' next drive, but he followed it up with four consecutive completions for 58 yards, including a 27-yarder to Chris Burford. This set up Mercer's 31-yard field goal to make the score 14–10 at the end of the half. At halftime, the Chiefs appeared to have a chance to win. Many people watching the game were surprised how close the score was and how well the AFL's champions were playing. Kansas City outgained Green Bay in total yards, 181–164, and had 11 first downs compared to the Packers' nine. The Chiefs were exuberant at halftime. Hank Stram said later, "I honestly thought we would come back and win it." The Packers were disappointed with the quality of their play in the first half. "The coach was concerned", said defensive end Willie Davis later. Lombardi told them the game plan was sound, but that they had to tweak some things and execute better. Third quarter On their first drive of the second half, the Chiefs advanced to their 49-yard line. But on a third-down pass play, a heavy blitz by linebackers Dave Robinson and Lee Roy Caffey collapsed the Chief's pocket. Robinson, tackle Henry Jordan, and Packer right end Lionel Aldridge converged on Dawson who threw weakly toward tight end Fred Arbanas. The wobbly pass was intercepted by Willie Wood. Wood raced 50 yards to Kansas City's five-yard line where Mike Garrett dragged him down from behind. This was "the biggest play of the game," wrote Starr later. On their first play after the turnover, running back Elijah Pitts scored on a five-yard touchdown run off left tackle to give the Packers a 21–10 lead. Stram agreed that it was the critical point of the game. The Packer's defense then dominated the Chief's offense for the rest of the game, allowing them to cross midfield only once, and for just one play. The Chiefs were forced to deviate from their game plan, and that hurt them. The Kansas City offense totaled only 12 yards in the third quarter, and Dawson was held to five of 12 second-half pass completions for 59 yards. Meanwhile, Green Bay forced Kansas City to punt from their two-yard line after sacking Dawson twice and got the ball back with good field position on their 44-yard line (despite a clipping penalty on the punt return). McGee subsequently caught three passes for 40 yards on a 56-yard drive. Taylor ran for one first down, Starr hit McGee for 16 yards on third-and-11, and a third-down sweep with Taylor carrying gained eight yards and a first down at the Kansas City 13. The drive ended with Starr's 13-yard touchdown toss to McGee on a post pattern. Fourth quarter Midway through the fourth quarter, Starr completed a 25-yard pass to Carroll Dale and a 37-yard strike to McGee, moving the ball to the Chiefs 18-yard line. Four plays later, Pitts scored his second touchdown on a one-yard run to close out the scoring, giving the Packers the 35–10 win. Also in the fourth quarter, Fred Williamson, who had boasted about his "hammer" before the game, was knocked out when his head collided with running back Donny Anderson's knee, and then suffered a broken arm when Chiefs linebacker Sherrill Headrick fell on him. Williamson had three tackles for the game. Hornung was the only Packer to not see any action. Lombardi had asked him in the fourth quarter if he wanted to go in, but Hornung declined, not wanting to aggravate a pinched nerve in his neck. McGee, who caught only four passes for 91 yards and one touchdown during the season, finished Super BowlI with seven receptions for 138 yards and two touchdowns. After the game was over, a reporter asked Vince Lombardi if he thought Kansas City was a good team. Lombardi responded that though the Chiefs were an excellent, well-coached club, he thought several NFL teams such as Dallas were better. Box score Final statistics Sources: NFL.com Super Bowl I, Super Bowl Play Finder GB, Super Bowl Play Finder KC Statistical comparison Note: According to NBC Radio announcer Jim Simpson's report at halftime of the game, Kansas City led 11–9 in first downs at halftime, 181–164 in total yards, and 142–113 in passing yards (Green Bay led 51–39 in rushing yards). Bart Starr completed eight of 13 with no interceptions, while Len Dawson was 11 of 15 with no interceptions. Green Bay led 14–10 at halftime. Green Bay had the ball five times, although only for a minute or so on the last possession; they punted on their first possession, scored a touchdown on their second, punted on their third, scored a touchdown on their fourth, and had the ball when the half ended on their fifth. Kansas City had the ball four times – punting on their first possession, driving to a missed field goal on their second possession, scoring a touchdown on their third, and kicking a field goal on their fourth. This means, in the second half, Green Bay led 12–6 in first downs, 197–58 in total yards, 115–25 in passing yards, and 82–33 in rushing yards (the Packers won the second half, 21–0). Starr and his late-game replacement, Zeke Bratkowski, were eight for 11 with one interception; Dawson and his late-game replacement, Pete Beathard, were just six for 17, also with one interception. Each team had the ball seven times in the second half, although Green Bay's first possession was just one play and their seventh possession was abbreviated because the game ended. Green Bay scored a touchdown on their first (one play) possession, punted on their second, scored a touchdown on their third, was intercepted at KC's 15-yard line on their fourth (just Starr's fourth interception of the year), scored a touchdown on their fifth, punted on their sixth, and had the ball when the game ended on their seventh possession. Kansas City was intercepted on their first possession – Wood's return to the five set up Pitts' touchdown which made the score 21–10 – and then punted on each of their next six possessions. Individual leaders 1Completions/attempts 2Carries 3Long gain 4Receptions 5Times targeted Records established Because this was the first Super Bowl, a new record was set in every category. All categories are listed in the 2016 NFL Fact book. The following records were set in Super BowlI, according to the official NFL.com boxscore and the Pro-Football-Reference.com game summary. Some records have to meet NFL minimum number of attempts to be recognized. The minimums are shown (in parenthesis). † This category includes rushing, receiving, interception returns, punt returns, kickoff returns, and fumble returns. ‡ Sacks an official statistic since Super Bowl XVII by the NFL. Sacks are listed as "Tackled Attempting to Pass" in the official NFL box score | Dowler, one to (Carroll) Dale should be enough." The two teams played with their respective footballs from each league; the Chiefs used the AFL ball, the slightly narrower and longer J5V by Spalding, and the Packers played with the NFL ball, "The Duke" by Wilson. The AFL's two-point conversion rule was not in force; the NFL added the two-point conversion in and it was first used in the Super Bowl that same season, Super Bowl XXIX in January 1995. This is also the only Super Bowl to feature the off set-style goalposts and where the numeric yard markers were five yards apart, rather than 10 as is customary today. Beginning in 1972, marking yard lines ending in "5" became disallowed under a rule designed to standardize field markings. Justin Peters of Slate watched all the Super Bowls over a two-month period in 2015 before Super Bowl 50. He mentioned the first Super Bowl's having "two dudes in rocket packs who flew around the stadium. I can forgive a lot of bad football as long as the game features two dudes in honest-to-God rocket packs." Weather The temperature was mild with clear skies. Media coverage Television This game is the only Super Bowl to have been broadcast in the United States by two television networks simultaneously (no other NFL game was subsequently carried nationally on more than one network until December 29, 2007, when the New England Patriots faced the New York Giants on NBC, CBS, and the NFL Network). At the time, NBC held the rights to nationally televise AFL games while CBS had the rights to broadcast NFL games. Both networks were allowed to cover the game. During the week, tensions flared between the staff of the two networks (longtime arch-rivals in American broadcasting), who each wanted to win the rating war, to the point where a fence was built between the CBS and NBC trucks. Each network used its own announcers: Ray Scott (doing play-by-play for the first half), Jack Whitaker (doing play-by-play for the second half) and Frank Gifford provided commentary on CBS, while Curt Gowdy and Paul Christman were on NBC. While Rozelle allowed NBC to telecast the game, he decreed it would not be able to use its cameramen and technical personnel, instead forcing it to use the feed provided by CBS, since the Coliseum was home to the NFL's Rams. Super BowlI was the only Super Bowl that was not a sellout, despite the TV blackout in Los Angeles (at the time, the local blackout was required even at a neutral site and even if the stadium did sell out), shutting out the vast Los Angeles market and network-owned stations KNXT (Channel 2, CBS; now KCBS-TV) and KNBC (Channel 4, NBC). Of the 94,000-seat capacity in the Coliseum, 33,000 went unsold. Days before the game, local newspapers printed editorials about what they viewed as a then-exorbitant $12 ($92.18 in 2019 money) price for tickets, and wrote stories about how viewers could pull in the game from stations in surrounding markets such as Bakersfield, Santa Barbara and San Diego. This is the only Super Bowl that Curt Gowdy called for NBC where the NFL or NFC team won (the AFL/AFC teams won the others, even though the Baltimore Colts and Pittsburgh Steelers were part of the old NFL before moving to the AFC following the AFL-NFL merger). CBS received a 22.6 rating and a market share of 43 for its broadcast, which was seen by 26.75 million people. NBC received an 18.5 rating and a market share of 36 for its broadcast, which was seen by 24.43 million people. Combined, the game received a market share of 79 and reached 51.18 million viewers. All known broadcast tapes of the game in its entirety were subsequently wiped by both NBC and CBS to save costs, a common practice in the TV industry at the time as videotapes were very expensive (one half-hour tape cost around $300 at the time, equivalent to $2260 in 2019 dollars), plus it was not foreseen how big the game was going to become. This has prevented studies comparing each network's respective telecast. For many years, only two small samples of the telecasts were known to have survived, showing Max McGee's opening touchdown and Jim Taylor's touchdown run. Both were shown in 1991 on HBO's Play by Play: A History of Sports Television and on the Super Bowl XXV pregame show. In January 2011, a partial recording of the CBS telecast was reported to have been found in a Pennsylvania attic and restored by the Paley Center for Media in New York. The two-inch color videotape is the most complete version of the broadcast yet discovered, missing only the halftime show and most of the third quarter. The NFL owns the broadcast copyright and has blocked its sale or distribution. After remaining anonymous and communicating with the media only through his lawyer since the recording's discovery, the owner of the recording, Troy Haupt, came forward to The New York Times in 2016 to tell his side of the story. NFL Films had a camera crew present, and retains a substantial amount of film footage in its archives, some of which have been released in its film productions. One such presentation was the NFL's Greatest Games episode about this Super Bowl, entitled The Spectacle of a Sport (also the title of the Super BowlI highlight film). On January 11, 2016, the NFL announced that "in an exhaustive process that took months to complete, NFL Films searched its enormous archives of footage and were able to locate all 145 plays from Super BowlI from more than a couple of dozen disparate sources. Once all the plays were located, NFL Films was able to put the plays in order and stitch them together while fully restoring, re-mastering, and color-correcting the footage. Finally, audio from the NBC Sports radio broadcast featuring announcers Jim Simpson and George Ratterman was layered on top of the footage to complete the broadcast. The final result represents the only known video footage of the entire action from Super BowlI." It then announced that NFL Network would broadcast the newly pieced together footage in its entirety on January 15, 2016–the 49th anniversary of the contest. This footage was nearly all on film with the exception of several player introductions and a post-game locker room chat between Pat Summerall and Pete Rozelle. Ceremonies and entertainment The Los Angeles Ramettes, majorettes who had performed at all Rams home games, entertained during pregame festivities and after each quarter. Also during the pregame, the University of Arizona band created a physical outline of the continental United States at the center of the field, with the famed Anaheim High School drill team placing banners of each NFL and AFL team at each team's geographical location. The postgame trophy presentation ceremony was handled by CBS' Pat Summerall and NBC's George Ratterman. Summerall and Ratterman were forced to share a single microphone. Halftime show The halftime show was produced by Tommy Walker, and featured trumpeter Al Hirt, the marching bands from the University of Arizona and Grambling State University, the Ana-Hi-Steppers (more information below), 300 pigeons, 10,000 balloons and a flying demonstration by the hydrogen-peroxide-propelled Bell Rocket Air Men. In addition, the halftime featured a local high school drill team, the Ana-Hi-Steppers from Anaheim High School. The team joined the two university marching bands to form an outline of a United States map. Their transportation to and from the game was by school bus. This team was chosen due to their connection to Tommy Walker, who's children attended Anaheim High School. He had seen the Ana-Hi-Steppers perform and chose them over nationally famous drill teams since he only three weeks to cast and produce the show. Game summary Balls from both leagues were used – when the Chiefs were on offense, the official AFL football (Spalding J5V) was used, and when the Packers were on offense, the official NFL ball (Wilson's "The Duke") was used. Even the officiating crew was a combination of AFL and NFL referees, with the NFL's Norm Schachter as the head referee. First quarter The teams traded punts on their first possessions, then the Packers jumped to an early 7–0 lead, driving 80 yards in six plays. The drive was highlighted by Starr's passes, to Marv Fleming for 11, to Elijah Pitts for 22 yards on a scramble, and to Carroll Dale for 12 yards. On the last play, Bart Starr threw a pass to reserve receiver Max McGee, who had replaced re-injured starter Boyd Dowler earlier in the drive. (Dowler had injured his shoulder two weeks prior after scoring a third-quarter touchdown; Cowboys defensive back Mike Gaechter had upended him several steps after scoring and he landed awkwardly.) McGee slipped past Chiefs cornerback Willie Mitchell, made a one-handed catch at the 23-yard line, and then took off for a 37-yard touchdown reception (McGee had also caught a touchdown pass after replacing an injured Dowler in the NFL championship game). On their ensuing drive, the Chiefs moved the ball to Green Bay's 33-yard line, but kicker Mike Mercer missed a 40-yard field goal. Second quarter Early in the second quarter, Kansas City drove 66 yards in six plays, featuring a 31-yard reception by the receiver Otis Taylor, to tie the game on a seven-yard pass to Curtis McClinton from quarterback Len Dawson. But the Packers responded on their next drive, advancing 73 yards down the field and scoring on fullback Jim Taylor's 14-yard touchdown run with the team's famed Packers sweep play. Taylor's touchdown run was the first in Super Bowl history. This drive was again highlighted by Starr's key passes. He hit McGee for 10 yards on third and five; Dale for 15 on third and ten; Fleming for 11 on third and five; and Pitts for 10 yards on third and seven to set up Taylor's TD run on the next play. Dawson was sacked for an eight-yard loss on the first play of the Chiefs' next drive, but he followed it up with four consecutive completions for 58 yards, including a 27-yarder to Chris Burford. This set up Mercer's 31-yard field goal to make the score 14–10 at the end of the half. At halftime, the Chiefs appeared to have a chance to win. Many people watching the game were surprised how close the score was and how well the AFL's champions were playing. Kansas City outgained Green Bay in total yards, 181–164, and had 11 first downs compared to the Packers' nine. The Chiefs were exuberant at halftime. Hank Stram said later, "I honestly thought we would come back and win it." The Packers were disappointed with the quality of their play in the first half. "The coach was concerned", said defensive end Willie Davis later. Lombardi told them the game plan was sound, but that they had to tweak some things and execute better. Third quarter On their first drive of the second half, the Chiefs advanced to their 49-yard line. But on a third-down pass play, a heavy blitz by linebackers Dave Robinson and Lee Roy Caffey collapsed the Chief's pocket. Robinson, tackle Henry Jordan, and Packer right end Lionel Aldridge converged on Dawson who threw weakly toward tight end Fred Arbanas. The wobbly pass was intercepted by Willie Wood. Wood raced 50 yards to Kansas City's five-yard line where Mike Garrett dragged him down from behind. This was |
League (AFL) champion Oakland Raiders by the score of 33–14. This game and Super Bowl III are the only two Super Bowl games to be played in back-to-back years in the same stadium. Coming into the game, much like during the first Super Bowl, many sports writers and fans believed that any team in the NFL was vastly superior to any club in the AFL. The Packers, the defending champions, posted a 9–4–1 record during the 1967 NFL season before defeating the Dallas Cowboys, 21–17, in the 1967 NFL Championship Game (also popularly known as the Ice Bowl). The Raiders finished the 1967 AFL season at 13–1, and defeated the Houston Oilers, 40–7, in the 1967 AFL Championship Game. As expected, Green Bay dominated Oakland throughout the majority of Super Bowl II. The Raiders could only score two touchdown passes from quarterback Daryle Lamonica. Meanwhile, Packers kicker Don Chandler made four field goals, including three in the first half, while defensive back Herb Adderley had a 60-yard interception return for a touchdown that put the game away. Green Bay quarterback Bart Starr was named the MVP for the second straight time, becoming the first back-to-back Super Bowl MVP for his 13 of 24 passes for 202 yards and one touchdown. Background The game was awarded to Miami on May 25, 1967, at the owners meetings held in New York City. Green Bay Packers The Packers advanced to their second straight AFL-NFL World Championship Game, but had a much more difficult time than in the previous season. Both of their starting running backs from the previous year, future Pro Football Hall of Famers Paul Hornung and Jim Taylor, had left the team. Their replacements, Elijah Pitts and Jim Grabowski, both went down with season-ending injuries, forcing Green Bay coach Vince Lombardi to use second-year reserve running back Donny Anderson and rookie Travis Williams. Fullbacks Chuck Mercein and Ben Wilson, who were signed as free agents after being discarded by many other teams, were also used to help compensate for the loss of Hornung and Taylor. Meanwhile, the team's 33-year-old veteran quarterback Bart Starr had missed 4 games during the season with injuries, and finished the season with nearly twice as many interceptions (17) as touchdown passes (9). The team's deep threat was provided by veteran receivers Carroll Dale, who recorded 35 receptions for 738 yards (a 21.1 average), and 5 touchdowns; and Pro Bowler Boyd Dowler, who had 54 catches for 846 yards and 4 touchdowns. The Packers still had the superb blocking of linemen Jerry Kramer, Fred Thurston and Forrest Gregg. On special teams, Williams returned 18 kickoffs for 749 yards and an NFL record 4 touchdowns, giving him a whopping 41.1 yards per return average. But overall the team ranked just 9th out of 16 NFL teams in scoring with 332 points. The Packers defense, however, allowed only 209 points, the 3rd best in the NFL. Even this figure was misleading, since Green Bay had yielded only 131 points in the first 11 games (when they clinched their division), the lowest total in professional football. Three members of Green Bay's secondary, the strongest aspect of their defense, were named to the Pro Bowl: defensive backs Willie Wood, Herb Adderley, and Bob Jeter. The Packers also had a superb defensive line led by Henry Jordan and Willie Davis. Behind them, the Packers linebacking core was led by Ray Nitschke. The Packers won the NFL's Central Division with a 9–4–1 regular season record, clinching the division in the 11th week of the season. During the last three weeks, the Packers gave up an uncharacteristic total of 78 points, after having yielded only about a dozen points per game in their first 11 contests. In the playoffs, Green Bay returned to its dominant form, blowing away their first playoff opponent, the Los Angeles Rams, in the Western Conference Championship Game, 28–7. The next week, Green Bay then came from behind to defeat the Dallas Cowboys in the NFL championship game for the second year in a row, in one of the most famous games in NFL lore: The Ice Bowl. Oakland Raiders The Raiders, led by head coach John Rauch, had stormed to the top of the AFL with a 13–1 regular season record (their only defeat was an October 7 loss to the New York Jets, 27–14), and went on to crush the Houston Oilers, 40–7, in the AFL Championship game. They had led all AFL and NFL teams in scoring with 468 points. And starting quarterback Daryle Lamonica had thrown for 3,228 yards and an AFL-best 30 touchdown passes. The offensive line was anchored by center Jim Otto and rookie guard Gene Upshaw, along with AFL All-Stars Harry Schuh and Wayne Hawkins. Wide receiver Fred Biletnikoff led the team with 40 receptions for 876 yards, an average of 21.3 yards per catch. On the other side of the field, tight end Billy Cannon caught 32 passes for 629 yards and scored 10 touchdowns. In the backfield, the Raiders had three running backs, Clem Daniels, Hewritt Dixon, and Pete Banaszak, who carried the ball equally and combined for 1,510 yards and 10 touchdowns. On special teams, defensive back Rodger Bird led the AFL with 612 punt return yards and added another 148 yards returning kickoffs. The main strength of the Raiders was their defense, nicknamed "The 11 Angry Men". The defensive line was anchored by AFL All-Stars Tom Keating and Ben Davidson, a former Packer who played on Green Bay's 1961 championship team. Davidson was an extremely effective pass rusher who had demonstrated his aggressiveness in a regular season game against the New York Jets by breaking the jaw of Jets quarterback Joe Namath while sacking him. Behind them, All AFL linebacker Dan Conners excelled at blitzing and pass coverage, recording 3 interceptions. The Raiders also had two All AFL defensive backs: Willie Brown, who led the team with 7 interceptions, and Kent McCloughan, who had 2 interceptions. Safety Warren Powers recorded 6 interceptions, returning them for 154 yards and 2 touchdowns. Super Bowl pregame news and notes Despite Oakland's accomplishments, and expert consensus that this was the weakest of all the Packer NFL championship teams, Green Bay was a 14-point favorite to win the Super Bowl. Like the previous year, most fans and sports writers believed that the top NFL teams were superior to the best AFL teams. Thus, most of the drama and discussions surrounding the game focused not on which team would win, but on the rumors that Lombardi might retire from coaching after the game. The game also proved to be the final one for Packers wide receiver Max McGee, one of the heroes of Super Bowl I, and place kicker Don Chandler. This was the first Super Bowl to use the Y-shaped goalposts (with one supporting post instead of two) invented by Jim Trimble and Joel Rottman; they had made their debut at the start of the season for both the AFL and NFL, and first appeared at the pro level in Canada. Media coverage Television The game was televised in the United States by CBS, with Ray Scott handling the play-by-play duties and color commentators Pat Summerall and Jack Kemp in the broadcast booth. Kemp was the first Super Bowl commentator who was still an active player (with Buffalo of the AFL) at the time of the broadcast. The CBS telecast of this game is considered lost; all that survives are in-game photos, most of which were shown in the January 8, 1969 edition of Sports Illustrated. Not even NFL Films, the league's official filmmaker, has a copy of the full game available; however, they do have game footage that they used for their game highlight film. Unlike the previous year's game, Super Bowl II was televised live on only one network, which has been the case for all subsequent Super Bowl games. While the Orange Bowl was sold out for the game, the NFL's unconditional blackout rules in place then prevented the live telecast from being shown in the Miami area. During the latter part of the second quarter, and again for three minutes of halftime, almost 80 percent of the country (with the exceptions of New York City, Cleveland, Philadelphia and much of the Northeast) lost the video feed of the CBS broadcast. CBS, who had paid $2.5 million for broadcast rights, blamed the glitch on a breakdown in AT&T cable lines. 39.12 million people in the US watched the game on television, resulting in a rating of 36.8 and a market share of 68. The overnight Arbitron rating was 43. Ceremonies and entertainment The pregame ceremonies featured two giant figures, one dressed as a Packers player and the other dressed as a Raiders player. They appeared on opposite | fullback Ben Wilson running pass routes to the same side as Dowler. Dowler ran a quick post and was wide open down the middle. He grabbed Starr's pass well behind middle linebacker Dan Conners, and right safety Rodger Bird could not get over quickly enough. Dowler outran the defense to score on a 62-yard touchdown reception, increasing the Packer lead to 13–0. After being completely dominated until this point, the Raiders offense finally struck back their next possession, advancing 79 yards in 9 plays, and scoring on a 23-yard touchdown pass from Daryle Lamonica to receiver Bill Miller. The score seemed to fire up the Raiders' defense, and they forced the Packers to punt on their next drive. Raiders returner Rodger Bird gave them great field position with a 12-yard return to Green Bay's 40-yard line, but Oakland could only gain 1 yard with their next 3 plays and came up empty when George Blanda's 47-yard field goal attempt fell short of the goal posts. Oakland's defense again forced Green Bay to punt after 3 plays on the ensuing drive, but this time after calling for a fair catch, Bird fumbled punter Donny Anderson's twisting, left footed kick, and Green Bay's Dick Capp recovered the ball. After 2 incomplete passes, Starr threw a 9-yard completion to Dowler (despite a heavy rush from Ike Lassiter) to set up Chandler's third field goal from the 43 as time expired in the first half, giving the Packers a 16–7 lead. At halftime, Packers guard Jerry Kramer said to his teammates (referring to Lombardi), "Let's play the last 30 minutes for the old man." Third quarter Any chance the Raiders might have had to make a comeback seemed to completely vanish in the second half. The Packers had the ball three times in the third quarter, and held it for all but two and a half minutes. On the Packers second drive of the half starting at their own 17, Ben Wilson ripped up the middle for 14 yards on a draw play. Anderson picked up 8 yards on a sweep, and Wilson carried to within inches of the first down. Starr then pulled one of his favorite plays on third down and short yardage, faking to Wilson and completing a 35-yard pass to wide receiver Max McGee who had slipped past three Raiders at the line of scrimmage. This was McGee's only reception of the game, and the final one of his career. Starr then hit Carroll Dale on a sideline route at the Oakland 13. Starr overthrew Donny Anderson wide open in the end zone, but on the next play he rolled out to the right and threw back to Anderson who was tackled on the two by linebacker Gus Otto. The next play was a broken play, as Anderson thought he saw daylight to the right but ran into Starr. The Packers were not rattled, and the line and fullback Ben Wilson wiped out the Raiders on Anderson's 2-yard touchdown run over right tackle, making the score 23–7. Packer guard Jerry Kramer must have taken to heart his plea to play the second half for Coach Lombardi. On this drive, game films show him blowing Dan Conners out of Wilson's path on the draw play, then flattening Conners again on Anderson's scoring run. Again the Green Bay defense forced Oakland to go three-and-out, and the Raiders punted. The Packers drove from their own 39 to the Raider 24 and increased their lead to 26–7 as Chandler kicked his fourth field goal (which hit the crossbar from 31 yards out and bounced over). Fourth quarter Early in the fourth quarter, Starr was knocked out of the game when he jammed the thumb on his throwing hand on a sack by Davidson. (Starr was replaced by Zeke Bratkowski, who was then sacked on his only pass attempt.) But later in the period, the Packers put the game completely out of reach when defensive back Herb Adderley intercepted a pass intended for Fred Biletnikoff and returned it 60 yards for a touchdown, making the score 33–7. Adderley laid back as the Raider end ran a curl route, then dashed in front of him to snare the ball and scored with the help of a crushing downfield block by tackle Ron Kostelnik. Oakland did manage to score on their next drive after the turnover with a second 23-yard touchdown pass from Lamonica to Miller, set up by Pete Banaszak's 41-yard reception on the previous play. But all the Raiders' second touchdown did was make the final score look remotely more respectable, 33–14. At the end of the game, coach Lombardi was carried off the field by his victorious Packers in one of the more memorable images of early Super Bowl history. It was in fact Lombardi's last game as Packer coach and his ninth consecutive playoff victory. Oakland's Bill Miller was the top receiver of the game with 5 receptions for 84 yards and 2 touchdowns. Green Bay fullback Ben Wilson was the leading rusher of the game with 62 yards despite missing most of the fourth quarter while looking for a lost contact lens on the sidelines. Don Chandler ended his Packer career in style with 4 |
AFL was not comparable to the NFL. Dawson himself had spent five seasons in the NFL as a backup before going to the AFL and becoming one of its top quarterbacks. "The AFL saved my career," said Dawson. In his 8 AFL seasons, he had thrown more touchdown passes (182) than any other professional football quarterback during that time. But because many still viewed the AFL as being inferior to the NFL, his records were not considered significant. Dawson's first chance to prove himself against an NFL team ended in failure, with his Chiefs losing 35–10 to the Green Bay Packers in Super Bowl I, reinforcing the notion that his success was only due to playing in the "inferior league". Offensively, the Chiefs employed innovative formations and strategies designed by Stram to disrupt the timing and positioning of the defense. Besides Dawson, the Chiefs main offensive weapon was running back Mike Garrett (1965 Heisman Trophy winner), who rushed for 732 yards and 6 touchdowns. He also recorded 43 receptions for 432 yards and another 2 touchdowns. Running back Robert Holmes had 612 rushing yards, 266 receiving yards, and 5 touchdowns. Running back Warren McVea rushed for 500 yards and 7 touchdowns, while adding another 318 yards returning kickoffs. In the passing game, wide receiver Otis Taylor caught 41 passes for 696 yards and 7 touchdowns. The offensive line was anchored by AFL All-Stars Ed Budde and Jim Tyrer. According to Len Dawson, placekicker Jan Stenerud and punter Jerrel Wilson were the best kickers in football. The Chiefs defense led the AFL in fewest points allowed (177). Like the Vikings, the Chiefs also had an outstanding defensive line, which was led by defensive tackles Buck Buchanan and Curley Culp, and defensive ends Jerry Mays and Aaron Brown. The Chiefs also had AFL All-Star linebacker Willie Lanier, who recorded 4 interceptions and 1 fumble recovery during the season. The Kansas City secondary was led by defensive backs Emmitt Thomas (9 interceptions for 146 return yards and a touchdown), Jim Kearney (5 interceptions for 154 return yards and a touchdown) and Johnny Robinson (8 interceptions for 158 return yards). Kansas City's defense had shown their talent in the AFL title game when they defeated the Raiders. Raiders quarterback Daryle Lamonica had completed 13 of 17 passes for 276 yards and a record setting 6 touchdowns in a 56–7 divisional rout of the Houston Oilers in their previous game, and had shredded the Chiefs with 347 yards and 5 touchdowns in their 41–6 win in the previous season's playoffs. But in the 1969 AFL Championship Game, the Chiefs defense held him to just 15 of 39 completions and intercepted him 3 times in the fourth quarter. This was the last Super Bowl appearance for the Chiefs, and their last championship, until Super Bowl LIV 50 years later. Playoffs Kansas City advanced to the Super Bowl with wins over the two previous AFL champions. First they defeated the New York Jets in a defensive struggle 13–6, with Dawson's 61-yard completion to Taylor setting up the game winning score on his 19-yard touchdown pass to Gloster Richardson. Kansas City held New York to just 234 yards and forced 4 turnovers. The Chiefs then faced the Raiders, who took a 7–0 lead over them in the first quarter, but this would be their only score of the game. Meanwhile, Dawson's 41-yard completion to Frank Pitts in the second quarter set up a 1-yard touchdown run by Wendell Hayes. Then in the third quarter, Emmitt Thomas' clutch interception in the end zone and Dawson's long completion to Taylor sparked a 95-yard drive that ended with a touchdown run by Robert Holmes. Kansas City went into the fourth quarter with a 14–7 lead, and held on for the win by forcing four turnovers (3 interceptions and a turnover on downs) in the final period. Meanwhile, the ninth-year Vikings recorded their first postseason win in franchise history by defeating the Los Angeles Rams 23–20. Though the Rams held the lead for most of the time in regulation, Kapp led a touchdown drive to give the team a 21–20 fourth quarter lead. Eller made a key play to preserve the lead, sacking Rams quarterback (and 1969 NFL MVP) Roman Gabriel in the end zone for a safety and Alan Page intercepted a pass with thirty seconds remaining. Then Minnesota quickly demolished the Cleveland Browns in the NFL championship game, jumping to a 24–0 halftime lead and going on to win 27–7. The Vikings offense gained 381 yards without turning the ball over, with Kapp passing for 169 yards and a touchdown, while Osborn rushed for 108 yards and Washington gained 125 yards on just 3 receptions. Super Bowl pregame news and notes Many sports writers and fans fully expected that the Vikings would easily defeat the Chiefs. Although the AFL's New York Jets won Super Bowl III at the end of the previous season, many were convinced that it was a fluke. They continued to believe that all of the NFL teams were far and away superior to all of the AFL teams. And regardless of the differences among the leagues, the Vikings simply appeared to be a superior team. Minnesota had the NFL's best record and outscored their opponents by 246 points, while Kansas City had not even won their own division. Super Bowl IV provided another chance to show that Dawson belonged at the same level with all of the great NFL quarterbacks. But five days before the Super Bowl, news leaked that his name had been linked to a Detroit federal gambling investigation. Although Dawson was eventually cleared of any charges, the controversy added to the pressure he was already under while preparing for the game, causing him to lose sleep and concentration. "It was, beyond a doubt, the toughest week of my life," said Dawson. Bud Grant became the first Super Bowl coach not to wear a tie. His counterpart, Hank Stram, wore a three-piece suit, with a red vest and a blazer with the Chiefs' helmet logo emblazoned on the breast pocket. The attendance mark of 80,562 is the highest for the first four pre-merger Super Bowl games played. Media coverage Television Super Bowl IV was broadcast in the United States by CBS with play-by-play announcer Jack Buck and color commentator Pat Summerall, with Frank Gifford and Jack Whitaker reporting from the winning and losing locker rooms, respectively. While the game was sold out at Tulane Stadium, the NFL's unconditional blackout rules in place then prohibited the live telecast from being shown in the New Orleans area. CBS erased the videotape a few days after the game; the same thing they did with Super Bowls I and II, which they broadcast. Videotape was expensive then and networks did not believe old games were worth saving. The only reason this game exists is because the CBC and the French version on Radio-Canada in Canada and in Québec carried the broadcast and because the Vikings were located so close to Canada and had a lot of Canadian and Québec fans (and Bud Grant was a legendary player and coach in the CFL), the CBC decided to save it for their archives. As previously mentioned, as videotape was too expensive in those days to save, they transferred the footage to black & white film (kinescope). This therefore, enabled them to reuse the videotape. 44.27 million people in the US watched the game on television, resulting in a rating of 39.4 and a market share of 69. Hank Stram and NFL Films The night before the game, Ed Sabol of NFL Films met with Hank Stram and convinced Stram to wear a hidden microphone during the game so his comments could be recorded for the NFL Films Super Bowl IV film. They agreed the microphone would be kept secret. This would be the first time that a head coach had worn a microphone during a Super Bowl. This has led to one of the best-known and most popular of the NFL Films Super Bowl films due to the constant chatter and wisecracking of Stram. Ed Sabol had his number one sound man, Jack Newman – who also wired Vince Lombardi in a previous playoff game – place the microphone on Stram. Newman, a multiple Emmy award-winning sound man and cameraman, shot Stram for the entire game as well as monitored the sound to make sure it continued to work. The success and popularity of this first Super Bowl wiring of a winning head coach led to 24 years of Newman continuing to wire players and coaches for NFL Films. Some excerpts of Stram include: To Len Dawson: "C'mon Lenny! Pump it in there, baby! Just keep matriculating the ball down the field, boys!" Observing the confusion in the Vikings' defense: "Kassulke (Vikings strong safety Karl Kassulke) was running around there like it was a Chinese fire drill. They didn't know where Mike (Garrett) was. Didn't know where he was! They look like they're flat as hell." Before the Chiefs' first touchdown, he sent in the play "65 toss power trap." When the Chiefs scored on the play, Stram laughed while yelling to his players on the bench, "Was it there, boys? Was that there, rats? Nice going, baby! Haaa-haaa-haaa-ha-ha-ha! Haaa! The mentor! 65 toss power trap! Yaaa-haaa-haaa-ha-ha! Yaaa-ha-ha! I tell ya that thing was there, yes sir boys! Haa-ha-ha-ha-ha! Wooo!!" As the referees were spotting the ball before a measurement to determine if the Vikings got a first down, Stram yelled to the officials, "Make sure you mark it right! Oh, you lost your place! Measure it, take the chains out there! Oh, they didn't make it! My God, they made that by an inch! He definitely gave them an extra foot. Bad! Very bad!" Another time, the refs overruled what looked like a Minnesota fumble. Stram: "Mr. Official, let me ask you something. How can six of you miss a play like that? Huh? All six of you! When the ball jumped out of there as soon as we made contact?... No. What??" After Frank Pitts gained on the reverse in the third quarter, when the chains were stretched and the Chiefs indeed had the first down, Stram was then heard saying to the refs, "Ya did good, you marked it good. You did a helluva job, nice going!" On Otis Taylor's touchdown reception that clinched the game, Stram is heard yelling and laughing. Game summary Chiefs head coach Hank Stram, who was also the team's offensive coordinator, devised an effective game plan against the Vikings. He knew Minnesota's secondary was able to play very far off receivers because Viking defensive ends Carl Eller and Jim Marshall knocked down short passes or put pressure on the quarterback. Stram decided to double-team Marshall and Eller; most of quarterback Len Dawson's completions would be short passes, and neither Marshall nor Eller knocked down any passes. Stram also concluded that the Vikings' aggressiveness on defense also made them susceptible to trap plays; Mike Garrett's rushing touchdown would come on a trap play. The Vikings' inside running game depended on center Mick Tingelhoff blocking linebackers. Stram put 285-pound Buck Buchanan or 295-pound Curley Culp in front of Tingelhoff, who weighed only 235 pounds. To Minnesota's credit, the NFL used the so-called light "greyhound" centers while the AFL used big centers. It was a mismatch that disrupted the Vikings' running game. Wrote Dawson, "It was obvious that their offense had never seen a defense like ours." Minnesota would rush for only two first downs. First quarter The Vikings began the game by receiving the opening kickoff and marching from their own 20-yard line to the Kansas City 39-yard line with quarterback Joe Kapp completing his first two passes for 36 yards. Kapp's next pass was also a completion but running back Bill Brown was slowed by linebacker Bobby Bell, then brought down by left defensive end Jerry Mays for a yard loss to make it third down, on which Kapp failed to connect with tight end John Beasley. Minnesota rushed for only 6 yards on the drive and chose to punt. The Chiefs then drove 42 yards in eight plays. Included was a 20-yard reception by wide receiver Frank Pitts after Vikings defensive back Ed Sharockman gambled trying to make an interception. Kansas City then scored on placekicker Jan Stenerud's Super Bowl record 48-yard field goal. This record would stand for 24 years until broken by Steve Christie in Super Bowl XXVIII. (According to Dawson, the Vikings were shocked that the Chiefs would attempt a 48-yard field goal. Stenerud was among the first soccer-style placekickers in professional football. The others included brothers Charlie and Pete Gogolak. The soccer-style placekickers used the instep of the foot while the conventional professional football placekickers kicked straight on with their toes. "Stenerud was a major factor," Dawson said.) Minnesota then managed to reach midfield on its next drive, but chose to punt again. On the first play of their ensuing drive, Dawson threw a 20-yard completion to Pitts, followed by a 9-yard pass to wide receiver Otis Taylor. Second quarter Four plays later, | so his comments could be recorded for the NFL Films Super Bowl IV film. They agreed the microphone would be kept secret. This would be the first time that a head coach had worn a microphone during a Super Bowl. This has led to one of the best-known and most popular of the NFL Films Super Bowl films due to the constant chatter and wisecracking of Stram. Ed Sabol had his number one sound man, Jack Newman – who also wired Vince Lombardi in a previous playoff game – place the microphone on Stram. Newman, a multiple Emmy award-winning sound man and cameraman, shot Stram for the entire game as well as monitored the sound to make sure it continued to work. The success and popularity of this first Super Bowl wiring of a winning head coach led to 24 years of Newman continuing to wire players and coaches for NFL Films. Some excerpts of Stram include: To Len Dawson: "C'mon Lenny! Pump it in there, baby! Just keep matriculating the ball down the field, boys!" Observing the confusion in the Vikings' defense: "Kassulke (Vikings strong safety Karl Kassulke) was running around there like it was a Chinese fire drill. They didn't know where Mike (Garrett) was. Didn't know where he was! They look like they're flat as hell." Before the Chiefs' first touchdown, he sent in the play "65 toss power trap." When the Chiefs scored on the play, Stram laughed while yelling to his players on the bench, "Was it there, boys? Was that there, rats? Nice going, baby! Haaa-haaa-haaa-ha-ha-ha! Haaa! The mentor! 65 toss power trap! Yaaa-haaa-haaa-ha-ha! Yaaa-ha-ha! I tell ya that thing was there, yes sir boys! Haa-ha-ha-ha-ha! Wooo!!" As the referees were spotting the ball before a measurement to determine if the Vikings got a first down, Stram yelled to the officials, "Make sure you mark it right! Oh, you lost your place! Measure it, take the chains out there! Oh, they didn't make it! My God, they made that by an inch! He definitely gave them an extra foot. Bad! Very bad!" Another time, the refs overruled what looked like a Minnesota fumble. Stram: "Mr. Official, let me ask you something. How can six of you miss a play like that? Huh? All six of you! When the ball jumped out of there as soon as we made contact?... No. What??" After Frank Pitts gained on the reverse in the third quarter, when the chains were stretched and the Chiefs indeed had the first down, Stram was then heard saying to the refs, "Ya did good, you marked it good. You did a helluva job, nice going!" On Otis Taylor's touchdown reception that clinched the game, Stram is heard yelling and laughing. Game summary Chiefs head coach Hank Stram, who was also the team's offensive coordinator, devised an effective game plan against the Vikings. He knew Minnesota's secondary was able to play very far off receivers because Viking defensive ends Carl Eller and Jim Marshall knocked down short passes or put pressure on the quarterback. Stram decided to double-team Marshall and Eller; most of quarterback Len Dawson's completions would be short passes, and neither Marshall nor Eller knocked down any passes. Stram also concluded that the Vikings' aggressiveness on defense also made them susceptible to trap plays; Mike Garrett's rushing touchdown would come on a trap play. The Vikings' inside running game depended on center Mick Tingelhoff blocking linebackers. Stram put 285-pound Buck Buchanan or 295-pound Curley Culp in front of Tingelhoff, who weighed only 235 pounds. To Minnesota's credit, the NFL used the so-called light "greyhound" centers while the AFL used big centers. It was a mismatch that disrupted the Vikings' running game. Wrote Dawson, "It was obvious that their offense had never seen a defense like ours." Minnesota would rush for only two first downs. First quarter The Vikings began the game by receiving the opening kickoff and marching from their own 20-yard line to the Kansas City 39-yard line with quarterback Joe Kapp completing his first two passes for 36 yards. Kapp's next pass was also a completion but running back Bill Brown was slowed by linebacker Bobby Bell, then brought down by left defensive end Jerry Mays for a yard loss to make it third down, on which Kapp failed to connect with tight end John Beasley. Minnesota rushed for only 6 yards on the drive and chose to punt. The Chiefs then drove 42 yards in eight plays. Included was a 20-yard reception by wide receiver Frank Pitts after Vikings defensive back Ed Sharockman gambled trying to make an interception. Kansas City then scored on placekicker Jan Stenerud's Super Bowl record 48-yard field goal. This record would stand for 24 years until broken by Steve Christie in Super Bowl XXVIII. (According to Dawson, the Vikings were shocked that the Chiefs would attempt a 48-yard field goal. Stenerud was among the first soccer-style placekickers in professional football. The others included brothers Charlie and Pete Gogolak. The soccer-style placekickers used the instep of the foot while the conventional professional football placekickers kicked straight on with their toes. "Stenerud was a major factor," Dawson said.) Minnesota then managed to reach midfield on its next drive, but chose to punt again. On the first play of their ensuing drive, Dawson threw a 20-yard completion to Pitts, followed by a 9-yard pass to wide receiver Otis Taylor. Second quarter Four plays later, on the first play of the second quarter, a pass interference penalty on Sharockman nullified Dawson's third down incompletion and gave Kansas City a first down at the Minnesota 31-yard line. However, on third down and 4 at the 25-yard line, Vikings cornerback Earsell Mackbee broke up a deep pass intended for Taylor. Stenerud then kicked another field goal to increase the Chiefs' lead to 6–0. On the second play of their next drive, Vikings wide receiver John Henderson fumbled the ball after catching a 16-yard reception, and Chiefs defensive back Johnny Robinson recovered the ball at the Minnesota 46-yard line. However, First defensive tackle Alan Page tackled running back Garrett for a 1-yard loss, and then safety Paul Krause intercepted Dawson's pass at the 7-yard line on the next play turning the ball back over to the Vikings. However, the Vikings also could not take advantage of the turnover. Kapp's two incompletions and a delay of game penalty forced Minnesota to punt from its own 5-yard line. The Chiefs then took over at the Viking 44-yard line after punter Bob Lee's kick traveled only 39 yards. A 19-yard run by Pitts on an end around play fooled the overaggressive, overpursuing Viking defense to set up another field goal attempt by Stenerud, which was good to increase Kansas City's lead to 9–0. On the ensuing kickoff, Vikings returner Charlie West fumbled the football, and Kansas City's Remi Prudhomme recovered it at the Minnesota 19-yard line. ("That was a key, key play," said Dawson.) Defensive end Jim Marshall sacked Dawson for an 8-yard loss on the first play of the drive; however, a 13-yard run on a draw play by running back Wendell Hayes and a 10-yard reception by Taylor gave the Chiefs a first down at the Vikings' 4. Three plays later, Garrett's five-yard touchdown run on a trap draw play, aided by pulling right guard Mo Moorman's block on Page that cleared a huge hole, gave Kansas City a 16–0 lead. This play is forever known as the 65 Toss Power Trap. West returned the ensuing kickoff 27 yards to the 32-yard line. On the first play of the drive, Kapp completed a 27-yard pass to Henderson to advance the ball to the Kansas City 41-yard line. However, the next three plays, Kapp threw two incompletions and was sacked by Chief defensive tackle Buck Buchanan for an eight-yard loss. On fourth down, kicker Fred Cox's 56-yard field goal attempt fell way short of the goal posts. For the first half, Minnesota rushed for only 24 yards and failed to convert any of five third downs. To this point in the combined history of NFL and AFL championship games, including the first three Super Bowls, no team had lost a game when holding a lead of more than 10 points, no matter what time of the game it was. The Chiefs, when they were the Dallas Texans in their last game before they became the Chiefs, lost a 17-0 lead in the 1962 AFL Championship Game, but managed to defeat the Houston Oilers 20-17 in the second overtime. No team would lose such a lead and also lose the game until Super Bowl LI. Third quarter In the third quarter, the Vikings managed to build momentum. After the Chiefs punted on their opening possession, Kapp completed four consecutive passes for 47 yards and rushed for seven yards. Minnesota also made its first third down conversion as it drove 69 yards in 10 plays to score on fullback Dave Osborn's four-yard rushing touchdown, reducing the lead to 16–7. However, Kansas City responded on its next possession with a six-play, 82-yard drive. Pitts picked up a key first down with a 7-yard left-to-right run on a reverse play. Then after a 15-yard personal foul penalty against the Vikings, Dawson hit Taylor with a short pass. Taylor caught the ball at the Minnesota 41-yard line, broke Earsell Mackbee's tackle, raced down the sideline, broke through Vikings' safety Karl Kassulke's tackle and scored the clinching touchdown on a 46-yard play. Fourth quarter The Vikings were demoralized after the game-breaking touchdown and the Chiefs' defense would continue to shut them down in the fourth quarter, forcing three interceptions on three Minnesota possessions to clinch the 23–7 victory. The defeat was total for the Vikings, as even their "Indestructible" quarterback Joe Kapp had to be helped off the field in the fourth quarter after being sacked by Chiefs defensive lineman Aaron Brown. Kapp was replaced by Gary Cuozzo. Fittingly, the Vikings' final play was an interception Cuozzo threw to cornerback Emmitt Thomas. Kansas City running back and future University of Southern California Athletic Director Mike Garrett, the 1965 Heisman Trophy recipient, was the top rusher of the game, recording 11 carries for 39 yards and a touchdown. He also caught two passes for 25 yards and returned a kickoff for 18 yards. Taylor was the Chiefs' leading receiver with six catches for 81 yards and a |
missed opportunities. Colts returner Jim Duncan fumbled the opening kickoff of the second half and Dallas recovered. Then the Cowboys drove to the Colts' 1-yard line, but Mike Curtis punched the ball loose from Cowboys running back Duane Thomas before crossing the end zone, and the Colts took over at the 1 as Duncan was credited with the recovery–-a controversial call because when the resulting pile-up was sorted out, Dallas center Dave Manders was holding the ball. The energized Colts then drove to the Cowboys' 44-yard line but came up empty when O'Brien's 52-yard field goal attempt fell short of the goal posts. However, instead of attempting to return the missed field goal, Renfro allowed it to bounce inside their own 1-yard line where it was downed by center Tom Goode (NFL rules prior to 1974 allowed a field goal that fell short of the goal posts to be downed just like a punt; that rule is still in effect in high school football). "I thought it would carry into the end zone", Renfro explained after the game. Dallas, backed up to its own end zone, punted after three plays. The Colts would have received the ball inside Dallas territory following the punt, but a 15-yard clipping penalty pushed the Colts back to their own 39 to begin the drive. Two plays later, Morrall completed a 45-yard pass to running back Tom Nowatzke to reach the Cowboys 15-yard line. Fourth quarter Three plays later, on the first play of the fourth quarter, Morrall threw an interception to Howley in the end zone to preserve the Cowboys' 13–6 lead. After forcing the Cowboys to punt, the Colts regained the ball on their own 18-yard line, still trailing 13–6. Aided by a pass interference call and a 23-yard completion, the Colts advanced into Dallas territory. The Colts then attempted to fool the Cowboys with a flea-flicker, resulting in one of the oddest plays in Super Bowl history. Running back Sam Havrilak took a handoff and ran right, intending to lateral the ball back to Morrall, but Pugh stormed into the backfield and prevented him from doing so. Havrilak (who played quarterback at Bucknell) then threw a pass intended for Mackey, but it was caught instead by Hinton, who promptly took off for the end zone. However, as Hinton raced toward a touchdown, Cowboys defensive back Cornell Green stripped him from behind at the 11. The loose ball bounced wildly in the field of play, evading recovery attempts by six different players until it was eventually pushed 20 yards through the back of the end zone for a touchback, thus returning the ball to the Cowboys at their 20. Three plays after the turnover the Cowboys returned the favor. Morton threw a pass that was intercepted by Colts safety Rick Volk, who returned the ball 30 yards to the Cowboys' 3 (Morrall later referred to that play as the play of the game). Two plays later, the Colts scored on a two-yard touchdown run by Nowatzke. O'Brien's extra point sailed through the uprights to tie the game at 13–13. (O'Brien says he was much calmer and more confident on this extra point than on the first one, which was blocked.) The next two possessions ended in traded punts, with the Cowboys eventually taking over in excellent field position at the Colts 48-yard line with less than two minutes left in the game. On the second play of this potential game-winning drive, Dallas committed a 15-yard holding penalty (its second offensive holding of the game) on the 42-yard line, which was a spot foul, pushing the team all the way back to its own 27-yard line (the NFL did not reduce the penalty for offensive holding to 10 yards until 1974). Then, on second down and 35, Morton threw a pass that slipped through the hands of running back Dan Reeves and bounced for an interception into the arms of linebacker Mike Curtis, who then returned the ball 13 yards to the Cowboys' 28-yard line. Two plays later, with nine seconds left in the game, O'Brien kicked the go ahead 32-yard field goal, giving Baltimore a 16–13 lead. O'Brien says he was "on automatic" and was so calm and concentrating so hard that he didn't hear anything and saw only the ball. In an enduring image from Super Bowl V, after O'Brien's game-winning field goal Bob Lilly took off his helmet and hurled it through the air in disgust. The Cowboys received the ball again on their 40 with a few seconds remaining after O'Brien's ensuing squib kick, but Morton's pass to Garrison was intercepted by Logan at the Baltimore 29, and time expired. Postscript Morrall was the top passer of the game, with 7 out of 15 completions for 147 yards, with 1 interception. Before being knocked out of the game, Unitas completed 3 out of 9 passes for 88 yards and a touchdown, with 2 interceptions. Morton completed more passes than Morrall and Unitas combined (12), but finished the game with 118 fewer passing yards (127), and was intercepted 3 times (all in the fourth quarter). Mackey was the top receiver of the game with 2 receptions for 80 yards and a touchdown. Nowatzke was the Colts' leading rusher with 33 yards and a touchdown, while also catching a pass for 47 yards. Dallas running back Walt Garrison was the leading rusher of the game with 65 rushing yards, and added 19 yards on 2 pass receptions. The newly named Vince Lombardi Trophy was presented to Colts owner Carroll Rosenbloom by Lombardi's widow, Marie Lombardi. To date, it remains the only Super Bowl that the trophy was not presented by the NFL Commissioner. Referencing the numerous turnovers, Morrall said, "It really was a physical game. I mean, people were flying into one another out there." "It was really a hard-hitting game," wrote O'Brien. "It wasn't just guys dropping the ball. They fumbled because they got the snot knocked out of them." Said Tom Landry: I haven't been around many games where the players hit harder. Sometimes people watch a game and see turnovers and they talk about how sloppy the play was. The mistakes in that game weren't invented, at least not by the people who made them. Most were forced. "We figured we could win if our offense didn't put us into too many holes", said 35-year-old Colts lineman Billy Ray Smith, who was playing in his last NFL game, "Let me put it this way, they didn't put us into any holes we couldn't get out of". Colts defensive end Bubba Smith would later refuse to wear his Super Bowl V ring because of the "sloppy" play. Don McCafferty became the first rookie head coach to win a Super Bowl. The feat was not repeated until George Seifert led the San Francisco 49ers to victory in Super Bowl XXIV. McCafferty was also the first Super Bowl-winning coach who did not wear coat and tie, opting for a short-sleeved T-shirt with a mock turtleneck. This Super Bowl would also start a trend with the team that lost the game would come back the next year and win it. Dallas lost this game but they would come back and win it all the next year in Super Bowl VI while their opponents, the Miami Dolphins, lost that game, they would go on to win Super Bowl VII the following season. Two rule changes that were adopted before the 1974 season were: When the defensive team commits an illegal use of hands, arms, or body foul from behind the line of scrimmage, the penalty will be assessed from the previous spot instead of the spot of the foul. The penalties for offensive holding, illegal use of hands, and tripping were reduced from 15-yards to 10-yards. These would have reduced the severity of the two Dallas offensive holding penalties in Super Bowl V. Box score Final statistics Sources:The NFL's Official Encyclopedic History of Professional Football, (1973), p. 149, Macmillan Publishing Co. New York, NY, LCCN 73-3862, NFL.com Super Bowl V, Super Bowl V Play Finder Bal, Super Bowl V Play Finder Dal Statistical comparison Individual leaders 1Completions/attempts 2Carries 3Long gain 4Receptions 5Times targeted Records set The following records were set or tied in Super Bowl V, according to the official NFL.com | in the state of Alaska, thanks to NBC's then-parent company RCA acquiring the Alaska Communications System from the United States Air Force. The video of the complete original broadcast, up until Chuck Howley's second interception, the first play of the fourth quarter, exists; however, the rest of the fourth quarter is missing from network vaults. The complete audio, including the post-game, does exist. Broadcast excerpts of the crucial fourth-quarter plays, recovered from the Canadian feed of NBC's original, also exist and circulate among collectors. (Two different NFL Films game compilations also cover the fourth-quarter plays, in part.) 46.04 million people in the US watched the game on television, resulting in a rating of 39.9 and a market share of 75. Entertainment The bands from Southern University and Southeast Missouri State College performed before the game, while trumpeter Tommy Loy played the national anthem. Loy also played the anthem before every Cowboys' home game from the mid-1960s until the late-1980s. The Southeast Missouri State Golden Eagle Band was featured during the halftime show along with singer Anita Bryant. The game had one of the first planned jet fly-bys. The fly-by, which was supposed to happen right at the end of the national anthem, ended up coming 5 minutes after the anthem had ended. This was the third consecutive (and final) Super Bowl to feature the Vince Lombardi Trophy on the 50-yard line. Originally the trophy was supposed to be painted gray, but the league changed it to silver which led to problems washing it out of the poly turf surface. Halftime show The Super Bowl V halftime show was headlined by the Southeast Missouri State Marching Band, with Anita Bryant as a guest. Up with People were also included as performers. This was the third time that the Southeast Missouri State Marching Band had performed at the Miami Orange Bowl (venue of Super Bowl V), having previously performed during the halftime of the 1969 and 1969 Orange Bowl games. The band was directed by LeRoy Mason. During their stay in Miami for the game, the band was accommodated at the McAllister Hotel. During the roughly 13-minute performance, floats representing each of the league's 26 teams were utilized. Members of two high school bands were utilized to form a geographic outline of the United States. In the performance, Bryant, standing on a float, sang, "Battle Hymn of the Republic". Bryant was the performer featured in a Super Bowl halftime show as a solo performer (as opposed to a member of a group). The arrangement of this song that was performed was created by her musical director Charles Bird, and had been created for the band to accompany her. It had been adapted from a previous recording Bryant had done of the tune. Game summary First quarter The first three possessions of Super Bowl V ended quietly with each team punting after a three-and-out. Then, on the first play of the Colts' second drive, Cowboys linebacker Chuck Howley intercepted a pass from Johnny Unitas and returned it 22 yards to the Colts' 46-yard line, the first of 11 combined turnovers committed by both teams. The Cowboys failed to take advantage of the turnover, with a 15-yard holding penalty 10 yards behind the line of scrimmage pushing them back to a 3rd-and-33 situation. Walt Garrison gained 11 yards and Dallas had to punt. However, Colts punt returner Ron Gardin muffed the return, and the loose ball was recovered by Cowboys safety Cliff Harris at the Colts' 9-yard line. The Cowboys were unable to score a touchdown and settled for kicker Mike Clark's 14-yard field goal to establish a 3–0 lead. After a Colts punt which they failed to keep from reaching the end zone, Cowboys quarterback Craig Morton completed a 41-yard pass to Bob Hayes (Morton's longest pass of the game) to reach the Colts' 12-yard line, with a roughing the passer penalty adding 6 yards (half the distance to the goal), but Dallas was denied the end zone by the Baltimore defense for a second time. Linebacker Ted Hendricks deflected Morton's pass on first down and running back Duane Thomas was tackled for a 1-yard loss on second down. Second quarter Morton committed a 15-yard intentional grounding penalty on third down to open the 2nd quarter, pushing the Cowboys back to the 22-yard line and forcing them to settle for Clark's 30-yard field goal, stretching the score to 6–0. On their next possession the Colts offense got a break. After two straight incompletions to open the drive, Unitas uncorked a pass to Eddie Hinton that was both high and behind the receiver. The ball ricocheted off Hinton's hands, was tipped by Dallas defensive back Mel Renfro, then landed in the arms of tight end John Mackey, who sprinted 75 yards for a touchdown. The Cowboys subsequently blocked Jim O'Brien's extra point attempt to keep the score tied at 6-6, with O'Brien later saying that he was "awfully nervous" and hesitated a second too long before kicking it. Six minutes into the second quarter, Cowboys linebacker Lee Roy Jordan tackled Unitas, causing him to fumble. Defensive lineman Jethro Pugh recovered the loose ball at the Baltimore 28 and Dallas capitalized three plays later, scoring on a 7-yard touchdown pass from Morton to Thomas to establish a 13–6 lead. The next time the Colts had the ball they quickly turned it over yet again, with Unitas unleashing a fluttering interception to Renfro while being hit fiercely on a pass. Unitas was knocked out of the game permanently on the play with a rib injury and was replaced by Earl Morrall, who was widely blamed for the Colts loss in Super Bowl III. The Cowboys, starting from their own 15, were unable to score any points off the turnover. After sustaining a 15-yard pass interference penalty, they punted. After regaining possession, the Colts offense, led by Morrall, stormed all the way to the Cowboys 2-yard line with less than two minutes remaining in the half. However, the Cowboys defense stiffened. Colts running back Norm Bulaich was stuffed on three consecutive rushing attempts from inside the 2-yard line. On fourth down, Morrall threw an incomplete pass, turning the ball over on downs and ending the half with Dallas leading 13–6. Third quarter The second half was a parade of turnovers, sloppy play, penalties, and missed opportunities. Colts returner Jim Duncan fumbled the opening kickoff of the second half and Dallas recovered. Then the Cowboys drove to the Colts' 1-yard line, but Mike Curtis punched the ball loose from Cowboys running back Duane Thomas before crossing the end zone, and the Colts took over at the 1 as Duncan was credited with the recovery–-a controversial call because when the resulting pile-up was sorted out, Dallas center Dave Manders was holding the ball. The energized Colts then drove to the Cowboys' 44-yard line but came up empty when O'Brien's 52-yard field goal attempt fell short of the goal posts. However, instead of attempting to return the missed field goal, Renfro allowed it to bounce inside their own 1-yard line where it was downed by center Tom Goode (NFL rules prior to 1974 allowed a field goal that fell short of the goal posts to be downed just like a punt; that rule is still in effect in high school football). "I thought it would carry into the end zone", Renfro explained after the game. Dallas, backed up to its own end zone, punted after three plays. The Colts would have received the ball inside Dallas territory following the punt, but a 15-yard clipping penalty pushed the Colts back to their own 39 to begin the drive. Two plays later, Morrall completed a 45-yard pass to running back Tom Nowatzke to reach the Cowboys 15-yard line. Fourth quarter Three plays later, on the first play of the fourth quarter, Morrall threw an interception to Howley in the end zone to preserve the Cowboys' 13–6 lead. After forcing the Cowboys to punt, the Colts regained the ball on their own 18-yard line, still trailing 13–6. Aided by a pass interference call and a 23-yard completion, the Colts advanced into Dallas territory. The Colts then attempted to fool the Cowboys with a flea-flicker, resulting in one of the oddest plays in Super Bowl history. Running back Sam Havrilak took a handoff and ran right, intending to lateral the ball back to Morrall, but Pugh stormed into the backfield and prevented him from doing so. Havrilak (who played quarterback at Bucknell) then threw a pass intended for Mackey, but it was caught instead by Hinton, who promptly took off for the end zone. However, as Hinton raced toward a touchdown, Cowboys defensive back Cornell Green stripped him from behind at the 11. The loose ball bounced wildly in the field of play, evading recovery attempts by six different players until it was eventually pushed 20 yards through the back of the end zone for a touchback, thus returning the ball to the Cowboys at their 20. Three plays after the turnover the Cowboys returned the favor. Morton threw a pass that was intercepted by Colts safety Rick Volk, who returned the ball 30 yards to the Cowboys' 3 (Morrall later referred to that play as the play of the game). Two plays later, the Colts scored on a two-yard touchdown run by Nowatzke. O'Brien's extra point sailed through the uprights to tie the game at 13–13. (O'Brien says he was much calmer and more confident on this extra point than on the first one, which was blocked.) The next two possessions ended in traded punts, with the Cowboys eventually taking over in excellent field position at the Colts 48-yard line with less than two minutes left in the game. On the second play of this potential game-winning drive, Dallas committed a 15-yard holding penalty (its second offensive holding of the game) on the 42-yard line, which was a spot foul, pushing the team all the way back to its own 27-yard line (the NFL did not reduce the penalty for offensive holding to 10 yards until 1974). Then, on second down and 35, Morton threw a pass that slipped through the hands of running back Dan Reeves and bounced for an interception into the arms of linebacker Mike Curtis, who then returned the ball 13 yards to the Cowboys' 28-yard line. Two plays later, with nine seconds left in the game, O'Brien kicked the go ahead 32-yard field goal, giving Baltimore a 16–13 lead. O'Brien says he was "on automatic" and was so calm and concentrating so hard that he didn't hear anything and saw only the ball. In an enduring image from Super Bowl V, after O'Brien's game-winning field goal Bob Lilly took off his helmet and hurled it through the air in disgust. The Cowboys received the ball again on their 40 with a few seconds remaining after O'Brien's |
they were going to lose that game." The Cowboys used the New Orleans Saints' practice facility in Metairie as its training headquarters for the game. The Dolphins split their practices between Tulane Stadium and Tad Gormley Stadium in New Orleans' City Park. Dallas' team hotel was the Hilton across from New Orleans International Airport in Kenner, and Miami lodged at the Fontainebleau Motor Hotel in New Orleans' Mid-City neighborhood. On Media Day, Duane Thomas refused to answer any questions and sat silently until his required time was up. Roger Staubach surmises that Duane Thomas would have been named MVP if he had cooperated with the press prior to the game. In the Cowboys' locker room after the game, flustered CBS reporter Tom Brookshier asked Duane Thomas a long-winded question, the gist of which was "You're fast, aren't you?" Thomas, who had shunned the press all season, simply said "Evidently." Thomas became the first player to score touchdowns in back-to-back Super Bowls, having a receiving touchdown in Super Bowl V. Dolphins safety Jake Scott entered Super Bowl VI with a broken left hand. He broke his right wrist during the game but never came out. With both hands in casts for three months, he said "When I go to the bathroom, that's when I find out who my real friends are." This was the first Super Bowl to match two teams which played its home games on artificial turf. Both of the Cowboys' home stadiums of 1971, the Cotton Bowl and Texas Stadium, had turf, as did the Dolphins' Orange Bowl (specifically Poly-Turf). The previous year, the Cowboys became the first team to play its home games on turf to make it to a Super Bowl. Through Super Bowl LV, this is the only Super Bowl in which both teams played their home games in states which were members of the Confederate States of America during the Civil War. The Washington Commanders (known as the Redskins from 1937-2019) which faced the Dolphins in Super Bowl VII and Super Bowl XVII, has its facilities and training camp in Virginia, which was a Confederate state during the Civil War, but have never played home games there, moving from Washington, D.C. proper to Maryland in 1997. This game was originally scheduled to be the last to be played in Tulane Stadium. It was hoped the Louisiana Superdome would be ready in time for the 1972 NFL season. However, political wrangling led to a lengthy delay in construction, and groundbreaking did not take place until August 11, 1971, five months before this game. The Superdome was not completed until August 1975, forcing Super Bowl IX to be moved to Tulane Stadium. That Super Bowl proved to be the final NFL game in the stadium, which was demolished in late 1979. The night before the game, Joe Frazier successfully defended his heavyweight boxing championship with a fourth-round knockout of Terry Daniels at the Rivergate Convention Center, which was approximately one mile south of the construction site for the Superdome on Poydras Street. The next day, the Rivergate hosted a closed-circuit television broadcast of the game, charging $10 per person. The temperature at kickoff was a sunny and windy , making this the coldest Super Bowl to date. Broadcasting The game was broadcast in the United States by CBS with play-by-play announcer Ray Scott and color commentator Pat Summerall. Although Tulane Stadium was sold out for the game, unconditional blackout rules in the NFL prohibited the live telecast from being shown in the New Orleans area. This was the last Super Bowl to be blacked out in the TV market in which the game was played. The game was not blacked out in Baton Rouge, which was blacked out during Saints home games. The following year, the NFL allowed Super Bowl VII to be televised live in the host city (Los Angeles) when all tickets were sold. In , the league changed its blackout policy to allow any game to be broadcast in the home team's market if sold out 72 hours in advance. The blackout rule has been suspended since . This game was featured in the movie Where the Buffalo Roam where the protagonist character Hunter S. Thompson is sent to cover the game by Rolling Stone magazine, although the host site set in the movie is Los Angeles Memorial Coliseum (site of Super Bowl VII), not Tulane Stadium. Entertainment The Tyler Junior College Apache Belles drill team performed during the pregame and halftime festivities. Later, the U.S. Air Force Academy Chorale sang the national anthem. This was followed by an eight-plane flyover of F-4 Phantoms from Eglin Air Force Base, which featured a plane in the missing man formation. Despite being the second Super Bowl after the AFL–NFL merger, Super Bowl VI was the first one to have the NFL logo painted at the 50-yard line. The NFL would do this for all but one Super Bowl after this until Super Bowl XXXI (the exception was Super Bowl XXV, when the Super Bowl logo was painted at midfield instead). Halftime show The Super Bowl VI halftime show was themed as a "Salute to Louis Armstrong" (Armstrong, a New Orleans native, died in July 1971). Headlining the show were jazz singer Ella Fitzgerald, actress and singer Carol Channing, trumpeter Al Hirt and the U.S. Marine Corps Drill Team. Also performing were the Onward Brass Band with Danny Barker, and young Leroy Jones as "Little Louis Armstrong". Fitzgerald was the first Black woman to sing in a Super Bowl halftime show. She is also considered to be the first jazz artist featured in such a manner in a Super Bowl halftime show. This was the second of three Super Bowl halftime shows in which Al Hirt was a headlining performer. Hirt had previously been among the headlining performers in the halftime shows of Super Bowl I, and would subsequently be a headlining performer in the halftime show of Super Bowl XII. Also returning to the Super Bowl halftime stage was Carol Channing, who had previously been a performer in the halftime show of Super Bowl IV. In the show, the Onward Brass Band performed "High Society" and accompanied Carol Channing in performing "Hello, Dolly!". Al Hirt accompanied Ella Fitzgerald in performing "Mack the Knife". Game summary According to Roger Staubach, the Cowboys' game plan was to neutralize the Dolphins' key offensive and defensive players—Paul Warfield and Nick Buoniconti. Warfield was double-teamed by Green and Renfro. "They pretty much shut him down", wrote Staubach. Since the running game was the key to the Cowboys' offense, they wanted to take the quick-reacting Buoniconti out of each play. Two linemen, usually Niland and center Dave Manders, were assigned to block Buoniconti. Combined with counterplays and the excellent cutback running of Thomas, this tactic proved very successful. Buoniconti sustained a concussion which he suffered from throughout the second half, during which he did not keep track of the score, thinking it was still 10-3 when it had become 24-3. Miami's defense was designed to stop Staubach's scrambling. According to Staubach, although his scrambing was shut down this did not work to the Dolphins' benefit because it opened things up for the other backs. First quarter Miami won the coin toss and elected to receive. Neither team could mount a drive on its first possession. On the first play of the Dolphins' second possession, Larry Csonka, on his first carry of the game, gained 12 yards on a sweep aided by a big block by Larry Little on Herb Adderley. That would be his longest gain of the day. On the next play, Csonka fumbled a handoff from Bob Griese, his first fumble of the season, and it was recovered by linebacker Chuck Howley at the Cowboys 48-yard line. A pair of runs for 18 total yards by Walt Garrison put Dallas within field goal range, but Staubach was sacked by Jim Riley and Bob Heinz for a 12-yard loss. However, Staubach found Bob Hayes open for an 18-yard pass and then Staubach passed to Duane Thomas for 11 yards to bring up first and goal. On third and goal, Dick Anderson made a great play to keep Thomas out of the end zone. Dallas kicker Mike Clark kicked a 9-yard field goal to give the Cowboys a 3–0 lead. On the third play of the Dolphins' next possession at their own 38-yard line, Griese was sacked by Bob Lilly for a Super Bowl record 29-yard loss, which still stands as the longest negative play from scrimmage in Super Bowl history. Second quarter Early in the second quarter, Miami drove to the Cowboys 42-yard line with the aid of a 20-yard reception by receiver Howard Twilley, but the drive stalled and ended with no points after kicker Garo Yepremian missed a 49-yard field goal attempt. Starting with 6:15 left in the period, Dallas drove 76 yards in 10 plays, including a 21-yard reception by Lance Alworth and Calvin Hill's three carries for 25 yards, and then scored on a 7-yard touchdown pass from Staubach to Alworth to increase their lead to 10–0 (Alworth would refer to the receptions that he made on the scoring drive as "The two most important catches of his career"). Miami started the ensuing drive with just 1:15 left in the half, and quarterback Bob Griese completed three consecutive passes, two to receiver Paul Warfield and one to running back Jim Kiick, | interceptions. He was also a terrific rusher, gaining 343 yards and 2 touchdowns on 41 carries. Dallas also had an outstanding trio of running backs, Walt Garrison, Duane Thomas, and Calvin Hill, who rushed for a combined total of 1,690 yards and 14 touchdowns during the season. Garrison led the team in receptions during the season (40). (Thomas, upset that the Cowboys would not renegotiate his contract after his excellent rookie year, had stopped talking to the press and to almost everyone on the team). Wide Receivers Bob Hayes and Lance Alworth also provided a deep threat, catching a combined total of 69 passes for 1,327 yards and 10 touchdowns. The offensive line, anchored by all-pro tackle Rayfield Wright, Pro Bowlers John Niland and Ralph Neely, and future Hall of Famer Forrest Gregg, was also a primary reason for their success on offense. Neely had broken his leg in November in a dirt-bike accident, and was replaced first by Gregg and then by Tony Liscio, who came out of retirement. The Dallas defense (nicknamed the "Doomsday Defense") had given up only one touchdown in the last 14 quarters prior to the Super Bowl. Their defensive line was anchored by Pro Bowl defensive tackle Bob Lilly, who excelled at pressuring quarterbacks and breaking up running plays. Dallas also had an outstanding trio of linebackers: Pro Bowler Chuck Howley, who recorded 5 interceptions and returned them for 122 yards; Dave Edwards 2 interceptions; and Lee Roy Jordan, who recorded 2 interceptions. The Cowboys secondary was led by 2 future Hall of Fame cornerbacks Herb Adderley (6 interceptions for 182 return yards) and Mel Renfro (4 interceptions for 11 yards). Safeties Cliff Harris and Pro Bowler Cornell Green combined for 4 interceptions. Harris added 29 kickoff returns for 823 yards, an average of 28.4 yards per return (3rd in the NFL). They were also helped out by weak side linebacker D.D. Lewis. Miami Dolphins The Dolphins, who advanced to the Super Bowl just five years after their founding in 1966, were based primarily around their league-leading running attack, led by running backs Larry Csonka and Jim Kiick. Csonka rushed for 1,051 yards, averaging over five yards per carry, and scored seven touchdowns. Versatile Jim Kiick rushed for 738 yards and three touchdowns, and was second on the Dolphins in receiving with 40 receptions for 338 yards. They fumbled once (by Kiick) between the two of them during the regular season. But Miami also had a threatening passing game. Quarterback Bob Griese, the AFC's leading passer and most valuable player, put up an impressive performance during the season, completing 145 passes for 2,089 yards and 19 touchdowns with only 9 interceptions. Griese's major weapon was wide receiver Paul Warfield, who caught 43 passes for 996 yards (a 23.2 yards per catch average) and a league-leading 11 touchdowns. The Dolphins also had an excellent offensive line to open up holes for their running backs and protect Griese on pass plays, led by future Hall of Fame guard Larry Little. Miami's defense was a major reason why the team built a 10–3–1 regular season record, including eight consecutive wins. Future Hall of Fame linebacker Nick Buoniconti was a major force reading and stopping plays, while safety Jake Scott recorded 7 interceptions. Playoffs Before this season, the Dolphins had never won a playoff game in franchise history, but they surprised the entire NFL by advancing to the Super Bowl with wins against the two previous Super Bowl champions. The Dolphins became the first of the four teams which had commenced play in the NFL or AFL after the start of the Super Bowl era to contest so much as a title game, let alone earn a berth in the world championship game. First Miami defeated the Kansas City Chiefs (winners of Super Bowl IV), 27–24, in the longest game in NFL history with kicker Garo Yepremian's game-winning field goal after 22 minutes and 40 seconds of overtime play in the final Chiefs game at Municipal Stadium. Later, Miami shut out the defending Super Bowl champion Baltimore Colts, 21–0, in the AFC Championship Game, with safety Dick Anderson intercepting 3 passes from Colts quarterback Johnny Unitas and returning one of them for a 62-yard touchdown. Meanwhile, the Cowboys marched to the Super Bowl with playoff wins over the Minnesota Vikings, 20–12 in the NFC Divisional Playoffs, and the San Francisco 49ers, 14–3 in the NFC Championship Game, giving up only one touchdown in the two games. Super Bowl pregame news and notes Soon after the Dolphins' win in the AFC Championship Game, Shula received a phone call at his home from President Richard Nixon at 1:30 in the morning. Nixon had a play he thought would work, a particular pass to Warfield. (That particular play, which was called late in the first quarter, was broken up by Mel Renfro.) When asked about the Dolphins' defensive team prior to Super Bowl VI, Landry said that he could not recall any of the players' names, but they were a big concern to him. Over the years this remark has been regarded as the origin of the nickname "No-Name Defense". However, it was Miami defensive coordinator Bill Arnsparger who had originally given his squad the nickname after the Dolphins had beaten the Baltimore Colts in the AFC Championship. According to Tom Landry, the Cowboys were very confident. "When they talked among themselves they said there was no way they were going to lose that game." The Cowboys used the New Orleans Saints' practice facility in Metairie as its training headquarters for the game. The Dolphins split their practices between Tulane Stadium and Tad Gormley Stadium in New Orleans' City Park. Dallas' team hotel was the Hilton across from New Orleans International Airport in Kenner, and Miami lodged at the Fontainebleau Motor Hotel in New Orleans' Mid-City neighborhood. On Media Day, Duane Thomas refused to answer any questions and sat silently until his required time was up. Roger Staubach surmises that Duane Thomas would have been named MVP if he had cooperated with the press prior to the game. In the Cowboys' locker room after the game, flustered CBS reporter Tom Brookshier asked Duane Thomas a long-winded question, the gist of which was "You're fast, aren't you?" Thomas, who had shunned the press all season, simply said "Evidently." Thomas became the first player to score touchdowns in back-to-back Super Bowls, having a receiving touchdown in Super Bowl V. Dolphins safety Jake Scott entered Super Bowl VI with a broken left hand. He broke his right wrist |
Washington finished 6–8 under interim coach Bill Austin. Shortly after the conclusion of the 1970 season, the Redskins hired George Allen as their head coach, hoping he could turn the team's fortunes around. Allen's philosophy was that veteran players win games, so immediately after taking over the team, he traded away most of the younger team members and draft choices for older, more established players. His motto was "The future is now." Washington quickly became the oldest team in the NFL and earned the nickname "The Over-the-Hill Gang." The average age of starters was 31 years old. However, Allen's strategy turned the Redskins around, as the team improved to a 9–4–1 record in 1971, and finished the 1972 season with an NFC-best 11–3 record. Washington was led by 33-year-old quarterback Billy Kilmer, who completed 120 out of 225 passes for 1,648 yards and a league-leading 19 touchdowns during the regular season, with only 11 interceptions, giving him an NFL-best 84.8 passer rating. Kilmer had started the first three games of the season, was replaced in Game 4 by 38-year-old Sonny Jurgensen, then replaced Jurgensen when he was lost for the season with an Achilles tendon injury. The Redskins' powerful rushing attack featured two backs. Larry Brown gained 1,216 yards (first in the NFC and second in the NFL, behind only O. J. Simpson's 1,251 rushing yards) on 285 carries during the regular season, caught 32 passes for 473 yards and scored 12 touchdowns, earning him both the NFL Most Valuable Player Award and the NFL Offensive Player of the Year Award. Charley Harraway ran for 567 yards on 148 carries. Future Hall of Fame wide receiver Charley Taylor and wide receiver Roy Jefferson provided the team with a solid deep threat, combining for 84 receptions, 1,223 receiving yards and 10 touchdowns. Veteran tight end Jerry Smith added 21 receptions for 353 yards and 7 touchdowns. Washington also had a solid defense led by linebacker Chris Hanburger (four interceptions, 98 return yards, one touchdown) and cornerbacks Pat Fischer (four interceptions, 61 return yards) and Mike Bass (three interceptions, 53 return yards) Playoffs Morrall led the Dolphins to a 20–14 playoff win over the Cleveland Browns. However, Griese started the second half of the AFC Championship Game to help rally the Dolphins to a 21–17 victory over the Pittsburgh Steelers. A fake punt by Miami's Larry Seiple made the difference. Meanwhile, the Redskins advanced to the Super Bowl without having allowed a touchdown in either their 16–3 playoff win over the Green Bay Packers or their 26–3 NFC Championship Game victory over the Cowboys. Super Bowl pregame news and notes Much of the pregame hype surrounded the chances of the Dolphins completing a perfect, undefeated season, as well as their quarterback controversy between Griese and Morrall. Griese was eventually picked to start the Super Bowl because Shula felt more comfortable with Morrall as the backup just in case Griese was ineffective following his recent inactivity. Miami was also strongly motivated to win the Super Bowl after having been humiliated by the Dallas Cowboys in Super Bowl VI. Wrote Nick Buoniconti, "There was no way we were going to lose the Super Bowl; there was no way." Head coach Don Shula, loser of Super Bowls III and VI, was also determined to win. Although Shula was relaxed and charming when dealing with the press, it was all an act; Dolphins players described him as "neurotic" and "absolutely crazy." He was also sick during Super Bowl week with the flu, which he kept secret. Still, many favored the Redskins to win the game because of their group of "Over the Hill Gang" veterans, and because Miami had what some considered an easy schedule (only two opponents, Kansas City and the New York Giants, posted winning records, and both of those teams were 8–6) and had struggled in the playoffs. While Washington had easily crushed both playoff opponents, Miami had narrowly defeated theirs. Most surprisingly, the Dolphins needed to mount a fourth-quarter comeback against the Browns, whom they were heavily favored to defeat. Allen had a reputation for spying on opponents. A school overlooked the Rams facility that the NFL designated as the Dolphins practice field, so the Dolphins found a more secure field at a local community college. Dolphins employees inspected the trees every day for spies. Miami cornerback Tim Foley, a future broadcaster who was injured and would not play in Super Bowl VII, was writing daily stories for a Miami newspaper and interviewed George Allen and his players, provoking charges from Allen that Foley was actually spying for Shula. Allen was extremely uptight and prickly dealing with the press Super Bowl week, and accused the press of ruining his team's preparation. Allen pushed the team so hard in practices that the players joked among themselves that they should have left Allen in Washington. During practice the day before Super Bowl VII, the Dolphins' 5'7" 150-pound kicker, Garo Yepremian, relaxed by throwing 30-yard passes to Dave Shula, Don Shula's son. During the pregame warmups, he consistently kicked low line drives and couldn't figure out why. This was the first Super Bowl in which neither coach wore a tie. Shula wore a coat and tie for Super Bowl VI, but wore a white short-sleeved polo shirt for this game, as did Allen. For Super Bowl VIII, Shula would wear a sport coat, but with a shirt underneath that was similar to the one he wore in Super Bowl VII. Broadcasting The game was broadcast in the United States by NBC with play-by-play announcer Curt Gowdy, color commentator Al DeRogatis and sideline reporter Bill Enis. This was Enis' final Super Bowl telecast before his death on December 14, 1973. This was the first Super Bowl to be televised live in the city in which it was being played, via NBC's flagship station in Los Angeles, KNBC (Channel 4). Despite unconditional blackout rules in the NFL that normally would have prohibited the live telecast from being shown locally, the NFL allowed the game to be telecast in the Los Angeles area on an experimental basis when all tickets for the game were sold. The league then changed its blackout rules the following season to allow any game sold out at least 72 hours in advance to be televised in the host market. No subsequent Super Bowl has ever been blacked out under this rule, as all have been sold out (owing to its status as the marquee event on the NFL schedule, meaning that tickets sell out quickly). Because of Super Bowl VII, NBC was forced to delay its broadcast of Elvis Presley's Aloha from Hawaii concert, which took place the same day and was intended to be broadcast around the world live. NBC eventually re-edited the concert and aired it later that April. This game is featured on NFL's Greatest Games under the title "17–0". Entertainment The pregame show was a tribute to Apollo 17, the sixth and last mission to land on the Moon and the final one of Project Apollo. The show featured the Michigan Marching Band and the crew of Apollo 17 who exactly one month earlier had been the final humans to date to leave the Moon. Later, the Little Angels of Chicago's Angels Church from Chicago performed the national anthem. Halftime show The halftime show, featured Woody Herman and the Michigan Marching Band along with The Citrus College Singers and Andy Williams, was titled "Happiness Is". The show was produced by Tommy Walker. Setlist Partial setlist: "Put on a Happy Face" (University of Michigan Marching Band) "Woodchopper's Ball" (University of Michigan Marching Band with Woody Herman) "La Virgen de la Macarena" (University of Michigan Marching Band) "This Land Is Your Land" (University of Michigan Marching Band) "Marmalade, Molasses & Honey" (Andy Williams) "People" (Andy Williams) Game summary According to Shula, the Dolphins' priority on defense was to stop Larry Brown and force Billy Kilmer to pass. Buoniconti looked at Washington's offensive formation on each play and shifted the defense so it was strongest where he felt Brown would run. This strategy proved successful. Washington's offensive line also had trouble handling Dolphins' defensive tackle/nose tackle Manny Fernandez, who was very quick. "He beat their center Len Hauss like a drum", wrote Buoniconti. Miami's defenders | more comfortable with Morrall as the backup just in case Griese was ineffective following his recent inactivity. Miami was also strongly motivated to win the Super Bowl after having been humiliated by the Dallas Cowboys in Super Bowl VI. Wrote Nick Buoniconti, "There was no way we were going to lose the Super Bowl; there was no way." Head coach Don Shula, loser of Super Bowls III and VI, was also determined to win. Although Shula was relaxed and charming when dealing with the press, it was all an act; Dolphins players described him as "neurotic" and "absolutely crazy." He was also sick during Super Bowl week with the flu, which he kept secret. Still, many favored the Redskins to win the game because of their group of "Over the Hill Gang" veterans, and because Miami had what some considered an easy schedule (only two opponents, Kansas City and the New York Giants, posted winning records, and both of those teams were 8–6) and had struggled in the playoffs. While Washington had easily crushed both playoff opponents, Miami had narrowly defeated theirs. Most surprisingly, the Dolphins needed to mount a fourth-quarter comeback against the Browns, whom they were heavily favored to defeat. Allen had a reputation for spying on opponents. A school overlooked the Rams facility that the NFL designated as the Dolphins practice field, so the Dolphins found a more secure field at a local community college. Dolphins employees inspected the trees every day for spies. Miami cornerback Tim Foley, a future broadcaster who was injured and would not play in Super Bowl VII, was writing daily stories for a Miami newspaper and interviewed George Allen and his players, provoking charges from Allen that Foley was actually spying for Shula. Allen was extremely uptight and prickly dealing with the press Super Bowl week, and accused the press of ruining his team's preparation. Allen pushed the team so hard in practices that the players joked among themselves that they should have left Allen in Washington. During practice the day before Super Bowl VII, the Dolphins' 5'7" 150-pound kicker, Garo Yepremian, relaxed by throwing 30-yard passes to Dave Shula, Don Shula's son. During the pregame warmups, he consistently kicked low line drives and couldn't figure out why. This was the first Super Bowl in which neither coach wore a tie. Shula wore a coat and tie for Super Bowl VI, but wore a white short-sleeved polo shirt for this game, as did Allen. For Super Bowl VIII, Shula would wear a sport coat, but with a shirt underneath that was similar to the one he wore in Super Bowl VII. Broadcasting The game was broadcast in the United States by NBC with play-by-play announcer Curt Gowdy, color commentator Al DeRogatis and sideline reporter Bill Enis. This was Enis' final Super Bowl telecast before his death on December 14, 1973. This was the first Super Bowl to be televised live in the city in which it was being played, via NBC's flagship station in Los Angeles, KNBC (Channel 4). Despite unconditional blackout rules in the NFL that normally would have prohibited the live telecast from being shown locally, the NFL allowed the game to be telecast in the Los Angeles area on an experimental basis when all tickets for the game were sold. The league then changed its blackout rules the following season to allow any game sold out at least 72 hours in advance to be televised in the host market. No subsequent Super Bowl has ever been blacked out under this rule, as all have been sold out (owing to its status as the marquee event on the NFL schedule, meaning that tickets sell out quickly). Because of Super Bowl VII, NBC was forced to delay its broadcast of Elvis Presley's Aloha from Hawaii concert, which took place the same day and was intended to be broadcast around the world live. NBC eventually re-edited the concert and aired it later that April. This game is featured on NFL's Greatest Games under the title "17–0". Entertainment The pregame show was a tribute to Apollo 17, the sixth and last mission to land on the Moon and the final one of Project Apollo. The show featured the Michigan Marching Band and the crew of Apollo 17 who exactly one month earlier had been the final humans to date to leave the Moon. Later, the Little Angels of Chicago's Angels Church from Chicago performed the national anthem. Halftime show The halftime show, featured Woody Herman and the Michigan Marching Band along with The Citrus College Singers and Andy Williams, was titled "Happiness Is". The show was produced by Tommy Walker. Setlist Partial setlist: "Put on a Happy Face" (University of Michigan Marching Band) "Woodchopper's Ball" (University of Michigan Marching Band with Woody Herman) "La Virgen de la Macarena" (University of Michigan Marching Band) "This Land Is Your Land" (University of Michigan Marching Band) "Marmalade, Molasses & Honey" (Andy Williams) "People" (Andy Williams) Game summary According to Shula, the Dolphins' priority on defense was to stop Larry Brown and force Billy Kilmer to pass. Buoniconti looked at Washington's offensive formation on each play and shifted the defense so it was strongest where he felt Brown would run. This strategy proved successful. Washington's offensive line also had trouble handling Dolphins' defensive tackle/nose tackle Manny Fernandez, who was very quick. "He beat their center Len Hauss like a drum", wrote Buoniconti. Miami's defenders had also drilled in maintaining precise pursuit angles on sweeps to prevent the cut-back running that Duane Thomas had used to destroy the Dolphins in Super Bowl VI. Washington's priority on defense was to disrupt Miami's ball-control offense by stopping Larry Csonka. They also intended to shut down Paul Warfield by double-covering him. With a game-time kickoff temperature of , this is the warmest Super Bowl to date. It came the year after the coldest game in Super Bowl VI which registered a temperature at kickoff of . First Quarter As they had in Super Bowl VI, Miami won the toss and elected to receive. Most of the first quarter was a defensive battle with each team punting on their first two possessions. The Dolphins would, however, get two key breaks. Howard Kindig appeared to mishandle the snap on their first punt from the Miami 27 and lose the ball to the Redskins' Harold McLinton, but McLinton was called for slapping at the ball while it was being snapped, for a 5-yard penalty. On the replay of the down, Larry Seiple got the kick away safely. Later, after stopping Washington for the second time, safety Jake Scott did not call for a fair catch, as he had not been told to do so by Dick Anderson. He fumbled, but fortunately Anderson made the recovery. Miami then started this drive on its own 37-yard line with 2:55 left in the first quarter. Running back Jim Kiick started out the drive with two carries for eleven yards. Then quarterback Bob Griese completed an 18-yard pass to wide receiver Paul Warfield to reach the Washington 34-yard line. After two more running plays, on third and four Griese threw a 28-yard touchdown pass (his longest completion of the game) to receiver Howard Twilley for his only catch of the game. Twilley fooled Pat Fischer by faking a route to the inside, then broke to the outside and caught the ball at the five-yard line, dragging Fischer into the end zone. "Griese read us real good all day", said Fischer. Yepremian's extra point gave the Dolphins a 7–0 lead with one second remaining in the period. (Yepremian noticed that the kick was too low, just like his practice kicks). Second Quarter On the third play of the Redskins' ensuing drive, Scott intercepted quarterback Billy Kilmer's pass down the middle intended for Taylor and returned it eight yards to the Washington 47-yard line. However a 15-yard illegal man downfield penalty on left guard Bob Kuechenberg nullified a 20-yard pass completion to tight end Marv Fleming on the first play after the turnover, and the Dolphins were forced to punt after three more plays. After the Redskins were forced to punt again, Miami reached the 47-yard line with a 13-yard run by Larry Csonka and an 8-yard run by Kiick. But on the next play, Griese's 47-yard touchdown pass to Warfield was nullified by an illegal procedure penalty on receiver Marlin Briscoe (Briscoe's first, and only, play of the game). On third down, Redskins defensive tackle Diron Talbert sacked Griese for a 6-yard loss and the Dolphins had to punt. The Redskins then advanced from their own 17-yard line to the Miami 48-yard line (their first incursion into Miami territory) with less than two minutes left in the half. But on third down and three yards to go, Dolphins linebacker Nick Buoniconti intercepted Kilmer's pass to tight end Jerry Smith at the Miami 41-yard line and returned it 32 yards to the Washington 27-yard line. From there, Kiick and Csonka each ran once for three yards, and then Griese completed a 19-yard pass (his sixth completion in six attempts) to tight end Jim Mandich, who made a diving catch at the 2-yard line. Two plays later, Kiick scored on a 1-yard blast behind Little and Csonka with just 18 seconds left in the half, and Yepremian's extra point gave the Dolphins a lead of 14–0 before halftime (once again, Yepremian noticed the kick was too low). Miami's defense dominated the Redskins in the first half, limiting Washington to 49 yards rushing, 23 yards passing, and four first downs. Third Quarter The Redskins had more success moving the ball in the second half. They took the second half kickoff and advanced across midfield for only the second time in the game, driving from their own 30-yard line to Miami's 17-yard line in a seven-play drive that featured just two runs. On first down at Miami's 17-yard line, Kilmer threw to wide receiver Charley Taylor, who was open at the 2-yard line, but Taylor stumbled right before the ball arrived and the ball glanced off his fingertips. After a second-down screen pass to Harraway fell incomplete, defensive tackle Manny Fernandez sacked Kilmer on third down for a loss of eight yards, and Washington's drive ended with no points after kicker Curt Knight's ensuing 32-yard field goal attempt was wide right. "That was an obvious turning point", said Allen. Later in the period, the Dolphins drove 78 yards to Washington's 5-yard line, featuring a 49-yard run by Csonka, the second-longest run in Super Bowl history at the time. However, Redskins defensive back Brig Owens intercepted a pass intended for Fleming in the end zone for a touchback. Fourth Quarter Early in the fourth quarter, Washington threatened to score by mounting its most impressive drive of the game, driving 79 yards from its own 11 to Miami's 10-yard line in twelve plays. On second down at the Miami 10-yard line, Kilmer threw to tight end Jerry Smith in the end zone. Smith was wide open, but the ball hit the crossbar of the goalpost and fell incomplete. Then on third down, Scott intercepted Kilmer's pass to Taylor in the end zone and returned it 55 yards to the Redskins 48-yard line. Miami moved the ball to the 34-yard line on their ensuing drive. Leading 14–0 on 4th down with 4 yards to go, Shula could have tried for a conversion, but thought "What a hell of a way to remember this game" if they could end a perfect 17–0 season with a 17–0 Super Bowl final score. He called on kicker Garo Yepremian to attempt a 42-yard field goal in what is now remembered as one of the most famous blunders in NFL lore: "Garo's Gaffe". As had been the case all day, Yepremian's kick was too low, and it was blocked by Washington defensive tackle Bill Brundige. The ball bounced to Yepremian's right and he reached it before holder Earl Morrall. But instead of falling on the ball, Yepremian picked it up and, with Brundige bearing down on him, made a frantic attempt to pass the ball to Csonka, who blocked on field goals. Unfortunately for Miami, the ball slipped out of his hands and went straight up in the air. Yepremian attempted to bat the ball out of bounds, but instead batted it back up into the air, and it went right into the arms of Redskins cornerback Mike Bass, who returned the fumble 49 yards for a touchdown, the first fumble recovery returned for a touchdown in Super Bowl history, to make the score 14–7 with 2:07 left in the game. The Redskins did not try an onside kick but instead kicked deep. The Redskins were forced to use up all of their timeouts on the Dolphins' ensuing five-play possession but forced Miami to punt (nearly blocking the punt) from its own 36-yard line with 1:14 remaining in the game, giving themselves a chance to drive for the tying touchdown. However, Miami's defense forced two incompletions and a 4-yard loss on a swing pass, and then defensive end Vern Den Herder's 9-yard sack on fourth down as time expired in the game. Griese finished the game having completed 8 out of 11 passes for 88 yards and a touchdown, with one interception. Csonka was the game's leading rusher with 15 carries for 112 yards. Kiick had 38 rushing yards, two receptions for six yards, and a touchdown. Morris had 34 rushing yards. Manny Fernandez had 11 solo tackles and six assists. Kilmer completed six more passes than Griese, but finished the game with just 16 more total passing yards and was intercepted three times. Said Kilmer, "I wasn't sharp at all. Good as their defense is, I still should have thrown better." Washington's Larry Brown rushed for 72 yards on 22 carries and also had five receptions for 26 yards. Redskins receiver Roy Jefferson was the top receiver of the game, with five catches for 50 yards. Washington amassed almost as many total yards (228) as Miami (253), and actually more first downs (16 to Miami's 12) and more time of possession (32:31 to 27:29). As of 2021, this game is the only Super Bowl where the team with the advantage in time of possession did not score any offensive points. Delayed White House visit The Dolphins never made the traditional post-game visit to the White House due to the Watergate scandal, but in August 2013 finally made the trip at the behest of Barack Obama, minus Manny Fernandez, Jim Langer, and Bob Kuechenberg, who did not attend due to their opposition to the Obama administration. Garo Yepremian was a longtime Republican supporter and friend of former Florida Governor Jeb Bush but made the trip anyway and had an amusing exchange |
Osborn, Bill Brown, Oscar Reed and future actor Ed Marinaro – who combined for 1,469 rushing/receiving yards and 11 touchdowns. The Vikings' offensive line was also very talented, led by right tackle Ron Yary and six-time Pro Bowl center Mick Tingelhoff. The Minnesota defense was again anchored by a defensive line nicknamed the "Purple People Eaters", consisting of defensive tackles Gary Larsen and Alan Page, and defensive ends Jim Marshall and Carl Eller. Behind them, cornerback Bobby Bryant (seven interceptions, 105 return yards, one touchdown) and safety Paul Krause (four interceptions) led the defensive secondary. Playoffs The Vikings earned their second appearance in the Super Bowl after defeating the wild card Washington Redskins, 27–20, and the NFC East champion Dallas Cowboys, 27–10, in the playoffs. Meanwhile, the Dolphins defeated the AFC Central champion Cincinnati Bengals 34–16 in the divisional round, and the AFC West Champion Oakland Raiders, 27–10 for the AFC Championship. The Dolphins were the first team to appear in three consecutive Super Bowls. Just as in the regular season, Miami relied primarily on their run game in the playoffs, racking up 241 rushing yards against Cincinnati and 266 vs the Raiders. The ground game was particularly crucial against Oakland, as it enabled them to win despite completing just 3 of 6 passes for 34 yards in the game. Super Bowl notes This was the first Super Bowl in which a former AFL franchise was the favorite. The 1970 AFC champion Baltimore Colts had been the favorite in Super Bowl V, but they were an original NFL franchise prior the 1970 merger. This was also the first Super Bowl played in a stadium that was not the current home to an NFL or AFL team, as no team had called Rice Stadium home since the Houston Oilers moved into the Astrodome in 1968. At that time, the Astrodome seated just over 50,000 for football, and was considered too small to host the Super Bowl. It was also the first Super Bowl game played on the then-popular AstroTurf artificial playing surface, not surprising since Houston's Astrodome was the first facility to install AstroTurf in 1966. (Super Bowl V and Super Bowl VI, the first two Super Bowls played on artificial turf were played the competing Poly-Turf brand.) The Vikings complained about their practice facilities at Houston ISD's Delmar Stadium, a 20-minute bus ride from their hotel. They said the locker room was cramped, uncarpeted, had no lockers and that most of the shower heads did not work. The practice field had no blocking sleds. "I don't think our players have seen anything like this since junior high school", said Vikings head coach Bud Grant. The Dolphins, meanwhile, trained at the Oilers' facility, since they were an AFC team like Miami. Having already become the first NFC Central team to even reach the NFC Championship Game, the Vikings became the first non-East Division team from either conference to play in a post-merger Super Bowl. There were reports of dissension among the Dolphins arising from owner Joe Robbie's decision to allow married players to bring their wives at the club's expense. The single players were reportedly angry that they could not bring their girlfriends, mothers or sisters. Vikings defensive tackle Alan Page and Dolphins left guard Bob Kuechenberg were former teammates at the University of Notre Dame. Kuechenberg, who would be blocking Page in the game, had sustained a broken arm in a game against the Colts and wore a cast while playing in the Super Bowl. Paul Warfield entered the game with a well-publicized hamstring injury to his left leg. On television before the game, New York Jets quarterback Joe Namath said, "If Miami gets the kickoff and scores on the opening drive, the game is over.". Indeed, the Dolphins became the first team to score a touchdown after receiving the game's opening kickoff. The Dolphins, who were designated as the home team, were obligated by a now-defunct policy to wear their aqua jerseys despite having normally worn white jerseys for home games (though Miami wore aqua for its final two regular-season home games vs. the Pittsburgh Steelers and Detroit Lions). Also, the Dolphins wore two slightly different helmet decals; some had the decal that the team had previously used in the 1967 season (Bob Griese's rookie year) and would permanently adopt in 1974 (mostly linemen; with the mascot dolphin leaping through the sun), while others had the decal used in 1966 and again from 1968-1973 (with the mascot dolphin halfway through the sun). Famed "Gonzo" writer Hunter S. Thompson covered the game for Rolling Stone magazine, and his exploits in Houston are legendary. This was the only Super Bowl in which the game ball had stripes. Until the late 1970s, the NFL permitted striped footballs for night games, indoor games and other special situations. Head linesman Leo Miles was the first African-American to officiate in a Super Bowl. Broadcasting The game was televised in the United States by CBS with play-by-play announcer Ray Scott and color commentators Pat Summerall and Bart Starr. This was Scott's final telecast for CBS. Midway through the following season Summerall would take Scott's place as the network's lead play-by-play announcer, holding that position through 1993, when CBS lost rights to the NFC television package to Fox. Entertainment The Longhorn Band from the University of Texas at Austin performed during the pregame festivities. Later, country music singer Charley Pride sang "America the Beautiful" and the national anthem. This game marked the first time that "America the Beautiful" was performed before a Super Bowl game. The halftime show also featured the Longhorn Band, along with Judy Mallett, Miss Texas 1973, playing the fiddle, in a tribute to American music titled "A Musical America". The pre-game party was held on the floor of the Astrodome the night before the game. It was attended by the players, the coaches, media, and celebrities. Entertainment was provided by The La France Sisters and Charley Pride. Game summary The Dolphins' game plan on offense was to use misdirection, negative-influence traps, and cross-blocking to exploit the Minnesota defense's excellent pursuit. (The Kansas City Chiefs had used similar tactics against the same Vikings defensive line in Super Bowl IV). Wrote Jim Langer, "All this was successful right away. We kept ripping huge holes into their defense and Csonka kept picking up good yardage, especially to the right. We'd hear Alan [Page] cussing because those negative-influence plays were just driving him nuts. He didn't know what the hell to do." On defense, the Dolphins' goal was to neutralize Chuck Foreman by using cat-quick Manny Fernandez at nose tackle and to make passing difficult for Tarkenton by knocking down his receivers and double-teaming John Gilliam. They were also depending on defensive ends Bill Stanfill and Vern Den Herder to contain Tarkenton's scrambling. Coach Don Shula wrote, "In the case of Tarkenton we wanted to hem him in. In the case of Page, Eller and company, we wanted to try to turn their aggressiveness to our advantage. We decided to emphasize negative influence by misdirection and cross blocking, trying to make the Vikings Front Four commit to the influence of the play and then actually running it elsewhere. The Vikings responded as we anticipated. Then later in the game we found that the Vikings started hesitating, reducing their charge. When they did that, we beat them with straight blocking." First quarter As they had the two previous Super Bowls, the Dolphins won the coin toss and elected to receive. The Dolphins dominated the Vikings right from the beginning, scoring touchdowns on two 10-play drives in the first quarter. Said Jim Langer, "It was obvious from the beginning that our offense could overpower their defense." First, Dolphins defensive back Jake Scott gave his team good field position by returning the opening kickoff 31 yards to the Miami 38-yard line. Then Mercury Morris ran right for four yards, Larry Csonka crashed through the middle for two, and quarterback Bob Griese completed a 13-yard pass to tight end Jim Mandich to advance the ball to the Vikings 43-yard line. Csonka then ran on second down for 16 yards, then Griese completed a six-yard pass to receiver Marlin Briscoe to the 21-yard line. Three more running plays, two by Csonka and one by Morris moved the ball to the Vikings 5-yard line. Csonka then finished the drive with a five-yard touchdown run. Then after forcing Minnesota to punt after three plays, the Dolphins went 56 yards in 10 plays (aided with three runs by Csonka for eight, 12, and eight yards, and Griese's 13-yard pass to Briscoe) to score on running back Jim Kiick's one-yard run (his only touchdown of the season) to give them a 14–0 lead. By the time the first quarter ended, Miami had run 20 plays for 118 yards and eight first downs, and scored touchdowns on their first two possessions, with Csonka carrying eight times for 64 yards and Griese completing all four of his passes for 40 yards. Meanwhile, the Miami defense held the Minnesota offense to only 25 yards, six plays from scrimmage, and one first down. The Vikings advanced only as far as their own 27-yard line. The Dolphins set the record which still stands for the largest Super Bowl lead (14 points) at the end of the first quarter. It has since been tied by the Oakland Raiders against the Philadelphia Eagles in Super Bowl XV (led 14-0) and the Green Bay Packers against the Pittsburgh Steelers in Super Bowl XLV (led | the regular season, Tarkenton completed 61.7 percent of his passes for 2,113 yards, 15 touchdowns and just seven interceptions. He also rushed for 202 yards and another touchdown. The team's primary deep threat was Pro Bowl wide receiver John Gilliam, who caught 42 passes for 907 yards, an average of 21.6 yards per catch, and scored eight touchdowns. Tight end Stu Voigt was also a key element of the passing game, with 23 receptions for 318 yards and two touchdowns. The Vikings' main rushing weapon was NFL Rookie of the Year running back Chuck Foreman, who rushed for 801 yards, caught 37 passes for 362 yards and scored six touchdowns. The Vikings had four other significant running backs – Dave Osborn, Bill Brown, Oscar Reed and future actor Ed Marinaro – who combined for 1,469 rushing/receiving yards and 11 touchdowns. The Vikings' offensive line was also very talented, led by right tackle Ron Yary and six-time Pro Bowl center Mick Tingelhoff. The Minnesota defense was again anchored by a defensive line nicknamed the "Purple People Eaters", consisting of defensive tackles Gary Larsen and Alan Page, and defensive ends Jim Marshall and Carl Eller. Behind them, cornerback Bobby Bryant (seven interceptions, 105 return yards, one touchdown) and safety Paul Krause (four interceptions) led the defensive secondary. Playoffs The Vikings earned their second appearance in the Super Bowl after defeating the wild card Washington Redskins, 27–20, and the NFC East champion Dallas Cowboys, 27–10, in the playoffs. Meanwhile, the Dolphins defeated the AFC Central champion Cincinnati Bengals 34–16 in the divisional round, and the AFC West Champion Oakland Raiders, 27–10 for the AFC Championship. The Dolphins were the first team to appear in three consecutive Super Bowls. Just as in the regular season, Miami relied primarily on their run game in the playoffs, racking up 241 rushing yards against Cincinnati and 266 vs the Raiders. The ground game was particularly crucial against Oakland, as it enabled them to win despite completing just 3 of 6 passes for 34 yards in the game. Super Bowl notes This was the first Super Bowl in which a former AFL franchise was the favorite. The 1970 AFC champion Baltimore Colts had been the favorite in Super Bowl V, but they were an original NFL franchise prior the 1970 merger. This was also the first Super Bowl played in a stadium that was not the current home to an NFL or AFL team, as no team had called Rice Stadium home since the Houston Oilers moved into the Astrodome in 1968. At that time, the Astrodome seated just over 50,000 for football, and was considered too small to host the Super Bowl. It was also the first Super Bowl game played on the then-popular AstroTurf artificial playing surface, not surprising since Houston's Astrodome was the first facility to install AstroTurf in 1966. (Super Bowl V and Super Bowl VI, the first two Super Bowls played on artificial turf were played the competing Poly-Turf brand.) The Vikings complained about their practice facilities at Houston ISD's Delmar Stadium, a 20-minute bus ride from their hotel. They said the locker room was cramped, uncarpeted, had no lockers and that most of the shower heads did not work. The practice field had no blocking sleds. "I don't think our players have seen anything like this since junior high school", said Vikings head coach Bud Grant. The Dolphins, meanwhile, trained at the Oilers' facility, since they were an AFC team like Miami. Having already become the first NFC Central team to even reach the NFC Championship Game, the Vikings became the first non-East Division team from either conference to play in a post-merger Super Bowl. There were reports of dissension among the Dolphins arising from owner Joe Robbie's decision to allow married players to bring their wives at the club's expense. The single players were reportedly angry that they could not bring their girlfriends, mothers or sisters. Vikings defensive tackle Alan Page and Dolphins left guard Bob Kuechenberg were former teammates at the University of Notre Dame. Kuechenberg, who would be blocking Page in the game, had sustained a broken arm in a game against the Colts and wore a cast while playing in the Super Bowl. Paul Warfield entered the game with a well-publicized hamstring injury to his left leg. On television before the game, New York Jets quarterback Joe Namath said, "If Miami gets the kickoff and scores on the opening drive, the game is over.". Indeed, the Dolphins became the first team to score a touchdown after receiving the game's opening kickoff. The Dolphins, who were designated as the home team, were obligated by a now-defunct policy to wear their aqua jerseys despite having normally worn white jerseys for home games (though Miami wore aqua for its final two regular-season home games vs. the Pittsburgh Steelers and Detroit Lions). Also, the Dolphins wore two slightly different helmet decals; some had the decal that the team had previously used in the 1967 season (Bob Griese's rookie year) and would permanently adopt in 1974 (mostly linemen; with the mascot dolphin leaping through the sun), while others had the decal used in 1966 and again from 1968-1973 (with the mascot dolphin halfway through the sun). Famed "Gonzo" writer Hunter S. Thompson covered the game for Rolling Stone magazine, and his exploits in Houston are legendary. This was the only Super Bowl in which the game ball had stripes. Until the late 1970s, the NFL permitted striped footballs for night games, indoor games and other special situations. Head linesman Leo Miles was the first African-American to officiate in a Super Bowl. Broadcasting The game was televised in the United States by CBS with play-by-play announcer Ray Scott and color commentators Pat Summerall and Bart Starr. This was Scott's final telecast for CBS. Midway through the following season Summerall would take Scott's place as the network's lead play-by-play announcer, holding that position through 1993, when CBS lost rights to the NFC television package to Fox. Entertainment The Longhorn Band from the University of Texas at Austin performed during the pregame festivities. Later, country music singer Charley Pride sang "America the Beautiful" and the national anthem. This game marked the first time that "America the Beautiful" was performed before a Super Bowl game. The halftime show also featured the Longhorn Band, along with Judy Mallett, Miss Texas 1973, playing the fiddle, in a tribute to American music titled "A Musical America". The pre-game party was held on the floor of the Astrodome the |
scheduled to host Super Bowl X, and give New Orleans the January 1976 game, but the proposal was rejected. This proved to be quite pivotal, because of the inclement conditions (low temperature and the field was slick from overnight rain). This was the last Super Bowl to be played in inclement weather for over thirty years, until Super Bowl XLI (and that game's weather issues in Miami were based on a driving rain, not the temperature). The game still holds the mark as the second-coldest outdoor temperature for an outdoor game, at a game-time temperature of (only Super Bowl VI, also played at Tulane Stadium, had a colder game-time temperature, ) and expectations that Super Bowl XLVIII would break these records due to its winter location in outdoor New Jersey did not come to pass. (Seven Super Bowls - XVI in Pontiac, XXVI and LII in Minneapolis, XXVIII and XXXIV in Atlanta, XL in Detroit and XLVI in Indianapolis - have had colder outdoor temperatures but were played fixed-roof stadiums, except XLVI at the retractable-roofed Lucas Oil Stadium.) The change of venue meant this was not only the last of three Super Bowls played at Tulane Stadium, but the last professional game played in the stadium, which was demolished five years later and replaced for the 1975 NFL season by the Louisiana Superdome, which has hosted every Super Bowl held in New Orleans since. The circumstances surrounding Super Bowl IX prompted the NFL to adopt a rule prohibiting a new stadium from hosting the Super Bowl following its first regular season. Broadcasting The game was broadcast in the United States by NBC with play-by-play announcer Curt Gowdy and color commentators Al DeRogatis and Don Meredith. Charlie Jones served as the event's field reporter and covered the trophy presentation; while hosting the coverage was NBC News reporter Jack Perkins and Jeannie Morris (Morris, then the wife of former Chicago Bears wide receiver and WMAQ-TV sports anchor Johnny Morris, became the first woman to participate in Super Bowl coverage). Prior to the 1975 NFL season, NBC did not have a regular pregame show. The Mary Tyler Moore Show on CBS (which was set in Minneapolis) used this game as a plot line on the episode aired the night before the game. Lou Grant taught Ted Baxter how to bet on football games; yet over the course of the football season, Ted was the one who developed a winning strategy. They pooled their money and finished the regular season in the black. Since Ted's strategy would not work on the Super Bowl game's spread, it was agreed they would not place a bet on the Super Bowl. However Ted was crushed when it was revealed that Lou actually did place a (losing) bet. Lou bet all the season's winnings on the Steelers. At the end of the show, Mary Tyler Moore announced the following over the credits: "If the Pittsburgh Steelers win the actual Super Bowl tomorrow, we want to apologize to the Pittsburgh team and their fans for this purely fictional story. If on the other hand, they lose, remember, you heard it here first." And, as it turned out, her apology did go into effect. Entertainment The Grambling State University Band from north Louisiana performed during both the pregame festivities and the national anthem. Coincidentally, Tulane Stadium hosted the first Bayou Classic football game between Southwestern Athletic Conference archrivals Grambling and Southern seven weeks before the Super Bowl. During the national anthem, the GSU band was backed by the Mardi Gras Barbershop Chorus under the direction of Dr. Saul Schneider. The halftime show was a tribute to American jazz composer, pianist and bandleader Duke Ellington, also featuring the Grambling State University Band along with Ellington's son Mercer. Ellington had died the previous May. Game summary As many predicted, the game was low scoring; both teams failed to score a touchdown or a field goal until the third quarter and ended up with the third lowest total of combined points in Super Bowl history. First Quarter The first quarter of Super Bowl IX was completely dominated by both teams' defenses. The Vikings were limited to 20 passing yards, zero rushing yards, and one first down. The Steelers did slightly better with 18 passing yards, 61 rushing yards, and four first downs. Pittsburgh even managed to get close enough for their kicker Roy Gerela to attempt two field goals, but Gerela missed his first attempt, and a bad snap prevented the second one from getting off the ground. Second Quarter In the second quarter, the Vikings got an opportunity to score when defensive back Randy Poltl recovered a fumble from halfback Rocky Bleier at the Steelers' 24-yard line, but they could only move the ball two yards in their next three plays, and kicker Fred Cox missed a 39-yard field goal attempt. The Steelers then converted a third down with the longest gain so far in the game, a 22-yard pass from Terry Bradshaw to John Stallworth. Pittsburgh was forced to punt, but Bobby Walden booted a 39-yarder, and rookie Sam McCullum did not allow the ball to reach the end zone, then failed to make a return and was downed at the Viking 7-yard line. The first score of the game occurred two plays later, when halfback Dave Osborn fumbled a pitch from Tarkenton at the 10, and the ball rolled backward and across the goal line. Tarkenton quickly dove on the ball in the end zone to prevent a Steeler touchdown, but he was downed by Dwight White for a safety, giving Pittsburgh a 2–0 lead. It was the first safety scored in Super Bowl history. The Vikings forced a three-and-out, then threatened to score when Tarkenton led them on a 55-yard drive to the Steelers' 20-yard line. With 1:17 left in the half, Tarkenton threw a pass to receiver John Gilliam at the 5-yard line, but Steelers safety Glen Edwards hit him just as he caught the ball. The ball popped out of his hands and right into the arms of Mel Blount for an interception. The half ended with the Steelers leading 2–0, the lowest halftime score in Super Bowl history and lowest possible, barring a scoreless tie. Third Quarter On the opening kickoff of the second half, Minnesota's Bill Brown lost a fumble on an unintentional squib kick after Gerela slipped on the wet field and only extended his leg halfway for the kick. Marv Kellum recovered the ball for Pittsburgh at the Vikings' 30-yard line. Franco Harris then moved the ball to the 6-yard line with a 24-yard run. After being tackled for a three-yard loss, Harris carried the ball for nine yards and a touchdown, giving the Steelers a 9–0 lead. After an exchange of punts, Minnesota got the ball back on their own 20-yard line. On the second play of drive, Tarkenton's pass was deflected behind the line of scrimmage by Pittsburgh defensive lineman L. C. Greenwood, and bounced back right into the arms of Tarkenton, who then threw a 41-yard completion to Gilliam. Officials ruled Tarkenton's first pass attempt was a completion to himself, and thus his second attempt was an illegal forward pass. After the penalty, facing third and 11, Minnesota got the first down with running back Chuck Foreman's 12-yard run. Three plays later, Tarkenton completed a 28-yard pass to tight end Stu Voigt at the Steelers' 45-yard line. But White deflected Tarkenton's next pass attempt, and Joe Greene intercepted the ball, ending the Vikings' best offensive scoring opportunity. Fourth Quarter Early in the fourth quarter, the Vikings got another scoring opportunity when Minnesota safety Paul Krause recovered a fumble from Harris on the Steelers' 47-yard line. On the next play, a deep pass attempt from Tarkenton to Gilliam drew a 42-yard pass interference penalty on Pittsburgh defensive back Mike Wagner that moved the ball up to the 5-yard line. Once again, the Steelers stopped them from scoring when Greene forced and recovered a fumble from Foreman. Pittsburgh failed to get a first down on their next possession and was forced to punt from deep in their own territory. Minnesota linebacker Matt Blair burst through the line to block the punt, and Terry Brown recovered the ball in the end zone for a touchdown. Cox missed the extra point, but the Vikings had cut their deficit to 9–6 and were just a field goal away from a tie. However, on the ensuing drive, the Steelers put the game out of reach with a 66-yard, 11-play scoring drive that took 6:47 off the clock and featured three successful third down conversions. The first was a key 30-yard pass completion from Bradshaw to tight end Larry Brown. Brown fumbled the ball as he was being tackled, and two officials (back judge Ray Douglas and field judge Dick Dolack) initially ruled the ball recovered for the Vikings by Jeff Siemon, but head linesman Ed Marion overruled their call, stating that Brown was downed at the contact before the ball came out of his hands. Faced with 2nd and 15 after a penalty, Pittsburgh then fooled the Vikings defense with a misdirection play. Harris ran left past Bradshaw after the snap, drawing in the defense with him, while Bleier took a handoff and ran right through a gaping hole in the line for a 17-yard gain to the Vikings 16-yard line. A few plays later, Bradshaw converted a 3rd and 5 situation with 6-yard pass to Bleier that put the ball on the Vikings' 5-yard line. The Steelers gained just one yard with their next two plays, setting up third and goal from the four. Bradshaw's 4-yard touchdown pass to Brown on third down gave the Steelers a 16–6 lead with only 3:31 remaining. Vikings running back Brent McClanahan returned the ensuing kickoff 22 yards to the 39-yard line, but on the first play of the drive, Tarkenton's pass was intercepted by Wagner. The Steelers then executed 7 consecutive running plays, taking the game clock all the way down to 38 seconds remaining before turning the ball over on downs. Harris finished the game with 34 carries for a Super Bowl record 158 yards and a touchdown; Harris' record stood until the Washington Redskins' John Riggins rushed for 166 yards in Super Bowl XVII. Bleier had 65 rushing yards, and two receptions for 11 yards. Pittsburgh finished with a total of 57 rushing attempts, which remains the Super Bowl record through Super Bowl LV. Bradshaw completed nine out of 14 passes for 96 yards and a touchdown. Tarkenton completed 11 of 26 passes for just 102 yards with 3 interceptions, for a passer rating of only 14.1. Foreman was the Vikings' top offensive contributor, finishing the game as the team's leading rusher and receiver with 18 rushing yards and 50 receiving yards. The loss was the Vikings' record-setting third in Super Bowl play. Bud Grant vented frustration by saying, "There were three bad teams out there - us, Pittsburgh and the officials.” The win made Chuck Noll the youngest head coach to win the Super Bowl at the time (He was 42 years, 7 days). Box score Final statistics Sources: NFL.com Super Bowl IX, Super Bowl IX Play Finder Pit, Super Bowl IX Play Finder Min Statistical comparison Individual statistics 1Completions/attempts 2Carries 3Long gain 4Receptions 5Times targeted Records Set The following records were set or tied in Super Bowl IX, according to the official NFL.com boxscore and the ProFootball reference.com game summary. Some records have to meet NFL minimum number of attempts to be recognized. The minimums are shown (in parenthesis). † This category includes rushing, receiving, interception returns, punt returns, kickoff returns, and fumble | Super Bowl IX was originally planned to be held at the Louisiana Superdome. However, construction delays at the Superdome (which pushed its opening to August 1975) forced the league to move the game to Tulane Stadium, where the city's previous two Super Bowls were held. This ended up being the last professional American football game played at Tulane Stadium. Pittsburgh Steelers Pittsburgh advanced to their first Super Bowl and was playing for a league championship for the first time in team history. Their 73-year-old owner Art Rooney founded the Steelers as a 1933 NFL expansion team, but suffered through losing seasons for most of its 42-year history and had never made it to an NFL championship game or a Super Bowl. But in 1969, Rooney hired Chuck Noll to be the team's head coach and its fortunes started to turn following a disastrous 1–13 first year under the future Hall of Fame coach. Noll rebuilt the Steelers through the NFL draft, selecting defensive tackle Joe Greene and defensive end L. C. Greenwood in his first season as head coach. In 1970, Noll drafted quarterback Terry Bradshaw and cornerback Mel Blount. In 1971, linebacker Jack Ham, defensive tackle Ernie Holmes, defensive end Dwight White, and safety Mike Wagner were selected by the team. Fullback Franco Harris was drafted in 1972. And in 1974, the Steelers picked linebacker Jack Lambert, center Mike Webster and wide receivers Lynn Swann and John Stallworth, and signed safety Donnie Shell as a free agent. Bradshaw, Webster, Swann, Stallworth, and Harris ended up being Hall of Fame players on offense, while the others formed the core nucleus of their "Steel Curtain" defense, including future Hall of Famers Greene, Ham, Blount, Lambert and Shell. But en route to Super Bowl IX, the Steelers had started the regular season slowly, as Bradshaw and Joe Gilliam fought to be the team's starting quarterback. Gilliam had started for the first four games of the season, but Noll eventually made Bradshaw the starter. Although Bradshaw ended up completing only 67 out of 148 passes for 785 yards, 7 touchdowns, and 8 interceptions, he helped lead the team to a 10–3–1 regular-season record. The Steelers' main offensive weapon, however, was running the ball. Harris rushed for 1,006 yards and five touchdowns, while also catching 23 passes for 200 yards and another touchdown. Running backs Rocky Bleier, Preston Pearson, and Steve Davis also made important contributions, gaining a combined total of 936 yards and eight touchdowns. Receiver Lynn Swann returned 41 punts for league-leading 577 yards and a touchdown. But the Steelers' main strength during the season was their staunch "Steel Curtain" defense, which led the league with the fewest total yards allowed (3,074) and the fewest passing yards allowed (1,466). Greene won the NFL Defensive Player of the Year Award for the second time in the previous three seasons, and he and L. C. Greenwood were named to the Pro Bowl. Both of the team's outside linebackers, Ham and Andy Russell, had been also selected to play in the Pro Bowl, while Lambert already had two interceptions for 19 yards in his rookie year. In the defensive backfield, Blount, Wagner, and Glen Edwards made a strong impact against opposing passing plays. Minnesota Vikings The Vikings came into the season trying to redeem themselves after a one sided Super Bowl VIII loss after which they became the first team to lose two Super Bowls (the other loss was in Super Bowl IV). Minnesota's powerful offense was still led by veteran quarterback Fran Tarkenton, who passed for 2,598 yards and 17 touchdowns. The Vikings' primary offensive weapon was running back Chuck Foreman, who led the team in receptions with 53 for 586 yards and six touchdowns. He was also their leading rusher with 777 rushing yards and nine touchdowns. Wide receivers Jim Lash and John Gilliam were major deep threats, having 32 receptions for 631 yards (a 19.7 yards per catch average) and 26 receptions for 578 yards (a 22.5 ypc average), respectively. Fullback Dave Osborn contributed with 514 rushing yards, and 29 receptions for 196 yards. And the Vikings' offensive line, led by future Hall of Famers right tackle Ron Yary and center Mick Tingelhoff, allowed only 17 sacks. Aided by the "Purple People Eaters" defense, led by future Hall of Fame defensive linemen Carl Eller and Alan Page, and future Hall of Fame safety Paul Krause, the Vikings won the NFC Central for the sixth time in the previous seven seasons. Playoffs For the first time in four years, the Miami Dolphins were not able to advance to the Super Bowl. While the Steelers defeated the Buffalo Bills 32–14 in the first round, the favored Dolphins lost to the Oakland Raiders 28–26, giving up Raiders running back Clarence Davis' 8-yard touchdown reception with 26 seconds remaining in the game with a play now known as The Sea of Hands. The key play in the game occurred when the Dolphins were in control and were leading the Raiders 19–14 midway through the fourth quarter. Cliff Branch hauled in a 72-yard touchdown pass from Raiders quarterback Ken Stabler when third-year Dolphin defensive back Henry Stuckey, the man assigned to cover Branch on the play, fell down, and the resultant wide open Branch caught the bomb and sprinted to the end zone. After George Blanda kicked the PAT, the Raiders led 21-19. Dolphin fans were furious because fan favorite Lloyd Mumphord was replaced with Stuckey. Mumphord and head coach Don Shula were involved in a feud at the time, and it is thought that Stuckey was given the starting job for this game because of Shula's and Mumphord's differences of opinion. Afterwards, Stuckey was released in the offseason. Many believed that had Mumphord been in the game, there would have been no "Sea of Hands" play. The Steelers defeated the Buffalo Bills 32–14 at home in the divisional round, then won the AFC Championship Game over the host Raiders, 24–13. Meanwhile, Minnesota allowed only a combined 24 points in their playoff wins against the St. Louis Cardinals, 30–14, and their narrow defeat of the Los Angeles Rams, 14–10, after their defense stopped an attempted comeback touchdown drive from the Rams on the Vikings' own 2-yard line. Super Bowl pregame news and notes Sports writers and fans predicted that Super Bowl IX would be a low scoring game because of the two teams' defenses. The Steelers' "Steel Curtain" had led the AFC in fewest points allowed (189) and the Vikings' "Purple People Eaters" had only given up 195. As the NFC was the designated "home team" for the game, by NFL rules at the time the Vikings were required to wear their purple jerseys. Although the league later relaxed the rule from Super Bowl XIII onwards, the Vikings would've likely worn their purple jerseys anyway, given that they've worn their purple jerseys at home for much of their history aside from a few games in the 1960s, when the NFL was encouraging (but not requiring) teams to wear white at home. This was the only one of the four Super Bowls the Steelers of the 1970s played in that the team wore their white jerseys, and the only Super Bowl the team would wear white at all until Super Bowl XL 31 years later. This was the first post-merger Super Bowl to not feature an East Division team from either conference. The previous season's Vikings were the only non-East Division team to appear in any of the previous four Super Bowls. Game conditions When the NFL awarded Super Bowl IX to New Orleans on April 3, 1973, the game was originally scheduled to be played at the Louisiana Superdome. By July 1974, construction on the dome was not yet finished, and so the league reverted to Tulane Stadium, home field for Tulane University and the New Orleans Saints, and site of Super Bowls IV and VI. Dolphins owner Joe Robbie lobbied the NFL to move Super Bowl IX to the Orange Bowl, already scheduled to host Super Bowl X, and give New Orleans the January 1976 game, but the proposal was rejected. This proved to be quite pivotal, because of the inclement conditions (low temperature and the field was slick from overnight rain). This was the last Super Bowl to be played in inclement weather for over thirty years, until Super Bowl XLI (and that game's weather issues in Miami were based on a driving rain, not the temperature). The game still holds the mark as the second-coldest outdoor temperature for an outdoor game, at a game-time temperature of (only Super Bowl VI, also played at Tulane Stadium, had a colder game-time temperature, ) and expectations that Super Bowl XLVIII would break these records due to its winter location in outdoor New Jersey did not come to pass. (Seven Super Bowls - XVI in Pontiac, XXVI and LII in Minneapolis, XXVIII and XXXIV in Atlanta, XL in Detroit and XLVI in Indianapolis - have had colder outdoor temperatures but were played fixed-roof stadiums, except XLVI at the retractable-roofed Lucas Oil Stadium.) The change of venue meant this was not only the last of three Super Bowls played at Tulane Stadium, but the last professional game played in the stadium, which was demolished five years later and replaced for the 1975 NFL season by the Louisiana Superdome, which has hosted every Super Bowl held in New Orleans since. The circumstances surrounding Super Bowl IX prompted the NFL to adopt a rule prohibiting a new stadium from hosting the Super Bowl following its first regular season. Broadcasting The game was broadcast in the United States by NBC with play-by-play announcer Curt Gowdy and color commentators Al DeRogatis and Don Meredith. Charlie Jones served as the event's field reporter and covered the trophy presentation; while hosting the coverage was NBC News reporter Jack Perkins and Jeannie Morris (Morris, then the wife of former Chicago Bears wide receiver and WMAQ-TV sports anchor Johnny Morris, became the first woman to participate in Super Bowl coverage). Prior to the 1975 NFL season, NBC did not have a regular pregame show. The Mary Tyler Moore Show on CBS (which was set in Minneapolis) used this game as a plot line on the episode aired the night before the game. Lou Grant taught Ted Baxter how to bet on football games; yet over the course of the football season, Ted was the one who developed a winning strategy. They pooled their money and finished the regular season in the black. Since Ted's strategy would not work on the Super Bowl game's spread, it was agreed they would not place a bet on the Super Bowl. However Ted was crushed when it was revealed that Lou actually did place a (losing) bet. Lou bet all the season's winnings on the Steelers. At the end of the show, Mary Tyler Moore announced the following over the credits: "If the Pittsburgh Steelers win the actual Super Bowl tomorrow, we want to apologize to the Pittsburgh team and their fans for this purely fictional story. If on the other hand, they lose, remember, you heard it here first." And, as it turned out, her apology did go into |
game was played at the Miami Orange Bowl in Miami, Florida, on January 18, 1976, one of the first major national events of the United States Bicentennial year. Both the pre-game and halftime show celebrated the Bicentennial, while players on both teams wore special patches on their jerseys with the Bicentennial logo. Super Bowl X featured a contrast of playing styles between the Steelers and the Cowboys, which were the two most popular teams in the league. The Steelers, dominating teams with their "Steel Curtain" defense and running game, finished the regular season with a league best 12–2 record and defeated the Baltimore Colts and the Oakland Raiders in the playoffs. The Cowboys, with their offense and "flex" defense, became the first NFC wild-card team to advance to the Super Bowl after posting a 10–4 regular season record and postseason victories over the Minnesota Vikings and the Los Angeles Rams. Trailing 10–7 in the fourth quarter of Super Bowl X, the Steelers rallied to score 14 unanswered points, including a 64-yard touchdown reception by Pittsburgh wide receiver Lynn Swann. The Cowboys cut the score, 21–17, late in the game with wide receiver Percy Howard's 34-yard touchdown reception, but Pittsburgh safety Glen Edwards halted Dallas' rally with an end zone interception as time expired. Swann, who caught four passes for a Super Bowl record 161 yards and one touchdown, became the first wide receiver to be named Super Bowl MVP. Background The NFL awarded Super Bowl X to Miami on April 3, 1973, at the owners' meetings held in Scottsdale, Arizona. Dallas Cowboys The Cowboys, considered a Cinderella team entering the Super Bowl, advanced to their third Super Bowl in team history with their rather high-tech offense and "flex" defense. Quarterback Roger Staubach had a solid season, passing for 2,666 yards and 17 touchdowns (but he also threw 16 interceptions), while also rushing for 310 yards. Staubach's favorite target was wide receiver Drew Pearson who led the team with 46 receptions for 822 yards and 8 touchdowns. Wide receiver Golden Richards and tight end Jean Fugett were also reliable targets in the Cowboys' passing game, combining for 59 receptions and 939 receiving yards. But despite their solid passing game, Dallas was a run-based team. Fullback Robert Newhouse was their leading rusher with 930 yards, and also caught 34 passes for 274 yards. Halfback Doug Dennison contributed 388 yards. Perhaps the most talented player in the backfield was halfback Preston Pearson (no relation to receiver Drew Pearson), who signed on the team as a free agent after being cut by the Steelers in the preseason. Preston rushed for 509 yards, caught 27 passes for 351 yards, and added another 391 yards returning kickoffs. Preston had been especially effective in the playoffs, where he caught 12 passes for 200 yards and three touchdowns, and was extremely eager to increase his numbers in the Super Bowl against the team that let him go. Up front, the offensive line was led by All-Pro right tackle Rayfield Wright. The Cowboys' "Flex" defense was anchored by linemen Harvey Martin and Ed "Too Tall" Jones. Linebacker Lee Roy Jordan led the team with six interceptions, while linebacker D.D. Lewis was an effective weapon pass rushing. The starting players in Dallas' defensive secondary, future Hall of Fame cornerback Mel Renfro, cornerback Mark Washington, and safeties Charlie Waters and future Hall of Famer Cliff Harris, combined for 12 interceptions. Even though the Cowboys finished in second place in the NFC East with a 10–4 record, they qualified for the playoffs as the NFC's wild-card team (during that time, only one wild card team from each conference entered the playoffs). The Dallas Cowboys became the first NFC wild card team to reach the Super Bowl. Pittsburgh Steelers The Steelers became the first official #1 seed to reach the Super Bowl. Playoff seeds were instituted in 1975. The Steelers finished the regular season with a league-best 12–2 record, dominating opponents with their "Steel Curtain" defense and powerful running game. Fullback Franco Harris ranked second in the league with 1,246 rushing yards and 10 touchdowns, while also catching 28 passes for 214 yards and another touchdown. Halfback Rocky Bleier had 528 rushing yards, and fullback John "Frenchy" Fuqua added 285 yards and 18 receptions. Still, the Steelers had a fine passing attack led by quarterback Terry Bradshaw. Bradshaw threw for 2,055 yards, 18 touchdowns, and nine interceptions while rushing for 210 yards and three touchdowns. One reason why Bradshaw's numbers were much improved from the previous season was the emergence of wide receivers Lynn Swann and John Stallworth. Both saw limited playing time in the previous season, but became significant contributors in 1975. Swann caught a team-leading 49 passes for 781 yards and 11 touchdowns. Stallworth only had 20 receptions, but he had an average of 21.2 yards per catch, recording a total of 423 reception yards. The Steelers' "Steel Curtain" defense dominated the league, ranking third in fewest yards allowed (4,019) and sending 8 of their 11 starters to the Pro Bowl: defensive linemen Joe Greene (future Pro Football Hall of Fame player) and L. C. Greenwood; future Hall of Fame linebackers Jack Ham and Jack Lambert; Andy Russell, the team's third starting linebacker; future Hall of Fame defensive back Mel Blount; and safeties Glen Edwards and Mike Wagner. Greene made the Pro Bowl despite missing six games with injuries. Ham and Lambert had the best seasons of their careers, while Blount led the league with 11 interceptions and was named the NFL's Defensive Player of the Year. Wagner had 4 interceptions and 3 fumble recoveries, while Edwards had 3 interceptions, while also returning 25 punts for 267 yards. Playoffs Dallas went on to defeat the Minnesota Vikings, 17–14, with a 50-yard touchdown pass from Staubach to Drew Pearson with less than a minute to play in what was called the "Hail Mary pass". They went on to crush the Los Angeles Rams, 37–7, in the NFC Championship Game. As a result, the Cowboys became the first wild card team to advance to the Super Bowl. Meanwhile, even though Pittsburgh's offense lost a total of 12 turnovers in their two playoff games, the Steelers only gave up a combined total of 20 points in their victories over the Baltimore Colts in the AFC Divisional playoff game 28–10, and the Oakland Raiders in the AFC Championship Game 16–10. Super Bowl pregame news and notes Coming into Super Bowl X, most sports writers and fans expected that Swann would not play. He had suffered a severe concussion in the AFC Championship Game against the Raiders that forced him to spend two days in a hospital. If he did play, many assumed he would just be used as a decoy to draw coverage away from the other receivers. Throughout the week leading up to the Super Bowl, Swann was unable to participate in several team practices or was limited to only a minor workout in them. However, a few days before the game, he received a verbal challenge from Dallas safety Cliff Harris, who stated, "I'm not going to hurt anyone intentionally. But getting hit again while he's running a pass route must be in the back of Swann's mind. I know it would be in the back of my mind." Swann responded "I'm still not 100 percent. I value my health, but I've had no dizzy spells. I read what Harris said. He was trying to intimidate me. He said I'd be afraid out there. He needn't worry. He doesn't know Lynn Swann. He can't scare me or the team. I said to myself, 'The hell with it, I'm gonna play.' Sure, I thought about the possibility of being reinjured. But it's like being thrown by a horse. You have to get up and ride again immediately or you may be scared the rest of your life." Super Bowl X was the final NFL officiating assignment for veteran referee Norm Schachter, who also served as the referee for Super Bowl I and Super Bowl V. Schachter, one of six men to serve as referee for at least three Super Bowls, worked as an officiating supervisor and instant replay official following his on-field retirement. This was the first Super Bowl where penalties and other information were announced by the referee over a wireless microphone, an innovation of Cowboys general manager Tex Schramm which went into effect at the start of the 1975 season. Super Bowl X was also the first Super Bowl where the starting placekickers were both soccer-style kickers: Roy Gerela for Pittsburgh and Toni Fritsch for Dallas. Broadcasting CBS televised the game in the United States with play-by-play announcer Pat Summerall (calling his first Super Bowl in that role) and color commentator Tom Brookshier. Toward the end of the game, Hank Stram took over for Brookshier, who had left the booth to head down to the locker room area to conduct the postgame interviews with the winning team. Two days after the Super Bowl, Stram was hired as coach of the New Orleans Saints, interrupting his broadcasting career for two seasons. On radio, Verne Lundquist and Al Wisk announced the game for the Dallas Cowboys Radio Network, and Jack Fleming and Myron Cope called the game for the Pittsburgh Steelers Radio Network. Ed Ingles and Jim Kelly called the game nationally for CBS Radio. Hosting television coverage was The NFL Today crew of Brent Musburger; Irv Cross and Phyllis George. During this game, CBS began using Jack Trombey's "Horizontal Hold" as the theme music. That would be used the following season for the NFL Today pregame show between 1976 and 1980 in its original form, with a remake for 1981 followed by updates for 1984 and 1989 before its retirement. Entertainment The overall theme of the Super Bowl entertainment was to celebrate the United States Bicentennial. Each Cowboys and Steelers player wore a special patch with the Bicentennial logo on their jerseys. This was the first Super Bowl where somebody other than the game's referee tossed the coin, in this case, John Warner who was the United States Secretary of the Navy from 1972 to 1974. Prior to 1976, the coin toss was held a half-hour before kick-off. The performance event group Up with People performed during both the pregame festivities and the halftime show titled "200 Years and Just a Baby: A Tribute to America's Bicentennial". Up with People dancers portrayed various American historical figures along with a rendition of Steve Goodman's "City of New Orleans". Singer Tom Sullivan sang the national anthem. Scenes for the 1977 suspense film Black Sunday, about a fictional terrorist attack on the Super Bowl via the Goodyear Blimp, were filmed during the game. This was the last Super Bowl to kick off as early as 2:00 p.m. (EST), thereby allowing a finish time before the commencement of many of the nation's evening church services. This was the first Super Bowl where the play clock was visible to teams and spectators. Visible play clocks were mandated by NFL rules beginning with the 1976 season. This was the last Super Bowl where the coin toss was conducted 30 minutes prior to kickoff. Beginning with the next season, the official coin toss was moved to three minutes before kickoff in the center of the field, leaving coaches to scramble to put the proper specialty unit on the field. From 1947 to 1975, a "mock toss" was held three minutes prior to kickoff at midfield to inform fans and media of the result. Game summary The Steelers won their second straight Super Bowl, largely through the plays by Swann and by stopping a rally by the Cowboys late in the fourth quarter. Officials did not call a single penalty on the Steelers during the game, while the Cowboys were called for only 2 penalties for 20 yards. First quarter On the opening kickoff, the Cowboys ran a reverse where rookie linebacker Thomas "Hollywood" Henderson took a handoff from Preston Pearson and returned the ball a Super Bowl-record 48 yards before kicker Roy Gerela forced him out of bounds at the Steelers' 44-yard line. Gerela suffered badly bruised ribs that appeared to affect his kicking performance all afternoon. On the first play of the game, Steelers defensive lineman L. C. Greenwood sacked Cowboys quarterback Roger Staubach, forcing him to fumble. Although Dallas center John Fitzgerald recovered the fumble, they eventually were forced to punt. The sack was a foreshadow of things to come for Staubach, who was sacked seven times on the day. The Steelers managed to get one first down and advanced to their own 40-yard line, but then they too were forced to punt. Steelers punter Bobby Walden fumbled the snap. Walden managed to recover his own fumble, but Dallas took over on the Steelers' 29-yard line. On the very next play, Staubach threw a 29-yard touchdown pass to wide receiver Drew Pearson, taking a 7–0 lead. The score was the first touchdown permitted in the first quarter | Lambert; Andy Russell, the team's third starting linebacker; future Hall of Fame defensive back Mel Blount; and safeties Glen Edwards and Mike Wagner. Greene made the Pro Bowl despite missing six games with injuries. Ham and Lambert had the best seasons of their careers, while Blount led the league with 11 interceptions and was named the NFL's Defensive Player of the Year. Wagner had 4 interceptions and 3 fumble recoveries, while Edwards had 3 interceptions, while also returning 25 punts for 267 yards. Playoffs Dallas went on to defeat the Minnesota Vikings, 17–14, with a 50-yard touchdown pass from Staubach to Drew Pearson with less than a minute to play in what was called the "Hail Mary pass". They went on to crush the Los Angeles Rams, 37–7, in the NFC Championship Game. As a result, the Cowboys became the first wild card team to advance to the Super Bowl. Meanwhile, even though Pittsburgh's offense lost a total of 12 turnovers in their two playoff games, the Steelers only gave up a combined total of 20 points in their victories over the Baltimore Colts in the AFC Divisional playoff game 28–10, and the Oakland Raiders in the AFC Championship Game 16–10. Super Bowl pregame news and notes Coming into Super Bowl X, most sports writers and fans expected that Swann would not play. He had suffered a severe concussion in the AFC Championship Game against the Raiders that forced him to spend two days in a hospital. If he did play, many assumed he would just be used as a decoy to draw coverage away from the other receivers. Throughout the week leading up to the Super Bowl, Swann was unable to participate in several team practices or was limited to only a minor workout in them. However, a few days before the game, he received a verbal challenge from Dallas safety Cliff Harris, who stated, "I'm not going to hurt anyone intentionally. But getting hit again while he's running a pass route must be in the back of Swann's mind. I know it would be in the back of my mind." Swann responded "I'm still not 100 percent. I value my health, but I've had no dizzy spells. I read what Harris said. He was trying to intimidate me. He said I'd be afraid out there. He needn't worry. He doesn't know Lynn Swann. He can't scare me or the team. I said to myself, 'The hell with it, I'm gonna play.' Sure, I thought about the possibility of being reinjured. But it's like being thrown by a horse. You have to get up and ride again immediately or you may be scared the rest of your life." Super Bowl X was the final NFL officiating assignment for veteran referee Norm Schachter, who also served as the referee for Super Bowl I and Super Bowl V. Schachter, one of six men to serve as referee for at least three Super Bowls, worked as an officiating supervisor and instant replay official following his on-field retirement. This was the first Super Bowl where penalties and other information were announced by the referee over a wireless microphone, an innovation of Cowboys general manager Tex Schramm which went into effect at the start of the 1975 season. Super Bowl X was also the first Super Bowl where the starting placekickers were both soccer-style kickers: Roy Gerela for Pittsburgh and Toni Fritsch for Dallas. Broadcasting CBS televised the game in the United States with play-by-play announcer Pat Summerall (calling his first Super Bowl in that role) and color commentator Tom Brookshier. Toward the end of the game, Hank Stram took over for Brookshier, who had left the booth to head down to the locker room area to conduct the postgame interviews with the winning team. Two days after the Super Bowl, Stram was hired as coach of the New Orleans Saints, interrupting his broadcasting career for two seasons. On radio, Verne Lundquist and Al Wisk announced the game for the Dallas Cowboys Radio Network, and Jack Fleming and Myron Cope called the game for the Pittsburgh Steelers Radio Network. Ed Ingles and Jim Kelly called the game nationally for CBS Radio. Hosting television coverage was The NFL Today crew of Brent Musburger; Irv Cross and Phyllis George. During this game, CBS began using Jack Trombey's "Horizontal Hold" as the theme music. That would be used the following season for the NFL Today pregame show between 1976 and 1980 in its original form, with a remake for 1981 followed by updates for 1984 and 1989 before its retirement. Entertainment The overall theme of the Super Bowl entertainment was to celebrate the United States Bicentennial. Each Cowboys and Steelers player wore a special patch with the Bicentennial logo on their jerseys. This was the first Super Bowl where somebody other than the game's referee tossed the coin, in this case, John Warner who was the United States Secretary of the Navy from 1972 to 1974. Prior to 1976, the coin toss was held a half-hour before kick-off. The performance event group Up with People performed during both the pregame festivities and the halftime show titled "200 Years and Just a Baby: A Tribute to America's Bicentennial". Up with People dancers portrayed various American historical figures along with a rendition of Steve Goodman's "City of New Orleans". Singer Tom Sullivan sang the national anthem. Scenes for the 1977 suspense film Black Sunday, about a fictional terrorist attack on the Super Bowl via the Goodyear Blimp, were filmed during the game. This was the last Super Bowl to kick off as early as 2:00 p.m. (EST), thereby allowing a finish time before the commencement of many of the nation's evening church services. This was the first Super Bowl where the play clock was visible to teams and spectators. Visible play clocks were mandated by NFL rules beginning with the 1976 season. This was the last Super Bowl where the coin toss was conducted 30 minutes prior to kickoff. Beginning with the next season, the official coin toss was moved to three minutes before kickoff in the center of the field, leaving coaches to scramble to put the proper specialty unit on the field. From 1947 to 1975, a "mock toss" was held three minutes prior to kickoff at midfield to inform fans and media of the result. Game summary The Steelers won their second straight Super Bowl, largely through the plays by Swann and by stopping a rally by the Cowboys late in the fourth quarter. Officials did not call a single penalty on the Steelers during the game, while the Cowboys were called for only 2 penalties for 20 yards. First quarter On the opening kickoff, the Cowboys ran a reverse where rookie linebacker Thomas "Hollywood" Henderson took a handoff from Preston Pearson and returned the ball a Super Bowl-record 48 yards before kicker Roy Gerela forced him out of bounds at the Steelers' 44-yard line. Gerela suffered badly bruised ribs that appeared to affect his kicking performance all afternoon. On the first play of the game, Steelers defensive lineman L. C. Greenwood sacked Cowboys quarterback Roger Staubach, forcing him to fumble. Although Dallas center John Fitzgerald recovered the fumble, they eventually were forced to punt. The sack was a foreshadow of things to come for Staubach, who was sacked seven times on the day. The Steelers managed to get one first down and advanced to their own 40-yard line, but then they too were forced to punt. Steelers punter Bobby Walden fumbled the snap. Walden managed to recover his own fumble, but Dallas took over on the Steelers' 29-yard line. On the very next play, Staubach threw a 29-yard touchdown pass to wide receiver Drew Pearson, taking a 7–0 lead. The score was the first touchdown permitted in the first quarter by the Steelers' defense in 1975. Instead of trying to immediately tie the game on a long passing play, the Steelers ran the ball on the first four plays of their ensuing possession, and then quarterback Terry Bradshaw completed a 32-yard pass to wide receiver Lynn Swann to reach the Cowboys' 16-yard line. Swann soared over the outstretched reach of defensive back Mark Washington before tight-roping the sideline to make the reception. Two running plays further advanced the ball to the 7-yard line. Then on third down and one, the Steelers managed to fool the Cowboys. Pittsburgh brought in three tight ends, which usually signals a running play (Steelers guard Gerry Mullins was also an eligible receiver on the play as he moved to the tight end position). After the snap, tight end Randy Grossman faked a block to the inside as if it were a running play, but then ran a pass route into the end zone, and Bradshaw threw the ball to him for a touchdown, tying the game, 7–7. This marked the first Super Bowl that both teams scored in the first quarter. Second quarter Dallas responded on their next drive, advancing the ball 51 yards, all rushing, (30 of them on five carries from fullback Robert Newhouse) before incurring a third down false start penalty, and scoring on kicker Toni Fritsch's 36-yard field goal to take a 10–7 lead early in the second quarter. The 51 rushing yards the Cowboys amassed on the drive tripled what the Minnesota Vikings gained against Pittsburgh for all of Super Bowl IX. The Steelers subsequently advanced to the Cowboys' 36-yard line on their next possession, but on fourth down and two, Bradshaw's pass was broken up by Dallas safety Cliff Harris. Later in the period, Dallas drove to the Steelers' 20-yard line. But in three plays, the Cowboys lost 25 yards. On first down, Newhouse was tackled for a 3-yard loss by linebacker Andy Russell. Then Greenwood sacked Staubach for a 12-yard loss. And on third down, Staubach was sacked again, this time for a 10-yard loss, by defensive end Dwight White. The sacks pushed Dallas out of field goal range and they were forced to punt. The Steelers' offense got the ball back their own 6-yard line with 3:47 left in the half. On the drive, Bradshaw completed a 53-yard pass to Swann to advance the ball to the Cowboys' 37-yard line; Swann's catch has become one of the most memorable acrobatic catches in Super Bowl history. On the very next play, Bradshaw just missed connections with Swann at the Dallas 6 (although CBS's Pat Summerall thought the incomplete pass was intended for John Stallworth) . Pittsburgh drove to the 19-yard line after the two-minute warning, but the drive stalled there and ended with no points after Gerela missed a 36-yard field goal attempt with 22 seconds remaining in the period. Third quarter Early in the third quarter, Pittsburgh got a great scoring opportunity when defensive back J. T. Thomas intercepted a pass from Staubach and returned it 35 yards to the Cowboys' 25-yard line. However, once again the Steelers failed to score as the Dallas defense kept Pittsburgh out of the end zone and Gerela missed his second field goal, a 33-yard attempt. After the miss, Harris mockingly patted Gerela on his helmet and thanked him for "helping Dallas out". Gerela grabbed Harris and began engaging him verbally, but Steeler linebacker Jack Lambert, who was standing nearby, grabbed Harris and threw him to the ground in defense of Gerela. Lambert could have been ejected from the game for defending his teammate, but the officials decided to allow him to remain. The third quarter was completely scoreless and the Cowboys maintained their 10–7 lead going into the final period. Fourth quarter Early in the fourth quarter, Dallas punter Mitch Hoopes was forced to punt from inside his own goal line. As Hoopes stepped up to make the kick, Steelers running back Reggie Harrison broke through the line and blocked the punt. The ball went through the end zone for a safety, cutting the Dallas lead to 10–9. It was the second safety recorded in Super Bowl history, the first occurring a year earlier when White downed Minnesota's Fran Tarkenton on a fumble recovery in the end zone. Then Steelers running back Mike Collier returned the free kick 25 yards to the Cowboys' 45-yard line. Dallas halted the ensuing drive at the 20-yard line, but this time Gerela successfully kicked a 36-yard field goal to give Pittsburgh their first lead of the game, 12–10. Then on the first play of the |
for the Raiders' success on offense was their offensive line, led by left tackle Art Shell and left guard Gene Upshaw, as well as perennial All-Pro center Dave Dalby. Injuries early in the season forced the Raiders to switch from a 4–3 to a 3–4 defense. The switch benefited the team, as they won their last 10 games and finished the regular season with the best record in the league, 13–1. The Raiders' defense was anchored by great linebackers, such as Phil Villapiano and Ted Hendricks, while defensive end Otis Sistrunk anchored the defensive line. Their defensive secondary was extremely hard-hitting and talented, led by safeties Jack Tatum and George Atkinson, and cornerbacks Skip Thomas and Willie Brown. Brown, Upshaw, Biletnikoff and running back Pete Banaszak were the only holdovers from the Oakland team that was defeated nine years earlier in Super Bowl II. Many accused the Raiders defense of being overly aggressive, especially Atkinson, who inflicted a severe concussion on Pittsburgh Steelers wide receiver Lynn Swann in the previous season's AFC Championship Game. Atkinson added to that reputation as the Raiders advanced through the playoffs to Super Bowl XI, as Atkinson inflicted another concussion to Swann in the Raiders' 1976 season opener. In the Raiders' 24–21 playoff win over the New England Patriots, Atkinson broke the nose of Patriots tight end Russ Francis. In reaction, Pittsburgh head coach Chuck Noll complained of a “criminal element” in Atkinson's play. Atkinson himself denied deliberately trying to injure anyone and pointed out that at 6′0″ and 185 pounds, he was one of the smallest players on the field. The Raiders and their fans were often known to counter these accusations against Atkinson and Jack Tatum by pointing out the physical way that Pittsburgh cornerback Mel Blount covered Oakland's speedy split end Cliff Branch. An interesting fact about the team was that two players (whose names were not revealed) bought marijuana from Red Hot Chili Peppers' singer Anthony Kiedis’ father, Blackie Dammett, smoked it before the game, and played the game under the effects of the drug. This was revealed on Kiedis’ biography from 2004, Scar Tissue. Minnesota Vikings The Vikings, coached by Bud Grant, won the NFC Central for the eighth time in the last nine seasons with an 11–2–1 record, and advanced to their fourth Super Bowl in eight years. They were the only team who had lost three Super Bowls (they had previously lost Super Bowls IV, VIII and IX), and did not want to be the first one to lose four. They were the first team to appear in a fourth Super Bowl. Once again, the Vikings had a powerful offense led by 36-year-old quarterback Fran Tarkenton and running back Chuck Foreman. In his 16th NFL season, Tarkenton was already the league's all-time leader in pass completions (3,186), passing yards (41,802), and touchdown passes (308). He had another fine season in 1976, completing 61.9 percent of his passes for 2,961 yards, 17 touchdowns, and only 8 interceptions. Foreman had the best season of his career, rushing for 1,155 yards and 13 touchdowns, while also catching 55 passes for 567 yards and another touchdown. Fullback Brent McClanahan also contributed 634 combined rushing and receiving yards. The Vikings also added two new weapons to their offense: veteran wide receiver Ahmad Rashad and rookie wide receiver Sammy White combined for 104 receptions, 1,577 receiving yards, and 13 touchdowns, while tackle Ron Yary once again anchored the offensive line. The Vikings' “Purple People Eaters” defense, anchored by Carl Eller, Jim Marshall, and Alan Page, were also dominating teams again. During this regular season, they led the NFC in fewest points allowed (176). Also, defensive back Nate Wright led the team with 7 interceptions for 47 yards, while safety Paul Krause had 2 interceptions for 21 yards. Pro Bowl linebacker Matt Blair intercepted two passes and recovered five fumbles. Tarkenton became the second quarterback to start three Super Bowls, following his Super Bowl VIII counterpart Bob Griese. Eleven players were on the roster for Super Bowl IV, VIII, IX, and XI for the Vikings. Bobby Bryant, Fred Cox, Carl Eller, Wally Hilgenberg, Paul Krause, Jim Marshall, Alan Page, Mick Tingelhoff, Ed White, Roy Winston, and Ron Yary. Playoffs The Vikings went on to dominate the Washington Redskins, 35–20, and then defeated the Los Angeles Rams, 24–13, in the playoffs. Ten of the Vikings’ points in the NFC Championship Game came from blocked kicks. The Raiders overcame an 11-point fourth-quarter deficit to defeat the New England Patriots, 24–21, with the aid of a penalty call against the Patriots. New England's Ray Hamilton was tagged for roughing the passer in the fourth quarter, turning an incomplete pass on 3rd and 18 into a first down, and the Raiders went on to score on Stabler's 1-yard touchdown run with 14 seconds left in the contest. In the AFC Championship Game Oakland then faced the Pittsburgh Steelers, a team that had won the two previous Super Bowls and defeated the Raiders in the playoffs in three out of the last four seasons. However, coming into this game without injured starting running backs Franco Harris and Rocky Bleier, the Steelers were soundly thrashed this time around, losing to Oakland, 24–7. This was the first Super Bowl game to match both conferences’ No. 1 seeds, the first one held in the Rose Bowl, the last Super Bowl to finish under daylight and the last where both teams’ placekickers (Minnesota's Fred Cox and Oakland's Errol Mann) used the straight-on style. Scheduled on the 9th day of January, the game marks the earliest Super Bowl played during the calendar year. The regular season started one week earlier than usual in order to avoid having playoff games on Christmas Day, which fell on a Saturday in 1976. By moving the season up, the divisional playoffs were held December 18 and 19, and the conference championship games Sunday, December 26. The local starting time for this Super Bowl, 12:47 pm Pacific Time, also was the earliest in history, two minutes earlier than Super Bowl VII at the nearby Los Angeles Memorial Coliseum in 1973. The Raiders became the first West Division team from either conference to reach a post-merger Super Bowl. Broadcasting The game was televised in the United States by NBC, with play-by-play announcer Curt Gowdy and color commentator Don Meredith. This was Meredith's last broadcast with NBC, as he returned to ABC to rejoin the Monday Night Football crew for the season, where he had been a commentator from through . Bryant Gumbel, Lee Leonard, and analyst John Brodie anchored NBC's pregame, halftime, and postgame coverage. With kickoff at 12:30 p.m. PST, this remains the most recent Super Bowl completed in daylight. Entertainment Pregame festivities The pregame festivities featured the Los Angeles Unified School District (LAUSD) All-City Band and frisbee dog Ashley Whippet. | pass on 3rd and 18 into a first down, and the Raiders went on to score on Stabler's 1-yard touchdown run with 14 seconds left in the contest. In the AFC Championship Game Oakland then faced the Pittsburgh Steelers, a team that had won the two previous Super Bowls and defeated the Raiders in the playoffs in three out of the last four seasons. However, coming into this game without injured starting running backs Franco Harris and Rocky Bleier, the Steelers were soundly thrashed this time around, losing to Oakland, 24–7. This was the first Super Bowl game to match both conferences’ No. 1 seeds, the first one held in the Rose Bowl, the last Super Bowl to finish under daylight and the last where both teams’ placekickers (Minnesota's Fred Cox and Oakland's Errol Mann) used the straight-on style. Scheduled on the 9th day of January, the game marks the earliest Super Bowl played during the calendar year. The regular season started one week earlier than usual in order to avoid having playoff games on Christmas Day, which fell on a Saturday in 1976. By moving the season up, the divisional playoffs were held December 18 and 19, and the conference championship games Sunday, December 26. The local starting time for this Super Bowl, 12:47 pm Pacific Time, also was the earliest in history, two minutes earlier than Super Bowl VII at the nearby Los Angeles Memorial Coliseum in 1973. The Raiders became the first West Division team from either conference to reach a post-merger Super Bowl. Broadcasting The game was televised in the United States by NBC, with play-by-play announcer Curt Gowdy and color commentator Don Meredith. This was Meredith's last broadcast with NBC, as he returned to ABC to rejoin the Monday Night Football crew for the season, where he had been a commentator from through . Bryant Gumbel, Lee Leonard, and analyst John Brodie anchored NBC's pregame, halftime, and postgame coverage. With kickoff at 12:30 p.m. PST, this remains the most recent Super Bowl completed in daylight. Entertainment Pregame festivities The pregame festivities featured the Los Angeles Unified School District (LAUSD) All-City Band and frisbee dog Ashley Whippet. Later, singer Vikki Carr sang “America the Beautiful”. To date, this is the only game in Super Bowl history that the national anthem was not sung. This was only the second time in the game's history that "America the Beautiful" was sung before a game, as Charley Pride sang the song at Super Bowl VIII three years prior. This was the first Super Bowl where the official coin toss was held at midfield three minutes prior to kickoff. Prior to 1976, the official toss was held 30 minutes prior to kickoff, with captains called to midfield three minutes prior to kickoff so the referee could inform fans and media of the results of the toss. Jim Tunney became the last referee to conduct the Super Bowl coin toss. The year before, former United States Secretary of the Navy John Warner became the first non-official to toss the coin. The next year, Chicago Bears great Red Grange (with Tunney as referee) began the tradition of celebrity coin tossers. Halftime show The halftime show was produced by Disney and was based on It's a Small World, an attraction at Disneyland and the Magic Kingdom. The show featured the cast members of The New Mickey Mouse Club. It was the first Super Bowl halftime show to include crowd participation as people in the stadium performed a mass card stunt on cue. The LAUSD All-City Band also played during the show. Game summary First Quarter The Raiders took the opening kickoff and advanced all the way to the Vikings’ 12-yard line, but came up empty after kicker Errol Mann hit the left upright on his 29-yard field goal attempt. Later in the quarter, after the teams exchanged punts, the Vikings had a great opportunity to score, when linebacker Fred McNeill blocked a punt from Ray Guy and recovered the ball on the Raiders' 3-yard line. The Vikings' special teams unit was known for blocking kicks, but this was the first time it had happened to Guy. (He had only three of his punts blocked in his 14-year Pro Football Hall of Fame career.) However, two plays later, Minnesota running back Brent McClanahan fumbled the ball while being tackled by Raiders linebacker Phil Villapiano, and linebacker Willie Hall recovered the ball for Oakland. The Raiders then marched 90 yards to the Vikings' 7-yard line, with a 35-yard run by Clarence Davis around left end from the Oakland 6-yard line breaking through Minnesota's front. On the drive's sixth play, quarterback Ken Stabler completed a 25-yard pass to tight end Dave Casper, with Casper breaking through what Stabler called “10 tackles.” Second Quarter Oakland, however, had to settle for a 24-yard field goal from Mann, giving them a 3–0 lead 48 seconds into the second quarter. After forcing Minnesota to punt following a three-and-out, Oakland did even better the next time it got the ball. Stabler completed a 19-yard pass to Casper to reach the Vikings' 26. Running back Carl Garrett carried on three consecutive plays and gained 20 yards, then Stabler hit receiver Fred Biletnikoff along the right sideline for five yards to the 1-yard line. The 64-yard drive in 10 plays then concluded on a 1-yard touchdown pass from Stabler to Casper, increasing the Raiders' lead to 10–0 (the reception was Casper's fourth and final one of the game). On the Vikings' next possession, running back Chuck Foreman gained seven yards on first down and six yards on second down, but a holding penalty on Ron Yary made it second-down-and-13. Quarterback Fran Tarkenton threw an incomplete pass to rookie receiver Sammy White, then a long pass to Ahmad Rashad was broken up by defensive back Willie Brown, resulting in another three-and-out. Oakland got the ball back in excellent field position, after returner Neal Colzie returned Minnesota's punt 25 yards to the Vikings' 35-yard line. After three running plays, Stabler completed a 17-yard pass to Biletnikoff at the 1-yard line, and running back Pete Banaszak scored a touchdown on the next play, increasing Oakland's lead to 16–0 with 3:33 left in the second quarter, after Mann missed the extra point attempt. To this point, Minnesota had picked up only one first down. They added three more before halftime, including a meaningless 26-yard completion from Tarkenton to Foreman on the last play of the half, which ended up being their longest gain of the entire game. The score at halftime marked the fourth time in as many Super Bowl games that the Vikings failed to score in the first half. Third Quarter The second half began with three consecutive punts, but then Colzie returned the Vikings' second punt of the quarter 12 yards to the Oakland 46-yard line. From there, the Raiders advanced to the Minnesota 23-yard line, aided by an 18-yard run by Davis and a 10-yard reception by wide receiver Cliff Branch, to set up Mann's 40-yard field goal to increase their lead to 19–0. After a few more seconds, the Vikings had gone 40 minutes without scoring, same as in all their previous Super Bowls, while as it turned out, Oakland had enough points to win, same as the three earlier games with Kansas City, Miami and Pittsburgh. Tarkenton then threw 3 consecutive incomplete passes on their ensuing drive, forcing the Vikings to punt again. This loomed as the fifth three-and-out drive for Minnesota in the game. However, Oakland linebacker Ted Hendricks was penalized for running into the punter on the play, giving Minnesota a first down. Taking advantage of their second chance, the Vikings ended up with a 12-play, 68-yard drive as Tarkenton completed passes to Stu Voigt, Ahmad Rashad and Chuck Foreman for gains of 15, 21, and 10 yards. On the last play, Tarkenton threw an 8-yard touchdown pass to Sammy White, making the score 19–7. Fourth Quarter The Raiders were forced to punt on their next drive, after they were unable to recover from Alan Page’s 11-yard sack on first down. Then aided by Tarkenton's completions to White for gains of 14 and 18 yards, respectively, the Vikings advanced to the Oakland 37-yard line (The 18-yard completion to White featured an infamous hit from Jack Tatum that knocked Sammy White's helmet off, sending it and his mouthguard flying, but somehow White held on to the ball and recovered after being knocked out for a moment). However, on third down and 3, Hall intercepted a pass from Tarkenton and returned it 16 yards to the 46-yard line. Three plays later, Biletnikoff's 48-yard reception moved the ball to the Vikings' 2-yard line, setting up Banaszak's second rushing touchdown to increase Oakland's lead to 26–7. All three Raiders offensive touchdowns had been preceded on the previous play by key Biletnikoff receptions. White returned the ensuing kickoff 19 yards to the Minnesota 32-yard line, and four plays later, Tarkenton completed a 25-yard pass to receiver Rashad to reach the Oakland 28-yard line. However, on the next play, defensive back Willie Brown intercepted a pass intended |
For the first and only time, two players won Super Bowl MVP honors: defensive tackle Randy White and defensive end Harvey Martin. This was also the first time that a defensive lineman was named Super Bowl MVP. Background The NFL awarded Super Bowl XII to New Orleans on March 16, 1976, at the NFL owners meetings held in San Diego. It was the first of seven Super Bowls (as of 2021) played in the Superdome, though it was not the first one scheduled in the Superdome; Super Bowl IX was scheduled to be played there, but construction delays forced it to be played at Tulane Stadium. Staubach v. Morton The main storyline surrounding Super Bowl XII was Cowboys quarterback Roger Staubach versus Broncos quarterback Craig Morton. Morton began his career playing for Dallas in 1965. Staubach joined the Cowboys in 1969 after four years of service in the U.S. Navy, and soon both quarterbacks competed for the starting job. During the 1970 season, both Morton and Staubach started for about half of the regular season games. Morton was ultimately selected to lead the team through the playoffs and eventually to their Super Bowl V loss to the Baltimore Colts, 16–13. The next year, Staubach won the starting job and eventually led Dallas to defeat the Miami Dolphins in Super Bowl VI, 24–3. Staubach was also named Super Bowl MVP during that game. In 1972, Morton started most of the Cowboys' games as Staubach was out with a separated shoulder. However, in the division playoffs against San Francisco, Staubach relieved Morton and rallied the team to victory, which assured Staubach of the starting job going forward. Morton was relegated to backup status until he left the team in 1974 to join the New York Giants. Morton and the Broncos' Orange Crush Defense After spending three years with the Giants, Morton became the starting quarterback for the Broncos, a franchise with a dismal history. It had taken them 14 years (1960–1973) to record their first winning season and they had never once made the playoffs. But under the leadership of the newly arrived Morton and their new coach Red Miller, Denver finished 1977 with a 12–2 record and earned the #1 seed in the AFC. Morton did not put up a large number of passing yards (1,929) during the regular season, but he threw 14 touchdown passes and only 8 interceptions, while also rushing for 125 yards and 4 touchdowns, earning him the NFL Comeback Player of the Year Award. Denver tight end Riley Odoms was his main target, with 37 receptions for 429 yards. Wide receiver Haven Moses was also a major deep threat, catching 27 passes for 539 yards, an average of 20 yards per catch. However, the Broncos main offensive strength was their rushing game. Denver had 3 running backs, Otis Armstrong, Lonnie Perrin, and Rob Lytle, who carried the ball equally, combining for 1,353 rushing yards and 10 touchdowns. On special teams, multi-talented wide receiver Rick Upchurch led the NFL with 653 punt return yards, while also catching 12 passes for 245 yards and recording 456 yards returning kickoffs. The backbone of the Broncos was their defense, a unit known as the "Orange Crush", which used a 3–4 formation anchored by four superb linebackers, including Randy Gradishar (3 interceptions, 4 fumble recoveries) and Tom Jackson (4 interceptions, 93 return yards, 1 touchdown). Defensive End Lyle Alzado anchored the line, while their secondary was led by defensive backs Bill Thompson (who recorded 5 interceptions) and Louis Wright (who had 3 interceptions). The Broncos defense had given up just 148 points during the season, an average of just 10.6 per game and the 3rd-fewest in the NFL. Staubach and the Cowboys' Doomsday Defense With Staubach and his team's Doomsday Defense, the Cowboys won the NFC East with a 12–2 regular season record. Staubach threw for 2,620 yards and 18 touchdowns with only 8 interceptions, while also gaining 171 rushing yards and 3 touchdowns on the ground. Wide receiver Drew Pearson was the leading receiver on the team with 48 receptions for 870 yards, while Pro Bowl tight end Billy Joe DuPree recorded 28 receptions for 347 yards and provided blocking support on running plays. The Cowboys also had a new weapon on offense: rookie running back Tony Dorsett, the previous year's Heisman Trophy winner. Despite not becoming a full-time starter until the tenth game of the regular season, Dorsett led the team in rushing with 1,007 yards, scored 13 total touchdowns, and was the team's third leading receiver with 29 receptions for another 273 yards. Veteran fullback Robert Newhouse provided Dorsett with blocking, and was the team's second leading rusher with 721 yards, while also catching 16 passes for another 106 yards. Running back Preston Pearson contributed 341 yards rushing, caught 46 passes for 535 yards, and scored 5 touchdowns. The Cowboys' offensive line was led by All-Pro tackle Rayfield Wright. Meanwhile, the Cowboys' Doomsday Defense remained in the superb form that helped lead the Cowboys' Super Bowl X appearance. Their defensive line consisted of Harvey Martin (who recorded 23 sacks), Jethro Pugh, Ed "Too Tall" Jones and Randy White. Behind them, the Cowboys had a trio of linebackers, Thomas Henderson (3 interceptions), D.D. Lewis, and Bob Breunig, who provided pass coverage and run stoppage. Dallas also had a secondary led by future Hall of Famers cornerback Mel Renfro and safety Cliff Harris and Pro Bowl safety Charlie Waters. Playoffs The Cowboys earned their second trip to the Super Bowl in three years by defeating the Chicago Bears, 37–7, and the Minnesota Vikings, 23–6, in the playoffs. Their "Doomsday Defense" proved as dominant as ever in those two games, forcing 7 turnovers against Chicago and 4 against the Vikings. Meanwhile, the Broncos earned their first ever trip to the Super Bowl in team history by defeating the two previous league champions: the Pittsburgh Steelers, 34–21, and the Oakland Raiders, 20–17, in the playoffs. This made Morton the first quarterback to start a Super Bowl game for two different franchises (Kurt Warner was the second with St. Louis Rams and Arizona Cardinals, and Peyton Manning was the third with the Indianapolis Colts and Denver Broncos, and Tom Brady was the fourth with the New England Patriots and Tampa Bay Buccaneers). Morton is also the only quarterback to have started two different franchises' first Super Bowl appearances. This was the final Super Bowl in the 14-game schedule era. The following season, the NFL went to a 16-game schedule, where it remained until 2021 Super Bowl pregame news and notes Super Bowl XII provided an opportunity for Morton to not only beat his former team, but also to redeem himself for his Super Bowl V loss and the loss of his starting job to Staubach. For Staubach, he had a chance to win his second Super Bowl and defeat his old rival, showing that he truly was the better quarterback of the two. Tony Dorsett became the first football player in history to win an NCAA National Championship one year (with the University of Pittsburgh Panthers) and a Super Bowl the next. Dorsett won both championships in the same building; Pitt clinched the 1976 national championship by defeating the Georgia Bulldogs in the Sugar Bowl on January 1, 1977. Dallas was the only NFC team to win the Super Bowl in the 1970s (although both Baltimore and Pittsburgh were pre-merger NFL teams). Both Cowboy victories in the decade came in New Orleans against teams making their first Super Bowl appearance. This was the first Super Bowl between two teams who had met in regular season play. The Cowboys defeated the Broncos 14–6 on the final Sunday of the regular season at Texas Stadium. Both teams' starters saw limited action in that contest, since both squads had already clinched their respective division championships and home-field advantage throughout the playoffs. Denver was 12–1 and Dallas 11–2 prior to the Dec 18 matchup. It was the first of only two times that two teams have played each other in the Super Bowl after playing on the final weekend of the regular season (the New York Giants and New England Patriots played in the final week of the 2007 regular season and met again in Super Bowl XLII). Under NFL scheduling rules put in place by Commissioner Roger Goodell prior to the 2010 season, the Super Bowl participants will no longer be able to play each other on the final weekend of the regular season, since all games on the final weekend now match division opponents. This was the first Super Bowl to feature arrow markers every ten yards, beginning at the 10 yard line, to indicate the direction of the nearest goal line, which were first used at Kansas City's Arrowhead Stadium in 1973. They became mandatory league-wide the following season in 1978. Broadcasting The game, the first Super Bowl to be played in prime time, was broadcast in the United States by CBS with play-by-play announcer Pat Summerall and color commentator Tom Brookshier. The game kicked off at 5:17 p.m. Central Standard Time. Hosting the coverage was The NFL Today hosts Brent Musburger; Irv Cross; Phyllis George (in the last game of her first stint on The NFL Today before leaving to host the short-lived People the following season). Also contributing were Hank Stram (who had recently been fired by the New Orleans Saints); Jimmy "The Greek" Snyder; Sonny Jurgensen (working on CBS Radio coverage); Gary Bender; Paul Hornung; Nick Buoniconti and Jack Whitaker. Buoniconti and Hornung served as sideline reporters; with Hornung doing postgame interviews in the Broncos' locker room; while Bender covered the trophy presentation in the Cowboy locker room. An interesting aspect was the use of what was called an Electronic Palette graphics system (created by CBS and Ampex) for a painting-like aspect to several visual graphics; such as the game intro, starting lineups and bumpers going into or coming out of a commercial break. CBS would also unveil what was known as the "Action Track"; showing the trail of a football that had been kicked during replays. Also, when the planned lead-in (the Phoenix Open golf tournament) was halted due to poor weather, CBS Sports president Robert Wussler (in New York) and producer Barry Frank (at the Superdome) ended up filling the time period with an impromptu look at how the game would be produced. As in their previous Super Bowl; | heavy traffic, but center John Fitzgerald made the recovery to keep possession for the Cowboys, who then punted. On the Broncos second possession, Cowboys defensive linemen White and Harvey Martin simultaneously hit Morton as he attempted to throw, which resulted in a wobbly pass that failed to cross the line of scrimmage and was intercepted by defensive back Randy Hughes. Five plays after the turnover, Dorsett scored on a 3-yard touchdown run, converting on a fourth and goal attempt. On the Broncos next possession, Morton was intercepted for a second time after his pass was tipped by linebacker Bob Breunig into the arms of defensive back Aaron Kyle, who returned the ball 19 yards to Denver's 35-yard line. Dallas then advanced to the 8-yard line, but Cowboys quarterback Roger Staubach was sacked by Lyle Alzado for a 10-yard loss on third down, forcing the Cowboys to settle for a 35-yard Efrén Herrera field goal to increase their lead to 10–0. Second Quarter Denver was forced to punt to begin the second quarter, and Dallas then advanced to the Broncos' 19-yard line. On third down, Staubach unleashed a pass that was intercepted in the end zone; however, the officials ruled that he had stepped out of bounds before he threw the ball. On the next play, Herrera successfully added a 43-yard field goal to increase the Cowboys' lead to 13–0. The rest of the quarter was filled with an avalanche of sloppy play, turnovers, and missed opportunities. On the second play of the next Denver drive, Morton unleashed an errant pass for his third interception, this time by defensive back Benny Barnes at the Cowboys' 40-yard line. The Denver defense immediately stiffened, sacking Staubach for a fourth time and forcing a three-and-out and a punt. However, the punt struck an unsuspecting Denver player, John Schultz, on his helmet as he attempted to throw a block during the return, and the ball was quickly recovered by the Cowboys' Bruce Huther. The Cowboys then advanced to the 26-yard line, but Herrera pulled his 43-yard field goal attempt wide left, keeping the score 13–0. On the following drive the Broncos committed their fifth turnover as wide receiver Jack Dolbin fumbled, with Hughes returned the ball 19 yards to the Denver 27-yard line. However, the Cowboys failed to score as Herrera missed another field goal, this time from only 32 yards out. On the first play after that missed attempt, Denver wasted no time in giving the ball away again, as tight end Riley Odoms fumbled the ball back to Dallas, with Hughes recovering it and returning it to the 28-yard line. However, on the next play, Dallas gave the ball right back to Denver as tight end Billy Joe DuPree caught a pass inside the 10-yard line but fumbled, with Denver linebacker Tom Jackson making the recovery. Five plays later, with the Broncos desperate to score before the half, Morton uncorked yet another errant pass that was intercepted by defensive back Mark Washington who returned the ball 27 yards to Denver's 35-yard line. There were 6 seconds remaining on the clock after the interception, but Dallas couldn't capitalize as Herrera missed yet another field goal attempt, his third miss of the half, this time from 44 yards out as time expired. By halftime, the Cowboys had fumbled five times (losing one), had missed three field goals, and had allowed four sacks, but still led 13–0. Meanwhile, the Broncos had committed a halftime record 7 turnovers. Morton, who had thrown only 8 interceptions during the entire 1977 season, was picked off 4 times in the half in addition to 3 fumbles lost, finishing with a passer rating of 0.0. Incredibly, after punting on their very first drive of the game, six of the next seven Broncos possessions resulted in a turnover, and there also was a fumble on a punt return. Third Quarter Denver trailed by only 13 points as the second half began, and on the opening drive of the second half, the Broncos moved the ball deep into Dallas territory. First, John Schultz returned the second half kickoff 25 yards to the 35-yard line, and then Otis Armstrong ripped off an 18-yard gain. Seven plays later, Jim Turner finished the drive with a 47-yard field goal, cutting the score to 13–3. But later in the period, the Cowboys scored another touchdown on a 45-yard pass from Staubach to receiver Butch Johnson, who made a fingertip catch as he fell into the end zone as the Cowboys increased their lead to 20–3. Johnson dropped the ball when he hit the ground, but officials ruled he had scored a touchdown before it came out of his hands. Denver wide receiver Rick Upchurch returned the ensuing kickoff a Super Bowl-record 67 yards to the Cowboys 26-yard line. On the next play, Morton nearly threw his fifth interception, and was then immediately replaced by former Ole Miss quarterback Norris Weese. Two plays later on fourth down, Jim Jensen's 16-yard run moved the ball to the 1-yard line, and then Rob Lytle scored on a 1-yard touchdown run to cut the deficit to 20–10. Fourth Quarter Next, Dallas drove into Denver territory but Staubach was sacked by Tom Jackson and lost the ball, Rubin Carter recovering at the Broncos' 45 early in the fourth quarter. Weese was incomplete on his next three attempts, however, one on a pass to Upchurch in the end zone, and Denver punted. The Broncos forced a Dallas punt but Weese fumbled the ball while being sacked by Martin, and Kyle recovered it on the Denver 29-yard line. On the next play, the Cowboys scored on a 29-yard halfback option play: Staubach pitched the ball to fullback Robert Newhouse, who ran left and then threw a pass to back-up receiver Golden Richards for a touchdown. The score gave the Cowboys a 27–10 lead and put the game out of reach. Newhouse became the first running back in Super Bowl history to complete a touchdown pass. Most notable about the trick play was that Denver's defense was not fooled by it, as Richards was properly covered by defensive back Steve Foley. Incidentally, Newhouse had practiced with the play for weeks but had not managed to complete the pass once in practice (which unlike the play in the game was done with Newhouse rolling to his right). Loaded up with stickum (legal at the time), Newhouse accomplished a tight spiral to Richards that he caught in stride for the score. Staubach finished the game with 17 out of 25 pass completions for 183 yards and a touchdown, with no interceptions. Dorsett was the leading rusher of the game, with 66 rushing yards and a touchdown. He also caught 2 passes for 11 receiving yards. In addition to his 29-yard touchdown pass, Newhouse also contributed with 55 rushing yards. Dallas tight end Billy Joe DuPree was the leading receiver of the game with 4 receptions for 66 yards. Hughes had an interception and a Super Bowl record 2 fumble recoveries. Before being taken out of the game, Denver's starting quarterback Craig Morton completed just 4 out of 15 passes for 39 yards and was intercepted 4 times. His 21-yard completion to Haven Moses on the Broncos' opening drive was the only pass he completed that both resulted in positive yardage and did not end in a turnover. Morton's passer rating for the game was 0.0, the lowest in Super Bowl history. Upchurch recorded 125 total offensive yards (94 on kickoff returns, 22 on punt returns, and 9 receiving yards). The Cowboys' superb defense played a critical role in the game. White and Martin were named co-Most Valuable Players; this award is usually bestowed on an offensive player. The voters actually wanted to name the entire 11-man starting defensive lineup as co-MVPs, and asked the NFL if this was acceptable. The league said no, and so two players were picked for the award. The unheralded Hughes and Kyle of the Cowboy secondary each had superb games to play an important role in the victory. The two men came up with five turnovers between them, leading directly to 17 of Dallas' points. The game was the 8th Super Bowl in 10 years in which the winning team scored enough to win before the losing team put up any points on the board. By contrast, this has happened only four times since, in Super Bowls XV, XVIII, XXXV, and XLVIII. In 2015, on the occasion of Super Bowl 50, Slate webpage writer Justin Peters watched all the games over a two-month period. He considered Super Bowl XII to be the worst Super Bowl ever. Morton was a large part of the reason for Peters, who felt the Broncos' quarterback was lucky to have only been intercepted four times in the first half, and a total output that amounted to only one completion for positive yardage that was not followed by an immediate turnover. Nor had the Cowboys impressed him, in large part due to Herrera's missed field goals in the second quarter. "Blowouts can at least be fun to watch sometimes", he concluded. "This game was nothing but pain." Box score Final statistics Sources: NFL.com Super Bowl XII, Super Bowl XII Play Finder Dal, Super Bowl XII Play Finder Den Statistical comparison Individual statistics 1Completions/attempts 2Carries 3Long gain 4Receptions 5Times targeted Records Set The following records were set in Super Bowl XII, according to the official NFL.com boxscore and the ProFootball reference.com game summary. Some records have to meet NFL minimum number of attempts to be recognized. The minimums are shown (in parenthesis). ‡ Sacks an official statistic since Super Bowl XVII by the NFL. Sacks are listed as "Tackled Attempting to Pass" in the official NFL box score for Super Bowl XII. Turnovers are defined as the number of times losing the ball on interceptions and fumbles. Starting lineups Source: Officials Referee: Jim Tunney #32 third Super Bowl (VI, XI) Umpire: Joe Connell #57 third Super Bowl (VI, X) Head Linesman: Tony Veteri #36 third Super Bowl (II, VII) Line Judge: Art Holst #33 second Super Bowl (VI) Back Judge: Ray Douglas #5 second Super Bowl |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.